Cyclic Groups. AgroupG is called cyclic if there is an element x G such that for each a G, a = x n for some n Z. G = { x k : k Z }.

Size: px
Start display at page:

Download "Cyclic Groups. AgroupG is called cyclic if there is an element x G such that for each a G, a = x n for some n Z. G = { x k : k Z }."

Transcription

1 Cyclic Groups AgroupG is called cyclic if there is an element x G such that for each a G, a = x n for some n Z. In other words, G = { x k : k Z }. G is said to be generated by x, denoted by G = x. x is called a generator, primitive root, orprimitive element. a a Paolo Ruffini ( ). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 825

2 Cyclic Groups Are Abelian Lemma 116 Every cyclic group is abelian. Let x, y G, a cyclic group g. Let x = g m and y = g n for some m, n Z. Now, x y = g m g n = g m+n = g n+m = g n g m = y x. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 826

3 Orders a of Groups and Group Elements For every group G, the number of elements in G is called the order of G, denoted by G. The order of a G, written o(a), is the least positive integer n such that a n = e. If a finite n does not exist, a has infinite order. a Ruffini (1799). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 827

4 The Group (Z n, +), n>1 Under ordinary + modulo n, (Z n, +) is an additive abelian group for n>1 (p. 809). Its order is n. Its generator is 1. Every i Z n can be expressed as i {}}{ c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 828

5 Orders of Group Elements Lemma 117 If x s order is n and x k = e, thenn k. Assume otherwise and k = qn + r, where0<r<n. So e = x k = x qn+r = x qn x r = x r. So x s order is at most r<n, a contradiction. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 829

6 Finiteness of Orders of Groups and Group Elements a Lemma 118 If G is a finite group, then the order of every element a G must be finite. Consider the chain a 1,a 2,a 3,... Because G is finite, the chain must eventually repeat itself. So there must be distinct i<jsuch that a i = a j. Then e = a j i by Lemma 112 (p. 818). As a result, a s order is at most j i, which is finite. a Contributed by Mr. Bao (B ) on December 23, c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 830

7 Criterion for Being a Subgroup: The Finite Case Corollary 119 Let H be a nonempty subset of a finite group (G, ). ThenH is a subgroup of G if and only if for all a, b H, a b H (closure). By Theorem 113 (p. 820), we only need to prove that if the closure property holds, then a 1 H for all a H (inverse). Let a H. Then a m = e for some m Z by Lemma 118 (p. 830). Hence a 1 = a m 1 H. This is because a a m 1 = a m = e. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 831

8 Remarks Corollary 119 may not hold for infinite groups. For example, (Z, +) is a group (p. 808). Its subset (N, +) is closed under +. But (N, +) is not a subgroup of (Z, +) (p. 808)! c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 832

9 Cyclic Subsets of Finite Groups Lemma 120 Suppose G is a finite group and a G. (1) { a k : k Z } = { a k : k Z + }.(2) {a k : k Z } = o(a). The set a Δ = { a k : k Z } contains at least They are all distinct. a, a 2,a 3,...,a o(a) = e. Otherwise, a i = a j for 1 i<j o(a), and e = a j i, a contradiction because j i<o(a). It is easy to see that a m = a m mod o(a) for all m 0. Similarly, a m = a ( m) modo(a) for all m 0. Hence there are no other elements in { a k : k Z }. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 833

10 Remarks Lemma 120(1) (p. 833) does not (yet) say { a k : k Z + } must be a subgroup for every a G. It only asserts that the cyclic set { a k : k Z } is identical to { a k : k Z + }. Recall our definition on p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 834

11 Cyclic Subgroups Lemma 121 Let (G, ) be a group and a G. Then H =({ a k : k Z }, ) is a subgroup of G. For a i,a j H, wehave by Lemma 112 (p. 818). a i a j = a i j H Theorem 114 (p. 822) then implies the lemma. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 835

12 Remarks Lemma 121 (p. 835) does imply { a k : k Z } (hence { a k : k Z + } as well) is a subgroup of G for every a G. Corollary 122 Let (G, ) be a finite group and a G. Then H =({ a k : k Z + }, ) is a subgroup of G. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 836

13 Cyclic Structures Must Form a Group? a Must a cyclic structure ({ a k : k Z }, ) be a group without restrictions on and entity a? Note that Lemma 121 (p. 835) does impose some restrictions: (G, ) must be a group. Consider algebraic structure ({ 2 k : k Z }, mod 12). Note that 2 cannot have an inverse modulo 12 because gcd(2, 12) = 2 1. Hence the cyclic structure is not a group. a Contributed by Mr. Bao (B ) on December 23, c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 837

14 Cosets a If H is a subgroup of G and a G, theset ah = { a h : h H } is called a (left) coset of H in G. An element of ah is called a coset representative of ah. a Augustin Louis Cauchy ( ), who published more than 800 papers. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 838

15 Cosets (continued) ah = H when H is finite. a ah H by definition. If ah < H, thena h i = a h j for some distinct h i,h j H. Butthatimpliesh i = h j by the left-cancellation property, a contradiction. a Contributed by Mr. Kai-Yuan Hou (B ) on June 7, Of course, if G is finite, then H must be, too. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 839

16 Cosets (concluded) Similarly, we can also define a right coset of H in G, Ha = { h a : h H }. Let G/H denote the family of all the (left) cosets of H. When G/H is a group, it is called the quotient group G mod H. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 840

