The Schönhage–Strassen algorithm is an asymptotically fast multiplication algorithm for large integers, published by Arnold Schönhage and Volker Strassen in 1971.[1] It works by recursively applying fast Fourier transform (FFT) over the integers modulo 2 n + 1 {\displaystyle 2^{n}+1} . The run-time bit complexity to multiply two n-digit numbers using the algorithm is O ( n ⋅ log n ⋅ log log n ) {\displaystyle O(n\cdot \log n\cdot \log \log n)} in big O notation.
The Schönhage–Strassen algorithm was the asymptotically fastest multiplication method known from 1971 until 2007. It is asymptotically faster than older methods such as Karatsuba and Toom–Cook multiplication, and starts to outperform them in practice for numbers beyond about 10,000 to 100,000 decimal digits.[2] In 2007, Martin Fürer published an algorithm with faster asymptotic complexity.[3] In 2019, David Harvey and Joris van der Hoeven demonstrated that multi-digit multiplication has theoretical O ( n log n ) {\displaystyle O(n\log n)} complexity; however, their algorithm has constant factors which make it impossibly slow for any conceivable practical problem (see galactic algorithm).[4]
Applications of the Schönhage–Strassen algorithm include large computations done for their own sake such as the Great Internet Mersenne Prime Search and approximations of π, as well as practical applications such as Lenstra elliptic curve factorization via Kronecker substitution, which reduces polynomial multiplication to integer multiplication.[5][6]
This section has a simplified version of the algorithm, showing how to compute the product a b {\displaystyle ab} of two natural numbers a , b {\displaystyle a,b} , modulo a number of the form 2 n + 1 {\displaystyle 2^{n}+1} , where n = 2 k M {\displaystyle n=2^{k}M} is some fixed number. The integers a , b {\displaystyle a,b} are to be divided into D = 2 k {\displaystyle D=2^{k}} blocks of M {\displaystyle M} bits, so in practical implementations, it is important to strike the right balance between the parameters M , k {\displaystyle M,k} . In any case, this algorithm will provide a way to multiply two positive integers, provided n {\displaystyle n} is chosen so that a b < 2 n + 1 {\displaystyle ab<2^{n}+1} .
Let n = D M {\displaystyle n=DM} be the number of bits in the signals a {\displaystyle a} and b {\displaystyle b} , where D = 2 k {\displaystyle D=2^{k}} is a power of two. Divide the signals a {\displaystyle a} and b {\displaystyle b} into D {\displaystyle D} blocks of M {\displaystyle M} bits each, storing the resulting blocks as arrays A , B {\displaystyle A,B} (whose entries we shall consider for simplicity as arbitrary precision integers).
We now select a modulus for the Fourier transform, as follows. Let M ′ {\displaystyle M'} be such that D M ′ ≥ 2 M + k {\displaystyle DM'\geq 2M+k} . Also put n ′ = D M ′ {\displaystyle n'=DM'} , and regard the elements of the arrays A , B {\displaystyle A,B} as (arbitrary precision) integers modulo 2 n ′ + 1 {\displaystyle 2^{n'}+1} . Observe that since 2 n ′ + 1 ≥ 2 2 M + k + 1 = D 2 2 M + 1 {\displaystyle 2^{n'}+1\geq 2^{2M+k}+1=D2^{2M}+1} , the modulus is large enough to accommodate any carries that can result from multiplying a {\displaystyle a} and b {\displaystyle b} . Thus, the product a b {\displaystyle ab} (modulo 2 n + 1 {\displaystyle 2^{n}+1} ) can be calculated by evaluating the convolution of A , B {\displaystyle A,B} . Also, with g = 2 2 M ′ {\displaystyle g=2^{2M'}} , we have g D / 2 ≡ − 1 ( mod 2 n ′ + 1 ) {\displaystyle g^{D/2}\equiv -1{\pmod {2^{n'}+1}}} , and so g {\displaystyle g} is a primitive D {\displaystyle D} th root of unity modulo 2 n ′ + 1 {\displaystyle 2^{n'}+1} .
We now take the discrete Fourier transform of the arrays A , B {\displaystyle A,B} in the ring Z / ( 2 n ′ + 1 ) Z {\displaystyle \mathbb {Z} /(2^{n'}+1)\mathbb {Z} } , using the root of unity g {\displaystyle g} for the Fourier basis, giving the transformed arrays A ^ , B ^ {\displaystyle {\widehat {A}},{\widehat {B}}} . Because D = 2 k {\displaystyle D=2^{k}} is a power of two, this can be achieved in logarithmic time using a fast Fourier transform.
