MATH 235.9 WRITTEN HW 4: APPLICATIONS This Is a Collection of Short Projects Rather Than a Regular Problem Set. It Will Be Due O

Total Page:16

File Type:pdf, Size:1020Kb

MATH 235.9 WRITTEN HW 4: APPLICATIONS This Is a Collection of Short Projects Rather Than a Regular Problem Set. It Will Be Due O MATH 235.9 WRITTEN HW 4: APPLICATIONS ANDREW J. HAVENS This is a collection of short projects rather than a regular problem set. It will be due on the last day of class. Please choose at least three to work on. It is recommended you discuss these with your classmates, or work in groups as needed; however each person still must submit their individual solutions, written up in an organized way (keep problems from a given topic together!) Any additional work may be counted as bonus credit towards your written assignment average. The topics are: linear ciphers, matrices and groups, graph theory, finite vector spaces, linear recurrence relations, and quaternions. Linear Ciphers. These problems illustrate and give practice with some constructions of linear ciphers, which use linear algebra to obscure plaintext. We will first consider monoalphabetic substitution ciphers, where each letter of plaintext is mapped to a single letter of ciphertext. Affine maps in one dimension can accomplish this, and furnish simple but easy to break examples of classic ciphers. It is advised, should you choose to complete this project, that you write programs to perform the computations in this problem, as they are quite repetitive and easily amenable to coding. If you do work on this, you are welcome to come discuss your code with me. There are 26 basic letters in the english alphabet, however, since 26 is not prime, not every element of integers mod 26 can be inverted multiplicatively (consider: 2(13) ≡ 0 mod 26. Thus, we will work with the field F29 of integers mod 29. We can assign to each letter an integer, and use the remaining elements of F29 for punctuation and the space character. For example, we could use the following scheme: A B C D E F G H I J K L M N O 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 P Q R S T U V W X Y Z . ? x y 16 17 18 19 20 21 22 23 24 25 26 27 28 0 Figure 1. Our alphanumeric correspondence. Recall that the arithmetic in F29 works as follows: to take the sum of two elements, simply add the integers, then find the remainder modulo 29, e.g. 14 + 18 = 32 in Z, and 32 ≡ 3 mod 29, so in F29, 14 + 18\="3 (I will simply write ≡ for \=" henceforth in these problems, where it is clear and implicit that we are working over F29.) Similarly, for multiplication, one takes the product as usual in Z and then reduce modulo 29, e.g. 2 × 16 = 32 ≡ 3. Division ∗ by a 2 F29 − f0g =: F29 corresponds to solving the congruence ax ≡ 1 mod 29 for x 2 F29. It may be helpful to create a table of multiplicative inverses (you may look one up, or try to write a program to produce one for general Fp; the extended Euclidean algorithm is useful for this). 1 2 ANDREW J. HAVENS (1) An early cipher is known as the Caesar cipher or shift cipher, which simply shifts letters by a fixed value (this works even mod 26). For example, shifting every letter by 3 in the above scheme turns the plaintext message \is the kernel nontrivial?" to \lvcwkhcnhuqhocqrqwulyldob". Note that if we suspected it was a shift cipher, it would be easy to decode if we knew about the above alphanumeric assignment scheme: at worst we check 28 possible shifts to see if anything produced is not babble. If we are more clever, we use that \e" is the most common letter in written english, and that spaces are also common. Letters \c", \h", \l" and \q" all occur with the same high frequency (12%) in the ciphertext, so we might might guess that one of these letters is the encipherment of \e" and another of the space character. Observe that \c"∼ 3 and \h"∼ 8 differ by 5, as do \x y"∼ 0 and \e"∼ 5, so we might assume that a shift of 3 is most probable, and try to decrypt using a shift of −3 ≡ 26 mod 29. ∗ Another variation is a linear cipher, where we fix a 2 F29 and map the numeric code x of each letter of plaintext to ax. For example, using a = 13, one has the ciphertext \ao ?qg .gbhgk huh?bayamkp". This is also susceptible to letter frequency analysis. An affine monoalphabetic cipher combines these two into one: the key is a pair ∗ (a; b) 2 F29 × F29, and the ciphertext is produced by the rule c(x) ≡ ax + b mod 29. Assume that we fix the scheme of alphanumeric assignment above. (a) Use affine encryption with the key (8; 14) to encipher the following plaintext: \What is the