Sunday, March 19, 2023
HomeBitcoingrowth - What's the step-by-step algorithmic course of to search out the...

growth – What’s the step-by-step algorithmic course of to search out the modular multiplicative inverse of (n-1) mod np, the place (n-1) and np should not coprime?


Having perused the stackexchange, I discovered some comparable questions, however am having problem understanding easy methods to arrive on the answer to (n-1)*x=1 mod np, the place:

n: Finite group order of the Bitcoin secp256k1 curve

n=115792089237316195423570985008687907852837564279074904382605163141518161494337

p: Prime order of the curve

p=115792089237316195423570985008687907853269984665640564039457584007908834671663

np: (n-1)+(p-1)

np=231584178474632390847141970017375815706107548944715468422062747149426996165998

and (n-1) shouldn’t be coprime to modulo np.

Having carried out the next step of np/2 and including .5 to consequence one, in order to attain:

F1=115792089237316195423570985008687907853053774472357734211031373574713498083000

Then subtracting the preliminary consequence with .5 to attain:

F2=115792089237316195423570985008687907853053774472357734211031373574713498082999

And following directions from solutions to associated posts, (n-1) is to be multiplicativeley inversed over mod F1 and F2. Nonetheless, neither F1 or F2 are coprime to (n-1). With the intention to overcome this, it’s defined that GCD and CRT are for use as a way to precisely calculate the modular inverse.

What steps are required and the way are the operations carried out to perform this?

Thanks.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments