GENERALIZED ARYABHATA REMAINDER THEOREM

Size: px
Start display at page:

Download "GENERALIZED ARYABHATA REMAINDER THEOREM"

Transcription

1 International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN Volume 6, Number 4, April 2010 pp GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen Chang 1, Jieh-Shan Yeh 2 and Jen-Ho Yang 3 1 Department of Information Engineering and Computer Science Feng Chia University Taichung 40724, Taiwan ccc@cs.ccu.edu.tw 2 Department of Computer Science and Information Management Providence University 200 ChungChi Rd., Taichung 43301, Taiwan jsyeh@pu.edu.tw 3 Department of Computer Science and Information Engineering National Chung Cheng University Chiayi 621, Taiwan jenho@cs.ccu.edu.tw Received October 2008; revised March 2009 Abstract. The Chinese Remainder Theorem (CRT) and the Generalized Chinese Remainder Theorem (GCRT) are widely employed in signal processing, information coding, and cryptography. However, CRT and GCRT must compute the modular operation with a large number in the final step, which is a time-consuming operation. Instead, the Aryabhata Remainder Theorem (ART) reduces the computation time without computing such large modular operation. However, to the best of our knowledge, no previously published works discuss any variation of ART. Therefore, this study proposes the Generalized Aryabhata Remainder Theorem (GART) which is the first work that discusses the generalized version of ART. Unlike the time complexities of the GCRT, which is O(n 2 t 2 ), GART is just O(n t 2 ), where n is the number of moduli and t is the number of bits in each modulus. Therefore, the proposed GART is more efficient than GCRT. Keywords: Aryabhata remainder theorem, Chinese remainder theorem, Residue number system 1. Introduction. In recent years, Residue Number System (RNS) is a popular research in computing large number arithmetic because of its properties of parallel, carry-free and high-speed arithmetic [9]. In RNS, a number is moduloed by the selected moduli, and the number is represented by a vector of several residues. Therefore, the computations in RNS are performed on each residue independently. That is, a large number is separated into several small residues for parallel computing on a multi-processor computer. To apply RNS for large number arithmetic, the conversion between RNS and the binary number system is an important issue. Thus, the literature discloses many conversion algorithms with specific moduli in RNS [1,4,5,7,12]. The common method for the conversion with general moduli in RNS uses the Chinese Remainder Theorem (CRT). An integer is easily reconstructed from its residues which are moduloed by the moduli in RNS. Moreover, CRT can be applied to many applications, such as signal processing, information coding, cryptography, etc. Besides, many generalized version of CRT also have been proposed [2,3,6,11]. The Generalized CRT (GCRT) [1] is a variation of the conventional CRT. In some applications, such as image coding [10,13], GCRT is more practical and flexible than CRT because GCRT additionally provides an 1865

2 1866 C.-C. CHANG, J.-S. YEH AND J.-H. YANG extra modulus. However, both CRT and GCRT need to compute the modular arithmetic with a large number, which is the product of all moduli. This disadvantage increases their computation time. On the other hand, Rao and Yang proposed the Aryabhata Remainder Theorem (ART) [8], which solves the conversion problem with two moduli in RNS. They also introduced an extension of ART to any number of moduli, which solves the conversion problem with n congruencies in RNS. Comparing with CRT and GCRT, ART does not compute the large modular arithmetic. Consequently, ART greatly reduces the conversion time. However, to the best of our knowledge, no previously published works discuss any variation of ART. Therefore, this study proposes the Generalized Aryabhata Remainder Theorem (GART). Research s Contributions. The main contributions of the proposed GART are as follows: 1. Practicality: Like GCRT [2], the proposed GART possesses an additional modulus so that it can be applied to many applications, such as access control, database, and cryptosystems. 2. Efficiency: With n moduli, the time complexity of the GCRT is O(n 2 t 2 ), where t is the number of bits in each modulus. The proposed GART only requires O(n t 2 ). Thus, the proposed GART has less computation time and is more efficient than the GCRT. The above description explains that the proposed GART is more practical and efficient than the previous works. The rest of this paper is organized as follows. First, Section 2 reviews the related works. Then, Section 3 offers the proposed generalized Aryabhata Remainder Theorem. Section 4 provides the performance analysis. Finally, Section 5 presents the study s conclusions. 2. Related Works. This section reviews the Chinese Remainder Theorem (CRT), the Generalized Chinese Remainder Theorem (GCRT), and the Aryabhata Remainder Theorem (ART) Chinese remainder theorem (CRT). In RNS, a number is represented by the residues using a set of relatively prime moduli {m 1, m 2,, m n } satisfying GCD(m i, m j ) = 1 for i j, where GCD(m i, m j ) denotes the greatest common divisor of m i and m j. For an integer X, its RNS-representation is denoted as (r 1, r 2,, r n ), where r i = X mi = X mod m i for i = 1, 2,, n. According to CRT [9], the RNS-representation number r i = X mi = X mod m i is converted into its decimal representation X by the equation: X M = n i=1 m i r i m 1 i mi M, (1) where M = n i=1 m i, m i = M/m i, and m 1 i mi is the multiplicative inverse of m i modulo m i. Example 2.1 illustrates CRT as follows. Example 2.1. Convert the RNS-representation number (2, 4, 1) with the moduli set {3, 5, 7} into its decimal representation X. According to CRT, M = = 105, m 1 = 5 7 = 35, m 2 = 3 7 = 21, m 2 = 3 5 = 15, m 1 1 m1 = 2, m 2 1 m2 = 1, and m 3 1 m3 = 1. Then, the decimal representation of the RNS-representation number (2, 4, 1) is X 30 = = = 29.

