Solved and Unsolved Problems in Number Theory

Total Page:16

File Type:pdf, Size:1020Kb

Solved and Unsolved Problems in Number Theory CONTENTS PAGE PREFACE....................................... Chapter I FROM PERFECT KGXIBERS TO THE QUADRATIC RECIPROCITY LAW SECTION 1. Perfect Xumbcrs .......................................... 1 2 . Euclid ............ ............................. 4 3. Euler’s Converse Pr ................ ............... 8 SECOND EDITION 4 . Euclid’s Algorithm ....... ............................... 8 5. Cataldi and Others...... ............................... 12 6 . The Prime Kumber Theorem .............................. 15 Copyright 0.1962. by Daniel Shanks 7 . Two Useful Theorems ...................................... 17 Copyright 0. 1978. by Daniel Shanks 8. Fermat. and 0t.hcrs........................................ 19 9 . Euler’s Generalization Promd ............................... 23 10. Perfect Kunibers, I1 ....................................... 25 11. Euler and dial.. ........................... ............. 25 Library of Congress Cataloging in Publication Data 12. Many Conjectures and their Interrelations.................... 29 Shanks. Daniel . 13. Splitting tshe Primes into Equinumerous Classes ............... 31 Solved and unsolved problems in number theory. 14. Euler’s Criterion Formulated ...... ....................... 33 15. Euler’s Criterion Proved .................................... 35 Bibliography: p. Includes index . 16. Wilson’s Theorem ......................................... 37 1. Numbers. Theory of . I . Title. 17. Gauss’s Criterion ................................... 38 [QA241.S44 19781 5E.7 77-13010 18. The Original Lcgendre Symbol .. ..................... 40 ISBN 0-8284-0297-3 19. The Reciprocity Law .......... ..................... 42 20 . The Prime Divisors of n2 + a ... ..................... 47 Chapter I1 Printed on ‘long-life’ acid-free paper THE CSDERLTISG STRUCTURE 21 . The Itesidue Classes as an Invention ......................... 51 Printed in the United States of America 22 . The Residue Classes 3s a Tool .............................. 55 23 . The Residue Classcs as n Group............................. 59 24 . Quadratic Residues ....................................... 63 V vi Solved and Unsolved Problems in Number Theory Contents vii SECTION PAGE SECTION PAGE 25 . Is the Quadratic Recipro&y Law a Ilerp Thcoreni? ........... 6.2 61 . Continued Fractions for fi............................... 180 26 . Congruent.id Equations with a Prime Modulus ................ 66 62 . From Archimedes to Lucas ................................. 188 27 . Euler’s 4 E’unct.ion......................................... 68 63 . The Lucas Criterion ....................................... 193 28 . Primitive Roots with a Prime i\Iodulus . ........... 71 64 . A Probability Argument .................................... 197 29 . mpas a Cyclic Group ................ ........... 73 65. Fibonacci Xumbers and the Original Lucas Test .............. 198 30 . The Circular Parity Switch ........... ........... 76 31 . Primitive Roots and Fermat Xumhcrs., ........... 78 32 . Artin’s Conjectures .................. ........... 80 Appendix to Chapters 1-111 33 . Questions Concerning Cycle Graphs .... ........... 83 SUPPLEMENTARYCOMMENTS. THEOREMS. AND EXERCISES 201 34 . Answers Concerning Cycle Graphs..... ........... 92 ......... 35 . Factor Generators of 3% ................................... 98 Chapter IV 36 . Primes in Some Arithmetic Progressions and a General Divisi- bility Theorem .......... ............................ 104 PROGRESS 37 . Scalar and Vect.or Indices ................................... 109 SECTION 38 . The Ot.her Residue Classes ....... ...................... 113 66. Chapter I Fifteen Years Later .................... 217 39 . The Converse of Fermat’s Theore ................ 67 . Artin’s Conjectures, I1 ......................... 222 40 . Sufficient Coiiditiorls for Primality........................... 118 68. Cycle Graphs and Related Topics ...................225 69 . Pseudoprimes and Primality ...................... 226 Chapter 111 70 . Fermat’s Last “Theorem, ” I1 ..................... 231 71. Binary Quadratic Forms with Negative Discriminants ......233 PYTHAGOREAKISM AKD ITS MAXY COKSEQUESCES 72. Binary Quadratic Forms with Positive Discriminants .......235 41 . The Pythagoreans ................... ............ 121 73 . Lucas and Pythagoras ......................... 237 42 . The Pythagorean Theorein ........... ................ 123 74. The Progress Report Concluded ...................238 43 . The 42 and the Crisis .......................... 44 . The Effect upon Geometry ................................. 127 45 . The Case for Pythagoreanism ......................... 46 . Three Greek Problems ..... .................. Appendix 47 . Three Theorems of Fermat ................................. 