LLMpediaThe first transparent, open encyclopedia generated by LLMs

Chinese remainder theorem

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: RSA (cryptosystem) Hop 4
Expansion Funnel Raw 45 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted45
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
Chinese remainder theorem
Chinese remainder theorem
Cmglee · CC BY-SA 4.0 · source
NameChinese remainder theorem
AreaNumber theory
IntroducedThird century
ContributorsSun Tzu; Qin Jiushao; Carl Friedrich Gauss; Leonhard Euler; Sophie Germain; Joseph-Louis Lagrange
RelatedModular arithmetic; Congruence relation; Ring theory; Algebraic number theory

Chinese remainder theorem The Chinese remainder theorem is a fundamental result in Number theory about simultaneous congruences modulo pairwise coprime integers. It gives conditions for existence and uniqueness of solutions and supplies constructive methods that connect classical works by Sun Tzu and later formalizations by Carl Friedrich Gauss and Leonhard Euler. The theorem underpins algorithms in Computer science, cryptographic systems like RSA (cryptosystem), and structures in Abstract algebra such as product decompositions of rings and Chinese remainder-like decompositions in Algebraic number theory.

Statement

Let m1, m2, ..., mk be pairwise coprime positive integers and let a1, a2, ..., ak be integers. There exists an integer x satisfying the simultaneous congruences x ≡ a1 (mod m1), x ≡ a2 (mod m2), ..., x ≡ ak (mod mk), and any two such solutions are congruent modulo M = m1 m2 ··· mk. This assertion appears in modern form in works of Carl Friedrich Gauss and serves as a prototype for isomorphisms in Ring theory: Z/MZ ≅ Z/m1Z × Z/m2Z × ... × Z/mkZ. Variants drop the coprimality requirement and replace it with compatibility conditions involving greatest common divisors, as studied by Joseph-Louis Lagrange and later by Sophie Germain in modular contexts.

Proofs and constructions

Elementary constructive proofs use Bezout's identity from Étienne Bézout (implicitly via Euclid) to produce coefficients e_i with e_i ≡ 1 (mod m_i) and e_i ≡ 0 (mod m_j) for j ≠ i; then x = Σ a_i e_i. Alternative proofs exploit the ring isomorphism Z/MZ ≅ ⨁ Z/m_iZ established in Algebraic number theory and Commutative algebra. Existential proofs by induction on k appear in expositions by Carl Friedrich Gauss and constructive algorithms were refined by Qin Jiushao and later presented in systematic form by Adrien-Marie Legendre. Linear algebraic viewpoints interpret the theorem as solvability of a system over the principal ideal domain Z, connecting to results by David Hilbert and Emil Artin on decomposition of modules.

Algorithms and computational complexity

Practical constructions use the explicit formula x = Σ a_i M_i y_i where M_i = M/m_i and y_i ≡ M_i^{-1} (mod m_i). Computing modular inverses uses the extended Euclidean algorithm attributed to Euclid and algorithmic analyses originate with Alan Turing-era complexity theory and later with models by Donald Knuth. Fast algorithms for many moduli exploit divide-and-conquer and fast multiplication methods influenced by work of André Weil and implementations in computer algebra systems tied to Claude Shannon-era information theory. Complexity bounds relate to multiplication complexity (Schönhage–Strassen methods linked to Volker Strassen), and parallel algorithms derive from techniques in John von Neumann-inspired architectures. In cryptographic practice, Chinese remainder optimizations speed decryption in RSA (cryptosystem) using factor-specific inverses, with security considerations discussed in literature by Whitfield Diffie and Martin Hellman.

Generalizations and extensions

The theorem generalizes to noncoprime moduli via compatibility constraints involving gcd conditions studied by Joseph-Louis Lagrange and modern expositions by Emmy Noether extend it to ideals in Dedekind domains and principal ideal domains. In Algebraic number theory, analogues appear as ideal-theoretic Chinese remainder statements in rings of integers of number fields, with significant treatments by Richard Dedekind and Heinrich Weber. Noncommutative generalizations consider idempotent decompositions related to results by Jacobson in Noncommutative ring theory. Adelic and idelic formulations arise in the work of Andre Weil and John Tate within class field theory, and versions for polynomial rings over fields connect to Évariste Galois-inspired ideas and factorization algorithms developed by Srinivasa Ramanujan-influenced computational number theorists.

Applications

The theorem is central to algorithms in Computer science for simultaneous congruence reconstruction, fast integer arithmetic, and multi-modular reduction in computer algebra packages influenced by Donald Knuth and Peter L. Montgomery. In cryptography it accelerates RSA (cryptosystem) operations and underlies secret sharing schemes studied by Adi Shamir and threshold cryptosystems from Clifford Cocks and Rivest–Shamir–Adleman-era research. Coding theory applications connect to constructions attributed to Claude Shannon and Richard Hamming. In computational number theory, Chinese remainder methods support algorithms for computing class groups by David Hilbert-inspired approaches and primality tests developed by Carl Pomerance and Miller–Rabin style probabilistic frameworks. Engineering and signal processing exploit related residue number systems in hardware designs pioneered in work by E. H. Moore and Claude Shannon.

History and development

Early instances of the theorem trace to a problem in the 3rd century work attributed to Sun Tzu; systematic algorithmic presentation appears in the 13th-century mathematics of Qin Jiushao. European formalization and proof were advanced by Carl Friedrich Gauss in the 19th century, with antecedent contributions from Leonhard Euler. The theorem influenced development of Modular arithmetic and spurred advances in Abstract algebra through the 19th and 20th centuries with contributions by Joseph-Louis Lagrange, Richard Dedekind, Emmy Noether, and David Hilbert. 20th-century computational and cryptographic applications grew with work by Claude Shannon, Donald Knuth, Alan Turing, and post-war developments in public-key cryptography by Whitfield Diffie and Martin Hellman and implementers such as Ron Rivest.

Category:Number theory