LET n 3 be an integer, recall that (Z/nZ) denotes

Size: px
Start display at page:

Download "LET n 3 be an integer, recall that (Z/nZ) denotes"

Transcription

1 Group of Square Roots of Unity Modulo n Rochdi Omami, Mohamed Omami and Raouf Ouni Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 Abstract Let n 3 be an integer and G (n) be the subgroup of square roots of 1 in (Z/nZ). In this paper, we give an algorithm that computes a generating set of this subgroup. Keywords Group, modulo, square roots, unity. I. INTRODUCTION LET n 3 be an integer, recall that (Z/nZ) denotes the group of units of the ring (Z/nZ). Let n = p α1 1 pα...pαm m the primary decomposition of n, then (Z/nZ) = (Z/p αi i Z) for more details on the structure of (Z/nZ) see [1] and []. The group (Z/nZ) has several applications, the most important is cryptography, that is RSA cryptosystem (see [5]). The security of the RSA cryptosystem is based on the problem of factoring large numbers and the task of finding e th roots modulo a composite number n whose factors are not known. In [8], D.Shanks gives a probabilistic algorithm that computes a square root of an integer modulo an odd prime p. There are other algorithms that compute a square root of an integer modulo an integer n (see [7]) and more generally in a finite fields (see [6]). We denote by G (n) the subgroup of (Z/nZ) which is formed by the integers x that satisfies x =1, such integers are called square roots of unity modulo n. More precisely G (n) contains the unity and elements of order. Recall that elements of order exists always in (Z/nZ) (-1 has for order ), therefore G (n) is not a trivial group. Finally remark that all elements of G (n) except the unity has for order, so G (n) has an order a power of, so we obtain the following result : Proposition Let n 3 be an integer, then there exists an integer t 1 such that : Ord(G (n)) = t. In this article, we will give an algorithm that computes a generating set of G (n) and gives its decomposition into product of cyclic subgroups. Finally this algorithm will be written in MAPLE language. II. SQUARE ROOTS OF UNITY MODULO N Let n 3 be an integer and n = α p α1 1 pα...pαm m its primary decomposition. In this study, we shall distinguish the Rochdi Omami, Mohamed Omami and Raouf Ouni are doctoral students at the Faculty of Science of Tunis : University El Manar, Tunis 09 cases α =0, α =1, α =and α 3. Case 1 : α =0 Let n 3 be an integer and n = p α1 1 pα...pαm m its primary decomposition. Let x be an element of (Z/nZ) such that x =1, that is n divides x 1=(x 1)(x 1).Wehave (x 1) (x 1) =, therefore GCD(x 1,x1) {1, }, so if p i divides x 1 then p αi i divides x 1. If we note, for example, p 1, p,..., p s the primes among the p i which divide x 1, then x is a solution of this system : 1 pα...pαs s K. x 1=p αs1 s1 pαs...pαm It s clear that x is the unique solution of this system modulo n. Conversely, any system of the previous form gives a square root of unity modulo n. Note that a two different systems of this form give two different solutions, indeed let the systems : y 1=p α τ(1) ρ(1) pα ρ() ρ()...pα ρ(r) ρ(r) K 1 y 1=p α ρ(r1) ρ(r1) pρ(r) ρ(r)...pα ρ(m) ρ(m) K where σ and ρ are two permutations of the set {1,,.., m}, if x = y, then the set of prime divisors of x 1 among the p i is the same of y 1. Therefore the set of prime divisors of x 1 among the p i is {p σ(1),p,..., p σ(s) } because p σ(s1),p σ(s),...and p σ(m) does not divide K 1, indeed : p α σ(s1) p α σ(1) =. Thus GCD(K 1,p α σ(s1) σ(m) ) {1, }, so {p σ(1),p,..., p σ(s) } = {p ρ(1),p ρ(),..., p ρ(r) }, it follows that the two systems are identical. We conclude that the number of square roots of unity modulo n is equal to the number of partitions of the set {1,,.., m}, that is m. Note that the empty subset corresponds to 1 and if all p i divide x 1, then x =1.Sowehaveproved: Proposition.1: Let n 3 be an integer, then Ord(G (n)) = ω(n) where ω(n) denote the number of distinct prime factors of n. Now we study the structure of the group G (n). For simplicity throughout this section, we take n 3 to be an odd integer 505

2 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 and n = p α1 1 pα...pαm m with this definition : its primary decomposition. we start Definition.1: Let x be a square root of unity modulo n. x is said to be initial if all prime factors of n divide x 1 except only one p i, we said that x is associated with p i. And we note : where K is an integer not divisible by p i and the symbol p αi i means that we remove the factor p αi i. Note that for any i {1,,.., m} there exist only one square root of unity associated with p i which is the solution of this system:. We denote by (n) the set that contains this solution and the unity, so (n) is a cyclic subgroup of G (n) of order. We have the following theorem : Theorem.1: The map ϕ : G p1 (n) Gp (n)... Gpm (n) G (n) (x 1,x,...,x m ) x 1.x,...x m is an isomorphism of groups. It s clear that ϕ is a morphism of groups, we will show first that ϕ is injective. We have ϕ(x 1,x,...,x m ) = 1 x 1.x,...x m = 1. Suppose that there exists an integer i such that x i 1, therefore p i does not divides x i 1. Also, for j i, p i divides x j 1. Then we have: x i =1K i and x j =1p i.k j where p i does not divides K i,so x 1.x,...x m = (1p i.k 1 )..(1 K i )..(1 p i.k m ) = (1p )(1 K i ) = 1(p p K i K i ). Since p i does not divides K i, then p i does not divides x 1.x,...x m 1, that is absurd. Thus x i = 1 for all i {1,,.., m}. Hence ϕ is injective. Finally, we remark that: Ord(G p1 (n) Gp (n)... Gpm (n)) = Ord(G (n)) = m so ϕ is bijective, therefore it s an isomorphism. The fact that ϕ is injective is due to the choice of x i, i.e. the initial square roots of the unity. The previous theorem shows that G (n) is exactly formed by the unity and finished products without the repetition of the initial square roots of the unity. In other words, if x i denote the initial square root of the unity associated with p i, then : G (n) ={ i I x i,avec I {1,,.., m}}. With the convention that the unity is the product over empty set. Remark also that -1 is the product of all x i, Indeed : x i = (1 p α1...p αm i ) = 1 i p α1 i Kn since p α1 i is not divisible by all p i because K i is not divisible by p i, we conclude that x i 1 is not divisible by all p i. It follows x i = 1. Finally, we have the following result : Corollary.1: Let x i be the initial square root of the unity associated with p i, then : G (n) =<x 1,x,...,x m >. Now, we give an algorithm written in MAPLE that computes the x i, i.e. a generating set of G (n). Let us give some explanations. Resuming the system : This system gives the following equation : p αi p α1 = and Bezout algorithm allows us to compute K and K and all x i. Gene :=proc(n) local LB, i, LF act, GEN; GEN := [ ]; LB := [ ]; LF act := if actors(n)[]; Algorithm

