Solving Diophantine Equations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Diophantine Equation X 2 + C = Y N : a Brief Overview
Revista Colombiana de Matem¶aticas Volumen 40 (2006), p¶aginas31{37 The Diophantine equation x 2 + c = y n : a brief overview Fadwa S. Abu Muriefah Girls College Of Education, Saudi Arabia Yann Bugeaud Universit¶eLouis Pasteur, France Abstract. We give a survey on recent results on the Diophantine equation x2 + c = yn. Key words and phrases. Diophantine equations, Baker's method. 2000 Mathematics Subject Classi¯cation. Primary: 11D61. Resumen. Nosotros hacemos una revisi¶onacerca de resultados recientes sobre la ecuaci¶onDiof¶antica x2 + c = yn. 1. Who was Diophantus? The expression `Diophantine equation' comes from Diophantus of Alexandria (about A.D. 250), one of the greatest mathematicians of the Greek civilization. He was the ¯rst writer who initiated a systematic study of the solutions of equations in integers. He wrote three works, the most important of them being `Arithmetic', which is related to the theory of numbers as distinct from computation, and covers much that is now included in Algebra. Diophantus introduced a better algebraic symbolism than had been known before his time. Also in this book we ¯nd the ¯rst systematic use of mathematical notation, although the signs employed are of the nature of abbreviations for words rather than algebraic symbols in contemporary mathematics. Special symbols are introduced to present frequently occurring concepts such as the unknown up 31 32 F. S. ABU M. & Y. BUGEAUD to its sixth power. He stands out in the history of science as one of the great unexplained geniuses. A Diophantine equation or indeterminate equation is one which is to be solved in integral values of the unknowns. -
Arithmetic Sequences, Diophantine Equations and the Number of the Beast Bryan Dawson Union University
Arithmetic Sequences, Diophantine Equations and the Number of the Beast Bryan Dawson Union University Here is wisdom. Let him who has understanding calculate the number of the beast, for it is the number of a man: His number is 666. -Revelation 13:18 (NKJV) "Let him who has understanding calculate ... ;" can anything be more enticing to a mathe matician? The immediate question, though, is how do we calculate-and there are no instructions. But more to the point, just who might 666 be? We can find anything on the internet, so certainly someone tells us. A quick search reveals the answer: according to the "Gates of Hell" website (Natalie, 1998), 666 refers to ... Bill Gates ill! In the calculation offered by the website, each letter in the name is replaced by its ASCII character code: B I L L G A T E S I I I 66 73 76 76 71 65 84 69 83 1 1 1 = 666 (Notice, however, that an exception is made for the suffix III, where the value of the suffix is given as 3.) The big question is this: how legitimate is the calculation? To answer this question, we need to know several things: • Can this same type of calculation be performed on other names? • What mathematics is behind such calculations? • Have other types of calculations been used to propose a candidate for 666? • What type of calculation did John have in mind? Calculations To answer the first two questions, we need to understand the ASCII character code. The ASCII character code replaces characters with numbers in order to have a numeric way of storing all characters. -
Survey of Modern Mathematical Topics Inspired by History of Mathematics
Survey of Modern Mathematical Topics inspired by History of Mathematics Paul L. Bailey Department of Mathematics, Southern Arkansas University E-mail address: [email protected] Date: January 21, 2009 i Contents Preface vii Chapter I. Bases 1 1. Introduction 1 2. Integer Expansion Algorithm 2 3. Radix Expansion Algorithm 3 4. Rational Expansion Property 4 5. Regular Numbers 5 6. Problems 6 Chapter II. Constructibility 7 1. Construction with Straight-Edge and Compass 7 2. Construction of Points in a Plane 7 3. Standard Constructions 8 4. Transference of Distance 9 5. The Three Greek Problems 9 6. Construction of Squares 9 7. Construction of Angles 10 8. Construction of Points in Space 10 9. Construction of Real Numbers 11 10. Hippocrates Quadrature of the Lune 14 11. Construction of Regular Polygons 16 12. Problems 18 Chapter III. The Golden Section 19 1. The Golden Section 19 2. Recreational Appearances of the Golden Ratio 20 3. Construction of the Golden Section 21 4. The Golden Rectangle 21 5. The Golden Triangle 22 6. Construction of a Regular Pentagon 23 7. The Golden Pentagram 24 8. Incommensurability 25 9. Regular Solids 26 10. Construction of the Regular Solids 27 11. Problems 29 Chapter IV. The Euclidean Algorithm 31 1. Induction and the Well-Ordering Principle 31 2. Division Algorithm 32 iii iv CONTENTS 3. Euclidean Algorithm 33 4. Fundamental Theorem of Arithmetic 35 5. Infinitude of Primes 36 6. Problems 36 Chapter V. Archimedes on Circles and Spheres 37 1. Precursors of Archimedes 37 2. Results from Euclid 38 3. Measurement of a Circle 39 4. -
