Skip to main content
  • 213 Accesses

Related Concepts

Euler’s Totient Function; Integer Factoring; Modular Arithmetic; Number Theory; Quadratic Residue; RSA Problem

Definition

In the congruence \({x}^{e} \equiv y{\rm mod}\,\,n\), x is said to be the \({e}^{\mathrm{th}}\) modular root of y with respect to modulus n.

Background

The cases that are of interest to cryptography have gcd(x, n) = gcd(y, n) = 1. Algorithms for finding modular roots are relevant to the security of the RSA cryptosystem.

Theory

Computing modular roots is no more difficult than finding the order of the multiplicative group modulo n. In number theoretic terminology, this value is known as Euler’s totient function, \(\phi (n)\), which is defined to be the number of integers in {1, 2, …, n − 1} that are relatively prime to n. If \(\gcd (e,\phi (n)) = 1\), then there is either one or zero solutions, depending upon whether y is in the multiplicative subgroup generated by x. Assuming it is, the solution is obtained by raising both sides of the congruence...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Contini, S. (2011). Modular Root. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_462

Download citation

Publish with us

Policies and ethics