oh my god thank you sooo much for this explanation , really help me to understand for my exam tomorrow, hope ur day will be blessed ,always
@dbgohil124 Жыл бұрын
A point to be noted here is that if in final t1 we get negative ans then our final multiplicative answer will be (a+t1)
@yousofhajhasan81346 ай бұрын
Bro, Thank you !!!
@alc5440 Жыл бұрын
This method makes it so much easier to understand. Thank you!
@BruceLee-qc2lm11 ай бұрын
I know right? The way it is organized makes much more sense to me
@mikerowaveoven5092 жыл бұрын
Very clear method to get the multiplicative inverse
@masterleague83492 жыл бұрын
Sir please complete this series with RSA/AES/DES/and Deffie Helman
@NareshKumar-kq5yz Жыл бұрын
To find T use T=T1-(T2xQ)
@souvikcseiitk Жыл бұрын
Thanks
@ryanreefat11492 жыл бұрын
I don’t know how many adjectives will throw for you.. Just will say Thanx a lot..
@mohammadahmedragab8372 жыл бұрын
very clear explanation, thank you so much ✨
@danieldanmola8266 Жыл бұрын
Even though you still speak fast😊😊.. . I love your teaching..🔥🔥🔥😊😊🔥💪🏿💪🏿💪🏿💪🏿
@SuccessAccount-c4v11 ай бұрын
take A=modulo part , B=number part , ex: if we have to find MI of 20 mod 9 then take A=9 and B=20 then you will get correct ans.
@manishkarmakar39272 жыл бұрын
kindly add videos of DES/AES and the rest.
@cradleofrelaxation6473 Жыл бұрын
I’m offering a course in cyber security called cryptography and steganography. Your channel has been really helpful!! So thank you!! I’m about to write a test and I’m only able to easily find the mod multiplicative inverse with the use of a good scientific calculator that has mod function. In case Calculator won’t be allowed in the test, so I’m looking for easy manual way of finding the inverse. But what I see here is scary!! In one of my workings i need the inverse of 441 mod 26. Obviously there’s no time for this Method. If Calculator isn’t allowed in the test, I’m screwed!! Mod multiplicative inverse is one such thing that shouldn’t be hard, BUT IT IS!!
@daviddugar34834 ай бұрын
Fun fact for this algorithm: the rule "A>B" is not neccesary, because the algorithm takes this into account by the way it behaves. For example if you have 3 mod 5 and take A = 3 and B = 5, then you get remainder 3 and quotient 0, so in the next iteration you would get A = B (which was 5) and B = remainder (which was 3). As you can see the algorithm takes care of that "point to ponder" by itself, you just waste 1 iteration tho
@dextercapili4879Ай бұрын
try 11 and 17
@edwinsanchez1011 Жыл бұрын
Thank you so much, this makes EEA so clear!
@FrankMeyo4 ай бұрын
Thank you so much
@shubham_jha Жыл бұрын
Thanks sir!
@architagarwal1367 Жыл бұрын
The Extended Euclidean Algorithm taught seems incorrect. It gives the M.I. of 35 mod 3 to be 12. However, 35 × 12 = 420 which is divisible by 3, hence not 420 is not congruent to 1 modulo 3, hence 12 is not M.I. of 35 mod 3
@moonblade58389 ай бұрын
Method is correct, maybe u got -12 which is 35+12=47 i.e M.I of 35 mod 3
@sarveshkulkarni6287Ай бұрын
@@moonblade5838 No its 12 only , not -12
@nimmakajogeswararao77705 ай бұрын
Thank you so much sir love you ❤❤❤❤❤❤
@AGCreation-y2g10 ай бұрын
Thank you sir ❤
@shreyasingh2223 жыл бұрын
Well explained...!!
@salmanshahid8128 Жыл бұрын
Aap bhagwati hain mere liye. Thank you so much. ❤❤❤❤❤❤❤❤
@alaasmarneh78112 жыл бұрын
Thank you!
@shreyansh25107 ай бұрын
It can also be used to find gcd of 2 co prime numbers if i am not wrong
@20aatif2 жыл бұрын
A small detail missed. If A > B then what we need to do?
@luke91422 жыл бұрын
:D If A > B then B = A, A=B
@iramshahzadi8297 Жыл бұрын
sir, please make a brute force attack example video, as you have already made a video on this topic, but if you choose a cipher text, then convert it into plain text , it will be easy for us . Regards
@adeodatusludan Жыл бұрын
Thanks
@cetadda43743 жыл бұрын
Sir please upload remaining videos of data structures
@gourisworld4081 Жыл бұрын
Sir plz explain RSA...
@sastenashe_yt88023 жыл бұрын
Impressive
@velsmusics326 Жыл бұрын
what is t full form in this video sir
@poorvih Жыл бұрын
I love you thank you
@sonegodwinngole56412 жыл бұрын
The GCD(1005,105)=15. Am I correct?
@ShivamTh4053 жыл бұрын
Complete data structure please
@dipendughosh6730 Жыл бұрын
while trying with 91 mod 12 the answer is not coming to 7 which is the MI
@gautham423210 ай бұрын
91mod12 = 7. If you start with A=12, B=7, T1=0 and T2=1, the multiplicative inverse will come as 7.
@temexmichael128911 ай бұрын
Stating A should be greater than B is very misleading and flawed. Because, taking your own example 3, the multiplicative inverse of 26 mod 11 is 3, while the multiplicative inverse of 11 mod 26 is 19. But when you say you assign the greater value to A, you're implying they would both be the same. And you can only find the MI of 11 mod 26 using your method, which a flawed and inaccurate method.
@kathirvel.be1810 ай бұрын
Absolutely correct, While i work with various scenario of the multiplicative inverse i encountered an error.
@AYUSHxATHLETE Жыл бұрын
This is a wrong method
@muradmishu6313 Жыл бұрын
In this method gcd will be A not T1 . so sad .you guys just ruined my 4 marks by this wrong youtube keywords .
@kwertie1336 ай бұрын
thats on you my guy, this video is for computing multiplicative inverse - not gcd