3 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 An application example : To find the generators of the group of square root of the unity modulo , we can use the previous algorithm with the command Gene ( ); We have the following result [33593, 1319, 3605, 4863], that is the list of generators. The Bezout function which is used in the previous algorithm is not a MAPLE function, but it s a classical algorithm called Extended Euclidean algorithm. Case : α =1 Let n 3 be an integer such that its primary decomposition is n =p α1 1 pα...pαm m. Let x be an element of (Z/nZ) such that x =1, that is n divides x 1=(x 1)(x1).Wehave (x 1) (x 1) =, therefore GCD(x 1,x1) {1, }. So, if p i divides x 1, then p αi i divides x 1. Also divides (x 1)(x 1), thus divides (x 1) or (x 1). Since (x 1) (x 1) =, then divides (x 1) and (x 1),sox is a solution of a system of this form : where σ is a permutation of the set {1,,.., m}. It s clear that x is the only solution modulo n of this system and every system of this form gives a square root of the unity modulo n. We show in the same way as the previous case, that two different systems gives two distinct solutions. Therefore, the number of square roots of the unity modulo n is the number of partitions of the set {1,,.., m}, that is m. Hence, we have the following result: Proposition.: Let n 3 be an odd integer, then Ord(G (n)) = ω(n) where ω(n) denote the number of distinct prime factors of n. For simplicity throughout this section we take n 3 to be an integer and n =p α1 1 pα...pαm m its primary decomposition. We start the study of G (n) with this definition : Definition.: Let x be a square root of unity modulo n. x is said to be initial if all the prime factors of n divide x 1 except only one p i, we said that x is associated with p i. And we note : x 1=p α1 where K is an integer that does not divisible by p i and the symbol p αi i means that we remove the factor p αi i. We remark that for each i {1,,.., m}, there exists only one square root of unity associated with p i which is the solution of the following system : x 1=p α1. We denote by (n) the set that contains this solution and the unity, so (n) is a cyclic subgroup of G (n) of order. We have the following theorem : Theorem.: The map ϕ : G p1 (n) Gp (n)... Gpm (n) G (n) (x 1,x,...,x m ) x 1.x,...x m is an isomorphism of groups. the previous theorem shows that and we have also G (n) ={ i I x i,avec I {1,,.., m}} x i = 1. Corollary.: Let x i be the initial square root of the unity associated with p i, then G (n) =<x 1,x,...,x m >. We finish this section with the fact that the algorithm 1.1 remains valid with integers of the form n =p α1 1 pα...pαm m, just replacing LF act := if actors(n)[]; by LF act := if actors(n/)[];, it follows the algorithm 1.. Case 3 : α = Let n 3 be an integer such that its primary decomposition is n =4p α1 1 pα...pαm m. If all α i are nuls, then n =4.We know that (Z/4Z) = {1, 1} =< 1 >, therefore, we suppose that at least one of the α i is not null. Let x be an element of (Z/nZ) such that x =1, that is n divides x 1=(x 1)(x1).Wehave(x1) (x 1) =, therefore divides (x 1) and (x 1). But is not an ordinary prime, indeed we have the following equivalence : x 1[] x 1[8]. It follows that 8 divide x 1=(x 1)(x1). Since GCD(x 1,x1)=, therefore 4 divides (x 1) or (x 1),sox is a solution of one of the following systems : x 1=4p α σ(1) σ(s) K 1 x 1=4p α σ(s1) σ(m) K 507

4 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 where σ is a permutation of the set {1,,.., m}. It s clear that each one of these systems has a unique solution modulo n and each system of this form gives a square root of the unity modulo n. We shows also that a two different systems gives two distinct solutions. Therefore, the number of square roots of the unity modulo n is twice the number of partitions of the set {1,,.., m}, that is m. Hence, we have the following result: Proposition.3: Let n 3 be an odd integer, then Ord(G (4n)) = ω(n)1 where ω(n) denote the number of distinct prime factors of n. For simplicity throughout this section we take n 3 to be an integer and n =4p α1 1 pα...pαm m its primary decomposition with at least one of the α i as being not null. Now we start studying of G (n). Consider the following systems : x 1=4p α1 1 pα...pαm 1 x 1=K 1 pα...pαm 1 x 1=4K It s clear that 1 is the only solution of the first system. The second system has only solution which is x 0 = n/1. This solution is called second trivial square root of the unity, we denote by G 0 (n) the cyclic subgroup which is formed by 1 and x 0. Proposition.4: Let the systems : x 1=4p α σ(1) σ(s) K 1 x 1=4p α σ(s1) σ(m) K if we note by x the solution of the first system and y that of the second. then y = x 0 x (and also x = x 0 y). It s clear thatx 0 x is a square root of the unity. We have : x 0 x = (1p α1 1 pα...pαm 1) (14p α σ(1) ) = 1p α σ(1) σ(s) (4K 1 p α σ(s1) σ(m) K 1)Kn Since K 1 is not divisible by 4 and K 1 is not divisible by p α σ(s1) σ(s1),pσ(s) σ(s)... and pα σ(m) σ(m), therefore x 0x 1 is not divisible by 4, p α σ(s1) σ(s1),pσ(s) σ(s)... and pα σ(m) σ(m). So x 0x is solution of the second system,i.e. x 0 x = y. Definition.3: Let x be a square root of the unity modulo n. We said that x is of the first category if 4 divides x 1, else we said that x is of the second category. From the definition, we see that a square root of the unity of the first category is a solution of a system of the form : x 1=4p α σ(1) also a square root of the unity of the second category is the product of a square root of the unity of the first category by x 0. Definition.4: Let x be a square root of unity modulo n. x is said to be initial if all prime factors of n divide x 1 except only one p i, we said that x is associated with p i. And we note : where K is an integer not divisible by p i. Note that there exist two initial square roots of the unity associated with p i, which are the solutions of the following systems : x 1=4p α1. x 1=4p αi We remark that the solution of the first system is of the first category and that of second is of the second category. If we note by x i the solution of the first system and y i that of second, then y i = x i x 0. So the set {1,x 0,x i,y i } is a subgroup of G (n), which we denote by (n). The set formed by 1 and x i ( the initial square root of the unity of the first category associated with p i ) is a cyclic subgroup of order, which we denote by G pi (n) and we have the following isomorphism : (n) G pi (n) G0 (n). More generally, we have the following result : ϕ : Theorem.3: The map G p1 (n)... G pm (n) G 0 (n) G (n) (x 1,...,x m,y) x 1.x,...x m.y is an isomorphism of groups. It s clear that ϕ is an morphism of groups. For showing that ϕ is an isomorphism, we should prove that ϕ is injective and 508