142 STATEMENTON FUNDAMENTALS ....................... 239 48 Fermat’s Last’ “Theorem” ....... ....................... 144 . TABLEOF DEFINITIONS............................ 241 49 . The Easy Case and Infinite Desce ....................... 147 REFERENCES................................... 243 50 . Gaussian Integers and Two Applications . ........... 149 51 . Algebraic Integers and Kummer’s Theore ........... 1.51 INDEX...................................... 255 52 . The Restricted Case, S Gcrmain, and Wieferich ... 53. Euler’s “Conjecture” . ................................ 157 54 . Sum of Two Squares ....................... ...... 159 55 . A Generalization and Geometric Xumber Theory .............. 161 56 . A Generalization and Binary Quadratic Forms..... ........ 165 57 . Some Applicat.ions.............................. 58 . The Significance of Fermat’s Equation ............ 59 . The Main Theorem ........... .......................... 174 60 . An Algorithm ................................. ..... 178 PREFACE TO THE SECOND EDITION The Preface to the First Edition (1962) states that this is “a rather tightly organized presentation of elementary number theory” and that I “number theory is very much a live subject.” These two facts are in I conflict fifteen years later. Considerable updating is desirable at many places in the 1962 Gxt, but the needed insertions would call for drastic surgery. This could easily damage the flow of ideas and the author was reluctant to do that. Instead, the original text has been left as is, except for typographical corrections, and a brief new chapter entitled “Pro- gress” has been added. A new reader will read the book at two levels-as it was in 1962, and as things are today. Of course, not all advances in number theory are discussed, only those pertinent to the earlier text. Even then, the reader will be impressed I with the changes that have occurred and will come to believe-if he did not already know it-that number theory is very much a live subject. The new chapter is rather different in style, since few topics are developed at much length. Frequently, it is extremely hrief and merely gives references. The intent is not only to discuss the most important changes in sufficient detail but also to be a useful guide to many other topics. A propos this intended utility, one special feature: Developments in the algorithmic and computational aspects of the subject have been especially active. It happens that the author was an editor of Muthe- matics of Cmptation throughout this period, and so he was particu- ~ larly close to most of these developments. Many good students and professionals hardly know this material at all. The author feels an obligation to make it better known, and therefore there is frequent emphasis on these aspects of the subject. To compensate for the extreme brevity in some topics, numerous references have been included to the author’s own reviews on these topics. They are intended especially for any reader who feels that he must have a second helping. Many new references are listed, but the following economy has been adopted: if a paper has a good bibliogra- phy, the author has usually refrained from citing the references con- I tained in that bibliography. The author is grateful to friends who read some or all of the new chapter. Especially useful comments have come from Paul Bateman, Samuel Wagstaff, John Brillhart, and Lawrence Washington. DANIELSHANKS December 1977 ix PREFACE TO THE FIRST EDITION It may be thought- that the title of this book is not well chosen since the book is, in fact, a rather tightly organized presentation of elementary number theory, while the title may suggest a loosely organized collection of problems. h-onetheless the nature of the exposition and the choice of topics to be included or. omitted are such as to make the title appropriate. Since a preface is the proper place for such discussion we wish to clarify this matter here. i Much of elementary number theory arose out of the investigation of ~ three problems ; that of perfect numbers, that of periodic decimals, and that of Pythagorean numbers. We have accordingly organized the book into three long chapters. The result of such an organization is that motiva- tion is stressed to a rather unusual degree. Theorems arise in response to previously posed problems, and their proof is sometimes delayed until an appropriate analysis can be developed. These theorems, then, or most of them, are “solved problems.” Some other topics, which are often taken up in elementary texts-and often dropped soon after-do not fit directly I into these main lines of development, and are postponed until Volume 11. I Since number theory is so extensive, some choice of topics is essential, and while a common criterion used is the personal
Recommended publications
  • An Amazing Prime Heuristic.Pdf
