Recall The Standard Statement Of The Chinese Remainder Theorem

Improved Essays
The Quotient Ring Transform is an alternate encoding and decoding process developed by Dr. Anna
Johnston [5]. The utility of this error detection and correction process is that it is not dependent on a fixed set of primitive roots. Thus, a standard encryption procedure can be efficiently included in the process. This section lays out Dr. Johnston’s work and provides a simple worked example.
3.1 The Chinese Remainder Theorem
Recall the standard statement of the Chinese Remainder Theorem [1]:
Theorem 3.1 (Chinese Remainder Theorem). Let n1, n2, . . . , nk ∈ Z with every ni pairwise coprime and ni > 1. Let N = n1n2 . . . nk. Then there exists a unique x ∈ Z with 0 ≤ x < N such that x ≡ a1 mod n1 x ≡ a2 mod n2
.
.
.
x ≡ ak mod nk
Stated another way, Z/NZ ∼= Z/n1Z×· · ·×Z/nkZ given by x mod N 7→ (x mod n1, . . . , x mod nk) is a ring homomorphism.
Proof. Let N = n1n2 . . . nk, yi =
N
ni for all i = 1, 2, . . . , k, and zi = y
−1
i mod ni
. Note that y
−1
i mod ni exist since yi and ni are coprime by construction. Notice that when j 6= r, yjzj ≡ 0 mod nr and when j = r, yjzj ≡ 1 mod nr. Then x =
X
k i=1 aiyizi (7) satisfies all of the congruences in the statement of the theorem.
6
For example, suppose we want to find x such that x ≡ 1 mod 5 x ≡ 3 mod 7 x ≡ 2 mod 9.
We then have that N = (5)(7)(9) = 315 and y1 = 315/5 = 63, y2 = 315/7 = 45, and y3 = 315/9 = 35.
This gives us that
2 ≡ 63−1 mod 5
5 ≡ 45−1 mod 7
8 ≡ 35−1 mod 9 and so z1 = 2, z2 = 5, and z3 = 8. Therefore, x = 1(63)(2)

Related Documents

  • Improved Essays

    45+60=105 100-105=-5 RALPH JODY 3p + 4b = 375 4p + 2b = 300 p + 4b/3 =…

    • 549 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 5 Algorithm

    • 689 Words
    • 3 Pages

    In this way file is reconstructed back from its shares. The size of each piece is |F| / (n-k), where |F| is size of secret/data, which is smaller than size of each piece produced through algorithm explained in [52]. In this scheme, m-1 shares of file F may provide some information about F. So in this scheme it is advisable to encrypt F before dispersing it and decode it after reconstruction of the encrypted version.…

    • 689 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This passage is found in Chapter VII, paragraph sixteen of by Adam Smith`s An Inquiry into the Nature and Causes of the Wealth of Nations. Briefly called the Wealth of Nations demonstrates the general principles of political economy. The book was written in the 18th century by a brilliant Scottish political economist and thinker, and founder of the modern classical economic thought, Adam Smith, who wasn`t an old-fashioned believer in state control of trade and industry and didn`t describe the most proper regulations for securing wealth and abundance as well. The some portion of Smith’s lectures such as ‘Jurisprudence’, which is about ‘Police, Revenue and Arms’ and the ‘Laws of Nations’, theory of the general principles of law and government,…

    • 128 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Quiz

    • 264 Words
    • 2 Pages

    The process of crossing over occurs during which of the following? 
A. diakinesis 
B. diplotene 
C. pachytene 
D. zygotene 
E. leptotene 
Bloom's Level: 1. Remember
Learning Outcome: 02.04.01 List and describe the phases of meiosis. 
Section: 02.04
Topic: Meiosis
 30.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    CIS 561 Homework #2 Hussain ul Abideen 01617974 Question#1: Solution: State: (a,b) for liters in jugs 1 and 2 Integer 0 to 4 (a,b) : 0<= 7, Initial state:- (Black1,Black2,Black3) : (1,2,3) or (1,3,2) or (2,1,3) or (2,3,1) or (3,2,1) or (3,1,2) (white1,white2,white3) : (5,6,7) or (5,7,6) or (6,5,7) or (6,7,5) or (7,6,5) or (7,5,6) (Blank): (4) Goal state:- (Black 1, Black 2, Black 3) : (5,6,7) or (5,7,6) or (6,5,7) or (6,7,5) or (7,6,5) or (7,5,6) (white1,white2,white3) : (1,2,3) or (1,3,2) or (2,1,3) or (2,3,1) or (3,2,1) or (3,1,2) (Blank): (4) Operations:- (part1) Shift black tile with blank tile which is next left to black tile, Shift black tile with blank tile which is next right to black tile,…

