A SAMPLER FROM NUMBER THEORY AND MODERN ALGEBRA

Size: px
Start display at page:

Download "A SAMPLER FROM NUMBER THEORY AND MODERN ALGEBRA"

Transcription

1 A SAMPLER FROM NUMBER THEORY AND MODERN ALGEBRA 1 Operations on sets Let S be a set (i.e., a collection, assemblage, class, etc.) of numbers. The numbers in S are called its members. The expression "x E S" abbreviates the phrase "x is a member of S". Similarly, "x ~ S" means x is not a member of S. For example, let I.Z, 1 4, and P denote the sets of integers, of integers between -~ and 7f, and of positive real numbers, respectively. Then 1 E I.Z, ~ ~ I.Z, 0 E 14, An operation on S is a rule which assigns to each ordered pair (a, b) of members of S another member of S. For example, subtraction gives an operation on the set I.Z above, but not on 1 4 or P. And division gives an operation on P but not on I.Z. If ~ denotes an operation on Sand (a, b) is an ordered pair of members of S, then we denote the member of S that ~ assigns to (a, b) by the expression a~b. This is a notation we have used in special cases for years! For example, the addition operation on the set Z above assigns to the pair (5,7) the number we denote by Similarly the division operation -;- on the set P above assigns to the pair (3,7) the number denoted by 3 -;- 7. 1

2 We now name some properties which an operation might or might not satisfy. Let b.. be an operation on S. i) We call A commutative if ab..b = bb..a for all a and b in S. ii) We call b.. associative if (ab..b)b..c = ab..(bb..c) for all a, band c in S. iii) A member 8 of S is called a b..-identity for S if 8b..a = ab..8 = a for all a in S. iv) Suppose 8 is a b..-identity for S. Say a is any member of S. By a b..-inverse for a (with respect to 0) we mean a member b of S with ab..b = bb..a = O. The phrase "with respect to 0" above is unnecessary since if there is a b..-identity, then there is only one. After all if a and b were both b..-identities, then from the definition itself we see that a = ab..b = b. As a first example note that ordinary addition, +, is a commutative and associative operation on the set Z, is a +-identity, and every member b of Z has a +-inverse, namely, -b. A second example. Division (-;-) is an operation on the set P of positive numbers above; it is neither associative nor commutative, nor does it have an identity. Here is a less familiar example. Note the set 1 4 above consists exactly of the numbers 0, 1, 2, 3. Define an operation "8" on 1 4 as follows. For any members a and b of 1 4 let a 8 b be the remainder when you divide the product ab by 4. (Note that long division of any nonnegative integer by 4 always leaves a remainder which is a member of 1 4.) For example, 382 = 2 (the remainder when 6 is divided by 4 is 2), 83 = 0, and 383 = 1. One can show that 8 is commutative and associative and that 1 is a 8-identity. 1 and 3 are 8-inverses of themselves, but and 2 have no 8-inverses. These facts are not all obvious, but they can at worst be checked 2

3 by an exhaustive enumeration of all possibilities! For example, 2 has no 8-inverse since 082 = 0 i- 1,1 82= 2 i- 1,282 = 0 i- 1,3 82= 2 i- 1. (The above assertions will follow easily from the results of the next two sections.) 1 Exercises 1. Let 1 4 = {O, 1, 2, 3} be the set studied above. Define a second operation EB on 1 4 by letting a EB b be the remainder when a + b is divided by 4 for all a and b (i) Compute a EB b for all possible choices of a and b. Your results can be tabulated in the table below. ~ (ii) Is EB commutative? How would this property be reflected in the above table? (iii) Verify that a EB (b EB c) = (a EB b) EB c for three or four different choices of values for a, b, and c. (E.g., one choice might be "a = b = 3, c = 1".) (iv) Explain why there is a EB-identity. Which elements have EB-inverses? 2. For each of the following operations on the set of positive real numbers P, determine whether the operation is commutative, whether it is associative, and whether it has an identity in P. If there is an identity, find out which elements have inverses and what they are. (i) addition 3

4 (ii) multiplication (iii) division (iv) the operation # which assigns to any pair (a, b) the larger of the two numbers a and b (v) the operation * which assigns to any pair (a, b) the number ab + a + b 3. Find an operation on 7L which is associative but not commutative. Can you find one which is commutative but not associative? 4. Suppose ~ is an operation on S which is associative and has an identity o. Can a member of S have two different ~- inverses? An afterword. An operation ~ on S is called a group operation if it is associative, there is a ~-identity, and every member of S has a ~-inverse. Such operations are ubiquitous in mathematics and have been intensely studied; they also occur naturally in the natural sciences (e.g., the symmetries of a crystalline structure). Like many important abstract concepts, group operations had to come up in many special situations before anyone realized the usefulness of abstracting from these concrete special cases their common structure. In the case of groups, much of the credit for this goes to Emmy Noether, and this is one of the reasons she is regarded as the mother of modern algebra. 1 Appendix: the well-ordering principle. In the next section we will need a fundamental property of the integers, which we review here. Suppose S is a non-empty set of integers such that there is a number t with t ::; s for all s E S. (Such t is called a "lower bound" for S.) The "wellordering principle" says that under these circumstances S must have a smallest member. Taking t = 1 gives the "least integer principle" as a special case: if S is a 4

