Related Concepts
Definition
In the congruence \({x}^{e} \equiv y{\rm mod}\,\,n\), x is said to be the \({e}^{\mathrm{th}}\) modular root of y with respect to modulus n.
Background
The cases that are of interest to cryptography have gcd(x, n) = gcd(y, n) = 1. Algorithms for finding modular roots are relevant to the security of the RSA cryptosystem.
Theory
Computing modular roots is no more difficult than finding the order of the multiplicative group modulo n. In number theoretic terminology, this value is known as Euler’s totient function, \(\phi (n)\), which is defined to be the number of integers in {1, 2, …, n − 1} that are relatively prime to n. If \(\gcd (e,\phi (n)) = 1\), then there is either one or zero solutions, depending upon whether y is in the multiplicative subgroup generated by x. Assuming it is, the solution is obtained by raising both sides of the congruence...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Contini, S. (2011). Modular Root. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_462
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_462
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering