Baillie-PSW Pseudoprimes

Total Page:16

File Type:pdf, Size:1020Kb

Baillie-PSW Pseudoprimes Masaryk University Faculty of Informatics Baillie-PSW pseudoprimes Master’s Thesis Ondřej Krčma Brno, Spring 2021 Masaryk University Faculty of Informatics Baillie-PSW pseudoprimes Master’s Thesis Ondřej Krčma Brno, Spring 2021 This is where a copy of the official signed thesis assignment and a copy ofthe Statement of an Author is located in the printed version of the document. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Ondřej Krčma Advisor: Mgr. Marek Sýs, Ph.D. i Acknowledgements I would like to thank Mgr. Marek Sýs, Ph.D. for his invaluable advice during my work on this thesis. Computational resources were supplied by the project "e-Infrastruktura CZ" (e-INFRA LM2018140) provided within the program Projects of Large Research, Development and Innovations Infrastructures. iii Abstract The goal of this thesis is to examine and look for a weaker version of the Baillie-PSW pseudoprimes. First we examine the Fermat and the Lucas pseudoprimes and the divisibility properties of the order and the rank of appearance. We present the known theory and complete some missing proofs and algorithms. We also examine the notion of admissibility, which is the main necessary condition for the sought pseudoprimes. In the last chapter, we apply the theory and attempt to find the pseudoprimes in several special cases. iv Keywords primality tests, pseudoprimes, Baillie-PSW, PSW-challenge pseudo- primes, rank of appearance, admissibility v Contents Introduction 1 1 The Fermat test 3 1.1 Order of a modulo n ....................4 1.2 Fermat pseudoprimes to base 2 . .7 2 Lucas sequences 9 2.1 Computing Lucas sequences . 10 2.2 Lucas pseudoprimes . 13 2.3 Rank of appearance of n .................. 15 2.4 Lucas pseudoprimes in the Fibonacci sequence . 19 3 The Baillie-PSW test 21 3.1 Challenge pseudoprimes . 22 3.1.1 Admissibility . 23 3.1.2 Computing last prime . 28 4 Search for challenge psudoprimes 31 4.1 Small prime factors . 32 4.1.1 Admissibility from order and rank . 33 4.1.2 Full version of the algorithm . 34 − 4.2 Pseudoprimes of the form 2n 1 − 1 ............ 34 4.2.1 Primes with rank equal to a power of two . 35 4.2.2 Mersenne primes . 35 4.3 Two prime factors . 36 4.3.1 Admissible primes p with e(p) = 1 ........ 37 4.3.2 Computing the other prime . 37 4.4 Even number of prime factors . 38 4.4.1 Case of p ≥ 245 ................... 38 4.4.2 Case of p < 245 ................... 39 4.5 Lattice based solutions . 40 4.5.1 Searching for the pseudoprimes . 40 4.5.2 Transformation of the problem . 41 4.5.3 Lattice for Fermat pseudoprimes . 42 4.5.4 Example for Fermat pseudoprimes . 43 4.5.5 Lattice for both Fermat and Lucas pseudoprimes 44 vii Conclusion 47 Bibliography 49 viii Introduction Generating large random primes is a key component of cryptosystems such as RSA. However, deciding whether a random large (in the order of thousands of bits) integer is prime or composite is computationally expensive. There are two basic kinds of primality tests: deterministic and probabilistic. Deterministic tests will give us a definitive answer on whether the input integer is prime or not, but they are often too slow. In general, probabilistic tests are fast, however some composite integers also pass through. These composite integers which pass some probabilistic primality test are called pseudoprimes and the more pseudoprimes there are for a given test, the worse the test is. In this thesis we are looking for pseudoprimes for a weaker version of the Baillie-PSW test, because, so far, no pseudoprimes for this test have been found. The text of this thesis is split into four chapters. In the first chap- ter we introduce Fermat pseudoprimes and examine some of their properties, for example the order. In the second chapter we look at Lucas sequences and Lucas pseudoprimes. We briefly discuss how to compute Lucas sequences and then examine Lucas pseudoprimes and their properties, especially the rank of appearance. There are many similarities between the Fermat and the Lucas pseudoprimes, and the lemmas in the second chapter often parallel lemmas from the first chapter. In the third chapter we combine the two tests intothe Baillie-PSW test and examine PSW-challenge pseudoprimes, which are composite integers passing the weaker version of the test. We mostly focus on the notion of admissibility, which is a strong neces- sary condition, which all PSW-challenge pseudoprimes must satisfy. And finally, in the fourth chapter we describe our attempts tofindthe PSW-challenge pseudoprimes. The reader is expected to be familiar with basic algebraic concepts such as the order of a group element, modular arithmetic or the Chi- nese Remainder Theorem. The first two chapters mostly cover the known theory, so a reader who is confident in their knowledge of Fer- mat and Lucas pseudoprimes may skip directly to the third chapter. However, we present some proofs and algorithms missing from the literature, and so we recommend starting from the beginning. 