5 nonempty set of positive integers then it must have a smallest member. The least integer principle implies the various forms of mathematical induction. Here is one: suppose P(l), P(2),... is a sequence of statements. Suppose P(l) is true and that whenever P(n) is true for some n then P(n + 1) is also true. Then P(n) is true for all positive integers n. Exercises: (1) Give an example of a nonempty set of integers which does not have a smallest number. Give an example of a nonempty set of rational numbers that has a lower bound but does not have a smallest member. (2) Use the least integer principle to prove the above statement of mathematical induction. 2 Remainders Here is our key definition. Definition. Suppose b E Z and 0 < d E Z. We call an integer r a remainder when b is divided by d if 0 ::; r < d and there exists an integer q such that b = qd + rj if this happens we also say that q is a quotient when b is divided by d. Note that the concept of a remainder is defined by giving properties a remainder must satisfy and not by specifying any procedure for finding one. Indeed in spite of the phrase "a remainder when b is divided by d" no process of division is actually involved; the definition gives a specific meaning to this phrase as a whole and one must be wary of any interpretation of the phrase based on the common meaning of the individual words. Of course what is behind this choice of language is the fact that when b ~ 0, the familiar process of long division of b by d does produce a remainder and quotient in the sense of the above definition. Some questions arise, 5

6 however, since we are not defining a remainder in terms of a computational procedure. Could there be two different "remainders" which satisfy the given conditions (notice we said "a remainder", not "the remainder" in the definition)? Second, must a remainder always exist? For example if b = and d = 721 is it clear that there exists r, q E Z with 0 :s; r < 721 and = 721q +r? These questions are answered in our first theorem. Basic Remainder Theorem. Suppose b E Z and 0 < d E Z. Then there is a unique number which is a remainder when b is divided by d. Because of the above theorem we will henceforth speak of the remainder when b is divided by d; we will denote this number by [bk Examples. [7]6 = 1 and [6h = 6 and [248]5 = 3 and [-1h = 6. Proof of the "BRT". There is a smallest integer q' with q' > bid (the well-ordering principle). Let q = q' - 1. Then by the choice of q', q :s; bid < q + 1. Hence qd :s; b < qd + d, so 0 :s; b - qd < d. Also b = qd + (b - qd). Setting r = b - qd we see r is a remainder when d is divided by b. Now suppose rl and r2 are such remainders, so there exists integers qi and q2 with b = qi d + rl = q2d + r2. We may without loss of generality assume rl :s; r2 (otherwise re-label the remainders). Then 0 :s; r2 - rl < d. A bit of algebra shows r2 - rl = (qi - q2)d, so d is a factor of r2 - ri. Since 0 :s; r2 - rl < d, this says r2 - rl = 0, i.e., rl = r2. Thus not only do remainders always exist, they are unique. We now define an operation 0d on Z by setting

7 for all a, b E Z. A special case of this operation appeared in 1. We will next study some basic properties of 8d; properties of an analogous operation "EBd" will be developed in the exercises. Since d will be regarded as a fixed integer (except in examples) we will often omit d as a subscript and abbreviate 8d and [ ]d by 8 and [ ]. Lemma 1. 8 is commutative. Proof. For all a, b E Z we have a 8 b = lab] = [ba] = b 8 a. Finished! Lemma 2. If a, b E Z then [a] 8 b = a 8 b. Proof. There exist rational numbers q and q' such that [a]b = qd + [a] 8 band a = q'd + [a]. Thus ab = q'bd + b[a] = q'bd + qd + [a] 8 b = (q'b + q)d + [a] 8 b. But then by our definitions of a 8 b and of lab], a 8 b = lab] = [a] 8 b. (Note a :::; [a] 8 b < d since [a] 8 b = [[alb] is itself a remainder!) Corollary 3. If a, be Z then a 8 b = a 8 [b] = [a] 8 [b]. Proof. Exercise 3 below. (Hint: combine Lemmas 1 and 2.) Corollary 3 is very useful since it lets us replace numbers in computations involving 8 by their remainders, which may be much smaller and therefore easier to work with. For example = [33331 Js 83 [666662Js = = [2Js = 2. It was not necessary to compute the product (33331)(666662). Lemma 2 also provides the machinery for an easy proof that 8d is associative. 7

8 Lemma 4. 0d is associative. Proof. For any a, b, c E Z we have a 0 (b 0 e) = a 0 [be] = a 0 be = [a(be)] = [(ab)e] = ab 0 e = lab] 0 e = (a 0 b) 0 e. (Besides the definition of 0, we have used the associativity of ordinary multiplication and Lemma 2. Where? The reader is expected, of course, to supply an explicit justification for each equality asserted in each proof.) Note there is no 0-identity "e" in Z since e 0 a = a is impossible if a 2: d (since e 0 a = [ea]d < d ~ a by the definition of a remainder when an integer is divided by d). Hence it does not make sense in this context to talk about 0-inverses. In the next section we will modify our setting to allow there to be a 0-identity and some 0-inverses. 2 Exercises 1. What is the remainder when -13 is divided by 5? 2. Let m be a positive integer. What can you say about [O]m and [mh? How about [-I]m? 3. Prove Corollary Compute [73,651]6 and [64,129]6 and 73, , Define an operation EBd on Z by setting aebdb = [a+b]d for all a, be Z. State and prove analogues of Lemmas 1, 2, 4 and Corollary 3 with 0d replaced by EBd. 6. Does 0d distribute over EBd? That is, is it true or false that for all choices of a, b, c in Z we have a0(bebe) = (a0b)eb(a0e)? 8

9 7. Let a, b, c E Z. (i) Suppose a 8d b = a 8d c. Can we conclude that b = c? that [b]d = [C]d? (ii) Suppose ae8db = ae8dc. Can we conclude tht b = c? that [b]d = [C]d? 8. Does 8d distribute over ordinary addition? Does ordinary multiplication distribute over EBd? (We sayan operation l!.. on S distributes over an operation \J on S if for all a, b, c in S, a6.(b \J c) = (al!..b) \l (al!..c). See Exercise 6.) 3 Inverses and Powers. Let us fix an integer d> 1, and let 8 and [ ] abbreviate 8d and [ ]d. Let n be an integer greater than 1. We set ai!:. = a 8 a 8 8 a (nfactors). We put the bar under the exponent n so as not to confuse ai!:. with the usual power an = a a.... a (n factors). Observe that the notation "ai!:." depends on the choice of d. When there is any danger of confusion we will write out the product a 8d'" 8d a. Lemma 5. For a and n as above, [an] = ai!:.. Proof. We will use mathematical induction. For n = 2 we have a~ = a 8 a = [a 2 ] by our definitions. Now suppose [an] = ai!:. for any n ~ 2. Then a n + 1 = a 8 ai!:. = a 8 [an] = a 8 an = [a an] = [a n + 1 ]. (We have used our induction hypothesis and Lemma 2 above. Where exactly?) Thus [an] = ai!:. for all integers n ~ 2. Lemma 6. Say a, b E Z and [a] = [b]. Then for any n ~ 2, we have [an] = [b n ]. Proof. [an] = ai!:. = [ali!:. = [b]i!:. = [b n ]. (If the second equality above bothers you, see exercise 1 below.) 9