Let C ^ i = A ^ i B ^ i {\displaystyle {\widehat {C}}_{i}={\widehat {A}}_{i}{\widehat {B}}_{i}} (pointwise product), and compute the inverse transform C {\displaystyle C} of the array C ^ {\displaystyle {\widehat {C}}} , again using the root of unity g {\displaystyle g} . The array C {\displaystyle C} is now the convolution of the arrays A , B {\displaystyle A,B} . Finally, the product a b ( mod 2 n + 1 ) {\displaystyle ab{\pmod {2^{n}+1}}} is given by evaluating a b ≡ ∑ j C j 2 M j mod 2 n + 1. {\displaystyle ab\equiv \sum _{j}C_{j}2^{Mj}\mod {2^{n}+1}.}
This basic algorithm can be improved in several ways. Firstly, it is not necessary to store the digits of a , b {\displaystyle a,b} to arbitrary precision, but rather only up to n ′ + 1 {\displaystyle n'+1} bits, which gives a more efficient machine representation of the arrays A , B {\displaystyle A,B} . Secondly, it is clear that the multiplications in the forward transforms are simple bit shifts. With some care, it is also possible to compute the inverse transform using only shifts. Taking care, it is thus possible to eliminate any true multiplications from the algorithm except for where the pointwise product C ^ i = A ^ i B ^ i {\displaystyle {\widehat {C}}_{i}={\widehat {A}}_{i}{\widehat {B}}_{i}} is evaluated. It is therefore advantageous to select the parameters D , M {\displaystyle D,M} so that this pointwise product can be performed efficiently, either because it is a single machine word or using some optimized algorithm for multiplying integers of a (ideally small) number of words. Selecting the parameters D , M {\displaystyle D,M} is thus an important area for further optimization of the method.
Every number in base B, can be written as a polynomial:
Furthermore, multiplication of two numbers could be thought of as a product of two polynomials:
Because, for B k {\displaystyle B^{k}} : c k = ∑ ( i , j ) : i + j = k a i b j = ∑ i = 0 k a i b k − i {\displaystyle c_{k}=\sum _{(i,j):i+j=k}{a_{i}b_{j}}=\sum _{i=0}^{k}{a_{i}b_{k-i}}} , we have a convolution.
By using FFT (fast Fourier transform), used in the original version rather than NTT (Number-theoretic transform),[7] with convolution rule; we get
That is; C k = a k ∙ b k {\displaystyle C_{k}=a_{k}\bullet b_{k}} , where C k {\displaystyle C_{k}} is the corresponding coefficient in Fourier space. This can also be written as: fft ( a ∗ b ) = fft ( a ) ∙ fft ( b ) {\displaystyle {\text{fft}}(a*b)={\text{fft}}(a)\bullet {\text{fft}}(b)} .
We have the same coefficients due to linearity under the Fourier transform, and because these polynomials only consist of one unique term per coefficient:
Convolution rule: f ^ ( X ∗ Y ) = f ^ ( X ) ∙ f ^ ( Y ) {\displaystyle {\hat {f}}(X*Y)=\ {\hat {f}}(X)\bullet {\hat {f}}(Y)}
We have reduced our convolution problem to product problem, through FFT.
By finding the FFT of the polynomial interpolation of each C k {\displaystyle C_{k}} , one can determine the desired coefficients.
This algorithm uses the divide-and-conquer method to divide the problem into subproblems.
By letting:
where θ N = − 1 {\displaystyle \theta ^{N}=-1} is the nth root, one sees that:[8]
This mean, one can use weight θ i {\displaystyle \theta ^{i}} , and then multiply with θ − k {\displaystyle \theta ^{-k}} after.
Instead of using weight, as θ N = − 1 {\displaystyle \theta ^{N}=-1} , in first step of recursion (when n = N {\displaystyle n=N} ), one can calculate:
In a normal FFT which operates over complex numbers, one would use:
However, FFT can also be used as a NTT (number theoretic transformation) in Schönhage–Strassen. This means that we have to use θ to generate numbers in a finite field (for example G F ( 2 n + 1 ) {\displaystyle \mathrm {GF} (2^{n}+1)} ).
A root of unity under a finite field GF(r), is an element a such that θ r − 1 ≡ 1 {\displaystyle \theta ^{r-1}\equiv 1} or θ r ≡ θ {\displaystyle \theta ^{r}\equiv \theta } . For example GF(p), where p is a prime number, gives { 1 , 2 , … , p − 1 } {\displaystyle \{1,2,\ldots ,p-1\}} .