1 1 The Fermat test One of the simplest primality tests is the Fermat test. Fermat’s little theorem gives the following necessary condition which all primes must satisfy. Theorem 1.1 (Fermat’s little theorem). Let p be prime and a an integer such that a 6≡ 0 (mod p), then ap−1 ≡ 1 (mod p). To test whether given n is prime, we choose a coprime to n (for − example a = 2) and calculate an 1 mod n. If the resulting value is not 1, then we are sure that n is not prime. Whereas if the result is 1, then n may or may not be prime. For example 2340 ≡ 1 (mod 341), however 341 = 11 × 31 is a composite integer. Composite numbers which pass a primality test such as the Fermat test are called pseudoprimes. There are many different primality tests and an integer maybe a pseudoprime relative to one test and not a pseudoprime relative to other tests. This gives us different types and definitions of pseu- doprimes, the first of which is the Fermat pseudoprime. Note that different authors may have slightly different definitions of theindi- vidual types of pseudoprimes. We will follow the terminology from [1]. Definition 1. An odd composite integer n is a (Fermat) pseudoprime to base a if an−1 ≡ 1 (mod n). An integer n may be pseudoprime to some bases and not others, so if the test fails for one base, we may try another. Note that the set ∗ of bases to which n is pseudoprime forms a subgroup of Zn, so trying multiple bases one after another may lead to diminishing returns. The main problem however is that there exist Carmichael numbers, which are integers that are Fermat pseudoprimes to all possible bases. In 1994 Pomerance showed that there are infinitely many Carmichael numbers [2]. To get around this problem we may define stronger necessary conditions and stronger tests. 3 1. The Fermat test Definition 2. An odd composite integer n is an Euler pseudoprime to base a if gcd(a, n) = 1 and n−1 a a 2 ≡ (mod n), n a where n is the Jacobi symbol. Clearly, an Euler pseudoprime is also Fermat pseudoprime. Be- cause of the multiplicative property of Jacobi symbols, the bases of an Euler pseudoprime still form a multiplicative group. However Lehmer showed that there are no integers which are Euler pseudoprimes to all possible bases [3] (i.e. there is no equivalent of Carmichael numbers for Euler pseudoprimes). Since the bases to which n is Euler pseudo- ∗ prime form a subgroup of Zn and n cannot be pseudoprime to all the bases, then n is pseudoprime to at most half of the possible bases. The test can be strengthened even further. Definition 3. An odd composite integer n = d · 2s + 1, where d is odd, is a strong (Fermat) pseudoprime to base a if ad ≡ 1 (mod n) or r ad·2 ≡ −1 (mod n) for some 0 ≤ r < s. A strong (Fermat) pseudoprime is both Euler and Fermat pseu- doprime. Since it’s an Euler pseudoprime, there are no equivalents of Carmichael numbers, but the bases no longer form a group. Unfortu- nately, there are still infinitely many strong pseudoprimes to any base [1]. 1.1 Order of a modulo n In the rest of this thesis we will focus mainly on the basic Fermat test (in the second and the third chapters in combination with the Lucas test). In this chapter we present some properties of Fermat pseudoprimes and the order of base a modulo n. 4 1. The Fermat test Definition 4. Given an odd positive integer n and a base a, the order of a modulo n is the least positive integer k such that ak ≡ 1 (mod n). We will follow the notation of Pomerance, Selfridge and Wagstaff [1] and denote the order as la(n). The reason we do not follow the standard notation of ordn(a) is that in this context the order is a property of the modulus n and not of the base a. k It is well known [4] that if a ≡ 1 (mod n), then la(n) j k. This means that if n is a Fermat pseudoprime, then la(n) j (n − 1). The order la(n) also divides the group order j(n), where j denotes Euler’s totient function.
