Chains of Semiprime and Prime Ideals in Leavitt Path Algebras 3
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Analysis of Primality Testing and Its Use in Cryptographic Applications
An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability. -
Rings Whose Quasi-Injective Modules Are Injecttve K
proceedings of the american mathematical society Volume 33, Number 2, June 1972 RINGS WHOSE QUASI-INJECTIVE MODULES ARE INJECTTVE K. A. BYRD Abstract. A ring R is called a V-ring, respectively SSI-ring, respectively QH-ring if simple, respectively semisimple, respectively quasi-injective, right Ä-modules are injective. We show that R is SSI if and only if R is a right noetherian V-ring and that any SSI-ring is a finite ring direct sum of simple SSI-rings. We show that if R is left noetherian and SSI then R is QII provided R is hereditary and that in order for R to be hereditary it suffices that maximal right ideals of R be reflexive. An example of Cozzens is cited to show these rings need not be artinian. The rings R which have the property that quasi-injective right R- modules are injective (herein called QII-rings) have been little mentioned in the literature though related classes of rings have been extensively examined. Consider the classes of R-modules consisting of (1) all R- modules, (2) injective R-modules, (3) projective R-modules, (4) quasi- injective R-modules, and (5) quasi-projective R-modules. Of all the nontrivial inclusions one can assume between two of these classes, all but one has been shown to characterize the ring R as either semisimple artinian, quasi-Frobenius, or uniserial. That one excepted is the class of QII-rings whose internal structure, it seems, has not been completely determined. This paper does not attempt a general structure theorem but investi- gates the connection between QII-rings and rings whose semisimple right modules are injective (SSI-rings). -
MATH 404: ARITHMETIC 1. Divisibility and Factorization After Learning To
MATH 404: ARITHMETIC S. PAUL SMITH 1. Divisibility and Factorization After learning to count, add, and subtract, children learn to multiply and divide. The notion of division makes sense in any ring and much of the initial impetus for the development of abstract algebra arose from problems of division√ and factoriza- tion, especially in rings closely related to the integers such as Z[ d]. In the next several chapters we will follow this historical development by studying arithmetic in these and similar rings. √ To see that there are some serious issues to be addressed notice that in Z[ −5] the number 6 factorizes as a product of irreducibles in two different ways, namely √ √ 6 = 2.3 = (1 + −5)(1 − −5). 1 It isn’t hard to show these factors are irreducible but we postpone√ that for now . The key point for the moment is to note that this implies that Z[ −5] is not a unique factorization domain. This is in stark contrast to the integers. Since our teenage years we have taken for granted the fact that every integer can be written as a product of primes, which in Z are the same things as irreducibles, in a unique way. To emphasize the fact that there are questions to be understood, let us mention that Z[i] is a UFD. Even so, there is the question which primes in Z remain prime in Z[i]? This is a question with a long history: Fermat proved in ??? that a prime p in Z remains prime in Z[i] if and only if it is ≡ 3(mod 4).√ It is then natural to ask for each integer d, which primes in Z remain prime in Z[ d]? These and closely related questions lie behind much of the material we cover in the next 30 or so pages. -
GRACEFUL and PRIME LABELINGS -Algorithms, Embeddings and Conjectures
GRACEFUL AND PRIME LABELINGS-Algorithms, Embeddings and Conjectures Group Discussion (KREC, Surathkal: Aug.16-25, 1999). Improved Version. GRACEFUL AND PRIME LABELINGS -Algorithms, Embeddings and Conjectures Suryaprakash Nagoji Rao* Exploration Business Group MRBC, ONGC, Mumbai-400 022 Abstract. Four algorithms giving rise to graceful graphs from a known (non-)graceful graph are described. Some necessary conditions for a graph to be highly graceful and critical are given. Finally some conjectures are made on graceful, critical and highly graceful graphs. The Ringel-Rosa-Kotzig Conjecture is generalized to highly graceful graphs. Mayeda-Seshu Tree Generation Algorithm is modified to generate all possible graceful labelings of trees of order p. An alternative algorithm in terms of integers modulo p is described which includes