Arxiv:2007.10044V2 [Quant-Ph] 9 Dec 2020 Algorithms for Reducing Perfect Powers Z = Q to Q: a Simple Option Is to Test If Z Is an Integer for Some D ∈ [2, Blog Zc]
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Idempotent Factorizations of Square-Free Integers
information Article Idempotent Factorizations of Square-Free Integers Barry Fagin Department of Computer Science, US Air Force Academy, Colorado Springs, CO 80840, USA; [email protected]; Tel.: +1-719-333-7377 Received: 20 June 2019; Accepted: 3 July 2019; Published: 6 July 2019 Abstract: We explore the class of positive integers n that admit idempotent factorizations n = p¯q¯ such that l(n)¶(p¯ − 1)(q¯ − 1), where l is the Carmichael lambda function. Idempotent factorizations with p¯ and q¯ prime have received the most attention due to their cryptographic advantages, but there are an infinite number of n with idempotent factorizations containing composite p¯ and/or q¯. Idempotent factorizations are exactly those p¯ and q¯ that generate correctly functioning keys in the Rivest–Shamir–Adleman (RSA) 2-prime protocol with n as the modulus. While the resulting p¯ and q¯ have no cryptographic utility and therefore should never be employed in that capacity, idempotent factorizations warrant study in their own right as they live at the intersection of multiple hard problems in computer science and number theory. We present some analytical results here. We also demonstrate the existence of maximally idempotent integers, those n for which all bipartite factorizations are idempotent. We show how to construct them, and present preliminary results on their distribution. Keywords: cryptography; abstract algebra; Rivest–Shamir–Adleman (RSA); computer science education; cryptography education; number theory; factorization MSC: [2010] 11Axx 11T71 1. Introduction Certain square-free positive integers n can be factored into two numbers (p¯, q¯) such that l(n)¶ (p¯ − 1)(q¯ − 1), where l is the Carmichael lambda function. -
The Ray Attack on RSA Cryptosystems’, in R
The ray attack, an inefficient trial to break RSA cryptosystems∗ Andreas de Vries† FH S¨udwestfalen University of Applied Sciences, Haldener Straße 182, D-58095 Hagen Abstract The basic properties of RSA cryptosystems and some classical attacks on them are described. Derived from geometric properties of the Euler functions, the Euler function rays, a new ansatz to attack RSA cryptosystemsis presented. A resulting, albeit inefficient, algorithm is given. It essentially consists of a loop with starting value determined by the Euler function ray and with step width given by a function ωe(n) being a multiple of the order ordn(e), where e denotes the public key exponent and n the RSA modulus. For n = pq and an estimate r < √pq for the smaller prime factor p, the running time is given by T (e,n,r)= O((r p)lnelnnlnr). − Contents 1 Introduction 1 2 RSA cryptosystem 2 2.1 Properties of an RSA key system . ... 4 2.2 ClassicalRSAattacks. 5 3 The Euler function ray attack 7 3.1 The ω-function and the order of a number modulo n ............... 7 3.2 Properties of composed numbers n = pq ..................... 10 3.3 Thealgorithm................................... 13 arXiv:cs/0307029v1 [cs.CR] 11 Jul 2003 4 Discussion 15 A Appendix 15 A.1 Euler’sTheorem.................................. 15 A.2 The Carmichael function and Carmichael’s Theorem . ......... 16 1 Introduction Since the revolutionary idea of asymmetric cryptosystems was born in the 1970’s, due to Diffie and Hellman [4] and Rivest, Shamir and Adleman [9], public key technology became an in- dispensable part of contemporary electronically based communication. -
Composite Numbers That Give Valid RSA Key Pairs for Any Coprime P
