Mathematics 4: Number Theory Problem Sheet 3 Workshop 26 Oct

Total Page:16

File Type:pdf, Size:1020Kb

Mathematics 4: Number Theory Problem Sheet 3 Workshop 26 Oct Mathematics 4: Number Theory Problem Sheet 3 Workshop 26 Oct 2012 The aim of this workshop is to show that Carmichael numbers are squarefree and have at least 3 distinct prime factors. (1) (Warm-up question.) Show that n > 1 is prime iff an−1 ≡ 1 (mod n) for 1 ≤ a ≤ n − 1. If n is prime, then the result is true by Fermat’s Theorem. If n is composite, then, for a = p, a prime factor of n, the equation pn−1 + kn =1 has no solution, since the LHS is divisible by p. So result is true iff n prime. Recall that a positive integer is said to be squarefree if it is not divisible by the square of any prime number. Recall too that a Carmichael number is a composite number n with the property that for every integer a coprime to n we have an−1 ≡ 1 (mod n). (2) Proving that Carmichael numbers are squarefree. (a) Show that a given nonsquarefree number n can be written in the form n = pℓN for some prime p and integers N and ℓ with ℓ ≥ 2 and gcd(p, N)=1. (b) Show that (1 + pN)n−1 6≡ 1 (mod p2). (c) Deduce that Carmichael numbers are squarefree. (a) Take a prime p such that p2 | n. Then pℓ||n for some ℓ ≥ 2. So n = pℓN say, where N = n/pℓ is coprime to p. (b) Now (1+pN)n−1 ≡ 1+ pN(n − 1) (mod p2) ≡ 1 − pN (mod p2) 6≡ 1 (mod p2), by the Binomial Theorem and because p2 | n and gcd(N,p)=1. (c) Now take a =1+ pN. Then an−1 6≡ 1 (mod p2) by (b), so an−1 6≡ 1 (mod n). Hence, as gcd(a, n)=1, n is not a Carmichael number. (3) Proving that Carmichael numbers have at least 3 distinct prime factors. (a) Let p and q be distinct primes. Prove that if gcd(a, pq) = 1 then alcm(p−1,q−1) ≡ 1 (mod pq). 1 2 (b) Now let g be a primitive root (mod p) and h be a primitive root (mod q). Using g and h, apply the Chinese Remainder Theorem to specify an integer a whose order (mod pq) is (exactly) lcm(p − 1, q − 1). (c) Now suppose that p is the larger of the primes p and q. Calculate pq − 1 (mod p − 1) ∈{0, 1,...,p − 2}. Deduce that p − 1 ∤ pq − 1. (d) Use the above to show that there is an a with gcd(a, pq) = 1 and apq−1 6≡ 1 (mod pq). (e) Deduce from the above that a Carmichael number must have at least 3 distinct prime factors. (a) By Fermat’s Theorem we have ap−1 ≡ 1 (mod p) and aq−1 ≡ 1 (mod q), so that, taking appropriate powers, alcm(p−1,q−1) ≡ 1 (mod p) and alcm(p−1,q−1) ≡ 1 (mod q). Hence alcm(p−1,q−1) ≡ 1 (mod pq). (b): We simply choose a so that a ≡ g (mod p) and a ≡ h (mod q). This is possible, by CRT. Since g has order p − 1 modulo p and h has order q − 1 modulo q, we have that a has order p − 1 modulo p and order q − 1 modulo q. Hence a has order lcm(p − 1, q − 1) modulo pq. (c): Now pq − 1=(p − 1)q + q − 1 ≡ q − 1 (mod p − 1) 6≡ 0 (mod p − 1), as 0 < q − 1 <p − 1. Hence p − 1 ∤ pq − 1. (d): From (b) there is an a whose order (mod pq) is lcm(p−1, q−1), so that if gcd(a, p)=1 then from (a) we have that ak ≡ 1 (mod pq) iff k is a multiple of lcm(p−1, q−1). But pq−1 is not a multiple of lcm(p− 1, q − 1), since q − 1 ∤ pq − 1. So apq−1 6≡ 1 (mod pq). (e): Now the number a in (d) is clearly coprime to both p and q, i.e., gcd(a, pq)= 1. Hence, from (d), pq is not a Carmichael number. As Carmichael numbers are not prime and are not divisible by the square of any prime, they must have at least 3 prime factors. (4) (Cool-down question.) Suppose that a, k, ℓ, m, n ∈ N with ak ≡ 1 (mod m) and aℓ ≡ 1 (mod n). Prove that (a) alcm(k,ℓ) ≡ 1 (mod lcm(m, n)); (b) agcd(k,ℓ) ≡ 1 (mod gcd(m, n)). ′ (a) Let kk′ = lcm(k,ℓ). Then ak − 1 divides akk − 1 = alcm(k,ℓ) − 1, so that alcm(k,ℓ) ≡ 1 (mod m). Similarly, alcm(k,ℓ) ≡ 1 (mod n). Hence alcm(k,ℓ)− ep fp 1 is divisible by both m and n. Writing m = p p and n = p p , we see that, for each p prime, alcm(k,ℓ)−1 is divisibleQ by pmax(ep,fQp), and max(ep,fp) lcm(k,ℓ) so is divisible by p p = lcm(m, n). So a ≡ 1 (mod lcm(m, n)). Q 3 (b) From ak ≡ 1 (mod m) and aℓ ≡ 1 (mod n) and the fact that G = gcd(m, n) divides both m and n we have ak ≡ 1 (mod G) and aℓ ≡ 1 (mod G). Next, by the Extended Euclidean Algorithm we can find integers k1 and ℓ1 such that kk1 + ℓℓ1 = gcd(k,ℓ). Hence agcd(k,ℓ) = akk1+ℓℓ1 =(ak)k1 · (aℓ)ℓ1 ≡ 1k1 · 1ℓ1 ≡ 1 (mod G). Handin: due Friday, week 7, 2 Nov, before 12.10 lecture. Please hand it in at the lecture The squarefree part of n You are expected to write clearly and legibly, giving thought to the presentation of your answer as a document written in mathematical English. (5) (a) Show that every positive integer n can be written uniquely in the form n = 2 n1n2, where n1 is squarefree. Let us denote n1 by g(n), the squarefree part of n. (b) Prove that g(n) is a multiplicative function. (c) Find the Euler product for Dg(s). (d) Prove that Dg(s)= ζ(2s)ζ(s − 1)/ζ(2s − 2). 2k+1 k 2 2k k 2 (a) From p = p · (p ) and p = 1 · (p ) we see that we can take n1 to be the product of primes that divide n to an odd power, as then n1 2 is squarefree and n/n1 is a square, = n2 say. [2 marks] (b) For gcd(m, n)=1, g(m)g(n) = m1n1 with gcd(m1, n1)=1, so that 2 mn = m1n1(m2n2) , with m1n1 squarefree, giving g(mn)= m1n1 = g(m)g(n). [2 marks] (c) Now g(p2k+1)= p, g(p2k)=1 so that ∞ g(pk) p 1 = + pks pks pks Xk=1 kXodd k Xeven =(p/ps +1)(1+1/p2s +1/p4s + . ) =(1+1/ps−1)/(1 − 1/p2s). s−1 2s Hence Dg(s)= p(1+1/p )/(1 − 1/p ). [3 marks] (d) Then Q s−1 2s Dg(s)= (1+1/p )/(1 − 1/p ) Yp = (1 − 1/p2s−2)/((1 − 1/p2s)(1 − 1/ps−1)) Yp =ζ(2s)ζ(s − 1)/ζ(2s − 2). 4 [3 marks] Problems on congruences (6) Let m1,...,mn be pairwise relatively prime. Show that as x runs through the integers x = 1, 2, 3,...,m1m2 ··· mn, the n-tuples (x mod m1, x mod m2,...,x n mod mn) run through all n-tuples in i=1{0, 1,...,mi − 1}. Q ′ If for x, x ∈{1, 2, 3,...,m1m2 ··· mn} the n-tuples (x mod m1, x mod m2,...,x mod mn) and ′ ′ ′ (x mod m1, x mod m2,...,x mod mn) ′ ′ ′ were equal, then the n-tuple (x−x mod m1, x−x mod m2,...,x−x mod mn) ′ would be 0, so that x − x would be divisible by m1m2 ··· mn. This