fundamental theorem of linear algebra if not the rank nullity theo- rem?" (b) Assume you are given some cipher text, and suppose you know that \e" enciphers to \o". Knowing that an affine cipher was used, can you recover the plaintext from the given ciphertext with this information alone? Justify. (c) Suppose that you know that not only does \e" enciphers to \o" but also \t" enciphers to \q". Determine the key values a and b, and decipher the following ciphertext: \q.oxy?nuoxzsxcxbmxq ovqhxrzioxq.?vxq.oxy?nuoxzsx?x .bg.xbmxszuip". (d) Use frequency analysis or other logical assumptions about the usual form of english text to decipher the following affine ciphertext, and also provide the key pair: \voxosoy kqeqlsqi?.k?qukqeq?pils?qkd.avcen.?vbaksok tdbk e.ikimdscsqnfk?l?ok{ {eqikobetlukzs.ock ?oci.klsqi?.kdsvbi.ok?qukp?osdkd.avc?q?laosofk.lxosf?". Note that this text is padded with a few random characters at the beginning and end. The dashes before and after the line break indicate that there is no space in the original ciphertext, and are inserted to ensure that the text fits on the page. It should be clear from the above that a message is not very secure when enciphered by these methods. Among the obvious flaws: choosing to include spaces and punc- tuation makes frequency analysis much easier. Generally, any monoalphabetic substi- tution cipher, even if it does not encrypt spaces or punctuation, is highly susceptible to frequency analysis provided a sufficient amount of plaintext is available. We thus will consider using linear algebra to encrypt things polyalphabetically, where a given plaintext character may be enciphered to different ciphertext values across the same message. MATH 235.9 WRITTEN HW 4: APPLICATIONS 3 (2) One of the most famous and basic ways to encrypt plaintext polyalphabetically is the family of ciphers known as Hill ciphers. (INSERT HISTORY) These are linear ciphers in more than one dimension. For the Hill cipher of size n over F29, one chooses an invertible square matrix A 2 Matn×n(F29), and wraps the numerically encoded plain text into an n × m matrix P, where m depends on the length of the message and any padding used, and one computes the cipher matrix C = AP. As a simple example, we could take our key to be the matrix A 2 Mat4×4(F29) given by 2 4 17 5 1 3 6 15 24 12 11 7 A = 6 7 : 4 28 2 7 13 5 3 6 21 0 Then if the plaintext message we wished to encode was \Wizards pluck joy from the quivering box"1, then we'd have plaintext matrix 2 23 18 16 11 25 15 8 21 18 0 3 6 9 4 12 0 0 13 5 9 9 2 7 P = 6 7 : 4 26 19 21 10 6 0 0 22 14 15 5 1 0 3 15 18 20 17 5 7 24 Note that the text is wrapped here column to column from left to right and top to bottom. Other schemes could be used to add a layer of difficulty in recovering the text (such techniques amount to composing the Hall cipher method with a transposition cipher, which permutes the arrangement of plaintext or ciphertext). The ciphertext would be produced by computing C = AP mod 29 and reading off the ten columns of C, converting numbers using the table in figure 1. (a) Use the above encryption matrix to encrypt the given plaintext above, and give the output as text using the table in figure 1. (b) Find the inverse of the above encryption matrix (you can use Gauss-Jordan, mod 29). This is the decryption key. (c) Using the above key, decipher the following text: \kxaglfqtbwviaqxmho.o v?jyfoamyhuwcvfkhus" Bonus : Hill ciphers are still susceptible to various forms of analysis, and are computationally expensive enough that they did not catch on during the era when they were less vulnera- ble to machine-assisted analysis. With modern computers, Hill's cipher, and variations thereof can be rapidly implemented, but also more readily analyzed and deciphered. Try to decrypt the following text, which was encrypted using a dynamic variation of a Hill cipher of size 2: \o?bawcxikerlmopk?srgakhiebtojydvvhcxzb.pyyvjcs tos gveunffktbwolyracgfslsjjahrob" 1This sentence is constructed so as to have letter frequencies which do not match the average; every consonant appears exactly once, and note also that there are only two \e"s, just as many \o"s and \u"s and even more \i"s. 4 ANDREW J. HAVENS Groups of Matrices. These problems explore the definitions of some groups of matrices. Groups are the natural mathematical objects to consider when studying symmetries. A group is a mathematical set G, together with a binary product, µ: G × G ! G called multiplication such that (i:) The multiplication is associative: µ(g; µ(h; k)) = µ(µ(g; h); k) for any g; h; k 2 G.
