On CCZ-Equivalence of the Inverse Function

Total Page:16

File Type:pdf, Size:1020Kb

On CCZ-Equivalence of the Inverse Function 1 On CCZ-equivalence of the inverse function Lukas K¨olsch −1 Abstract—The inverse function x 7→ x on F2n is one of the graph of F , denoted by G = (x, F (x)): x F n , to 1 F1 { 1 ∈ 2 } most studied functions in cryptography due to its widespread the graph of F2. use as an S-box in block ciphers like AES. In this paper, we show that, if n ≥ 5, every function that is CCZ-equivalent It is obvious that two functions that are affine equivalent are to the inverse function is already EA-equivalent to it. This also EA-equivalent. Furthermore, two EA-equivalent func- confirms a conjecture by Budaghyan, Calderini and Villa. We tions are also CCZ-equivalent. In general, the concepts of also prove that every permutation that is CCZ-equivalent to the inverse function is already affine equivalent to it. The majority CCZ-equivalence and EA equivalence do differ, for example of the paper is devoted to proving that there is no permutation a bijective function is always CCZ-equivalent to its compo- −1 polynomial of the form L1(x )+ L2(x) over F2n if n ≥ 5, sitional inverse, which is not the case for EA-equivalence. where L1, L2 are nonzero linear functions. In the proof, we Note also that the size of the image set is invariant under combine Kloosterman sums, quadratic forms and tools from affine equivalence, which is generally not the case for the additive combinatorics. other two more general notions. Index Terms —Inverse function, CCZ-equivalence, EA- Particularly well studied are APN monomials, a list of all equivalence, S-boxes, permutation polynomials. known infinite families is given in Table I. The table is generally believed to be complete. We want to note that, I. INTRODUCTION while the inverse function is not APN in even dimension, its Vectorial Boolean functions play a big role in the design differential uniformity is in this case 4, which is the lowest of symmetric cryptosystems as building blocks of block known differential uniformity for a bijection known as of ciphers [4]. To resist differential attacks, a vectorial Boolean writing this paper in all even dimensions larger than 6. function should have low differential uniformity. Exponent Conditions r Definition 1. A function F : F2n F2n has differential Gold 2 + 1 gcd(r, n) = 1 [12] → 2r r uniformity d, if Kasami 2 − 2 + 1 gcd(r, n) = 1 [17] Welch 2t + 3 n = 2t + 1 [9] t t d =∗ max x: F (x)+ F (x + a)= b . Niho 2 − 2 2 − 1 n = 2t + 1, t even [10] a∈F ,b∈F n 2n 2 |{ }| t 3t+1 2 − 2 2 − 1 n = 2t + 1, t odd A function with differential uniformity 2 is called almost Inverse 2n − 2 n odd [23] Dobbertin 4r 3r 2r r − n r [11] perfect nonlinear (APN) on F2n . 2 + 2 + 2 + 2 1 = 5 F As the differential uniformity is always even, APN functions TABLE I: List of known APN exponents over 2n up to CCZ-equivalence. yield the best resistance against differential attacks. The differential uniformity and in particular the APN prop- Especially the concept of CCZ-equivalence has been exten- erty is preserved by certain transformations, which define sively studied in the past years since it is a powerful tool for equivalence relations on the set of vectorial Boolean func- constructing and studying cryptological functions. arXiv:2008.08398v2 [cs.IT] 7 Mar 2021 tions. The most widely used notions of equivalence are Let us denote by the EA-class of F the set of all func- affine equivalence, extended affine equivalence and CCZ- tions EA-equivalent to a vectorial Boolean function F , and equivalence. similarly by CCZ-class of F the set of all functions CCZ- equivalent to F . Since EA-equivalence is a special case of Definition 2. Two functions F , F : F n F n are called 1 2 2 2 CCZ-equivalence, we can partition a CCZ-class into EA- extended affine equivalent (EA-equivalent)→if there are affine classes. Experimental results show that for many functions permutations A1, A2 and an affine mapping A3 from F2n to F : F n F n the CCZ-class of F coincides with its EA- itself such that 2 2 class if F→is not a permutation. If F is a permutation, then A1(F1(A2(x))) + A3(x)= F2(x). (1) its CCZ class often consists of precisely 2 EA-classes, with F and F −1 being representatives for the two EA-classes. Of F1 and F2 are called affine equivalent if they are EA- course, it is possible to have more than two EA-classes in one equivalent and it is possible to choose A3 =0 in Eq. (1). CCZ-class, this is for example the case for Gold functions Moreover, F1 and F2 are called CCZ-equivalent if there is in odd dimension [3, Theorem 1]. Additionally, it is possible an affine, bijective mapping A on F n F n that maps the 2 × 2 that a permutation and its inverse are in the same EA-class, Lukas K¨olsch is with Department of Mathematics, University of Rostock, this happens for example naturally for involutions like the 2n−2 Germany. Email: [email protected] inverse function x x over F n . 