17 Cosets as Partitions Let H be a subgroup of a group G. For a, b G, eitherah = bh or ah bh =. a Assume ah bh. Let c = a h 1 = b h 2 for some h 1,h 2 H. If x ah, thenx = a h for some h H and x =(b h 2 h 1 1 ) h = b (h 2 h 1 1 h) bh. So ah bh. Similarly, we can prove that bh ah. a Do we need to require that G be finite for this result as the textbook does? Contributed by Mr. Kai-Yuan Hou (B ) on June 7, c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 841

18 Cosets as Partitions (continued) As a ah for any a G, G can be partitioned by cosets. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 842

19 Cosets as Partitions (concluded) e a b H ah bh c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 843

20 Constructing a Coset Partition of a Finite Group Let G be a group and H a subgroup. 1: print H; 2: G := G H; 3: while G do 4: Pick a G; 5: print ah; 6: G := G ah; 7: end while c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 844

21 Lagrange s a Theorem Theorem 123 If G is a finite group with subgroup H, then H divides G. G can be partitioned by cosets of H Each coset of H has the same order, H. b Hence H divides G. a Joseph Louis Lagrange ( ). b p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 845

22 Joseph Louis Lagrange ( ) c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 846

23 Applications of Lagrange s Theorem Suppose G = 16, then the order of its subgroup must be 1, 2, 4, 8, or 16. Suppose G = 18, then the order of its subgroup must be 1, 2, 3, 6, 9, or 18. Suppose G = 11, a prime, then the order of its subgroup must be 1 or 11. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 847

24 Index of a Subgroup Let H be a subgroup of G. The index of H in G, denoted by [ G : H ], is the number of cosets of H in G. In other words, the index is the size of G/H, a i.e., [ G : H ] Δ = G/H. When G is finite, because every coset has the same size, b [ G : H ]= G H. (101) a p b Recall the proof of Lagrange s theorem (p. 845). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 848

25 Index of a Subgroup (concluded) Corollary 124 If H is a subgroup of a finite group G, then G/H = G H. Corollary 125 If H is a subgroup of a finite group G, then Because G/{ e } = G/H H/{ e }. G/{ e } = G {e } = G H H G/H H/{ e }. {e } c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 849

26 First Corollary of Lagrange s Theorem a Corollary 126 If G is a finite group and a G, theno(a) divides G. The set generated by a, { a k : k Z }, hassizeo(a) by Lemma 120 (p. 833). Set { a k : k Z } is a subgroup of G by Lemma 121 (p. 835). Lagrange s theorem then implies our claim. a See also Lemma 117 (p. 829). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 850

27 The Fermat a -Euler Theorem Theorem 127 If G is a finite group, then every a G satisfies a G = e. By Corollary 126 (p. 850), o(a) divides G. Let G = o(a) k, wherek Z +. Now, a G = a o(a) k =(a o(a) ) k = e k = e. a Pierre de Fermat ( ). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 851

28 Pierre de Fermat ( ) c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 852

29 Euler s Theorem Recall that Z n is the set of positive integers between 1 and n 1 that are relatively prime to n. a Theorem 128 (Euler s theorem) For all a Z n, (Z n, ) is a group. b Z n = φ(n). c a φ(n) 1modn. Apply Theorem 127 (p. 851). a p b p c p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 853

30 Fermat s Little Theorem Theorem 129 (Fermat s little theorem) Suppose p is aprime.then a p 1 1modp for all a Z p. By Euler s theorem (p. 853). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 854

31 Three Easy Applications The inverse of a in (Z p, ) isa p 2 mod p. a p 2 a = a p 1 1modp by Fermat s little theorem. 3 (n 2 1) when 3 n. The number 3 is a prime. By Fermat s little theorem, n 3 1 = n 2 1mod3. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 855

32 Three Easy Applications (concluded) a pn p n 1 1modp n for odd prime p and gcd(a, p) =1. By Euler s theorem (p. 853) and Theorem 61 (p. 418), 1 a φ(pn) a pn p n 1 mod p n. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 856

33 Application: The RSA Function a Let n = pq, wherep and q are distinct odd primes. Then φ(n) =(p 1)(q 1) by Theorem 61 (p. 418). Let e be an odd integer relatively prime to φ(n). b The RSA function is defined as where gcd(x, n) =1. E(x) =x e mod n, a Rivest, Shamir, & Adleman (1978). b This e should not be confused with the identity of a group. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 857

34 Adi Shamir, Ron Rivest, and Leonard Adleman c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 858

35 Encryption Using the RSA Function The RSA function is a good candidate for the encryption of message x. The number e is called the encryption key. Furthermore, the prime number theorem (p. 158) guarantees an abundance of primes. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 859

36 Decryption and Trapdoor Information To be useful, an efficient algorithm must exist to recover x from E(x). Butthisisanopenproblem(sofar). The way out is the existence of the trapdoor information not available to the enemies. One possible piece of trapdoor information is the factorization of n. Factorization is believed to be hard. a a Numbers can be factorized efficiently by Shor s (1994) quantum algorithm. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 860

37 Inversion of the RSA Function Let d be the inverse of e modulo φ(n), that is, ed =1modφ(n). Because gcd(e, φ(n)) = 1, such d exists. d can be found by the extended Euclidean algorithm (p. 792). By Euler s theorem (p. 853), the encrypted message y = Δ E(x) canbedecrypted by y d =(x e ) d = x ed = x 1+kφ(n) = xx kφ(n) = x mod n. So the decryption function is D(y) =y d mod n. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 861

