Square Roots and the Rabin Cryptosystem William J

Total Page:16

File Type:pdf, Size:1020Kb

Square Roots and the Rabin Cryptosystem William J The Roots of Higher Mathematics Computing Square Roots and the Rabin Cryptosystem William J. Martin, WPI Abstract: We explore thought experiments dealing with the computation of square roots in various number systems. As an application, we introduce an encryption scheme of Rabin. 1 Weird Number Systems A child learns about number systems in a very sensible way: First the counting numbers, then perhaps integers, then fraction, on to real numbers, and then the complex numbers. This seems very reasonable: each contains all the previous ones and enjoys more and more features, allowing more and more flexibility. Before we discuss other systems, let us review the notation for these familiar objects. The natural numbers, or positive integers, are denoted N = f1; 2; 3;:::g. They are closed under addition and multiplication: if we add or multiply two numbers from this set, the answer is guaranteed to be in this set. This is a great context for a discussion of unique factorization: an integer p > 1 is prime if its only divisors are 1 and itself. (Note that one is neither prime nor composite; it has an inverse, so it is called a \unit".) The integers are the first ring a student sees. The set Z = f:::; −3; −2; −1; 0; 1; 2; 3;:::g is closed under both addition and multiplication. It is a commutative ring since ab = ba for any two integers a and b. Every element has an additive inverse: stately precisely, for any integer a, there is a (unique) integer b such that a + b = 0. In algebra, we extend intuitive notation and denote this b by \−a". As a ring, we have a distributive law: a(b + c) = ab + ac and (a + b)c = ac + bc for all integers a, b and c. But only a = 1 and a = −1 have multiplicative inverses; for only these values of a does the equation ax = 1 have an integer solution x. The rational numbers are denoted by Q and their precise definition involves some subtlety to overcome the issue that (−6)=4 = 3=(−2) etc. (The concept of \canonical forms" is useful here: every rational number can be expressed uniquely in lowest terms where the numerator and denominator have no common factor and the denominator is positive.) This is our first example of a field! Both addition and multiplication are commutative: a + b = b + a and ab = ba. We have associativity so we can move parentheses around whenever expressions involve only one operation. We have the distributive laws. But now we have multiplicative inverses: for every rational number a, not equal to zero, there is a (unique) rational number x such that ax = 1. In high school, a student encounters phenomena in physics, chemistry, biology, finance, etc. where continuous variables are required for an accurate model. A \realistic" model. So 1 we feed them the real numbers. This set of objects is denoted by R but few students see the true definition of this set or a precise way to add or multiply real numbers. We usually equate them with non-terminating decimals and accept some finite precision (say 8 digits past the decimal point) so that addition (and multiplication, up to some error) is performed as with rational numbers. (In fact, any calculator or computer system can only represent a finite number of possibilities, so ignoring computer algebra systems, the \real" numbers students compute with a a very small subset of the rational numbers.) Applications in physics and electrical engineering, as well as a rigorous approach to mathematics, demand more: every polynomial of positive degree must have a root. While this property fails for the rational numbers (e.g., take f(x) = x2 − 3) and the real numbers (e.g., take f(x) = x2 + 3), the Fundamental Theorem of Algebra tells us that the complex numbers C = fa + bi j a; b 2 Rg have this \algebraically closed" property, where i is some object that squares to −1. There are other algebraically closed fields, such as the field of algebraic numbers. The collection of objects of the form f(x)=g(x) where f(x) and g(x) are polynomials with complex coefficients forms a field, called the field of rational functions and these have a (unique) algebraic closure. There also p-adic fields for any prime p. So we can find algebraically closed fields where a + a = 0 for all a, or where a + a + a = 0 for all a. This is the sort of field that becomes most useful in communications. In information theory, we concern ourselves with the mathematics of communication. We may be interested in efficient compression, balancing space savings against recoverability. We may be interested in error-correction, balancing \parity-check" overhead against message recovery in the presence of noise. Or we may be interested in encryption, where we aim to ensure that an encoded message is understandable only to its intended recipient. 