7→ 2 2 Since CCZ-equivalence is a much more difficult concept permutations with good cryptographic properties is to look than EA-equivalence, it is desirable to understand when the for a permutation in the CCZ-class of a non-permutation CCZ-class of F can be described entirely by combining EA- with good cryptographic properties, since CCZ-equivalence equivalence and the inverse transformation (in the case that preserves many important properties. This is precisely the F is invertible). This is a problem that is open even for technique that was used to find the only known APN per- most of the APN monomials in Table I. As noted earlier, mutation in even dimension [1]. Thus it is a very interesting the CCZ-class of Gold functions in odd dimension contains question to classify all permutations that are in the CCZ- more than 2 EA-classes and thus cannot be described with class of an APN function. Treating this problem for infinite EA-equivalence and the inverse transformation alone. For families is however very difficult. To the authors knowledge, all other monomials, this question is still open. Budaghyan, the only result in this direction is found in a recent paper [14], Calderini and Villa conjectured the following based on a where it was shown that there is no permutation in the CCZ- computer search for small values of n: class of the APN Gold functions over F2n with n even and that there is no permutation in the CCZ-class of APN Kasami Conjecture 1 ([2, Conjecture 4.14]). Let F (x) = xd be a functions over F n if is divisible by . The proof technique F 2 n 4 non-Gold APN monomial or the inverse function over 2n . used in [14] relies on a careful analysis of the bent component Then, every function that is CCZ-equivalent to F is EA- functions of the Gold and Kasami functions. equivalent to or to −1 (if it exists). F F In this paper, we will also classify all permutations in the In this paper we are going to confirm this conjecture in the CCZ-class of the inverse function (both in odd and even case of the inverse function, i.e. we show that the CCZ-class dimension). We show that (excluding some sporadic cases in 2n−2 of the function x x on F2n coincides with its low dimension) the only permutations in the CCZ-class are EA-class. This is to our7→ knowledge the first theoretical result the “trivial” ones, i.e. the ones that are affine equivalent to the of this kind. Note that, in many ways, the inverse function is inverse function. Of course, since the inverse function does actually the most interesting case because of its widespread not have any bent components, the approach is necessarily use in cryptography, most famously as the S-box in AES. different from the approach in [14]. Instead, we are going to use the following proposition which connects both of the In [25], [7] it was shown that two power functions x xk problems we mentioned to a special type of permutation l 7→ polynomial. The proof of the proposition can be found and x x on F2n are CCZ-equivalent if and only if k 2il7→(mod 2n 1) or kl 2i (mod 2n 1) for some in [13], co-written by the author of this paper, that deals with i ≡ N. Our result− can then≡ be seen as a− generalization the same questions as this paper but only achieved partial of∈ this result for the specific case k = 2n 2 since the results. only power functions that are EA-equivalent− to the inverse Proposition 1 ([13]). (a) Let F : F2n F2n and assume i n function are the power functions with l 2 (2 2) no permutation of the form F (x)+→L(x) exists where (mod 2n 1). Our approach in this paper is≡ very different− − L is a non-zero linear function. Then every permutation from the one used in [25], [7], which relies on sophisticated that is EA-equivalent to F is already affine equivalent tools exploiting the structure of the automorphism groups to it. of power functions. It seems difficult to use these group (b) Let F : F2n F2n and assume no permutation of theoretical tools to settle the complete relationship of EA- → the form L1(F (x)) + L2(x) exists where L1,L2 are and CCZ-equivalence between (APN) power functions and non-zero linear functions.