38 Sophie Germain Primes How many e s are there such that gcd(e, φ(n)) = 1? The density of numbers between 1 and φ(n) thatsatisfy the above condition is a φ(φ(n)) φ(n) = φ((p 1)(q 1)) (p 1)(q 1). a The 5th edition of Grimaldi s Discrete and Combinatorial Mathematics errs with φ(n)/n on p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 862

39 Sophie Germain Primes (concluded) Suppose p =2p +1andq =2q +1,wherep,q are also primes. Such primes are called Sophie Germain primes. The density becomes φ(4p q ) (p 1)(q 1) = 2(p 1)(q 1) 1 4p q 2. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 863

40 Sophie Germain ( ) A French mathematician. Gauss on Germain: But when a person of the sex which, according to our customs and prejudices, must encounter infinitely more difficulties than men to familiarize herself with these thorny researches, succeeds nevertheless in surmounting these obstacles and penetrating the most obscure parts of them, then without doubt she must have the noblest courage, quite extraordinary talents and superior genius. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 864

41 Second Corollary of Lagrange s Theorem Corollary 130 Every group of prime order is cyclic. Pick any element a e of the group G. a Note that o(a) > 1. As o(a) also divides G, b aprimenumber,o(a) = G. This implies that every b G must be of the form a k for some k Z. a Because a group of prime order has at least 2 elements, such an a exists. b See Corollary 126 (p. 850). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 865

42 Criterion for Generators The computational problem of verifying if g is a generator is believed to be hard without the factorization of G. Exhaustive testing is too slow, taking O( G ) time. A better algorithm is based on the next corollary, assuming the factorization of G is available. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 866

43 Third Corollary of Lagrange s Theorem Corollary 131 Let G be a finite cyclic group with prime factorization of its order m = p a 1 1 pa 2 2 pa n n.theng Gis a generator of G if and only if for i =1, 2,...,n. Define m i Δ = m/pi. g m/pi e (102) Hence m i = p a 1 1 pa 2 2 pa i 1 i p a n n. Suppose g is a generator. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 867

44 The Proof (continued) Because o(g) =m, g m/pi e for all i. Conversely, assume inequality (102). We proceed to show that g must be a generator. Let o(g) =j so g j = e. Because j divides m by Lagrange s theorem (p. 845), m = dj for some d 1. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 868

45 The Proof (concluded) Let j = p b 1 1 pb 2 2 pb n n, where 0 b i a i for i =1, 2,...,n. What if j<m? Then b i <a i for some i. But then j divides m i. This implies that g m i (102). = e, contradicting inequality We must conclude that j = m and g is a generator. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 869

46 Algorithm for Testing If g Is a Generator of G 1: m := p a 1 1 pa 2 2 pa n n ; 2: for i =1, 2,...,n do 3: if g m/p i = e then 4: return g is not a generator ; 5: end if 6: end for 7: return g is a generator ; Note that n = O(log 2 m). So the number of steps is polynomial in log 2 m. In contrast, the exhaustive method takes m steps. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 870

47 Number of Generators in Finite Cyclic Groups Lemma 132 Let G be a finite cyclic group with order m and g be a generator of G. Then the generators are where 1 i<mand gcd(i, m) =1. Hence the number of generators is φ(m), Euler s phi function (p. 418). g i, Suppose 1 i<mis relatively prime to m. Let j = o(g i ). So g ij = e. As g is a generator, m divides ij by Lemma 117 (p. 829). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 871

48 The Proof (concluded) As m cannot divide i by assumption, m divides j. As 1 j m, wemusthavej = m and g i is a generator. Next assume 1 i<mbut gcd(i, m) =d>1. Define j = m/d. Now, 0 <j<m. By the Fermat-Euler theorem (p. 851), (g i ) j = g ij = g im/d = g (i/d)m =(g m ) i/d = e. So g i is not a generator. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 872

49 Number of Generators in (Z n, ), IfAny Theorem 133 If (Z n, ) has a generator, then it has φ(φ(n)) generators. a Recall Euler s phi function (p. 418). If (Z n, ) has a generator, then it is a finite cyclic group. Lemma 132 (p. 871) then implies the theorem. a A common mistake is to answer φ(n). Is it easy to calculate φ(φ(n)) even if one knows the factorization of n? c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 873

50 Group Homomorphism and Isomorphism Let (G, ) and(h, ) be 2 groups. A function f : G H is a homomorphism if for all x, y G. f(x y) =f(x) f(y) It is called an isomorphism if f is a bijection. G and H are said to be isomorphic (written as G = H) if an isomorphism exists between them. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 874

51 Group Homomorphism and Isomorphism (concluded) Isomorphic groups have the same multiplication table (up to relabeling by f). When ambiguity is can be an issue, Write e G for the identity of G. Write e H for the identity of H. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 875

52 All Cyclic Groups Are Isomorphic Lemma 134 Cyclic groups of the same order are isomorphic. Let G =( g, g )andh =( h, h ) be 2 cyclic groups of the same order. Define f : G H by f(g i )=h i. f is a one-to-one correspondence between G and H because f(g) =h clearly generates H. For all x = g i G and y = g j G, f(x g y)=f(g i+j )=h i+j = h i h h j = f(x) h f(y). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 876

53 All Cyclic Groups Are Isomorphic (concluded) Corollary 135 Every cyclic group of order m>1 is isomorphic to (Z n, +). (Z n, +) is a cyclic abelian group. a Lemma 134 (p. 876) then implies this corollary. a p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 877

54 Permutations a Let function f : { 1, 2,...,n} {1, 2,...,n} be one-to-one and onto. f must be a permutation of { 1, 2,...,n}. Write f as I = 1 2 n f(1) f(2) f(n) 1 2 n 1 2 n, theidentity permutation. a Lagrange (1770); Ruffini (1799); Cauchy (1815). Recall p c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 878