Recommended publications
  • FACTORING COMPOSITES TESTING PRIMES Amin Witno
    WON Series in Discrete Mathematics and Modern Algebra Volume 3 FACTORING COMPOSITES TESTING PRIMES Amin Witno Preface These notes were used for the lectures in Math 472 (Computational Number Theory) at Philadelphia University, Jordan.1 The module was aborted in 2012, and since then this last edition has been preserved and updated only for minor corrections. Outline notes are more like a revision. No student is expected to fully benefit from these notes unless they have regularly attended the lectures. 1 The RSA Cryptosystem Sensitive messages, when transferred over the internet, need to be encrypted, i.e., changed into a secret code in such a way that only the intended receiver who has the secret key is able to read it. It is common that alphabetical characters are converted to their numerical ASCII equivalents before they are encrypted, hence the coded message will look like integer strings. The RSA algorithm is an encryption-decryption process which is widely employed today. In practice, the encryption key can be made public, and doing so will not risk the security of the system. This feature is a characteristic of the so-called public-key cryptosystem. Ali selects two distinct primes p and q which are very large, over a hundred digits each. He computes n = pq, ϕ = (p − 1)(q − 1), and determines a rather small number e which will serve as the encryption key, making sure that e has no common factor with ϕ. He then chooses another integer d < n satisfying de % ϕ = 1; This d is his decryption key. When all is ready, Ali gives to Beth the pair (n; e) and keeps the rest secret.
    [Show full text]
  • The Pseudoprimes to 25 • 109
    MATHEMATICS OF COMPUTATION, VOLUME 35, NUMBER 151 JULY 1980, PAGES 1003-1026 The Pseudoprimes to 25 • 109 By Carl Pomerance, J. L. Selfridge and Samuel S. Wagstaff, Jr. Abstract. The odd composite n < 25 • 10 such that 2n_1 = 1 (mod n) have been determined and their distribution tabulated. We investigate the properties of three special types of pseudoprimes: Euler pseudoprimes, strong pseudoprimes, and Car- michael numbers. The theoretical upper bound and the heuristic lower bound due to Erdös for the counting function of the Carmichael numbers are both sharpened. Several new quick tests for primality are proposed, including some which combine pseudoprimes with Lucas sequences. 1. Introduction. According to Fermat's "Little Theorem", if p is prime and (a, p) = 1, then ap~1 = 1 (mod p). This theorem provides a "test" for primality which is very often correct: Given a large odd integer p, choose some a satisfying 1 <a <p - 1 and compute ap~1 (mod p). If ap~1 pi (mod p), then p is certainly composite. If ap~l = 1 (mod p), then p is probably prime. Odd composite numbers n for which (1) a"_1 = l (mod«) are called pseudoprimes to base a (psp(a)). (For simplicity, a can be any positive in- teger in this definition. We could let a be negative with little additional work. In the last 15 years, some authors have used pseudoprime (base a) to mean any number n > 1 satisfying (1), whether composite or prime.) It is well known that for each base a, there are infinitely many pseudoprimes to base a.
