reader is comfortable with the meaning of expressions such as # g, f (g) >, and their

Size: px
Start display at page:

Download "reader is comfortable with the meaning of expressions such as # g, f (g) >, and their"

Transcription

1 The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin Introduction: The general Hidden Subgroup Problem is as follos. Let G be a knon finite group. Let H be an unknon subgroup of G. Suppose there is a set S and a function f : G S such that for g, k ε G, f(g) = f(k) if and only if g and k are in the same coset of H. (We say f separates cosets.) The question is to find a method of using f to determining hat H is, significantly faster than naïve methods. The most naïve method is to compare every f(g) to f(identity). Then g ill be in H exactly hen equality holds. Of course, standard facts about group theory, such as LaGrange s theorem, can clearly be used to speed that up somehat, but not really significantly. These notes outline ho quantum computations can be used to attack the problem in the case that G is Abelian. Later, e ill discuss Kiteav s reduction of the discrete log problem to the Abelian hidden subgroup problem. We ill also discuss the oft made statement that the factorization problem is a special case of the Abelian hidden subgroup problem, seeing that it is true if e modify our definition slightly. Of the fe quantum algorithm s I have learned, the one discussed here is the easiest, and so ould be a good place for a beginner to start. Hoever, for a true beginner, I ould strongly recommend first reading section 2 of [M], hich gives a general introduction to the physics and notation relevant to quantum computing. If one follos that by then reading this, and then reading the rest of [M], and finally reading [M3] (the most elaborate quantum algorithm I kno), the reader ill have learned everything I kno about the subject (and ill no doubt realize ho little that is). These notes are not complete. They present the parts that I find prettiest, namely, a revie of group characters, the group Fourier transform, and the actual quantum computation. They do not discuss the efficiency of the method. These notes are adapted from [L], hich discusses the details missing here, and also discusses hat progress has been made on the non-abelian case. Our computations ill on the complex inner-product space having the set of symbols { g, s> g ε G, s ε S} as an orthonormal bases. The inner product ill be the standard one. Recall, a unit vector in such an inner product space is called a state, and (mathematical) states accurately represent actual (physical) states of a collection of qubits. (We ill assume the reader is comfortable ith the meaning of expressions such as # g, f (g) >, and their relation to physical reality.)

2 BRIEF OUTLINE (details later): Let G be Abelian. Group character theory defines a subgroup H " that is determined by H. If H is knon, H " can be found. Of course, e do not kno H. Hoever, the quantum computations e ill present allo us to find H " directly. Knoing H ", e can then find H " ". We ill prove that H " " = H, and so be done. Well, actually, it is a bit more complicated. Each run of the computer ill be guarantied to produce an element of H ", all possibilities being equally likely to appear. We must collect a set of such elements, and hope that they constitute a generating set for H ". If so, using them, e can find H. (See [L] for discussions of the efficiency of finding a generating set for H ", and a method of using such to find H.) Of course, e need matters to be in a computational form. For instance, e ill assume G = Z N Z N2 Z N (recalling that any finite Abelian group is isomorphic to such). That allos us to use a register in the computer to input an element g of G, using the standard base 2 method. (Example: If (3 mod 5, mod 4) ε Z 5 Z 4, that element could be expressed as (0,,, 0 ), the first 0 representing 3, and the last 0 representing, here the first part has three places, since > 2 2. What this does is encode Z 5 Z 4 as a subset of Z ) We ill also assume a second register of the computer can be used to deal ith f(g), hich means e need to be able to (efficiently) identify S ith a subset of Z 2 s, for some s. (If, say s = 3, and G = Z 5 Z 4, e ould need qubits in our computer.) Finally, e must assume the function f can be efficiently computed. Our computer ill have to registers, the first dealing ith the g ε G, the second dealing ith the s ε S. Our computer program ill involve three steps. Near the end of section 2 of [M], it is shon that there is a quantum gate that converts # g,0 > to # g, f (g) >. Therefore, that conversion is an alloable quantum calculation, and is the middle one of our three steps. It is the only one of the three that deals ith both registers simultaneously. The first and last steps in our program only deal ith the first register. Actually, both those steps are the same, namely, applying the group Fourier transform. In order to introduce that transform, e must first remind the reader of the theory of (irreducible) characters of a finite Abelian group. (The knoledgeable reader can skip ahead.) Definition: An irreducible character of the Abelian group G is a homomorphism from G to the multiplicative group of nonzero complex numbers. (Whenever e use the ord character, it ill be understood to refer to an irreducible character of G.) G ill denote the set of all such characters. G is easily made into a group. The identity is the character that sends each element of G to. The inverse of χ sends g to the inverse of χ(g). The operation is function multiplication. 2