10 Innocent looking as it is, the last lemma lets us do some spectacular computations. Here are a few examples. 1. Find the remainder when is divided by 7. Solution. [36h = 1 = [lh, so [361027h = [ h = 1. Done! 2. What is the remainder when is divided by 120? Solution. [11 2 h20 = [12110h20 = [1 10 h20 = 1 since 11 2 = 121 has remainder 1 when divided by Show has 37 as a factor. Solution. Note [-lh7 = 36 = [36h7' so [ h7 = [( -1) 1027 h7= [-lh7 = 36. Thus for some integer q, = 37q + 36, so = 37q. That is, 37 is a factor of We have used the following terminology above. If a, b E Z, then we say a is a factor of b ifthere is an integer c with b = ac. Note that the definition ofremainders says r is a remainder when b is divided by d if and only if 0 :S r < d and d is a factor of b - r. As remarked at the end of 2, 0 has no identity. This "defect" can be remedied as follows. Set 1= I d = {O, 1,2,...,d - I}. (We will use the subscript when necessary for clarity, especially in concrete exampies.) Note [a] E I for all a E Z. Thus a 0 bel for all a, bel. Hence we may regard 0 as being an operation only on I, and we adopt this point of view for the rest of this section. With this understanding we have the following. Lemma 7. There is an 0 -identity (considering 0 as an operation on I), namely 10

11 1. Proof. For all a E I, a = [a 1] = a 01 = 10 a. Thus 1 is a 0-identity. Now we let J = J d denote the set of members of I = Id which have 0-inverses. Lemma 8. 1 E J, and if a E J and b E J, then a 8 b E J. Proof = 1, so 1 is its own 0-inverse. If a and b have 0-inverses c and d, respectively, then d 0 c is a 0-inverse for a 0 b and hence a 0 b E J, since (d 0 c) 0 (a 0 b) = d 0 (c 0 a) 8 b = d 818 b = d 0 b = 1. Note Lemma 8 implies that all E J whenever a E J and 1 < n E Z. Euler's Theorem. Let i.p = i.p(d) denote the number of elements in J d and suppose a E Jd. Then a'. = [acp] = 1. Proof. Suppose e is the 0-inverse of a. Let (1) be the i.p members of Jd. Consider the list (2) a 8 b1,a 0 b 2,...,a 0 bcp. For any index i :::; i.p, e 0 b i equals b j for some j :::; i.p and hence a 0 b j = a 0 e 0 b i = 1 0 bi = bi. Thus the list (2) is just a rearrangement of the list (1). Hence if 9 is the 8-inverse of b bcp then 1 = 9 8 (b bcp) = 9 0 ((a 8 b 1 ) 8 (a 8 b 2 )... (a 8 bcp)) = 9 0 (b bcp) 0 a'. = 10 acp = acp. 11

12 With Lemma 5, this completes the proof. Note we have used the associativity and commutativity of 8 implicitly and repeatedly! The above result is fundamental in number theory and group theory. It does raise some questions: which elements of Id have 8-inverses and how many are there (i.e., what is r.p = r.p(d))? Both these questions are discussed in the exercises. Here is an application of Euler's theorem of both historical and commercial interest. Rivest - Shamir - Adleman public cipher system. We study a family of encryption systems (i.e., "secret codes"). To set up such a code pick two large prime numbers, say p and q. Let d = pq and m = r.p(pq). Pick members sand t of J m which are 8 m -inverses of each other. The messages to be sent are members of J d. To encode an element a of J d replace it by [as]d. To decode a coded message b, we replace it by W]d. Why does the above system work? Note s 8 m t = 1 so there exists q E Z with st = qm + 1. Hence if a E h and b = [as]d, then by Lemma 5 By Euler's Theorem then, W]d = Ii 8 a = 1 8 a = a. This proves the decoding process works! (If the manipulation of exponents above seems questionable, see Exercise 5 below.) Notice that to encode, one needs to know d and s, but not t. It turns out that if the code is set up properly then knowledge of d and s does not enable a person 12

13 to compute t. (More precisely, one can find t in principle, but not in practice because the computing time to do so is measured at least in millenia.) This means that the coding procedure can be made public without compromising the secrecy of the decoding method. For more discussion of the code and its many possible applications one might consult M. Gardner's "Mathematical Games" column in volume 237 (August, 1977) of the Scientific American. This article was the first announcing this encryption method; it caused a large stir in the intelligence community since, unlike any earlier code capable of handling a large volume of secure communications, it appeared unbreakable. 3 Exercises 1. Prove by induction the second equality in the proof of Lemma Find the remainder when (a) is divided by 7; (b) is divided by 7; (c) is divided by 7 (hint: [2317 = 1). 3. Show 8 is a factor of Show 7 is a factor of (738)(657) Let us extend our notation for all (which was defined only for n > 1) by setting a 1 = [ak Prove by induction that for all positive integers m and n, a=+n = a=0ail and (a=)il = a!i!:!3:... (We assume here a fixed choice of d.) 6. Note that EBd gives an operation on I d. Find a EBd-identity and show every element of I d has a EBd-inverse. (Note the case d = 4 was done in problem 1 of 1.) 7. Call integers a and b strangers if 1 is the only positive integer which is a factor 13

14 of both a and b. Prove that if 1 < d E Z and a E Z, then a and d are strangers if and only if [a]d has a 8d-inverse. (Outline. First suppose a has a 8d-inverse, say b. Then there exists q E Z with ab = qd + 1; deduce that a and d are strangers. Conversely, suppose a and d are strangers. The set S of positive integers of the form ax + dy (x, Y E Z) is nonempty. For some x, y E Z, ax + dy is the smallest member of S. By the Basic Remainder Theorem of 2, there exist q, r E Z with o ~ r < ax+by and a = q(ax+dy)+r. Thus 0 ~ r = (l-qx)a+(-qy)d < ax+by, so r = O. Thus ax + by is a factor of a, and, similarly, of d. Thus ax + dy = 1, so [X]d is a 8-inverse for a.) The next exercises apply exercise Find <p(2), <p(4), <p(8). Generalize. 9. Find <p(3), <p(5), <p(7), <p(ll). Generalize. 10. You may assume p = 1997 and p = 1999 are both prime numbers. Show <p(pq) = <p(p)<p(q). Conclude that #Jpq/#Ipq ~.999. (I.e., most elements of I pq have 8 pq -inverses. Here "#S" denotes the number of elements in the set S.) 11. Suppose a and b are positive integers. Show a and b are strangers if and only if a and [b]a are strangers. Repeated application of Exercise 11 gives a good method for determining whether two positive integers are strangers. For example, 1381 and 457 are strangers if and only if 10 (= [1381]457) and 457 are strangers, and this happens if and only if 7 = [457]10 and 10 are strangers, which they clearly are (the positive factors of 7 are 1 and 7, while those of 10 are 1, 2, 5 and 10). 12. Use the above method to tell if 1657 and 331 are strangers, and if 723 and 3693 are strangers. 14

15 13. Does 331 have a inverse? Does 723 have a inverse? 14. Prove Fermat's Theorem: If p is a prime number and a E Z, then p is a factor of a P - a. (HINT: Consider separately the cases when p is, or is not, a factor of a.) 15. Suppose a Rivest-Shamir-Adleman code is set up with p = 5, q = 179, s = 31 and t = 23. What is the coded form of the message "2"? (It may help to note that 2 10 = 1024.) Now decode your coded message and make sure you get 2 back. (This should only take 7 multiplications.) A last note on terminology. The relation we have called being "strangers" (taken from French usage) is usually called being "relatively prime". The function <p is called the Euler phi-function. Our "basic remainder theorem" is usually called the "division algorithm", although it is a fact and not an algorithm. 15

2 Arithmetic. 2.1 Greatest common divisors. This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}.

2 Arithmetic. 2.1 Greatest common divisors. This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}. 2 Arithmetic This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}. (See [Houston, Chapters 27 & 28]) 2.1 Greatest common divisors Definition 2.16. If a, b are integers, we say

More information

THE RSA ENCRYPTION SCHEME

THE RSA ENCRYPTION SCHEME THE RSA ENCRYPTION SCHEME Contents 1. The RSA Encryption Scheme 2 1.1. Advantages over traditional coding methods 3 1.2. Proof of the decoding procedure 4 1.3. Security of the RSA Scheme 4 1.4. Finding

More information

MODULAR ARITHMETIC KEITH CONRAD

MODULAR ARITHMETIC KEITH CONRAD MODULAR ARITHMETIC KEITH CONRAD. Introduction We will define the notion of congruent integers (with respect to a modulus) and develop some basic ideas of modular arithmetic. Applications of modular arithmetic

More information

Number Theory A focused introduction

Number Theory A focused introduction Number Theory A focused introduction This is an explanation of RSA public key cryptography. We will start from first principles, but only the results that are needed to understand RSA are given. We begin

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

19. Coding for Secrecy

19. Coding for Secrecy 19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,

More information

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1). 1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not

More information

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Numbers modulo n. We have previously seen examples of clock arithmetic, an algebraic system with only finitely many numbers. In this lecture, we make

More information

Mathematical Reasoning & Proofs

Mathematical Reasoning & Proofs Mathematical Reasoning & Proofs MAT 1362 Fall 2018 Alistair Savage Department of Mathematics and Statistics University of Ottawa This work is licensed under a Creative Commons Attribution-ShareAlike 4.0

More information

3 The language of proof

3 The language of proof 3 The language of proof After working through this section, you should be able to: (a) understand what is asserted by various types of mathematical statements, in particular implications and equivalences;

More information

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points.

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. Math 152, Problem Set 2 solutions (2018-01-24) All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. 1. Let us look at the following equation: x 5 1

More information

Discrete Mathematics GCD, LCM, RSA Algorithm

Discrete Mathematics GCD, LCM, RSA Algorithm Discrete Mathematics GCD, LCM, RSA Algorithm Abdul Hameed http://informationtechnology.pk/pucit abdul.hameed@pucit.edu.pk Lecture 16 Greatest Common Divisor 2 Greatest common divisor The greatest common

More information

Scott Taylor 1. EQUIVALENCE RELATIONS. Definition 1.1. Let A be a set. An equivalence relation on A is a relation such that:

Scott Taylor 1. EQUIVALENCE RELATIONS. Definition 1.1. Let A be a set. An equivalence relation on A is a relation such that: Equivalence MA Relations 274 and Partitions Scott Taylor 1. EQUIVALENCE RELATIONS Definition 1.1. Let A be a set. An equivalence relation on A is a relation such that: (1) is reflexive. That is, (2) is

More information

Finite Fields and Error-Correcting Codes

Finite Fields and Error-Correcting Codes Lecture Notes in Mathematics Finite Fields and Error-Correcting Codes Karl-Gustav Andersson (Lund University) (version 1.013-16 September 2015) Translated from Swedish by Sigmundur Gudmundsson Contents