Arxiv:1503.02592V1
MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 S 0025-5718(XX)0000-0 TWO COMPACT INCREMENTAL PRIME SIEVES JONATHAN P. SORENSON Abstract. A prime sieve is an algorithm that finds the primes up to a bound n. We say that a prime sieve is incremental, if it can quickly determine if n+1 is prime after having found all primes up to n. We say a sieve is compact if it uses roughly √n space or less. In this paper we present two new results: We describe the rolling sieve, a practical, incremental prime sieve that • takes O(n log log n) time and O(√n log n) bits of space, and We show how to modify the sieve of Atkin and Bernstein [1] to obtain a • sieve that is simultaneously sublinear, compact, and incremental. The second result solves an open problem given by Paul Pritchard in 1994 [19]. 1. Introduction and Definitions A prime sieve is an algorithm that finds all prime numbers up to a given bound n. The fastest known algorithms, including Pritchard’s wheel sieve [16] and the Atkin- Bernstein sieve [1], can do this using at most O(n/ log log n) arithmetic operations. The easy-to-code sieve of Eratosthenes requires O(n log log n) time, and there are a number of sieves in the literature that require linear time [17, 18]. Normally, running time is the main concern in algorithm design, but in this paper we are also interested in two other properties: incrementality and compactness. We say that a sieve is compact if it uses at most n1/2+o(1) space. -
Sieve Algorithms for the Discrete Logarithm in Medium Characteristic Finite Fields Laurent Grémy
Sieve algorithms for the discrete logarithm in medium characteristic finite fields Laurent Grémy To cite this version: Laurent Grémy. Sieve algorithms for the discrete logarithm in medium characteristic finite fields. Cryptography and Security [cs.CR]. Université de Lorraine, 2017. English. NNT : 2017LORR0141. tel-01647623 HAL Id: tel-01647623 https://tel.archives-ouvertes.fr/tel-01647623 Submitted on 24 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle. articles L 122. 4 Code de la Propriété Intellectuelle. articles L 335.2- L 335.10 http://www.cfcopies.com/V2/leg/leg_droi.php -
Golden Oaks Software
New Method to Find Primes GOLDEN OAKS SOFTWARE Description of a New Method to Find Primes Golden Oaks Software 7524 Soquel Way Citrus Heights, CA 95610 Dr. Joe Butler [email protected] (916) 220 1654 30 September 2008 Copyright Date: Oct 06, 2008 Patent Date: Oct 08, 2008 Number: 61195490 PROPRIETARY STATEMENT This document contains commercial or financial information, or trade secrets, of Golden Oaks Software, which are proprietary and exempt from disclosure to the public under the Freedom of Information Act, 5 U.S.C. 552(b)(4), and unlawful disclosure thereof is a violation of the Trade Secrets Act, 18 U.S.C. 1905. Public disclosure of any such information or trade secrets shall not be made without the written permission of Golden Oaks Software. This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used or disclosed, in whole or in part, for any purposes other than to evaluate the information. If however, a contract is awarded to this offeror as a result of, or in conjunction with, the submission of this data, the Government shall have the right to duplicate, use, or disclose, the data to the extent provided in the resulting contract. The restriction does not limit the Government’s right to use information contained in this data if it is obtained from other sources without restriction. The data subject to this restriction is contained in all sheets. primefnd.doc 1 11/22/2008 COPYRIGHT & PATENTED New Method to Find Primes ABSTRACT The following are documents and word description flowcharts of a new method to find prime numbers. -
Solving Elliptic Diophantine Equations: the General Cubic Case