    [Show full text]
  • A Clasification of Known Root Prime-Generating
    Special properties of the first absolute Fermat pseudoprime, the number 561 Marius Coman Bucuresti, Romania email: [email protected] Abstract. Though is the first Carmichael number, the number 561 doesn’t have the same fame as the third absolute Fermat pseudoprime, the Hardy-Ramanujan number, 1729. I try here to repair this injustice showing few special properties of the number 561. I will just list (not in the order that I value them, because there is not such an order, I value them all equally as a result of my more or less inspired work, though they may or not “open a path”) the interesting properties that I found regarding the number 561, in relation with other Carmichael numbers, other Fermat pseudoprimes to base 2, with primes or other integers. 1. The number 2*(3 + 1)*(11 + 1)*(17 + 1) + 1, where 3, 11 and 17 are the prime factors of the number 561, is equal to 1729. On the other side, the number 2*lcm((7 + 1),(13 + 1),(19 + 1)) + 1, where 7, 13 and 19 are the prime factors of the number 1729, is equal to 561. We have so a function on the prime factors of 561 from which we obtain 1729 and a function on the prime factors of 1729 from which we obtain 561. Note: The formula N = 2*(d1 + 1)*...*(dn + 1) + 1, where d1, d2, ...,dn are the prime divisors of a Carmichael number, leads to interesting results (see the sequence A216646 in OEIS); the formula M = 2*lcm((d1 + 1),...,(dn + 1)) + 1 also leads to interesting results (see the sequence A216404 in OEIS).
    [Show full text]
  • On Terms of Generalized Fibonacci Sequences Which Are Powers of Their Indexes
    mathematics Article On Terms of Generalized Fibonacci Sequences which are Powers of their Indexes Pavel Trojovský Department of Mathematics, Faculty of Science, University of Hradec Králové, 500 03 Hradec Králové, Czech Republic, [email protected]; Tel.: +42-049-333-2860 Received: 29 June 2019; Accepted: 31 July 2019; Published: 3 August 2019 (k) Abstract: The k-generalized Fibonacci sequence (Fn )n (sometimes also called k-bonacci or k-step Fibonacci sequence), with k ≥ 2, is defined by the values 0, 0, ... , 0, 1 of starting k its terms and such way that each term afterwards is the sum of the k preceding terms. This paper is devoted to the proof of the fact that the (k) t (2) 2 (3) 2 Diophantine equation Fm = m , with t > 1 and m > k + 1, has only solutions F12 = 12 and F9 = 9 . Keywords: k-generalized Fibonacci sequence; Diophantine equation; linear form in logarithms; continued fraction MSC: Primary 11J86; Secondary 11B39. 1. Introduction The well-known Fibonacci sequence (Fn)n≥0 is given by the following recurrence of the second order Fn+2 = Fn+1 + Fn, for n ≥ 0, with the initial terms F0 = 0 and F1 = 1. Fibonacci numbers have a lot of very interesting properties (see e.g., book of Koshy [1]). One of the famous classical problems, which has attracted a attention of many mathematicians during the last thirty years of the twenty century, was the problem of finding perfect powers in the sequence of Fibonacci numbers. Finally in 2006 Bugeaud et al. [2] (Theorem 1), confirmed these expectations, as they showed that 0, 1, 8 and 144 are the only perfect powers in the sequence of Fibonacci numbers.
    [Show full text]
  • Number Systems and Radix Conversion
    Number Systems and Radix Conversion Sanjay Rajopadhye, Colorado State University 1 Introduction These notes for CS 270 describe polynomial number systems. The material is not in the textbook, but will be required for PA1. We humans are comfortable with numbers in the decimal system where each po- sition has a weight which is a power of 10: units have a weight of 1 (100), ten’s have 10 (101), etc. Even the fractional apart after the decimal point have a weight that is a (negative) power of ten. So the number 143.25 has a value that is 1 ∗ 102 + 4 ∗ 101 + 3 ∗ 0 −1 −2 2 5 10 + 2 ∗ 10 + 5 ∗ 10 , i.e., 100 + 40 + 3 + 10 + 100 . You can think of this as a polyno- mial with coefficients 1, 4, 3, 2, and 5 (i.e., the polynomial 1x2 + 4x + 3 + 2x−1 + 5x−2+ evaluated at x = 10. There is nothing special about 10 (just that humans evolved with ten fingers). We can use any radix, r, and write a number system with digits that range from 0 to r − 1. If our radix is larger than 10, we will need to invent “new digits”. We will use the letters of the alphabet: the digit A represents 10, B is 11, K is 20, etc. 2 What is the value of a radix-r number? Mathematically, a sequence of digits (the dot to the right of d0 is called the radix point rather than the decimal point), : : : d2d1d0:d−1d−2 ::: represents a number x defined as follows X i x = dir i 2 1 0 −1 −2 = ::: + d2r + d1r + d0r + d−1r + d−2r + ::: 1 Example What is 3 in radix 3? Answer: 0.1.
