# Formally Verified Montgomery Multiplication

## Abstract

We report on a machine assisted verification of an efficient implementation of Montgomery Multiplication which is a widely used method in cryptography for efficient computation of modular exponentiation. We shortly describe the method, give a brief survey of the VeriFun system used for verification, present the formal proofs and report on the effort for creating them. Our work uncovered a serious fault in a published algorithm for computing multiplicative inverses based on Newton-Raphson iteration, thus providing further evidence for the benefit of computer-aided verification.

## Keywords

Modular arithmetic Multiplicative inverses Montgomery Multiplication Program verification Theorem proving by induction## 1 Introduction

Montgomery Multiplication [6] is a method for efficient computation of residues \(a^{j}\) *mod* *n* which are widely used in cryptography, e.g. for RSA, Diffie-Hellman, ElGamal, DSA, ECC etc. [4, 5]. The computation of these residues can be seen as an iterative calculation in the commutative ring with identity \(R_{n}=(\mathbb {N}_{n},\oplus ,\mathfrak {i}_{n},\odot ,0,1~mod~n)\) where \(n\ge 1\), \(\mathbb {N}_{n}=\left\{ 0,\ldots ,n-1\right\} \), addition defined by \(a\oplus b=a+b\) *mod* *n*, inverse operator defined by \(\mathfrak {i}_{n}(a)=a\cdot (n-1)\) *mod* *n*, multiplication defined by \(a\odot b=a\cdot b\) *mod* *n*, neutral element 0 and identity 1 *mod* *n*.

For any \(m\in \mathbb {N}\) relatively prime to *n*, some \(m_{n} ^{{\texttt {-}}1}\in \mathbb {N}_{n}\) exists such that \(\left. m\odot m_{n}^{{\texttt {-}}1}\right. =1\) *mod* *n*. \(m_{n}^{{\texttt {-}}1}\) is called the* multiplicative inverse* of *m* in \(R_{n}\) and is used to define a further commutative ring with identity \(R_{n}^{m}=(\mathbb {N} _{n},\oplus ,\mathfrak {i}_{n},\otimes ,0,\) *m* *mod* *n*) where multiplication is defined by \(a\,\otimes \,b=a\,\odot \,b\,\odot \,m_{n}^{{\texttt {-} }1}\) and identity given as *m* *mod* *n*. The multiplication \(\otimes \) of \(R_{n}^{m}\) is called *Montgomery Multiplication*.

*mod*

*n*can be calculated in ring \(R_{n}^{m}\) as well because

The required operations \(h,\otimes \) and \(h^{-1}\) can be implemented by the so-called *Montgomery Reduction* redc [6] (displayed in Fig. 1) as stated by Theorem 1:

### Theorem 1

Let \(a,b,n,m\in \mathbb {N}\) with \(m>n>a\), \(n>b\ \)and *n*, *m* relatively prime, let \(I=\mathfrak {i}_{m}(n_{m}^{{\texttt {-}}1})\) and let \(M=m^{2}\) *mod* *n*. Then *I* is called the *Montgomery Inverse* and (1) \(h(a)= redc (a\cdot M,I,\) *m*, *n*), (2) \(a\otimes b= redc (a\cdot b,I,m,n)\), and (3) \(h^{-1}(a)= redc (a,I,m,n)\).

By () and Theorem 1, \(a\cdot b\) *mod* *n* can be computed by procedure redc and consequently \(a^{j}\) *mod* *n* can be computed by iterated calls of redc (implemented by procedure redc\(^{*}\) of Fig. 1) as stated by Theorem 2:

### Theorem 2

*a*,

*n*,

*m*,

*I*and

*M*like in Theorem 1. Then for all \(j\in \mathbb {N}{:}\)

^{1}

By Theorem 2, \(j+2\) calls of redc are required for computing \(a^{j}\) *mod* *n*, viz. one call to map *a* to *h*(*a*), *j* calls for the Montgomery Multiplications and one call for mapping the result back with \(h^{-1}\). This approach allows for an efficient computation of \(a^{j}\) *mod* *n* in \(R_{n}^{m}\) (for sufficient large *j*), if *m* is chosen as a power of 2 and some odd number for *n*, because *x* *mod* *m* then can be computed with constant time and *x*/*m* only needs an effort proportional to \( log \) *m* in procedure redc, thus saving the expensive *mod* *n* operations in \(R_{n}\).