is impossible as they differ by less than this number. Hence all the n-tuples (x mod m1, x mod m2,...,x mod mn) for x =1, 2, 3,...,m1m2 ··· mn are different. As there are only m1m2 ··· mn of them, they must run through them all. (7) Show that the equation xy ≡ 2 (mod 19) has a solution in integers {x, y} iff x is congruent to a primitive root mod 19. Deduce that then y is uniquely specified mod 18. Now (easily checked) 2 is a primitive root (mod 19), so if x is not a primitive root, then xy certainly isn’t. On the other hand, if x is a primitive root, then the powers xy with gcd(y, 18) = 1 give all primitive roots, including 2. Also, if gcd(y, 18) > 1 then xy is not a primitive root. As x18 ≡ 1 (mod 19), y is uniquely specified (mod 18). (8) Wilson’s Theorem. This states that, for a prime p, we have (p − 1)! ≡ −1 (mod p). Prove Wilson’s Theorem in (at least!) two different ways. p−1 [Suggestions: (i) Factorize x − 1 over Fp. (ii) Try to pair up a ∈{1,...,p − 1} with its multiplicative inverse.] (i) Since, from Fermat’s Theorem, xp−1−1 ≡ (x − 1)(x − 2) . (x − (p − 1)) (mod p), Wilson’s Theorem follows on putting x =0. (ii) For any a ∈ {1, 2,...,p − 1} there’s an a′ ∈ {1, 2,...,p − 1} with aa′ ≡ 1 (mod p). Further, a′ = a iff a =1 or p − 1. Hence, in (p − 1)!, the numbers forming this product can be cancelled in pairs, apart from 1 and p − 1.
Recommended publications
  • Fast Tabulation of Challenge Pseudoprimes Andrew Shallue and Jonathan Webster
    THE OPEN BOOK SERIES 2 ANTS XIII Proceedings of the Thirteenth Algorithmic Number Theory Symposium Fast tabulation of challenge pseudoprimes Andrew Shallue and Jonathan Webster msp THE OPEN BOOK SERIES 2 (2019) Thirteenth Algorithmic Number Theory Symposium msp dx.doi.org/10.2140/obs.2019.2.411 Fast tabulation of challenge pseudoprimes Andrew Shallue and Jonathan Webster We provide a new algorithm for tabulating composite numbers which are pseudoprimes to both a Fermat test and a Lucas test. Our algorithm is optimized for parameter choices that minimize the occurrence of pseudoprimes, and for pseudoprimes with a fixed number of prime factors. Using this, we have confirmed that there are no PSW-challenge pseudoprimes with two or three prime factors up to 280. In the case where one is tabulating challenge pseudoprimes with a fixed number of prime factors, we prove our algorithm gives an unconditional asymptotic improvement over previous methods. 1. Introduction Pomerance, Selfridge, and Wagstaff famously offered $620 for a composite n that satisfies (1) 2n 1 1 .mod n/ so n is a base-2 Fermat pseudoprime, Á (2) .5 n/ 1 so n is not a square modulo 5, and j D (3) Fn 1 0 .mod n/ so n is a Fibonacci pseudoprime, C Á or to prove that no such n exists. We call composites that satisfy these conditions PSW-challenge pseudo- primes. In[PSW80] they credit R. Baillie with the discovery that combining a Fermat test with a Lucas test (with a certain specific parameter choice) makes for an especially effective primality test[BW80].