55 Permutations (concluded) So permutations are functions. We are mainly interested in permutations of a finite set. But permutations can be defined as bijections on an infinite set. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 879

56 Permutation Groups Let f and g be two permutations of { 1, 2,...,n}. Then f g is defined as 1 2 n g(f(1)) g(f(2)) g(f(n)). (103) Note that f is applied first. The alternative of applying g first is more consistent with function composition on p But our convention is more convenient in calculations. Either convention works. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 880

57 Permutation Groups (continued) For example, = In general, permutations can work on any finite set, not just { 1, 2,...,n}. The finite set can even be a set of permutations! When a set of permutations forms a group under, we have a permutation group. In general, is not abelian. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 881

58 Permutation Groups (concluded) A key result of Cayley (p. 901) says every group is isomorphic to a permutation group! But the permutation perspective has one unique advantage over groups: Permutations are functions! Under this perspective, notations like g(x), x X, makes sense for a group element g G that acts on X. This idea was used to construct interconnection networks for parallel computers. a a Annexstein, Baumslag, & Rosenberg (1990). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 882

59 Permutation Group as a Multiplication Table g 1 g 2 g 3 g 4 g 5 g 6 c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 883

60 The Symmetric Group There are n! permutations of { 1, 2,...,n}. These permutations form a group (verify it). This group S n is called the symmetric group of degree n. S n = n!. A permutation group is thus a subgroup of S n. And by Cayley (p. 901), every group is a subgroup of a symmetric group. In general, S X denotes the set of all permutations of a set X. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 884

61 Cycles Call a cycle (i 1 i 2 i m )anm-cycle, where i 1,i 2,...,i m are distinct. It represents the permutation i 1 i 2 i 3 i m 1 i m other fixed points i 2 i 3 i 4 i m i 1 other fixed points. The order of an m-cycle g is m because the identity permutation. g m = I, c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 885

62 A 1-cycle is a fixed point. The inverse of a cycle: Cycles (concluded) (i 1 i 2 i m ) 1 =(i m i n 1 i 1 ). Because (i 1 i 2 i m )(i m i m 1 i 1 )=(i 1 )(i 2 ) (i m ). c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 886

63 Cycle Decomposition of Permutations A permutation like represented as (1 3)(2 4)(5). There are 3 disjoint cycles above. can be 5 is a fixed point; it is invariant under the permutation. In general, a permutation is either a cycle or a product of disjoint cycles. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 887

64 Cycle Decomposition of Permutations (concluded) Now, (1 3)(2 4)(5) = (1 3)(2 4). So fixed points drop out. A cycle decomposition a of a permutation is a product of disjoint cycles that contains a 1-cycle for every invariant element. A cycle decomposition can be calculated efficiently. a Also called a complete factorization. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 888

65 Another Cycle Decomposition = (1 2 3)(4 5)(6). There are 3 disjoint cycles above. Equivalent cycle decompositions: (3 1 2)(5 4)(6), (4 5)(1 2 3)(6),. The cycle decomposition is essentially unique. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 889

66 Transpositions A 2-cycle is called a transposition. (1 2 3) = (1 2)(1 3) (from left to right always). In general, (i 1 i 2 i n )=(i 1 i 2 )(i 1 i 3 ) (i 1 i n ). So every permutation is a product of not necessarily disjoint transpositions. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 890

67 Order of a Permutation Theorem 136 Let g S n.ifg = g 1 g m is a product of disjoint cycles, a then where g i is an r i -cycle. o(g) =lcm(r 1,r 2,...,r m ), We knew o(g i )=r i (p. 885). Suppose o(g) =M. Clearly, g M =(g 1 g m ) M = g M 1 g M m because the g i s are disjoint and hence commute. a It is not necessarily a cycle decomposition of g because 1-cycles may be suppressed here. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 891

68 Order of a Permutation (concluded) The disjointness of the g i s also implies g M i = I for each i. Then r i M by Lemma 117 (p. 829), 1 i m. Hence lcm(r 1,r 2,...,r m ) M as well. But g lcm(r 1,r 2,...,r m ) = I. Trivially, r i divides lcm(r 1,r 2,...,r m ). So g lcm(r 1,...,r m ) = g lcm(r 1,...,r m ) 1 g lcm(r 1,...,r m ) m = I. Hence lcm(r 1,r 2,...,r m )=M. Corollary 137 Let g S n.ifp is a prime, then o(g) =p if and only if g is a p-cycle or a product of disjoint p-cycles. c 2017 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 892

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists.

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists. Group Theory a Let G be a set and be a binary operation on G. (G, ) is called a group if it satisfies the following. 1. For all a, b G, a b G (closure). 2. For all a, b, c G, a (b c) = (a b) c (associativity).

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.

Modern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1 2 3 style total Math 415 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. Every group of order 6

More information

Theorems and Definitions in Group Theory

Theorems and Definitions in Group Theory Theorems and Definitions in Group Theory Shunan Zhao Contents 1 Basics of a group 3 1.1 Basic Properties of Groups.......................... 3 1.2 Properties of Inverses............................. 3

More information

Section 10: Counting the Elements of a Finite Group

Section 10: Counting the Elements of a Finite Group Section 10: Counting the Elements of a Finite Group Let G be a group and H a subgroup. Because the right cosets are the family of equivalence classes with respect to an equivalence relation on G, it follows

More information

Elementary Number Theory Review. Franz Luef

Elementary Number Theory Review. Franz Luef Elementary Number Theory Review Principle of Induction Principle of Induction Suppose we have a sequence of mathematical statements P(1), P(2),... such that (a) P(1) is true. (b) If P(k) is true, then

More information

ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION

ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION PAVEL RŮŽIČKA 9.1. Congruence modulo n. Let us have a closer look at a particular example of a congruence relation on

More information

Lecture 14: Hardness Assumptions

Lecture 14: Hardness Assumptions CSE 594 : Modern Cryptography 03/23/2017 Lecture 14: Hardness Assumptions Instructor: Omkant Pandey Scribe: Hyungjoon Koo, Parkavi Sundaresan 1 Modular Arithmetic Let N and R be set of natural and real

More information

Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV.

Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV. Glossary 1 Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV.23 Abelian Group. A group G, (or just G for short) is

More information

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1). 1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

120A LECTURE OUTLINES

120A LECTURE OUTLINES 120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication

More information

Examples: The (left or right) cosets of the subgroup H = 11 in U(30) = {1, 7, 11, 13, 17, 19, 23, 29} are

Examples: The (left or right) cosets of the subgroup H = 11 in U(30) = {1, 7, 11, 13, 17, 19, 23, 29} are Cosets Let H be a subset of the group G. (Usually, H is chosen to be a subgroup of G.) If a G, then we denote by ah the subset {ah h H}, the left coset of H containing a. Similarly, Ha = {ha h H} is the

More information

The number of ways to choose r elements (without replacement) from an n-element set is. = r r!(n r)!.

The number of ways to choose r elements (without replacement) from an n-element set is. = r r!(n r)!. The first exam will be on Friday, September 23, 2011. The syllabus will be sections 0.1 through 0.4 and 0.6 in Nagpaul and Jain, and the corresponding parts of the number theory handout found on the class

More information

Discrete Mathematics with Applications MATH236

Discrete Mathematics with Applications MATH236 Discrete Mathematics with Applications MATH236 Dr. Hung P. Tong-Viet School of Mathematics, Statistics and Computer Science University of KwaZulu-Natal Pietermaritzburg Campus Semester 1, 2013 Tong-Viet

More information

S11MTH 3175 Group Theory (Prof.Todorov) Final (Practice Some Solutions) 2 BASIC PROPERTIES

S11MTH 3175 Group Theory (Prof.Todorov) Final (Practice Some Solutions) 2 BASIC PROPERTIES S11MTH 3175 Group Theory (Prof.Todorov) Final (Practice Some Solutions) 2 BASIC PROPERTIES 1 Some Definitions For your convenience, we recall some of the definitions: A group G is called simple if it has

More information

Answers to Final Exam

Answers to Final Exam Answers to Final Exam MA441: Algebraic Structures I 20 December 2003 1) Definitions (20 points) 1. Given a subgroup H G, define the quotient group G/H. (Describe the set and the group operation.) The quotient

More information

Foundations of Cryptography

Foundations of Cryptography Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 7 1 of 18 Cosets Definition 2.12 Let G be a

More information

Groups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems

Groups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems Group Theory Groups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems Groups Definition : A non-empty set ( G,*)

More information

Partition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example

Partition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example Partition of Integers into Even Summands We ask for the number of partitions of m Z + into positive even integers The desired number is the coefficient of x m in + x + x 4 + ) + x 4 + x 8 + ) + x 6 + x

More information

Circuit Complexity. Circuit complexity is based on boolean circuits instead of Turing machines.

Circuit Complexity. Circuit complexity is based on boolean circuits instead of Turing machines. Circuit Complexity Circuit complexity is based on boolean circuits instead of Turing machines. A boolean circuit with n inputs computes a boolean function of n variables. Now, identify true/1 with yes

More information

Congruence of Integers

Congruence of Integers Congruence of Integers November 14, 2013 Week 11-12 1 Congruence of Integers Definition 1. Let m be a positive integer. For integers a and b, if m divides b a, we say that a is congruent to b modulo m,

More information

Groups An introduction to algebra. Table of contents

Groups An introduction to algebra. Table of contents Groups An introduction to algebra Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Groups The Group Z N Group theory Group theory is certainly

More information

Name: Solutions Final Exam

Name: Solutions Final Exam Instructions. Answer each of the questions on your own paper. Be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] All of

More information

MA441: Algebraic Structures I. Lecture 18

MA441: Algebraic Structures I. Lecture 18 MA441: Algebraic Structures I Lecture 18 5 November 2003 1 Review from Lecture 17: Theorem 6.5: Aut(Z/nZ) U(n) For every positive integer n, Aut(Z/nZ) is isomorphic to U(n). The proof used the map T :

More information

INTRODUCTION TO THE GROUP THEORY

INTRODUCTION TO THE GROUP THEORY Lecture Notes on Structure of Algebra INTRODUCTION TO THE GROUP THEORY By : Drs. Antonius Cahya Prihandoko, M.App.Sc e-mail: antoniuscp.fkip@unej.ac.id Mathematics Education Study Program Faculty of Teacher

More information

2 More on Congruences

2 More on Congruences 2 More on Congruences 2.1 Fermat s Theorem and Euler s Theorem definition 2.1 Let m be a positive integer. A set S = {x 0,x 1,,x m 1 x i Z} is called a complete residue system if x i x j (mod m) whenever

More information

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL NUMBER THEORY AND CODES Álvaro Pelayo WUSTL Talk Goal To develop codes of the sort can tell the world how to put messages in code (public key cryptography) only you can decode them Structure of Talk Part

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Algebraic Structures Exam File Fall 2013 Exam #1

