Chapter 1: Q24E (page 49)
If p is prime, how many elements of have an inverse modulo ?
Short Answer
The total number of inverses is .
Chapter 1: Q24E (page 49)
If p is prime, how many elements of have an inverse modulo ?
The total number of inverses is .
All the tools & learning materials you need for study success - in one app.
Get started for freeGive a polynomial-time algorithm for computing, given a,b,c, and prime p.
Consider the problem of computing .
(a) If is an role="math" localid="1658397956489" -bit number, how many bits long is , approximately ( form)?
(b) Give an algorithm to compute and analyze its running time.
1.38. To see if a number, say , is divisible by , you just add up the digits of its decimalrepresentation, and see if the result is divisible by role="math" localid="1658402816137" .
( , so it is not divisible by ).
To see if the same number is divisible by , you can do this: subdivide the number into pairs ofdigits, from the right-hand end , add these numbers and see if the sum is divisible by (if it's too big, repeat).
How about ? To see if the number is divisible by , subdivide it into triples from the end add these up, and see if the sum is divisible by .
This is true for any prime other than and . That is, for any prime , there is an integer such that in order to see if divides a decimal number , we break into -tuples of decimal digits (starting from the right-hand end), add up these -tuples, and check if the sum is divisible by .
(a) What is the smallest such for ? For ?
(b) Show that is a divisor of .
1.36. Square roots. In this problem, we'll see that it is easy to compute square roots modulo a prime pwith .
(a) Suppose . Show that is an integer.
(b) We say x is a square root of a modulo p if . Show that if and if a has a square root modulo p, then is such a square root.
Suppose that instead of using a compositein the RSA cryptosystem (Figure 1.9), we simply use a prime modulus p . As in RSA, we would have an encryption exponent e, and the encryption of a message would be Prove that this new cryptosystem is not secure, by giving an efficient algorithm to decrypt: that is, an algorithm that given and as input, computes . Justify the correctness and analyze the running time of your decryption algorithm.
What do you think about this solution?
We value your feedback to improve our textbook solutions.