Recommended publications
  • Inverse of Exponential Functions Are Logarithmic Functions
    Math Instructional Framework Full Name Math III Unit 3 Lesson 2 Time Frame Unit Name Logarithmic Functions as Inverses of Exponential Functions Learning Task/Topics/ Task 2: How long Does It Take? Themes Task 3: The Population of Exponentia Task 4: Modeling Natural Phenomena on Earth Culminating Task: Traveling to Exponentia Standards and Elements MM3A2. Students will explore logarithmic functions as inverses of exponential functions. c. Define logarithmic functions as inverses of exponential functions. Lesson Essential Questions How can you graph the inverse of an exponential function? Activator PROBLEM 2.Task 3: The Population of Exponentia (Problem 1 could be completed prior) Work Session Inverse of Exponential Functions are Logarithmic Functions A Graph the inverse of exponential functions. B Graph logarithmic functions. See Notes Below. VOCABULARY Asymptote: A line or curve that describes the end behavior of the graph. A graph never crosses a vertical asymptote but it may cross a horizontal or oblique asymptote. Common logarithm: A logarithm with a base of 10. A common logarithm is the power, a, such that 10a = b. The common logarithm of x is written log x. For example, log 100 = 2 because 102 = 100. Exponential functions: A function of the form y = a·bx where a > 0 and either 0 < b < 1 or b > 1. Logarithmic functions: A function of the form y = logbx, with b 1 and b and x both positive. A logarithmic x function is the inverse of an exponential function. The inverse of y = b is y = logbx. Logarithm: The logarithm base b of a number x, logbx, is the power to which b must be raised to equal x.
    [Show full text]
  • IVC Factsheet Functions Comp Inverse
    Imperial Valley College Math Lab Functions: Composition and Inverse Functions FUNCTION COMPOSITION In order to perform a composition of functions, it is essential to be familiar with function notation. If you see something of the form “푓(푥) = [expression in terms of x]”, this means that whatever you see in the parentheses following f should be substituted for x in the expression. This can include numbers, variables, other expressions, and even other functions. EXAMPLE: 푓(푥) = 4푥2 − 13푥 푓(2) = 4 ∙ 22 − 13(2) 푓(−9) = 4(−9)2 − 13(−9) 푓(푎) = 4푎2 − 13푎 푓(푐3) = 4(푐3)2 − 13푐3 푓(ℎ + 5) = 4(ℎ + 5)2 − 13(ℎ + 5) Etc. A composition of functions occurs when one function is “plugged into” another function. The notation (푓 ○푔)(푥) is pronounced “푓 of 푔 of 푥”, and it literally means 푓(푔(푥)). In other words, you “plug” the 푔(푥) function into the 푓(푥) function. Similarly, (푔 ○푓)(푥) is pronounced “푔 of 푓 of 푥”, and it literally means 푔(푓(푥)). In other words, you “plug” the 푓(푥) function into the 푔(푥) function. WARNING: Be careful not to confuse (푓 ○푔)(푥) with (푓 ∙ 푔)(푥), which means 푓(푥) ∙ 푔(푥) . EXAMPLES: 푓(푥) = 4푥2 − 13푥 푔(푥) = 2푥 + 1 a. (푓 ○푔)(푥) = 푓(푔(푥)) = 4[푔(푥)]2 − 13 ∙ 푔(푥) = 4(2푥 + 1)2 − 13(2푥 + 1) = [푠푚푝푙푓푦] … = 16푥2 − 10푥 − 9 b. (푔 ○푓)(푥) = 푔(푓(푥)) = 2 ∙ 푓(푥) + 1 = 2(4푥2 − 13푥) + 1 = 8푥2 − 26푥 + 1 A function can even be “composed” with itself: c.