Algebraic Structures Exam File Fall 2013 Exam #1 Algebraic Structures Exam File Fall 2013 Exam #1 1.) Find all four solutions to the equation x 4 + 16 = 0. Give your answers as complex numbers in standard form, a + bi. 2.) Do the following. a.) Write

More information

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary

More information

DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3. Contents

DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3. Contents DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3 T.K.SUBRAHMONIAN MOOTHATHU Contents 1. Cayley s Theorem 1 2. The permutation group S n 2 3. Center of a group, and centralizers 4 4. Group actions

More information

Chapter 5. Modular arithmetic. 5.1 The modular ring

Chapter 5. Modular arithmetic. 5.1 The modular ring Chapter 5 Modular arithmetic 5.1 The modular ring Definition 5.1. Suppose n N and x, y Z. Then we say that x, y are equivalent modulo n, and we write x y mod n if n x y. It is evident that equivalence

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 14, 2013 CPSC 467b, Lecture 9 1/42 Integer Division (cont.) Relatively prime numbers, Z n, and φ(n) Computing in Z n

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Modular Arithmetic and Elementary Algebra

Modular Arithmetic and Elementary Algebra 18.310 lecture notes September 2, 2013 Modular Arithmetic and Elementary Algebra Lecturer: Michel Goemans These notes cover basic notions in algebra which will be needed for discussing several topics of

More information

7. Let K = 15 be the subgroup of G = Z generated by 15. (a) List the elements of K = 15. Answer: K = 15 = {15k k Z} (b) Prove that K is normal subgroup of G. Proof: (Z +) is Abelian group and any subgroup

More information

ENTRY GROUP THEORY. [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld.

ENTRY GROUP THEORY. [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld. ENTRY GROUP THEORY [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld Group theory [Group theory] is studies algebraic objects called groups.

More information

Number Theory and Group Theoryfor Public-Key Cryptography

Number Theory and Group Theoryfor Public-Key Cryptography Number Theory and Group Theory for Public-Key Cryptography TDA352, DIT250 Wissam Aoudi Chalmers University of Technology November 21, 2017 Wissam Aoudi Number Theory and Group Theoryfor Public-Key Cryptography

More information

The Symmetric Groups

The Symmetric Groups Chapter 7 The Symmetric Groups 7. Introduction In the investigation of finite groups the symmetric groups play an important role. Often we are able to achieve a better understanding of a group if we can

More information

MATH HL OPTION - REVISION SETS, RELATIONS AND GROUPS Compiled by: Christos Nikolaidis

MATH HL OPTION - REVISION SETS, RELATIONS AND GROUPS Compiled by: Christos Nikolaidis MATH HL OPTION - REVISION SETS, RELATIONS AND GROUPS Compiled by: Christos Nikolaidis PART B: GROUPS GROUPS 1. ab The binary operation a * b is defined by a * b = a+ b +. (a) Prove that * is associative.

More information

Elementary Algebra Chinese Remainder Theorem Euclidean Algorithm

Elementary Algebra Chinese Remainder Theorem Euclidean Algorithm Elementary Algebra Chinese Remainder Theorem Euclidean Algorithm April 11, 2010 1 Algebra We start by discussing algebraic structures and their properties. This is presented in more depth than what we

More information

Fundamental Theorem of Finite Abelian Groups

Fundamental Theorem of Finite Abelian Groups Monica Agana Boise State University September 1, 2015 Theorem (Fundamental Theorem of Finite Abelian Groups) Every finite Abelian group is a direct product of cyclic groups of prime-power order. The number

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 14 October 23, 2017 CPSC 467, Lecture 14 1/42 Computing in Z n Modular multiplication Modular inverses Extended Euclidean algorithm

More information

2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a.

2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a. Chapter 2 Groups Groups are the central objects of algebra. In later chapters we will define rings and modules and see that they are special cases of groups. Also ring homomorphisms and module homomorphisms

More information

Basic Definitions: Group, subgroup, order of a group, order of an element, Abelian, center, centralizer, identity, inverse, closed.

Basic Definitions: Group, subgroup, order of a group, order of an element, Abelian, center, centralizer, identity, inverse, closed. Math 546 Review Exam 2 NOTE: An (*) at the end of a line indicates that you will not be asked for the proof of that specific item on the exam But you should still understand the idea and be able to apply

More information

Math 2070BC Term 2 Weeks 1 13 Lecture Notes

Math 2070BC Term 2 Weeks 1 13 Lecture Notes Math 2070BC 2017 18 Term 2 Weeks 1 13 Lecture Notes Keywords: group operation multiplication associative identity element inverse commutative abelian group Special Linear Group order infinite order cyclic

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We

More information

NONABELIAN GROUPS WITH PERFECT ORDER SUBSETS

NONABELIAN GROUPS WITH PERFECT ORDER SUBSETS NONABELIAN GROUPS WITH PERFECT ORDER SUBSETS CARRIE E. FINCH AND LENNY JONES Abstract. Let G be a finite group and let x G. Define the order subset of G determined by x to be the set of all elements in

More information

Groups and Symmetries

Groups and Symmetries Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group

More information

Groups. Groups. 1.Introduction. 1.Introduction. TS.NguyễnViết Đông. 1. Introduction 2.Normal subgroups, quotien groups. 3. Homomorphism.