all possible graceful labelings of trees of order p and some interesting properties are observed. Optimal and graceful graph embeddings (not necessarily connected) are given. Alternative proofs for embedding a graph into a graceful graph as a subgraph and as an induced subgraph are included. An algorithm to obtain an optimal graceful embedding is described. A necessary condition for a graph to be supergraceful is given. As a consequence some classes of non-supergraceful graphs are obtained. Embedding problems of a graph into a supergraceful graph are studied. A catalogue of super graceful graphs with at most five nodes is appended. Optimal graceful and supergraceful embeddings of a graph are given. Graph theoretical properties of prime and superprime graphs are listed. Good upper bound for minimum number of edges in a nonprime graph is given and some conjectures are proposed which in particular includes Entringer’s prime tree conjecture. -
On Subdirect Product of Prime Modules
Commun. Korean Math. Soc. 32 (2017), No. 2, pp. 277–285 https://doi.org/10.4134/CKMS.c160103 pISSN: 1225-1763 / eISSN: 2234-3024 ON SUBDIRECT PRODUCT OF PRIME MODULES Najmeh Dehghani and Mohammad Reza Vedadi Abstract. In the various module generalizations of the concepts of prime (semiprime) for a ring, the question “when are semiprime modules sub- direct product of primes?” is a serious question in this context and it is considered by earlier authors in the literature. We continue study on the above question by showing that: If R is Morita equivalent to a right pre-duo ring (e.g., if R is commutative) then weakly compressible R-modules are precisely subdirect products of prime R-modules if and only if dim(R) = 0 and R/N(R) is a semi-Artinian ring if and only if every classical semiprime module is semiprime. In this case, the class of weakly compressible R-modules is an enveloping for Mod-R. Some related conditions are also investigated. 1. Introduction Throughout this paper rings will have a nonzero identity, modules will be right and unitary. In the literature, there are several module generalizations of a semiprime (prime) ring, see [15, Sections 13 and 14] for an excellent reference on the subject. These generalizations introduce various concepts of semiprime (prime) modules and many important theories on semiprime (prime) rings are generalized to modules by them, see; [3], [7], [8], [10] and [17]. The natural question “when are semiprime modules subdirect product of primes?” is then appeared related to these generalizations. In the following, we first recall some definitions of the literature and explain some where the above question was studied. -
Annihilators in Semiprime Right Goldie Rings
Proceedings of the Edinburgh Mathematical Society (1992) 35, 133-137 © ANNIHILATORS IN SEMIPRIME RIGHT GOLDIE RINGS by C. R. HAJARNAVIS (Received 20th March 1990) (i) Let R be a semiprime right Goldie ring with dim R = n. Then a maximal chain of right annihilators in R has exactly n terms, (ii) A semiprime locally right Goldie ring with ACC and DCC on right annihilators is a right Goldie ring. 1980 Mathematics subject classification (1985 Revision): 16A34. 1. Introduction The aim of this note is to answer two questions raised by Brown and Wehrfritz in [1]. Let R be a semiprime right Goldie ring of uniform dimension n. Since the right singular ideal of R is zero, the right annihilators are complements and so any ascending (or descending) chain of right annihilators in R has at most n terms. While studying certain crossed products, Brown and Wehrfritz have wondered if a maximal such chain necessarily has n terms. This is easy to see if the Goldie chain conditions are assumed to be two-sided. In this case R has a two-sided quotient ring Q of dimension n. The extension of a chain of right annihilators in R can be refined to a chain of length n of right ideals in Q. Intersecting back to R we get a chain of length n in which every term is a right annihilator of a single element of R; this last property following from the fact that elements of Q are expressible as left fractions. We demonstrate here that although the above strategy fails under one-sided assumptions, further analysis of right complements in R shows the required result to be true (Theorem 3.4). -
13 Lectures on Fermat's Last Theorem