    [Show full text]
  • 5.7 Inverses and Radical Functions Finding the Inverse Of
    SECTION 5.7 iNverses ANd rAdicAl fuNctioNs 435 leARnIng ObjeCTIveS In this section, you will: • Find the inverse of an invertible polynomial function. • Restrict the domain to find the inverse of a polynomial function. 5.7 InveRSeS And RAdICAl FUnCTIOnS A mound of gravel is in the shape of a cone with the height equal to twice the radius. Figure 1 The volume is found using a formula from elementary geometry. __1 V = πr 2 h 3 __1 = πr 2(2r) 3 __2 = πr 3 3 We have written the volume V in terms of the radius r. However, in some cases, we may start out with the volume and want to find the radius. For example: A customer purchases 100 cubic feet of gravel to construct a cone shape mound with a height twice the radius. What are the radius and height of the new cone? To answer this question, we use the formula ____ 3 3V r = ___ √ 2π This function is the inverse of the formula for V in terms of r. In this section, we will explore the inverses of polynomial and rational functions and in particular the radical functions we encounter in the process. Finding the Inverse of a Polynomial Function Two functions f and g are inverse functions if for every coordinate pair in f, (a, b), there exists a corresponding coordinate pair in the inverse function, g, (b, a). In other words, the coordinate pairs of the inverse functions have the input and output interchanged. Only one-to-one functions have inverses. Recall that a one-to-one function has a unique output value for each input value and passes the horizontal line test.
    [Show full text]
  • Inverse Trigonometric Functions
    Chapter 2 INVERSE TRIGONOMETRIC FUNCTIONS vMathematics, in general, is fundamentally the science of self-evident things. — FELIX KLEIN v 2.1 Introduction In Chapter 1, we have studied that the inverse of a function f, denoted by f–1, exists if f is one-one and onto. There are many functions which are not one-one, onto or both and hence we can not talk of their inverses. In Class XI, we studied that trigonometric functions are not one-one and onto over their natural domains and ranges and hence their inverses do not exist. In this chapter, we shall study about the restrictions on domains and ranges of trigonometric functions which ensure the existence of their inverses and observe their behaviour through graphical representations. Besides, some elementary properties will also be discussed. The inverse trigonometric functions play an important Aryabhata role in calculus for they serve to define many integrals. (476-550 A. D.) The concepts of inverse trigonometric functions is also used in science and engineering. 2.2 Basic Concepts In Class XI, we have studied trigonometric functions, which are defined as follows: sine function, i.e., sine : R → [– 1, 1] cosine function, i.e., cos : R → [– 1, 1] π tangent function, i.e., tan : R – { x : x = (2n + 1) , n ∈ Z} → R 2 cotangent function, i.e., cot : R – { x : x = nπ, n ∈ Z} → R π secant function, i.e., sec : R – { x : x = (2n + 1) , n ∈ Z} → R – (– 1, 1) 2 cosecant function, i.e., cosec : R – { x : x = nπ, n ∈ Z} → R – (– 1, 1) 2021-22 34 MATHEMATICS We have also learnt in Chapter 1 that if f : X→Y such that f(x) = y is one-one and onto, then we can define a unique function g : Y→X such that g(y) = x, where x ∈ X and y = f(x), y ∈ Y.
