Solved and Unsolved Problems in Number Theory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Amazing Prime Heuristic.Pdf
This document has been moved to https://arxiv.org/abs/2103.04483 Please use that version instead. AN AMAZING PRIME HEURISTIC CHRIS K. CALDWELL 1. Introduction The record for the largest known twin prime is constantly changing. For example, in October of 2000, David Underbakke found the record primes: 83475759 264955 1: · The very next day Giovanni La Barbera found the new record primes: 1693965 266443 1: · The fact that the size of these records are close is no coincidence! Before we seek a record like this, we usually try to estimate how long the search might take, and use this information to determine our search parameters. To do this we need to know how common twin primes are. It has been conjectured that the number of twin primes less than or equal to N is asymptotic to N dx 2C2N 2C2 2 2 Z2 (log x) ∼ (log N) where C2, called the twin prime constant, is approximately 0:6601618. Using this we can estimate how many numbers we will need to try before we find a prime. In the case of Underbakke and La Barbera, they were both using the same sieving software (NewPGen1 by Paul Jobling) and the same primality proving software (Proth.exe2 by Yves Gallot) on similar hardware{so of course they choose similar ranges to search. But where does this conjecture come from? In this chapter we will discuss a general method to form conjectures similar to the twin prime conjecture above. We will then apply it to a number of different forms of primes such as Sophie Germain primes, primes in arithmetic progressions, primorial primes and even the Goldbach conjecture. -
An Analysis of Primality Testing and Its Use in Cryptographic Applications
An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability. -
Solving the Discrete Logarithms in Quasi-Polynomial Time
Solving the discrete logarithms in quasi-polynomial time Ivo Kubjas 1 Introduction 1.1 Discrete logarithm The discrete logarithm problem is analogous to the problem of finding logarithm in finite groups. Definition 1 (Discrete logarithm). Discrete logarithm of h to the base g is x such that gx = h: We denote the discrete logarithm as logg(h) = x. The discrete logarithm has similar algebraic properties as for logarithm in reals. 0 0 Namely, logg(hh ) = logg(h) + logg(h ). The discrete logarithm problem is also randomly self-reducible. This means that there are no “difficult” problems. If there would be an element h in the group for which the logarithm is hard to solve, then it is possible to take 1 ≤ x? ≤ q, where q is the order ? of the group. Now, instead of finding the logarithm of h, we find the logarithm of hgx ? and subtract x? from the result. We know that if x? is chosen uniformly, then also gx is ? uniformly distributed in the group and hgx is uniformly distributed. Thus the difficult problem is reduced to solving the discrete logarithm for an average element in the group. Random self-reducibility allows for \easy" problems in the same group. 1.2 The difficulty of computing discrete logarithm Naturally, a question of why computing discrete logarithms is more difficult than comput- ing logarithms arises. For example, there exists a simple algorithm to compute logarithms in reals. Algorithm 1 (Finding logarithm). Let the base be b. We find the logarithm to the base 2 and convert the logarithm to required base in the final step. -
Gaussian Prime Labeling of Super Subdivision of Star Graphs
of Math al em rn a u ti o c J s l A a Int. J. Math. And Appl., 8(4)(2020), 35{39 n n d o i i t t a s n A ISSN: 2347-1557 r e p t p n l I i c • Available Online: http://ijmaa.in/ a t 7 i o 5 n 5 • s 1 - 7 4 I 3 S 2 S : N International Journal of Mathematics And its Applications Gaussian Prime Labeling of Super Subdivision of Star Graphs T. J. Rajesh Kumar1,∗ and Antony Sanoj Jerome2 1 Department of Mathematics, T.K.M College of Engineering, Kollam, Kerala, India. 2 Research Scholar, University College, Thiruvananthapuram, Kerala, India. Abstract: Gaussian integers are the complex numbers of the form a + bi where a; b 2 Z and i2 = −1 and it is denoted by Z[i]. A Gaussian prime labeling on G is a bijection from the vertices of G to [ n], the set of the first n Gaussian integers in the spiral ordering such that if uv 2 E(G), then (u) and (v) are relatively prime. Using the order on the Gaussian integers, we discuss the Gaussian prime labeling of super subdivision of star graphs. MSC: 05C78. Keywords: Gaussian Integers, Gaussian Prime Labeling, Super Subdivision of Graphs. © JS Publication. 1. Introduction The graphs considered in this paper are finite and simple. The terms which are not defined here can be referred from Gallian [1] and West [2]. A labeling or valuation of a graph G is an assignment f of labels to the vertices of G that induces for each edge xy, a label depending upon the vertex labels f(x) and f(y). -
