From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Modular_arithmetic
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" when reaching a certain value, called the modulus. The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his book Disquisitiones Arithmeticae, published in 1801.
A familiar use of modular arithmetic is in the 12-hour clock, in which the day is divided into two 12-hour periods. If the time is 7:00 now, then 8 hours later it will be 3:00. Simple addition would result in 7 + 8 = 15, but clocks "wrap around" every 12 hours. Because the hour number starts over at zero when it reaches 12, this is arithmetic modulo 12. In terms of the definition below, 15 is congruent to 3 modulo 12, so "15:00" on a 24-hour clock is displayed "3:00" on a 12-hour clock.
Congruence
Given an integer n > 1, called a modulus, two integers a and b are said to be congruent modulo n, if n is a divisor of their difference (that is, if there is an integer k such that a − b = kn).
Congruence modulo n is a congruence relation, meaning that it is an equivalence relation that is compatible with the operations of addition, subtraction, and multiplication. Congruence modulo n is denoted:
The parentheses mean that (mod n) applies to the entire equation, not just to the right-hand side (here, b). This notation is not to be confused with the notation b mod n (without parentheses), which refers to the modulo operation. Indeed, b mod n denotes the unique integer a such that 0 ≤ a < n and (that is, the remainder of when divided by ).
The congruence relation may be rewritten as
explicitly showing its relationship with Euclidean division. However, the b here need not be the remainder of the division of a by n. Instead, what the statement a ≡ b (mod n) asserts is that a and b have the same remainder when divided by n. That is,
where 0 ≤ r < n is the common remainder. Subtracting these two expressions, we recover the previous relation:
by setting k = p − q.
Examples
In modulus 12, one can assert that:
because 38 − 14 = 24, which is a multiple of 12. Another way to express this is to say that both 38 and 14 have the same remainder 2, when divided by 12.
The definition of congruence also applies to negative values. For example:
Basic properties
The congruence relation satisfies all the conditions of an equivalence relation:
- Reflexivity: a ≡ a (mod n)
- Symmetry: a ≡ b (mod n) if b ≡ a (mod n).
- Transitivity: If a ≡ b (mod n) and b ≡ c (mod n), then a ≡ c (mod n)
If a1 ≡ b1 (mod n) and a2 ≡ b2 (mod n), or if a ≡ b (mod n), then:
- a + k ≡ b + k (mod n) for any integer k (compatibility with translation)
- k a ≡ k b (mod n) for any integer k (compatibility with scaling)
- k a ≡ k b (mod kn) for any integer k
- a1 + a2 ≡ b1 + b2 (mod n) (compatibility with addition)
- a1 – a2 ≡ b1 – b2 (mod n) (compatibility with subtraction)
- a1 a2 ≡ b1 b2 (mod n) (compatibility with multiplication)
- ak ≡ bk (mod n) for any non-negative integer k (compatibility with exponentiation)
- p(a) ≡ p(b) (mod n), for any polynomial p(x) with integer coefficients (compatibility with polynomial evaluation)
If a ≡ b (mod n), then it is generally false that ka ≡ kb (mod n). However, the following is true:
- If c ≡ d (mod φ(n)), where φ is Euler's totient function, then ac ≡ ad (mod n)—provided that a is coprime with n.
For cancellation of common terms, we have the following rules:
- If a + k ≡ b + k (mod n), where k is any integer, then a ≡ b (mod n)
- If k a ≡ k b (mod n) and k is coprime with n, then a ≡ b (mod n)
- If k a ≡ k b (mod kn) and k ≠ 0, then a ≡ b (mod n)
The modular multiplicative inverse is defined by the following rules:
- Existence: there exists an integer denoted a–1 such that aa–1 ≡ 1 (mod n) if and only if a is coprime with n. This integer a–1 is called a modular multiplicative inverse of a modulo n.