    This document has been moved to https://arxiv.org/abs/2103.04483 Please use that version instead. AN AMAZING PRIME HEURISTIC CHRIS K. CALDWELL 1. Introduction The record for the largest known twin prime is constantly changing. For example, in October of 2000, David Underbakke found the record primes: 83475759 264955 1: · The very next day Giovanni La Barbera found the new record primes: 1693965 266443 1: · The fact that the size of these records are close is no coincidence! Before we seek a record like this, we usually try to estimate how long the search might take, and use this information to determine our search parameters. To do this we need to know how common twin primes are. It has been conjectured that the number of twin primes less than or equal to N is asymptotic to N dx 2C2N 2C2 2 2 Z2 (log x) ∼ (log N) where C2, called the twin prime constant, is approximately 0:6601618. Using this we can estimate how many numbers we will need to try before we find a prime. In the case of Underbakke and La Barbera, they were both using the same sieving software (NewPGen1 by Paul Jobling) and the same primality proving software (Proth.exe2 by Yves Gallot) on similar hardware{so of course they choose similar ranges to search. But where does this conjecture come from? In this chapter we will discuss a general method to form conjectures similar to the twin prime conjecture above. We will then apply it to a number of different forms of primes such as Sophie Germain primes, primes in arithmetic progressions, primorial primes and even the Goldbach conjecture.
    [Show full text]
  • An Analysis of Primality Testing and Its Use in Cryptographic Applications
    An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability.
    [Show full text]
  • Solving the Discrete Logarithms in Quasi-Polynomial Time
    Solving the discrete logarithms in quasi-polynomial time Ivo Kubjas 1 Introduction 1.1 Discrete logarithm The discrete logarithm problem is analogous to the problem of finding logarithm in finite groups. Definition 1 (Discrete logarithm). Discrete logarithm of h to the base g is x such that gx = h: We denote the discrete logarithm as logg(h) = x. The discrete logarithm has similar algebraic properties as for logarithm in reals. 0 0 Namely, logg(hh ) = logg(h) + logg(h ). The discrete logarithm problem is also randomly self-reducible. This means that there are no “difficult” problems. If there would be an element h in the group for which the logarithm is hard to solve, then it is possible to take 1 ≤ x? ≤ q, where q is the order ? of the group. Now, instead of finding the logarithm of h, we find the logarithm of hgx ? and subtract x? from the result. We know that if x? is chosen uniformly, then also gx is ? uniformly distributed in the group and hgx is uniformly distributed. Thus the difficult problem is reduced to solving the discrete logarithm for an average element in the group. Random self-reducibility allows for \easy" problems in the same group. 1.2 The difficulty of computing discrete logarithm Naturally, a question of why computing discrete logarithms is more difficult than comput- ing logarithms arises. For example, there exists a simple algorithm to compute logarithms in reals. Algorithm 1 (Finding logarithm). Let the base be b. We find the logarithm to the base 2 and convert the logarithm to required base in the final step.
    [Show full text]
  • Gaussian Prime Labeling of Super Subdivision of Star Graphs
    of Math al em rn a u ti o c J s l A a Int. J. Math. And Appl., 8(4)(2020), 35{39 n n d o i i t t a s n A ISSN: 2347-1557 r e p t p n l I i c • Available Online: http://ijmaa.in/ a t 7 i o 5 n 5 • s 1 - 7 4 I 3 S 2 S : N International Journal of Mathematics And its Applications Gaussian Prime Labeling of Super Subdivision of Star Graphs T. J. Rajesh Kumar1,∗ and Antony Sanoj Jerome2 1 Department of Mathematics, T.K.M College of Engineering, Kollam, Kerala, India. 2 Research Scholar, University College, Thiruvananthapuram, Kerala, India. Abstract: Gaussian integers are the complex numbers of the form a + bi where a; b 2 Z and i2 = −1 and it is denoted by Z[i]. A Gaussian prime labeling on G is a bijection from the vertices of G to [ n], the set of the first n Gaussian integers in the spiral ordering such that if uv 2 E(G), then (u) and (v) are relatively prime. Using the order on the Gaussian integers, we discuss the Gaussian prime labeling of super subdivision of star graphs. MSC: 05C78. Keywords: Gaussian Integers, Gaussian Prime Labeling, Super Subdivision of Graphs. © JS Publication. 1. Introduction The graphs considered in this paper are finite and simple. The terms which are not defined here can be referred from Gallian [1] and West [2]. A labeling or valuation of a graph G is an assignment f of labels to the vertices of G that induces for each edge xy, a label depending upon the vertex labels f(x) and f(y).