3 GENERALIZED ARYABHATA REMAINDER THEOREM Generalized Chinese remainder theorem (GCRT). GCRT is a variation of CRT. Compared with CRT, an additional modulus k is provided during the computations in GCRT. GCRT is introduced as follows. Given a set of relatively prime moduli {m 1, m 2,, m n } and an additional modulus k, where k < Min{m i } for i = 1, 2,, n. In GCRT, an integer X can be represented as (x 1, x 2,, x n ) satisfying Max{x i } < k < Min{m i }, where x i = X/m i mod k for i = 1, 2,, n. According to GCRT [6], the number X can be computed from n-tuple (x 1, x 2,, x n ) by the equation X km = n i=1 m i a i b i km, where M = n i=1 m i, m i = k n j=1,j i m j, m i a i = k mod (k m i ), and b i = x i m i /k. Example 2.2 illustrates GCRT. Example 2.2. Given a set of moduli {11, 13, 17} and a general modulus k = 8 find the number X = (x 1, x 2, x 3 ) = (6, 2, 6) using GCRT. According to GCRT, M = = 2431, m 1 = = 1768, M 2 = = 1768, m 3 = = 1144, a 1 = 1, a 2 = 8, a 3 = 5, b 1 = 6 11/8 = 9, b 2 = 2 13/8 = 4, and b 3 = 6 17/8 = 13. Then, X = = = The solution is verified as follows: x 1 = 2008/11 mod 8 = 182 mod 8 = 6, x 2 = 2008/13 mod 8 = 154 mod 8 = 2, x 3 = 2008/17 mod 8 = 118 mod 8 = Aryabhata remainder theorem (ART). Assume that there are two relatively prime moduli m 1 and m 2. Let r 1 = X mod m 1, r 2 = X mod m 2, and M = m 1 m 2. According to ART [7], X has a unique solution in Z M, and the solution is computed by the equation X = m 1 (r 2 r 1 ) m 1 1 m2 + r 1. The proof of ART is shown in [8]. Example 2.3 demonstrates an example of ART. Example 2.3. Given two relatively prime moduli m 1 = 13 and m 2 = 17. Let r 1 = X mod 13 = 11 and r 2 = X mod 17 = 8, find X using ART. According to ART, X can be computed by the equation X = m 1 (r 2 r 1 ) m 1 1 m2 + r 1 = 13 (8 11) = 76. The solution is verified as follows: 76 mod 13 = 11 = r 1 and 76 mod 17 = 8 = r 2. Both above-mentioned CRT and GCRT have to compute modular operations with a large number, which is the product of all moduli. This time-consuming operation greatly increases the computation time. However, ART does not have to compute such time-consuming operation. Thus, this research investigates the Generalized Aryabhata Remainder Theorem (GCRT) to avoid large modular arithmetic in GCRT. 3. Generalized Aryabhata Remainder Theorem (GART). This section first presents the proposed GART with two moduli and further extends the proposed GART to n moduli for the general case GART with two moduli. The following Lemma 3.1 and Theorem 3.1 are necessary for establishing the proposed GART. Lemma 3.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given q 1 = X mod (k m 1 ) and q 2 = X mod (k m 2 ) satisfying q 2 q 1 = 0 mod k, then X has a unique solution in Z km1 m 2 computed by X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1. Theorem 3.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations x/m 1 = x 1 mod k and x/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }. For any pair (r 1, r 2 ) satisfying 0 r 1 < m 1, 0 r 2 < m 2, and x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k, X has a solution in Z km1 m 2 given by X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1.

