Solved

Euclid Algorithm

Posted on 2004-10-06
5
217 Views
Last Modified: 2010-04-14
I have a cryptography assignement and  I have to find Bob's secret key based on Euclid algorithm. In my Lecture Notes is written:
Given two numbers (r,s), the algorithm outputs a number x such that r*x=1(mod s)

I'm using Java to write the app to solve this. I have r and s and I have to find x.
There is a method in Java to do this, or can anyoane to give any ideas?
0
Comment
Question by:edi02
  • 2
5 Comments
 
LVL 18

Expert Comment

by:luv2smile
ID: 12237508
You may want to post your question in the programming section so the appropriate experts will see it. This is the Windows 2000 operating system section.
0
 
LVL 18

Expert Comment

by:luv2smile
ID: 12237514
0
 
LVL 23

Expert Comment

by:Danny Child
ID: 12238804
... and experts can't do assignments for users...
http://www.experts-exchange.com/Operating_Systems/Win2000/help.jsp#hi105

you'll have to figure the solution yourself, but feel free to ask for "pointers"
0
 
LVL 84

Accepted Solution

by:
oBdA earned 125 total points
ID: 12242171
Here's an explanation of the Euclid algorithm: http://www.maths.lse.ac.uk/Courses/MA314/euclid.pdf. Based on this, you should be able to understand the principle, and to create your program. The former is more important: if someone gives you a piece of code, and you present it, you'll probably be asked why it produces the correct output; if you start stuttering away, chances are this will not be recognized as a valid solution ...
0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Microsoft Outlook 2007 stationary with un-clickable image 3 190
Repair old Windows 2000 boot 15 243
Windows 2000 48-bit LBA 13 52
reboot server with scheduled time and week base 4 64
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Adults who share images on social media aren’t the only ones who need to worry about their privacy. Our culture’s tendency to share every move and celebration affects the privacy of our children, too.
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question