    [Show full text]
  • Number Theory Course Notes for MA 341, Spring 2018
    Number Theory Course notes for MA 341, Spring 2018 Jared Weinstein May 2, 2018 Contents 1 Basic properties of the integers 3 1.1 Definitions: Z and Q .......................3 1.2 The well-ordering principle . .5 1.3 The division algorithm . .5 1.4 Running times . .6 1.5 The Euclidean algorithm . .8 1.6 The extended Euclidean algorithm . 10 1.7 Exercises due February 2. 11 2 The unique factorization theorem 12 2.1 Factorization into primes . 12 2.2 The proof that prime factorization is unique . 13 2.3 Valuations . 13 2.4 The rational root theorem . 15 2.5 Pythagorean triples . 16 2.6 Exercises due February 9 . 17 3 Congruences 17 3.1 Definition and basic properties . 17 3.2 Solving Linear Congruences . 18 3.3 The Chinese Remainder Theorem . 19 3.4 Modular Exponentiation . 20 3.5 Exercises due February 16 . 21 1 4 Units modulo m: Fermat's theorem and Euler's theorem 22 4.1 Units . 22 4.2 Powers modulo m ......................... 23 4.3 Fermat's theorem . 24 4.4 The φ function . 25 4.5 Euler's theorem . 26 4.6 Exercises due February 23 . 27 5 Orders and primitive elements 27 5.1 Basic properties of the function ordm .............. 27 5.2 Primitive roots . 28 5.3 The discrete logarithm . 30 5.4 Existence of primitive roots for a prime modulus . 30 5.5 Exercises due March 2 . 32 6 Some cryptographic applications 33 6.1 The basic problem of cryptography . 33 6.2 Ciphers, keys, and one-time pads .
    [Show full text]
  • History of the Numerical Methods of Pi
    History of the Numerical Methods of Pi By Andy Yopp MAT3010 Spring 2003 Appalachian State University This project is composed of a worksheet, a time line, and a reference sheet. This material is intended for an audience consisting of undergraduate college students with a background and interest in the subject of numerical methods. This material is also largely recreational. Although there probably aren't any practical applications for computing pi in an undergraduate curriculum, that is precisely why this material aims to interest the student to pursue their own studies of mathematics and computing. The time line is a compilation of several other time lines of pi. It is explained at the bottom of the time line and further on the worksheet reference page. The worksheet is a take-home assignment. It requires that the student know how to construct a hexagon within and without a circle, use iterative algorithms, and code in C. Therefore, they will need a variety of materials and a significant amount of time. The most interesting part of the project was just how well the numerical methods of pi have evolved. Currently, there are iterative algorithms available that are more precise than a graphing calculator with only a single iteration of the algorithm. This is a far cry from the rough estimate of 3 used by the early Babylonians. It is also a different entity altogether than what the circle-squarers have devised. The history of pi and its numerical methods go hand-in-hand through shameful trickery and glorious achievements. It is through the evolution of these methods which I will try to inspire students to begin their own research.
    [Show full text]
  • MATH 404: ARITHMETIC 1. Divisibility and Factorization After Learning To
    MATH 404: ARITHMETIC S. PAUL SMITH 1. Divisibility and Factorization After learning to count, add, and subtract, children learn to multiply and divide. The notion of division makes sense in any ring and much of the initial impetus for the development of abstract algebra arose from problems of division√ and factoriza- tion, especially in rings closely related to the integers such as Z[ d]. In the next several chapters we will follow this historical development by studying arithmetic in these and similar rings. √ To see that there are some serious issues to be addressed notice that in Z[ −5] the number 6 factorizes as a product of irreducibles in two different ways, namely √ √ 6 = 2.3 = (1 + −5)(1 − −5). 1 It isn’t hard to show these factors are irreducible but we postpone√ that for now . The key point for the moment is to note that this implies that Z[ −5] is not a unique factorization domain. This is in stark contrast to the integers. Since our teenage years we have taken for granted the fact that every integer can be written as a product of primes, which in Z are the same things as irreducibles, in a unique way. To emphasize the fact that there are questions to be understood, let us mention that Z[i] is a UFD. Even so, there is the question which primes in Z remain prime in Z[i]? This is a question with a long history: Fermat proved in ??? that a prime p in Z remains prime in Z[i] if and only if it is ≡ 3(mod 4).√ It is then natural to ask for each integer d, which primes in Z remain prime in Z[ d]? These and closely related questions lie behind much of the material we cover in the next 30 or so pages.