## 2 About Open image in new window

Proof assistants like Isabelle/HOL, HOL Light, Coq, ACL2 and others have been shown successful for developing formal proofs in Number Theory (see e.g. [14]). Here we use the Open image in new window system^{2} [7, 10] to verify correctness of Montgomery Multiplication by proving Theorems 1 and 2. The system’s object language consists of universal first-order formulas plus parametric polymorphism. Type variables may be instantiated with polymorphic types. Higher-order functions are not supported. The language provides principles for defining data structures, procedures operating on them, and for statements (called “lemmas”) about the data structures and procedures. Unicode symbols may be used and function symbols can be written in out-, in-, pre- and postfix notation so that readability is increased by use of the familiar mathematical notation. Figure 2 displays some examples. The data structure \(\mathsf {bool}\) and the data structure \( \mathbb {N} \) for natural numbers built with the constructors 0 and \(^{{\texttt {+}}}\)(\(\ldots \)) for the successor function are the only predefined data structures in the system. \(^{{\texttt {-}}}\)(\(\ldots \)) is the selector of \(^{{\texttt {+}}}\)(\(\ldots \)) thus representing the predecessor function. Subsequently we need integers \(\mathbb {Z}\) as well which we define in Fig. 2 as signed natural numbers. For instance, the expression \(\langle \)‘−’, \(42\) \(\rangle \) is a data object of type \(\mathbb {Z}\), selector \( sign \) yields the sign of an integer (like ‘−’ in the example), and selector \(\left| \ldots \right| \) gives the absolute value of an integer (like 42 in the example). Identifiers preceded by @ denote type variables, and therefore polymorphic triples are defined in Fig. 2. The expression \({\lessdot } 42,\) \(\langle \)‘\(+\)’, \(47{\rangle }\), \(\langle \)‘−’, \(5{\rangle }{\gtrdot }\) is an example of a data object of type \( triple [\mathbb {N},\mathbb {Z},\mathbb {Z}]\). The \(i^{th}\) component of a triple is obtained by selector \((\ldots )_{i}\).

Procedures are defined by \( if \)- and \( case \)-conditionals, functional composition and recursion like displayed in Fig. 1. Procedure calls are evaluated eagerly, i.e. call-by-value. The use of incomplete conditionals like for redc and redc\(^{*}\) results in incompletely defined procedures [12]. Such a feature is required when working with polymorphic data structures but is useful for monomorphic data structures too as it avoids the need for stipulating artificial results, e.g. for *n*/0. Predicates are defined by procedures with result type \(\mathsf {bool}\). Procedure Open image in new window for deciding the greater-than relation is the only predefined procedure in the system. Upon the definition of a procedure, Open image in new window automated termination analysis (based on the method of *Argument-Bounded Functions* [8, 11]) is invoked for generating termination hypotheses which are sufficient for the procedure’s termination and proved like lemmas. Afterwards induction axioms are computed from the terminating procedures’ recursion structure to be on stock for future use.

Lemmas are defined with conditionals \({ if :bool\times bool\times bool\rightarrow bool}\) as the main connective, but negation \(\lnot \) and \( case \)-conditionals may be used as well. Only universal quantification is allowed for the variables of a lemma. Figure 2 displays a lemma about (the elsewhere defined) procedure mod (computing the remainder function) which is frequently used in subsequent proofs. The string in the headline (between “lemma” and “ Open image in new window ”) is just an identifier assigning a name to the lemma for reference and must not be confused with the statement of the lemma given as a boolean term in the lemma body. Some basic lemmas about equality and >, e.g. stating transitivity of \(=\) and >, are predefined in the system. Predefined lemmas are frequently used in almost every case study so that work is eased by having them always available instead of importing them from some proof library.