    [Show full text]
  • Calculus Formulas and Theorems
    Formulas and Theorems for Reference I. Tbigonometric Formulas l. sin2d+c,cis2d:1 sec2d l*cot20:<:sc:20 +.I sin(-d) : -sitt0 t,rs(-//) = t r1sl/ : -tallH 7. sin(A* B) :sitrAcosB*silBcosA 8. : siri A cos B - siu B <:os,;l 9. cos(A+ B) - cos,4cos B - siuA siriB 10. cos(A- B) : cosA cosB + silrA sirrB 11. 2 sirrd t:osd 12. <'os20- coS2(i - siu20 : 2<'os2o - I - 1 - 2sin20 I 13. tan d : <.rft0 (:ost/ I 14. <:ol0 : sirrd tattH 1 15. (:OS I/ 1 16. cscd - ri" 6i /F tl r(. cos[I ^ -el : sitt d \l 18. -01 : COSA 215 216 Formulas and Theorems II. Differentiation Formulas !(r") - trr:"-1 Q,:I' ]tra-fg'+gf' gJ'-,f g' - * (i) ,l' ,I - (tt(.r))9'(.,') ,i;.[tyt.rt) l'' d, \ (sttt rrJ .* ('oqI' .7, tJ, \ . ./ stll lr dr. l('os J { 1a,,,t,:r) - .,' o.t "11'2 1(<,ot.r') - (,.(,2.r' Q:T rl , (sc'c:.r'J: sPl'.r tall 11 ,7, d, - (<:s<t.r,; - (ls(].]'(rot;.r fr("'),t -.'' ,1 - fr(u") o,'ltrc ,l ,, 1 ' tlll ri - (l.t' .f d,^ --: I -iAl'CSllLl'l t!.r' J1 - rz 1(Arcsi' r) : oT Il12 Formulas and Theorems 2I7 III. Integration Formulas 1. ,f "or:artC 2. [\0,-trrlrl *(' .t "r 3. [,' ,t.,: r^x| (' ,I 4. In' a,,: lL , ,' .l 111Q 5. In., a.r: .rhr.r' .r r (' ,l f 6. sirr.r d.r' - ( os.r'-t C ./ 7. /.,,.r' dr : sitr.i'| (' .t 8. tl:r:hr sec,rl+ C or ln Jccrsrl+ C ,f'r^rr f 9.
    [Show full text]
  • Grade 12 Mathematics Inverse Functions
    MATHEMATICS GRADE 12 INVERSE FUNCTIONS FUNCTIONS AND INVERSE FUNCTIONS A FUNCTION is a relationship or a rule between the input (x-values/domain) and the output (y-values/ range) Input-value output-value 2 5 0 function 1 -2 2 The INVERSE FUNCTION is a rule that reverses the input and output values of a function. If represents a function, then is the inverse function. Input-value output-value Input-value output-value 풇 풇 ퟏ 2 5 5 2 Inverse 0 function 1 0 1 function -2 -3 -3 -2 Functions can be on – to – one or many – to – one relations. NOTE: if a relation is one – to – many, then it is NOT a function. 1 MATHEMATICS GRADE 12 INVERSE FUNCTIONS HOW TO DETERMINE WHETHER THE GRAPH IS A FUNCTION OR NOT i. Vertical – line test: The vertical –line test is used to determine whether a graph is a function or not a function. To determine whether a graph is a function, draw a vertical line parallel to the y-axis or perpendicular to the x- axis. If the line intersects the graph once then graph is a function. If the line intersects the graph more than once then the relation is not a function of x. Because functions are single-valued relations and a particular x-value is mapped onto one and only one y-value. Function not a function (one to many relation) TEST FOR ONE –TO– ONE FUNCTION ii. Horizontal – line test The horizontal – line test is used to determine whether a function is a one-to-one function.
    [Show full text]
  • Derivative of the Inverse of a Function One Very Important Application of Implicit Differentiation Is to finding Deriva­ Tives of Inverse Functions
    Derivative of the Inverse of a Function One very important application of implicit differentiation is to finding deriva­ tives of inverse functions. We start with a simple example. We might simplify the equation y = px (x > 0) by squaring both sides to get y2 = x. We could use function notation here to say that y = f(x) = px and x = g(y) = y2. In general, we look for functions y = f(x) and g(y) = x for which g(f(x)) = x. If this is the case, then g is the inverse of f (we write g = f −1) and f is the inverse of g (we write f = g−1). How are the graphs of a function and its inverse related? We start by graphing f(x) = px. Next we want to graph the inverse of f, which is g(y) = x. But this is exactly the graph we just drew. To compare the graphs of the functions f and f −1 we have to exchange x and y in the equation for f −1 . So to compare f(x) = px to its inverse we replace y’s by x’s and graph g(x) = x2. 1 2 f − (x)=x y = x f(x)=√x −1 Figure 1: The graph of f is the reflection of the graph of f across the line y = x In general, if you have the graph of a function f you can find the graph of −1 f by exchanging the x- and y-coordinates of all the points on the graph.