4 1868 C.-C. CHANG, J.-S. YEH AND J.-H. YANG To increase the readablility of the section, the detailed proofs of Lemma 3.1 and Theorem 3.1 are offered in Appendixes. Corollary 3.1 states the proposed GART as follows. Corollary 3.1. Generalized Aryabhata Remainder Theorem (GART): Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations x/m 1 = x 1 mod k and x/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }, X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 is one solution in Z km1 m 2. Proof: By Theorem 3.1, one solution is obtained from the equation X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1 if r 1 and r 2 are properly assigned. Thus, simply let r 1 = 0 and r 2 be the smallest integer such that the equation (x 2 m 2 x 1 m 1 +r 2 ) can be a multiple of k, the equation X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 (2) derives one solution in Z km1 m 2. An example of the proposed GART is illustrated as follows. Example 3.1. Given a set of two relatively prime moduli {m 1, m 2 } = {11, 13} and a general modulus k = 8, find X satisfying X/11 = 0 mod 8 and X/13 = 7 mod 8 using the proposed GART. The proposed GART ensures the following equation. X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 = 8 11 ( )/ = = 616. The solution is verified as 616/11 mod 8 = 0 and 616/13 mod 8 = GART with n moduli. To extend the 2-modulus GART introduced in Subsection 3.1, this subsection presents an iterative GART algorithm with n moduli in this Subsection. Given a set of relatively prime moduli {m 1, m 2,, m i } and an additional modulus k satisfying k < Min{m i } for i = 1, 2,, n. Assume that an integer X is represented by n-tuple {x 1, x 2,, x i } satisfying Max{x i } < k < Min{m i }, where x i = X/m i mod k for i = 1, 2,, n. Then, X is computed by the proposed iterative GART algorithm shown as follows. Input: ({x 1, x 2,, x i }, {m 1, m 2,, m i }, k) Output: X 1. M 1 m 1, X 1 = x 1 m for i = 2 to n do 3. M i M i 1 m i. 4. X i k M i 1 ( X i m i X i 1 )/k (M i 1 ) 1 mi + X i 1 5. end for. 6. Return X n. In this algorithm M i, k M i 1 and (M i 1 ) 1 mi are precomputed to reduce the processing time. The proposed algorithm is illustrated in Example 3.2 as follows. Example 3.2. Given a set of relatively prime moduli {m 1, m 2, m 3, m 4 } = {11, 13, 17, 19} and a general modulus k = 8, find X satisfying X/11 = 7 mod 8, X/13 = 6 mod 8, X/17 = 5 mod 8, and X/19 = 4 mod 8. According to the proposed algorithm, X is obtained by three rounds shown as follows. Round 1 (i = 2): 1. M 2 = M 1 m 2 = m 1 m 2 = 143, X 1 = x 1 m 1 = 7 11 = X 2 =k M 1 ( x 2 m 2 X 1 )/k (M 1 ) 1 m2 + X 1

5 GENERALIZED ARYABHATA REMAINDER THEOREM 1869 =8 11 ( )/8 (11) = =605. Round 2 (i = 3): 1. M 3 = M 2 m 3 = m 1 m 2 m 3 = X 3 =k M 2 ( x 3 m 3 X 2 )/k (M 2 ) 1 m3 + X 2 =8 143 ( )/8 (143) = = Round 3 (i = 4): 1. M 4 = M 3 m 4 = m 1 m 2 m 3 m 4 = X 4 =k M 3 ( x 4 m 4 X 3 )/k (M 3 ) 1 m4 + X 3 = ( )/8 (2431) = = /11 mod 8 = 7, /13 mod 8 = 6, /17 mod 8 = 5, and /19 mod 8 = 4 verify the correctness of the solution. 4. Performance Analysis. This section analyzes the time complexities of GCRT and GART. Suppose that the number of moduli is n. According to Subsection 2.2, GART computes the equation X km = n i=0 m i a i b i km, where M = n i=1 m i, m i = k n j=1,j i m j, m i a i = k kmi, and b i = x i m i /k. Here, k M and m i a i can be precomputed. Therefore, it requires 2n multiplications, n divisions, (n 1) additions, and one modular operation. To analyze the computation complexity, each modulus m i is assumed to be about t digits. For simplicity, k is also assigned to be t digits. Therefore, the addition and multiplication of two moduli need t and t 2 bit operations, respectively. Then, the computation cost of division is the same with that of multiplication. In addition, performing a modular operation with t-bit modulus costs t 2 bit operations. Thus, the total computation cost of GCRT is about 3n t 2 + (n 1) t + ((n + 1) t) 2 bit operations, where (n + 1) t is the number of digits in k M. Finally, the time complexity of CRT is O(n 2 t 2 ). According to the proposed GART with n moduli, X i = k M i 1 ( x i m i X i 1 /k ) M i 1 1 mi + X i 1 (3) is computed in each round, where M 1 = m 1, X 1 = x 1 m 1, i = 2, 3,, n, and M i = M i 1 m i. Thus, it requires two multiplications, one subtraction, one division, and one modular operation in each round. Here, k M i 1 (M i 1 ) 1 mi can be precomputed. Therefore, the total computation cost is (n 1) (2t 2 + t 2 + 2t), where (n 1) is the number of execution rounds. Finally, the time complexity of the proposed GART is O(n t 2 ). Compared with GCRT, the proposed GART greatly reduces the computation time. 5. Conclusions. This research proposes an efficient GART without large modular arithmetic and further extends the proposed GART to the n-modulus system. According to the performance analysis in Section 4, the proposed GART significantly reduces the computational complexity in O(n t 2 ). In the future, research needs to offer and investigate the parallel algorithm for the proposed GART on a multi-processor architecture to make the method more efficient in practice. REFERENCES [1] N. B. Chakraborti, J. S. Soundararajan and A. L. Reddy, An implementation of mixed-radix conversion for residue number applications, IEEE Transactions on Computers, vol.35, no.8, pp , 1986.