Groups. Groups. 1.Introduction. 1.Introduction. TS.NguyễnViết Đông. 1. Introduction 2.Normal subgroups, quotien groups. 3. Homomorphism. Groups Groups 1. Introduction 2.Normal sub, quotien. 3. Homomorphism. TS.NguyễnViết Đông 1 2 1.1. Binary Operations 1.2.Definition of Groups 1.3.Examples of Groups 1.4.Sub 1.1. Binary Operations 1.2.Definition

More information

A. Algebra and Number Theory

A. Algebra and Number Theory A. Algebra and Number Theory Public-key cryptosystems are based on modular arithmetic. In this section, we summarize the concepts and results from algebra and number theory which are necessary for an understanding

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

Lagrange s Theorem. Philippe B. Laval. Current Semester KSU. Philippe B. Laval (KSU) Lagrange s Theorem Current Semester 1 / 10

Lagrange s Theorem. Philippe B. Laval. Current Semester KSU. Philippe B. Laval (KSU) Lagrange s Theorem Current Semester 1 / 10 Lagrange s Theorem Philippe B. Laval KSU Current Semester Philippe B. Laval (KSU) Lagrange s Theorem Current Semester 1 / 10 Introduction In this chapter, we develop new tools which will allow us to extend

More information

Definition List Modern Algebra, Fall 2011 Anders O.F. Hendrickson

Definition List Modern Algebra, Fall 2011 Anders O.F. Hendrickson Definition List Modern Algebra, Fall 2011 Anders O.F. Hendrickson On almost every Friday of the semester, we will have a brief quiz to make sure you have memorized the definitions encountered in our studies.

More information

Number Theory and Algebra: A Brief Introduction

Number Theory and Algebra: A Brief Introduction Number Theory and Algebra: A Brief Introduction Indian Statistical Institute Kolkata May 15, 2017 Elementary Number Theory: Modular Arithmetic Definition Let n be a positive integer and a and b two integers.

More information

What is a semigroup? What is a group? What is the difference between a semigroup and a group?

What is a semigroup? What is a group? What is the difference between a semigroup and a group? The second exam will be on Thursday, July 5, 2012. The syllabus will be Sections IV.5 (RSA Encryption), III.1, III.2, III.3, III.4 and III.8, III.9, plus the handout on Burnside coloring arguments. Of

More information

The RSA cryptosystem and primality tests

The RSA cryptosystem and primality tests Mathematics, KTH Bengt Ek November 2015 Supplementary material for SF2736, Discrete mathematics: The RSA cryptosystem and primality tests Secret codes (i.e. codes used to make messages unreadable to outsiders

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively

More information

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

RSA Algorithm. Factoring, EulerPhi, Breaking RSA.   Çetin Kaya Koç Spring / 14 RSA Algorithm http://koclab.org Çetin Kaya Koç Spring 2018 1 / 14 Well-Known One-Way Functions Discrete Logarithm: Given p, g, and x, computing y in y = g x (mod p) is EASY Given p, g, y, computing x in

More information

AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION

AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION Recall that RSA works as follows. A wants B to communicate with A, but without E understanding the transmitted message. To do so: A broadcasts RSA method,

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4

MATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4 MATH 25 CLASS 21 NOTES, NOV 7 2011 Contents 1. Groups: definition 1 2. Subgroups 2 3. Isomorphisms 4 1. Groups: definition Even though we have been learning number theory without using any other parts

More information

1 Structure of Finite Fields

1 Structure of Finite Fields T-79.5501 Cryptology Additional material September 27, 2005 1 Structure of Finite Fields This section contains complementary material to Section 5.2.3 of the text-book. It is not entirely self-contained

More information

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0

More information

its image and kernel. A subgroup of a group G is a non-empty subset K of G such that k 1 k 1

its image and kernel. A subgroup of a group G is a non-empty subset K of G such that k 1 k 1 10 Chapter 1 Groups 1.1 Isomorphism theorems Throughout the chapter, we ll be studying the category of groups. Let G, H be groups. Recall that a homomorphism f : G H means a function such that f(g 1 g

More information

How To Test If a Polynomial Is Identically Zero?

How To Test If a Polynomial Is Identically Zero? How To Test If a Polynomial Is Identically Zero? det(a G ) is a polynomial in n 2 variables. There are exponentially many terms in det(a G ). Expanding the determinant polynomial is not feasible. Too many

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups Great Theoretical Ideas in CS V. Adamchik CS 15-251 Upcoming Interview? Lecture 24 Carnegie Mellon University Cryptography and RSA How the World's Smartest Company Selects the Most Creative Thinkers Groups

More information

FROM GROUPS TO GALOIS Amin Witno

FROM GROUPS TO GALOIS Amin Witno WON Series in Discrete Mathematics and Modern Algebra Volume 6 FROM GROUPS TO GALOIS Amin Witno These notes 1 have been prepared for the students at Philadelphia University (Jordan) who are taking the

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the

More information

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions. D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial

More information

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg Course 1: Remainder: RSA Université du Luxembourg September 21, 2010 Public-key encryption Public-key encryption: two keys. One key is made public and used to encrypt. The other key is kept private and

More information

MATH 361: NUMBER THEORY FOURTH LECTURE

MATH 361: NUMBER THEORY FOURTH LECTURE MATH 361: NUMBER THEORY FOURTH LECTURE 1. Introduction Everybody knows that three hours after 10:00, the time is 1:00. That is, everybody is familiar with modular arithmetic, the usual arithmetic of the

More information

Chapter 8 Public-key Cryptography and Digital Signatures

Chapter 8 Public-key Cryptography and Digital Signatures Chapter 8 Public-key Cryptography and Digital Signatures v 1. Introduction to Public-key Cryptography 2. Example of Public-key Algorithm: Diffie- Hellman Key Exchange Scheme 3. RSA Encryption and Digital

More information

BASIC GROUP THEORY : G G G,

BASIC GROUP THEORY : G G G, BASIC GROUP THEORY 18.904 1. Definitions Definition 1.1. A group (G, ) is a set G with a binary operation : G G G, and a unit e G, possessing the following properties. (1) Unital: for g G, we have g e

More information

Math 546, Exam 2 Information.