information Article Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p Barry Fagin ID Department of Computer Science, US Air Force Academy, Colorado Springs, CO 80840, USA; [email protected]; Tel.: +1-719-339-4514 Received: 13 August 2018; Accepted: 25 August 2018; Published: 28 August 2018 Abstract: RSA key pairs are normally generated from two large primes p and q. We consider what happens if they are generated from two integers s and r, where r is prime, but unbeknownst to the user, s is not. Under most circumstances, the correctness of encryption and decryption depends on the choice of the public and private exponents e and d. In some cases, specific (s, r) pairs can be found for which encryption and decryption will be correct for any (e, d) exponent pair. Certain s exist, however, for which encryption and decryption are correct for any odd prime r - s. We give necessary and sufficient conditions for s with this property. Keywords: cryptography; abstract algebra; RSA; computer science education; cryptography education MSC: [2010] 11Axx 11T71 1. Notation and Background Consider the RSA public-key cryptosystem and its operations of encryption and decryption [1]. Let (p, q) be primes, n = p ∗ q, f(n) = (p − 1)(q − 1) denote Euler’s totient function and (e, d) the ∗ Z encryption/decryption exponent pair chosen such that ed ≡ 1. Let n = Un be the group of units f(n) Z mod n, and let a 2 Un. Encryption and decryption operations are given by: (ae)d ≡ (aed) ≡ (a1) ≡ a mod n We consider the case of RSA encryption and decryption where at least one of (p, q) is a composite number s. -
Arithmetic Properties of Φ(N)/Λ(N) and the Structure of the Multiplicative Group Modulo N
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri: MOspace Arithmetic Properties of '(n)/λ(n) and the Structure of the Multiplicative Group Modulo n William D. Banks Department of Mathematics, University of Missouri Columbia, MO 65211 USA [email protected] Florian Luca Instituto de Matem´aticas Universidad Nacional Aut´onoma de M´exico C.P. 58089, Morelia, Michoac´an, M´exico [email protected] Igor E. Shparlinski Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected] Abstract For a positive integer n, we let '(n) and λ(n) denote the Euler function and the Carmichael function, respectively. We define ξ(n) as the ratio '(n)/λ(n) and study various arithmetic properties of ξ(n). AMS-classification: 11A25 Keywords: Euler function, Carmichael function. 1 1 Introduction and Notation Let '(n) denote the Euler function, which is defined as usual by '(n) = #(Z=nZ)× = pν−1(p − 1); n ≥ 1: ν pYk n The Carmichael function λ(n) is defined for all n ≥ 1 as the largest order of any element in the multiplicative group (Z=nZ)×. More explicitly, for any prime power pν, one has pν−1(p − 1) if p ≥ 3 or ν ≤ 2; λ(pν) = 2ν−2 if p = 2 and ν ≥ 3; and for an arbitrary integer n ≥ 2, ν1 νk λ(n) = lcm λ(p1 ); : : : ; λ(pk ) ; ν1 νk where n = p1 : : : pk is the prime factorization of n. Clearly, λ(1) = 1. Despite their many similarities, the functions '(n) and λ(n) often exhibit remarkable differences in their arithmetic behavior, and a vast number of results about the growth rate and various arithmetical properties of '(n) and λ(n) have been obtained; see for example [4, 5, 7, 8, 9, 11, 15]. -
A Set of Sequences in Number Theory
A SET OF SEQUENCES IN NUMBER THEORY by Florentin Smarandache University of New Mexico Gallup, NM 87301, USA Abstract: New sequences are introduced in number theory, and for each one a general question: how many primes each sequence has. Keywords: sequence, symmetry, consecutive, prime, representation of numbers. 1991 MSC: 11A67 Introduction. 74 new integer sequences are defined below, followed by references and some open questions. 1. Consecutive sequence: 1,12,123,1234,12345,123456,1234567,12345678,123456789, 12345678910,1234567891011,123456789101112, 12345678910111213,... How many primes are there among these numbers? In a general form, the Consecutive Sequence is considered in an arbitrary numeration base B. Reference: a) Student Conference, University of Craiova, Department of Mathematics, April 1979, "Some problems in number theory" by Florentin Smarandache. 2. Circular sequence: 1,12,21,123,231,312,1234,2341,3412,4123,12345,23451,34512,45123,51234, | | | | | | | | | --- --------- ----------------- --------------------------- 1 2 3 4 5 123456,234561,345612,456123,561234,612345,1234567,2345671,3456712,... | | | --------------------------------------- ---------------------- ... 