6 1870 C.-C. CHANG, J.-S. YEH AND J.-H. YANG [2] C. C. Chang and C. H. Lin, A reciprocal confluence tree unit and its applications, BIT, vol.30, no.1, pp.27-33, [3] R. Conway and J. Nelson, Fast converter for 3 moduli RNS using new property of CRT, IEEE Transactions on Computers, vol.48, no.8, pp , [4] A. A. Hiasat and H. S. Abdel-Aty-Zohdy, Residue-to-binary arithmetic converter for the moduli set (2 k, 2 k 1, 2 k 1 1), IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.45, no.2, pp , [5] A. A. Hiasat, Efficient residue to binary converter, IEE Proc. on Computers and Digital Techniques, vol.150, no.1, pp.11-16, [6] Y. P. Lai and C. C. Chang, A parallel computational algorithms for generalized Chinese remainder theorem, Computers and Electrical Engineering, vol.29, no.8, pp , [7] A. Premkumar, An RNS to binary converter in 2n+1, 2n, 2n-1 moduli set, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.7, pp , [8] T. R. N. Rao and C. H. Yang, Aryabhata remainder theorem: Relevance to public-key cryptoalgorithms, Circuits, Systems, and Signal Processing, vol.25, no.1, pp.1-15, [9] N. Szabo and R. Tanaka, Residue Arithmetic and Its Applications to Computer Technology, McGraw Hill, New York, [10] Q. She, H. Su, L. Dong and J. Chu, Support vector machine with adaptive parameters in image coding, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp , [11] Y. Wang, Residue-to-binary converters based on new Chinese remainder theorem, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.47, no.3, pp , [12] W. Wang, M. N. S. Swamy, M. O. Ahmad and Y. Wang, A study of the residue-to-binary converters for the three-moduli sets, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol.50, no.2, pp , [13] Z. Zhang and Y. Zhao, Multiple description image coding based on fractal, International Journal of Innovative Computing, Information and Control, vol.3, no.6(b), pp , Appendixes. Lemma 5.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given q 1 = X mod (k m 1 ) and q 2 = X mod (k m 2 ) satisfying q 2 q 1 = 0 mod k, then X has a unique solution in Z km1 m 2 computed by X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1. Proof: First we show that X Z km1 m 2. Since q 1 = X mod (k m 1 ), we have q 1 < k m 1. Thus, X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1 < k m 1 ( (q 2 q 1 )/k m 1 1 m2 + 1). Besides, (q 2 q 1 )/k m 1 1 m2 Z m2, it implies 0 (q 2 q 1 )/k m 1 1 m2 m 2 1. Therefore, we have 0 X < k m 1 m 2, so that X Z km1 m 2. Second, we show that q i = X mod (k m i ) for i = 1 and 2. Clearly, q 1 = X mod (k m 1 ) holds because k m 1 (q 2 q 1 )/k m 1 1 m2 is a multiple of k m 1. On the other hand, since q 2 q 1 = 0 mod k, so (q 2 q 1 )/k is an integer. It is clear to have m 1 (q 2 q 1 )/k m 1 1 m2 = (q 2 q 1 )/k mod m 2. By multiplying k to the equation, we have k m 1 (q 2 q 1 )/k m 1 1 m2 = k (q 2 q 1 )/k = (q 2 q 1 ) mod (k m 2 ). Therefore, X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1 = q 2 mod (k m 2 ). Third, we show that X has a unique solution in Z km1 m 2. If Y Z km1 m 2 is another solution, then X Y = 0 mod (k m 1 ) and X Y = 0 mod (k m 2 ). Because m 1 and m 2 are two relatively prime moduli, X Y = 0 mod (k m 1 m 2 ). Therefore, we have X = Y. Theorem 5.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations X/m 1 = x 1 mod k and X/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }. For any pair (r 1, r 2 ) satisfying 0 r 1 < m 1, 0 r 2 < m 2, and x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k, X has a solution in Z km1 m 2 given by X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1.

7 GENERALIZED ARYABHATA REMAINDER THEOREM 1871 Proof: Since X/m 1 = x 1 mod k and X/m 2 = x 2 mod k, we assume X/m 1 = a 1 k + x 1 and X/m 2 = a 2 k + x 2, for some integers a 1 and a 2. Moreover, X = (a 1 k + x 1 ) m 1 + r 1 and X = (a 2 k + x 2 ) m 2 + r 2, where 0 r 1 < m 1 and 0 r 2 < m 2. That is, X = x i m i + r i mod (k m i ) for i = 1 and 2. By Lemma 5.1, X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1 is a unique solution in Z km1 m 2 if x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k. The theorem is asserted.