5 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 we conclude by cardinality. We have ϕ(x 1,x,...,x m,y)=1 x 1.x,...x m.y =1, if we suppose that there exists an integer i such that x i 1, then p i does not divides x i 1. Since if j i then p i divides x j 1 and p i divides y. Therefore x 1.x,...x m.y 1 is not divisible by p i, that is absurd. Thus x i =1for all i. Finally we have y =1, therefore ϕ is injective. From the previous theorem, we can see that : G (n) ={ i I x i,avec I {1,,.., m}} {1,x 0 } m and we can also show that x 0 x i = 1. Corollary.3: With the previous notations, we have : G (n) =<x 0,x 1,x,...,x m >. Now we give an algorithm in MAPLE that computes the x i.i.e. a generating set of G (n). x 0 is computed from the relation x 0 = n/ 1. The other x i are computed in the same way as the previous case. Gene :=proc(n) local LB, i, LF act, GEN; GEN := [ ]; LB := [ ]; GEN := [op(gen),n/ 1]; LF act := if actors(n/4)[]; Algorithm 1.3 An application example : To find the generators of the group of square root of the unity modulo , we can use the previous algorithm with the command Gene ( ); We have the following result [4863, 441, 6733, 3433], that is the list of generators. We note that the first value of the given list is the second trivial square root of the unity. Case 4 : α 3 Let n 3 be an integer such that its primary decomposition is n = α p α1 1 pα...pαm m with α 3. If all α i are null, then n = α with α 3. Recall that (Z/nZ) is not cyclic and its cardinal is n/. Let x be an element of (Z/nZ) such that x = 1, that is α divides x 1=(x 1)(x 1).WehaveGCD(x 1,x1)=, therefore α 1 divides (x 1) or (x 1).Soxis the solution of one of the following systems : x 1= α 1 K 1 x 1=K 1 ; x 1=K x 1= α 1 K The first system has two solutions which are 1 and α 1 1, the second system has two solutions which are -1 and α 1 1. It s clear that all of the previous solutions are square roots of the unity. We have the following result : Proposition.5: Let n = α with α 3, then G (n) ={1,n/ 1,n/1, 1} We remark that (n/ 1)(n/1) = ( α 1 1)( α 1 1) = 1, therefore G (n) =<n/ 1,n/1>. Now we suppose that n = α p α1 1 pα...pαm m with α 3 and at least one of the α i is not null. Let x be an element of (Z/nZ) such that x =1. Since GCD(x 1,x1)=, then x is the solution of one of the following systems : x 1= α 1 p α σ(1) σ(s) K 1 x 1= α 1 p α σ(s1) σ(m) K where σ is a permutation of the set {1,,.., m}. It s clear that each of these systems has two solutions modulo n and each system of this form gives a square root of the unity modulo n, because x is odd. We shows also that a two different systems give distinct solutions. Therefore, the number of square roots of the unity modulo n is four times the number of partitions of the set {1,,.., m}, that is m. Hence, we have the following result: Proposition.6: Let n 3 be an odd integer, then Ord(G ( α n)) = ω(n) with α 3. For simplicity throughout this section we take n 3 to be an integer and n = α p α1 1 pα...pαm m (α 3) its primary decomposition with at least one of the α i is not null. Now we begin to study G (n). Consider the following systems : x 1= α 1 p α1 1 pα...pαm 1 x 1=K ; 1 pα...pαm 1 x 1= α 1 K It s clear that the first system has two solutions modulo n and 1 is one of these solutions, we note by y 0 the other solution. Also the second system has two solutions modulo n, denoted 509

6 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 by y 1 and y. We have : y 0 = α 1 p α1 1 pα...pαm m 1=n/1 and y = y 1 α 1 p α1 1 pα...pαm m, therefore y y 1 =1 α 1 p α1 1 pα...pαm m y 1. Since y 1 is odd, then y y 1 = y 0 and y = y 1 y 0. So, the set {1,y 0,y 1,y } is a subgroup of G (n), which is noted by G 0 (n). Finally remark that : G 0 (n) ={1,y 0 } {1,y 1 }. Definition.5: Let x be a square root of the unity modulo n, We said that x is of the first category if α divides x 1, else we said that x is of the second category. Let x G 0 (n), then x is of the first category if and only if x =1. Definition.6: Let x be a square root of unity modulo n. x is said to be initial if all prime factors of n divide x 1 except only one p i, we said that x is associated with p i. And we note :. where K is an integer not divisible by p i. Note that the initial square roots of the unity associated with p i are the solutions of the following systems : x 1= α 1 p α1 x 1= α 1 p αi Since each of these system has two solutions modulo n, therefore there exist 4 initial square roots of the unity associated with p i. Proposition.7: Let the system : x 1= α 1 p α1 If we denote by x 1 and x the solutions of this system, then x 1 = y 0.x. We have x 1 = x α 1 p α1 1 pα...pαm m, therefore x 1.x = 1 α 1 p α1 1 pα...pαm m x. Since x is odd, then x 1.x = y 0 it follows that x 1 = x.y 0. In the same way, we show that the product of the solutions of the following system: is equal to y 0. x 1= α 1 p αi Proposition.8: there exists an only initial square root of the unity associated with p i and of the first category. Indeed, this square root of the unity is the only solution of the system x 1= α p α1 We denote by (n), the cyclic subgroup of order which is formed by 1 and the initial square root of the unity associated with p i and of the first category. Proposition.9: Let us consider these systems : x 1= α 1 p α σ(1) (1) σ(s) K 1 x 1= α 1 p α σ(s1) σ(m) K where σ is a permutation of the set {1,,.., m}, then the product of each solution of (1) by y 1 or y is a solution of (). Let x be a solution of (1). suppose that x is of the first category, that is Therefore x =1 α p α σ(1). () y 1.x = (1p α1 1 pα...pαi ).(1 α p α σ(1) ) = 1p α σ(1) σ(s) (α K 1 p α σ(s1) σ(m) K)nK. Since α 1 does not divides K and p α σ(s1) σ(s1),pσ(s) σ(s)... and pα σ(m) σ(m) does not divide K 1, then α 1,p α σ(s1) σ(s1),pσ(s) σ(s)...et pα σ(m) σ(m) does not divide α K 1 p α σ(s1) σ(m) K. Hence y 1.x is a solution of (). If z is the other solution of (1), then z = y 0.x. Thus, z.y 1 = y 0.(x.y 1 ). 510

