Search results
Results from the WOW.Com Content Network
A modular multiplicative inverse of a modulo m can be found by using the extended Euclidean algorithm. The Euclidean algorithm determines the greatest common divisor (gcd) of two integers, say a and m. If a has a multiplicative inverse modulo m, this gcd must be 1. The last of several equations produced by the algorithm may be solved for this gcd.
Finally, given a, the multiplicative inverse of a modulo n is an integer x satisfying ax ≡ 1 (mod n). It exists precisely when a is coprime to n , because in that case gcd( a , n ) = 1 and by Bézout's lemma there are integers x and y satisfying ax + ny = 1 .
With that provision, x is the modular multiplicative inverse of a modulo b, and y is the modular multiplicative inverse of b modulo a. Similarly, the polynomial extended Euclidean algorithm allows one to compute the multiplicative inverse in algebraic field extensions and, in particular in finite fields of non prime order.
The modular multiplicative inverse is defined by the following rules: Existence: There exists an integer denoted a −1 such that aa −1 ≡ 1 (mod m) if and only if a is coprime with m. This integer a −1 is called a modular multiplicative inverse of a modulo m.
In modular arithmetic, the modular multiplicative inverse of a is also defined: it is the number x such that ax ≡ 1 (mod n). This multiplicative inverse exists if and only if a and n are coprime. For example, the inverse of 3 modulo 11 is 4 because 4 ⋅ 3 ≡ 1 (mod 11). The extended Euclidean algorithm may be used to compute it.
In computing, the modulo operation returns the remainder or signed remainder of a division, after one number is divided by another, called the modulus of the operation. Given two positive numbers a and n , a modulo n (often abbreviated as a mod n ) is the remainder of the Euclidean division of a by n , where a is the dividend and n is the divisor .
When R is a power of a small positive integer b, N′ can be computed by Hensel's lemma: The inverse of N modulo b is computed by a naïve algorithm (for instance, if b = 2 then the inverse is 1), and Hensel's lemma is used repeatedly to find the inverse modulo higher and higher powers of b, stopping when the inverse modulo R is known; N′ is ...
The RSA cryptosystem is based on this theorem: it implies that the inverse of the function a ↦ a e mod n, where e is the (public) encryption exponent, is the function b ↦ b d mod n, where d, the (private) decryption exponent, is the multiplicative inverse of e modulo φ(n).