3 Since G is a group under addition, if χ is a character and g, h ε G, then χ(g + h) = χ(g)χ(h). Thus, for n an integer, e have χ(ng) = (χ(g)) n. If it happens that ng = 0, then = χ(0) = χ(ng) = (χ(g)) n, and so χ(g) is an n-th root of unity. (In particular, χ(g) is an n-th root of unity for n the order of g.) Notation: We have G = Z N Z N2 Z N. For a = (a, a 2,, a ) and b = (b, b 2, b ) in G (and treating the a j and b j as integers beteen 0 and N j ), define χ a (b) to be " exp(2πia j b j /N j ). j= (A) Lemma: The map a χ a is a group isomorphism beteen G and G. Proof: It is straightforard to see that χ a is a character. No let χ be any character. For j, let B j ε G be the -tuple consisting entirely of zeros except for the j-th position in hich there is a. No N j B j = 0, and so χ(b j ), being an N j -th root of unity, has the form exp(2πia j /N j ) for some integer a j beteen 0 and N j. Since (b, b 2,, b ) = b B + b 2 B b B W, e easily see that χ = χ a, for a = (a, a 2,, a ). Thus G = {χ a a ε G}, and so our map is onto. Furthermore, it is easily verified that it is a group homomorphism. No if χ a is the identity of G, then χ a (B j ) =. As it also equals exp(2πia j /N j ), e must have N j a j, so that a j is the zero of Z Nj. As that holds for j, e must have a = 0 in G. We therefore see that the kernel of our map is {0}, and e are done. (B) Lemma: χ a (b) = χ b (a). Also, χ -a (b) = " a (b) (ith the overbar denoting complex conjugation). Proof: The first statement is immediate from the definition. As for the second, χ -a (b) = " exp(-2πia j b j /N j ) = # exp(2"ia j b j /N j ) = " a (b). j= j= (C) Lemma: Let a,c ε G. Then $ " a (b)" c (b) equals 0 unless a = c, in hich case it equals G. b#g Proof: $ " a (b)" c (b) = # ((" exp(2πia j b j /N j ))( exp(2"ic j b j /N j b#g b"g j= j= # )) = # ((" exp(2πia j b j /N j ))( " exp(-2πic j b j /N j )). Letting d j = a j c j, that becomes b"g j= j= 3

4 # (( b"g " exp(2πid j /N j )) b j) = j= # b "Z N # b 2 "Z N2 # (( b "Z N j= " exp(2πid j /N j )) b j) = " ( j= # (exp(2πid j /N j ) b j). If N j divides d j, then b j "Z N j # (exp(2πid j /N j ) b j = N j. Otherise, it is a b j "Z N j geometric series summing to " (exp(2#id j /N j ))N j " exp(2#id j /N j ), hich equals 0, since the numerator is 0 but the denominator is not. Therefore, $ " a (b)" c (b) = 0 unless N j divides d j for j, in hich case it equals d j for j, exactly hen a = c. b#g " N j = G. Hoever, since d j = a j c j is in Z N j, e see that N j divides j= Remark: (C) is called the first orthogonality relation, and holds for the irreducible characters of non-abelian groups as ell. Since the definition of an irreducible character is harder for the non-abelian case, the proof is somehat harder. See [I, Chapter 2]. (D) Corollary: $ " a (b) equals 0 unless a = 0, in hich case it equals G. b#g Proof: This is just the special case of (C) in hich c = 0 (since χ 0 is identically ). We previously mentioned that the first and last steps of our program ill be an application of the group Fourier transform to the first register (that register being used to deal ith states hich are linear combinations of basic states k> for k ε G). Notation: Let H(G) be the complex inner-product space having the set of symbols { k> k ε G} as an orthonormal bases. Definition: The Fourier transform of G is the operator on H(G) hich takes the basis element k> to $ " g (k) g >. g#g 4

5 (E) Lemma: F is a unitary operator (and so applying it constitutes an alloable quantum computation). Proof: We must sho that {F( k>) k ε G} is an orthonormal bases of H(G). For k, h ε G, the inner product of f( h>) and f( k>) is $ " g (k)" g (h) = (by (B)) $ " k (g)" h (g). g#g By (C), that is 0 unless h = k, in hich case it is. The lemma follos (linear independence using a standard argument). g#g The next lemma is not strictly required, but is of interest. (F) Lemma: For k ε G, F(F( k>)) = -k>. Proof: F(F( k>)) = $ " g (k)f( g > ) = g#g $ " g (k)[ g#g %" #h (g) #h > ] = #h$g %[%" g (k)" #h (g))] #h > = (using (B)) #h$g g$g %[%" k (g)" h (g)] #h > = -k> (using (C)). #h$g g$g Our brief outline said that e ill find H by first finding H ". We revie that subgroup. Definition: Let H be a subgroup of G. Then H " = {g ε G χ g (h) = for all h ε H} = Ker χ h over all h ε H. (The last equality, by (B), makes it clear that H " is a subgroup of G). (G) Lemma: H " = G/H. Proof: We ill sho more than hat is stated, but e only need the statement. If g ε H ", then clearly H Ker χ g. Therefore, the map γ g defined on G/H by γ g (a + H) = χ g (a) is ell defined. No γ g is easily seen to be a homomorphism into the multiplicative group of nonzero complex numbers. That is, it is a character of G/H. Therefore, the map Γ sending g ε H " to γ g is a map from H " to G /H. 5

6 We claim Γ is a homomorphism. For g, k ε H ", Γ(g + k) = γ g+k sends a + H to χ g+k (a) = χ g (a)χ k (a), and so does Γ(g)Γ(k). We claim that Γ is one-to-one. Suppose g ε H " is in the kernel of Γ. Then for all a + H, e have χ g (a) = γ g (a + H) =. This is true for all a ε G, and so χ g = χ 0. By (A), g = 0. We claim that Γ is onto. Pick some γ ε G /H. Define χ on G by saying χ(a) = γ(a + H). Clearly χ is a character of G, and so χ = χ g for some g ε G. Hoever, clearly H Ker χ, and so g ε H ". Thus γ = γ g = Γ(g). We no see that Γ is an isomorphism. In particular, H " = G /H. Hoever, by (A), e already kno G /H = G/H, and so e are done. Notation: For H a subgroup of G, let H> = # h > (hich is a state). (H) Lemma: If H is a subgroup of G, then F( H>) = H " >. Proof: F( H>) = # F( h > ) = # [ $ " t (h) t > ] = t#g t"g # ( " t (h) h#h $ ) t>. No χ t is a character of G. Hoever, hen restricted to H, it is obviously also a character of H. Therefore, by (D), $ " t (h) is 0 unless χ t restricted to H is identically, in hich case that sum equals H. Hoever, χ t restricted to H is identically exactly hen t is in H. Therefore, e have h#h F( H>) = $ H t> = (using G) t"h # H " $ t > = H " >. t"h # We give to proofs of the next corollary. (I) Corollary: If H is a subgroup of G, then H " " = H. Proof #: The definition of H " shos H H " ". By to applications of (G), e have H " " = G / H " = G /( G / H ) = H. Proof #2: By (H), F(F( H>)) = H " " > = H "" $ k >. Hoever, by (F), e also have k"h ## 6