2 Square Root Computation The cryptosystem we will discuss today is the invention of Michael Rabin of Harvard Uni- versity. Its main beauty lies in its simplicity. To encrypt a message m, you simply interpret m as a number (in a certain ring) and transmit m2. So the encryption function is just E(x) = x2 a function which, at face value, is familiar to every algebra student. Correct decryption involves computing a square root. How hard can that be? 2.1 One-way functions Cryptographers have great interest in \one-way" functions. A function f : X ! Y (i.e., taking inputs from a set X and producing a well-defined output y = f(x) in the set Y for any x in X) is said to be one-way if • given any x in X, it is easy to compute f(x) • given any y in Y , it is hard to find some x in X with f(x) = y, even if promised that one exists 2 (The proper definition is more technical. There must exist a polynomial time algorithm which, given x, computes f(x) while recovering x from only the value f(x) and a description of the function should be NP-hard or similar.) Unfortunately, we do not know any one- way functions! Researchers have many candidates, many suspicions about what sorts of functions should work, but no one has successfully proven the existence or non-existence of such functions. So the basic idea is to encrypt a message by incorporating a one-way function into the encryption process. An eavesdropper who intercepts the message must invert f in order to recover the message. But if f is one-way, this is essentially impossible. But this begs the question: If recovering the message is hard, how can the intended recipient obtain the message? In order to achieve this, we need not just a one-way function but a one-way trapdoor function: a one-way function which becomes efficiently invertible given some extra (secret) information. 2.2 Computing square roots Given all this theory, it's quite surprising that f : x 7! x2 could be a candidate one-way trapdoor function. But we'll see how this works as we develop the ingredients below. First let's recall what happens over the real numbers. Squaring an integer can be done quickly and the same technique is used for real numbers when represented as fixed-precision decimals. Since the advent of calculators, most people have forgotten how to estimate square roots by hand. The grade school method regularly taught until the 1960s is very clever and instills in a student skills that can be generalized to more abstract calculations of the same sort at the university level. In elementary calculus, a student learns Newton's Method (following the tangent line, instead of the curve, to reach the x-axis and then iterating) for finding roots of functions. I was surprised to learn, some years back, that this is essentially how a Texas Instrument calculator finds square roots. When I push the \SQRT" button on a calculator1, the input is first scaled to some number a lying between 1=2 and 2 (this contributes some powers of two to the answer) and then the calculator performs two iterations of Newton's Method on the function f(x) = x2 − a. Let us observe that not all real numbers have square roots. Working inside R, the square root of a negative number does not exist. The number zero is special: it has only one square root while all positive numbers have exactly two square roots. Please keep this classification in mind as we move to stranger number systems below. A communications system cannot realistically work with real numbers. Devices such as cellphones and CD players have very constrained memory and must perform calculations quickly. For these and other reasons, such environments employ modular arithmetic. What we will see next is that, while squaring a number in modular arithmetic can be performed quite efficiently, computing square roots seems to be easy in some moduli and extremely hard in others. (But we still cannot prove this. This remains a research problem for mathe- maticians and computer scientists.) 1At least on some TI calculators. I've seen their machine code, but it may have been updated since then. 3 3 Modular Arithmetic We have all seen modular (or \clock") arithmetic and familiarity with it is simply a matter of practice. Since my job requires me to use it almost daily, I have become quite adept at such calculation (but don't ask me to compute a derivative of a trig function!). I don't expect many readers have been doing these computations regularly, but I will be brief nonetheless.
Recommended publications
  • How Numbers Work Discover the Strange and Beautiful World of Mathematics
    How Numbers Work Discover the strange and beautiful world of mathematics NEW SCIENTIST 629745_How_Number_Work_Book.indb 3 08/12/17 4:11 PM First published in Great Britain in 2018 by John Murray Learning First published in the US in 2018 by Nicholas Brealey Publishing John Murray Learning and Nicholas Brealey Publishing are companies of Hachette UK Copyright © New Scientist 2018 The right of New Scientist to be identified as the Author of the Work has been asserted by it in accordance with the Copyright, Designs and Patents Act 1988. Database right Hodder & Stoughton (makers) All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the publisher, or as expressly permitted by law, or under terms agreed with the appropriate reprographic rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department at the addresses below. You must not circulate this book in any other binding or cover and you must impose this same condition on any acquirer. A catalogue record for this book is available from the British Library and the Library of Congress. UK ISBN 978 1 47 362974 5 / eISBN 978 14 7362975 2 US ISBN 978 1 47 367035 8 / eISBN 978 1 47367036 5 1 The publisher has used its best endeavours to ensure that any website addresses referred to in this book are correct and active at the time of going to press.
