Introduction to Abstract Algebra “Rings First”

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Abstract Algebra “Rings First” Introduction to Abstract Algebra \Rings First" Bruno Benedetti University of Miami January 2020 Abstract The main purpose of these notes is to understand what Z; Q; R; C are, as well as their polynomial rings. Contents 0 Preliminaries 4 0.1 Injective and Surjective Functions..........................4 0.2 Natural numbers, induction, and Euclid's theorem.................6 0.3 The Euclidean Algorithm and Diophantine Equations............... 12 0.4 From Z and Q to R: The need for geometry..................... 18 0.5 Modular Arithmetics and Divisibility Criteria.................... 23 0.6 *Fermat's little theorem and decimal representation................ 28 0.7 Exercises........................................ 31 1 C-Rings, Fields and Domains 33 1.1 Invertible elements and Fields............................. 34 1.2 Zerodivisors and Domains............................... 36 1.3 Nilpotent elements and reduced C-rings....................... 39 1.4 *Gaussian Integers................................... 39 1.5 Exercises........................................ 41 2 Polynomials 43 2.1 Degree of a polynomial................................. 44 2.2 Euclidean division................................... 46 2.3 Complex conjugation.................................. 50 2.4 Symmetric Polynomials................................ 52 2.5 Exercises........................................ 56 3 Subrings, Homomorphisms, Ideals 57 3.1 Subrings......................................... 57 3.2 Homomorphisms.................................... 58 3.3 Ideals.......................................... 60 3.4 Generators and Principal Ideals............................ 62 3.5 PIDs........................................... 64 1 3.6 Noetherian domains................................... 66 3.7 Exercises........................................ 70 4 Quotients 71 4.1 Equivalence relations.................................. 71 4.2 Quotient Ring...................................... 72 4.3 Homomorphism theorems................................ 74 4.4 *Fields of fractions................................... 78 4.5 Exercises........................................ 80 5 Prime and maximal ideals 81 5.1 Operations with ideals................................. 81 5.2 Prime ideals and quotients............................... 83 5.3 Maximal ideals and quotients............................. 84 5.4 Radical Ideals and Nilpotent Elements........................ 86 5.5 Exercises........................................ 89 6 Factorizations 90 6.1 Irreducible elements.................................. 90 6.2 UFDs.......................................... 96 6.3 *Gauss' theorem.................................... 99 6.4 Irreducibility in Z[x].................................. 104 6.5 Exercises........................................ 112 7 Field extensions 113 7.1 Algebraic and transcendental numbers........................ 114 7.2 Field extensions and degree.............................. 117 7.3 Algebraic closure and Nullstellensatz......................... 122 7.4 The fundamental theorem of algebra......................... 126 p 7.5 *Q( p) and Fibonacci numbers............................ 130 7.6 Exercises........................................ 134 8 Groups 136 8.1 Groups, subgroups, homomorphisms......................... 136 8.2 Lagrange theorem, normal subgroups, quotients................... 139 8.3 Generators and period of an element......................... 143 8.4 Cyclic and finitely generated groups......................... 145 8.5 Abelian Groups, Chinese remainders, and the totient function........... 148 8.6 Permutations...................................... 155 8.7 *Simple and Solvable Groups............................. 159 8.8 *Fundamental theorem of finitely generated Abelian groups............ 164 8.9 Exercises........................................ 172 9 Galois Theory 173 9.1 Degree-three equations................................. 