Presentation is loading. Please wait.

Presentation is loading. Please wait.

L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.

Similar presentations


Presentation on theme: "L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating."— Presentation transcript:

1 L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating modulo N, i.e. m e mod N. We want to find a different exponent d based on e and N which will give us back m, i.e. we want m de mod N =m. In other words, we want an exponential inverse for e modulo N.

2 L132 Exponential Inverses. Prime Modulii To tackle the general problem, start first with the case of N a prime number. Exponentiation modulo a prime number is well understood. EG: Consider exponentiating 3 modulo 7: 1. 3 1 mod 7 = 3 2. 3 2 mod 7 = 2 3. 3 3 mod 7 = 6 4. 3 4 mod 7 = 4 5. 3 5 mod 7 = 5 6. 3 6 mod 7 = 1 7. 3 7 mod 7 = 3 8. 3 8 mod 7 = 2 9. 3 9 mod 7 = 6 10. 3 10 mod 7 = 4 11. 3 11 mod 7 = 5 12. 3 12 mod 7 = 1

3 L133 Exponential Inverses. Prime Modulii Exponentiating to the p -1 power results in 1. Therefore, any further exponentiation results in a cycling, with repetitions occurring every 6 exponentiations. Fermat’s Little Theorem says that this effect happens for all rel-prime numbers under prime modulus: 1. 3 1 mod 7 = 3 2. 3 2 mod 7 = 2 3. 3 3 mod 7 = 6 4. 3 4 mod 7 = 4 5. 3 5 mod 7 = 5 6. 3 6 mod 7 = 1 7. 3 7 mod 7 = 3 8. 3 8 mod 7 = 2 9. 3 9 mod 7 = 6 10. 3 10 mod 7 = 4 11. 3 11 mod 7 = 5 12. 3 12 mod 7 = 1

4 L134 Fermat’s Little Theorem THM (F L T): Suppose that p is a prime number. If a is not divisible by p then a p  1  1 (mod p). Furthermore, all numbers satisfy a p  a (mod p). EG: Compute 9 100 mod 17: p =17, so p-1 = 16. 100 = 6·16+4. Therefore, 9 100 =9 6·16+4 =(9 16 ) 6 (9) 4. So mod 17 we have 9 100  (9 16 ) 6 (9) 4 (mod 17)  (1) 6 (9) 4 (mod 17)  (81) 2 (mod 17)  (-4) 2 (mod 17)  16

5 L135 Exponential Inverses. Prime Modulii COR: If e is relatively prime to p –1, where p is prime, then its exponential inverse modulo p exists and is the inverse of d modulo p-1. Proof. Supposing de  1 (mod p-1). Then for some k, de = 1+k (p-1). So if a is any number not divisible by p, F L T implies: a de  a 1+k(p-1) (mod p)  a (mod p) In other words, exponentiating by de doesn’t change numbers, modulo p, so by definition, d and e are exponential inverses. 

6 L136 Exponential Inverses. Prime Modulii EG: Find the exponential inverse of 3 modulo 11. p =11, so p-1 = 10. The inverse of 3 modulo 10 is 7, which is the answer.


Download ppt "L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating."

Similar presentations


Ads by Google