    [Show full text]
  • THE GAUSSIAN INTEGERS Since the Work of Gauss, Number Theorists
    THE GAUSSIAN INTEGERS KEITH CONRAD Since the work of Gauss, number theorists have been interested in analogues of Z where concepts from arithmetic can also be developed. The example we will look at in this handout is the Gaussian integers: Z[i] = fa + bi : a; b 2 Zg: Excluding the last two sections of the handout, the topics we will study are extensions of common properties of the integers. Here is what we will cover in each section: (1) the norm on Z[i] (2) divisibility in Z[i] (3) the division theorem in Z[i] (4) the Euclidean algorithm Z[i] (5) Bezout's theorem in Z[i] (6) unique factorization in Z[i] (7) modular arithmetic in Z[i] (8) applications of Z[i] to the arithmetic of Z (9) primes in Z[i] 1. The Norm In Z, size is measured by the absolute value. In Z[i], we use the norm. Definition 1.1. For α = a + bi 2 Z[i], its norm is the product N(α) = αα = (a + bi)(a − bi) = a2 + b2: For example, N(2 + 7i) = 22 + 72 = 53. For m 2 Z, N(m) = m2. In particular, N(1) = 1. Thinking about a + bi as a complex number, its norm is the square of its usual absolute value: p ja + bij = a2 + b2; N(a + bi) = a2 + b2 = ja + bij2: The reason we prefer to deal with norms on Z[i] instead of absolute values on Z[i] is that norms are integers (rather than square roots), and the divisibility properties of norms in Z will provide important information about divisibility properties in Z[i].
    [Show full text]
  • Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases
    INTERSECTIONS OF DELETED DIGITS CANTOR SETS WITH GAUSSIAN INTEGER BASES Athesissubmittedinpartialfulfillment of the requirements for the degree of Master of Science By VINCENT T. SHAW B.S., Wright State University, 2017 2020 Wright State University WRIGHT STATE UNIVERSITY SCHOOL OF GRADUATE STUDIES May 1, 2020 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPER- VISION BY Vincent T. Shaw ENTITLED Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases BE ACCEPTED IN PARTIAL FULFILLMENT OF THE RE- QUIREMENTS FOR THE DEGREE OF Master of Science. ____________________ Steen Pedersen, Ph.D. Thesis Director ____________________ Ayse Sahin, Ph.D. Department Chair Committee on Final Examination ____________________ Steen Pedersen, Ph.D. ____________________ Qingbo Huang, Ph.D. ____________________ Anthony Evans, Ph.D. ____________________ Barry Milligan, Ph.D. Interim Dean, School of Graduate Studies Abstract Shaw, Vincent T. M.S., Department of Mathematics and Statistics, Wright State University, 2020. Intersections of Deleted Digits Cantor Sets with Gaussian Integer Bases. In this paper, the intersections of deleted digits Cantor sets and their fractal dimensions were analyzed. Previously, it had been shown that for any dimension between 0 and the dimension of the given deleted digits Cantor set of the real number line, a translate of the set could be constructed such that the intersection of the set with the translate would have this dimension. Here, we consider deleted digits Cantor sets of the complex plane with Gaussian integer bases and show that the result still holds. iii Contents 1 Introduction 1 1.1 WhystudyintersectionsofCantorsets? . 1 1.2 Prior work on this problem . 1 2 Negative Base Representations 5 2.1 IntegerRepresentations .............................