174 9.2 Degree-four equations................................. 176 9.3 Degree-n equations with only two nonzero terms.................. 177 9.4 The Galois group.................................... 179 9.5 The Galois Correspondence.............................. 186 9.6 Equations that cannot be solved by radicals..................... 190 2 9.7 Exercises........................................ 194 10 Modules 195 10.1 Modules, submodules, quotients and direct sums.................. 195 10.2 Homomorphisms, short exact sequences, and projective modules......... 196 10.3 Homology and free resolutions............................. 200 10.4 *Smith normal forms and finitely generated modules................ 202 3 0 Preliminaries In this section we briefly recall a few topics you probably know already. But even if you \know too much", it's good to agree on notation and terminology, so that we are all on the same page. 0.1 Injective and Surjective Functions Definition 1. A function f : X −! Y consists of two sets X; Y and a subset F ⊂ X × Y , such that for each element x 2 X there is always exactly one element y of Y for which (x; y) 2 F . Usually we denote this y by f(x), and we say it is the image of x (under f). We also call X (resp. Y ) the domain (resp. the codomain) of the function. The image of the set X is the set Im X =def ff(x) such that x 2 Xg. Functions are typically described by a formula that tells us how to find f(x) given x. For example, given any set X, the identity function on X (usually denoted by idX ) is the function whose output is always identical to the input. In this case, our notation to \explain the function" is idX : X −! X x 7−! x: Sometimes one does not have an explicit formula, but there is still a clear general method to associate x with its image: for example, f : N −! N x 7−! the x-th prime number: In the worst case scenario, if we do not see a general pattern, we can always express f by specifying all its values: f : f0; 1; 2g −! f0; 1; 2g 0 7−! 1 1 7−! 0 2 7−! 2: Definition 2. A function f : X ! Y is injective if for each x 6= x0 one has f(x) 6= f(x0). We assume familiarity with logic, in particular with quantifiers (8, 9) and logical equivalence (contrapositives, etc.) For example, it should be clear that an equivalent way to define injectivity is: 8x; x0 2 X; f(x) = f(x0) ) x = x0: Is it clear? Or does it look like hieroglyphics? If you are lost, please revise your notes from the prerequisite courses before going on... Injectivity depends not only on the \formula", but also on the domain involved. For example, f : −! f : −! N N is injective, Z N is not. x 7−! x2 x 7−! x2 Definition 3. A function f : X ! Y is surjective if the image of X coincides with the codomain Y ; or in other words, if for each y 2 Y there is some x 2 X (not necessarily unique) such that y = f(x). 4 Surjectivity depends not only on the \formula" for f, but also on the domain and the codomain. For example, let R>0 (resp. R≥0) be the positive (resp. the nonnegative) real numbers: f : −! f : −! f : −! R R is not surjective, R R≥0 is, R>0 R≥0 is not. x 7−! x2 x 7−! x2 x 7−! x2 Definition 4. A function f : X ! Y is bijective if it is both injective and surjective. That is, if for each y 2 Y there exists exactly one x 2 X such that y = f(x). Given a function f : X ! Y and a function g : Y ! Z, their composite is the function g ◦ f : X −! Z x 7−! g( f(x)): Proposition 5. Let f : X ! Y be a function between two non-empty sets. (1) f is surjective () there exists g : Y ! X (called \right inverse") such that f ◦ g = idY . (2) f is injective () there exists g : Y ! X (called \left inverse") such that g ◦ f = idX . (3) f is bijective () there exists g : Y ! X (called \inverse") such that g ◦ f = idX and f ◦ g = idY . Remark 6. Before starting with the proof, note that two functions are equal when they have same domain, same codomain, and they yield same outputs when given same inputs. So to verify an equality of functions like g ◦ f = idY , both going from Y to Y , we'll need to check that g ◦ f(y) = idY (y) for all y 2 Y . Proof of Proposition5. (1), \)". Define g : Y −! X y 7−! some x such that f(x) = y: (If there is more than one x such that f(x) = y, we simply choose one.) Then by con- struction, f ◦ g(y) = f(x) = y for all y 2 Y . Hence f ◦ g = idY . (1), \(". For each y 2 Y , we know that idY (y) = f ◦ g(y), so y = f(g(y)), which means y 2 Im f. (2), \)". Choose a point x0 of X. Define g : Y −! X x ; if y2 = Im f y 7−! 