    [Show full text]
  • Cheat Sheet of SSE/AVX Intrinsics, for Doing Arithmetic Ll F(Int Ind, Int K) { Return Dp[Ind][K]; } on Several Numbers at Once
    University of Bergen Garbage Collectors Davide Pallotti, Jan Soukup, Olav Røthe Bakken NWERC 2017 Nov 8, 2017 UiB template .bashrc .vimrc troubleshoot 1 tan v + tan w Contest (1) Any possible infinite recursion? tan(v + w) = Invalidated pointers or iterators? 1 − tan v tan w template.cpp Are you using too much memory? v + w v − w 15 lines Debug with resubmits (e.g. remapped signals, see Various). sin v + sin w = 2 sin cos #include <bits/stdc++.h> 2 2 using namespace std; Time limit exceeded: v + w v − w Do you have any possible infinite loops? cos v + cos w = 2 cos cos #define rep(i, a, b) for(int i = a; i < (b); ++i) What is the complexity of your algorithm? 2 2 #define trav(a, x) for(auto& a : x) Are you copying a lot of unnecessary data? (References) #define all(x) x.begin(), x.end() How big is the input and output? (consider scanf) (V + W ) tan(v − w)=2 = (V − W ) tan(v + w)=2 #define sz(x) (int)(x).size() Avoid vector, map. (use arrays/unordered_map) typedef long long ll; What do your team mates think about your algorithm? where V; W are lengths of sides opposite angles v; w. typedef pair<int, int> pii; typedef vector<int> vi; Memory limit exceeded: a cos x + b sin x = r cos(x − φ) What is the max amount of memory your algorithm should need? int main() { Are you clearing all datastructures between test cases? a sin x + b cos x = r sin(x + φ) cin.sync_with_stdio(0); cin.tie(0); cin.exceptions(cin.failbit); p 2 2 } Mathematics (2) where r = a + b ; φ = atan2(b; a).
    [Show full text]
  • Composite Numbers That Give Valid RSA Key Pairs for Any Coprime P
    information Article Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p Barry Fagin ID Department of Computer Science, US Air Force Academy, Colorado Springs, CO 80840, USA; [email protected]; Tel.: +1-719-339-4514 Received: 13 August 2018; Accepted: 25 August 2018; Published: 28 August 2018 Abstract: RSA key pairs are normally generated from two large primes p and q. We consider what happens if they are generated from two integers s and r, where r is prime, but unbeknownst to the user, s is not. Under most circumstances, the correctness of encryption and decryption depends on the choice of the public and private exponents e and d. In some cases, specific (s, r) pairs can be found for which encryption and decryption will be correct for any (e, d) exponent pair. Certain s exist, however, for which encryption and decryption are correct for any odd prime r - s. We give necessary and sufficient conditions for s with this property. Keywords: cryptography; abstract algebra; RSA; computer science education; cryptography education MSC: [2010] 11Axx 11T71 1. Notation and Background Consider the RSA public-key cryptosystem and its operations of encryption and decryption [1]. Let (p, q) be primes, n = p ∗ q, f(n) = (p − 1)(q − 1) denote Euler’s totient function and (e, d) the ∗ Z encryption/decryption exponent pair chosen such that ed ≡ 1. Let n = Un be the group of units f(n) Z mod n, and let a 2 Un. Encryption and decryption operations are given by: (ae)d ≡ (aed) ≡ (a1) ≡ a mod n We consider the case of RSA encryption and decryption where at least one of (p, q) is a composite number s.