7 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 Since (x.y 1 ) is a solution of (), therefore z.y 1 is also a solution of (). Finally, remark that reasoning is also valid to y. If we denote by (n) the set which is formed by the initial square roots of the unity associated with p i and with the elements of G 0 (n), then we have the following result: Corollary.4: (n) is a group and we have : (n) (n) G0 (n). The initial square roots of the unity associated with p i are the solutions of the following systems : x 1= α 1 p α1 i K (1) x 1= α 1 p αi () We deduce that Ord( (n)) = 8. From the previous proposition, we know that the solutions of () are the product of the solutions of (1) by y 1. If we note by x a solution of (1), then the solutions of (1) are x and x.y 0. So, the initial square roots of the unity associated with p i are {x, x.y 0, x.y 1, x.y 0.y 1 }, it follows : (n) ={1,y 0,y 1,y 1.y 0, x, x.y 0, x.y 1, x.y 0.y 1 }. And obviously, we have (n) G pi (n) G0 (n). More generally, we have the following result : ϕ : Theorem.4: The map G p1 (n)... G pm (n) G 0 (n) G (n) (x 1,...,x m,y) x 1,...x m.y is an isomorphism of groups. In the same way as the previous theorem, we show that ϕ is an injective morphism of groups and we conclude by cardinality. The group G 0 (n) is not cyclic, but we have G 0 (n) ={1,y 0 } {1,y 1 }, thus : G (n) G p1 (n) G p Finally we have the following result : (n)... G pm (n) {1,y 0 } {1,y 1 }. Corollary.5: As it is noted above, we have G (n) =<y 0,y 1,x 1,x,...,x m >. Now we give an algorithm in MAPLE that computes x i, y 0 and y 1,i.e. a generating set of G (n). The solution y 0 is computed by the formula y 0 = n/1 and y 1 is a solution of the system : 1 pα...pαm 1 x 1= α 1 K we will choose that satisfied this system 1 pα...pαm 1 x 1= α K Since ( ) implies that α K (n/ α )K 1 =,sowegetk and K 1 with the Bezout algorithm. Therefore y 1 = α K 1n/. The other x i are computed in the same way as the previous case. Gene :=proc(n) local a, LB, i, LF act, GEN; GEN := [ ]; LB := [ ]; a := ifactors(n)[][1][]; GEN := [op(gen),n/ 1]; LB := Bezout( a, n/( a), ); a 1 n/ mod n]; LF act := if actors(n/( a))[]; Algorithm 1.4 An application example : To find the generators of the group of square root of the unity modulo , we can use the previous algorithm with this command : Gene ( ); We have the following result [4863, 441, 6733, 3433], that is the list of generators. We note that the first value of the given list is y 0, and the second is y 1. The choice of y 1 allows us to have : m y 0.y 1 x i = 1. ( ) 511

8 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 Indeed, y 0.y 1 is the solution of ( ). Therefore y 0.y 1 m x i = (1p α1 1 pα...pαm 1 ) (1 α p α1 i ) = (1p α1 1 pα...pαm 1 )(1 α p α1 i Kn) = 1[p α1 1 pα...pαm 1 α p α1 i ] Kn It s clear that the term between the brackets is not divisible by α 1,p α1 1,pα...,pαm m. So, y 0.y 1 x i is a solution of this system x 1=K 1 x 1= α 1 p α1 1 pα...pαm Since the solutions of this system are -1 and (n/ 1). To m conclude, just shows that α divides y 0.y 1 x i 1. We have m y 0.y 1 x i 1=(y 0.y 1 1) x i ( x i 1) so it s clear that (y 0.y 1 1) is divisible by α because y 0.y 1 is solution of ( ), and x i 1= α p α1 i Kn, thus x i 1 is divisible by α it follow that α divides m y 0.y 1 x i 1. Now we give an explicit formula for y 1 in special cases. Proposition.10: Let n be an integer of the form 8b, with b is an odd positive integer, then : y 1 = n/41 if b 1[4]. y 1 =3n/41 if b 3[4]. On the first hand, we have (n/4 1) = (p 1) = 14p(p 1), and since divides p 1, then n divides 4p(p 1). Hence (n/41) =1. On the other hand, (n/4 1) 1=n/4 is divisible by all the prime factors of n. Since (n/41)1=(p 1) and b 1[4], then p 1 is divisible by and not by 4. Thus (n/41)1 is divisible by 4 and not by 8, hence the result. We will show this point in the same way. Proposition.11: Let n be an integer of the form α b with b is an odd positive integer and α 3. ifb 1[ α 1 ], the solution of ( ) is : Therefore We have y = (α 1 1)n α 1 1. y 1 = (α 1)n α 1 1. y = (b( α 1 1)1) = 14b ( α 1 1) 4b( α 1 1) = 14b( α b( α 1) α 1 b 1). Since α 1 divides b 1, then n divides 4b( α b( α 1) α 1 b 1), therefore y =1. It s clear that all the prime factors of n divide y 1. Onthe other hand, y 1=b( α 1 1) = α b (b 1), then α divides y 1. So, y is solution of ( ). We know that y 1 = y n/, it follows the expression of y 1. III. CONCLUSION For the cardinal of G (n), we have the following theorem : Theorem 3.1: Let n 3 be an odd integer, then : Ord(G (n)) = ω(n) Ord(G (n)) = ω(n) Ord(G (4n)) = ω(n)1 Ord(G ( α n))= ω(n) with α 3 where ω(n) is the number of distinct prime factors of n. Now we give an algorithm that computes a generating set for G (n), where n is an integer. Gene :=proc(n) local a, LB, i, LF act, GEN; GEN := [ ]; LB := [ ]; if(n mod =1)then LF act := if actors(n)[]; else a := ifactors(n)[][1][]; if a =1then LF act := if actors(n)[]; elifa =then GEN := [op(gen),n/ 1]; 51