7 F(F(H)) = # F(F( h > )) = $ "h > = h#h # h >. Since all the k> and h> are part of the same bases of our vector space H(G), the equality of these to linear combinations implies they are identical, and e are done. Notation: For t ε G, let τ t be the operator hich sends the basis element g> to t+g>. (Clearly that operator permutes the canonical orthonormal basis elements of H(G), and so is unitary.) Also, let φ t be the operator hich multiplies the basis element g> of H(G) by χ g (t). (As the norm of χ g (t) is, this operator is also unitary.) Finally, let T be a transversal for the subgroup H of G (i.e., T is a set of coset representatives). (J) Lemma: For t ε G, e have Fτ t = φ t F. Proof: One can easily verify that both sides send the basis vector g> of H(G) to $ " k (t + g) k >, (using that χ k (t) χ k (g) = χ k (t+g)). k#g We are no ready to beginning shoing ho to program the computer to produce equally likely random elements of H ". (K) The Program: We begin ith the computer in the state 0,0>. We then apply F to the first register, hich is easily seen to result in the state # g,0 >. As explained earlier, there is a quantum gate that converts the above state to the state # g, f (g) >. Since f separates cosets, e kno that for t ε T and h ε H, f(t + h) = f(t). Therefore, (using that G = T H ) our previous state can be ritten as # ( # t + h >) f (t) > = t"t # ( # $ ( h >)) f (t) > = t t"t # (τ t ( t"t # h > )) f(t)> = # (τ t ( H>)) f(t)>. We next apply F to t"t 7

8 the first register. Using (J), e see the result is # (φ t F( H>)) f(t)>, hich by (H) equals t"t # (φ t ( H " >)) f(t)> = # (φ t ( $ k > )) f(t)>. Using the definition of φ t and t"t t"t H " the fact that (G) shos H " = T, this last state equals k#h " # ( %" k (t) k > ) f(t)> = t"t %" k (t) k, f (t) >. At this point, let us mention that since f separates cosets, f takes t#t,k#h $ distinct values on distinct members of T. Thus, the various k, f(t)> are H " T = T 2 distinct states. Since the norm of χ k (t) is, if %" k (t) k, f (t) > is read, all of the states t#t,k#h $ k, f(t)> (ith k ε H ", t ε T) have an equally likely chance (namely / T 2 ) of appearing. Also, any such k appears in exactly T such states, and so each k ε H " has a chance of exactly / T of being read from the first register. Therefore, e produce a random element of H ", all equally likely. k#h $ Remark: There is a subtlety in the above mathematics that might be overlooked. Let us illuminate it. At the second step, e ent from the state # g,0 > to the state # g, f (g) >. Superficially, that appears to leave the first register unaffected. Hoever, the step actually has a profound affect on the first register, since it entangles it ith the second register. If one reads the second register of # g,0 >, one ill assuredly get 0, and the first register ill remain in the state # g >. Hoever, if one reads the second register of # g, f (g) >, one ill get some choice of f(g). Suppose g is in the coset t + H (ith t ε T). Then by entanglement, the first register ill be in the state # g >. Our process had three steps, the first and last being the application of F to the first register. We are discussing the middle step. Suppose it as left out. Then e ould merely start ith 0, 0>, and apply F tice to the first register. By (F), e ould end up back at 0, 0>. It is the middle step, the entangling step, hich orks the magic. (Entanglement is thoroughly examined in [M4], and perhaps too thoroughly in [M2].) g"t + H 8

9 The rest of the procedure consists of repeating (K) many times, each time getting a random element of H ". No [L, Theorem D, appendix D] states that if n + " log K #elements are chosen at random from a finite group K, then the probability they generate K exceeds /2 n. We ish to apply that to K = H ". Hoever, not knoing H ", e instead use n + " log #. For adequately large n, e ill almost certainly have a generating set for H ". Next, [L, p. 23] shos ho to use that generating set to successively find random elements of H. Again, e take n + log " # of them, since e do not kno H. DISCRETE LOG PROBLEM: Let p be prime, and let b be a primitive root for p. Given x, it is easy to find c such that c b x mod p. Hoever, given c it is very hard to find x ith b x c mod p. That is called the discrete log problem. The x b x mod p function is an example of a one-ay function, and such functions are prime candidates for use in cryptography. Indeed, El Gamel encryption makes use of the difficulty of finding x given c. In [S], along ith his famous quantum factorization algorithm, Shor gives a lesser mentioned but equally interesting quantum algorithm for solving the discrete log problem. (It is also exhibited in [M].) Here, e give a solution to the discrete log problem due to Kiteav [K]. It is accomplished by converting the discrete log problem into an Abelian hidden subgroup problem. (L) Let b be a primitive root of the prime p and suppose p does not divide c. We ish to find x ith b x c mod p. Let G = Z p- " Z p-. Let f be the function from G to S = U p, the multiplicative group of units mod p, defined by f(u, v) = b u c v mod p. No f is easily seen to be a group homomorphism from G to U p, and its kernel is H = { (u, v ) f(u, v) = mod p}. One easily sees that f separates cosets of H, the hidden subgroup e seek. Suppose an element (u, v) of H has been found. Then since b x " c mod p, e have " b u c v " b u+vx mod p. As b is a primitive root for p, e have u + vx " 0 mod p -. For each choice of v in {0,, 2,, p 2}, there is one choice of u making that congruence true. Many of the v in that set are relatively prime to p. Assuming that is so for our v, e see x " -uv - mod p, and e are done. (Note that e did not need to find a generating set for H. Finding v - from v is easy via the Euclidean algorithm.) Remark: Applying the Abelian hidden subgroup algorithm to Z p- " Z p- ould require using the Fourier transform of that group. I do not kno ho efficient that is, nor am I interested enough to try to learn. A more interested reader can find some discussion of such matters in [L]. FACTORING: One often sees claims that factorization can be reduced to the Abelian hidden subgroup problem. That appears to be correct under a eaker version of the hidden subgroup problem, as e no discuss. Suppose e ish to factor n (not a prime poer). An incorrect approach ould be to say that e can rite n = kh ith GCD(k, h) =. Thus Z n Z k Z h, and e ish to find the hidden subgroup Z k 0 of Z n. The problem here is that e do not have any coset separating f. Without the additional information given by f, our task is exactly as hard as finding a factor of n. 9