    [Show full text]
  • Arxiv:1608.06086V1 [Math.NT]
    POWER OF TWO AS SUMS OF THREE PELL NUMBERS JHON J. BRAVO, BERNADETTE FAYE AND FLORIAN LUCA Abstract. In this paper, we find all the solutions of the Diophantine equation a Pℓ +Pm +Pn =2 , in nonnegative integer variables (n,m,ℓ,a) where Pk is the k-th term of the Pell sequence Pn n≥0 given by P0 = 0, P1 = 1 and Pn+1 =2Pn+Pn−1 for all n 1. { } ≥ MSC: 11D45, 11B39; 11A25 Keywords: Diophantine equations, Pell numbers, Linear forms in logarithm, reduction method. 1. Introduction The Pell sequence P is the binary reccurent sequence given by P = 0, P =1 { n}n≥0 0 1 and Pn+1 = 2Pn + Pn−1 for all n 0. There are many papers in the literature dealing with Diophantine equations≥ obtained by asking that members of some fixed binary recurrence sequence be squares, factorials, triangular, or belonging to some other interesting sequence of positive integers. For example, in 2008, A. Peth˝o[18] found all the perfect powers (of exponent larger than 1) in the Pell sequence. His result is the following. Theorem 1 (A. Peth˝o, [18]). The only positive integer solutions (n, q, x) with q 2 of the Diophantine equation ≥ q Pn = x are (n, q, x) = (1, q, 1) and (7, 2, 13). That is, the only perfect powers of exponent larger than 1 in the Pell numbers are 2 P1 =1 and P7 = 13 . The case q = 2 had been treated earlier by Ljunggren [13]. Peth˝o’s result was rediscovered by J. H.
    [Show full text]
  • Rapid Multiplication Modulo the Sum and Difference of Highly Composite Numbers
    MATHEMATICS OF COMPUTATION Volume 72, Number 241, Pages 387{395 S 0025-5718(02)01419-9 Article electronically published on March 5, 2002 RAPID MULTIPLICATION MODULO THE SUM AND DIFFERENCE OF HIGHLY COMPOSITE NUMBERS COLIN PERCIVAL Abstract. We extend the work of Richard Crandall et al. to demonstrate how the Discrete Weighted Transform (DWT) can be applied to speed up multiplication modulo any number of the form a b where p is small. In ± p ab particular this allows rapid computation modulo numbers of thej form k 2n 1. Q · ± In addition, we prove tight bounds on the rounding errors which naturally occur in floating-point implementations of FFT and DWT multiplications. This makes it possible for FFT multiplications to be used in situations where correctness is essential, for example in computer algebra packages. 1. Introduction In their seminal paper of 1994, Richard Crandall and Barry Fagin introduced the Discrete Weighted Transform (DWT) as a means of eliminating zero-padding when performing integer multiplication modulo Mersenne numbers [2]. While this does not give any improvement in the order of the multiplication, it nevertheless cuts the transform length (and thus time and memory) in half. For these reasons the DWT has become a fixture of the search for Mersenne primes [10]. By using the same form of irrational-base representation as is used for Mersenne numbers, we can in fact eliminate the zero-padding when working modulo a b ± provided that p ab p is sufficiently small that we have enough precision. Essen- tially, as with Mersennej numbers, we choose the base so that the reduction modulo xn 1 implicitQ in the FFT multiplication turns into a reduction modulo a b.
    [Show full text]
  • On Types of Elliptic Pseudoprimes
    journal of Groups, Complexity, Cryptology Volume 13, Issue 1, 2021, pp. 1:1–1:33 Submitted Jan. 07, 2019 https://gcc.episciences.org/ Published Feb. 09, 2021 ON TYPES OF ELLIPTIC PSEUDOPRIMES LILJANA BABINKOSTOVA, A. HERNANDEZ-ESPIET,´ AND H. Y. KIM Boise State University e-mail address: [email protected] Rutgers University e-mail address: [email protected] University of Wisconsin-Madison e-mail address: [email protected] Abstract. We generalize Silverman's [31] notions of elliptic pseudoprimes and elliptic Carmichael numbers to analogues of Euler-Jacobi and strong pseudoprimes. We inspect the relationships among Euler elliptic Carmichael numbers, strong elliptic Carmichael numbers, products of anomalous primes and elliptic Korselt numbers of Type I, the former two of which we introduce and the latter two of which were introduced by Mazur [21] and Silverman [31] respectively. In particular, we expand upon the work of Babinkostova et al. [3] on the density of certain elliptic Korselt numbers of Type I which are products of anomalous primes, proving a conjecture stated in [3]. 1. Introduction The problem of efficiently distinguishing the prime numbers from the composite numbers has been a fundamental problem for a long time. One of the first primality tests in modern number theory came from Fermat Little Theorem: if p is a prime number and a is an integer not divisible by p, then ap−1 ≡ 1 (mod p). The original notion of a pseudoprime (sometimes called a Fermat pseudoprime) involves counterexamples to the converse of this theorem. A pseudoprime to the base a is a composite number N such aN−1 ≡ 1 mod N.