    [Show full text]
  • FACTORING COMPOSITES TESTING PRIMES Amin Witno
    WON Series in Discrete Mathematics and Modern Algebra Volume 3 FACTORING COMPOSITES TESTING PRIMES Amin Witno Preface These notes were used for the lectures in Math 472 (Computational Number Theory) at Philadelphia University, Jordan.1 The module was aborted in 2012, and since then this last edition has been preserved and updated only for minor corrections. Outline notes are more like a revision. No student is expected to fully benefit from these notes unless they have regularly attended the lectures. 1 The RSA Cryptosystem Sensitive messages, when transferred over the internet, need to be encrypted, i.e., changed into a secret code in such a way that only the intended receiver who has the secret key is able to read it. It is common that alphabetical characters are converted to their numerical ASCII equivalents before they are encrypted, hence the coded message will look like integer strings. The RSA algorithm is an encryption-decryption process which is widely employed today. In practice, the encryption key can be made public, and doing so will not risk the security of the system. This feature is a characteristic of the so-called public-key cryptosystem. Ali selects two distinct primes p and q which are very large, over a hundred digits each. He computes n = pq, ϕ = (p − 1)(q − 1), and determines a rather small number e which will serve as the encryption key, making sure that e has no common factor with ϕ. He then chooses another integer d < n satisfying de % ϕ = 1; This d is his decryption key. When all is ready, Ali gives to Beth the pair (n; e) and keeps the rest secret.
    [Show full text]
  • The Pseudoprimes to 25 • 109
    MATHEMATICS OF COMPUTATION, VOLUME 35, NUMBER 151 JULY 1980, PAGES 1003-1026 The Pseudoprimes to 25 • 109 By Carl Pomerance, J. L. Selfridge and Samuel S. Wagstaff, Jr. Abstract. The odd composite n < 25 • 10 such that 2n_1 = 1 (mod n) have been determined and their distribution tabulated. We investigate the properties of three special types of pseudoprimes: Euler pseudoprimes, strong pseudoprimes, and Car- michael numbers. The theoretical upper bound and the heuristic lower bound due to Erdös for the counting function of the Carmichael numbers are both sharpened. Several new quick tests for primality are proposed, including some which combine pseudoprimes with Lucas sequences. 1. Introduction. According to Fermat's "Little Theorem", if p is prime and (a, p) = 1, then ap~1 = 1 (mod p). This theorem provides a "test" for primality which is very often correct: Given a large odd integer p, choose some a satisfying 1 <a <p - 1 and compute ap~1 (mod p). If ap~1 pi (mod p), then p is certainly composite. If ap~l = 1 (mod p), then p is probably prime. Odd composite numbers n for which (1) a"_1 = l (mod«) are called pseudoprimes to base a (psp(a)). (For simplicity, a can be any positive in- teger in this definition. We could let a be negative with little additional work. In the last 15 years, some authors have used pseudoprime (base a) to mean any number n > 1 satisfying (1), whether composite or prime.) It is well known that for each base a, there are infinitely many pseudoprimes to base a.
    [Show full text]
  • Arxiv:1412.5226V1 [Math.NT] 16 Dec 2014 Hoe 11
    q-PSEUDOPRIMALITY: A NATURAL GENERALIZATION OF STRONG PSEUDOPRIMALITY JOHN H. CASTILLO, GILBERTO GARC´IA-PULGAR´IN, AND JUAN MIGUEL VELASQUEZ-SOTO´ Abstract. In this work we present a natural generalization of strong pseudoprime to base b, which we have called q-pseudoprime to base b. It allows us to present another way to define a Midy’s number to base b (overpseudoprime to base b). Besides, we count the bases b such that N is a q-probable prime base b and those ones such that N is a Midy’s number to base b. Furthemore, we prove that there is not a concept analogous to Carmichael numbers to q-probable prime to base b as with the concept of strong pseudoprimes to base b. 1. Introduction Recently, Grau et al. [7] gave a generalization of Pocklignton’s Theorem (also known as Proth’s Theorem) and Miller-Rabin primality test, it takes as reference some works of Berrizbeitia, [1, 2], where it is presented an extension to the concept of strong pseudoprime, called ω-primes. As Grau et al. said it is right, but its application is not too good because it is needed m-th primitive roots of unity, see [7, 12]. In [7], it is defined when an integer N is a p-strong probable prime base a, for p a prime divisor of N −1 and gcd(a, N) = 1. In a reading of that paper, we discovered that if a number N is a p-strong probable prime to base 2 for each p prime divisor of N − 1, it is actually a Midy’s number or a overpseu- doprime number to base 2.