- If a ≡ b (mod n) and a–1 exists, then a–1 ≡ b–1 (mod n) (compatibility with multiplicative inverse, and, if a = b, uniqueness modulo n)
- If a x ≡ b (mod n) and a is coprime to n, then the solution to this linear congruence is given by x ≡ a–1b (mod n)
The multiplicative inverse x ≡ a–1 (mod n) may be efficiently computed by solving Bézout's equation for —using the Extended Euclidean algorithm.
In particular, if p is a prime number, then a is coprime with p for every a such that 0 < a < p; thus a multiplicative inverse exists for all a that is not congruent to zero modulo p.
Advanced properties
Some of the more advanced properties of congruence relations are the following:
- Fermat's little theorem: If p is prime and does not divide a, then a p – 1 ≡ 1 (mod p).
- Euler's theorem: If a and n are coprime, then a φ(n) ≡ 1 (mod n), where φ is Euler's totient function
- A simple consequence of Fermat's little theorem is that if p is prime, then a−1 ≡ a p − 2 (mod p) is the multiplicative inverse of 0 < a < p. More generally, from Euler's theorem, if a and n are coprime, then a−1 ≡ a φ(n) − 1 (mod n).
- Another simple consequence is that if a ≡ b (mod φ(n)), where φ is Euler's totient function, then ka ≡ kb (mod n) provided k is coprime with n.
- Wilson's theorem: p is prime if and only if (p − 1)! ≡ −1 (mod p).
- Chinese remainder theorem: For any a, b and coprime m, n, there exists a unique x (mod mn) such that x ≡ a (mod m) and x ≡ b (mod n). In fact, x ≡ b mn–1 m + a nm–1 n (mod mn) where mn−1 is the inverse of m modulo n and nm−1 is the inverse of n modulo m.
- Lagrange's theorem: The congruence f (x) ≡ 0 (mod p), where p is prime, and f (x) = a0 xn + ... + an is a polynomial with integer coefficients such that a0 ≠ 0 (mod p), has at most n roots.
- Primitive root modulo n: A number g is a primitive root modulo n if, for every integer a coprime to n, there is an integer k such that gk ≡ a (mod n). A primitive root modulo n exists if and only if n is equal to 2, 4, pk or 2pk, where p is an odd prime number and k is a positive integer. If a primitive root modulo n exists, then there are exactly φ(φ(n)) such primitive roots, where φ is the Euler's totient function.
- Quadratic residue: An integer a is a quadratic residue modulo n, if there exists an integer x such that x2 ≡ a (mod n). Euler's criterion asserts that, if p is an odd prime, and a is not a multiple of p, then a is a quadratic residue modulo p if and only if
Congruence classes
The congruence relation is an equivalence relation. The equivalence class modulo n of an integer a is the set of all integers of the form where k is any integer. It is called the congruence class or residue class of a modulo n, and may be denoted as or as a or [a] when the modulus n is known from the context.
Each residue class modulo n contains exactly one integer in the range Thus, these n integers are representatives of their respective residue classes.
It is generally easier to work with integers than sets of integers; that is, the representatives most often considered, rather than their residue classes.
Consequently, denotes generally the unique integer k such that and it is called the residue of a modulo n.
In particular, is equivalent to and this explains why "=" is often used instead of "" in this context.
Residue systems
Each residue class modulo n may be represented by any one of its members, although we usually represent each residue class by the smallest nonnegative integer which belongs to that class[2] (since this is the proper remainder which results from division). Any two members of different residue classes modulo n are incongruent modulo n. Furthermore, every integer belongs to one and only one residue class modulo n.
The set of integers {0, 1, 2, ..., n − 1} is called the least residue system modulo n. Any set of n integers, no two of which are congruent modulo n, is called a complete residue system modulo n.