More information

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics A Guide To RSA by Robert Yates. Topics Introduction...01/09 What is RSA...01/09 Mod-Exponentiation...02/09 Euler's Theorem...03/09 RSA Algorithm...08/09 RSA Security...09/09 Introduction Welcome to my

More information

32 Divisibility Theory in Integral Domains

32 Divisibility Theory in Integral Domains 3 Divisibility Theory in Integral Domains As we have already mentioned, the ring of integers is the prototype of integral domains. There is a divisibility relation on * : an integer b is said to be divisible

More information

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z:

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z: NUMBER SYSTEMS Number theory is the study of the integers. We denote the set of integers by Z: Z = {..., 3, 2, 1, 0, 1, 2, 3,... }. The integers have two operations defined on them, addition and multiplication,

More information

Beautiful Mathematics

Beautiful Mathematics Beautiful Mathematics 1. Principle of Mathematical Induction The set of natural numbers is the set of positive integers {1, 2, 3,... } and is denoted by N. The Principle of Mathematical Induction is a

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

2.2 Inverses and GCDs

2.2 Inverses and GCDs 34 CHAPTER 2. CRYPTOGRAPHY AND NUMBER THEORY 2.2 Inverses and GCDs 2.2.1 Inverses mod p In the last section we explored the multiplication in Z n. We saw in the special case with n =12 and a = 4 that if

More information

THE CUBIC PUBLIC-KEY TRANSFORMATION*

THE CUBIC PUBLIC-KEY TRANSFORMATION* CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2007) VOL. 26, NO. 3, 2007, PP. 353 359 DOI: 10.1007/s00034-006-0309-x THE CUBIC PUBLIC-KEY TRANSFORMATION* Subhash Kak 1 Abstract. This note proposes

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

A Guide to Arithmetic

A Guide to Arithmetic A Guide to Arithmetic Robin Chapman August 5, 1994 These notes give a very brief resumé of my number theory course. Proofs and examples are omitted. Any suggestions for improvements will be gratefully

More information

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2 Contents 1 Recommended Reading 1 2 Public Key/Private Key Cryptography 1 2.1 Overview............................................. 1 2.2 RSA Algorithm.......................................... 2 3 A Number

More information

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL NUMBER THEORY AND CODES Álvaro Pelayo WUSTL Talk Goal To develop codes of the sort can tell the world how to put messages in code (public key cryptography) only you can decode them Structure of Talk Part

More information

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS 1 C Theme : Cryptography Instructor : Prof. C Pandu Rangan Speaker : Arun Moorthy 93115 CS 2 RSA Cryptosystem Outline of the Talk! Introduction to RSA! Working of the RSA system and associated terminology!

More information

Clock Arithmetic and Euclid s Algorithm

Clock Arithmetic and Euclid s Algorithm Clock Arithmetic and Euclid s Algorithm Lecture notes for Access 2008 by Erin Chamberlain. Earlier we discussed Caesar Shifts and other substitution ciphers, and we saw how easy it was to break these ciphers

More information

Theory of Computation Chapter 12: Cryptography

Theory of Computation Chapter 12: Cryptography Theory of Computation Chapter 12: Cryptography Guan-Shieng Huang Dec. 20, 2006 0-0 Introduction Alice wants to communicate with Bob secretely. x Alice Bob John Alice y=e(e,x) y Bob y??? John Assumption

More information

10 Modular Arithmetic and Cryptography

10 Modular Arithmetic and Cryptography 10 Modular Arithmetic and Cryptography 10.1 Encryption and Decryption Encryption is used to send messages secretly. The sender has a message or plaintext. Encryption by the sender takes the plaintext and

More information

Section 1.3 Review of Complex Numbers

Section 1.3 Review of Complex Numbers 1 Section 1. Review of Complex Numbers Objective 1: Imaginary and Complex Numbers In Science and Engineering, such quantities like the 5 occur all the time. So, we need to develop a number system that

More information

MATH Mathematics for Agriculture II

MATH Mathematics for Agriculture II MATH 10240 Mathematics for Agriculture II Academic year 2018 2019 UCD School of Mathematics and Statistics Contents Chapter 1. Linear Algebra 1 1. Introduction to Matrices 1 2. Matrix Multiplication 3

More information

INTEGERS. In this section we aim to show the following: Goal. Every natural number can be written uniquely as a product of primes.

INTEGERS. In this section we aim to show the following: Goal. Every natural number can be written uniquely as a product of primes. INTEGERS PETER MAYR (MATH 2001, CU BOULDER) In this section we aim to show the following: Goal. Every natural number can be written uniquely as a product of primes. 1. Divisibility Definition. Let a, b

More information

Chapter 5. Number Theory. 5.1 Base b representations

Chapter 5. Number Theory. 5.1 Base b representations Chapter 5 Number Theory The material in this chapter offers a small glimpse of why a lot of facts that you ve probably nown and used for a long time are true. It also offers some exposure to generalization,

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

1 Overview and revision

1 Overview and revision MTH6128 Number Theory Notes 1 Spring 2018 1 Overview and revision In this section we will meet some of the concerns of Number Theory, and have a brief revision of some of the relevant material from Introduction

More information

Elementary Properties of the Integers

Elementary Properties of the Integers Elementary Properties of the Integers 1 1. Basis Representation Theorem (Thm 1-3) 2. Euclid s Division Lemma (Thm 2-1) 3. Greatest Common Divisor 4. Properties of Prime Numbers 5. Fundamental Theorem of

More information

2. Two binary operations (addition, denoted + and multiplication, denoted

2. Two binary operations (addition, denoted + and multiplication, denoted Chapter 2 The Structure of R The purpose of this chapter is to explain to the reader why the set of real numbers is so special. By the end of this chapter, the reader should understand the difference between