I Paulo Ribenboim 13 Lectures on Fermat's Last Theorem Pierre de Fermat 1608-1665 Springer-Verlag New York Heidelberg Berlin Paulo Ribenboim Department of Mathematics and Statistics Jeffery Hall Queen's University Kingston Canada K7L 3N6 Hommage a AndrC Weil pour sa Leqon: goat, rigueur et pCnCtration. AMS Subiect Classifications (1980): 10-03, 12-03, 12Axx Library of Congress Cataloguing in Publication Data Ribenboim, Paulo. 13 lectures on Fermat's last theorem. Includes bibliographies and indexes. 1. Fermat's theorem. I. Title. QA244.R5 512'.74 79-14874 All rights reserved. No part of this book may be translated or reproduced in any form without written permission from Springer-Verlag. @ 1979 by Springer-Verlag New York Inc. Printed in the United States of America. 987654321 ISBN 0-387-90432-8 Springer-Verlag New York ISBN 3-540-90432-8 Springer-Verlag Berlin Heidelberg Preface Fermat's problem, also called Fermat's last theorem, has attracted the attention of mathematicians for more than three centuries. Many clever methods have been devised to attack the problem, and many beautiful theories have been created with the aim of proving the theorem. Yet, despite all the attempts, the question remains unanswered. The topic is presented in the form of lectures, where I survey the main lines of work on the problem. In the first two lectures, there is a very brief description of the early history, as well as a selection of a few of the more representative recent results. In the lectures which follow, I examine in suc- cession the main theories connected with the problem. -
A Note on Varieties of Semiprime Rings with Semigroup Identities
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector JOURNAL OF ALGEBRA 54, 42-45 (1978) A Note on Varieties of Semiprime Rings with Semigroup Identities IGOR Z. GOLUBCHIK AND ALEXANDER MIKHALEV Department of Mechanics and Mathematics, Moscow State University, Moscow V-234, USSR Communicated by A. W. Goldie Received November 14. 1977 Let o(x, ,..., xk) and u(xr ,..., xk) be any monomials, f(x, ,..., x~) = @I ,**., Xt) - u(q >..., xk), and degf the total degree of f(zl ,..., xk). A poly- nomial identityf(x, ,..., x~) = 0 will be called a semigroup identity. Examples of rings with semigroup identities. (1) R is a commutative ring. Then we take f(xl , ~a) = xi.‘cz - x.~x, . (2) R is a finite ring. Indeed (see, for instance, [5]), let I R j = r < 03. Consider fi : R -+ R, i = I,2 ,..., given by fi(a) = ui for all a E R. We have no more than F-I distinct maps fi . So fit = fi for some I < K. Thus ux- = a2 for all a E R and we take f(x) = .G’ - 9. We remark that varieties of the form var(R), where R is a finite ring, were described in many ways among all other varieties of rings by Lvov [5, 61 and Kruse [7]. Our main result is the following THEOREM. Let R be a semiprime associative ring with a semigroup identity. Denote the variety of R by var(R). Then var(R) = var(A @ B), where A is a finite ring and B is a commutative ring. -
IN Herstein Proved That If R Is a Prime Ring and D Is an Inner Derivation Of
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 124, Number 6, June 1996 A RESULT ON DERIVATIONS TSIU-KWEN LEE AND JER-SHYONG LIN (Communicated by Ken Goodearl) Abstract. Let R be a semiprime ring with a derivation d and let U be a Lie ideal of R, a R. Suppose that ad(u)n =0forallu U,wherenis a fixed positive integer.∈ Then ad(I)=0forIthe ideal of R generatedby[∈ U, U]and if R is 2-torsion free, then ad(U) = 0. Furthermore, R is a subdirect sum of semiprime homomorphic images R1 and R2 with derivations d1 and d2, induced canonically by d, respectively such that ad1(R1) = 0 and the image of U in R2 is commutative (central if R is 2-torsion free), where a denotes the image of a in R1.Moreover,ifU=R,thenad(R) = 0. This gives Bre˘sar’s theorem without the (n 1)!-torsion free assumption on R. − In [8] I. N. Herstein proved that if R is a prime ring and d is an inner derivation of R such that d(x)n =0forallx Rand n a fixed integer, then d =0.In[6] A. Giambruno and I. N. Herstein extended∈ this result to arbitrary derivations in semiprime rings. In [2] L. Carini and A. Giambruno proved that if R is a prime ring with a derivation d such that d(x)n(x) =0forallx U, a Lie ideal of R, then d(U)=0whenRhas no nonzero nil right ideals, char∈R =2andthesame conclusion holds when n(x)=nis fixed and R is a 2-torsion free6 semiprime ring. -
A Performant, Misuse-Resistant API for Primality Testing