0 the unique x such that f(x) = y; if y 2 Im f: Then for all x in X, g ◦ f(x) = g(f(x)) = x. So g ◦ f = idX . 0 (2), \(". Suppose f(x) = f(x ). Applying g, and remembering that g ◦ f = idX , we get 0 0 0 0 x = idX (x) = g ◦ f(x) = g(f(x)) = g(f(x )) = g ◦ f(x ) = idX (x ) = x : (3), \)". This does not follow immediately from items (1) and (2), because a priori it could be that the two g's (right inverse and left inverse) are different. However, if f is bijective we can simply define g : Y −! X y 7−! the unique x such that f(x) = y: and it is easy to see that it does the trick. (3), \(". This follows from (1) and (2). (Why?) 5 0.2 Natural numbers, induction, and Euclid's theorem You are probably all familiar with the infinite set of natural numbers (also known as \nonnegative integers") N = f0; 1; 2; 3; : : : ; n; n + 1;:::g It is usually stated in textbooks that natural numbers \come from Nature". This is not entirely true: To accept them, three important abstraction steps are necessary. These steps are non- trivial, as throughout the history of mankind, not all populations have achieved or accepted them: • the notion of cardinality, i.e. the realization that two finite sets in bijection with one another have something in common; whence the names of numbers. This is not universal: Even today, the Pirah~apeople in Amazonas, Brazil, have no names for numbers, and have no linguistic way of expressing exact quantity, not even \one". 1 • the notion of zero, as the cardinality of an \empty set". The ancient Greeks had no symbol for zero, for example; Mayas did have a symbol for zero around the year 36 BC, using it as placeholder in their base-20 numerical system; arithmetic operations with zero were first introduced by the Indian mathematician Brahmagupta2, around 650 AD.
Recommended publications
  • Simultaneous Elements of Prescribed Multiplicative Orders 2
    Simultaneous Elements Of Prescribed Multiplicative Orders N. A. Carella Abstract: Let u 6= ±1, and v 6= ±1 be a pair of fixed relatively prime squarefree integers, and let d ≥ 1, and e ≥ 1 be a pair of fixed integers. It is shown that there are infinitely many primes p ≥ 2 such that u and v have simultaneous prescribed multiplicative orders ordp u = (p − 1)/d and ordp v = (p − 1)/e respectively, unconditionally. In particular, a squarefree odd integer u > 2 and v = 2 are simultaneous primitive roots and quadratic residues (or quadratic nonresidues) modulo p for infinitely many primes p, unconditionally. Contents 1 Introduction 1 2 Divisors Free Characteristic Function 4 3 Finite Summation Kernels 5 4 Gaussian Sums, And Weil Sums 7 5 Incomplete And Complete Exponential Sums 7 6 Explicit Exponential Sums 11 7 Equivalent Exponential Sums 12 8 Double Exponential Sums 13 9 The Main Term 14 10 The Error Terms 15 arXiv:2103.04822v1 [math.GM] 5 Mar 2021 11 Simultaneous Prescribed Multiplicative Orders 16 12 Probabilistic Results For Simultaneous Orders 18 1 Introduction The earliest study of admissible integers k-tuples u1, u2, . , uk ∈ Z of simultaneous prim- itive roots modulo a prime p seems to be the conditional result in [21]. Much more general March 9, 2021 AMS MSC2020 :Primary 11A07; Secondary 11N13 Keywords: Distribution of primes; Primes in arithmetic progressions; Simultaneous primitive roots; Simul- taneous prescribed orders; Schinzel-Wojcik problem. 1 Simultaneous Elements Of Prescribed Multiplicative Orders 2 results for admissible rationals k-tuples u1, u2, . , uk ∈ Q of simultaneous elements of independent (or pseudo independent) multiplicative orders modulo a prime p ≥ 2 are considered in [26], and [14].