Recommended publications
  • The History of the Abel Prize and the Honorary Abel Prize the History of the Abel Prize
    The History of the Abel Prize and the Honorary Abel Prize The History of the Abel Prize Arild Stubhaug On the bicentennial of Niels Henrik Abel’s birth in 2002, the Norwegian Govern- ment decided to establish a memorial fund of NOK 200 million. The chief purpose of the fund was to lay the financial groundwork for an annual international prize of NOK 6 million to one or more mathematicians for outstanding scientific work. The prize was awarded for the first time in 2003. That is the history in brief of the Abel Prize as we know it today. Behind this government decision to commemorate and honor the country’s great mathematician, however, lies a more than hundred year old wish and a short and intense period of activity. Volumes of Abel’s collected works were published in 1839 and 1881. The first was edited by Bernt Michael Holmboe (Abel’s teacher), the second by Sophus Lie and Ludvig Sylow. Both editions were paid for with public funds and published to honor the famous scientist. The first time that there was a discussion in a broader context about honoring Niels Henrik Abel’s memory, was at the meeting of Scan- dinavian natural scientists in Norway’s capital in 1886. These meetings of natural scientists, which were held alternately in each of the Scandinavian capitals (with the exception of the very first meeting in 1839, which took place in Gothenburg, Swe- den), were the most important fora for Scandinavian natural scientists. The meeting in 1886 in Oslo (called Christiania at the time) was the 13th in the series.
    [Show full text]
  • Institut F¨Ur Informatik Und Praktische Mathematik Christian-Albrechts-Universit¨At Kiel
    INSTITUT FUR¨ INFORMATIK UND PRAKTISCHE MATHEMATIK Pose Estimation Revisited Bodo Rosenhahn Bericht Nr. 0308 September 2003 CHRISTIAN-ALBRECHTS-UNIVERSITAT¨ KIEL Institut f¨ur Informatik und Praktische Mathematik der Christian-Albrechts-Universit¨at zu Kiel Olshausenstr. 40 D – 24098 Kiel Pose Estimation Revisited Bodo Rosenhahn Bericht Nr. 0308 September 2003 e-mail: [email protected] “Dieser Bericht gibt den Inhalt der Dissertation wieder, die der Verfasser im April 2003 bei der Technischen Fakult¨at der Christian-Albrechts-Universit¨at zu Kiel eingereicht hat. Datum der Disputation: 19. August 2003.” 1. Gutachter Prof. G. Sommer (Kiel) 2. Gutachter Prof. D. Betten (Kiel) 3. Gutachter Dr. L. Dorst (Amsterdam) Datum der m¨undlichen Pr¨ufung: 19.08.2003 ABSTRACT The presented thesis deals with the 2D-3D pose estimation problem. Pose estimation means to estimate the relative position and orientation of a 3D ob- ject with respect to a reference camera system. The main focus concentrates on the geometric modeling and application of the pose problem. To deal with the different geometric spaces (Euclidean, affine and projective ones), a homogeneous model for conformal geometry is applied in the geometric algebra framework. It allows for a compact and linear modeling of the pose scenario. In the chosen embedding of the pose problem, a rigid body motion is represented as an orthogonal transformation whose parameters can be es- timated efficiently in the corresponding Lie algebra. In addition, the chosen algebraic embedding allows the modeling of extended features derived from sphere concepts in contrast to point concepts used in classical vector cal- culus.