Math 546, Exam 2 Information. Math 546, Exam 2 Information. 10/21/09, LC 303B, 10:10-11:00. Exam 2 will be based on: Sections 3.2, 3.3, 3.4, 3.5; The corresponding assigned homework problems (see http://www.math.sc.edu/ boylan/sccourses/546fa09/546.html)

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 15 3/20/08 CIS/TCOM 551 1 Announcements Project 3 available on the web. Get the handout in class today. Project 3 is due April 4th It

More information

Normal Subgroups and Factor Groups

Normal Subgroups and Factor Groups Normal Subgroups and Factor Groups Subject: Mathematics Course Developer: Harshdeep Singh Department/ College: Assistant Professor, Department of Mathematics, Sri Venkateswara College, University of Delhi

More information

List of topics for the preliminary exam in algebra

List of topics for the preliminary exam in algebra List of topics for the preliminary exam in algebra 1 Basic concepts 1. Binary relations. Reflexive, symmetric/antisymmetryc, and transitive relations. Order and equivalence relations. Equivalence classes.

More information

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory. CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,

More information

Ma/CS 6a Class 3: The RSA Algorithm

Ma/CS 6a Class 3: The RSA Algorithm Ma/CS 6a Class 3: The RSA Algorithm By Adam Sheffer Reminder: Putnam Competition Signup ends Wednesday 10/08. Signup sheets available in all Sloan classrooms, Math office, or contact Kathy Carreon, kcarreon@caltech.edu.

More information

Mathematics of Cryptography

Mathematics of Cryptography UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms

More information

5 Group theory. 5.1 Binary operations

5 Group theory. 5.1 Binary operations 5 Group theory This section is an introduction to abstract algebra. This is a very useful and important subject for those of you who will continue to study pure mathematics. 5.1 Binary operations 5.1.1

More information

Part IA. Numbers and Sets. Year

Part IA. Numbers and Sets. Year Part IA Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2017 19 Paper 4, Section I 1D (a) Show that for all positive integers z and n, either z 2n 0 (mod 3) or

More information

ON THE RESIDUALITY A FINITE p-group OF HN N-EXTENSIONS

ON THE RESIDUALITY A FINITE p-group OF HN N-EXTENSIONS 1 ON THE RESIDUALITY A FINITE p-group OF HN N-EXTENSIONS D. I. Moldavanskii arxiv:math/0701498v1 [math.gr] 18 Jan 2007 A criterion for the HNN-extension of a finite p-group to be residually a finite p-group

More information

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS Modular arithmetics that we have discussed in the previous lectures is very useful in Cryptography and Computer Science. Here we discuss several

More information

CSIR - Algebra Problems

CSIR - Algebra Problems CSIR - Algebra Problems N. Annamalai DST - INSPIRE Fellow (SRF) Department of Mathematics Bharathidasan University Tiruchirappalli -620024 E-mail: algebra.annamalai@gmail.com Website: https://annamalaimaths.wordpress.com

More information

Mathematical Foundations of Public-Key Cryptography

Mathematical Foundations of Public-Key Cryptography Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical

More information

MATH 101: ALGEBRA I WORKSHEET, DAY #3. Fill in the blanks as we finish our first pass on prerequisites of group theory.

MATH 101: ALGEBRA I WORKSHEET, DAY #3. Fill in the blanks as we finish our first pass on prerequisites of group theory. MATH 101: ALGEBRA I WORKSHEET, DAY #3 Fill in the blanks as we finish our first pass on prerequisites of group theory 1 Subgroups, cosets Let G be a group Recall that a subgroup H G is a subset that is

More information

Math 430 Exam 2, Fall 2008

Math 430 Exam 2, Fall 2008 Do not distribute. IIT Dept. Applied Mathematics, February 16, 2009 1 PRINT Last name: Signature: First name: Student ID: Math 430 Exam 2, Fall 2008 These theorems may be cited at any time during the test

More information

Factorization in Integral Domains II

Factorization in Integral Domains II Factorization in Integral Domains II 1 Statement of the main theorem Throughout these notes, unless otherwise specified, R is a UFD with field of quotients F. The main examples will be R = Z, F = Q, and

More information

NUMBER THEORY. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

NUMBER THEORY. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA NUMBER THEORY Anwitaman DATTA SCSE, NTU Singapore Acknowledgement: The following lecture slides are based on, and uses material from the text book Cryptography and Network Security (various eds) by William

More information

Chapter 5 Groups of permutations (bijections) Basic notation and ideas We study the most general type of groups - groups of permutations

Chapter 5 Groups of permutations (bijections) Basic notation and ideas We study the most general type of groups - groups of permutations Chapter 5 Groups of permutations (bijections) Basic notation and ideas We study the most general type of groups - groups of permutations (bijections). Definition A bijection from a set A to itself is also

More information

Cryptography Assignment 5

Cryptography Assignment 5 Cryptography Assignment 5 Michael Orlov (orlovm@cs.bgu.ac.il) Yanik Gleyzer (yanik@cs.bgu.ac.il) June 9, 2003 Abstract Solution for Assignment 5. One-way functions are assumed to be computable in polynomial

More information