    [Show full text]
  • Eureka Issue 61
    Eureka 61 A Journal of The Archimedeans Cambridge University Mathematical Society Editors: Philipp Legner and Anja Komatar © The Archimedeans (see page 94 for details) Do not copy or reprint any parts without permission. October 2011 Editorial Eureka Reinvented… efore reading any part of this issue of Eureka, you will have noticed The Team two big changes we have made: Eureka is now published in full col- our, and printed on a larger paper size than usual. We felt that, with Philipp Legner Design and Bthe internet being an increasingly large resource for mathematical articles of Illustrations all kinds, it was necessary to offer something new and exciting to keep Eu- reka as successful as it has been in the past. We moved away from the classic Anja Komatar Submissions LATEX-look, which is so common in the scientific community, to a modern, more engaging, and more entertaining design, while being conscious not to Sean Moss lose any of the mathematical clarity and rigour. Corporate Ben Millwood To make full use of the new design possibilities, many of this issue’s articles Publicity are based around mathematical images: from fractal modelling in financial Lu Zou markets (page 14) to computer rendered pictures (page 38) and mathemati- Subscriptions cal origami (page 20). The Showroom (page 46) uncovers the fundamental role pictures have in mathematics, including patterns, graphs, functions and fractals. This issue includes a wide variety of mathematical articles, problems and puzzles, diagrams, movie and book reviews. Some are more entertaining, such as Bayesian Bets (page 10), some are more technical, such as Impossible Integrals (page 80), or more philosophical, such as How to teach Physics to Mathematicians (page 42).
    [Show full text]
  • Integer Sequences
    UHX6PF65ITVK Book > Integer sequences Integer sequences Filesize: 5.04 MB Reviews A very wonderful book with lucid and perfect answers. It is probably the most incredible book i have study. Its been designed in an exceptionally simple way and is particularly just after i finished reading through this publication by which in fact transformed me, alter the way in my opinion. (Macey Schneider) DISCLAIMER | DMCA 4VUBA9SJ1UP6 PDF > Integer sequences INTEGER SEQUENCES Reference Series Books LLC Dez 2011, 2011. Taschenbuch. Book Condition: Neu. 247x192x7 mm. This item is printed on demand - Print on Demand Neuware - Source: Wikipedia. Pages: 141. Chapters: Prime number, Factorial, Binomial coeicient, Perfect number, Carmichael number, Integer sequence, Mersenne prime, Bernoulli number, Euler numbers, Fermat number, Square-free integer, Amicable number, Stirling number, Partition, Lah number, Super-Poulet number, Arithmetic progression, Derangement, Composite number, On-Line Encyclopedia of Integer Sequences, Catalan number, Pell number, Power of two, Sylvester's sequence, Regular number, Polite number, Ménage problem, Greedy algorithm for Egyptian fractions, Practical number, Bell number, Dedekind number, Hofstadter sequence, Beatty sequence, Hyperperfect number, Elliptic divisibility sequence, Powerful number, Znám's problem, Eulerian number, Singly and doubly even, Highly composite number, Strict weak ordering, Calkin Wilf tree, Lucas sequence, Padovan sequence, Triangular number, Squared triangular number, Figurate number, Cube, Square triangular
    [Show full text]
  • Numbers 1 to 100
    Numbers 1 to 100 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 02:36:24 UTC Contents Articles −1 (number) 1 0 (number) 3 1 (number) 12 2 (number) 17 3 (number) 23 4 (number) 32 5 (number) 42 6 (number) 50 7 (number) 58 8 (number) 73 9 (number) 77 10 (number) 82 11 (number) 88 12 (number) 94 13 (number) 102 14 (number) 107 15 (number) 111 16 (number) 114 17 (number) 118 18 (number) 124 19 (number) 127 20 (number) 132 21 (number) 136 22 (number) 140 23 (number) 144 24 (number) 148 25 (number) 152 26 (number) 155 27 (number) 158 28 (number) 162 29 (number) 165 30 (number) 168 31 (number) 172 32 (number) 175 33 (number) 179 34 (number) 182 35 (number) 185 36 (number) 188 37 (number) 191 38 (number) 193 39 (number) 196 40 (number) 199 41 (number) 204 42 (number) 207 43 (number) 214 44 (number) 217 45 (number) 220 46 (number) 222 47 (number) 225 48 (number) 229 49 (number) 232 50 (number) 235 51 (number) 238 52 (number) 241 53 (number) 243 54 (number) 246 55 (number) 248 56 (number) 251 57 (number) 255 58 (number) 258 59 (number) 260 60 (number) 263 61 (number) 267 62 (number) 270 63 (number) 272 64 (number) 274 66 (number) 277 67 (number) 280 68 (number) 282 69 (number) 284 70 (number) 286 71 (number) 289 72 (number) 292 73 (number) 296 74 (number) 298 75 (number) 301 77 (number) 302 78 (number) 305 79 (number) 307 80 (number) 309 81 (number) 311 82 (number) 313 83 (number) 315 84 (number) 318 85 (number) 320 86 (number) 323 87 (number) 326 88 (number)
    [Show full text]
  • Parallel Tree Search in Volunteer Computing: a Case Study