More information

Number Theory Notes Spring 2011

Number Theory Notes Spring 2011 PRELIMINARIES The counting numbers or natural numbers are 1, 2, 3, 4, 5, 6.... The whole numbers are the counting numbers with zero 0, 1, 2, 3, 4, 5, 6.... The integers are the counting numbers and zero

More information

Sect Complex Numbers

Sect Complex Numbers 161 Sect 10.8 - Complex Numbers Concept #1 Imaginary Numbers In the beginning of this chapter, we saw that the was undefined in the real numbers since there is no real number whose square is equal to a

More information

Encryption: The RSA Public Key Cipher

Encryption: The RSA Public Key Cipher Encryption: The RSA Public Key Cipher Michael Brockway March 5, 2018 Overview Transport-layer security employs an asymmetric public cryptosystem to allow two parties (usually a client application and a

More information

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups Great Theoretical Ideas in CS V. Adamchik CS 15-251 Upcoming Interview? Lecture 24 Carnegie Mellon University Cryptography and RSA How the World's Smartest Company Selects the Most Creative Thinkers Groups

More information

2 Lecture 2: Logical statements and proof by contradiction Lecture 10: More on Permutations, Group Homomorphisms 31

2 Lecture 2: Logical statements and proof by contradiction Lecture 10: More on Permutations, Group Homomorphisms 31 Contents 1 Lecture 1: Introduction 2 2 Lecture 2: Logical statements and proof by contradiction 7 3 Lecture 3: Induction and Well-Ordering Principle 11 4 Lecture 4: Definition of a Group and examples 15

More information

The Integers. Math 3040: Spring Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers Multiplying integers 12

The Integers. Math 3040: Spring Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers Multiplying integers 12 Math 3040: Spring 2011 The Integers Contents 1. The Basic Construction 1 2. Adding integers 4 3. Ordering integers 11 4. Multiplying integers 12 Before we begin the mathematics of this section, it is worth

More information

Math 5330 Spring Notes Congruences

Math 5330 Spring Notes Congruences Math 5330 Spring 2018 Notes Congruences One of the fundamental tools of number theory is the congruence. This idea will be critical to most of what we do the rest of the term. This set of notes partially

More information

Discrete mathematics I - Number theory

Discrete mathematics I - Number theory Discrete mathematics I - Number theory Emil Vatai (based on hungarian slides by László Mérai) 1 January 31, 2018 1 Financed from the financial support ELTE won from the Higher Education

More information

COMP424 Computer Security

COMP424 Computer Security COMP424 Computer Security Prof. Wiegley jeffw@csun.edu Rivest, Shamir & Adelman (RSA) Implementation 1 Relatively prime Prime: n, is prime if its only two factors are 1 and n. (and n 1). Relatively prime:

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 15 3/20/08 CIS/TCOM 551 1 Announcements Project 3 available on the web. Get the handout in class today. Project 3 is due April 4th It

More information

Mathematics of Cryptography

Mathematics of Cryptography UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms

More information

Introducing Proof 1. hsn.uk.net. Contents

Introducing Proof 1. hsn.uk.net. Contents Contents 1 1 Introduction 1 What is proof? 1 Statements, Definitions and Euler Diagrams 1 Statements 1 Definitions Our first proof Euler diagrams 4 3 Logical Connectives 5 Negation 6 Conjunction 7 Disjunction

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Number Theory. Introduction

Number Theory. Introduction Number Theory Introduction Number theory is the branch of algebra which studies the properties of the integers. While we may from time to time use real or even complex numbers as tools to help us study

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Powers in Modular Arithmetic, and RSA Public Key Cryptography

Powers in Modular Arithmetic, and RSA Public Key Cryptography 1 Powers in Modular Arithmetic, and RSA Public Key Cryptography Lecture notes for Access 2006, by Nick Korevaar. It was a long time from Mary Queen of Scotts and substitution ciphers until the end of the

More information

The Integers. Peter J. Kahn

The Integers. Peter J. Kahn Math 3040: Spring 2009 The Integers Peter J. Kahn Contents 1. The Basic Construction 1 2. Adding integers 6 3. Ordering integers 16 4. Multiplying integers 18 Before we begin the mathematics of this section,

More information

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element. The first exam will be on Monday, June 8, 202. The syllabus will be sections. and.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive squaring

More information

Week 7 An Application to Cryptography

Week 7 An Application to Cryptography SECTION 9. EULER S GENERALIZATION OF FERMAT S THEOREM 55 Week 7 An Application to Cryptography Cryptography the study of the design and analysis of mathematical techniques that ensure secure communications

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

18 Divisibility. and 0 r < d. Lemma Let n,d Z with d 0. If n = qd+r = q d+r with 0 r,r < d, then q = q and r = r.

18 Divisibility. and 0 r < d. Lemma Let n,d Z with d 0. If n = qd+r = q d+r with 0 r,r < d, then q = q and r = r. 118 18. DIVISIBILITY 18 Divisibility Chapter V Theory of the Integers One of the oldest surviving mathematical texts is Euclid s Elements, a collection of 13 books. This book, dating back to several hundred

More information

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY In this meeting we go through the foundations of modular arithmetic. Before the meeting it is assumed that you have watched the videos and worked

More information

Peter Kahn. Spring 2007

Peter Kahn. Spring 2007 MATH 304: CONSTRUCTING THE REAL NUMBERS Peter Kahn Spring 2007 Contents 1 The Natural Numbers 1 1.1 The Peano Axioms............................ 2 1.2 Proof by induction............................ 4 1.3

More information

Math 511, Algebraic Systems, Fall 2017 July 20, 2017 Edition. Todd Cochrane

Math 511, Algebraic Systems, Fall 2017 July 20, 2017 Edition. Todd Cochrane Math 511, Algebraic Systems, Fall 2017 July 20, 2017 Edition Todd Cochrane Department of Mathematics Kansas State University Contents Notation v Chapter 0. Axioms for the set of Integers Z. 1 Chapter 1.

