https://en.wikipedia.org/wiki/Modular_exponentiation
蒙哥马利(Montgomery)幂
模运算是快速计算a^b%k的一种算法,是
RSA加密算法的核心之一。
蒙哥马利模乘的优点在于减少了取模的次数(在大数的条件下)以及简化了
除法的复杂度(在2的k次幂的进制下除法仅需要进行左移操作)。模
幂运算是RSA 的核心算法,最直接地决定了RSA 算法的性能。
针对快速模幂运算这一课题,西方现代数学家提出了大量的解决方案,通常都是先将幂
模运算转化为乘模运算。
Modular exponentiation is a type of
exponentiation取幂,求幂;乘方 performed over a
modulus模数,系数.
It is useful in
computer science, especially in the field of
public-key cryptography.
The operation of modular exponentiation calculates the remainder when an integer
b 底数(the base) raised to the eth power (the exponent指数), be, is divided by a positive integer m (the modulus).
In symbols, given base b, exponent e, and modulus m, the modular exponentiation c is: c ≡ be (mod m). //c=b的e次方 %m
For example, given
b = 5, e = 3 and m = 13, the solution c = 8 is the remainder of dividing 53 = 125 by 13. //c=5^3%13=125%13 因为125=13*9+8 ,所以125对13求余,结果是8
Given integers
b and e, and a positive integer m, a unique solution c exists with the property 0 ≤ c < m.
Modular exponentiation can be performed with a
negative exponent
e by finding the modular multiplicative inverse d of b modulo m using the extended Euclidean algorithm. That is:
- c ≡ be ≡ d−e mod m where e < 0 and b ⋅ d ≡ 1 mod m.
Modular exponentiation similar to the one described above are considered easy to compute, even when the numbers involved are enormous巨大的.
On the other hand, computing the
discrete logarithm离散对数 – that is, the task of finding the exponent
e when given b, c, and m – is believed to be difficult.
This one-way function behavior makes modular exponentiation a candidate for use in cryptographic algorithms.