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by TUGraz OPEN Library J Grid Computing (2018) 16:647–662 https://doi.org/10.1007/s10723-017-9411-5 Parallel Tree Search in Volunteer Computing: a Case Study Wenjie Fang · Uwe Beckert Received: 20 April 2017 / Accepted: 3 October 2017 / Published online: 23 October 2017 © The Author(s) 2017. This article is an open access publication Abstract While volunteer computing, as a restricted Keywords Volunteer computing · Parallel tree model of parallel computing, has proved itself to be search · Power law · Performance · Implementation a successful paradigm of scientific computing with excellent benefit on cost efficiency and public out- reach, many problems it solves are intrinsically highly 1 Introduction parallel. However, many efficient algorithms, includ- ing backtracking search, take the form of a tree Since the founding of one of the first volunteer com- search on an extremely uneven tree that cannot be puting projects, Great Internet Mersenne Prime Search easily parallelized efficiently in the volunteer com- (GIMPS), in 1996 [28], the paradigm of volunteer puting paradigm. We explore in this article how to computing has been gradually established as a cost- perform such searches efficiently on volunteer com- efficient means of scientific computing with good puting projects. We propose a parallel tree search public outreach. This trend has been sped up by the scheme, and we describe two examples of its real- appearance of the middle-ware BOINC [3], with var- world implementation, Harmonious Tree and Odd ious successful projects, including SETI@home [4] Weird Search, both carried out at the volunteer com- and Einstein@home [1].
    [Show full text]
  • Further Reading
    Further reading Wolfram Mathematica® provides a collection of ready to use functions, and with its rules of programming it sets the stage like a chess board. Now it depends on you (and your imagination) how to combine these and make your move to attack the problem in hand. It always helps to look at different resources to get ideas of ways to combine the Mathematica functions. There are excellent books written about Mathematica, for example Ilan Vardi [5], Stan Wagon [6], Shaw–Tigg [4] and Gaylord, Kamin, Wellin [2]to name a few. The reader is encouraged to have a look at them. Wolfram demonstration projects http://demonstrations.wolfram.com/ contains many interesting examples of how to use Mathematica in different disciplines. And finally, the Mathematica Help and its virtual book is a treasure, dig it! R. Hazrat, Mathematica ®: A Problem-Centered Approach, Springer Undergraduate Mathematics Series, DOI 10.1007/978-1-84996-251-3, © Springer-Verlag London Limited 2010 Bibliography [1] R. Gaylord, Mathematica Programming Fundamentals, Lecture Notes, Available in MathSource 100 [2] R. Gaylord, S. Kamin, P. Wellin, An introduction to programming with Mathematica, Cambridge University Press, 2005. 146, 184 [3] S. Rabinowitz, Index to Mathematical problems 1980–1984, Math pro Press. 1992. viii [4] W. Shaw, J. Tigg, Applied Mathematica, Addison-Wesley Publishing, 1994. 184 [5] I. Vardi, Computational Recreations in Mathematica, Addison-Wesley Pub- lishing, 1991. 62, 92, 184 [6] S. Wagon, Mathematica in Action, Springer-Verlag, 1999. 146, 184 [7]
    [Show full text]
  • Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Steven Gimbel Gettysburg College
    Philosophy Faculty Publications Philosophy Fall 10-23-2003 Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Steven Gimbel Gettysburg College John Jaroma Follow this and additional works at: https://cupola.gettysburg.edu/philfac Part of the Logic and Foundations of Mathematics Commons, and the Number Theory Commons Share feedback about the accessibility of this item. Gimbel, S. and Jaroma, J. Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers. (2003). Integers: Electronic Journal of Combinatorial Number Theory, 3. This is the publisher's version of the work. This publication appears in Gettysburg College's institutional repository by permission of the copyright owner for personal use, not for redistribution. Cupola permanent link: https://cupola.gettysburg.edu/philfac/10 This open access article is brought to you by The uC pola: Scholarship at Gettysburg College. It has been accepted for inclusion by an authorized administrator of The uC pola. For more information, please contact [email protected]. Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Abstract In 1888, James Joseph Sylvester (1814-1897) published a series of papers that he hoped would pave the way for a general proof of the nonexistence of an odd perfect number (OPN). Seemingly unaware that more than fifty years earlier Benjamin Peirce had proved that an odd perfect number must have at least four distinct prime divisors, Sylvester began his fundamental assault on the problem by establishing the same result. Later that same year, he strengthened his conclusion to five. These findings would help to mark the beginning of the modern era of research on odd perfect numbers.