More information

REVIEW Chapter 1 The Real Number System

REVIEW Chapter 1 The Real Number System REVIEW Chapter The Real Number System In class work: Complete all statements. Solve all exercises. (Section.4) A set is a collection of objects (elements). The Set of Natural Numbers N N = {,,, 4, 5, }

More information

CS483 Design and Analysis of Algorithms

CS483 Design and Analysis of Algorithms CS483 Design and Analysis of Algorithms Lectures 2-3 Algorithms with Numbers Instructor: Fei Li lifei@cs.gmu.edu with subject: CS483 Office hours: STII, Room 443, Friday 4:00pm - 6:00pm or by appointments

More information

= 5 2 and = 13 2 and = (1) = 10 2 and = 15 2 and = 25 2

= 5 2 and = 13 2 and = (1) = 10 2 and = 15 2 and = 25 2 BEGINNING ALGEBRAIC NUMBER THEORY Fermat s Last Theorem is one of the most famous problems in mathematics. Its origin can be traced back to the work of the Greek mathematician Diophantus (third century

More information

Direct Proof MAT231. Fall Transition to Higher Mathematics. MAT231 (Transition to Higher Math) Direct Proof Fall / 24

Direct Proof MAT231. Fall Transition to Higher Mathematics. MAT231 (Transition to Higher Math) Direct Proof Fall / 24 Direct Proof MAT231 Transition to Higher Mathematics Fall 2014 MAT231 (Transition to Higher Math) Direct Proof Fall 2014 1 / 24 Outline 1 Overview of Proof 2 Theorems 3 Definitions 4 Direct Proof 5 Using

More information

1. Factorization Divisibility in Z.

1. Factorization Divisibility in Z. 8 J. E. CREMONA 1.1. Divisibility in Z. 1. Factorization Definition 1.1.1. Let a, b Z. Then we say that a divides b and write a b if b = ac for some c Z: a b c Z : b = ac. Alternatively, we may say that

More information

FACTORIZATION AND THE PRIMES

FACTORIZATION AND THE PRIMES I FACTORIZATION AND THE PRIMES 1. The laws of arithmetic The object of the higher arithmetic is to discover and to establish general propositions concerning the natural numbers 1, 2, 3,... of ordinary

More information

PRIME NUMBERS YANKI LEKILI

PRIME NUMBERS YANKI LEKILI PRIME NUMBERS YANKI LEKILI We denote by N the set of natural numbers: 1,2,..., These are constructed using Peano axioms. We will not get into the philosophical questions related to this and simply assume

More information

ALGEBRA II: RINGS AND MODULES OVER LITTLE RINGS.

ALGEBRA II: RINGS AND MODULES OVER LITTLE RINGS. ALGEBRA II: RINGS AND MODULES OVER LITTLE RINGS. KEVIN MCGERTY. 1. RINGS The central characters of this course are algebraic objects known as rings. A ring is any mathematical structure where you can add

More information

Instructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test

Instructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test Introduction to Algorithms (CS 482) Cornell University Instructor: Bobby Kleinberg Lecture Notes, 25 April 2008 The Miller-Rabin Randomized Primality Test 1 Introduction Primality testing is an important

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

Introduction to Number Theory. The study of the integers

Introduction to Number Theory. The study of the integers Introduction to Number Theory The study of the integers of Integers, The set of integers = {... 3, 2, 1, 0, 1, 2, 3,...}. In this lecture, if nothing is said about a variable, it is an integer. Def. We

More information

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic 11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic Bezout s Lemma Let's look at the values of 4x + 6y when x and y are integers. If x is -6 and y is 4 we

More information

A Readable Introduction to Real Mathematics

A Readable Introduction to Real Mathematics Solutions to selected problems in the book A Readable Introduction to Real Mathematics D. Rosenthal, D. Rosenthal, P. Rosenthal Chapter 7: The Euclidean Algorithm and Applications 1. Find the greatest

More information

Advanced Calculus: MATH 410 Real Numbers Professor David Levermore 5 December 2010

Advanced Calculus: MATH 410 Real Numbers Professor David Levermore 5 December 2010 Advanced Calculus: MATH 410 Real Numbers Professor David Levermore 5 December 2010 1. Real Number System 1.1. Introduction. Numbers are at the heart of mathematics. By now you must be fairly familiar with

More information

Number Theory and Group Theoryfor Public-Key Cryptography

Number Theory and Group Theoryfor Public-Key Cryptography Number Theory and Group Theory for Public-Key Cryptography TDA352, DIT250 Wissam Aoudi Chalmers University of Technology November 21, 2017 Wissam Aoudi Number Theory and Group Theoryfor Public-Key Cryptography

More information

Math 016 Lessons Wimayra LUY

Math 016 Lessons Wimayra LUY Math 016 Lessons Wimayra LUY wluy@ccp.edu MATH 016 Lessons LESSON 1 Natural Numbers The set of natural numbers is given by N = {0, 1, 2, 3, 4...}. Natural numbers are used for two main reasons: 1. counting,

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

Ma/CS 6a Class 2: Congruences

Ma/CS 6a Class 2: Congruences Ma/CS 6a Class 2: Congruences 1 + 1 5 (mod 3) By Adam Sheffer Reminder: Public Key Cryptography Idea. Use a public key which is used for encryption and a private key used for decryption. Alice encrypts

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor RSA Public Key Encryption Factoring Algorithms Lecture 7 Tel-Aviv University Revised March 1st, 2008 Reminder: The Prime Number Theorem Let π(x) denote the

More information

CSE 215: Foundations of Computer Science Recitation Exercises Set #5 Stony Brook University. Name: ID#: Section #: Score: / 4

CSE 215: Foundations of Computer Science Recitation Exercises Set #5 Stony Brook University. Name: ID#: Section #: Score: / 4 CSE 215: Foundations of Computer Science Recitation Exercises Set #5 Stony Brook University Name: ID#: Section #: Score: / 4 Unit 10: Proofs by Contradiction and Contraposition 1. Prove the following statement

More information

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples

More information

1. multiplication is commutative and associative;

1. multiplication is commutative and associative; Chapter 4 The Arithmetic of Z In this chapter, we start by introducing the concept of congruences; these are used in our proof (going back to Gauss 1 ) that every integer has a unique prime factorization.