Number Theory Course Notes for MA 341, Spring 2018
Number Theory Course notes for MA 341, Spring 2018 Jared Weinstein May 2, 2018 Contents 1 Basic properties of the integers 3 1.1 Definitions: Z and Q .......................3 1.2 The well-ordering principle . .5 1.3 The division algorithm . .5 1.4 Running times . .6 1.5 The Euclidean algorithm . .8 1.6 The extended Euclidean algorithm . 10 1.7 Exercises due February 2. 11 2 The unique factorization theorem 12 2.1 Factorization into primes . 12 2.2 The proof that prime factorization is unique . 13 2.3 Valuations . 13 2.4 The rational root theorem . 15 2.5 Pythagorean triples . 16 2.6 Exercises due February 9 . 17 3 Congruences 17 3.1 Definition and basic properties . 17 3.2 Solving Linear Congruences . 18 3.3 The Chinese Remainder Theorem . 19 3.4 Modular Exponentiation . 20 3.5 Exercises due February 16 . 21 1 4 Units modulo m: Fermat's theorem and Euler's theorem 22 4.1 Units . 22 4.2 Powers modulo m ......................... 23 4.3 Fermat's theorem . 24 4.4 The φ function . 25 4.5 Euler's theorem . 26 4.6 Exercises due February 23 . 27 5 Orders and primitive elements 27 5.1 Basic properties of the function ordm .............. 27 5.2 Primitive roots . 28 5.3 The discrete logarithm . 30 5.4 Existence of primitive roots for a prime modulus . 30 5.5 Exercises due March 2 . 32 6 Some cryptographic applications 33 6.1 The basic problem of cryptography . 33 6.2 Ciphers, keys, and one-time pads . -
History of the Numerical Methods of Pi
History of the Numerical Methods of Pi By Andy Yopp MAT3010 Spring 2003 Appalachian State University This project is composed of a worksheet, a time line, and a reference sheet. This material is intended for an audience consisting of undergraduate college students with a background and interest in the subject of numerical methods. This material is also largely recreational. Although there probably aren't any practical applications for computing pi in an undergraduate curriculum, that is precisely why this material aims to interest the student to pursue their own studies of mathematics and computing. The time line is a compilation of several other time lines of pi. It is explained at the bottom of the time line and further on the worksheet reference page. The worksheet is a take-home assignment. It requires that the student know how to construct a hexagon within and without a circle, use iterative algorithms, and code in C. Therefore, they will need a variety of materials and a significant amount of time. The most interesting part of the project was just how well the numerical methods of pi have evolved. Currently, there are iterative algorithms available that are more precise than a graphing calculator with only a single iteration of the algorithm. This is a far cry from the rough estimate of 3 used by the early Babylonians. It is also a different entity altogether than what the circle-squarers have devised. The history of pi and its numerical methods go hand-in-hand through shameful trickery and glorious achievements. It is through the evolution of these methods which I will try to inspire students to begin their own research. -
MATH 404: ARITHMETIC 1. Divisibility and Factorization After Learning To