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 }

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 } An Effective New CRT Based Reverse Converter for a Novel Moduli Set +1 1, +1, 1 } Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade Department of Computer Science, Faculty of Mathematical Sciences, University

More information

Computer Architecture 10. Residue Number Systems

Computer Architecture 10. Residue Number Systems Computer Architecture 10 Residue Number Systems Ma d e wi t h Op e n Of f i c e. o r g 1 A Puzzle What number has the reminders 2, 3 and 2 when divided by the numbers 7, 5 and 3? x mod 7 = 2 x mod 5 =

More information

A High-Speed Realization of Chinese Remainder Theorem

A High-Speed Realization of Chinese Remainder Theorem Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, January 17-19, 2007 97 A High-Speed Realization of Chinese Remainder Theorem Shuangching

More information

A fast modular multiplication algorithm for calculating the product AB modulo N

A fast modular multiplication algorithm for calculating the product AB modulo N Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,

More information

On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli

On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli Behrooz Parhami Department of Electrical and Computer Engineering University of California Santa Barbara, CA 93106-9560,

More information

Volume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at

Volume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at Volume 3, No 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at wwwjgrcsinfo A NOVEL HIGH DYNAMIC RANGE 5-MODULUS SET WHIT EFFICIENT REVERSE CONVERTER AND

More information

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Residue Number Systems Ivor Page 1

Residue Number Systems Ivor Page 1 Residue Number Systems 1 Residue Number Systems Ivor Page 1 7.1 Arithmetic in a modulus system The great speed of arithmetic in Residue Number Systems (RNS) comes from a simple theorem from number theory:

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n,

Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n, Regular Paper Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n, 2 n +1) Shuangching Chen and Shugang Wei

More information

ARYABHATA REMAINDER THEOREM: RELEVANCE TO PUBLIC-KEY CRYPTO-ALGORITHMS*

ARYABHATA REMAINDER THEOREM: RELEVANCE TO PUBLIC-KEY CRYPTO-ALGORITHMS* CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2006) VOL. 25, NO. 1, 2006, PP. 1 15 DOI: 10.1007/s00034-005-1123-6 ARYABHATA REMAINDER THEOREM: RELEVANCE TO PUBLIC-KEY CRYPTO-ALGORITHMS* T. R.

More information

Notes on Systems of Linear Congruences

Notes on Systems of Linear Congruences MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the

More information

assume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p

assume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p Montgomery Modular Multiplication in Residue Arithmetic Jean-Claude Bajard LIRMM Montpellier, France bajardlirmm.fr Laurent-Stephane Didier Universite de Bretagne Occidentale Brest, France laurent-stephane.didieruniv-brest.fr

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

Numbers. Çetin Kaya Koç Winter / 18

Numbers. Çetin Kaya Koç   Winter / 18 Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 18 Number Systems and Sets We represent the set of integers as Z = {..., 3, 2, 1,0,1,2,3,...} We denote the set of positive integers modulo n as

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient

More information

Aryabhata Remainder Theorem: Relevance to public-key crypto algorithms

Aryabhata Remainder Theorem: Relevance to public-key crypto algorithms All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript have been printed and distributed without reviewing and editing as received from the authors: posting the

More information

CHAPTER 3. Congruences. Congruence: definitions and properties

CHAPTER 3. Congruences. Congruence: definitions and properties CHAPTER 3 Congruences Part V of PJE Congruence: definitions and properties Definition. (PJE definition 19.1.1) Let m > 0 be an integer. Integers a and b are congruent modulo m if m divides a b. We write

More information

3 The fundamentals: Algorithms, the integers, and matrices

3 The fundamentals: Algorithms, the integers, and matrices 3 The fundamentals: Algorithms, the integers, and matrices 3.4 The integers and division This section introduces the basics of number theory number theory is the part of mathematics involving integers

More information

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA. GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES DESIGN OF A QUINARY TO RESIDUE NUMBER SYSTEM CONVERTER USING MULTI-LEVELS OF CONVERSION Hassan Amin Osseily Electrical and Electronics Department,

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

MTH 346: The Chinese Remainder Theorem

MTH 346: The Chinese Remainder Theorem MTH 346: The Chinese Remainder Theorem March 3, 2014 1 Introduction In this lab we are studying the Chinese Remainder Theorem. We are going to study how to solve two congruences, find what conditions are

More information

Optimization of new Chinese Remainder theorems using special moduli sets

Optimization of new Chinese Remainder theorems using special moduli sets Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State

More information

4 Number Theory and Cryptography

4 Number Theory and Cryptography 4 Number Theory and Cryptography 4.1 Divisibility and Modular Arithmetic This section introduces the basics of number theory number theory is the part of mathematics involving integers and their properties.