9 Digital Open Science Index, Mathematical and Computational Sciences waset.org/publication/8554 LF act := if actors(n/4)[]; else GEN := [op(gen),n/ 1]; LB := Bezout( a, n/( a), ); a 1 n/ mod n]; LF act := if actors(n/( a))[]; Algorithm 1.5 Complexity of the algorithm : It s clear that the complexity of the Algorithm 1.5 is the same as the Algorithm 1.1. Recall that the number of distinct prime factors of a number n is denoted ω(n). We know that ω(n) =O(ln(ln n)) (see [9] and [10]), and the complexity of the Extended Euclidean algorithm is O(ln n) (see [3] and [4]). Therefore the complexity of Algorithm 1.1 without the factorization is O(ln(ln n) ln n). REFERENCES [1] J-P. Serre, A Course in Arithmetic. Graduate Texts in Mathematics, Springer, 1996 [] S. Lang, Undergraduate Algebra, nd ed. UTM. Springer Verlag,1990 [3] H. Cohen, A course in computational algebraic number theory. Springer-Verlag, [4] V. Shoup, A Computational Introduction to Number Theory and Algebra. Cambridge University Press, 005. [5] David M. Bressoud, Factorization and Primality Testing. Undergraduate Texts in Mathematics, Springer-Verlag, New York, [6] E. Bach, A note on square roots in finite fields. IEEE Trans. Inform. Theory, 36(6): , Eric [7] E. Bach and K. Huber, Note on taking square-roots modulo N. IEEE Transactions on Information Theory, 45():807809, [8] D. Shanks, Five number-theoretic algorithms. In Proc. Second Munitoba Conf. Numerical Math , 197. [9] Hardy, G. H, Ramanujan: Twelve Lectures on Subjects Suggested by His Life and Work, 3rd ed. New York: Chelsea, G. H. [10] Hardy and E. M.Wright, An introduction to the theory of numbers, 4th ed. Oxford University Press,

Midterm Exam. There are 6 problems. Your 5 best answers count. Please pay attention to the presentation of your work! Best 5

Midterm Exam. There are 6 problems. Your 5 best answers count. Please pay attention to the presentation of your work! Best 5 Department of Mathematical Sciences Instructor: Daiva Pucinskaite Modern Algebra June 22, 2017 Midterm Exam There are 6 problems. Your 5 best answers count. Please pay attention to the presentation of

More information

Chapter 5. Modular arithmetic. 5.1 The modular ring

Chapter 5. Modular arithmetic. 5.1 The modular ring Chapter 5 Modular arithmetic 5.1 The modular ring Definition 5.1. Suppose n N and x, y Z. Then we say that x, y are equivalent modulo n, and we write x y mod n if n x y. It is evident that equivalence

More information

Number Theory and Group Theoryfor Public-Key Cryptography

Number Theory and Group Theoryfor Public-Key Cryptography Number Theory and Group Theory for Public-Key Cryptography TDA352, DIT250 Wissam Aoudi Chalmers University of Technology November 21, 2017 Wissam Aoudi Number Theory and Group Theoryfor Public-Key Cryptography

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

A Generalization of Wilson s Theorem

A Generalization of Wilson s Theorem A Generalization of Wilson s Theorem R. Andrew Ohana June 3, 2009 Contents 1 Introduction 2 2 Background Algebra 2 2.1 Groups................................. 2 2.2 Rings.................................

More information

Math 3140 Fall 2012 Assignment #3

Math 3140 Fall 2012 Assignment #3 Math 3140 Fall 2012 Assignment #3 Due Fri., Sept. 21. Remember to cite your sources, including the people you talk to. My solutions will repeatedly use the following proposition from class: Proposition

More information

Cover Page. The handle holds various files of this Leiden University dissertation.

Cover Page. The handle   holds various files of this Leiden University dissertation. Cover Page The handle http://hdl.handle.net/1887/20310 holds various files of this Leiden University dissertation. Author: Jansen, Bas Title: Mersenne primes and class field theory Date: 2012-12-18 Chapter

More information

Lecture 20 FUNDAMENTAL Theorem of Finitely Generated Abelian Groups (FTFGAG)

Lecture 20 FUNDAMENTAL Theorem of Finitely Generated Abelian Groups (FTFGAG) Lecture 20 FUNDAMENTAL Theorem of Finitely Generated Abelian Groups (FTFGAG) Warm up: 1. Let n 1500. Find all sequences n 1 n 2... n s 2 satisfying n i 1 and n 1 n s n (where s can vary from sequence to

More information

2 More on Congruences

2 More on Congruences 2 More on Congruences 2.1 Fermat s Theorem and Euler s Theorem definition 2.1 Let m be a positive integer. A set S = {x 0,x 1,,x m 1 x i Z} is called a complete residue system if x i x j (mod m) whenever

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #24 12/03/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #24 12/03/2013 18.78 Introduction to Arithmetic Geometry Fall 013 Lecture #4 1/03/013 4.1 Isogenies of elliptic curves Definition 4.1. Let E 1 /k and E /k be elliptic curves with distinguished rational points O 1 and

More information

Name: Solutions Final Exam

Name: Solutions Final Exam Instructions. Answer each of the questions on your own paper. Be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] All of

More information

INTRODUCTION TO THE GROUP THEORY

INTRODUCTION TO THE GROUP THEORY Lecture Notes on Structure of Algebra INTRODUCTION TO THE GROUP THEORY By : Drs. Antonius Cahya Prihandoko, M.App.Sc e-mail: antoniuscp.fkip@unej.ac.id Mathematics Education Study Program Faculty of Teacher

More information

Math 3140 Fall 2012 Assignment #4

Math 3140 Fall 2012 Assignment #4 Math 3140 Fall 2012 Assignment #4 Due Fri., Sept. 28. Remember to cite your sources, including the people you talk to. In this problem set, we use the notation gcd {a, b} for the greatest common divisor

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

Euler s, Fermat s and Wilson s Theorems

Euler s, Fermat s and Wilson s Theorems Euler s, Fermat s and Wilson s Theorems R. C. Daileda February 17, 2018 1 Euler s Theorem Consider the following example. Example 1. Find the remainder when 3 103 is divided by 14. We begin by computing

More information

Section 0. Sets and Relations

Section 0. Sets and Relations 0. Sets and Relations 1 Section 0. Sets and Relations NOTE. Mathematics is the study of ideas, not of numbers!!! The idea from modern algebra which is the focus of most of this class is that of a group

More information

MATH 3030, Abstract Algebra FALL 2012 Toby Kenney Midyear Examination Friday 7th December: 7:00-10:00 PM

MATH 3030, Abstract Algebra FALL 2012 Toby Kenney Midyear Examination Friday 7th December: 7:00-10:00 PM MATH 3030, Abstract Algebra FALL 2012 Toby Kenney Midyear Examination Friday 7th December: 7:00-10:00 PM Basic Questions 1. Compute the factor group Z 3 Z 9 / (1, 6). The subgroup generated by (1, 6) is

More information

A SURVEY OF PRIMALITY TESTS

A SURVEY OF PRIMALITY TESTS A SURVEY OF PRIMALITY TESTS STEFAN LANCE Abstract. In this paper, we show how modular arithmetic and Euler s totient function are applied to elementary number theory. In particular, we use only arithmetic

More information

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1). Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the