10 We must find an approach that incorporates some useful f. Pick a random b ith < b < n, and use the Euclidean algorithm to quickly find GCD(b, n). If the GCD exceeds, it is a non-trivial factor of n. The more likely case is that GCD equals. If so, let r (unknon) be the order of b mod n in the group of units of Z n. Since r divides φ(n), let H = {0, r, 2r,, (φ(n)/r )r} Z φ(n) = G. H is our hidden subgroup. Is there an f? Yes! For x Z φ(n), let f(x) = b x mod n. We then have f(x) = f(y) IFF b x b y mod n IFF r x y IFF x and y are in the same coset of H. Suppose e could find H. Actually, e do not have to find all of H; a fe random elements of H ill probably suffice to factor n, as e no explain. First of all, e hope that r is even. If the process e are about to explain fails to factor n ithin a fairly small number of tries, e can guess that for the b e selected, r is probably odd. In that case, e ill pick a ne b, and try again. (Exercise: Sho that at least half of all b have an even r. Consider n as a product of prime poers, and use that prime poers have primitive roots.) Assuming r is even, suppose e have managed to find some h in H. Then h = rk ith 0 k φ(n)/r. Claim: There is a good chance that GCD(b h/2, n) is a non-trivial factor of n. If k is even, then r h/2, and e easily see that GCD equals n, and e fail. Hoever, if k is odd, then r does not divide h/2, and so e kno that b h/2 is not congruent to mod n. Thus GCD(b h/2, n) < n. Therefore, e must sho there is a good chance that GCD is bigger than. No b h/2 = (b r/2 ) k has b r/2 as a factor. Thus, it ill suffice to sho there is a good chance that GCD(b r/2, n) >. In fact, the ell-knon exponential factorization method (see [M, section ] or many textbooks) shos the chance of that last GCD being greater than is at least ½. Within a fe tries for b and h, e should be able to factor n. Hoever, e cannot use the Abelian hidden subgroup algorithm described above to find elements of H. That algorithm assumes that G is knon. Our G = Z φ(n) is not knon. We do not kno φ(n). What e have is a variant of the hidden subgroup problem (as defined at the start of this paper). We have an unknon G, and unknon H, and a knon f. EXAMPLE: Suppose e do not kno the factorization of 2, but are told by an oracle that φ(2) = 2. Since GCD(2, 2) =, e try letting b = 2. We kno that the order of 2 mod 2 (= r, unknon) ill divide 2, and so the multiples of r (taken mod 2) ill constitute a hidden subgroup H of Z 2. We also kno the function f(x) = 2 x mod 2 is a coset separating function for H. (Note that f(5) =, since 2 5 mod 2.) Thus, the algorithm given above can be used to find H. Notice that at the end of the second step of the algorithm (the entangling step), the computer ill be in the state ( 0, > +, 2> + 2, 4> + 3, 8> + 4, 6> + 5, > 2 + 6, > + 7, 2> + 8, 4> + 9, 8> + 0, 6> +, >). (Notice the to cycles of second entries, each of length 6.) With a small amount of luck, the algorithm ould soon tell us that H = {0, 6}, from hich e ould learn that the order of r is 6. No using the exponential factorization 0

11 technique, e cross our fingers and find GCD(2 6/2, 2). It is 7, and so e have found a factor of 2. REMARK: In the special case here n = pq is the product of to distinct primes, since n - ϕ(n) + = p + q, if e kno ϕ(n), e ould have pq and p + q, and so could easily factor n. But hat if the oracle is closed for remodeling, and e do not kno hat φ(2) equals? Shor s famous algorithm ([S], [M]) deals ith that problem. Since 2 9 = 52 is the first poer of 2 larger than 2 2, it orks ith Z 52. (That modulus is manageably small, yet big enough to give a high probability of success to Shor s method.) We also use the function f(x) = 2 x mod 2, but no for all x in Z 52. Hoever, f is not a coset separating function. We sa above that f gives cycles of length 6, and so ere it a coset separating function, there ould have to be 6 cosets, so that the subgroup they came from ould have to have size 52/6 = /6. But that is not an integer. Instead, one step of Shor s algorithm has the computer in the state (/ 52 )[ 0, > +, 2> + 2, 4> + 3, 8> + 4, 6> + 5, > + 6, > + 7, 2> + 8, 4> + 9, 8> + 0, 6> +, > + 2, > + 3, 2> + 4, 4> + 5, 8> + 6, 6> + 7, > , > + 505, 2> + 506, 4> + 507, 8> + 508, 6> + 509, > + 50, > + 5, 2>]. (There are 85 complete cycles, and 2/6 of another cycle.) Suppose e no read the second register, and get (for example) 2. That means the first register goes into the state (/ 86 )[ > + 7> + 3> > + 5>] = 84 (/ 86 )" 6i + >. (We hope to find the 6 = r.) Shor then applies a Fourier transform, i= 0 and ends ith a state having the property that hen read, has a good chance of producing a number t such that t/52 is a good approximation to a number of the form k/r. The theory of continued fractions allos us to find r, (ith luck, the right r). We apply exponential factorization ith r. If e fail to factor 2, e kno e got the rong r. With luck, a fe tries gives us the right r, namely 6. Remark: It has been said that Shor s algorithm is a special case of the hidden subgroup problem. Although there are similarities, perhaps it ould be better to say both are examples of hidden cycle problems. In [K], Kiteav introduces a ne idea, hich gives an alternate factorization algorithm, ith some similarities to Shor s. (See [M3].) Hoever, there are aspects of [K] that I do not yet understand.