    [Show full text]
  • Epiglass ® and Other International Paint Products
    Epiglass® Multipurpose Epoxy Resin ABOUT THE AUTHORS ROGER MARSHALL For eight years award winning author Roger Marshall has been the technical editor for Soundings magazine where his articles are read by about 250,000 people each month. Marshall’s experience as a writer spans for many years. His work has appeared worldwide as well as the New York Times, Daily Telegraph (UK), Sports illustrated, Sail, Cruising World, Motor Boating and sailing, Yachting and many other newspapers and magazines. Marshall is also the author of twelve marine related books, two of which were translated into Italian and Spanish. His last book All about Powerboats was published by International Marine in the spring of 2002. He has another book Rough Weather Seamanship due in the fall of 2003 and is currently working on a new book, Elements of Powerboat Design for International Marine. But writing is only a small part of Marshall’s talents. He is also a designer of boats, both power and sail. After completing a program in small craft design at Southampton College in England, Marshall, who still holds a British passport, moved to the United States in 1973 to take a position at Sparkman & Stephens, Inc. in New York. He worked there as a designer for nearly 5 years and then left to establish his own yacht design studio in Jamestown, Rhode Island. As an independent designer he has designed a wide range of boats and was project engineer for the Courageous Challenge for the 1987 America’s Cup campaign in Australia. In 1999 one of his cruising yacht designs was selected for inclusion in Ocean Cruising magazine’s American Yacht Review.
    [Show full text]
  • Gaussian Prime Labeling of Super Subdivision of Star Graphs
    of Math al em rn a u ti o c J s l A a Int. J. Math. And Appl., 8(4)(2020), 35{39 n n d o i i t t a s n A ISSN: 2347-1557 r e p t p n l I i c • Available Online: http://ijmaa.in/ a t 7 i o 5 n 5 • s 1 - 7 4 I 3 S 2 S : N International Journal of Mathematics And its Applications Gaussian Prime Labeling of Super Subdivision of Star Graphs T. J. Rajesh Kumar1,∗ and Antony Sanoj Jerome2 1 Department of Mathematics, T.K.M College of Engineering, Kollam, Kerala, India. 2 Research Scholar, University College, Thiruvananthapuram, Kerala, India. Abstract: Gaussian integers are the complex numbers of the form a + bi where a; b 2 Z and i2 = −1 and it is denoted by Z[i]. A Gaussian prime labeling on G is a bijection from the vertices of G to [ n], the set of the first n Gaussian integers in the spiral ordering such that if uv 2 E(G), then (u) and (v) are relatively prime. Using the order on the Gaussian integers, we discuss the Gaussian prime labeling of super subdivision of star graphs. MSC: 05C78. Keywords: Gaussian Integers, Gaussian Prime Labeling, Super Subdivision of Graphs. © JS Publication. 1. Introduction The graphs considered in this paper are finite and simple. The terms which are not defined here can be referred from Gallian [1] and West [2]. A labeling or valuation of a graph G is an assignment f of labels to the vertices of G that induces for each edge xy, a label depending upon the vertex labels f(x) and f(y).
    [Show full text]
  • 21 Pintura.Pdf
    Paint 1247 Marpro Super-B Gold™ with SCX™-Slime Control Xtra Marpro Superkote Gold™ with SCX™ - Slime Control Xtra Black Blue Red Green Black Blue Red • SUPER-B GOLD is the highest performance ablative copolymer on the market today. • The highest copper content (67%) in our line. • SUPERKOTE GOLD is the highest performance • Performance booster SCX (Slime Control Xtra) modified hard epoxy performance products on the provides outstanding protection against slime, market today. grass and weed. • The highest copper content (67%) in our line. Paint & Paint Acc. & Paint Paint • Continual release of biocide makes this self-polishing copolymer most • Performance booster SCX (Slime Control Xtra) provides outstanding effective for anti-fouling protection, with only minimal paint buildup. protection against slime, grass and weed. • Tough, multi-season paint for superior protection against hard and soft • Continual release of biocide makes this modified hard epoxy most effective growth in extreme fouling conditions. for antifouling protection. • Can re-launch after extended haul-out and retain original antifouling • Superior protection against hard and soft growth in extreme fouling Fun & properties. conditions. Flotation • Perfect for powerboats and sailboats. • Perfect for powerboats and sailboats. Anchor • Can be applied directly over properly prepared ablatives, epoxies and vinyl’s, • Can be applied directly over properly prepared epoxies and vinyls, and most & Dock and most any other hard or ablative bottom paints. any other hard bottom paints.