More information

TC10 / 3. Finite fields S. Xambó

TC10 / 3. Finite fields S. Xambó TC10 / 3. Finite fields S. Xambó The ring Construction of finite fields The Frobenius automorphism Splitting field of a polynomial Structure of the multiplicative group of a finite field Structure of the

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms

More information

Introduction to Elliptic Curves

Introduction to Elliptic Curves IAS/Park City Mathematics Series Volume XX, XXXX Introduction to Elliptic Curves Alice Silverberg Introduction Why study elliptic curves? Solving equations is a classical problem with a long history. Starting

More information

MATH 361: NUMBER THEORY FOURTH LECTURE

MATH 361: NUMBER THEORY FOURTH LECTURE MATH 361: NUMBER THEORY FOURTH LECTURE 1. Introduction Everybody knows that three hours after 10:00, the time is 1:00. That is, everybody is familiar with modular arithmetic, the usual arithmetic of the

More information

A BRIEF INTRODUCTION TO LOCAL FIELDS

A BRIEF INTRODUCTION TO LOCAL FIELDS A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions. D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial

More information

MATH 420 FINAL EXAM J. Beachy, 5/7/97

MATH 420 FINAL EXAM J. Beachy, 5/7/97 MATH 420 FINAL EXAM J. Beachy, 5/7/97 1. (a) For positive integers a and b, define gcd(a, b). (b) Compute gcd(1776, 1492). (c) Show that if a, b, c are positive integers, then gcd(a, bc) = 1 if and only

More information

Mathematical Foundations of Public-Key Cryptography

Mathematical Foundations of Public-Key Cryptography Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical

More information

FIELD THEORY. Contents

FIELD THEORY. Contents FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions

More information

Algebraic Structures Exam File Fall 2013 Exam #1

Algebraic Structures Exam File Fall 2013 Exam #1 Algebraic Structures Exam File Fall 2013 Exam #1 1.) Find all four solutions to the equation x 4 + 16 = 0. Give your answers as complex numbers in standard form, a + bi. 2.) Do the following. a.) Write

More information

ON THE SUBGROUP LATTICE OF AN ABELIAN FINITE GROUP

ON THE SUBGROUP LATTICE OF AN ABELIAN FINITE GROUP ON THE SUBGROUP LATTICE OF AN ABELIAN FINITE GROUP Marius Tărnăuceanu Faculty of Mathematics Al.I. Cuza University of Iaşi, Romania e-mail: mtarnauceanu@yahoo.com The aim of this paper is to give some

More information

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves William R. Trost and Guangwu Xu Abstract Koblitz curves have been a nice subject of consideration for both theoretical and practical interests.

More information

CSIR - Algebra Problems

CSIR - Algebra Problems CSIR - Algebra Problems N. Annamalai DST - INSPIRE Fellow (SRF) Department of Mathematics Bharathidasan University Tiruchirappalli -620024 E-mail: algebra.annamalai@gmail.com Website: https://annamalaimaths.wordpress.com

More information

A. Algebra and Number Theory

A. Algebra and Number Theory A. Algebra and Number Theory Public-key cryptosystems are based on modular arithmetic. In this section, we summarize the concepts and results from algebra and number theory which are necessary for an understanding

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

GENERALIZATIONS OF SOME ZERO-SUM THEOREMS. Sukumar Das Adhikari Harish-Chandra Research Institute, Chhatnag Road, Jhusi, Allahabad , INDIA

GENERALIZATIONS OF SOME ZERO-SUM THEOREMS. Sukumar Das Adhikari Harish-Chandra Research Institute, Chhatnag Road, Jhusi, Allahabad , INDIA INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #A52 GENERALIZATIONS OF SOME ZERO-SUM THEOREMS Sukumar Das Adhikari Harish-Chandra Research Institute, Chhatnag Road, Jhusi, Allahabad

More information

1 Structure of Finite Fields

1 Structure of Finite Fields T-79.5501 Cryptology Additional material September 27, 2005 1 Structure of Finite Fields This section contains complementary material to Section 5.2.3 of the text-book. It is not entirely self-contained

More information

The primitive root theorem

The primitive root theorem The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under

More information

MA4H9 Modular Forms: Problem Sheet 2 Solutions

MA4H9 Modular Forms: Problem Sheet 2 Solutions MA4H9 Modular Forms: Problem Sheet Solutions David Loeffler December 3, 010 This is the second of 3 problem sheets, each of which amounts to 5% of your final mark for the course This problem sheet will

More information

Counting subgroups of the multiplicative group

Counting subgroups of the multiplicative group Counting subgroups of the multiplicative group Lee Troupe joint w/ Greg Martin University of British Columbia West Coast Number Theory 2017 Question from I. Shparlinski to G. Martin, circa 2009: How many

More information

Course 2316 Sample Paper 1

Course 2316 Sample Paper 1 Course 2316 Sample Paper 1 Timothy Murphy April 19, 2015 Attempt 5 questions. All carry the same mark. 1. State and prove the Fundamental Theorem of Arithmetic (for N). Prove that there are an infinity

More information

MTHSC 3190 Section 2.9 Sets a first look

MTHSC 3190 Section 2.9 Sets a first look MTHSC 3190 Section 2.9 Sets a first look Definition A set is a repetition free unordered collection of objects called elements. Definition A set is a repetition free unordered collection of objects called

More information

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Quadratic Congruences, the Quadratic Formula, and Euler s Criterion

Quadratic Congruences, the Quadratic Formula, and Euler s Criterion Quadratic Congruences, the Quadratic Formula, and Euler s Criterion R. C. Trinity University Number Theory Introduction Let R be a (commutative) ring in which 2 = 1 R + 1 R R. Consider a quadratic equation

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

ABSTRACT ALGEBRA 1, LECTURE NOTES 5: HOMOMORPHISMS, ISOMORPHISMS, SUBGROUPS, QUOTIENT ( FACTOR ) GROUPS. ANDREW SALCH

ABSTRACT ALGEBRA 1, LECTURE NOTES 5: HOMOMORPHISMS, ISOMORPHISMS, SUBGROUPS, QUOTIENT ( FACTOR ) GROUPS. ANDREW SALCH ABSTRACT ALGEBRA 1, LECTURE NOTES 5: HOMOMORPHISMS, ISOMORPHISMS, SUBGROUPS, QUOTIENT ( FACTOR ) GROUPS. ANDREW SALCH 1. Homomorphisms and isomorphisms between groups. Definition 1.1. Let G, H be groups.

More information

D-MATH Algebra I HS18 Prof. Rahul Pandharipande. Solution 1. Arithmetic, Zorn s Lemma.