Lemmas are proved with the *HPL*-calculus (abbreviating *Hypotheses*, *Programs* and *Lemmas*) [10]. The most relevant proof rules of this calculus are *Induction*, *Use Lemma*, *Apply Equation*, *Unfold Procedure*, *Case Analysis* and *Simplification*. Formulas are given as sequents of form \(H, IH \vdash goal\), where *H* is a finite set of *hypotheses* given as literals, i.e. negated or unnegated predicate calls and equations, \( IH \) is a finite set of *induction hypotheses* given as partially quantified boolean terms and *goal* is a boolean term, called the *goalterm* of the sequent. A deduction in the *HPL* -calculus is represented by a tree whose nodes are given by sequents. A lemma \(\ell \) with body \(\mathbb {\forall }\ldots \) *goal* is *verified* iff *(i)* the goalterm of each sequent at a leaf of the proof tree rooted in Open image in new window equals \( true \) and *(ii)* each lemma applied by *Use Lemma* or *Apply Equation* when building the proof tree is *verified*. The base of this recursive definition is given by lemmas being proved without using other lemmas. Induction hypotheses are treated like *verified* lemmas, however being available only in the sequent they belong to.

The *Induction* rule creates the base and step cases for a lemma from an induction axiom. By choosing *Simplification*, the system’s first-order theorem prover, called the *Symbolic Evaluator*, is started for rewriting a sequent’s goalterm using the hypotheses and induction hypotheses of the sequent, the definitions of the data structures and procedures as well as the lemmas already *verified*. This reasoner is guided by heuristics, e.g. for deciding whether to use a procedure definition, for speeding up proof search by filtering out useless lemmas, etc. Equality reasoning is implemented by conditional term rewriting with *AC*-matching, where the orientation of equations is heuristically established [13]. The Symbolic Evaluator is a fully automatic tool over which the user has no control, thus leaving the *HPL*-proof rules as the only means to guide the system to a proof.

Also the *HPL*-calculus is controlled by heuristics. When applying the *Verify* command to a lemma, the system starts to compute a proof tree by choosing appropriate *HPL*-proof rules heuristically. If a proof attempt gets stuck, the user must step in by applying a proof rule to some leaf of the proof tree (sometimes after pruning some unwanted branch of the tree), and the system then takes over control again. Also it may happen that a further lemma must be formulated by the user before the proof under consideration can be completed. All interactions are menu driven so that typing in proof scripts is avoided (see [7, 10]).

Open image in new window is implemented in Java and installers for running the system under *Windows*, *Unix/Linux* or *Mac* are available from the web [7]. When working with the system, we use proof libraries which had been set up over the years by extending them with definitions and lemmas being of general interest. When importing a definition or a lemma from a library into a case study, all program elements and proofs the imported item depends on are imported as well. The correctness proofs for Montgomery Multiplication depend on 9 procedures and 96 lemmas from our arithmetic proof library, which ranges from simple statements like associativity and commutativity of addition up to more ambitious theorems about primes and modular arithmetic. In the sequel we will only list the lemmas which are essential to understand the proofs and refer to [7] for a complete account of all used lemmas and their proofs.

## 3 Multiplicative Inverses

^{3}

### 3.1 Bézout’s Lemma

A more efficient implementation of procedure \(\mathfrak {I}\) is based on Bézout’s Lemma stating that the greatest common divisor can be represented as a linear combination of its arguments:

**Bézout’s Lemma**

*For all *\(x,y\in \mathbb {N}\,\)*some *\(s,t\in \mathbb {Z} \)* exist such that *\(gcd(x,y)=x\cdot s+y\cdot t\).

If \(y\ne 0\), \(\mathfrak {I}_{B}(x,y):=s\) *mod* *y* is defined and \(gcd(x,y)=1\) holds, then by Bézout’s Lemma \([x\cdot \mathfrak {I} _{B}(x,y)=x\cdot (s\) *mod* \(y)\equiv x\cdot s\equiv x\cdot s+y\cdot t=1]~mod\) *y*. To implement this approach, the integer *s* need to be computed which can be performed by the extended Euclidean algorithm displayed in Fig. 3. This approach is more efficient because a call of *euclid*(*x*, *y*) (and in turn of \(\mathfrak {I}_{B}(x,y)\) given as in Fig. 3) can be computed in time proportional to \(( log \) \(y)^{2}\) if \(x<y\), whereas the use of Euler’s \(\phi \)-function needs time proportional to \(2^{ log \,y}\) in the context of Montgomery Multiplication (as \(\phi (2^{k+1})=2^{k}\)).