More information

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory. CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,

More information

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS 1. The Chinese Remainder Theorem We now seek to analyse the solubility of congruences by reinterpreting their solutions modulo a composite

More information

Carmen s Core Concepts (Math 135)

Carmen s Core Concepts (Math 135) Carmen s Core Concepts (Math 135) Carmen Bruni University of Waterloo Week 8 1 The following are equivalent (TFAE) 2 Inverses 3 More on Multiplicative Inverses 4 Linear Congruence Theorem 2 [LCT2] 5 Fermat

More information

COMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635

COMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635 COMP239: Mathematics for Computer Science II Prof. Chadi Assi assi@ciise.concordia.ca EV7.635 The Euclidean Algorithm The Euclidean Algorithm Finding the GCD of two numbers using prime factorization is

More information

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System G.Suresh, G.Indira Devi, P.Pavankumar Abstract The use of the improved table look up Residue Number System

More information

Mathematics of Cryptography

Mathematics of Cryptography UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms

More information

Number Theory Proof Portfolio

Number Theory Proof Portfolio Number Theory Proof Portfolio Jordan Rock May 12, 2015 This portfolio is a collection of Number Theory proofs and problems done by Jordan Rock in the Spring of 2014. The problems are organized first by

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem The Chinese Remainder Theorem R. C. Daileda February 19, 2018 1 The Chinese Remainder Theorem We begin with an example. Example 1. Consider the system of simultaneous congruences x 3 (mod 5), x 2 (mod

More information

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II CS 5319 Advanced Discrete Structure Lecture 9: Introduction to Number Theory II Divisibility Outline Greatest Common Divisor Fundamental Theorem of Arithmetic Modular Arithmetic Euler Phi Function RSA

More information

A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form (2 n (2 p ± 1))

A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form (2 n (2 p ± 1)) The Computer Journal, 47(1), The British Computer Society; all rights reserved A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form ( n ( p ± 1)) Ahmad A. Hiasat Electronics Engineering

More information

THE CUBIC PUBLIC-KEY TRANSFORMATION*

THE CUBIC PUBLIC-KEY TRANSFORMATION* CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2007) VOL. 26, NO. 3, 2007, PP. 353 359 DOI: 10.1007/s00034-006-0309-x THE CUBIC PUBLIC-KEY TRANSFORMATION* Subhash Kak 1 Abstract. This note proposes

More information

Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)

Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5) CSE 54 Discrete Mathematics & Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices Integers & Algorithms (Section 2.5) by Kenneth H. Rosen, Discrete Mathematics & its Applications,

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the

More information

Residue Number Systems. Alternative number representations. TSTE 8 Digital Arithmetic Seminar 2. Residue Number Systems.

Residue Number Systems. Alternative number representations. TSTE 8 Digital Arithmetic Seminar 2. Residue Number Systems. TSTE8 Digital Arithmetic Seminar Oscar Gustafsson The idea is to use the residues of the numbers and perform operations on the residues Also called modular arithmetic since the residues are computed using

More information

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute

More information

On the Complexity of Error Detection Functions for Redundant Residue Number Systems

On the Complexity of Error Detection Functions for Redundant Residue Number Systems On the Complexity of Error Detection Functions for Redundant Residue Number Systems Tsutomu Sasao 1 and Yukihiro Iguchi 2 1 Dept. of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka

More information

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time. 8 Modular Arithmetic We introduce an operator mod. Let d be a positive integer. For c a nonnegative integer, the value c mod d is the remainder when c is divided by d. For example, c mod d = 0 if and only

More information

2WF15 - Discrete Mathematics 2 - Part 1. Algorithmic Number Theory

2WF15 - Discrete Mathematics 2 - Part 1. Algorithmic Number Theory 1 2WF15 - Discrete Mathematics 2 - Part 1 Algorithmic Number Theory Benne de Weger version 0.54, March 6, 2012 version 0.54, March 6, 2012 2WF15 - Discrete Mathematics 2 - Part 1 2 2WF15 - Discrete Mathematics

More information

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer. CHAPTER 2 INTRODUCTION TO NUMBER THEORY ANSWERS TO QUESTIONS 2.1 A nonzero b is a divisor of a if a = mb for some m, where a, b, and m are integers. That is, b is a divisor of a if there is no remainder

More information

CIS 6930/4930 Computer and Network Security. Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography

CIS 6930/4930 Computer and Network Security. Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography CIS 6930/4930 Computer and Network Security Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography 1 Review of Modular Arithmetic 2 Remainders and Congruency For any integer a and any positive

More information

AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI

AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI G.CHANDANA 1 (M.TECH),chandana.g89@gmail.com P.RAJINI 2 (M.TECH),paddam.rajani@gmail.com Abstract Efficient modular adders and subtractors for

More information

Elementary Number Theory. Franz Luef

Elementary Number Theory. Franz Luef Elementary Number Theory Congruences Modular Arithmetic Congruence The notion of congruence allows one to treat remainders in a systematic manner. For each positive integer greater than 1 there is an arithmetic

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives

[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives [Part 2] Asymmetric-Key Encipherment Mathematics of Cryptography Forouzan, B.A. Cryptography and Network Security (International Edition). United States: McGraw Hill, 2008. Objectives To introduce prime