The least residue system is a complete residue system, and a complete residue system is simply a set containing precisely one representative of each residue class modulo n. For example, the least residue system modulo 4 is {0, 1, 2, 3}. Some other complete residue systems modulo 4 include:
- {1, 2, 3, 4}
- {13, 14, 15, 16}
- {−2, −1, 0, 1}
- {−13, 4, 17, 18}
- {−5, 0, 6, 21}
- {27, 32, 37, 42}
Some sets which are not complete residue systems modulo 4 are:
- {−5, 0, 6, 22}, since 6 is congruent to 22 modulo 4.
- {5, 15}, since a complete residue system modulo 4 must have exactly 4 incongruent residue classes.
Reduced residue systems
Given the Euler's totient function φ(n), any set of φ(n) integers that are relatively prime to n and mutually incongruent under modulus n is called a reduced residue system modulo n. The set {5,15} from above, for example, is an instance of a reduced residue system modulo 4.
Covering systems
Covering systems represent yet another type of residue system that may contain residues with varying moduli.
Integers modulo n
The set of all congruence classes of the integers for a modulus n is called the ring of integers modulo n, and is denoted , , or . The notation is, however, not recommended because it can be confused with the set of n-adic integers. The ring is fundamental to various branches of mathematics (see § Applications below).
The set is defined for n > 0 as:
(When n = 0, is not an empty set; rather, it is isomorphic to , since a0 = {a}.)
We define addition, subtraction, and multiplication on by the following rules:
The verification that this is a proper definition uses the properties given before.
In this way, becomes a commutative ring. For example, in the ring , we have
as in the arithmetic for the 24-hour clock.
We use the notation because this is the quotient ring of by the ideal , a set containing all integers divisible by n, where is the singleton set {0}. Thus is a field when is a maximal ideal (i.e., when n is prime).
This can also be constructed from the group under the addition operation alone. The residue class an is the group coset of a in the quotient group , a cyclic group.
Rather than excluding the special case n = 0, it is more useful to include (which, as mentioned before, is isomorphic to the ring of integers). In fact, this inclusion is useful when discussing the characteristic of a ring.
The ring of integers modulo n is a finite field if and only if n is prime (this ensures that every nonzero element has a multiplicative inverse). If is a prime power with k > 1, there exists a unique (up to isomorphism) finite field with n elements, but this is not , which fails to be a field because it has zero-divisors.
The multiplicative subgroup of integers modulo n is denoted by . This consists of (where a is coprime to n), which are precisely the classes possessing a multiplicative inverse. This forms a commutative group under multiplication, with order .
Extension to real numbers
Applications
In pure mathematics, modular arithmetic is one of the foundations of number theory, touching on almost every aspect of its study, and it is also used extensively in group theory, ring theory, knot theory, and abstract algebra. In applied mathematics, it is used in computer algebra, cryptography, computer science, chemistry and the visual and musical arts.
A very practical application is to calculate checksums within serial number identifiers. For example, International Standard Book Number (ISBN) uses modulo 11 (for 10 digit ISBN) or modulo 10 (for 13 digit ISBN) arithmetic for error detection. Likewise, International Bank Account Numbers (IBANs), for example, make use of modulo 97 arithmetic to spot user input errors in bank account numbers. In chemistry, the last digit of the CAS registry number (a unique identifying number for each chemical compound) is a check digit, which is calculated by taking the last digit of the first two parts of the CAS registry number times 1, the previous digit times 2, the previous digit times 3 etc., adding all these up and computing the sum modulo 10.
In cryptography, modular arithmetic directly underpins public key systems such as RSA and Diffie–Hellman, and provides finite fields which underlie elliptic curves, and is used in a variety of symmetric key algorithms including Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), and RC4. RSA and Diffie–Hellman use modular exponentiation.
In computer algebra, modular arithmetic is commonly used to limit the size of integer coefficients in intermediate calculations and data. It is used in polynomial factorization, a problem for which all known efficient algorithms use modular arithmetic. It is used by the most efficient implementations of polynomial greatest common divisor, exact linear algebra and Gröbner basis algorithms over the integers and the rational numbers. As posted on Fidonet in the 1980s and archived at Rosetta Code, modular arithmetic was used to disprove Euler's sum of powers conjecture on a Sinclair QL microcomputer using just one-fourth of the integer precision used by a CDC 6600 supercomputer to disprove it two decades earlier via a brute force search.