    [Show full text]
  • Functions-Handoutnonotes.Pdf
    Introduction Functions Slides by Christopher M. Bourke You’ve already encountered functions throughout your education. Instructor: Berthe Y. Choueiry f(x, y) = x + y f(x) = x f(x) = sin x Spring 2006 Here, however, we will study functions on discrete domains and ranges. Moreover, we generalize functions to mappings. Thus, there may not always be a “nice” way of writing functions like Computer Science & Engineering 235 above. Introduction to Discrete Mathematics Sections 1.8 of Rosen [email protected] Definition Definitions Function Terminology Definition A function f from a set A to a set B is an assignment of exactly Definition one element of B to each element of A. We write f(a) = b if b is Let f : A → B and let f(a) = b. Then we use the following the unique element of B assigned by the function f to the element terminology: a ∈ A. If f is a function from A to B, we write I A is the domain of f, denoted dom(f). f : A → B I B is the codomain of f. This can be read as “f maps A to B”. I b is the image of a. I a is the preimage of b. Note the subtlety: I The range of f is the set of all images of elements of A, denoted rng(f). I Each and every element in A has a single mapping. I Each element in B may be mapped to by several elements in A or not at all. Definitions Definition I Visualization More Definitions Preimage Range Image, f(a) = b Definition f Let f1 and f2 be functions from a set A to R.
    [Show full text]
  • Basic Functions and Their Inverses Definition. a Function Is a Rule That
    Basic Functions and Their Inverses Definition. A function is a rule that assigns to every x value in the domain, one and only one y value in the range. Definition. A function is one-to-one if for every y value in the range, there is one and only one x value such that f(x) = y: Definition. Inverse Function: Suppose f(x) is a one-to-one function with domain D and range R. The inverse function f −1(x) is defined by f −1(b) = a if f(a) = b The domain of f −1(x) is R and the range of f −1(x) is D. Finding an Inverse: f −1(x) is a reflection of f(x) through the line y = x. To calculate f −1(x): 1. Solve the equation y = f(x) for x. This gives a formula x = f −1(y) where x is expressed as a function of y. 2. Interchange x and y to obtain the expression y = f −1(x) Some Standard Functions Figure 1: The Absolute Value Function Note: This function is NOT one-to-one so it does not have an inverse. However, you could invert the section where x ≥ 0 or the section x ≤ 0 1 Some Standard Functions and Their Inverses Figure 2: The Reciprocal Function Figure 3: The Quadratic Function and its Inverse 2 Some Standard Functions and Their Inverses Figure 4: The Cubic Function and its Inverse Figure 5: The Exponential Function and the Natural Log 3 Some Standard Functions and Their Inverses Figure 6: The Sine Function and its Inverse Figure 7: The Cosine Function and its Inverse 4 Some Standard Functions and Their Inverses Figure 8: The Tangent Function and its Inverse Figure 9: The Cotangent Function and its Inverse 5 Some Standard Functions and Their Inverses Figure 10: The Secant Function and its Inverse Figure 11: The Cosecant Function and its Inverse 6.
    [Show full text]
  • INVERSE FUNCTION THEOREM and SURFACES in Rn Let F ∈ C K(U;Rn)
    INVERSE FUNCTION THEOREM and SURFACES IN Rn Let f 2 Ck(U; Rn), with U ⊂ Rn open (k ≥ 1). Assume df(a) 2 GL(Rn), where a 2 U. The Inverse Function Theorem says there is an open n n neighborhood V ⊂ U of a in R so that fjV : V ! R is a homeomorphism onto its image W = f(V ), an open subset of Rn; the inverse g = f −1 : W ! V is a Ck map. The inverse function theorem as an existence theorem. Given f : X ! Y (X; Y Banach spaces) and y 2 Y , we seek to solve the nonlinear equation: f(x) = y: The idea is that if f is close (in some sense) to a linear operator A 2 L(X; Y ) for which the problem is uniquely solvable, and (for a given b 2 Y ) we happen to know a solution a 2 X to f(x) = b, then for values y close to b the equation should have a unique solution (close to a). For example, suppose f has the form f(x) = Ax + φ(x), where A 2 L(X; Y ) is invertible (with bounded inverse) and φ : X ! Y is Lipschitz, with a small Lipschitz constant Lip(φ). Then to solve Ax + φ(x) = y assuming the linear problem Av = w can be solved uniquely for any w 2 Y −1 (that is, A is invertible, and jvjX ≤ CjwjY , where C = jjA jj) we compute successive approximations, starting from an arbitrary a 2 X and solving the sequence of linear problems with given `right-hand side': Ax1 = y − φ(a); Ax2 = y − φ(x1); Ax3 = y − φ(x2); ··· Convergence of (xn) is established by setting this up as a fixed point problem, for F (x) = A−1[y − φ(x)]: x1 = F (a); x2 = F (x1); ··· Convergence to a fixed point is guaranteed provided F is a contraction of X: jF (x) − F (¯x)j ≤ λjx − x¯j, where 0 < λ < 1.