12 REFERENCES [I] I. M. Isaacs, Character theory of finite groups, Dover Publications, inc. [K] A. Y. Kiteav, Quantum measurements and the Abelian stabilizer problem, arxiv:quant-ph/95026v, November 20, 995 [L] C. Lomont, The hidden subgroup problem revie and open problems, raxiv:quant-ph/04037v, November 4, 2004 [M] S. McAdam, Shor s algorithms,.ma.utexas.edu/users/mcadam [M2] S. McAdam, Entanglement,.ma.utexas.edu/users/mcadam [M3] S. McAdam, Eigenvalues and Kiteav s factoring algorithm,.ma.utexas.edu/users/mcadam [M4] S. McAdam, Unkonoable Matters, American Mathematical Monthly, 9 (4) 202, [S] P. Shor, Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer, available at xxx.lanl.gov/abs/quant-ph/

An Analog Analogue of a Digital Quantum Computation

An Analog Analogue of a Digital Quantum Computation An Analog Analogue of a Digital Quantum Computation arxiv:quant-ph/9612026v1 6 Dec 1996 Edard Farhi Center for Theoretical Physics Massachusetts Institute of Technology Cambridge, MA 02139 Sam Gutmann

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Groups and Symmetries

Groups and Symmetries Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

CYCLICITY OF (Z/(p))

CYCLICITY OF (Z/(p)) CYCLICITY OF (Z/(p)) KEITH CONRAD 1. Introduction For each prime p, the group (Z/(p)) is cyclic. We will give seven proofs of this fundamental result. A common feature of the proofs that (Z/(p)) is cyclic

More information

CONSEQUENCES OF THE SYLOW THEOREMS

CONSEQUENCES OF THE SYLOW THEOREMS CONSEQUENCES OF THE SYLOW THEOREMS KEITH CONRAD For a group theorist, Sylow s Theorem is such a basic tool, and so fundamental, that it is used almost without thinking, like breathing. Geoff Robinson 1.

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

ABSTRACT ALGEBRA 1, LECTURES NOTES 5: SUBGROUPS, CONJUGACY, NORMALITY, QUOTIENT GROUPS, AND EXTENSIONS.

ABSTRACT ALGEBRA 1, LECTURES NOTES 5: SUBGROUPS, CONJUGACY, NORMALITY, QUOTIENT GROUPS, AND EXTENSIONS. ABSTRACT ALGEBRA 1, LECTURES NOTES 5: SUBGROUPS, CONJUGACY, NORMALITY, QUOTIENT GROUPS, AND EXTENSIONS. ANDREW SALCH 1. Subgroups, conjugacy, normality. I think you already know what a subgroup is: Definition

More information

Shor Factorization Algorithm

Shor Factorization Algorithm qitd52 Shor Factorization Algorithm Robert B. Griffiths Version of 7 March 202 References: Mermin = N. D. Mermin, Quantum Computer Science (Cambridge University Press, 2007), Ch. 3 QCQI = M. A. Nielsen

More information

Dirichlet s Theorem. Martin Orr. August 21, The aim of this article is to prove Dirichlet s theorem on primes in arithmetic progressions:

Dirichlet s Theorem. Martin Orr. August 21, The aim of this article is to prove Dirichlet s theorem on primes in arithmetic progressions: Dirichlet s Theorem Martin Orr August 1, 009 1 Introduction The aim of this article is to prove Dirichlet s theorem on primes in arithmetic progressions: Theorem 1.1. If m, a N are coprime, then there

More information

ORDERS OF ELEMENTS IN A GROUP

ORDERS OF ELEMENTS IN A GROUP ORDERS OF ELEMENTS IN A GROUP KEITH CONRAD 1. Introduction Let G be a group and g G. We say g has finite order if g n = e for some positive integer n. For example, 1 and i have finite order in C, since

More information

Chapter 4. Characters and Gauss sums. 4.1 Characters on finite abelian groups

Chapter 4. Characters and Gauss sums. 4.1 Characters on finite abelian groups Chapter 4 Characters and Gauss sums 4.1 Characters on finite abelian groups In what follows, abelian groups are multiplicatively written, and the unit element of an abelian group A is denoted by 1 or 1

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

Name: Solutions Final Exam

Name: Solutions Final Exam Instructions. Answer each of the questions on your own paper. Be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] All of

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

Representation Theory. Ricky Roy Math 434 University of Puget Sound

Representation Theory. Ricky Roy Math 434 University of Puget Sound Representation Theory Ricky Roy Math 434 University of Puget Sound May 2, 2010 Introduction In our study of group theory, we set out to classify all distinct groups of a given order up to isomorphism.