Notice that 2 n ≡ − 1 {\displaystyle 2^{n}\equiv -1} in GF ( 2 n + 1 ) {\displaystyle \operatorname {GF} (2^{n}+1)} and 2 ≡ − 1 {\displaystyle {\sqrt {2}}\equiv -1} in GF ( 2 n + 2 + 1 ) {\displaystyle \operatorname {GF} (2^{n+2}+1)} . For these candidates, θ N ≡ − 1 {\displaystyle \theta ^{N}\equiv -1} under its finite field, and therefore act the way we want .
Same FFT algorithms can still be used, though, as long as θ is a root of unity of a finite field.
To find FFT/NTT transform, we do the following:
First product gives contribution to c k {\displaystyle c_{k}} , for each k. Second gives contribution to c k {\displaystyle c_{k}} , due to ( i + j ) {\displaystyle (i+j)} mod N ( n ) {\displaystyle N(n)} .
To do the inverse:
depending whether data needs to be normalized.
One multiplies by 2 − m {\displaystyle 2^{-m}} to normalize FFT data into a specific range, where 1 n ≡ 2 − m mod N ( n ) {\displaystyle {\frac {1}{n}}\equiv 2^{-m}{\bmod {N}}(n)} , where m is found using the modular multiplicative inverse.
In Schönhage–Strassen algorithm, N = 2 M + 1 {\displaystyle N=2^{M}+1} . This should be thought of as a binary tree, where one have values in 0 ≤ index ≤ 2 M = 2 i + j {\displaystyle 0\leq {\text{index}}\leq 2^{M}=2^{i+j}} . By letting K ∈ [ 0 , M ] {\displaystyle K\in [0,M]} , for each K one can find all i + j = K {\displaystyle i+j=K} , and group all ( i , j ) {\displaystyle (i,j)} pairs into M different groups. Using i + j = k {\displaystyle i+j=k} to group ( i , j ) {\displaystyle (i,j)} pairs through convolution is a classical problem in algorithms.[9]
Having this in mind, N = 2 M + 1 {\displaystyle N=2^{M}+1} help us to group ( i , j ) {\displaystyle (i,j)} into M 2 k {\displaystyle {\frac {M}{2^{k}}}} groups for each group of subtasks in depth k in a tree with N = 2 M 2 k + 1 {\displaystyle N=2^{\frac {M}{2^{k}}}+1}
Notice that N = 2 M + 1 = 2 2 L + 1 {\displaystyle N=2^{M}+1=2^{2^{L}}+1} , for some L. This makes N a Fermat number. When doing mod N = 2 M + 1 = 2 2 L + 1 {\displaystyle N=2^{M}+1=2^{2^{L}}+1} , we have a Fermat ring.
Because some Fermat numbers are Fermat primes, one can in some cases avoid calculations.
There are other N that could have been used, of course, with same prime number advantages. By letting N = 2 k − 1 {\displaystyle N=2^{k}-1} , one have the maximal number in a binary number with k + 1 {\displaystyle k+1} bits. N = 2 k − 1 {\displaystyle N=2^{k}-1} is a Mersenne number, that in some cases is a Mersenne prime. It is a natural candidate against Fermat number N = 2 2 L + 1 {\displaystyle N=2^{2^{L}}+1}
Doing several mod calculations against different N, can be helpful when it comes to solving integer product. By using the Chinese remainder theorem, after splitting M into smaller different types of N, one can find the answer of multiplication xy [10]
Fermat numbers and Mersenne numbers are just two types of numbers, in something called generalized Fermat Mersenne number (GSM); with formula:[11]
In this formula, M 2 , 2 k {\displaystyle M_{2,2^{k}}} is a Fermat number, and M p , 1 {\displaystyle M_{p,1}} is a Mersenne number.
This formula can be used to generate sets of equations, that can be used in CRT (Chinese remainder theorem):[12]
Furthermore; g 2 ( p − 1 ) n − 1 ≡ a 2 n − 1 ( mod M p , n ) {\displaystyle g^{2^{(p-1)n}-1}\equiv a^{2^{n}-1}{\pmod {M_{p,n}}}} , where a is an element that generates elements in { 1 , 2 , 4 , . . .2 n − 1 , 2 n } {\displaystyle \{1,2,4,...2^{n-1},2^{n}\}} in a cyclic manner.