    [Show full text]
  • Norway Establishes Abel Prize in Mathematics, Volume 49, Number 1
    Norway Establishes Abel Prize in Mathematics In August 2001, the prime close contact with its minister of Norway an- counterpart in Sweden, nounced the establish- which administers the ment of the Abel Prize, a Nobel Prizes. In consul- new international prize tation with the Interna- in mathematics. Named tional Mathematical in honor of the Norwe- Union (IMU), the Norwe- gian mathematician Niels gian Academy will appoint Henrik Abel (1802–1829), a prize selection commit- the prize will be awarded for tee of perhaps five members the first time in 2003. The and a larger scientific advi- prize fund will have an initial sory panel of twenty to thirty capital of 200 million Norwegian members. The panel will generate kroner (about US$23 million). The nominations to be forwarded to the amount of the prize will fluctuate ac- selection committee. The committee cording to the yield of the fund but will be and panel will be international and will in- similar to the amount of a Nobel Prize. The pre- clude a substantial number of mathematicians liminary figure for the Abel Prize is 5 million Nor- from outside Norway. wegian kroner (about US$570,000). Various details of the prize have yet to be worked The idea of an international prize in honor of out, such as whether it can be given to more than Abel was first suggested by the Norwegian math- one individual and whether recipients of the Fields ematician Sophus Lie near the end of the nine- Medal, long thought of as the “Nobel of mathe- teenth century.
    [Show full text]
  • Leonard Eugene Dickson
    LEONARD EUGENE DICKSON Leonard Eugene Dickson (January 22, 1874 – January 17, 1954) was a towering mathematician and inspiring teacher. He directed fifty-three doctoral dissertations, including those of 15 women. He wrote 270 papers and 18 books. His original research contributions made him a leading figure in the development of modern algebra, with significant contributions to number theory, finite linear groups, finite fields, and linear associative algebras. Under the direction of Eliakim Moore, Dickson received the first doctorate in mathematics awarded by the University of Chicago (1896). Moore considered Dickson to be the most thoroughly prepared mathematics student he ever had. Dickson spent some time in Europe studying with Sophus Lie in Leipzig and Camille Jordan in Paris. Upon his return to the United States, he taught at the University of California in Berkeley. He had an appointment with the University of Texas in 1899, but at the urging of Moore in 1900 he accepted a professorship at the University of Chicago, where he stayed until 1939. The most famous of Dickson’s books are Linear Groups with an Expansion of the Galois Field Theory (1901) and his three-volume History of the Theory of Numbers (1919 – 1923). The former was hailed as a milestone in the development of modern algebra. The latter runs to some 1600 pages, presenting in minute detail, a nearly complete guide to the subject from Pythagoras (or before 500 BCE) to about 1915. It is still considered the standard reference for everything that happened in number theory during that period. It remains the only source where one can find information as to who did what in various number theory topics.