D-MATH Algebra I HS18 Prof. Rahul Pandharipande. Solution 1. Arithmetic, Zorn s Lemma. D-MATH Algebra I HS18 Prof. Rahul Pandharipande Solution 1 Arithmetic, Zorn s Lemma. 1. (a) Using the Euclidean division, determine gcd(160, 399). (b) Find m 0, n 0 Z such that gcd(160, 399) = 160m 0 +

More information

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,

More information

ON GALOIS GROUPS OF ABELIAN EXTENSIONS OVER MAXIMAL CYCLOTOMIC FIELDS. Mamoru Asada. Introduction

ON GALOIS GROUPS OF ABELIAN EXTENSIONS OVER MAXIMAL CYCLOTOMIC FIELDS. Mamoru Asada. Introduction ON GALOIS GROUPS OF ABELIAN ETENSIONS OVER MAIMAL CYCLOTOMIC FIELDS Mamoru Asada Introduction Let k 0 be a finite algebraic number field in a fixed algebraic closure Ω and ζ n denote a primitive n-th root

More information

Lecture Notes, Week 6

Lecture Notes, Week 6 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Week 6 (rev. 3) Professor M. J. Fischer February 15 & 17, 2005 1 RSA Security Lecture Notes, Week 6 Several

More information

arxiv: v1 [math.nt] 18 Jul 2012

arxiv: v1 [math.nt] 18 Jul 2012 Some remarks on Euler s totient function arxiv:107.4446v1 [math.nt] 18 Jul 01 R.Coleman Laboratoire Jean Kuntzmann Université de Grenoble Abstract The image of Euler s totient function is composed of the

More information

An introduction to the algorithmic of p-adic numbers

An introduction to the algorithmic of p-adic numbers An introduction to the algorithmic of p-adic numbers David Lubicz 1 1 Universté de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France Outline Introduction 1 Introduction 2 3 4 5 6 7 8 When do we

More information

Chapter 4. Characters and Gauss sums. 4.1 Characters on finite abelian groups

Chapter 4. Characters and Gauss sums. 4.1 Characters on finite abelian groups Chapter 4 Characters and Gauss sums 4.1 Characters on finite abelian groups In what follows, abelian groups are multiplicatively written, and the unit element of an abelian group A is denoted by 1 or 1

More information

Lecture 14: Hardness Assumptions

Lecture 14: Hardness Assumptions CSE 594 : Modern Cryptography 03/23/2017 Lecture 14: Hardness Assumptions Instructor: Omkant Pandey Scribe: Hyungjoon Koo, Parkavi Sundaresan 1 Modular Arithmetic Let N and R be set of natural and real

More information

1, for s = σ + it where σ, t R and σ > 1

1, for s = σ + it where σ, t R and σ > 1 DIRICHLET L-FUNCTIONS AND DEDEKIND ζ-functions FRIMPONG A. BAIDOO Abstract. We begin by introducing Dirichlet L-functions which we use to prove Dirichlet s theorem on arithmetic progressions. From there,

More information

Math 120: Homework 6 Solutions

Math 120: Homework 6 Solutions Math 120: Homewor 6 Solutions November 18, 2018 Problem 4.4 # 2. Prove that if G is an abelian group of order pq, where p and q are distinct primes then G is cyclic. Solution. By Cauchy s theorem, G has

More information

Notes on p-divisible Groups

Notes on p-divisible Groups Notes on p-divisible Groups March 24, 2006 This is a note for the talk in STAGE in MIT. The content is basically following the paper [T]. 1 Preliminaries and Notations Notation 1.1. Let R be a complete

More information

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3...

Algebra Exam Fall Alexander J. Wertheim Last Updated: October 26, Groups Problem Problem Problem 3... Algebra Exam Fall 2006 Alexander J. Wertheim Last Updated: October 26, 2017 Contents 1 Groups 2 1.1 Problem 1..................................... 2 1.2 Problem 2..................................... 2

More information

Congruence of Integers

Congruence of Integers Congruence of Integers November 14, 2013 Week 11-12 1 Congruence of Integers Definition 1. Let m be a positive integer. For integers a and b, if m divides b a, we say that a is congruent to b modulo m,

More information

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4 MATH 25 CLASS 21 NOTES, NOV 7 2011 Contents 1. Groups: definition 1 2. Subgroups 2 3. Isomorphisms 4 1. Groups: definition Even though we have been learning number theory without using any other parts

More information

GROUP ACTIONS EMMANUEL KOWALSKI

GROUP ACTIONS EMMANUEL KOWALSKI GROUP ACTIONS EMMANUEL KOWALSKI Definition 1. Let G be a group and T a set. An action of G on T is a map a: G T T, that we denote a(g, t) = g t, such that (1) For all t T, we have e G t = t. (2) For all

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 15 2018 Review Hash functions Collision resistance Merkle-Damgaard

More information

Algebraic structures I

Algebraic structures I MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one

More information

Prime Numbers and Irrational Numbers

Prime Numbers and Irrational Numbers Chapter 4 Prime Numbers and Irrational Numbers Abstract The question of the existence of prime numbers in intervals is treated using the approximation of cardinal of the primes π(x) given by Lagrange.

More information

Higher Algebra Lecture Notes

Higher Algebra Lecture Notes Higher Algebra Lecture Notes October 2010 Gerald Höhn Department of Mathematics Kansas State University 138 Cardwell Hall Manhattan, KS 66506-2602 USA gerald@math.ksu.edu This are the notes for my lecture

More information

23.1. Proof of the fundamental theorem of homomorphisms (FTH). We start by recalling the statement of FTH introduced last time.

23.1. Proof of the fundamental theorem of homomorphisms (FTH). We start by recalling the statement of FTH introduced last time. 23. Quotient groups II 23.1. Proof of the fundamental theorem of homomorphisms (FTH). We start by recalling the statement of FTH introduced last time. Theorem (FTH). Let G, H be groups and ϕ : G H a homomorphism.

