Extended Euclidean Algorithm (Solved Example 1)

Поделиться
HTML-код
  • Опубликовано: 29 ноя 2024

Комментарии • 56

  • @aliamaisara2095
    @aliamaisara2095 Год назад +8

    oh my god thank you sooo much for this explanation
    , really help me to understand for my exam tomorrow, hope ur day will be blessed ,always

  • @alc5440
    @alc5440 Год назад +4

    This method makes it so much easier to understand. Thank you!

    • @BruceLee-qc2lm
      @BruceLee-qc2lm Год назад

      I know right? The way it is organized makes much more sense to me

  • @mikerowaveoven509
    @mikerowaveoven509 2 года назад +5

    Very clear method to get the multiplicative inverse

  • @dbgohil124
    @dbgohil124 Год назад +21

    A point to be noted here is that if in final t1 we get negative ans then our final multiplicative answer will be (a+t1)

  • @masterleague8349
    @masterleague8349 3 года назад +34

    Sir please complete this series with RSA/AES/DES/and Deffie Helman

  • @NareshKumar-kq5yz
    @NareshKumar-kq5yz Год назад +17

    To find T use T=T1-(T2xQ)

  • @ryanreefat1149
    @ryanreefat1149 2 года назад +13

    I don’t know how many adjectives will throw for you.. Just will say Thanx a lot..

  • @mohammadahmedragab837
    @mohammadahmedragab837 2 года назад +3

    very clear explanation, thank you so much ✨

  • @SuccessAccount-c4v
    @SuccessAccount-c4v Год назад +2

    take A=modulo part , B=number part , ex: if we have to find MI of 20 mod 9 then take A=9 and B=20 then you will get correct ans.

  • @danieldanmola8266
    @danieldanmola8266 Год назад +1

    Even though you still speak fast😊😊.. . I love your teaching..🔥🔥🔥😊😊🔥💪🏿💪🏿💪🏿💪🏿

  • @edwinsanchez1011
    @edwinsanchez1011 Год назад

    Thank you so much, this makes EEA so clear!

  • @cradleofrelaxation6473
    @cradleofrelaxation6473 Год назад +5

    I’m offering a course in cyber security called cryptography and steganography.
    Your channel has been really helpful!! So thank you!!
    I’m about to write a test and I’m only able to easily find the mod multiplicative inverse with the use of a good scientific calculator that has mod function. In case Calculator won’t be allowed in the test, so I’m looking for easy manual way of finding the inverse.
    But what I see here is scary!!
    In one of my workings i need the inverse of 441 mod 26. Obviously there’s no time for this Method. If Calculator isn’t allowed in the test, I’m screwed!!
    Mod multiplicative inverse is one such thing that shouldn’t be hard, BUT IT IS!!

  • @daviddugar3483
    @daviddugar3483 5 месяцев назад +1

    Fun fact for this algorithm: the rule "A>B" is not neccesary, because the algorithm takes this into account by the way it behaves. For example if you have 3 mod 5 and take A = 3 and B = 5, then you get remainder 3 and quotient 0, so in the next iteration you would get A = B (which was 5) and B = remainder (which was 3). As you can see the algorithm takes care of that "point to ponder" by itself, you just waste 1 iteration tho

  • @manishkarmakar3927
    @manishkarmakar3927 3 года назад +6

    kindly add videos of DES/AES and the rest.

  • @shubham_jha
    @shubham_jha Год назад +2

    Thanks sir!

  • @FrankMeyo
    @FrankMeyo 5 месяцев назад +1

    Thank you so much

  • @nimmakajogeswararao7770
    @nimmakajogeswararao7770 6 месяцев назад

    Thank you so much sir love you ❤❤❤❤❤❤

  • @architagarwal1367
    @architagarwal1367 2 года назад +5

    The Extended Euclidean Algorithm taught seems incorrect. It gives the M.I. of 35 mod 3 to be 12. However, 35 × 12 = 420 which is divisible by 3, hence not 420 is not congruent to 1 modulo 3, hence 12 is not M.I. of 35 mod 3

    • @moonblade5838
      @moonblade5838 11 месяцев назад

      Method is correct, maybe u got -12 which is 35+12=47 i.e M.I of 35 mod 3

    • @sarveshkulkarni6287
      @sarveshkulkarni6287 2 месяца назад +1

      @@moonblade5838 No its 12 only , not -12

  • @salmanshahid8128
    @salmanshahid8128 Год назад

    Aap bhagwati hain mere liye. Thank you so much. ❤❤❤❤❤❤❤❤

  • @shreyasingh222
    @shreyasingh222 3 года назад +1

    Well explained...!!