    [Show full text]
  • Introduction to Representation Theory by Pavel Etingof, Oleg Golberg
    Introduction to representation theory by Pavel Etingof, Oleg Golberg, Sebastian Hensel, Tiankai Liu, Alex Schwendner, Dmitry Vaintrob, and Elena Yudovina with historical interludes by Slava Gerovitch Licensed to AMS. License or copyright restrictions may apply to redistribution; see http://www.ams.org/publications/ebooks/terms Licensed to AMS. License or copyright restrictions may apply to redistribution; see http://www.ams.org/publications/ebooks/terms Contents Chapter 1. Introduction 1 Chapter 2. Basic notions of representation theory 5 x2.1. What is representation theory? 5 x2.2. Algebras 8 x2.3. Representations 9 x2.4. Ideals 15 x2.5. Quotients 15 x2.6. Algebras defined by generators and relations 16 x2.7. Examples of algebras 17 x2.8. Quivers 19 x2.9. Lie algebras 22 x2.10. Historical interlude: Sophus Lie's trials and transformations 26 x2.11. Tensor products 30 x2.12. The tensor algebra 35 x2.13. Hilbert's third problem 36 x2.14. Tensor products and duals of representations of Lie algebras 36 x2.15. Representations of sl(2) 37 iii Licensed to AMS. License or copyright restrictions may apply to redistribution; see http://www.ams.org/publications/ebooks/terms iv Contents x2.16. Problems on Lie algebras 39 Chapter 3. General results of representation theory 41 x3.1. Subrepresentations in semisimple representations 41 x3.2. The density theorem 43 x3.3. Representations of direct sums of matrix algebras 44 x3.4. Filtrations 45 x3.5. Finite dimensional algebras 46 x3.6. Characters of representations 48 x3.7. The Jordan-H¨oldertheorem 50 x3.8. The Krull-Schmidt theorem 51 x3.9.
    [Show full text]
  • Lie Group Analysis Ccllaassssiiccaall Hheerriittaaggee
    LIE GROUP ANALYSIS CCLLAASSSSIICCAALL HHEERRIITTAAGGEE Edited by Nail H. Ibragimov ALGA Publications LIE GROUP ANALYSIS CLASSICAL HERITAGE Edited by Nail H. Ibragimov Translated by Nail H. Ibragimov Elena D. Ishmakova Roza M. Yakushina ALGA Publications Blekinge Institute of Technology Karlskrona, Sweden c 2004 Nail H. Ibragimov e-mail:° [email protected] http://www.bth.se/alga All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, scanning or otherwise, without written permission of the editor. The cover illustration: An example of invariant surfaces Sophus Lie, "Lectures on transformation groups", 1893, p. 414 ISBN 91-7295-996-7 Preface Today, acquaintance with modern group analysis and its classical founda- tions becomes an important part of mathematical culture of anyone con- structing and investigating mathematical models. However, many of clas- sical works in Lie group analysis, e.g. important papers of S.Lie and A.V.BÄacklund written in German and some fundamental papers of L.V. Ovsyannikov written in Russian have been not translated into English till now. The present small collection o®ers an English translation of four fun- damental papers by these authors. I have selected here some of my favorite papers containing profound re- sults signi¯cant for modern group analysis. The ¯rst paper imparts not only Lie's interesting view on the development of the general theory of di®eren- tial equations but also contains Lie's theory of group invariant solutions. His second paper is dedicated to group classi¯cation of second-order linear partial di®erential equations in two variables and can serve as a concise prac- tical guide to the group analysis of partial di®erential equations even today.
    [Show full text]
  • Sophus Lie: a Real Giant in Mathematics by Lizhen Ji*
    Sophus Lie: A Real Giant in Mathematics by Lizhen Ji* Abstract. This article presents a brief introduction other. If we treat discrete or finite groups as spe- to the life and work of Sophus Lie, in particular cial (or degenerate, zero-dimensional) Lie groups, his early fruitful interaction and later conflict with then almost every subject in mathematics uses Lie Felix Klein in connection with the Erlangen program, groups. As H. Poincaré told Lie [25] in October 1882, his productive writing collaboration with Friedrich “all of mathematics is a matter of groups.” It is Engel, and the publication and editing of his collected clear that the importance of groups comes from works. their actions. For a list of topics of group actions, see [17]. Lie theory was the creation of Sophus Lie, and Lie Contents is most famous for it. But Lie’s work is broader than this. What else did Lie achieve besides his work in the 1 Introduction ..................... 66 Lie theory? This might not be so well known. The dif- 2 Some General Comments on Lie and His Impact 67 ferential geometer S. S. Chern wrote in 1992 that “Lie 3 A Glimpse of Lie’s Early Academic Life .... 68 was a great mathematician even without Lie groups” 4 A Mature Lie and His Collaboration with Engel 69 [7]. What did and can Chern mean? We will attempt 5 Lie’s Breakdown and a Final Major Result . 71 to give a summary of some major contributions of 6 An Overview of Lie’s Major Works ....... 72 Lie in §6.