6 7 How many primes are there among these numbers? 3. Symmetric sequence: 1,11,121,1221,12321,123321,1234321,12344321,123454321, 1234554321,12345654321,123456654321,1234567654321, 12345677654321,123456787654321,1234567887654321, 12345678987654321,123456789987654321,12345678910987654321, 1234567891010987654321,123456789101110987654321, 12345678910111110987654321,... How many primes are there among these numbers? In a general form, the Symmetric Sequence is considered in an arbitrary numeration base B. References: a) Arizona State University, Hayden Library, "The Florentin Smarandache papers" special collection, Tempe, AZ 85287- 1006, USA. b) Student Conference, University of Craiova, Department of Mathematics, April 1979, "Some problems in number theory" by Florentin Smarandache. 4. Deconstructive sequence: 1,23,456,7891,23456,789123,4567891,23456789,123456789,1234567891, .. -
Counting Integers with a Smooth Totient
COUNTING INTEGERS WITH A SMOOTH TOTIENT W. D. BANKS, J. B. FRIEDLANDER, C. POMERANCE, AND I. E. SHPARLINSKI Abstract. In an earlier paper we considered the distribution of integers n for which Euler's totient function at n has all small prime factors. Here we obtain an improvement that is likely to be best possible. 1. Introduction Our paper [1] considers various multiplicative problems related to Euler's function '. One of these problems concerns the distribution of integers n for which '(n) is y-smooth (or y-friable), meaning that all prime factors of '(n) are at most y. Let Φ(x; y) denote the number of n ≤ x such that '(n) is y-smooth. Theorem 3.1 in [1] asserts that the following bound holds: For any fixed " > 0, numbers x; y with y ≥ (log log x)1+", and u = log x= log y ! 1, we have the bound Φ(x; y) ≤ x= exp((1 + o(1))u log log u): In this note we we establish a stronger bound. Merging Propositions 2.3 and 3.2 below we prove the following result. Theorem 1.1. For any fixed " > 0, numbers x; y with y ≥ (log log x)1+", and u = log x= log y ! 1, we have Φ(x; y) ≤ x exp−u(log log u + log log log u + o(1)): One might wonder about a matching lower bound for Φ(x; y), but this is very difficult to achieve since it depends on the distribution of primes p with p−1 being y-smooth. Let (x; y) denote the number of y- smooth integers at most x, and let π(x; y) denote the number of primes p ≤ x such that p−1 is y-smooth. -
On Generalized Carmichael Numbers
ON GENERALIZED CARMICHAEL NUMBERS YONGYI CHEN AND TAE KYU KIM Abstract. Given an integer k, define Ck as the set of integers n > max(k; 0) such that an−k+1 ≡ a (mod n) holds for all integers a. We establish various multiplicative properties of the elements in Ck and give a sufficient condition for the infinitude of Ck. Moreover, we prove that there are finitely many elements in Ck with one and two prime factors if and only if k > 0 and k is prime. In addition, if all but two prime factors of n 2 Ck are fixed, then there are finitely many elements in Ck, excluding certain infinite families of n. We also give conjectures about the growth rate of Ck with numerical evidence. We explore a similar question when both a and k are fixed and prove that for fixed integers a ≥ 2 and k, there are infinitely many integers n such that an−k ≡ 1 (mod n) if and only if (k; a) 6= (0; 2) by building off the work of Kiss and Phong. Finally, we discuss the multiplicative properties of positive integers n such that Carmichael function λ(n) divides n − k. 1. Introduction In 1860, Fermat proved that if p is a prime number, then p divides ap−1 − 1 for any integer a not divisible by p, a result now known as Fermat’s little theorem. An equivalent formulation is that whenever p is a prime number, p divides ap − a for all integers a. Fermat’s little theorem gives a test for prime numbers. -
Binomial Coefficients and Lucas Sequences