    [Show full text]
  • Not Always Buried Deep Paul Pollack
    Not Always Buried Deep Paul Pollack Department of Mathematics, 273 Altgeld Hall, MC-382, 1409 West Green Street, Urbana, IL 61801 E-mail address: [email protected] Dedicated to the memory of Arnold Ephraim Ross (1906–2002). Contents Foreword xi Notation xiii Acknowledgements xiv Chapter 1. Elementary Prime Number Theory, I 1 1. Introduction 1 § 2. Euclid and his imitators 2 § 3. Coprime integer sequences 3 § 4. The Euler-Riemann zeta function 4 § 5. Squarefree and smooth numbers 9 § 6. Sledgehammers! 12 § 7. Prime-producing formulas 13 § 8. Euler’s prime-producing polynomial 14 § 9. Primes represented by general polynomials 22 § 10. Primes and composites in other sequences 29 § Notes 32 Exercises 34 Chapter 2. Cyclotomy 45 1. Introduction 45 § 2. An algebraic criterion for constructibility 50 § 3. Much ado about Z[ ] 52 § p 4. Completion of the proof of the Gauss–Wantzel theorem 55 § 5. Period polynomials and Kummer’s criterion 57 § vii viii Contents 6. A cyclotomic proof of quadratic reciprocity 61 § 7. Jacobi’s cubic reciprocity law 64 § Notes 75 Exercises 77 Chapter 3. Elementary Prime Number Theory, II 85 1. Introduction 85 § 2. The set of prime numbers has density zero 88 § 3. Three theorems of Chebyshev 89 § 4. The work of Mertens 95 § 5. Primes and probability 100 § Notes 104 Exercises 107 Chapter 4. Primes in Arithmetic Progressions 119 1. Introduction 119 § 2. Progressions modulo 4 120 § 3. The characters of a finite abelian group 123 § 4. The L-series at s = 1 127 § 5. Nonvanishing of L(1,) for complex 128 § 6. Nonvanishing of L(1,) for real 132 § 7.
    [Show full text]
  • Primitive Weird Numbers Having More Than Three Distinct Prime Factors 3
    PRIMITIVE WEIRD NUMBERS HAVING MORE THAN THREE DISTINCT PRIME FACTORS GIANLUCA AMATO, MAXIMILIAN F. HASLER, GIUSEPPE MELFI, AND MAURIZIO PARTON Abstract. In this paper we study some structure properties of primitive weird numbers in terms of their factorization. We give sufficient conditions to ensure that a positive integer is weird. Two algorithms for generating weird numbers having a given number of distinct prime factors are presented. These algorithms yield primitive weird numbers of the form mp1 ...pk for a suitable deficient positive integer m and primes p1,...,pk and generalize a recent technique developed for generating primitive weird numbers of the form n 2 p1p2. The same techniques can be used to search for odd weird numbers, whose existence is still an open question. 1. Introduction N Let n ∈ be a natural number, and let σ(n)= d|n d be the sum of its divisors. If σ(n) > 2n, then n is called abundant, whereas if σ(n) < 2n, then n is called deficient. Perfect numbers are those for which σ(n)=2n. P According to [5], we will refer to ∆(n)= σ(n) − 2n as the abundance of n, and to d(n)=2n − σ(n)= −∆(n) as the deficience of n. If n can be expressed as a sum of distinct proper divisors, then n is called semiperfect, or sometimes also pseudoperfect. Slightly abundant numbers with ∆(n) = 1 are called quasi-perfect, and slightly deficient numbers with d(n) = 1 are called almost perfect. A weird number is a number which is abundant but not semiperfect. In other words, n ∈ N is weird if it is abundant and it cannot be written as the sum of some of its proper divisors.