However, \(s\in \mathbb {Z}\) might be negative so that \(y+(s\) *mod* \(y)\in \mathbb {N}\) instead of *s* *mod* *y* then must be used as the multiplicative inverse of *x* because the carriers of the rings \(R_{n}\) and \(R_{n}^{m}\) are subsets of \(\mathbb {N}\). We therefore define \(\mathfrak {I}_{B}\) as shown in Fig. 3 which complicates the proof of Lemma 1 (with \(\mathfrak {I}\) replaced by \(\mathfrak {I}_{B}\)) as this definition necessitates a proof of \([x\cdot y+x\cdot (s\) *mod* \(y)\equiv 1]\) *mod* *y* if \(s<0\).

*x*but gets stuck in the step case. We therefore command to use induction corresponding to the recursion structure of procedure \(\mathsf {euclid}\). Open image in new window responds by proving the base case and simplifying the induction conclusion in case \( sign (s)=\) ‘\(+\)’ to

*e*abbreviates \( euclid (y,(x\)

*mod*

*y*)), \(g:=\) \(( e )_{1}\), \(s:=\) \(( e )_{2}\) and \(t:=\) \(( e )_{3}\)) using the induction hypothesisand some basic arithmetic properties. We then instruct the system to use the quotient-remainder theorem for replacing

*x*at the left-hand side of the equation in (i) by \((x/y)\cdot y+(x\)

*mod*

*y*) causing Open image in new window to complete the proof. The system computes a similar proof obligation for case \( sign (s)=\ \)‘−’ which is proved in the same way.

By “basic arithmetic properties” we mean well known facts like associativity, commutativity, distributivity, cancellation properties etc. of \(+,-,\cdot ,/, gcd ,\ldots \) which are defined and proved in our arithmetic proof library. These facts are used almost everywhere by the Symbolic Evaluator so that we will not mention their use explicitly in the sequel.

*g*abbreviates \(( euclid (x,y))_{1}\) and

*s*stands for \(( euclid (x,y))_{2}\). Proof obligation (iii) represents the unpleasant case of the proof development and necessitates the invention of an auxiliary lemma for completing the proof. After some unsuccessful attempts, we eventually came up with lemma

*g*, and Open image in new window computesNow we can call the system to use Bézout’s Lemma 7 for replacing \(x\cdot |s|+g\) in (iv) by \(y\cdot |t|\) causing Open image in new window to complete the proof with Bézout’s Lemma 8 and library lemma (11) in case of \(x\ge g\) and otherwise showing that \(x<g=1\) entails \(x=0\) and \(1=g=gcd(0,y)=y\) in turn, so that \(x\cdot y-x\cdot (|s|\)

*mod*

*y*) simplifies to \(0\ \)and \([0\equiv 1]\)

*mod*

*y*rewrites to \( true \).

^{4}

*u*, Open image in new window computeswith the library lemmas (11) and

*u*substituted for

*x*,

*x*for

*y*and \(y-(z\)

*mod*

*y*) for

*z*) after

*x*factoring out, causing Open image in new window to prove (v) with the synthesized lemma

^{5}

### 3.2 Newton’s Method

Newton-Raphson iteration is a major tool in arbitrary-precision arithmetic and efficient algorithms for computing multiplicative inverses are developed in combination with Hensel Lifting [2]. Figure 5 displays an implementation by procedure \(\mathfrak {I}_{N}\) for odd numbers *x* and powers *y* of 2 (where \(\mathsf {\uparrow }\) computes exponentiation satisfying \(0\uparrow 0=1\)). Procedure \(\mathfrak {I}_{N}\) is defined via procedure \(\mathfrak {I} _{N^{\prime }}\) which is obtained from [3], viz. Algorithm 2\(^{\mathcal {\prime }}\) *Recursive Hensel*, where however ‘−’ instead of ‘\(+\)’ is used in the result term. Algorithm 2\(^{\mathcal {\prime }}\) was developed to compute a multiplicative inverse of *x* modulo \(p^{k}\) for any *x* not dividable by a prime *p* and returns a negative integer in most cases. By replacing ‘−’ with ‘\(+\)’, all calculations can be kept within \( \mathbb {N} \) so that integer arithmetic is avoided. As procedure \(\mathfrak {I} _{N^{\prime }}\) computes the absolute value of a negative integer computed by Algorithm 2\(^{\mathcal {\prime }}\), one additional subtraction is needed to obtain a multiplicative inverse which is implemented by procedure \(\mathfrak {I}_{N}\). The computation of \(\mathfrak {I}_{N}(x,2^{k})\) only requires \( log ~k\) steps (compared to \(k^{2}\) steps for \(\mathfrak {I}_{B}(x,2^{k})\)), and therefore \(\mathfrak {I}_{N}\) is the method of choice for computing a Montgomery Inverse.