  • @alaasmarneh7811
    @alaasmarneh7811 2 года назад +1

    Thank you!

  • @AGCreation-y2g
    @AGCreation-y2g 11 месяцев назад

    Thank you sir ❤

  • @shreyansh2510
    @shreyansh2510 8 месяцев назад

    It can also be used to find gcd of 2 co prime numbers if i am not wrong

  • @iramshahzadi8297
    @iramshahzadi8297 Год назад

    sir, please make a brute force attack example video, as you have already made a video on this topic, but if you choose a cipher text, then convert it into plain text , it will be easy for us . Regards

  • @adeodatusludan
    @adeodatusludan Год назад

    Thanks

  • @cetadda4374
    @cetadda4374 3 года назад +1

    Sir please upload remaining videos of data structures

  • @poorvih
    @poorvih Год назад

    I love you thank you

  • @20aatif
    @20aatif 2 года назад +1

    A small detail missed. If A > B then what we need to do?

    • @luke9142
      @luke9142 2 года назад +2

      :D If A > B then B = A, A=B

  • @temexmichael1289
    @temexmichael1289 Год назад +9

    Stating A should be greater than B is very misleading and flawed. Because, taking your own example 3, the multiplicative inverse of 26 mod 11 is 3, while the multiplicative inverse of 11 mod 26 is 19. But when you say you assign the greater value to A, you're implying they would both be the same. And you can only find the MI of 11 mod 26 using your method, which a flawed and inaccurate method.

    • @kathirvel.be18
      @kathirvel.be18 11 месяцев назад +3

      Absolutely correct, While i work with various scenario of the multiplicative inverse i encountered an error.

    • @Thehrutikkharjul
      @Thehrutikkharjul 3 дня назад

      26 mod 11 can be written as 4 mod 11 and now you can solve for this eqn

    • @Thehrutikkharjul
      @Thehrutikkharjul 3 дня назад

      In that case you have to solve for s instead of t

  • @gourisworld4081
    @gourisworld4081 Год назад

    Sir plz explain RSA...

  • @sastenashe_yt8802
    @sastenashe_yt8802 3 года назад

    Impressive

  • @KyambaddeJoshua-z7h
    @KyambaddeJoshua-z7h 3 дня назад

    what if i get t1 as a negative

  • @velsmusics326
    @velsmusics326 Год назад

    what is t full form in this video sir

  • @ioeentrancepreparation6178
    @ioeentrancepreparation6178 20 дней назад

  • @sonegodwinngole5641
    @sonegodwinngole5641 2 года назад +1

    The GCD(1005,105)=15.
    Am I correct?

  • @ShivamTh405
    @ShivamTh405 3 года назад

    Complete data structure please

  • @dipendughosh6730
    @dipendughosh6730 Год назад

    while trying with 91 mod 12 the answer is not coming to 7 which is the MI

    • @gautham4232
      @gautham4232 11 месяцев назад

      91mod12 = 7. If you start with A=12, B=7, T1=0 and T2=1, the multiplicative inverse will come as 7.

  • @AYUSHxATHLETE
    @AYUSHxATHLETE 2 года назад +1

    This is a wrong method

  • @muradmishu6313
    @muradmishu6313 Год назад +1

    In this method gcd will be A not T1 . so sad .you guys just ruined my 4 marks by this wrong youtube keywords .

    • @kwertie133
      @kwertie133 7 месяцев назад +1

      thats on you my guy, this video is for computing multiplicative inverse - not gcd

  • @pushparaj8308
    @pushparaj8308 3 месяца назад

    👏🙏

  • @balasuriyar1711
    @balasuriyar1711 Год назад +1

    wakkali

  • @Saii__2004
    @Saii__2004 6 дней назад

    Thankyou