More information

Characters and triangle generation of the simple Mathieu group M 11

Characters and triangle generation of the simple Mathieu group M 11 SEMESTER PROJECT Characters and triangle generation of the simple Mathieu group M 11 Under the supervision of Prof. Donna Testerman Dr. Claude Marion Student: Mikaël Cavallin September 11, 2010 Contents

More information

Cosets, factor groups, direct products, homomorphisms, isomorphisms

Cosets, factor groups, direct products, homomorphisms, isomorphisms Cosets, factor groups, direct products, homomorphisms, isomorphisms Sergei Silvestrov Spring term 2011, Lecture 11 Contents of the lecture Cosets and the theorem of Lagrange. Direct products and finitely

More information

5: The Integers (An introduction to Number Theory)

5: The Integers (An introduction to Number Theory) c Oksana Shatalov, Spring 2017 1 5: The Integers (An introduction to Number Theory) The Well Ordering Principle: Every nonempty subset on Z + has a smallest element; that is, if S is a nonempty subset

More information

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary

More information

This theorem allows us to describe all integer solutions as follows:

This theorem allows us to describe all integer solutions as follows: On the Diophantine equation a 3 + b 3 + c 3 + d 3 = 0 by RACHEL GAR-EL and LEONID VASERSTEIN (University Park, PA) Introduction. The equation a 3 + b 3 + c 3 + d 3 = 0 (1) has been studied by many mathematicians

More information

Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields

Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields K. Guenda Faculty of Mathematics USTHB University of Sciences and Technology of Algiers B.P. 32 El Alia, Bab Ezzouar, Algiers, Algeria

More information

DONG QUAN NGOC NGUYEN

DONG QUAN NGOC NGUYEN REPRESENTATION OF UNITS IN CYCLOTOMIC FUNCTION FIELDS DONG QUAN NGOC NGUYEN Contents 1 Introduction 1 2 Some basic notions 3 21 The Galois group Gal(K /k) 3 22 Representation of integers in O, and the

More information

D-MATH Algebra I HS 2013 Prof. Brent Doran. Solution 3. Modular arithmetic, quotients, product groups

D-MATH Algebra I HS 2013 Prof. Brent Doran. Solution 3. Modular arithmetic, quotients, product groups D-MATH Algebra I HS 2013 Prof. Brent Doran Solution 3 Modular arithmetic, quotients, product groups 1. Show that the functions f = 1/x, g = (x 1)/x generate a group of functions, the law of composition

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

SF2729 GROUPS AND RINGS LECTURE NOTES

SF2729 GROUPS AND RINGS LECTURE NOTES SF2729 GROUPS AND RINGS LECTURE NOTES 2011-03-01 MATS BOIJ 6. THE SIXTH LECTURE - GROUP ACTIONS In the sixth lecture we study what happens when groups acts on sets. 1 Recall that we have already when looking

More information

Compartmented Threshold RSA Based on the Chinese Remainder Theorem

Compartmented Threshold RSA Based on the Chinese Remainder Theorem Compartmented Threshold RSA Based on the Chinese Remainder Theorem Sorin Iftene Department of Computer Science, Al. I. Cuza University, 700483 Iasi, Romania siftene@info.uaic.ro Manuela Grindei LSV, ENS

More information

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Math. J. Okayama Univ. 45 (2003), 29 36 ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Dedicated to emeritus professor Kazuo Kishimoto on his seventieth birthday Kaoru MOTOSE In this paper, using properties of

More information

Public Key Encryption

Public Key Encryption Public Key Encryption KG October 17, 2017 Contents 1 Introduction 1 2 Public Key Encryption 2 3 Schemes Based on Diffie-Hellman 3 3.1 ElGamal.................................... 5 4 RSA 7 4.1 Preliminaries.................................

More information

The group (Z/nZ) February 17, In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer.

The group (Z/nZ) February 17, In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer. The group (Z/nZ) February 17, 2016 1 Introduction In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer. If we factor n = p e 1 1 pe, where the p i s are distinct

More information

Computing a Lower Bound for the Canonical Height on Elliptic Curves over Q

Computing a Lower Bound for the Canonical Height on Elliptic Curves over Q Computing a Lower Bound for the Canonical Height on Elliptic Curves over Q John Cremona 1 and Samir Siksek 2 1 School of Mathematical Sciences, University of Nottingham, University Park, Nottingham NG7

More information

MATH 433 Applied Algebra Lecture 19: Subgroups (continued). Error-detecting and error-correcting codes.

MATH 433 Applied Algebra Lecture 19: Subgroups (continued). Error-detecting and error-correcting codes. MATH 433 Applied Algebra Lecture 19: Subgroups (continued). Error-detecting and error-correcting codes. Subgroups Definition. A group H is a called a subgroup of a group G if H is a subset of G and the

More information

CYCLES AND FIXED POINTS OF HAPPY FUNCTIONS

CYCLES AND FIXED POINTS OF HAPPY FUNCTIONS Journal of Combinatorics and Number Theory Volume 2, Issue 3, pp. 65-77 ISSN 1942-5600 c 2010 Nova Science Publishers, Inc. CYCLES AND FIXED POINTS OF HAPPY FUNCTIONS Kathryn Hargreaves and Samir Siksek

More information

Dirichlet Characters. Chapter 4

Dirichlet Characters. Chapter 4 Chapter 4 Dirichlet Characters In this chapter we develop a systematic theory for computing with Dirichlet characters, which are extremely important to computations with modular forms for (at least) two

More information

MATH 2200 Final Review

MATH 2200 Final Review MATH 00 Final Review Thomas Goller December 7, 01 1 Exam Format The final exam will consist of 8-10 proofs It will take place on Tuesday, December 11, from 10:30 AM - 1:30 PM, in the usual room Topics

More information

A. (Groups of order 8.) (a) Which of the five groups G (as specified in the question) have the following property: G has a normal subgroup N such that

A. (Groups of order 8.) (a) Which of the five groups G (as specified in the question) have the following property: G has a normal subgroup N such that MATH 402A - Solutions for the suggested problems. A. (Groups of order 8. (a Which of the five groups G (as specified in the question have the following property: G has a normal subgroup N such that N =

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

6 Cosets & Factor Groups

6 Cosets & Factor Groups 6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.

More information

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition).

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Bryan Félix Abril 12, 2017 Section 2.1 Exercise (6). Let G be an abelian group. Prove that T = {g G g < } is a subgroup of G.

More information

THERE ARE NO ELLIPTIC CURVES DEFINED OVER Q WITH POINTS OF ORDER 11

THERE ARE NO ELLIPTIC CURVES DEFINED OVER Q WITH POINTS OF ORDER 11 THERE ARE NO ELLIPTIC CURVES DEFINED OVER Q WITH POINTS OF ORDER 11 ALLAN LACY 1. Introduction If E is an elliptic curve over Q, the set of rational points E(Q), form a group of finite type (Mordell-Weil

More information

A note on López-Dahab coordinates

A note on López-Dahab coordinates A note on López-Dahab coordinates Tanja Lange Faculty of Mathematics, Matematiktorvet - Building 303, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark tanja@hyperelliptic.org Abstract López-Dahab

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Twists of elliptic curves of rank at least four

Twists of elliptic curves of rank at least four 1 Twists of elliptic curves of rank at least four K. Rubin 1 Department of Mathematics, University of California at Irvine, Irvine, CA 92697, USA A. Silverberg 2 Department of Mathematics, University of

More information