However, Algorithm 2\(^{\mathcal {\prime }}\) is flawed so that we wasted some time with our verification attempts: The four *mod*-calls in the algorithm are not needed for correctness, but care for efficiency as they keep the intermediate numbers small. Now instead of using modulus \(2^{k}\) for both inner *mod*-calls, Algorithm 2\(^{\mathcal {\prime }}\) calculates *mod* \(2^{\lceil k/2\rceil }\) thus spoiling correctness. As the flawed algorithm cares for even smaller numbers, the use of *mod* \(2^{\lceil k/2\rceil }\) could be beneficial indeed, and therefore it was not obvious to us whether we failed in the verification only because some mathematical argumentation was missing. But this consideration put us on the wrong track. Becoming eventually frustrated by the unsuccessful verification attempts, we started Open image in new window *Disprover* [1] which—to our surprise—came up with the counter example \(x=3,k=2\) for Lemma 17 in less than a second.^{6} We then repaired the algorithm as displayed in Fig. 5 and subsequently verified it (cf. Lemma 20). Later we learned that the fault in Algorithm 2\(^{\mathcal {\prime }}\) has not been recognized so far and that one cannot do better to patch it as we did.^{7}

*A*stands for \(\mathfrak {I}_{N^{\prime }}((x\)

*mod*\(2^{\lceil k/2\rceil }),\lceil k/2\rceil )\). By prompting the system to use Lemma 5, proof obligation (i) is simplified to(where

*B*abbreviates \(x\cdot A\)) thus eliminating the formal clutter resulting from the

*mod*-calls in procedure \(\mathfrak {I}_{N^{\prime }}\). Next we replace \(2B+B^{2}\) by \((B+1)^{2}-1\) and then call the system to replace

*B*by \((B/C)\cdot C+R\) where \(C=2^{\lceil k/2\rceil }\) and \(R=\) ((

*x*

*mod*\(C)\cdot A\)

*mod*

*C*), which is justified by the quotient-remainder theorem as

*R*rewrites to (

*B*

*mod*

*C*) by library lemma (5). This results in proof obligationand we command to use the induction hypothesis (18) for replacing

*R*in (iii) by \(C-1\). Open image in new window then responds by computingusing library lemmas \(\forall x,y,z\):\( \mathbb {N} \) \(y\ne 0\wedge z\ne 0\wedge z\mid y\rightarrow [(x\)

*mod*\(y)\equiv x]\)

*mod*

*z*and (5) to prove \(2\not \mid (x\)

*mod*\(2^{\lceil k/2\rceil })\) for justifying the use of the induction hypothesis.

*C*in (iv), the system computesWe command to use library lemma

*true*. Finally the system simplifies (vi) to

*true*as well by unfolding the call of procedure

*mod*, and Lemma 17 is proved.

*y*is a power of 2), Open image in new window unfolds the call of procedure \(\mathfrak {I}_{N}\) and returnsNow we instruct the system to use library lemma (19) for replacing the left-hand side of the equation in (viii), and Open image in new window computesusing auxiliary lemma \(\forall x,y\text {:} \mathbb {N} \) \(2^{{\texttt {?}}}(y)\rightarrow y>\mathfrak {I}_{N^{\prime }} (x,log_{2}(y))\) and the library lemmas (11), (14) and

*y*in (ix) by \(2^{ log _{2}(y)}\) causing Open image in new window to rewrite both occurrences of \((x\cdot \mathfrak {I}_{N^{\prime }} (x,log_{2}(y))\)

*mod*

*y*) with Lemma 17 to \(y-1\) and proof obligation (ix) to

*true*in turn, thus completing the proof of (20).