ACTA ARITHMETICA LXXXVII.4 (1999) Solving elliptic diophantine equations: the general cubic case by Roelof J. Stroeker (Rotterdam) and Benjamin M. M. de Weger (Krimpen aan den IJssel) Introduction. In recent years the explicit computation of integer points on special models of elliptic curves received quite a bit of attention, and many papers were published on the subject (see for instance [ST94], [GPZ94], [Sm94], [St95], [Tz96], [BST97], [SdW97], [ST97]). The overall picture before 1994 was that of a field with many individual results but lacking a comprehensive approach to effectively settling the el- liptic equation problem in some generality. But after S. David obtained an explicit lower bound for linear forms in elliptic logarithms (cf. [D95]), the elliptic logarithm method, independently developed in [ST94] and [GPZ94] and based upon David’s result, provided a more generally applicable ap- proach for solving elliptic equations. First Weierstraß equations were tack- led (see [ST94], [Sm94], [St95], [BST97]), then in [Tz96] Tzanakis considered quartic models and in [SdW97] the authors gave an example of an unusual cubic non-Weierstraß model. In the present paper we shall treat the general case of a cubic diophantine equation in two variables, representing an elliptic curve over Q. We are thus interested in the diophantine equation (1) f(u, v) = 0 in rational integers u, v, where f Q[x,y] is of degree 3. Moreover, we require (1) to represent an elliptic curve∈ E, that is, a curve of genus 1 with at least one rational point (u0, v0). 1991 Mathematics Subject Classification: 11D25, 11G05, 11Y50, 12D10. -
Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions
SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS By ADNAN AHMED MEMON Bachelor of Engineering in Telecommunication Sukkur Institute of Business Administration Sukkur, Sindh, Pakistan 2012 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE July, 2017 SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Thesis Approved: Dr. Subhash C. Kak Thesis Adviser Dr. Qi Cheng Dr. Yanmin (Emily) Gong ii ACKNOWLEDGEMENTS Foremost, I would like to thank Almighty Allah for bestowing upon me His countless blessings, giving me strength and good health to finish this research. It is a great pleasure to acknowledge my deepest thanks to Prof. Subhash Kak, Regents Professor, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK, USA, whose consistent supervision and motivation enabled me to complete this research successfully. I would like to thank my family, especially my Mom for encouraging and supporting me during this whole thesis period. Thank you friends for being with me in difficult times. I would like to thank my sponsors i.e. Fulbright, IIE and USEFP for providing me fully funded scholarship so that I could focus on my research. This would not have been possible without their support. I would like to dedicate this research to my (late) father Mr. Ghulam Sarwar Memon who has always been a role model for me. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University. Name: ADNAN AHMED MEMON Date of Degree: JULY, 2017 Title of Study: SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Major Field: ELECTRICAL ENGINEERING Abstract: This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols. -
The I/O Complexity of Computing Prime Tables 1 Introduction
The I/O Complexity of Computing Prime Tables Michael A. Bender1, Rezaul Chowdhury1, Alex Conway2, Mart´ın Farach-Colton2, Pramod Ganapathi1, Rob Johnson1, Samuel McCauley1, Bertrand Simon3, and Shikha Singh1 1 Stony Brook University, Stony Brook, NY 11794-2424, USA. fbender,rezaul,pganapathi,rob,smccauley,shiksinghg @cs.stonybrook.edu 2 Rutgers University, Piscataway, NJ 08854, USA. ffarach,[email protected] 3 LIP, ENS de Lyon, 46 allee´ d’Italie, Lyon, France. [email protected] Abstract. We revisit classical sieves for computing primes and analyze their performance in the external-memory model. Most prior sieves are analyzed in the RAM model, where the focus is on minimizing both the total number of operations and the size of the working set. The hope is that if the working set fits in RAM, then the sieve will have good I/O performance, though such an outcome is by no means guaranteed by a small working-set size. We analyze our algorithms directly in terms of I/Os and operations. In the external- memory model, permutation can be the most expensive aspect of sieving, in contrast to the RAM model, where permutations are trivial. We show how to implement classical sieves so that they have both good I/O performance and good RAM performance, even when the problem size N becomes huge—even superpolynomially larger than RAM. Towards this goal, we give two I/O-efficient priority queues that are optimized for the operations incurred by these sieves. Keywords: External-Memory Algorithms, Prime Tables, Sorting, Priority Queues 1 Introduction According to Fox News [21], “Prime numbers, which are divisible only by themselves and one, have little mathematical importance. -