    [Show full text]
  • Appendix A: the Present-Day Meaning of Geometry
    Appendix A: The Present-day Meaning of Geometry …… effringere ut arta Rerum Naturae portarum claustra cupiret. De Rerum Natura (I, 70–71) The 19th century is today known as the century of industrial revolution but equally important is the revolution in mathematics and physics, that took place in 18th and 19th centuries. Actually we can say that the industrial revolution arises from the important technical and scientific progresses. As far as the mathematics is concerned a lot of new arguments appeared, and split a matter that, for more than twenty centuries, has been represented by Euclidean geometry also considered, following Plato and Galileo, as the language for the measure and interpretation of the Nature. Practically the differential calculus, complex numbers, analytic, differential and non-Euclidean geometries, the functions of a complex variable, partial differential equations and group theory emerged and were formalized. Now we briefly see that many of these mathematical arguments are derived as an extension or a criticism of Euclidean geometry. In both cases the conclusion is a complete validation of the logical and operative cogency of Euclidean geometry. Finally a reformulation of the finalization of Euclidean geometry has been made, so that also the ‘‘new geometries’’ are, today, considered in an equivalent way since they all fit with the general definition: Geometry is the study of the invariant properties of figures or, in an equivalent way a geometric property is one shared by all congruent figures. There are many ways to state the congruency (equivalence) between figures, here we recall one that allows us the extensions considered in this book.
    [Show full text]
  • Bäcklund Transformations and Exact Time-Discretizations for Gaudin and Related Models
    Universit´adegli Studi Roma Tre Dipartimento di Fisica via Della Vasca Navale 84, 00146 Roma, Italy B¨acklund Transformations and exact time-discretizations for Gaudin and related models Author: Supervisor: Federico Zullo Prof. Orlando Ragnisco PhD THESIS Ai miei genitori Contents 1 Introduction 6 1.1 An overview of the classical treatment of surface transformations. 7 1.2 TheClairinmethod............................. 15 1.3 The Renaissance of B¨acklund transformations . 18 1.4 B¨acklund transformations and the Lax formalism . 20 1.5 B¨acklund transformations and integrable discretizations......... 23 1.5.1 Integrable discretizations . 23 1.5.2 The approach `ala B¨acklund . 25 1.6 OutlineoftheThesis ............................ 36 2 The Gaudin models 39 2.1 Ashortoverviewonthepairingmodel . 39 2.2 TheGaudingeneralization . 41 2.3 Lax and r-matrixstructures.. 42 2.4 In¨o¨nu-Wigner contraction and poles coalescence on Gaudin models . 47 3 B¨acklund transformations on Gaudin models 51 3.1 Therationalcase .............................. 51 3.1.1 The dressing matrix and the explicit transformations . 53 3.1.2 The generating function of the canonical transformations . 55 3.1.3 Thetwopointsmap ........................ 56 3.1.4 Physical B¨acklund transformations . 60 3.1.5 Interpolating Hamiltonian flow . 61 3.2 Thetrigonometriccase ........................... 63 3.2.1 The dressing matrix and the explicit transformations . 65 3.2.2 Canonicity.............................. 71 5 CONTENTS 3.2.3 Physical B¨acklund transformations . 73 3.2.4 Interpolating Hamiltonian flow . 75 3.2.5 Numerics .............................. 76 3.3 Theellipticcase............................... 79 3.3.1 The dressing matrix and the explicit transformations . 81 3.3.2 Canonicity.............................. 84 3.3.3 Physical B¨acklund transformations .