## 4 Correctness of Montgomery Multiplication

*both*are needed in the

*proofs*(whereas only \(n_{m}^{{\texttt {-}}1}\) is used in

*applications*of redc and redc\(^{*}\)). Consequently procedure \(\mathfrak {I}_{N}\) cannot be used in the proofs as it obviously fails in computing \(m_{n}^{{\texttt {-}}1}\) (except for case \(n=m=1\), of course). This problem does not arise if procedure \(\mathfrak {I}_{B}\) is used instead, where \(gcd(n,m)=1\) is demanded, because \(\mathfrak {I}_{B}(n,m)=n_{m} ^{{\texttt {-}}1}\) and \(\mathfrak {I}_{B}(m,n)=m_{n}^{{\texttt {-}}1}\) for any coprimes

*n*and

*m*by Lemma 9. The replacement of \(\mathfrak {I}_{B}\) by \(\mathfrak {I}_{N}\) when computing the Montgomery Inverse then must be justified afterwards by additionally proving

*n*and

*m*, and therefore \(\mathfrak {I}\) can be used in the proofs. The use of \(\mathfrak {I}_{N}\) instead of \(\mathfrak {I}\) when computing the Montgomery Inverse is justified afterwards with lemma

*mod*\(n)\cdot \mathfrak {I}(m,n)\)

*mod*

*n*). The system then replaces the left-hand side of the equation with \(a\cdot m\)

*mod*

*n*by unfolding procedure call

*h*(

*a*,

*m*,

*n*) and simplifies the resulting equation to \( true \) with Lemma 2, the synthesized lemma (16) and the library lemmas (5) and

*m*in \(R_{n}\) can be expressed by \(\mathfrak {I}\): We call the system to prove

*q*in procedure redc can be expressed in \(R_{n}\) by \(\mathfrak {I}\) in particular (if redc is called with the Montgomery Inverse as actual parameter for the formal parameter

*z*), which is stated by lemma

*mod*\(m))\cdot \mathfrak {I}(m,n)\) causing Open image in new window to complete the proof using Lemma 3 as well as the library lemmas (5), (10), (11), (15) and \(\forall x,y\text {:} \mathbb {N} \text { }y\ne 0\rightarrow y\mid (x+(y-1)\cdot x)\).

*mod*

*n*. This is guaranteed by the conditional subtraction of

*n*from the quotient

*q*in the body of procedure redc. However, at most one subtraction of

*n*from

*q*results in the desired property only if \(n+n>q\) holds, which is formulated by lemma

*mod*

*m*) causing Open image in new window to prove the statement in the positive case with the library lemmas (5) and \(\forall x,y,z\text {:} \mathbb {N} \ x\cdot z>y\rightarrow x>y/z\) and to verify it in the negative case with the synthesized lemma (16) and the library lemmas (5), (21) and \(\forall x,y,u,v\text {:} \mathbb {N} \ x>y\wedge u\ge v\rightarrow x+u>y+v\).

*mod*

*n*property of procedure redc can be verified by proving lemma

*mod*in (28) causing Open image in new window to use the synthesized lemma (16) for computing the simplified proof obligationThen we command to unfold the call of procedure redc which simplifies toFinally we let the system use library lemma \(\forall x,y,z\text {:} \mathbb {N} \) \(x>y\wedge y\ge z\rightarrow x-z>y-z\) resulting in proof obligationwhich simplifies toby Lemma 27 and to \( true \) in turn using the plus-minus cancellation.

*mod*

*n*) and to apply lemma (26) for replacing the right-hand side by \(((x+n\cdot (x\cdot \mathfrak {i}(\mathfrak {I}(n,m),m)\text { }mod\text { }m))/m\)

*mod*

*n*) resulting in the simplified proof obligationThen we unfold the call of procedure redc causing the system to prove (v) with library lemma (5).

*mod*

*n*) and \(I=\mathfrak {i}(\mathfrak {I}(n,m),m)\)) is easily obtained by support of a further lemma, viz.

*j*for proving (29), Open image in new window proves the base case and rewrites the step case with the induction hypothesis toThen we command to replace both calls of redc with the key lemma (23) causing Open image in new window to succeed with the lemmas (2), (5), (16) and (24).

Finally the system proves (Thm 2) using lemmas (2), (5), (16), (29) and library lemma \(\forall x,y,z\text {:} \mathbb {N} \) \(x\ne 0\wedge y>z\rightarrow x\cdot y>z\) after being prompted to use (Thm 1.3) for replacing the right-hand side of the equation in (Thm 2).