    • 1120 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    POW for the Hay Baler You have five bales of hay and for whatever reason you are weighing them in each possible combination of two: A and B, A and C, A and D, A and E, B and C, and so forth. You wrote down the weights of all of the combinations but you didn't keep track of which weight matched each pair of bales. The weights of the pairs were 80, 82, 83, 84, 85, 86, 87, 88, 90, and 91.The task at hand is to find out how much each bale weighs. You also need to find out if your answer is the only answer and explain how you know.…

    • 368 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Neptune's Necklaces

    • 947 Words
    • 4 Pages

    I hypothesise that there will be a positive relationship between the amount of neptune's necklaces and molluscs. There will be a larger percentage cover of neptune's necklaces because they have a larger body mass and cover more area. Both the neptunes necklaces and the molluscs will be in a close proximity to each other in the same area, this area will be at the edge of the water.…

    • 947 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.1.1 Algorithm for Linear Search Procedure Linear_Search (A[1…n] , item) //item= required element. { For ( i=0 ; i<=n ; i++) { if ( A[i] == item) return i; break; } //end if }//end loop //end Procedure [4] 2.2 Binary search tree Binary search tree is also known as half-interval search or binary chop. [6] Increasing the information leads to increase the speed of searching operations and more effective so the data must be ordered therefore this search algorithm searches only in a sorted array by finding the index of the position of the required element. [7]…

    • 235 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Mod 6 Research Paper

    • 418 Words
    • 2 Pages

    p_i for some i in {1,...,k}, then p | 6M and p | N, so p | 6M - N = 1, which is impossible. Thus the list p_1, ..., p_k was not exhaustive as supposed, so the desired result follows.…

    • 418 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Free Trade Ethics

    • 1692 Words
    • 7 Pages

    The debate for many years has been whether or not trade agreements help American workers or cause the loss of jobs to foreign workers and lower wages. Corporations are in business to generate a profit, but at what cost to Americans and the economy? What is the ethical choice when it comes to offshoring and outsourcing jobs and how honest should a corporation be about the use of this practice? Some of the businesses that have moved jobs to foreign countries are heralded as being innovative and get praise and recognition all the while the unemployed American workers lives are being shipwrecked and their futures throw into turmoil. Adam Smith published his book The Wealth of Nations in 1776 and argued for free trade and better lives for all citizens.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    "It is not from the benevolence of the butcher, the brewer or the baker that we expect our dinner, but from their regard to their own interest". -Adam Smith Adam Smith (1723-1790), the father of economics is often considered as the pioneer of political economy and the founding father of the concept of free market system which stresses the price of goods and services should set freely without any intervention from authorized monopoly. He plwas born in 1723 in Kirkcaldy, Scotland to an economically sound family. A prominent figure in the Scottish Enlightenment, Smith studied social philosophy at the University of Glasgow and later in his life he worked as tutor which allowed him to travel throughout Europe. He was very good in delivering public…

    • 1023 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    One of the greatest contributors of economics, Adam Smith wrote “The Wealth of Nations “in which he argued the economic trading system of mercantilism during the 16th and 18th century. In “The Wealth of Nations” he presented his idea of the free market, which is commonly known as Laissez Faire that focuses on free trade and free competition of products without any interventions of the government. Learning about Adam Smith’s “The Wealth of Nations” there are some pros and cons if we put it in a context of our generation. In Smith’s “The Wealth of Nations” he has discussed the issues underlying on, how can, one’s country achieve a fair and equal share of wealth.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Critical Inquiry on papers, “Microarchitectural analysis of image quality assessment algorithms” and “PLP: A Community Driven Open Source Platform for Computer Engineering Education” THARUN NIRANJAN GOMUDURAI PANDIAN, Arizona State University The research paper titled, “Microarchitectural analysis of image quality assessment algorithms“, aims to improve the efficiency of image quality assessment (IQA) algorithms by analyzing the runtime efficiency of the algorithms and identifying the underlying hardware bottlenecks associated with it. Though this paper defines it research questions and provides a qualitative model, the validation it provides for the results is more persuasive because the custom engine design is merely proposed based on good…

    • 854 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    Chapter-3 Diffie-Hellman, Seo and Tseng Protocol 3.1 Introduction Whitefield Diffie and Martin Hellman in 1976 had proposed key exchange or agreement algorithm. In this algorithm, the participants i.e. the sender and receiver have to agree on a symmetric key i.e. the same key or single key can be used for encryption as well as decryption. The key is only used for key agreement purpose, not for enciphering and deciphering the message. Once the agreement of key has been taken place between participants on key, then the key can be used for encryption as well as decryption. This is the main fundamental of key exchange for secure communication over insecure medium.…

    • 2350 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    Divide and Conquer Strategies: Divide and conquer is an algorithm which design paradigm based on multi-branched recursion. This designed paradigm consists of following phases: 1) Break the problem (divide): Breaking the problem into several sub-problems that are smaller in size. 2) Solve the sub problem(conquer) : Solve the sub-problem recursively .…

    • 718 Words
    • 3 Pages
    Improved Essays