Journal of Number Theory 93, 246–284 (2002) doi:10.1006/jnth.2001.2721, available online at http://www.idealibrary.comon Binomial Coefficients and Lucas Sequences Achim Flammenkamp Fakultät für Mathematik, Universität Bielefeld, Postfach 10 01 31, 33 501 Bielefeld, Germany E-mail: [email protected] and Florian Luca Instituto de Matema´ticas de la UNAM, Campus Morelia, Apartado Postal 61-3 (Xangari), CP 58 089, Morelia, Michoa´can, Mexico E-mail: [email protected] Communicated by A. Granville View metadata, citation and similarReceived papers at October core.ac.uk 30, 2000 brought to you by CORE provided by Elsevier - Publisher Connector 1. INTRODUCTION Throughout this paper, a and b are integers such that a>|b|. For any non-negative integer n let an −bn u = (1) n a−b and n n vn =a +b . (2) The sequences (un )n \ 0 and (vn )n \ 0 are particular instances of the so-called Lucas sequences of first and second kind, respectively. These sequences enjoy very nice arithmetic properties and diophantine equations involving members of such sequences often arise in the study of exponential diophantine equations. In this paper, we investigate the occurrence of binomial coefficients in sequences whose general term is given by formula (1) or (2). That is, we look at the solutions of the diophantine equations m u =1 2 for m \ 2k>2 (3) n k 246 0022-314X/02 $35.00 © 2002 Elsevier Science (USA) ⁄ All rights reserved. BINOMIAL COEFFICIENTS AND SEQUENCES 247 and m v =1 2 for m \ 2k>2. (4) n k m m m Notice that since ( 1 )=m and ( k )=( m−k) hold for all m \ 1 and for all 1 [ k [ m−1, the assumption m \ 2k>2 imposes no restriction at all on the non-trivial solutions of the equations (3) and (4). -
POLYA SEMINAR WEEK 2: NUMBER THEORY K. Soundararajan And
POLYA SEMINAR WEEK 2: NUMBER THEORY K. Soundararajan and Ravi Vakil The Rules. There are too many problems to consider. Pick a few problems that you find fun, and play around with them. The only rule is that you may not pick a problem that you already know how to solve: where's the fun in that? General problem solving strategies. Try small cases; plug in smaller numbers. Search for a pattern. Draw pictures. Choose effective notation. Work in groups. Divide into cases. Look for symmetry. Work backwards. Argue by contradiction. Parity? Pigeonhole? Induction? Generalize the problem, sometimes that makes it easier. Be flexible: consider many possible approaches before committing to one. Be stubborn: don't give up if your approach doesn't work in five minutes. Ask. Eat pizza, have fun! 1. Of the numbers below 2016 which has the largest number of divisors? (Num- bers with more divisors than all previous ones were called \highly composite" by Ramanujan who made a detailed study of their structure.) 2. Prove that for every positive integer n coprime to 10 there is a multiple of n that does not contain the digit 1 in its decimal expansion. 3. Prove that the product of any four consecutive natural numbers cannot be a perfect square. (Note: In fact, Erd}osand Selfridge proved the beautiful result that no product of any number of consecutive natural numbers can be a perfect power.) 4. If 4n + 2n + 1 is prime then n must be a power of 3. Pn Qn 5. For which positive integers n does j=1 j divide j=1 j. -
Using Formal Concept Analysis in Mathematical Discovery
Using Formal Concept Analysis in Mathematical Discovery Simon Colton and Daniel Wagner sgc, [email protected] Combined Reasoning Group Department of Computing Imperial College, London http://www.doc.ic.ac.uk/crg/ Abstract. Formal concept analysis (FCA) comprises a set of powerful algorithms which can be used for data analysis and manipulation, and a set of visualisation tools which enable the discovery of meaningful re- lationships between attributes of the data. We explore the potential of combining FCA and mathematical discovery tools in order to better fa- cilitate discovery tasks. In particular, we propose a novel lookup method for the Encyclopedia of Integer Sequences, and we show how conjectures from the Graffiti discovery program can be better understood using FCA visualisation tools. We argue that, not only can FCA tools greatly en- hance the management and visualisation of mathematical knowledge, but they can also be used to drive exploratory processes. 