## 5 Discussion and Conclusion

We presented machine assisted proofs verifying an efficient implementation of Montgomery Multiplication, where we developed the proofs ourselves as we are not aware of respective proofs published elsewhere. Our work also uncovered a serious fault in a published algorithm for computing multiplicative inverses based on Newton-Raphson Iteration [3], which could have dangerous consequences (particularly when used in cryptographic applications) if remained undetected.

Figure 7 displays the effort for obtaining the proofs (including all procedures and lemmas which had been imported from our arithmetic proof library). Column *Proc.* counts the number of user defined procedures (the recursively defined ones given in parentheses), *Lem.* is the number of user defined lemmas (the number of synthesized lemmas given in parentheses), and *Rules* counts the total number of *HPL*-proof rule applications, separated into user invoked (*User*) and system initiated (*System*) ones (with the number of uses of *Induction* given in parentheses). Column *%* gives the automation degree, i.e. the ratio between *System* and *Rules*, *Steps* lists the number of first-order proof steps performed by the Symbolic Evaluator and *Time* displays the runtime of the Symbolic Evaluator.^{8}

*Theorems 1 and 2*below displays the effort for proving Theorems 1 and 2 as illustrated in Sect. 4 (with the effort for the proofs of Lemmas 9 and 20 included).

The numbers in Fig. 7 almost coincide with the statistics obtained for other case studies in Number Theory performed with the system (see e.g. [14] and also [7] for more examples), viz. an automation degree of \({\sim }85\%\) and a success rate of \({\sim }95\%\) for the induction heuristic. All termination proofs (hence all required induction axioms in turn) had been obtained without user support, where 6 of the 12 recursively defined procedures, viz. \(\mathsf {mod}\), \(\mathsf {/}\), \(\mathsf {gcd}\), \(\mathsf {log} _{2}\), \(\mathsf {euclid}\) and \(\mathfrak {I}_{N^{\prime }}\), do not terminate by structural recursion.^{9} While an automation degree up to \(100\%\) can be achieved in mathematically simple domains, e.g. when sorting lists [7, 9], values of \(85\%\) and below are not that satisfying when concerned with *automated* reasoning. The cause is that quite often elaborate ideas for developing a proof are needed in Number Theory which are beyond the ability of the system’s heuristics guiding the proof search.^{10} We also are not aware of other reasoning systems offering more machine support for obtaining proofs in this difficult domain.

From the user’s perspective, this case study necessitated more work than expected, and it was a novel experience for us to spend some effort for verifying a very small and non-recursively defined procedure. The reason is that correctness of procedure \(\mathsf {redc}\) depends on some non-obvious and tricky number theoretic principles which made it difficult to spot the required lemmas. In fact, almost all effort was spend for the invention of the auxiliary lemmas in Sect. 4 and of Lemma 12 in Sect. 3.1. Once the “right” lemma for verifying a given proof obligation eventually was found, its proof turned out to be a routine task. The proof of Lemma 17 is an exception as it required some thoughts to create it and some effort as well to lead the system (thus spoiling the proof statistics). Proof development was significantly supported by the system’s *Disprover* [1] which (besides detecting the fault in Algorithm 2\(^{\mathcal {\prime }}\)) often helped not to waste time with trying to prove a false conjecture, where the computed counterexamples provided useful hints how to debug a lemma draft.

## Footnotes

- 1.
Exponentiation is defined here with \(0^{0}=1\) so that \( redc ( redc ^{*}( redc (0\cdot M,I,m,n),I,\) \(m,n,0),I,m,n)=1\)

*mod**n*holds in particular. - 2.
An acronym for “A Verifier for Functional Programs”.

- 3.
If \(x,y,z\in \mathbb {Z}\) and \(n\in \mathbb {N}\), then \(n{\mid } z\) abbreviates

*z*\(mod~n=0\), where*z*\(mod~n=-(|z|\)*mod**n*) if \(z<0\), and \([x\equiv y]\)*mod**n*stands for \(n{\mid } x-y\). \(x~mod~n=y\)*mod**n*is sufficient for \([x\equiv y]\)*mod**n*but only necessary, if*x*and*y*have same polarity. - 4.
At least one of \(z{\mid }(x-y)\) or \(z{\mid }(y-x)\) holds trivially because subtraction is defined such that \(a-b=0\) iff \(a\le b\).