    [Show full text]
  • Historical Review of Lie Theory 1. the Theory of Lie
    Historical review of Lie Theory 1. The theory of Lie groups and their representations is a vast subject (Bourbaki [Bou] has so far written 9 chapters and 1,200 pages) with an extraordinary range of applications. Some of the greatest mathematicians and physicists of our times have created the tools of the subject that we all use. In this review I shall discuss briefly the modern development of the subject from its historical beginnings in the mid nineteenth century. The origins of Lie theory are geometric and stem from the view of Felix Klein (1849– 1925) that geometry of space is determined by the group of its symmetries. As the notion of space and its geometry evolved from Euclid, Riemann, and Grothendieck to the su- persymmetric world of the physicists, the notions of Lie groups and their representations also expanded correspondingly. The most interesting groups are the semi simple ones, and for them the questions have remained the same throughout this long evolution: what is their structure, where do they act, and what are their representations? 2. The algebraic story: simple Lie algebras and their representations. It was Sopus Lie (1842–1899) who started investigating all possible (local)group actions on manifolds. Lie’s seminal idea was to look at the action infinitesimally. If the local action is by R, it gives rise to a vector field on the manifold which integrates to capture the action of the local group. In the general case we get a Lie algebra of vector fields, which enables us to reconstruct the local group action.
    [Show full text]
  • Sophus Lie, the Mathematician
    Courtesy of Scandinavian University Press. Used with permission. Sophus Lie, the mathematician by Sigurdur Helgason Sophus Lie is known among all mathematicians as the founder of the theory of transformation groups which then gave rise to the mod- ern theory of the so-called Lie groups. This is in fact a subject which permeates many branches of modern mathematics and mathematical physics. However in order to see Lie's work in perspective it is im- portant to realize that his first mathematical love was geometry and that this attachment remained with him all his life. I shall therefore try to describe at least some of his work in chronological order; in this way we can better understand the motivations to various stages in his work and see why his ideas took a long time to be assimilated by the mathematical public, at least longer time than he himself would have liked. -.-- 'Since my remarks are aimed at a general audience I have kept math- ematical technicalities at a minimum. Other lectures at this conference will deal with Lie's work in considerable detail so I shall confine myself to selected highlights. In view of the intensity with which Lie carried on his mathematical investigations in his later career it is remarkable that his calling to research in mathematics did not take place until 1868 (age 26), three years after he had finished his university studies in the natural sciences. Yet once in 1862, Sylow was a substitute teacher at the university and gave a lecture series on Galois Theory. At that time this does not seem to have made a very deep impression on Lie, but later developments suggest that it was well etched in his memory.
    [Show full text]
  • Acceptance Speech (Pdf)
    Your Majesty, Your Excellencies, ladies and gentlemen: I’m very happy to be in this beautiful country again, and very much honored by this award. The field of mathematics is a marvelous mosaic built up out of contributions by people from many different cultures, speaking many different languages, and stretching back over many hundreds of years. From the beginning mathematics has had a dual nature, partly abstract and self contained, but intimately concerned with understanding of the physical world around us. Much important mathematics was first inspired by real world problems; and mathematics has often contributed in totally unexpected ways. No one could have guessed that Riemann’s study of curvature would form the basis for Einstein’s theory of gravity; or that Hilbert’s theory of infinite dimensional vector spaces would provide the foundations for quantum mechanics. The British mathematician G. H. Hardy proudly bragged that his work in number theory would never be sullied by applications. He would have been horrified to learn that it is now the basis for methods in cryptography which are fundamentally important in commercial applications and also in military applications. The connections between mathematics and other sciences work in both directions. Claude Shannon’s work on communication theory was inspired by the work of physicists on statistical mechanics, and now has important applications not only in computer science but also in the mathematical theory of dynamical systems. The mathematical theory of Riemannn surfaces is now very important to mathematical physicists. Conversely, tools developed by mathematical physicists play a very important role in topology.
    [Show full text]