    [Show full text]
  • Composite Numbers That Give Valid RSA Key Pairs for Any Coprime P
    information Article Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p Barry Fagin ID Department of Computer Science, US Air Force Academy, Colorado Springs, CO 80840, USA; [email protected]; Tel.: +1-719-339-4514 Received: 13 August 2018; Accepted: 25 August 2018; Published: 28 August 2018 Abstract: RSA key pairs are normally generated from two large primes p and q. We consider what happens if they are generated from two integers s and r, where r is prime, but unbeknownst to the user, s is not. Under most circumstances, the correctness of encryption and decryption depends on the choice of the public and private exponents e and d. In some cases, specific (s, r) pairs can be found for which encryption and decryption will be correct for any (e, d) exponent pair. Certain s exist, however, for which encryption and decryption are correct for any odd prime r - s. We give necessary and sufficient conditions for s with this property. Keywords: cryptography; abstract algebra; RSA; computer science education; cryptography education MSC: [2010] 11Axx 11T71 1. Notation and Background Consider the RSA public-key cryptosystem and its operations of encryption and decryption [1]. Let (p, q) be primes, n = p ∗ q, f(n) = (p − 1)(q − 1) denote Euler’s totient function and (e, d) the ∗ Z encryption/decryption exponent pair chosen such that ed ≡ 1. Let n = Un be the group of units f(n) Z mod n, and let a 2 Un. Encryption and decryption operations are given by: (ae)d ≡ (aed) ≡ (a1) ≡ a mod n We consider the case of RSA encryption and decryption where at least one of (p, q) is a composite number s.
    [Show full text]
  • The Distribution of Pseudoprimes
    The Distribution of Pseudoprimes Matt Green September, 2002 The RSA crypto-system relies on the availability of very large prime num- bers. Tests for finding these large primes can be categorized as deterministic and probabilistic. Deterministic tests, such as the Sieve of Erastothenes, of- fer a 100 percent assurance that the number tested and passed as prime is actually prime. Despite their refusal to err, deterministic tests are generally not used to find large primes because they are very slow (with the exception of a recently discovered polynomial time algorithm). Probabilistic tests offer a much quicker way to find large primes with only a negligibal amount of error. I have studied a simple, and comparatively to other probabilistic tests, error prone test based on Fermat’s little theorem. Fermat’s little theorem states that if b is a natural number and n a prime then bn−1 ≡ 1 (mod n). To test a number n for primality we pick any natural number less than n and greater than 1 and first see if it is relatively prime to n. If it is, then we use this number as a base b and see if Fermat’s little theorem holds for n and b. If the theorem doesn’t hold, then we know that n is not prime. If the theorem does hold then we can accept n as prime right now, leaving a large chance that we have made an error, or we can test again with a different base. Chances improve that n is prime with every base that passes but for really big numbers it is cumbersome to test all possible bases.
    [Show full text]
  • On Types of Elliptic Pseudoprimes
    journal of Groups, Complexity, Cryptology Volume 13, Issue 1, 2021, pp. 1:1–1:33 Submitted Jan. 07, 2019 https://gcc.episciences.org/ Published Feb. 09, 2021 ON TYPES OF ELLIPTIC PSEUDOPRIMES LILJANA BABINKOSTOVA, A. HERNANDEZ-ESPIET,´ AND H. Y. KIM Boise State University e-mail address: [email protected] Rutgers University e-mail address: [email protected] University of Wisconsin-Madison e-mail address: [email protected] Abstract. We generalize Silverman's [31] notions of elliptic pseudoprimes and elliptic Carmichael numbers to analogues of Euler-Jacobi and strong pseudoprimes. We inspect the relationships among Euler elliptic Carmichael numbers, strong elliptic Carmichael numbers, products of anomalous primes and elliptic Korselt numbers of Type I, the former two of which we introduce and the latter two of which were introduced by Mazur [21] and Silverman [31] respectively. In particular, we expand upon the work of Babinkostova et al. [3] on the density of certain elliptic Korselt numbers of Type I which are products of anomalous primes, proving a conjecture stated in [3]. 1. Introduction The problem of efficiently distinguishing the prime numbers from the composite numbers has been a fundamental problem for a long time. One of the first primality tests in modern number theory came from Fermat Little Theorem: if p is a prime number and a is an integer not divisible by p, then ap−1 ≡ 1 (mod p). The original notion of a pseudoprime (sometimes called a Fermat pseudoprime) involves counterexamples to the converse of this theorem. A pseudoprime to the base a is a composite number N such aN−1 ≡ 1 mod N.