1 Introduction Formal Concept Analysis (FCA) consists of a set of well established techniques for the analysis and manipulation of data. FCA has a strong theoretical un- derpinning, efficient implementations of fast algorithms, and useful visualisation tools. There are strong links between FCA and machine learning, and the con- nection of both fields is an active area of research [8,12,13]. We concentrate here on the combination of FCA tools with systems developed to aid mathemat- ical discovery. In particular, we are interested in addressing (i) whether FCA algorithms can be used to enhance the discovery process and (ii) whether FCA visualisation tools can enable better understanding of the discoveries made. -
Primes of the Form (Bn + 1)/(B + 1)
1 2 Journal of Integer Sequences, Vol. 3 (2000), 3 Article 00.2.7 47 6 23 11 Primes of the Form (bn + 1)=(b + 1) Harvey Dubner 449 Beverly Road, Ridgewood, New Jersey 07450 Torbj¨orn Granlund Notvarpsgr¨and 1, 1tr SE-116 66 Stockholm, Sweden Email addresses: [email protected] and [email protected] Abstract Numbers of the form (bn + 1)=(b + 1) are tested for primality. A table of primes and probable primes is presented for b up to 200 and large values of n. 1999 Mathematics Subject Classification: Primary 11A41 Keywords: prime numbers, generalized repunits 1. Introduction A truly prodigious amount of computation has been devoted to investigating numbers of the form bn 1. The Cunningham project, to factor these numbers for b from 2 to 12, is perhaps± the longest running computer project of all time [4]. The range of b has been extended to 100 and even further in special cases [1][2] . The Mersenne numbers, 2n 1 have been studied extensively for hundreds of years and the largest known prime− is almost always a Mersenne prime. In [6], generalized repunit primes of the form (bn 1)=(b 1) were tabulated for bases up to 99 and large values of n. − − The purpose of this paper is to present the results of computer searches for primes of the form, bn + 1 (1) Q(b; n) = b + 1 for bases up to 200 and large values of n. 1 2 2. Prime Search For certain values of n in (1) the denominator cannot divide the numerator and are thus excluded from this study, and Q has algebraic factors for certain other values of b; n so that it cannot be prime. -
List of Numbers
List of numbers This is a list of articles aboutnumbers (not about numerals). Contents Rational numbers Natural numbers Powers of ten (scientific notation) Integers Notable integers Named numbers Prime numbers Highly composite numbers Perfect numbers Cardinal numbers Small numbers English names for powers of 10 SI prefixes for powers of 10 Fractional numbers Irrational and suspected irrational numbers Algebraic numbers Transcendental numbers Suspected transcendentals Numbers not known with high precision Hypercomplex numbers Algebraic complex numbers Other hypercomplex numbers Transfinite numbers Numbers representing measured quantities Numbers representing physical quantities Numbers without specific values See also Notes Further reading External links Rational numbers A rational number is any number that can be expressed as the quotient or fraction p/q of two integers, a numerator p and a non-zero denominator q.[1] Since q may be equal to 1, every integer is a rational number. The set of all rational numbers, often referred to as "the rationals", the field of rationals or the field of rational numbers is usually denoted by a boldface Q (or blackboard bold , Unicode ℚ);[2] it was thus denoted in 1895 byGiuseppe Peano after quoziente, Italian for "quotient". Natural numbers Natural numbers are those used for counting (as in "there are six (6) coins on the table") and ordering (as in "this is the third (3rd) largest city in the country"). In common language, words used for counting are "cardinal numbers" and words used for ordering are