    [Show full text]
  • GRACEFUL and PRIME LABELINGS -Algorithms, Embeddings and Conjectures
    GRACEFUL AND PRIME LABELINGS-Algorithms, Embeddings and Conjectures Group Discussion (KREC, Surathkal: Aug.16-25, 1999). Improved Version. GRACEFUL AND PRIME LABELINGS -Algorithms, Embeddings and Conjectures Suryaprakash Nagoji Rao* Exploration Business Group MRBC, ONGC, Mumbai-400 022 Abstract. Four algorithms giving rise to graceful graphs from a known (non-)graceful graph are described. Some necessary conditions for a graph to be highly graceful and critical are given. Finally some conjectures are made on graceful, critical and highly graceful graphs. The Ringel-Rosa-Kotzig Conjecture is generalized to highly graceful graphs. Mayeda-Seshu Tree Generation Algorithm is modified to generate all possible graceful labelings of trees of order p. An alternative algorithm in terms of integers modulo p is described which includes all possible graceful labelings of trees of order p and some interesting properties are observed. Optimal and graceful graph embeddings (not necessarily connected) are given. Alternative proofs for embedding a graph into a graceful graph as a subgraph and as an induced subgraph are included. An algorithm to obtain an optimal graceful embedding is described. A necessary condition for a graph to be supergraceful is given. As a consequence some classes of non-supergraceful graphs are obtained. Embedding problems of a graph into a supergraceful graph are studied. A catalogue of super graceful graphs with at most five nodes is appended. Optimal graceful and supergraceful embeddings of a graph are given. Graph theoretical properties of prime and superprime graphs are listed. Good upper bound for minimum number of edges in a nonprime graph is given and some conjectures are proposed which in particular includes Entringer’s prime tree conjecture.
    [Show full text]
  • 11.6 Discrete Logarithms Over Finite Fields
    Algorithms 61 11.6 Discrete logarithms over finite fields Andrew Odlyzko, University of Minnesota Surveys and detailed expositions with proofs can be found in [7, 25, 26, 28, 33, 34, 47]. 11.6.1 Basic definitions 11.6.1 Remark Discrete exponentiation in a finite field is a direct analog of ordinary exponentiation. The exponent can only be an integer, say n, but for w in a field F , wn is defined except when w = 0 and n ≤ 0, and satisfies the usual properties, in particular wm+n = wmwn and (for u and v in F )(uv)m = umvm. The discrete logarithm is the inverse function, in analogy with the ordinary logarithm for real numbers. If F is a finite field, then it has at least one primitive element g; i.e., all nonzero elements of F are expressible as powers of g, see Chapter ??. 11.6.2 Definition Given a finite field F , a primitive element g of F , and a nonzero element w of F , the discrete logarithm of w to base g, written as logg(w), is the least non-negative integer n such that w = gn. 11.6.3 Remark The value logg(w) is unique modulo q − 1, and 0 ≤ logg(w) ≤ q − 2. It is often convenient to allow it to be represented by any integer n such that w = gn. 11.6.4 Remark The discrete logarithm of w to base g is often called the index of w with respect to the base g. More generally, we can define discrete logarithms in groups.
    [Show full text]
  • Gaussian Integers
    Gaussian integers 1 Units in Z[i] An element x = a + bi 2 Z[i]; a; b 2 Z is a unit if there exists y = c + di 2 Z[i] such that xy = 1: This implies 1 = jxj2jyj2 = (a2 + b2)(c2 + d2) But a2; b2; c2; d2 are non-negative integers, so we must have 1 = a2 + b2 = c2 + d2: This can happen only if a2 = 1 and b2 = 0 or a2 = 0 and b2 = 1. In the first case we obtain a = ±1; b = 0; thus x = ±1: In the second case, we have a = 0; b = ±1; this yields x = ±i: Since all these four elements are indeed invertible we have proved that U(Z[i]) = {±1; ±ig: 2 Primes in Z[i] An element x 2 Z[i] is prime if it generates a prime ideal, or equivalently, if whenever we can write it as a product x = yz of elements y; z 2 Z[i]; one of them has to be a unit, i.e. y 2 U(Z[i]) or z 2 U(Z[i]): 2.1 Rational primes p in Z[i] If we want to identify which elements of Z[i] are prime, it is natural to start looking at primes p 2 Z and ask if they remain prime when we view them as elements of Z[i]: If p = xy with x = a + bi; y = c + di 2 Z[i] then p2 = jxj2jyj2 = (a2 + b2)(c2 + d2): Like before, a2 + b2 and c2 + d2 are non-negative integers. Since p is prime, the integers that divide p2 are 1; p; p2: Thus there are three possibilities for jxj2 and jyj2 : 1.
    [Show full text]