A Performant, Misuse-Resistant API for Primality Testing Jake Massimo1 and Kenneth G. Paterson2 1 Information Security Group, Royal Holloway, University of London [email protected] 2 Department of Computer Science, ETH Zurich [email protected] Abstract. Primality testing is a basic cryptographic task. But developers today are faced with complex APIs for primality testing, along with documentation that fails to clearly state the reliability of the tests being performed. This leads to the APIs being incorrectly used in practice, with potentially disastrous consequences. In an effort to overcome this, we present a primality test having a simplest-possible API: the test accepts a number to be tested and returns a Boolean indicating whether the input was composite or probably prime. For all inputs, the output is guaranteed to be correct with probability at least 1 − 2−128. The test is performant: on random, odd, 1024-bit inputs, it is faster than the default test used in OpenSSL by 17%. We investigate the impact of our new test on the cost of random prime generation, a key use case for primality testing. The OpenSSL developers have adopted our suggestions in full; our new API and primality test are scheduled for release in OpenSSL 3.0. 1 Introduction Primality testing, and closely related tasks like random prime generation and testing of Diffie-Hellman parameters, are core cryptographic tasks. Primality testing is by now very well understood mathematically; there is a clear distinction between accuracy and running time of different tests in settings that are malicious (i.e. -
Fermat's Last Theorem for Regular Primes: Dinesh S. Thakur
Fermat's last theorem for regular primes Dinesh S. Thakur The so-called Fermat's last theorem (FLT for short) that `there are no integral solutions to xn + yn = zn, with n > 2 and xyz 6= 0 (a non-triviality condition)' is now proved by Wiles. The proof is outside the scope of this summer school, though we will sketch some ideas in the later lectures. Now we will prove the so-called `regular prime case' of FLT, following Kummer in essence, but connecting with later ideas and simplifications by other mathematicians. It may be advisable to first learn the proof for n = 3 from Hardy and Wright or from Ireland-Rosen pp. 285-286, which prove even stronger result, using only the basics of quadratic fields that we have seen. Since FLT for the exponent n implies FLT for multiples of n and since we proved it for n = 4, it is enough to prove FLT for n = p an odd prime. The basic strategy is the same as before: try to get an infinite descent and thus a contradiction starting with an assumed non-trivial solution. We have p Q i a factorization z = (x + ζpy) and we try to conclude that each factor (apart from GCD) is a p-th power. This conclusion is justified in the case of unique factorization domains. But since we only have unique factorization in ideals in general, we can conclude that each factor is a p-th power of an ideal, which can be further assumed to be principal, if p does not divide h, the class number of Q(ζp). -
Π-Complemented Algebras Through Pseudocomplemented Lattices
Order (2012) 29:463–479 DOI 10.1007/s11083-011-9214-4 π-Complemented Algebras Through Pseudocomplemented Lattices Juan Carlos Cabello · Miguel Cabrera · Antonio Fernández López Received: 8 April 2010 / Accepted: 5 April 2011 / Published online: 5 May 2011 © Springer Science+Business Media B.V. 2011 Abstract For an ideal I of a nonassociative algebra A,theπ-closure of I is defined by I = Ann(Ann(I)), where Ann(I) denotes the annihilator of I, i.e., the largest ideal J of A such that IJ = JI = 0. An algebra A is said to be π-complemented if for every π-closed ideal U of A there exists a π-closed ideal V of A such that A = U ⊕ V. For instance, the centrally closed semiprime ring, and the AW∗-algebras (or more generally, boundedly centrally closed C∗-algebras) are π-complemented algebras. In this paper we develop a structure theory for π-complemented algebras by using and revisiting some results of the structure theory for pseudocomplemented lattices. Keywords Pseudocomplemented lattices · Semiprime algebras · Closure operations · Complemented algebras · Decomposable algebras Mathematics Subject Classifications (2010) Primary 17A60; Secondary 06D15 J.C. Cabello and M. Cabrera were supported by the MICINN and Fondos FEDER, MTM2009-12067, and, in addition, by the Junta de Andalucía Grant FQM290. A. Fernández López was supported by the MEC and Fondos FEDER, MTM2007-61978 and MTM2010-19482. J. C. Cabello · M. Cabrera Departamento de Análisis Matemático, Facultad de Ciencias, Universidad de Granada, 18071 Granada, Spain J. C. Cabello e-mail: [email protected] M. Cabrera e-mail: [email protected] A.