More information

CSE 20: Discrete Mathematics

CSE 20: Discrete Mathematics Spring 2018 Summary So far: Today: Logic and proofs Divisibility, modular arithmetics Number Systems More logic definitions and proofs Reading: All of Chap. 1 + Chap 4.1, 4.2. Divisibility P = 5 divides

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

Fast Fraction-Integer Method for Computing Multiplicative Inverse

Fast Fraction-Integer Method for Computing Multiplicative Inverse Fast Fraction-Integer Method for Computing Multiplicative Inverse Hani M AL-Matari 1 and Sattar J Aboud 2 and Nidal F Shilbayeh 1 1 Middle East University for Graduate Studies, Faculty of IT, Jordan-Amman

More information

4. Congruence Classes

4. Congruence Classes 4 Congruence Classes Definition (p21) The congruence class mod m of a Z is Example With m = 3 we have Theorem For a b Z Proof p22 = {b Z : b a mod m} [0] 3 = { 6 3 0 3 6 } [1] 3 = { 2 1 4 7 } [2] 3 = {

More information

CRC Press has granted the following specific permissions for the electronic version of this book:

CRC Press has granted the following specific permissions for the electronic version of this book: This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem Chapter 5 The Chinese Remainder Theorem 5.1 Coprime moduli Theorem 5.1. Suppose m, n N, and gcd(m, n) = 1. Given any remainders r mod m and s mod n we can find N such that N r mod m and N s mod n. Moreover,

More information

Integers and Division

Integers and Division Integers and Division Notations Z: set of integers N : set of natural numbers R: set of real numbers Z + : set of positive integers Some elements of number theory are needed in: Data structures, Random

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element. The first exam will be on Monday, June 8, 202. The syllabus will be sections. and.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive squaring

More information

MATH Dr. Halimah Alshehri Dr. Halimah Alshehri

MATH Dr. Halimah Alshehri Dr. Halimah Alshehri MATH 1101 haalshehri@ksu.edu.sa 1 Introduction To Number Systems First Section: Binary System Second Section: Octal Number System Third Section: Hexadecimal System 2 Binary System 3 Binary System The binary

More information

Mathematics of Cryptography

Mathematics of Cryptography Modulo arithmetic Fermat's Little Theorem If p is prime and 0 < a < p, then a p 1 = 1 mod p Ex: 3 (5 1) = 81 = 1 mod 5 36 (29 1) = 37711171281396032013366321198900157303750656 = 1 mod 29 (see http://gauss.ececs.uc.edu/courses/c472/java/fermat/fermat.html)

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

Power Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography.

Power Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography. Power Consumption Analysis General principle: measure the current I in the circuit Arithmetic Level Countermeasures for ECC Coprocessor Arnaud Tisserand, Thomas Chabrier, Danuta Pamula I V DD circuit traces

More information

Modular Arithmetic Instructor: Marizza Bailey Name:

Modular Arithmetic Instructor: Marizza Bailey Name: Modular Arithmetic Instructor: Marizza Bailey Name: 1. Introduction to Modular Arithmetic If someone asks you what day it is 145 days from now, what would you answer? Would you count 145 days, or find

More information

MATH 2112/CSCI 2112, Discrete Structures I Winter 2007 Toby Kenney Homework Sheet 5 Hints & Model Solutions

MATH 2112/CSCI 2112, Discrete Structures I Winter 2007 Toby Kenney Homework Sheet 5 Hints & Model Solutions MATH 11/CSCI 11, Discrete Structures I Winter 007 Toby Kenney Homework Sheet 5 Hints & Model Solutions Sheet 4 5 Define the repeat of a positive integer as the number obtained by writing it twice in a

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory

More information

Topics in Cryptography. Lecture 5: Basic Number Theory

Topics in Cryptography. Lecture 5: Basic Number Theory Topics in Cryptography Lecture 5: Basic Number Theory Benny Pinkas page 1 1 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem: generating

More information

Perfect Power Riesel Numbers

Perfect Power Riesel Numbers Perfect Power Riesel Numbers Carrie Finch a, Lenny Jones b a Mathematics Department, Washington and Lee University, Lexington, VA 24450 b Department of Mathematics, Shippensburg University, Shippensburg,

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Introduction to Cryptography. Lecture 6

Introduction to Cryptography. Lecture 6 Introduction to Cryptography Lecture 6 Benny Pinkas page 1 Public Key Encryption page 2 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem:

More information

Modular Reduction without Pre-Computation for Special Moduli

Modular Reduction without Pre-Computation for Special Moduli Modular Reduction without Pre-Computation for Special Moduli Tolga Acar and Dan Shumow Extreme Computing Group, Microsoft Research, Microsoft One Microsoft Way, Redmond, WA 98052, USA {tolga,danshu}@microsoft.com

More information

Algorithms CMSC Basic algorithms in Number Theory: Euclid s algorithm and multiplicative inverse

Algorithms CMSC Basic algorithms in Number Theory: Euclid s algorithm and multiplicative inverse Algorithms CMSC-27200 Basic algorithms in Number Theory: Euclid s algorithm and multiplicative inverse Instructor: László Babai Last updated 02-14-2015. Z denotes the set of integers. All variables in

