Modular Arithmetic

Clock arithmetic — the mathematics of remainders and cyclic patterns.

Congruences

a ≡ b (mod m) means m divides (a − b)
Equivalently: a mod m = b mod m

Modular arithmetic partitions integers into equivalence classes. For example, mod 12 gives us clock arithmetic (17:00 ≡ 5:00). The concept connects to solving equations but in a finite number system.

Modular Operations

(a + b) mod m = ((a mod m) + (b mod m)) mod m
(a · b) mod m = ((a mod m) · (b mod m)) mod m
aⁿ mod m → use repeated squaring (fast exponentiation)

Example: 7¹³ mod 11

7¹ = 7, 7² = 49 ≡ 5, 7⁴ ≡ 5² = 25 ≡ 3, 7⁸ ≡ 3² = 9

7¹³ = 7⁸ · 7⁴ · 7¹ ≡ 9 · 3 · 7 = 189 ≡ 2 (mod 11)

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

Modular Inverse

The modular inverse of a (mod m) is x such that a·x ≡ 1 (mod m). It exists if and only if GCD(a, m) = 1 (a and m are coprime). Found via the Extended Euclidean Algorithm — see GCD computation.

This is essential for division in modular arithmetic and for RSA decryption.

DHWDZLqt9PEJicTMurAnjQCKPByhfiDmglKS5kWb4w2Uhb6UrtbWEMJqUDxP2dCfAplRKyrSVzBQYH5g40y1LAphExxcq2//dW2327owJL8AizbgnwxHxm67akMHSDmcNaM0ht9684HdzRqxRWaqDzHQSQ9D0P+Qckt9bU4+XGpdd/yWq5+Stia/Of5LbxR7mn8N7EIHE+TfF5RNgLrZKezrbyFFkSVdQJn53SjB0WRgkCdWxRhCRKEqYMWLVo5bYAGQhYasXml+gghitjwdltTaDY9TGpCHmYTnMf+XLKMZ6F3eeqgzIRK8ViLJyVukIrla5hqM4Rhipr5hgt/40JpNuzQoDKY5d9fbxsrtXwjqtqnTUyff/xWUo1JcFNcpZoaPKy832VEufjd/PTJTyz4zi1722psHxtXbuD13Jim/ZWCUVtDS+LmVzX2mtjZQA1oymUrAOL/4XA60IneVUmANMxBHXYDsgE4xNVcGALBDdXK4XMxnREMqc8OdQEGESmQALPF4yOxtFEJCQVhhTUlyCfdbCO9DVUB9Y6TVNUiPdxlftR8KxtG3ZlMtdI3reQ3JMIyJ8J/tWApx508i2Qpv4JVjfLamoNjhy4x50x3qcGxh/GeVTW7bKkF+pic5E4v9QUqXadiiFhULuQQouZ59WD0zB1Luzsk46HNO/vLS+2IUe8zZqblMD1aCt/EFARqIv1PUED/82rXLFZgytTtA1b/diS/yqFgb674nAPhjpD4C3A

Fermat & Euler

Fermat's Little Theorem: aᵖ⁻¹ ≡ 1 (mod p) if p is prime and gcd(a,p) = 1
Euler's Theorem: a^φ(n) ≡ 1 (mod n) if gcd(a,n) = 1
Euler's totient: φ(n) = n · ∏(1 − 1/p) for each prime p dividing n

Fermat's theorem is a special case of Euler's (since φ(p) = p − 1). These are the theoretical backbone of RSA encryption. The exponential functions connect to the structure of multiplicative groups mod n.

RVyple7bUMgHnmun8Uk5/kRrrQ8OJ7thxpX0GnVkqEZy19G751274Qy4Q7POR9ydtl0xFWUCr/8DFHACJgQm6Hj7nb3ulHc5TjSlfMPMpBbL4xMzkj19kL3v5AP1fI8gy9TcuwNPGcJ5tjdoniIyEj8ieA/FLp6SDZZuvQk0L/UI/gv9Dwjx9srsBzbj/pf6Rv9TC7QFjU2qLjg/7pBUGWhTbeJLEPgiBTHEgFVq7s5OsrcIkTm7wrYPCPTKROYscp+yFCCctA/jPy2/Caqb3CzA2/cmEfi/FWfvmEyKNJZ6s37dsuk1htp/CcMCnWdMwR2bYoCIXpeedW0BDVJUJ7B448lKKkrofkt/qsIKf1cGNodJhEe9xRoGMzBXLjGd1QqJlmpPxkL4juAKYUBWm1IVxWhFykPomO11dnNgaenw+ZQE5ZTOvBb9nhGkvtuHYeLK6joZvFlL/m6YBNi4AOOSuhza5r1F1y5Wxu9FosUZ8/TGiaNGjXfK/tknMH31Q4qBYY7r+VawEpQtTGYRhWpH0AE+sAn4+Nyh6TH9kG+tKMK7NtxmMb8e2ni2jV+ykUsWLA+UUNWPCcvTS6OO9hHAWpiQlwoVPf9qYc7Xd7rR15ORvacipAeXFMxp8w1/ArNJ+qdFCX3dPkthwiOi+8Dkw5nInHhfWF/jyeQsWC2KkpqeXVWKYWQtQol/bkvD8G9Qo1Mp+wY9CiS5YokHDr7oh1olfJgxVW2iriZyWXkiwo88fHg

Chinese Remainder Theorem

If m₁, m₂, …, mₖ are pairwise coprime, then:
x ≡ a₁ (mod m₁), x ≡ a₂ (mod m₂), …, x ≡ aₖ (mod mₖ)
has a unique solution mod (m₁·m₂·…·mₖ)
CRT says you can reconstruct a number from its remainders — like reassembling a puzzle from pieces. This has applications in computer science (parallel computation), cryptography (speeding up RSA), and even calendar calculations.