    [Show full text]
  • 1 Integers and Divisibility
    Jay Daigle Occidental College Math 322: Number Theory 1 Integers and Divisibility In this course we primarily want to study the factorization properties of integers. So we should probably start by reminding ourselves how integers and factorization work. Much of this material was covered in Math 210, but we shall review it so we can use it during the rest of the course, as well as perhaps putting it on a somewhat firmer foundation. 1.1 The integers and the rationals For further reading on the material in this subsection, consult Rosen 1.1{1.3; PMF 1.1{ 1.2, 2.1{2.2. Definition 1.1. The integers are elements of the set Z = f:::; −2; −1; 0; 1; 2;::: g. The natural numbers are elements of the set N = f1; 2;::: g of positive integers. The rational numbers are elements of the set Q = fp=q : p; q 2 Zg. Remark 1.2. 1. Some sources include 0 as a natural number; in this course we will not, and none of the four suggested texts do so. 2. You may feel like these aren't really definitions, and you're not entirely wrong. A rigor- ous definition of the natural numbers is an extremely tedious exercise in mathematical logic; famously, Russell and Whitehead feature the proposition that \1 + 1 = 2" on page 379 of Principia Mathematica. We will simply trust that everyone in this course understands how to count. The natural numbers have two very important properties. Fact 1.3 (The Well-Ordering Property). Every subset of the natural numbers has a least element.
    [Show full text]
  • Primality Testing and Sub-Exponential Factorization
    Primality Testing and Sub-Exponential Factorization David Emerson Advisor: Howard Straubing Boston College Computer Science Senior Thesis May, 2009 Abstract This paper discusses the problems of primality testing and large number factorization. The first section is dedicated to a discussion of primality test- ing algorithms and their importance in real world applications. Over the course of the discussion the structure of the primality algorithms are devel- oped rigorously and demonstrated with examples. This section culminates in the presentation and proof of the modern deterministic polynomial-time Agrawal-Kayal-Saxena algorithm for deciding whether a given n is prime. The second section is dedicated to the process of factorization of large com- posite numbers. While primality and factorization are mathematically tied in principle they are very di⇥erent computationally. This fact is explored and current high powered factorization methods and the mathematical structures on which they are built are examined. 1 Introduction Factorization and primality testing are important concepts in mathematics. From a purely academic motivation it is an intriguing question to ask how we are to determine whether a number is prime or not. The next logical question to ask is, if the number is composite, can we calculate its factors. The two questions are invariably related. If we can factor a number into its pieces then it is obviously not prime, if we can’t then we know that it is prime. The definition of primality is very much derived from factorability. As we progress through the known and developed primality tests and factorization algorithms it will begin to become clear that while primality and factorization are intertwined they occupy two very di⇥erent levels of computational di⇧culty.
    [Show full text]
  • Independence of the Miller-Rabin and Lucas Probable Prime Tests
    Independence of the Miller-Rabin and Lucas Probable Prime Tests Alec Leng Mentor: David Corwin March 30, 2017 1 Abstract In the modern age, public-key cryptography has become a vital component for se- cure online communication. To implement these cryptosystems, rapid primality test- ing is necessary in order to generate keys. In particular, probabilistic tests are used for their speed, despite the potential for pseudoprimes. So, we examine the commonly used Miller-Rabin and Lucas tests, showing that numbers with many nonwitnesses are usually Carmichael or Lucas-Carmichael numbers in a specific form. We then use these categorizations, through a generalization of Korselt’s criterion, to prove that there are no numbers with many nonwitnesses for both tests, affirming the two tests’ relative independence. As Carmichael and Lucas-Carmichael numbers are in general more difficult for the two tests to deal with, we next search for numbers which are both Carmichael and Lucas-Carmichael numbers, experimentally finding none less than 1016. We thus conjecture that there are no such composites and, using multi- variate calculus with symmetric polynomials, begin developing techniques to prove this. 2 1 Introduction In the current information age, cryptographic systems to protect data have become a funda- mental necessity. With the quantity of data distributed over the internet, the importance of encryption for protecting individual privacy has greatly risen. Indeed, according to [EMC16], cryptography is allows for authentication and protection in online commerce, even when working with vital financial information (e.g. in online banking and shopping). Now that more and more transactions are done through the internet, rather than in person, the importance of secure encryption schemes is only growing.