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION

ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION PAVEL RŮŽIČKA 9.1. Congruence modulo n. Let us have a closer look at a particular example of a congruence relation on

More information

MATH 326: RINGS AND MODULES STEFAN GILLE

MATH 326: RINGS AND MODULES STEFAN GILLE MATH 326: RINGS AND MODULES STEFAN GILLE 1 2 STEFAN GILLE 1. Rings We recall first the definition of a group. 1.1. Definition. Let G be a non empty set. The set G is called a group if there is a map called

More information

Teddy Einstein Math 4320

Teddy Einstein Math 4320 Teddy Einstein Math 4320 HW4 Solutions Problem 1: 2.92 An automorphism of a group G is an isomorphism G G. i. Prove that Aut G is a group under composition. Proof. Let f, g Aut G. Then f g is a bijective

More information

PRACTICE FINAL MATH , MIT, SPRING 13. You have three hours. This test is closed book, closed notes, no calculators.

PRACTICE FINAL MATH , MIT, SPRING 13. You have three hours. This test is closed book, closed notes, no calculators. PRACTICE FINAL MATH 18.703, MIT, SPRING 13 You have three hours. This test is closed book, closed notes, no calculators. There are 11 problems, and the total number of points is 180. Show all your work.

More information

Ma/CS 6a Class 4: Primality Testing

Ma/CS 6a Class 4: Primality Testing Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Reminder: Euler s Totient Function Euler s totient φ(n) is defined as follows: Given n N, then φ n = x 1 x < n and GCD x, n = 1. In more words: φ n is

More information

Some practice problems for midterm 2

Some practice problems for midterm 2 Some practice problems for midterm 2 Kiumars Kaveh November 14, 2011 Problem: Let Z = {a G ax = xa, x G} be the center of a group G. Prove that Z is a normal subgroup of G. Solution: First we prove Z is

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

Solutions to odd-numbered exercises Peter J. Cameron, Introduction to Algebra, Chapter 3

Solutions to odd-numbered exercises Peter J. Cameron, Introduction to Algebra, Chapter 3 Solutions to odd-numbered exercises Peter J. Cameron, Introduction to Algebra, Chapter 3 3. (a) Yes; (b) No; (c) No; (d) No; (e) Yes; (f) Yes; (g) Yes; (h) No; (i) Yes. Comments: (a) is the additive group

More information

THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - FALL SESSION ADVANCED ALGEBRA I.

THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - FALL SESSION ADVANCED ALGEBRA I. THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - FALL SESSION 2006 110.401 - ADVANCED ALGEBRA I. Examiner: Professor C. Consani Duration: take home final. No calculators allowed.

More information

QIP Note: On the Quantum Fourier Transform and Applications

QIP Note: On the Quantum Fourier Transform and Applications QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period

More information

Math 306 Topics in Algebra, Spring 2013 Homework 7 Solutions

Math 306 Topics in Algebra, Spring 2013 Homework 7 Solutions Math 306 Topics in Algebra, Spring 203 Homework 7 Solutions () (5 pts) Let G be a finite group. Show that the function defines an inner product on C[G]. We have Also Lastly, we have C[G] C[G] C c f + c

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006 1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ

More information

Lecture 11: Number Theoretic Assumptions

Lecture 11: Number Theoretic Assumptions CS 6903 Modern Cryptography April 24, 2008 Lecture 11: Number Theoretic Assumptions Instructor: Nitesh Saxena Scribe: Robert W.H. Fisher 1 General 1.1 Administrative Homework 3 now posted on course website.

More information

Primes in arithmetic progressions

Primes in arithmetic progressions (September 26, 205) Primes in arithmetic progressions Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/mfms/notes 205-6/06 Dirichlet.pdf].

More information

Lecture 8: Finite fields

Lecture 8: Finite fields Lecture 8: Finite fields Rajat Mittal IIT Kanpur We have learnt about groups, rings, integral domains and fields till now. Fields have the maximum required properties and hence many nice theorems can be

More information

Quizzes for Math 401

Quizzes for Math 401 Quizzes for Math 401 QUIZ 1. a) Let a,b be integers such that λa+µb = 1 for some inetegrs λ,µ. Prove that gcd(a,b) = 1. b) Use Euclid s algorithm to compute gcd(803, 154) and find integers λ,µ such that

More information

CHARACTERS OF FINITE ABELIAN GROUPS (SHORT VERSION)

CHARACTERS OF FINITE ABELIAN GROUPS (SHORT VERSION) CHARACTERS OF FINITE ABELIAN GROUPS (SHORT VERSION) KEITH CONRAD 1. Introduction The theme we will study is an analogue on finite abelian groups of Fourier analysis on R. A Fourier series on the real line

More information

Chapter 3. Rings. The basic commutative rings in mathematics are the integers Z, the. Examples

Chapter 3. Rings. The basic commutative rings in mathematics are the integers Z, the. Examples Chapter 3 Rings Rings are additive abelian groups with a second operation called multiplication. The connection between the two operations is provided by the distributive law. Assuming the results of Chapter

More information

Cosets and Lagrange s theorem

Cosets and Lagrange s theorem Cosets and Lagrange s theorem These are notes on cosets and Lagrange s theorem some of which may already have been lecturer. There are some questions for you included in the text. You should write the

More information

Lecture 15: The Hidden Subgroup Problem

Lecture 15: The Hidden Subgroup Problem CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry

More information

5 Group theory. 5.1 Binary operations

5 Group theory. 5.1 Binary operations 5 Group theory This section is an introduction to abstract algebra. This is a very useful and important subject for those of you who will continue to study pure mathematics. 5.1 Binary operations 5.1.1