MATH 404: ARITHMETIC S. PAUL SMITH 1. Divisibility and Factorization After learning to count, add, and subtract, children learn to multiply and divide. The notion of division makes sense in any ring and much of the initial impetus for the development of abstract algebra arose from problems of division√ and factoriza- tion, especially in rings closely related to the integers such as Z[ d]. In the next several chapters we will follow this historical development by studying arithmetic in these and similar rings. √ To see that there are some serious issues to be addressed notice that in Z[ −5] the number 6 factorizes as a product of irreducibles in two different ways, namely √ √ 6 = 2.3 = (1 + −5)(1 − −5). 1 It isn’t hard to show these factors are irreducible but we postpone√ that for now . The key point for the moment is to note that this implies that Z[ −5] is not a unique factorization domain. This is in stark contrast to the integers. Since our teenage years we have taken for granted the fact that every integer can be written as a product of primes, which in Z are the same things as irreducibles, in a unique way. To emphasize the fact that there are questions to be understood, let us mention that Z[i] is a UFD. Even so, there is the question which primes in Z remain prime in Z[i]? This is a question with a long history: Fermat proved in ??? that a prime p in Z remains prime in Z[i] if and only if it is ≡ 3(mod 4).√ It is then natural to ask for each integer d, which primes in Z remain prime in Z[ d]? These and closely related questions lie behind much of the material we cover in the next 30 or so pages. -
THE GAUSSIAN INTEGERS Since the Work of Gauss, Number Theorists
THE GAUSSIAN INTEGERS KEITH CONRAD Since the work of Gauss, number theorists have been interested in analogues of Z where concepts from arithmetic can also be developed. The example we will look at in this handout is the Gaussian integers: Z[i] = fa + bi : a; b 2 Zg: Excluding the last two sections of the handout, the topics we will study are extensions of common properties of the integers. Here is what we will cover in each section: (1) the norm on Z[i] (2) divisibility in Z[i] (3) the division theorem in Z[i] (4) the Euclidean algorithm Z[i] (5) Bezout's theorem in Z[i] (6) unique factorization in Z[i] (7) modular arithmetic in Z[i] (8) applications of Z[i] to the arithmetic of Z (9) primes in Z[i] 1. The Norm In Z, size is measured by the absolute value. In Z[i], we use the norm. Definition 1.1. For α = a + bi 2 Z[i], its norm is the product N(α) = αα = (a + bi)(a − bi) = a2 + b2: For example, N(2 + 7i) = 22 + 72 = 53. For m 2 Z, N(m) = m2. In particular, N(1) = 1. Thinking about a + bi as a complex number, its norm is the square of its usual absolute value: p ja + bij = a2 + b2; N(a + bi) = a2 + b2 = ja + bij2: The reason we prefer to deal with norms on Z[i] instead of absolute values on Z[i] is that norms are integers (rather than square roots), and the divisibility properties of norms in Z will provide important information about divisibility properties in Z[i]. -
Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases
INTERSECTIONS OF DELETED DIGITS CANTOR SETS WITH GAUSSIAN INTEGER BASES Athesissubmittedinpartialfulfillment of the requirements for the degree of Master of Science By VINCENT T. SHAW B.S., Wright State University, 2017 2020 Wright State University WRIGHT STATE UNIVERSITY SCHOOL OF GRADUATE STUDIES May 1, 2020 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPER- VISION BY Vincent T. Shaw ENTITLED Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases BE ACCEPTED IN PARTIAL FULFILLMENT OF THE RE- QUIREMENTS FOR THE DEGREE OF Master of Science. ____________________ Steen Pedersen, Ph.D. Thesis Director ____________________ Ayse Sahin, Ph.D. Department Chair Committee on Final Examination ____________________ Steen Pedersen, Ph.D. ____________________ Qingbo Huang, Ph.D. ____________________ Anthony Evans, Ph.D. ____________________ Barry Milligan, Ph.D. Interim Dean, School of Graduate Studies Abstract Shaw, Vincent T. M.S., Department of Mathematics and Statistics, Wright State University, 2020. Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases. In this paper, the intersections of deleted digits Cantor sets and their fractal dimensions were analyzed. Previously, it had been shown that for any dimension between 0 and the dimension of the given deleted digits Cantor set of the real number line, a translate of the set could be constructed such that the intersection of the set with the translate would have this dimension. Here, we consider deleted digits Cantor sets of the complex plane with Gaussian integer bases and show that the result still holds. iii Contents 1 Introduction 1 1.1 WhystudyintersectionsofCantorsets? . 1 1.2 Prior work on this problem . 1 2 Negative Base Representations 5 2.1 IntegerRepresentations ............................. -
GRACEFUL and PRIME LABELINGS -Algorithms, Embeddings and Conjectures