Diophantine Equations 1 Exponential Diophantine Equations
Number Theory Misha Lavrov Diophantine equations Western PA ARML Practice October 4, 2015 1 Exponential Diophantine equations Diophantine equations are just equations we solve with the constraint that all variables must be integers. These are generally really hard to solve (for example, the famous Fermat's Last Theorem is an example of a Diophantine equation). Today, we will begin by focusing on a special kind of Diophantine equation: exponential Diophantine equations. Here's an example. Example 1. Solve 5x − 8y = 1 for integers x and y. These can still get really hard, but there's a special technique that solves them most of the time. That technique is to take the equation modulo m. In this example, if 5x − 8y = 1, then in particular 5x − 8y ≡ 1 (mod 21). But what do the powers of 5 and 8 look like modulo 21? We have: • 5x ≡ 1; 5; 4; 20; 16; 17; 1; 5; 4;::: , repeating every 6 steps. • 8y ≡ 1; 8; 1; 8;::: , repeating every 2 steps. So there are only 12 possibilities for 5x − 8y when working modulo 21. We can check them all, and we notice that 1 − 1; 1 − 8; 5 − 1; 5 − 8;:::; 17 − 1; 17 − 8 are not ever equal to 1. So the equation has no solutions. Okay, but there's a magic step here: how did we pick 21? Example 2. Solve 5x − 8y = 1 for integers x and y, but in a way that's not magic. There are several rules to follow for picking the modulus m. The first is one we've already broken: Rule 1: Choose m to be a prime or a power of a prime. -
Archimedes' Cattle Problem
Archimedes’ Cattle Problem D. Joyce, Clark University January 2006 Brief htistory. L. E. Dickson describes the history of Archimede’s Cattle Problem in his History of the Theory of Numbers,1 briefly summarized here. A manuscript found in the Herzog August Library at Wolfenb¨uttel,Germany, was first described in 1773 by G. E. Lessing with a German translation from the Greek and a mathematical commentary by C. Leiste.2 The problem was stated in a Greek epigram in 24 verses along with a solution of part of the problem, but not the last part about square and triangular numbers. Leiste explained how the partial solution may have been derived, but he didn’t solve the last part either. That was first solved by A. Amthor in 1880.3 Part 1. We can solve the first part of the problem with a little algebra and a few hand com- putations. It is a multilinear Diophantine problem with four variables and three equations. If thou art diligent and wise, O stranger, compute the number of cattle of the Sun, who once upon a time grazed on the fields of the Thrinacian isle of Sicily, divided into four herds of different colours, one milk white, another a glossy black, a third yellow and the last dappled. In each herd were bulls, mighty in number according to these proportions: Understand, stranger, that the white bulls were equal to a half and a third of the black together with the whole of the yellow, while the black were equal to the fourth part of the dappled and a fifth, together with, once more, the whole of the yellow. -
Towards Proving the Twin Prime Conjecture Using A
Towards Proving the Twin Prime Conjecture using a Novel Method For Finding the Next Prime Number PN+1 after a Given Prime Number PN and a Refinement on the Maximal Bounded Prime Gap Gi Reema Joshi Department of Computer Science and Engineering Tezpur University Tezpur, Assam 784028, India [email protected] Abstract This paper introduces a new method to find the next prime number after a given prime P . The proposed method is used to derive a system of inequali- ties, that serve as constraints which should be satisfied by all primes whose successor is a twin prime. Twin primes are primes having a prime gap of 2. The pairs (5, 7), (11, 13), (41, 43), etcetera are all twin primes. This paper envisions that if the proposed system of inequalities can be proven to have infinite solutions, the Twin Prime Conjecture will evidently be proven true. The paper also derives a novel upper bound on the prime gap, Gi between Pi and Pi+1, as a function of Pi. Keywords: Prime, Twin Prime Conjecture, Slack, Sieve, Prime Gap 2010 MSC: 11A41, 11N05 arXiv:2004.14819v2 [math.GM] 6 May 2020 1. Introduction A positive integer P > 1 is called a prime number if its only positive divisors are 1 and P itself. For example, 2,3,7,11,19 and so on. There are in- finitely many primes. A simple yet elegant proof of this proposition was given by Euclid around 300 B.C. One interesting question would be, "does there exist a method for generating successive prime numbers along the infinite pool of primes?".