In computer science, modular arithmetic is often applied in bitwise operations and other operations involving fixed-width, cyclic data structures. The modulo operation, as implemented in many programming languages and calculators, is an application of modular arithmetic that is often used in this context. The logical operator XOR sums 2 bits, modulo 2.
In music, arithmetic modulo 12 is used in the consideration of the system of twelve-tone equal temperament, where octave and enharmonic equivalency occurs (that is, pitches in a 1:2 or 2:1 ratio are equivalent, and C-sharp is considered the same as D-flat).
The method of casting out nines offers a quick check of decimal arithmetic computations performed by hand. It is based on modular arithmetic modulo 9, and specifically on the crucial property that 10 ≡ 1 (mod 9).
Arithmetic modulo 7 is used in algorithms that determine the day of the week for a given date. In particular, Zeller's congruence and the Doomsday algorithm make heavy use of modulo-7 arithmetic.
More generally, modular arithmetic also has application in disciplines such as law (e.g., apportionment), economics (e.g., game theory) and other areas of the social sciences, where proportional division and allocation of resources plays a central part of the analysis.
Computational complexity
Since modular arithmetic has such a wide range of applications, it is important to know how hard it is to solve a system of congruences. A linear system of congruences can be solved in polynomial time with a form of Gaussian elimination, for details see linear congruence theorem. Algorithms, such as Montgomery reduction, also exist to allow simple arithmetic operations, such as multiplication and exponentiation modulo n, to be performed efficiently on large numbers.
Some operations, like finding a discrete logarithm or a quadratic congruence appear to be as hard as integer factorization and thus are a starting point for cryptographic algorithms and encryption. These problems might be NP-intermediate.
Solving a system of non-linear modular arithmetic equations is NP-complete.
Example implementations
Below are three reasonably fast C functions, two for performing modular multiplication and one for modular exponentiation on unsigned integers not larger than 63 bits, without overflow of the transient operations.
An algorithmic way to compute :
uint64_t mul_mod(uint64_t a, uint64_t b, uint64_t m) {
if (!((a | b) & (0xFFFFFFFFULL << 32))) return a * b % m;
uint64_t d = 0, mp2 = m >> 1;
int i;
if (a >= m) a %= m;
if (b >= m) b %= m;
for (i = 0; i < 64; ++i) {
d = (d > mp2) ? (d << 1) - m : d << 1;
if (a & 0x8000000000000000ULL) d += b;
if (d >= m) d -= m;
a <<= 1;
}
return d;
}
On computer architectures where an extended precision format with at least 64 bits of mantissa is available (such as the long double type of most x86 C compilers), the following routine is faster than a solution using a loop, by employing the trick that, by hardware, floating-point multiplication results in the most significant bits of the product kept, while integer multiplication results in the least significant bits kept:
uint64_t mul_mod(uint64_t a, uint64_t b, uint64_t m) {
long double x;
uint64_t c;
int64_t r;
if (a >= m) a %= m;
if (b >= m) b %= m;
x = a;
c = x * b / m;
r = (int64_t)(a * b - c * m) % (int64_t)m;
return r < 0 ? r + m : r;
}
Below is a C function for performing modular exponentiation, that uses the mul_mod function implemented above.
An algorithmic way to compute :
uint64_t pow_mod(uint64_t a, uint64_t b, uint64_t m) {
uint64_t r = m == 1 ? 0 : 1;
while (b > 0) {
if (b & 1) r = mul_mod(r, a, m);
b = b >> 1;
a = mul_mod(a, a, m);
}
return r;
}
However, for all above routines to work, m must not exceed 63 bits.