    [Show full text]
  • Elementary Number Theory
    Elementary Number Theory Peter Hackman HHH Productions November 5, 2007 ii c P Hackman, 2007. Contents Preface ix A Divisibility, Unique Factorization 1 A.I The gcd and B´ezout . 1 A.II Two Divisibility Theorems . 6 A.III Unique Factorization . 8 A.IV Residue Classes, Congruences . 11 A.V Order, Little Fermat, Euler . 20 A.VI A Brief Account of RSA . 32 B Congruences. The CRT. 35 B.I The Chinese Remainder Theorem . 35 B.II Euler’s Phi Function Revisited . 42 * B.III General CRT . 46 B.IV Application to Algebraic Congruences . 51 B.V Linear Congruences . 52 B.VI Congruences Modulo a Prime . 54 B.VII Modulo a Prime Power . 58 C Primitive Roots 67 iii iv CONTENTS C.I False Cases Excluded . 67 C.II Primitive Roots Modulo a Prime . 70 C.III Binomial Congruences . 73 C.IV Prime Powers . 78 C.V The Carmichael Exponent . 85 * C.VI Pseudorandom Sequences . 89 C.VII Discrete Logarithms . 91 * C.VIII Computing Discrete Logarithms . 92 D Quadratic Reciprocity 103 D.I The Legendre Symbol . 103 D.II The Jacobi Symbol . 114 D.III A Cryptographic Application . 119 D.IV Gauß’ Lemma . 119 D.V The “Rectangle Proof” . 123 D.VI Gerstenhaber’s Proof . 125 * D.VII Zolotareff’s Proof . 127 E Some Diophantine Problems 139 E.I Primes as Sums of Squares . 139 E.II Composite Numbers . 146 E.III Another Diophantine Problem . 152 E.IV Modular Square Roots . 156 E.V Applications . 161 F Multiplicative Functions 163 F.I Definitions and Examples . 163 CONTENTS v F.II The Dirichlet Product .
    [Show full text]
  • Computing Multiplicative Order and Primitive Root in Finite Cyclic Group
    Computing Multiplicative Order and Primitive Root in Finite Cyclic Group Shri Prakash Dwivedi ∗ Abstract Multiplicative order of an element a of group G is the least positive integer n such that an = e, where e is the identity element of G. If the order of an element is equal to |G|, it is called generator or primitive root. This paper describes the algorithms for computing multiplicative order and Z∗ primitive root in p, we also present a logarithmic improvement over classical algorithms. 1 Introduction Algorithms for computing multiplicative order or simply order and primitive root or generator are important in the area of random number generation and discrete logarithm problem among oth- Z∗ ers. In this paper we consider the problem of computing the order of an element over p, which is Z∗ multiplicative group modulo p . As stated above order of an element a ∈ p is the least positive integer n such that an = 1. In number theoretic language, we say that the order of a modulo m is n, if n is the smallest positive integer such that an ≡ 1( mod m). We also consider the related Z∗ Z∗ problem of computing the primitive root in p. If order of an element a ∈ n usually denoted as Z∗ ordn(a) is equal to | n| i.e. order of multiplicative group modulo n, then a is called called primi- Z∗ tive root or primitive element or generator [3] of n. It is called generator because every element Z∗ in n is some power of a. Efficient deterministic algorithms for both of the above problems are not known yet.
    [Show full text]
  • Simple High-Level Code for Cryptographic Arithmetic - with Proofs, Without Compromises
    Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Erbsen, Andres et al. “Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.” Proceedings - IEEE Symposium on Security and Privacy, May-2019 (May 2019) © 2019 The Author(s) As Published 10.1109/SP.2019.00005 Publisher Institute of Electrical and Electronics Engineers (IEEE) Version Author's final manuscript Citable link https://hdl.handle.net/1721.1/130000 Terms of Use Creative Commons Attribution-Noncommercial-Share Alike Detailed Terms http://creativecommons.org/licenses/by-nc-sa/4.0/ Simple High-Level Code For Cryptographic Arithmetic – With Proofs, Without Compromises Andres Erbsen Jade Philipoom Jason Gross Robert Sloan Adam Chlipala MIT CSAIL, Cambridge, MA, USA fandreser, jadep, [email protected], [email protected], [email protected] Abstract—We introduce a new approach for implementing where X25519 was the only arithmetic-based crypto primitive cryptographic arithmetic in short high-level code with machine- we need, now would be the time to declare victory and go checked proofs of functional correctness. We further demonstrate home. Yet most of the Internet still uses P-256, and the that simple partial evaluation is sufficient to transform such initial code into the fastest-known C code, breaking the decades- current proposals for post-quantum cryptosystems are far from old pattern that the only fast implementations are those whose Curve25519’s combination of performance and simplicity. instruction-level steps were written out by hand.