More information

RSA Implementation. Oregon State University

RSA Implementation. Oregon State University RSA Implementation Çetin Kaya Koç Oregon State University 1 Contents: Exponentiation heuristics Multiplication algorithms Computation of GCD and Inverse Chinese remainder algorithm Primality testing 2

More information

The Fundamental Theorem of Arithmetic

The Fundamental Theorem of Arithmetic Chapter 1 The Fundamental Theorem of Arithmetic 1.1 Primes Definition 1.1. We say that p N is prime if it has just two factors in N, 1 and p itself. Number theory might be described as the study of the

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

Lecture 7 Number Theory Euiseong Seo

Lecture 7 Number Theory Euiseong Seo Lecture 7 Number Theory Euiseong Seo (euiseong@skku.edu) 1 Number Theory God created the integers. All else is the work of man Leopold Kronecker Study of the property of the integers Specifically, integer

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Lecture 5: Number Theory 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Information and Communications University Contents 1. Number Theory Divisibility

More information

Chinese Remainder Theorem

Chinese Remainder Theorem Chinese Remainder Theorem Theorem Let R be a Euclidean domain with m 1, m 2,..., m k R. If gcd(m i, m j ) = 1 for 1 i < j k then m = m 1 m 2 m k = lcm(m 1, m 2,..., m k ) and R/m = R/m 1 R/m 2 R/m k ;

More information

Solutions to Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00

Solutions to Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00 Solutions to 18.781 Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00 1. (Niven 2.3.3) Solve the congruences x 1 (mod 4), x 0 (mod 3), x 5 (mod 7). First we note that 4, 3, and 7 are pairwise relatively

More information

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162 COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication

More information

Chapter 1: Solutions to Exercises

Chapter 1: Solutions to Exercises 1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier, c 2004 Exercise 1.1 (a) 1. 9 bits since 2 8 297 2 9 2. 3 radix-8 digits since 8 2 297 8 3 3. 3

More information

Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems

Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems J Sign Process Syst DOI 10.1007/s11265-008-0249-8 Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems Andreas Persson Lars Bengtsson Received: 8 March 2007 /

More information

7.2 Applications of Euler s and Fermat s Theorem.

7.2 Applications of Euler s and Fermat s Theorem. 7.2 Applications of Euler s and Fermat s Theorem. i) Finding and using inverses. From Fermat s Little Theorem we see that if p is prime and p a then a p 1 1 mod p, or equivalently a p 2 a 1 mod p. This

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

ECE596C: Handout #11

ECE596C: Handout #11 ECE596C: Handout #11 Public Key Cryptosystems Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract In this lecture we introduce necessary mathematical background for studying

More information

Information encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets

Information encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets Information encoding and decoding using Residue Number System for {2-1, 2, 2 +1} moduli sets Idris Abiodun Aremu Kazeem Alagbe Gbolagade Abstract- This paper presents the design methods of information

More information

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p.

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p. Chapter 6 Prime Numbers Part VI of PJE. Definition and Fundamental Results Definition. (PJE definition 23.1.1) An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p. If n > 1

More information

The security of RSA (part 1) The security of RSA (part 1)

The security of RSA (part 1) The security of RSA (part 1) The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

Wilson s Theorem and Fermat s Little Theorem

Wilson s Theorem and Fermat s Little Theorem Wilson s Theorem and Fermat s Little Theorem Wilson stheorem THEOREM 1 (Wilson s Theorem): (p 1)! 1 (mod p) if and only if p is prime. EXAMPLE: We have (2 1)!+1 = 2 (3 1)!+1 = 3 (4 1)!+1 = 7 (5 1)!+1 =

More information

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises

More information

Math 131 notes. Jason Riedy. 6 October, Linear Diophantine equations : Likely delayed 6

Math 131 notes. Jason Riedy. 6 October, Linear Diophantine equations : Likely delayed 6 Math 131 notes Jason Riedy 6 October, 2008 Contents 1 Modular arithmetic 2 2 Divisibility rules 3 3 Greatest common divisor 4 4 Least common multiple 4 5 Euclidean GCD algorithm 5 6 Linear Diophantine

More information

How does the computer generate observations from various distributions specified after input analysis?

How does the computer generate observations from various distributions specified after input analysis? 1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.

More information

Faster arithmetic for number-theoretic transforms

Faster arithmetic for number-theoretic transforms University of New South Wales 7th October 2011, Macquarie University Plan for talk 1. Review number-theoretic transform (NTT) 2. Discuss typical butterfly algorithm 3. Improvements to butterfly algorithm

More information

CSE 20 DISCRETE MATH. Winter

CSE 20 DISCRETE MATH. Winter CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Today's learning goals Determine whether a relation is an equivalence relation by determining whether it is Reflexive Symmetric

More information

For your quiz in recitation this week, refer to these exercise generators:

For your quiz in recitation this week, refer to these exercise generators: Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD

More information