    [Show full text]
  • Chapter 14 the Inverse Function Theorem
    Chapter 14 The Inverse Function Theorem 14.1 The Intermediate Value Property 14.1 Assumption (Intermediate value property 1.) Let a, b be real numbers with a < b, and let f be a continuous function from [a, b] to R such that f(a) < 0 and f(b) > 0. Then there is some number c ∈ (a, b) such that f(c) = 0. (b,f(b)) (c,f(c)) (a,f(a)) The intermediate value theorem was first proved in 1817 by Bernard Bolzano (1781–1848). However Bolzano published his proof in a rather obscure Bo- hemian journal, and his work did not become well known until much later. Before the nineteenth century the theorem was often assumed implicitly, i.e. it was used without stating that it was an assumption. 287 288 CHAPTER 14. THE INVERSE FUNCTION THEOREM 14.2 Definition (c is between a and b.) Let a, b and c be real numbers with a 6= b. We say that c is between a and b if either a < c < b or b < c < a. 14.3 Corollary (Intermediate value property 2.) Let f be a continuous function from some interval [a, b] to R, such that f(a) and f(b) have opposite signs. Then there is some number c between a and b such that f(c) = 0. Proof: If f(a) < 0 < f(b) the result follows from assumption 14.1. Suppose that f(b) < 0 < f(a). Let g(x) = −f(x) for all x ∈ [a, b]. then g is a continuous function on [a, b] and g(a) < 0 < g(b).
    [Show full text]
  • Explicit Construction of the Inverse of an Analytic Real Function: Some Applications
    mathematics Article Explicit Construction of the Inverse of an Analytic Real Function: Some Applications Joaquín Moreno 1, Miguel A. López 2,* and Raquel Martínez 2 1 Department of Applied Mathematics, Superior Technical School of Building Engineering, Polytechnic University of Valencia, 46022 Valencia, Spain; jmfl[email protected] 2 SIDIS Research Group, Department of Mathematics and Institute of Applied Mathematics in Science and Engineering (IMACI), Polytechnic School of Cuenca, University of Castilla-La Mancha, 16071 Cuenca, Spain; [email protected] * Correspondence: [email protected] Received: 12 October 2020; Accepted: 27 November 2020; Published: 3 December 2020 Abstract: In this paper, we introduce a general procedure to construct the Taylor series development of the inverse of an analytical function; in other words, given y = f (x), we provide the power series that defines its inverse x = h f (y). We apply the obtained results to solve nonlinear equations in an analytic way, and generalize Catalan and Fuss–Catalan numbers. Keywords: inverse functions; Taylor series; Taylor Remainder; nonlinear equations; Catalan numbers; Fuss–Catalan numbers MSC: 40E99; 26A99; 30B10; 05C90 1. Introduction In this paper, we have taken as a basis the previous works [1,2], in which the inverse of a polynomial function is constructed, with the aim of generalizing the methods developed there to any analytic function. That is to say: given an analytic function around the point x0: ¥ (p) f (x0) p f (x) = f (x0) + ∑ (x − x0) p=1 p! where f (p)(x) is the p-th derivative of f (x), throughout these lines, we construction the function, x = h f (y), with y = f (x) and, therefore, x0 = h f (y0) and y0 = f (x0), such that: (p) ¥ h (y ) f 0 p h f (y) = h f (y0) + ∑ (y − y0) (1) p=1 p! To accomplish this task we have organized this article as follows: • In Section2, background theory is presented.
    [Show full text]