More information

MATHEMATICS EXTENDED ESSAY

MATHEMATICS EXTENDED ESSAY MATHEMATICS EXTENDED ESSAY How does the RSA algorithm function and why is it used in modern communication? Candidate Name: Murtuza Kainan Candidate Session Number: 003077006 Word Count: 3908 1 P a g e

More information

MTH 05 Lecture Notes. Andrew McInerney

MTH 05 Lecture Notes. Andrew McInerney MTH 05 Lecture Notes Andrew McInerney Fall 2016 c 2016 Andrew McInerney All rights reserved. This work may be distributed and/or modified under the conditions of the Copyleft License. Andrew McInerney

More information

Solution Set 2. Problem 1. [a] + [b] = [a + b] = [b + a] = [b] + [a] ([a] + [b]) + [c] = [a + b] + [c] = [a + b + c] = [a] + [b + c] = [a] + ([b + c])

Solution Set 2. Problem 1. [a] + [b] = [a + b] = [b + a] = [b] + [a] ([a] + [b]) + [c] = [a + b] + [c] = [a + b + c] = [a] + [b + c] = [a] + ([b + c]) Solution Set Problem 1 (1) Z/nZ is the set of equivalence classes of Z mod n. Equivalence is determined by the following rule: [a] = [b] if and only if b a = k n for some k Z. The operations + and are

More information

Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics Lecture notes in progress (27 March 2010)

Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics Lecture notes in progress (27 March 2010) http://math.sun.ac.za/amsc/sam Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics 2009-2010 Lecture notes in progress (27 March 2010) Contents 2009 Semester I: Elements 5 1. Cartesian product

More information

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers ALGEBRA CHRISTIAN REMLING 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers by Z = {..., 2, 1, 0, 1,...}. Given a, b Z, we write a b if b = ac for some

More information

WORKSHEET ON NUMBERS, MATH 215 FALL. We start our study of numbers with the integers: N = {1, 2, 3,...}

WORKSHEET ON NUMBERS, MATH 215 FALL. We start our study of numbers with the integers: N = {1, 2, 3,...} WORKSHEET ON NUMBERS, MATH 215 FALL 18(WHYTE) We start our study of numbers with the integers: Z = {..., 2, 1, 0, 1, 2, 3,... } and their subset of natural numbers: N = {1, 2, 3,...} For now we will not

More information

Groups. 3.1 Definition of a Group. Introduction. Definition 3.1 Group

Groups. 3.1 Definition of a Group. Introduction. Definition 3.1 Group C H A P T E R t h r e E Groups Introduction Some of the standard topics in elementary group theory are treated in this chapter: subgroups, cyclic groups, isomorphisms, and homomorphisms. In the development

More information

C.T.Chong National University of Singapore

C.T.Chong National University of Singapore NUMBER THEORY AND THE DESIGN OF FAST COMPUTER ALGORITHMS C.T.Chong National University of Singapore The theory of numbers has long been considered to be among the purest of pure mathematics. Gauss ( 1777-1855)

More information

Senior Math Circles Cryptography and Number Theory Week 2

Senior Math Circles Cryptography and Number Theory Week 2 Senior Math Circles Cryptography and Number Theory Week 2 Dale Brydon Feb. 9, 2014 1 Divisibility and Inverses At the end of last time, we saw that not all numbers have inverses mod n, but some do. We

More information

WORKSHEET MATH 215, FALL 15, WHYTE. We begin our course with the natural numbers:

WORKSHEET MATH 215, FALL 15, WHYTE. We begin our course with the natural numbers: WORKSHEET MATH 215, FALL 15, WHYTE We begin our course with the natural numbers: N = {1, 2, 3,...} which are a subset of the integers: Z = {..., 2, 1, 0, 1, 2, 3,... } We will assume familiarity with their

More information

Olympiad Number Theory Through Challenging Problems

Olympiad Number Theory Through Challenging Problems Olympiad Number Theory Justin Stevens Page 1 Olympiad Number Theory Through Challenging Problems Authors Justin Stevens Editor and L A TEX Manager David Altizio Dedicated to my sister. Justin Contents

More information

Math /Foundations of Algebra/Fall 2017 Foundations of the Foundations: Proofs

Math /Foundations of Algebra/Fall 2017 Foundations of the Foundations: Proofs Math 4030-001/Foundations of Algebra/Fall 017 Foundations of the Foundations: Proofs A proof is a demonstration of the truth of a mathematical statement. We already know what a mathematical statement is.

More information

Lecture 4: Constructing the Integers, Rationals and Reals

Lecture 4: Constructing the Integers, Rationals and Reals Math/CS 20: Intro. to Math Professor: Padraic Bartlett Lecture 4: Constructing the Integers, Rationals and Reals Week 5 UCSB 204 The Integers Normally, using the natural numbers, you can easily define

More information

The RSA cryptosystem and primality tests

The RSA cryptosystem and primality tests Mathematics, KTH Bengt Ek November 2015 Supplementary material for SF2736, Discrete mathematics: The RSA cryptosystem and primality tests Secret codes (i.e. codes used to make messages unreadable to outsiders

More information

Finite Mathematics : A Business Approach

Finite Mathematics : A Business Approach Finite Mathematics : A Business Approach Dr. Brian Travers and Prof. James Lampes Second Edition Cover Art by Stephanie Oxenford Additional Editing by John Gambino Contents What You Should Already Know

More information