    [Show full text]
  • A Diophantine Equation in K–Generalized Fibonacci Numbers and Repdigits
    A Diophantine equation in k{generalized Fibonacci numbers and repdigits Jhon J. Bravo Departamento de Matem´aticas Universidad del Cauca Calle 5 No 4{70, Popay´an,Colombia E-mail: [email protected] Carlos Alexis G´omezRuiz Departamento de Matem´aticas Universidad del Valle 25360 Calle 13 No 100-00, Cali, Colombia E-mail: [email protected] Florian Luca School of Mathematics University of the Witwatersrand Private Bag X3 Wits 2050 Johannesburg, South Africa Max Planck Institute for Mathematics Vivatsgasse 7 53111 Bonn, Germany Department of Mathematics Faculty of Sciences University of Ostrava 30 Dubna 22 701 03 Ostrava 1, Czech Republic E-mail: [email protected] Abstract 2010 Mathematics Subject Classification: 11B39; 11J86. Key words and phrases: Generalized Fibonacci numbers, lower bounds for nonzero linear forms in logarithms of algebraic numbers, repdigits. 1 2 J. J. Bravo, C. A. G´omezand F. Luca (k) The k−generalized Fibonacci sequence fFn gn starts with the value 0;:::; 0; 1 (a total of k terms) and each term afterwards is the sum of the k preceding terms. In the present paper, we study on members of k{generalized Fibonacci sequence which are sum of two repdigts, extending a result of D´ıazand Luca [5] regarding Fibonacci numbers with the above property. 1 Introduction Given an integer k ≥ 2, we consider the k{generalized Fibonacci sequence (k) (k) or, for simplicity, the k{Fibonacci sequence F := fFn gn≥2−k given by the recurrence (k) (k) (k) (k) (1.1) Fn = Fn−1 + Fn−2 + ··· + Fn−k for all n ≥ 2; (k) (k) (k) (k) with the initial conditions F−(k−2) = F−(k−3) = ··· = F0 = 0 and F1 = 1.
    [Show full text]
  • The Complexity of Prime Number Tests
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng The Complexity of Prime Number Tests Diplomarbeit Ausgeführt am Institut für Diskrete Mathematik und Geometrie der Technischen Universität Wien unter der Anleitung von Univ.Prof. Dipl.-Ing. Dr.techn. Michael Drmota durch Theres Steiner, BSc Matrikelnummer: 01025110 Ort, Datum Unterschrift (Student) Unterschrift (Betreuer) The problem of distinguishing prime numbers from composite numbers and of re- solving the latter into their prime factors is known to be one of the most important and useful in arithmetic. Carl Friedrich Gauss, Disquisitiones Arithmeticae, 1801 Ron and Hermione have 2 children: Rose and Hugo. Vogon poetry is the 3rd worst in the universe. Acknowledgements First, I would like to thank my parents, Rudolf and Doris Steiner, without them I would not be where I am now. I would also like to thank my professor Michael Drmota for supporting me and helping me with my thesis. Throughout the writing process he was always there for me and his input was always helpful. I would also like to thank my colleagues who made this stage of my life truly amazing. Also, a special thanks to the people that gave me valuable input on my thesis, mathematically or grammatically. 4 5 is the 5th digit in π. Abstract Prime numbers have been a signicant focus of mathematics throughout the years.
    [Show full text]