    [Show full text]
  • Primitive Abundant and Weird Numbers with Many Prime Factors 3
    PRIMITIVE ABUNDANT AND WEIRD NUMBERS WITH MANY PRIME FACTORS GIANLUCA AMATO, MAXIMILIAN F. HASLER, GIUSEPPE MELFI, AND MAURIZIO PARTON Abstract. We give an algorithm to enumerate all primitive abundant numbers (briefly, PAN) with a fixed Ω (the number of prime factors counted with their multiplicity), and explicitly find all PAN up to Ω = 6, count all PAN and square-free PAN up to Ω = 7 and count all odd PAN and odd square-free PAN up to Ω = 8. We find primitive weird numbers (briefly, PWN) with up to 16 prime factors, improving the previous results of [1] where PWN with up to 6 prime factors were given. The largest PWN we find has 14712 digits: as far as we know, this is the largest example existing, the previous one being 5328 digits long [14]. We find hundreds of PWN with exactly one square odd prime factor: as far as we know, only five were known before. We find all PWN with at least one odd prime factor with multiplicity greater than one and Ω = 7 and prove that there are none with Ω < 7. Regarding PWN with a cubic (or higher power) odd prime factor, we prove that there are none with Ω ≤ 7, and we did not find any with larger Ω. Finally, we find several PWN with 2 square odd prime factors, and one with 3 square odd prime factors. These are the first such examples. 1. Introduction N Let n ∈ be a natural number, and let σ(n)= d|n d be the sum of its divisors.
    [Show full text]
  • Mbk068-Endmatter.Pdf
    Not Always Buried Deep Not Always Buried Deep A Second Course in Elementary A Second Course in Elementary Number Theory Number Theory Paul Pollack AMERICAN MATHEMATICAL SOCIETY http://dx.doi.org/10.1090/mbk/068 Not Always Buried Deep A Second Course in Elementary Number Theory Paul Pollack AMERICAN MATHEMATICAL SOCIETY 2000 Mathematics Subject Classification. Primary 11A15, 11A25, 11A41, 11N05, 11N35, 11N36, 11P05, 11T22. For additional information and updates on this book, visit www.ams.org/bookpages/mbk-68 Library of Congress Cataloging-in-Publication Data Pollack, Paul, 1980– Not always buried deep : a second course in elementary number theory / Paul Pollack. p. cm. Includes bibliographical references and index. ISBN 978-8218-4880-7 (alk. paper) 1. Number theory. I. Title. QA241.P657 2009 512.72–dc22 2009023766 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy a chapter for use in teaching or research. Permission is granted to quote brief passages from this publication in reviews, provided the customary acknowledgment of the source is given. Republication, systematic copying, or multiple reproduction of any material in this publication is permitted only under license from the American Mathematical Society. Requests for such permission should be addressed to the Acquisitions Department, American Mathematical Society, 201 Charles Street, Providence, Rhode Island 02904-2294 USA. Requests can also be made by e-mail to [email protected]. c 2009 by the American Mathematical Society. All rights reserved. The American Mathematical Society retains all rights except those granted to the United States Government.
    [Show full text]
  • ON NEAR PERFECT NUMBERS Let Σ(N)
    ON NEAR PERFECT NUMBERS PETER COHEN, KATHERINE CORDWELL, ALYSSA EPSTEIN, CHUNG HANG KWAN, ADAM LOTT, AND STEVEN J. MILLER ABSTRACT. The study of perfect numbers (numbers which equal the sum of their proper divisors) goes back to antiquity, and is responsible for some of the oldest and most popular conjectures in number theory. We investigate a generalization introduced by Pollack and Shevelev: k-near-perfect numbers. These are examples to the well-known pseudoperfect numbers first defined by Sierpinski,´ and are numbers such that the sum of all but at most k of its proper divisors equals the number. We establish their asymptotic order for most integers k ≥ 4, as well as some properties of related quantities. 1. INTRODUCTION Let σ(n) be the sum of all positive divisors of n. A natural number n is perfect if σ(n)=2n. Perfect numbers have played a prominent role in classical number theory for millennia. A well-known conjecture claims that there are infinitely many even, but no odd, perfect numbers. Despite the fact that these conjectures remain unproven, there has been significant progress on studying the distribution of perfect numbers [Vo, HoWi, Ka, Er], as well as generalizations. One are the pseudoperfect numbers, which were introduced by Sierpinski´ [Si]. A natural number is pseudoperfect if it is a sum of some subset of its proper divisors. Erdös and Benkoski [Erd, BeEr] proved that the asymptotic density for pseudoperfect numbers, as well as that of abundant numbers that are not pseudoperfect (also called weird numbers), exist and are positive. Pollack and Shevelev [PoSh] initiated the study of a subclass of pseudoperfect numbers called near-perfect numbers.
    [Show full text]