GRACEFUL AND PRIME LABELINGS-Algorithms, Embeddings and Conjectures Group Discussion (KREC, Surathkal: Aug.16-25, 1999). Improved Version. GRACEFUL AND PRIME LABELINGS -Algorithms, Embeddings and Conjectures Suryaprakash Nagoji Rao* Exploration Business Group MRBC, ONGC, Mumbai-400 022 Abstract. Four algorithms giving rise to graceful graphs from a known (non-)graceful graph are described. Some necessary conditions for a graph to be highly graceful and critical are given. Finally some conjectures are made on graceful, critical and highly graceful graphs. The Ringel-Rosa-Kotzig Conjecture is generalized to highly graceful graphs. Mayeda-Seshu Tree Generation Algorithm is modified to generate all possible graceful labelings of trees of order p. An alternative algorithm in terms of integers modulo p is described which includes all possible graceful labelings of trees of order p and some interesting properties are observed. Optimal and graceful graph embeddings (not necessarily connected) are given. Alternative proofs for embedding a graph into a graceful graph as a subgraph and as an induced subgraph are included. An algorithm to obtain an optimal graceful embedding is described. A necessary condition for a graph to be supergraceful is given. As a consequence some classes of non-supergraceful graphs are obtained. Embedding problems of a graph into a supergraceful graph are studied. A catalogue of super graceful graphs with at most five nodes is appended. Optimal graceful and supergraceful embeddings of a graph are given. Graph theoretical properties of prime and superprime graphs are listed. Good upper bound for minimum number of edges in a nonprime graph is given and some conjectures are proposed which in particular includes Entringer’s prime tree conjecture. -
11.6 Discrete Logarithms Over Finite Fields
Algorithms 61 11.6 Discrete logarithms over finite fields Andrew Odlyzko, University of Minnesota Surveys and detailed expositions with proofs can be found in [7, 25, 26, 28, 33, 34, 47]. 11.6.1 Basic definitions 11.6.1 Remark Discrete exponentiation in a finite field is a direct analog of ordinary exponentiation. The exponent can only be an integer, say n, but for w in a field F , wn is defined except when w = 0 and n ≤ 0, and satisfies the usual properties, in particular wm+n = wmwn and (for u and v in F )(uv)m = umvm. The discrete logarithm is the inverse function, in analogy with the ordinary logarithm for real numbers. If F is a finite field, then it has at least one primitive element g; i.e., all nonzero elements of F are expressible as powers of g, see Chapter ??. 11.6.2 Definition Given a finite field F , a primitive element g of F , and a nonzero element w of F , the discrete logarithm of w to base g, written as logg(w), is the least non-negative integer n such that w = gn. 11.6.3 Remark The value logg(w) is unique modulo q − 1, and 0 ≤ logg(w) ≤ q − 2. It is often convenient to allow it to be represented by any integer n such that w = gn. 11.6.4 Remark The discrete logarithm of w to base g is often called the index of w with respect to the base g. More generally, we can define discrete logarithms in groups. -
Gaussian Integers
Gaussian integers 1 Units in Z[i] An element x = a + bi 2 Z[i]; a; b 2 Z is a unit if there exists y = c + di 2 Z[i] such that xy = 1: This implies 1 = jxj2jyj2 = (a2 + b2)(c2 + d2) But a2; b2; c2; d2 are non-negative integers, so we must have 1 = a2 + b2 = c2 + d2: This can happen only if a2 = 1 and b2 = 0 or a2 = 0 and b2 = 1. In the first case we obtain a = ±1; b = 0; thus x = ±1: In the second case, we have a = 0; b = ±1; this yields x = ±i: Since all these four elements are indeed invertible we have proved that U(Z[i]) = {±1; ±ig: 2 Primes in Z[i] An element x 2 Z[i] is prime if it generates a prime ideal, or equivalently, if whenever we can write it as a product x = yz of elements y; z 2 Z[i]; one of them has to be a unit, i.e. y 2 U(Z[i]) or z 2 U(Z[i]): 2.1 Rational primes p in Z[i] If we want to identify which elements of Z[i] are prime, it is natural to start looking at primes p 2 Z and ask if they remain prime when we view them as elements of Z[i]: If p = xy with x = a + bi; y = c + di 2 Z[i] then p2 = jxj2jyj2 = (a2 + b2)(c2 + d2): Like before, a2 + b2 and c2 + d2 are non-negative integers. Since p is prime, the integers that divide p2 are 1; p; p2: Thus there are three possibilities for jxj2 and jyj2 : 1.