    [Show full text]
  • Idempotent Integers: the Complete Class of Numbers N = ¯P¯Q That Work
    Idempotent Integers: The complete class of numbers n =p ¯q¯ that work correctly in RSA A Mathematical Curiosity Barry Fagin Senior Associate Dean of the Faculty Professor of Computer Science United States Air Force Academy 2021 Conference on Geometry, Algebraic Number Theory and Applications Barry Fagin (A Mathematical Curiosity) Take two positive numbers p¯; q¯. Compute n =p ¯q¯. Pick e; d such that ed ≡ 1. (¯p−1)(¯q−1) What are the conditions on p¯; q¯ such that s.t. 1 ed ? 8a 2 Zn; 8e; d ed ≡ ; a ≡ a (¯p−1)(¯q−1) n In other words, what are the conditions on p¯; q¯ such that RSA works correctly? Note: not asking about security. Barry Fagin (A Mathematical Curiosity) 70's: p¯; q¯ prime meets the conditions. If suciently large, system is believed to be secure due to computational intractability of factoring. 90's: Some Carmichael numbers C also can be factored into p¯; q¯ that meet the required conditions. This work (since 2018) gives necessary and sucient conditions, shows examples. Barry Fagin (A Mathematical Curiosity) Cut to the chase Answer is: p¯; q¯ square free, gcd(p¯; q¯) = 1 such that (¯p − 1)(¯q − 1) ≡ 0 λ(n) where λ denotes the Carmichael lambda function. Barry Fagin (A Mathematical Curiosity) From n's point of view Equivalently, a square-free n can be factored into n =p ¯q¯ such that (¯p − 1)(¯q − 1) ≡ 0 λ(n) In that case, we say that n has an idempotent factorization, and that n is an idempotent integer. Barry Fagin (A Mathematical Curiosity) The rst 8 square-free n with m ≥ 3 factors that admit idempotent factorizations are shown below: n p or p¯ q¯ 30 5 6 42 7 6 66 11 6 78 13 6 102 17 6 105 7 15 114 19 6 130 13 10 Table: Values of n that admit idempotent factorizations Barry Fagin (A Mathematical Curiosity) Idempotent factorizations where one of p¯; q¯ is prime and one is composite are semi-composite.
    [Show full text]
  • Solutions to 18.781 Problem Set 4 - Fall 2008 Due Tuesday, Oct
    Solutions to 18.781 Problem Set 4 - Fall 2008 Due Tuesday, Oct. 7 at 1:00 1. (a) Prove that for any arithmetic functions f, X X n f(d) = f . d d|n d|n To show the relation, we only have to show this equality of sets: n {d ∈ | d|n} = { ∈ | d|n}. N d N So we have the following string of equivalences. x ∈ {d ∈ N | d|n} ⇔ ∃y ∈ N s.t. xy = n n ⇔ ∃y ∈ s.t. y|n and = x N y n ⇔ x ∈ { ∈ | d|n}. d N (b) Prove that if g is another arithmetic function, then X n X n f(d) g = f g(d). d d d|n d|n Here we can manipulate the index in the summation to show that the two sums are equal. Note that this method can also be used above. X n X X X n f(d)g = f(d)g(e) = f(e)g(d) = f g(d). d d d|n de=n de=n d|n 2. The Riemann Zeta function is one of the most important functions in number theory (and the subject of a million dollar research prize!). It is defined for complex arguments s as X 1 Y 1 ζ(s) := = , ns 1 − 1 n≥1 p prime ps although the above formulas only converge for <(s) > 1. (a) Prove that the sum and product formulas for ζ(s) are actually equal. For this problem I will ignore some of the tricky convergence issues to give a more intuitive explanation.
    [Show full text]