More information

A PROOF OF BURNSIDE S p a q b THEOREM

A PROOF OF BURNSIDE S p a q b THEOREM A PROOF OF BURNSIDE S p a q b THEOREM OBOB Abstract. We prove that if p and q are prime, then any group of order p a q b is solvable. Throughout this note, denote by A the set of algebraic numbers. We

More information

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing

More information

Math 249B. Geometric Bruhat decomposition

Math 249B. Geometric Bruhat decomposition Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique

More information

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is

More information

its image and kernel. A subgroup of a group G is a non-empty subset K of G such that k 1 k 1

its image and kernel. A subgroup of a group G is a non-empty subset K of G such that k 1 k 1 10 Chapter 1 Groups 1.1 Isomorphism theorems Throughout the chapter, we ll be studying the category of groups. Let G, H be groups. Recall that a homomorphism f : G H means a function such that f(g 1 g

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin

Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Abstract: We offer a proof of quadratic reciprocity that arises

More information

Graph isomorphism, the hidden subgroup problem and identifying quantum states

Graph isomorphism, the hidden subgroup problem and identifying quantum states 1 Graph isomorphism, the hidden subgroup problem and identifying quantum states Pranab Sen NEC Laboratories America, Princeton, NJ, U.S.A. Joint work with Sean Hallgren and Martin Rötteler. Quant-ph 0511148:

More information

be any ring homomorphism and let s S be any element of S. Then there is a unique ring homomorphism

be any ring homomorphism and let s S be any element of S. Then there is a unique ring homomorphism 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UFD. Therefore

More information

Factorization in Polynomial Rings

Factorization in Polynomial Rings Factorization in Polynomial Rings Throughout these notes, F denotes a field. 1 Long division with remainder We begin with some basic definitions. Definition 1.1. Let f, g F [x]. We say that f divides g,

More information

MA554 Assessment 1 Cosets and Lagrange s theorem

MA554 Assessment 1 Cosets and Lagrange s theorem MA554 Assessment 1 Cosets and Lagrange s theorem These are notes on cosets and Lagrange s theorem; they go over some material from the lectures again, and they have some new material it is all examinable,

More information

Stab(t) = {h G h t = t} = {h G h (g s) = g s} = {h G (g 1 hg) s = s} = g{k G k s = s} g 1 = g Stab(s)g 1.

Stab(t) = {h G h t = t} = {h G h (g s) = g s} = {h G (g 1 hg) s = s} = g{k G k s = s} g 1 = g Stab(s)g 1. 1. Group Theory II In this section we consider groups operating on sets. This is not particularly new. For example, the permutation group S n acts on the subset N n = {1, 2,...,n} of N. Also the group

More information

D-MATH Algebra I HS 2013 Prof. Brent Doran. Solution 3. Modular arithmetic, quotients, product groups

D-MATH Algebra I HS 2013 Prof. Brent Doran. Solution 3. Modular arithmetic, quotients, product groups D-MATH Algebra I HS 2013 Prof. Brent Doran Solution 3 Modular arithmetic, quotients, product groups 1. Show that the functions f = 1/x, g = (x 1)/x generate a group of functions, the law of composition

More information

CS 6815: Lecture 4. September 4, 2018

CS 6815: Lecture 4. September 4, 2018 XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.

More information

Extra exercises for algebra

Extra exercises for algebra Extra exercises for algebra These are extra exercises for the course algebra. They are meant for those students who tend to have already solved all the exercises at the beginning of the exercise session

More information

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4 MATH 25 CLASS 21 NOTES, NOV 7 2011 Contents 1. Groups: definition 1 2. Subgroups 2 3. Isomorphisms 4 1. Groups: definition Even though we have been learning number theory without using any other parts

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students

More information

2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a.

2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a. Chapter 2 Groups Groups are the central objects of algebra. In later chapters we will define rings and modules and see that they are special cases of groups. Also ring homomorphisms and module homomorphisms

More information

Ma/CS 6a Class 4: Primality Testing

Ma/CS 6a Class 4: Primality Testing Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Send anonymous suggestions and complaints from here. Email: adamcandobetter@gmail.com Password: anonymous2 There aren t enough crocodiles in the presentations

More information

ISOMORPHISMS KEITH CONRAD

ISOMORPHISMS KEITH CONRAD ISOMORPHISMS KEITH CONRAD 1. Introduction Groups that are not literally the same may be structurally the same. An example of this idea from high school math is the relation between multiplication and addition

More information

Theorem 5.3. Let E/F, E = F (u), be a simple field extension. Then u is algebraic if and only if E/F is finite. In this case, [E : F ] = deg f u.

Theorem 5.3. Let E/F, E = F (u), be a simple field extension. Then u is algebraic if and only if E/F is finite. In this case, [E : F ] = deg f u. 5. Fields 5.1. Field extensions. Let F E be a subfield of the field E. We also describe this situation by saying that E is an extension field of F, and we write E/F to express this fact. If E/F is a field

More information

Algebra SEP Solutions

Algebra SEP Solutions Algebra SEP Solutions 17 July 2017 1. (January 2017 problem 1) For example: (a) G = Z/4Z, N = Z/2Z. More generally, G = Z/p n Z, N = Z/pZ, p any prime number, n 2. Also G = Z, N = nz for any n 2, since

More information

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your

More information

Factoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.

Factoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of

More information

Section III.15. Factor-Group Computations and Simple Groups

Section III.15. Factor-Group Computations and Simple Groups III.15 Factor-Group Computations 1 Section III.15. Factor-Group Computations and Simple Groups Note. In this section, we try to extract information about a group G by considering properties of the factor

More information

18.702: Quiz 1 Solutions

18.702: Quiz 1 Solutions MIT MATHEMATICS 18.702: Quiz 1 Solutions February 28 2018 There are four problems on this quiz worth equal value. You may quote without proof any result stated in class or in the assigned reading, unless

More information

THE MINIMAL POLYNOMIAL AND SOME APPLICATIONS

THE MINIMAL POLYNOMIAL AND SOME APPLICATIONS THE MINIMAL POLYNOMIAL AND SOME APPLICATIONS KEITH CONRAD. Introduction The easiest matrices to compute with are the diagonal ones. The sum and product of diagonal matrices can be computed componentwise

More information

φ(xy) = (xy) n = x n y n = φ(x)φ(y)

φ(xy) = (xy) n = x n y n = φ(x)φ(y) Groups 1. (Algebra Comp S03) Let A, B and C be normal subgroups of a group G with A B. If A C = B C and AC = BC then prove that A = B. Let b B. Since b = b1 BC = AC, there are a A and c C such that b =

More information

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem

From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection

More information

is an isomorphism, and V = U W. Proof. Let u 1,..., u m be a basis of U, and add linearly independent

is an isomorphism, and V = U W. Proof. Let u 1,..., u m be a basis of U, and add linearly independent Lecture 4. G-Modules PCMI Summer 2015 Undergraduate Lectures on Flag Varieties Lecture 4. The categories of G-modules, mostly for finite groups, and a recipe for finding every irreducible G-module of a

More information

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

120A LECTURE OUTLINES

120A LECTURE OUTLINES 120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication

More information

Section 15 Factor-group computation and simple groups

Section 15 Factor-group computation and simple groups Section 15 Factor-group computation and simple groups Instructor: Yifan Yang Fall 2006 Outline Factor-group computation Simple groups The problem Problem Given a factor group G/H, find an isomorphic group

More information

Bivariate Uniqueness in the Logistic Recursive Distributional Equation

Bivariate Uniqueness in the Logistic Recursive Distributional Equation Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009 1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

Lecture 6: Finite Fields

Lecture 6: Finite Fields CCS Discrete Math I Professor: Padraic Bartlett Lecture 6: Finite Fields Week 6 UCSB 2014 It ain t what they call you, it s what you answer to. W. C. Fields 1 Fields In the next two weeks, we re going

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017 Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation

More information

Number Theory. Final Exam from Spring Solutions

Number Theory. Final Exam from Spring Solutions Number Theory. Final Exam from Spring 2013. Solutions 1. (a) (5 pts) Let d be a positive integer which is not a perfect square. Prove that Pell s equation x 2 dy 2 = 1 has a solution (x, y) with x > 0,

More information

MMSE Equalizer Design

MMSE Equalizer Design MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance International Journal of Statistics and Probability; Vol. 5, No. 4; July 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education The Probability of Pathogenicity in Clinical

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

Math 250: Higher Algebra Representations of finite groups

Math 250: Higher Algebra Representations of finite groups Math 250: Higher Algebra Representations of finite groups 1 Basic definitions Representations. A representation of a group G over a field k is a k-vector space V together with an action of G on V by linear

More information

The Symmetric Groups

The Symmetric Groups Chapter 7 The Symmetric Groups 7. Introduction In the investigation of finite groups the symmetric groups play an important role. Often we are able to achieve a better understanding of a group if we can

More information

Lecture 4: Elementary Quantum Algorithms

Lecture 4: Elementary Quantum Algorithms CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.

More information

Quantum LDPC Codes Derived from Combinatorial Objects and Latin Squares

Quantum LDPC Codes Derived from Combinatorial Objects and Latin Squares Codes Derived from Combinatorial Objects and s Salah A. Aly & Latin salah at cs.tamu.edu PhD Candidate Department of Computer Science Texas A&M University November 11, 2007 Motivation for Computers computers

More information

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1 2 3 style total Math 415 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. Every group of order 6

More information

20 Group Homomorphisms

20 Group Homomorphisms 20 Group Homomorphisms In Example 1810(d), we have observed that the groups S 4 /V 4 and S 3 have almost the same multiplication table They have the same structure In this paragraph, we study groups with

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation

More information

Answers to Final Exam

Answers to Final Exam Answers to Final Exam MA441: Algebraic Structures I 20 December 2003 1) Definitions (20 points) 1. Given a subgroup H G, define the quotient group G/H. (Describe the set and the group operation.) The quotient

More information

Transposition as a permutation: a tale of group actions and modular arithmetic

Transposition as a permutation: a tale of group actions and modular arithmetic Transposition as a permutation: a tale of group actions and modular arithmetic Jeff Hooper Franklin Mendivil Department of Mathematics and Statistics Acadia University Abstract Converting a matrix from

More information

LECTURE 2. Hilbert Symbols

LECTURE 2. Hilbert Symbols LECTURE 2 Hilbert Symbols Let be a local field over Q p (though any local field suffices) with char() 2. Note that this includes fields over Q 2, since it is the characteristic of the field, and not the

More information

x by so in other words ( )

x by so in other words ( ) Math 210B. Norm and trace An interesting application of Galois theory is to help us understand properties of two special constructions associated to field extensions, the norm and trace. If L/k is a finite

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation

More information

Classical simulations of non-abelian quantum Fourier transforms

Classical simulations of non-abelian quantum Fourier transforms Classical simulations of non-abelian quantum Fourier transforms Diploma Thesis Juan Bermejo Vega December 7, 2011 Garching First reviewer: Prof. Dr. J. Ignacio Cirac Second reviewer: Prof. Dr. Alejandro

More information

6 Cosets & Factor Groups

6 Cosets & Factor Groups 6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.

More information