If N = 2 t {\displaystyle N=2^{t}} , where 1 ≤ t ≤ n {\displaystyle 1\leq t\leq n} , then g t = a ( 2 n − 1 ) 2 n − t {\displaystyle g_{t}=a^{(2^{n}-1)2^{n-t}}} .
The following formula is helpful, finding a proper K (number of groups to divide N bits into) given bit size N by calculating efficiency :[13]
E = 2 N K + k n {\displaystyle E={\frac {{\frac {2N}{K}}+k}{n}}} N is bit size (the one used in 2 N + 1 {\displaystyle 2^{N}+1} ) at outermost level. K gives N K {\displaystyle {\frac {N}{K}}} groups of bits, where K = 2 k {\displaystyle K=2^{k}} .
n is found through N, K and k by finding the smallest x, such that 2 N / K + k ≤ n = K 2 x {\displaystyle 2N/K+k\leq n=K2^{x}}
If one assume efficiency above 50%, n 2 ≤ 2 N K , K ≤ n {\displaystyle {\frac {n}{2}}\leq {\frac {2N}{K}},K\leq n} and k is very small compared to rest of formula; one get
This means: When something is very effective; K is bound above by 2 N {\displaystyle 2{\sqrt {N}}} or asymptotically bound above by N {\displaystyle {\sqrt {N}}}
Following algorithm, the standard Modular Schönhage-Strassen Multiplication algorithm (with some optimizations), is found in overview through [14]
Use at least K + 1 {\displaystyle K+1} bits to store them,
For implemantion details, one can read the book Prime Numbers: A Computational Perspective.[15] This variant differs somewhat from Schönhage's original method in that it exploits the discrete weighted transform to perform negacyclic convolutions more efficiently. Another source for detailed information is Knuth's The Art of Computer Programming.[16]
This section explains a number of important practical optimizations, when implementing Schönhage–Strassen.
Below a certain cutoff point, it's more efficient to use other multiplication algorithms, such as Toom–Cook multiplication.[17]
The idea is to use 2 {\displaystyle {\sqrt {2}}} as a root of unity of order 2 n + 2 {\displaystyle 2^{n+2}} in finite field G F ( 2 n + 2 + 1 ) {\displaystyle \mathrm {GF} (2^{n+2}+1)} ( it is a solution to equation θ 2 n + 2 ≡ 1 ( mod 2 n + 2 + 1 ) {\displaystyle \theta ^{2^{n+2}}\equiv 1{\pmod {2^{n+2}+1}}} ), when weighting values in NTT (number theoretic transformation) approach. It has been shown to save 10% in integer multiplication time.[18]
By letting m = N + h {\displaystyle m=N+h} , one can compute u v mod 2 N + 1 {\displaystyle uv{\bmod {2^{N}+1}}} and ( u mod 2 h ) ( v mod 2 h ) {\displaystyle (u{\bmod {2^{h}}})(v{\bmod {2}}^{h})} . In combination with CRT (Chinese Remainder Theorem) to find exact values of multiplication uv[19]
Van Meter, Rodney; Itoh, Kohei M. (2005). "Fast Quantum Modular Exponentiation". Physical Review. 71 (5): 052320. arXiv:quant-ph/0408006. Bibcode:2005PhRvA..71e2320V. doi:10.1103/PhysRevA.71.052320. S2CID 14983569.
A discussion of practical crossover points between various algorithms can be found in: Overview of Magma V2.9 Features, arithmetic section Archived 2006-08-20 at the Wayback Machine
Luis Carlos Coronado García, "Can Schönhage multiplication speed up the RSA encryption or decryption? Archived", University of Technology, Darmstadt (2005)
The GNU Multi-Precision Library uses it for values of at least 1728 to 7808 64-bit words (33,000 to 150,000 decimal digits), depending on architecture. See:
"FFT Multiplication (GNU MP 6.2.1)". gmplib.org. Retrieved 2021-07-20.
"MUL_FFT_THRESHOLD". GMP developers' corner. Archived from the original on 24 November 2010. Retrieved 3 November 2011.
"MUL_FFT_THRESHOLD". gmplib.org. Retrieved 2021-07-20.
Fürer's algorithm is used in the Basic Polynomial Algebra Subprograms (BPAS) open source library. See: Covanov, Svyatoslav; Mohajerani, Davood; Moreno Maza, Marc; Wang, Linxiao (2019-07-08). "Big Prime Field FFT on Multi-core Processors". Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation (PDF). Beijing China: ACM. pp. 106–113. doi:10.1145/3326229.3326273. ISBN 978-1-4503-6084-5. S2CID 195848601.