- 5.
Synthesized lemmas are a spin-off of the system’s termination analysis.

- 6.
The Disprover is based on two heuristically controlled disproving calculi, and its implementation provides four selectable execution modes (Fast Search, Extended Search, Simple Terms and Structure Expansion). For difficult problems, the user may support the search for counter examples by presetting some of the universally quantified variables with general terms or concrete values.

- 7.
Personal communication with Jean-Guillaume Dumas.

- 8.
Time refers to running Open image in new window 3.5 under

*Windows 7 Enterprise*with an INTEL Core i7-2640M 2.80 GHz CPU using Java 1.8.0_45. - 9.
Procedure \(\mathsf {2}^{{\texttt {?}} }\mathsf {(\ldots )}\) is not user defined, but synthesized as the

*domain procedure*[12] of the incompletely defined procedure \(\mathsf {log}_{2}\). - 10.

## References

- 1.Aderhold, M., Walther, C., Szallies, D., Schlosser, A.: A fast disprover for Open image in new window. In: Ahrendt, W., Baumgartner, P., de Nivelle, H. (eds.) Proc. Workshop on Non-Theorems, Non-Validity, Non-Provability, DISPROVING 2006, Seattle, WA, pp. 59–69 (2006). http://verifun.de/documents
- 2.Brent, R., Zimmermann, P.: Modern Computer Arithmetic. Cambridge University Press, New York (2010)CrossRefGoogle Scholar
- 3.Dumas, J.: On Newton-Raphson iteration for multiplicative inverses modulo prime powers. IEEE Trans. Comput.
**63**(8), 2106–2109 (2014). https://doi.org/10.1109/TC.2013.94MathSciNetCrossRefzbMATHGoogle Scholar - 4.Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Secaucus (2003). https://doi.org/10.1007/b97644CrossRefzbMATHGoogle Scholar
- 5.Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A., Rivest, R.L.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (2001)zbMATHGoogle Scholar
- 6.Montgomery, P.L.: Modular multiplication without trial division. Math. Comput.
**44**(170), 519–521 (1985). https://doi.org/10.1090/S0025-5718-1985-0777282-XMathSciNetCrossRefzbMATHGoogle Scholar - 7.VeriFun. http://www.verifun.de
- 8.Walther, C.: On proving the termination of algorithms by machine. Artif. Intell.
**71**(1), 101–157 (1994). https://doi.org/10.1016/0004-3702(94)90063-9MathSciNetCrossRefzbMATHGoogle Scholar - 9.Walther, C.: A largely automated verification of GHC’s natural mergesort. Technical report VFR 17/01, FB Informatik, Techn. Universität Darmstadt (2017)Google Scholar
- 10.Walther, C., Schweitzer, S.: Verification in the classroom. J. Autom. Reason.
**32**(1), 35–73 (2004). https://doi.org/10.1023/B:JARS.0000021872.64036.41CrossRefGoogle Scholar - 11.Walther, C., Schweitzer, S.: Automated termination analysis for incompletely defined programs. In: Baader, F., Voronkov, A. (eds.) LPAR-11. LNCS, vol. 3452, pp. 332–346. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-32275-7_22CrossRefzbMATHGoogle Scholar
- 12.Walther, C., Schweitzer, S.: Reasoning about incompletely defined programs. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR-12. LNCS, vol. 3835, pp. 427–442. Springer, Heidelberg (2005). https://doi.org/10.1007/11591191_30CrossRefzbMATHGoogle Scholar
- 13.Walther, C., Schweitzer, S.: A pragmatic approach to equality reasoning. Technical report VFR 06/02, FB Informatik, Technische Universität Darmstadt (2006). http://verifun.de/documents
- 14.Walther, C., Wasser, N.: Fermat, Euler, Wilson - Three case studies in number theory. J. Autom. Reason.
**59**(2), 267–286 (2017). https://doi.org/10.1007/s10817-016-9387-zMathSciNetCrossRefzbMATHGoogle Scholar

## Copyright information

<SimplePara><Emphasis Type="Bold">Open Access</Emphasis>This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.</SimplePara><SimplePara>The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.</SimplePara>