    [Show full text]
  • Number Theory Course Notes for MA 341, Spring 2018
    Number Theory Course notes for MA 341, Spring 2018 Jared Weinstein May 2, 2018 Contents 1 Basic properties of the integers 3 1.1 Definitions: Z and Q .......................3 1.2 The well-ordering principle . .5 1.3 The division algorithm . .5 1.4 Running times . .6 1.5 The Euclidean algorithm . .8 1.6 The extended Euclidean algorithm . 10 1.7 Exercises due February 2. 11 2 The unique factorization theorem 12 2.1 Factorization into primes . 12 2.2 The proof that prime factorization is unique . 13 2.3 Valuations . 13 2.4 The rational root theorem . 15 2.5 Pythagorean triples . 16 2.6 Exercises due February 9 . 17 3 Congruences 17 3.1 Definition and basic properties . 17 3.2 Solving Linear Congruences . 18 3.3 The Chinese Remainder Theorem . 19 3.4 Modular Exponentiation . 20 3.5 Exercises due February 16 . 21 1 4 Units modulo m: Fermat's theorem and Euler's theorem 22 4.1 Units . 22 4.2 Powers modulo m ......................... 23 4.3 Fermat's theorem . 24 4.4 The φ function . 25 4.5 Euler's theorem . 26 4.6 Exercises due February 23 . 27 5 Orders and primitive elements 27 5.1 Basic properties of the function ordm .............. 27 5.2 Primitive roots . 28 5.3 The discrete logarithm . 30 5.4 Existence of primitive roots for a prime modulus . 30 5.5 Exercises due March 2 . 32 6 Some cryptographic applications 33 6.1 The basic problem of cryptography . 33 6.2 Ciphers, keys, and one-time pads .
    [Show full text]
  • Fast Integer Division – a Differentiated Offering from C2000 Product Family
    Application Report SPRACN6–July 2019 Fast Integer Division – A Differentiated Offering From C2000™ Product Family Prasanth Viswanathan Pillai, Himanshu Chaudhary, Aravindhan Karuppiah, Alex Tessarolo ABSTRACT This application report provides an overview of the different division and modulo (remainder) functions and its associated properties. Later, the document describes how the different division functions can be implemented using the C28x ISA and intrinsics supported by the compiler. Contents 1 Introduction ................................................................................................................... 2 2 Different Division Functions ................................................................................................ 2 3 Intrinsic Support Through TI C2000 Compiler ........................................................................... 4 4 Cycle Count................................................................................................................... 6 5 Summary...................................................................................................................... 6 6 References ................................................................................................................... 6 List of Figures 1 Truncated Division Function................................................................................................ 2 2 Floored Division Function................................................................................................... 3 3 Euclidean
    [Show full text]
  • A Quantum Primality Test with Order Finding
    A quantum primality test with order finding Alvaro Donis-Vela1 and Juan Carlos Garcia-Escartin1,2, ∗ 1Universidad de Valladolid, G-FOR: Research Group on Photonics, Quantum Information and Radiation and Scattering of Electromagnetic Waves. o 2Universidad de Valladolid, Dpto. Teor´ıa de la Se˜nal e Ing. Telem´atica, Paseo Bel´en n 15, 47011 Valladolid, Spain (Dated: November 8, 2017) Determining whether a given integer is prime or composite is a basic task in number theory. We present a primality test based on quantum order finding and the converse of Fermat’s theorem. For an integer N, the test tries to find an element of the multiplicative group of integers modulo N with order N − 1. If one is found, the number is known to be prime. During the test, we can also show most of the times N is composite with certainty (and a witness) or, after log log N unsuccessful attempts to find an element of order N − 1, declare it composite with high probability. The algorithm requires O((log n)2n3) operations for a number N with n bits, which can be reduced to O(log log n(log n)3n2) operations in the asymptotic limit if we use fast multiplication. Prime numbers are the fundamental entity in number For a prime N, ϕ(N) = N 1 and we recover Fermat’s theory and play a key role in many of its applications theorem. − such as cryptography. Primality tests are algorithms that If we can find an integer a for which aN−1 1 mod N, determine whether a given integer N is prime or not.
    [Show full text]
  • THE GAUSSIAN INTEGERS Since the Work of Gauss, Number Theorists
    THE GAUSSIAN INTEGERS KEITH CONRAD Since the work of Gauss, number theorists have been interested in analogues of Z where concepts from arithmetic can also be developed. The example we will look at in this handout is the Gaussian integers: Z[i] = fa + bi : a; b 2 Zg: Excluding the last two sections of the handout, the topics we will study are extensions of common properties of the integers. Here is what we will cover in each section: (1) the norm on Z[i] (2) divisibility in Z[i] (3) the division theorem in Z[i] (4) the Euclidean algorithm Z[i] (5) Bezout's theorem in Z[i] (6) unique factorization in Z[i] (7) modular arithmetic in Z[i] (8) applications of Z[i] to the arithmetic of Z (9) primes in Z[i] 1. The Norm In Z, size is measured by the absolute value. In Z[i], we use the norm. Definition 1.1. For α = a + bi 2 Z[i], its norm is the product N(α) = αα = (a + bi)(a − bi) = a2 + b2: For example, N(2 + 7i) = 22 + 72 = 53. For m 2 Z, N(m) = m2. In particular, N(1) = 1. Thinking about a + bi as a complex number, its norm is the square of its usual absolute value: p ja + bij = a2 + b2; N(a + bi) = a2 + b2 = ja + bij2: The reason we prefer to deal with norms on Z[i] instead of absolute values on Z[i] is that norms are integers (rather than square roots), and the divisibility properties of norms in Z will provide important information about divisibility properties in Z[i].
    [Show full text]
  • Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases
    INTERSECTIONS OF DELETED DIGITS CANTOR SETS WITH GAUSSIAN INTEGER BASES Athesissubmittedinpartialfulfillment of the requirements for the degree of Master of Science By VINCENT T. SHAW B.S., Wright State University, 2017 2020 Wright State University WRIGHT STATE UNIVERSITY SCHOOL OF GRADUATE STUDIES May 1, 2020 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPER- VISION BY Vincent T. Shaw ENTITLED Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases BE ACCEPTED IN PARTIAL FULFILLMENT OF THE RE- QUIREMENTS FOR THE DEGREE OF Master of Science. ____________________ Steen Pedersen, Ph.D. Thesis Director ____________________ Ayse Sahin, Ph.D. Department Chair Committee on Final Examination ____________________ Steen Pedersen, Ph.D. ____________________ Qingbo Huang, Ph.D. ____________________ Anthony Evans, Ph.D. ____________________ Barry Milligan, Ph.D. Interim Dean, School of Graduate Studies Abstract Shaw, Vincent T. M.S., Department of Mathematics and Statistics, Wright State University, 2020. Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases. In this paper, the intersections of deleted digits Cantor sets and their fractal dimensions were analyzed. Previously, it had been shown that for any dimension between 0 and the dimension of the given deleted digits Cantor set of the real number line, a translate of the set could be constructed such that the intersection of the set with the translate would have this dimension. Here, we consider deleted digits Cantor sets of the complex plane with Gaussian integer bases and show that the result still holds. iii Contents 1 Introduction 1 1.1 WhystudyintersectionsofCantorsets? . 1 1.2 Prior work on this problem . 1 2 Negative Base Representations 5 2.1 IntegerRepresentations .............................
    [Show full text]