Example 2: Student work M ATHS COURSEWORK. Mathematics SL and HL teacher support material 1. Proving Euler s Totient Theorem

Similar documents
Math.3336: Discrete Mathematics. Mathematical Induction

Congruence Classes. Number Theory Essentials. Modular Arithmetic Systems

For your quiz in recitation this week, refer to these exercise generators:

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory A focused introduction

MATH 3240Q Introduction to Number Theory Homework 5

Navrachana International School, Vadodara

[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives

Public Key Cryptography

Number Theory and Group Theoryfor Public-Key Cryptography

10 Modular Arithmetic and Cryptography

2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.

Number Theory. Modular Arithmetic

Number Theory and Algebra: A Brief Introduction

The security of RSA (part 1) The security of RSA (part 1)

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

CPSC 467b: Cryptography and Computer Security

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively

AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION

Ma/CS 6a Class 3: The RSA Algorithm

MATHEMATICS EXTENDED ESSAY

CIS 551 / TCOM 401 Computer and Network Security

CHAPTER 6. Prime Numbers. Definition and Fundamental Results

Week 7 An Application to Cryptography

Encryption: The RSA Public Key Cipher

An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p.

ECE 646 Lecture 9. RSA: Genesis, operation & security

Admin. ! Will post sample questions soon. 1. Choose a bit-length k. 2. Choose two primes p and q which can be represented with at most k bits

A proof of strong Goldbach conjecture and twin prime conjecture

Carmen s Core Concepts (Math 135)

Math From Scratch Lesson 20: The Chinese Remainder Theorem

Part IA Numbers and Sets

2 More on Congruences

Topics in Cryptography. Lecture 5: Basic Number Theory

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Mathematics of Cryptography

Introduction to Cryptography. Lecture 6

Solution to Midterm Examination

Beautiful Mathematics

Implementation Tutorial on RSA

MATH 361: NUMBER THEORY FOURTH LECTURE

9 Modular Exponentiation and Square-Roots

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

Discrete mathematics I - Number theory

CPSC 467b: Cryptography and Computer Security

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Chapter 8. Introduction to Number Theory

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

THE RSA ENCRYPTION SCHEME

Public-Key Cryptosystems CHAPTER 4

Applied Cryptography and Computer Security CSE 664 Spring 2018

C.T.Chong National University of Singapore

Introduction to Public-Key Cryptosystems:

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Congruence of Integers

Chapter 5. Modular arithmetic. 5.1 The modular ring

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Simple Math: Cryptography

Math 430 Midterm II Review Packet Spring 2018 SOLUTIONS TO PRACTICE PROBLEMS

Numbers. Çetin Kaya Koç Winter / 18

Some Facts from Number Theory

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Number Theory & Modern Cryptography

COMS W4995 Introduction to Cryptography September 29, Lecture 8: Number Theory

A Readable Introduction to Real Mathematics

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

A Guide to Arithmetic

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

a = mq + r where 0 r m 1.

Ma/CS 6a Class 2: Congruences

EULER S THEOREM KEITH CONRAD

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

10 Public Key Cryptography : RSA

ICS141: Discrete Mathematics for Computer Science I

MATH 145 Algebra, Solutions to Assignment 4

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS

CPSC 467: Cryptography and Computer Security

The Chinese Remainder Theorem

Wilson s Theorem and Fermat s Little Theorem

Part IA Numbers and Sets

MATH 25 CLASS 8 NOTES, OCT

basics of security/cryptography

Math 223, Spring 2009 Final Exam Solutions

Lecture 4: Number theory

A SURVEY OF PRIMALITY TESTS

An Introduction to Cryptography

Part I, Number Systems. CS131 Mathematics for Computer Scientists II Note 1 INTEGERS

Fall 2017 September 20, Written Homework 02

Mathematical Foundations of Public-Key Cryptography

ECE596C: Handout #11

Discrete Mathematics with Applications MATH236

Part II. Number Theory. Year

Basic Algebra and Number Theory. Nicolas T. Courtois - University College of London

CPSC 467: Cryptography and Computer Security

Powers in Modular Arithmetic, and RSA Public Key Cryptography

Ma/CS 6a Class 2: Congruences

Transcription:

M ATHS COURSEWORK Mathematics SL and HL teacher support material 1

TA B L E O F C O N T E N T S Maths Coursework 3 Introduction 3 The Theorem 3 Euler s Totient Function 3 Fermat s Little Theorem 4 Proving Fermat s Little Theorem 5 6 Applications 7 Conclusion 7 Mathematics SL and HL teacher support material 2

M ATHS COURSEWORK A Aim Introduction My interest in Euler as a mathematician was first sparked when, on completing a listener crossword, the hidden message Read Euler, he is the master of us all was revealed, so when I saw the inclusion of his name on the list of prompt words there was really no option but to go for him. Euler was a mathematician in the 18th century and is responsible for the first proofs of many great many number of conjectures and problems. In number theory alone his accomplishments include proving the two square theorem and Fermat s little theorem as well as doing a great deal of work that later led to the first proof of the four square theorem. His achievement that I am going to focus on though is less well known, it is a generalisation of Fermat s little theorem that has come to be known as Euler s totient theorem. A Introduction and rationale The Theorem Euler s totient theorem 1 states that for relatively prime a and n: Where Φn is Euler s totient function a Φn 1 (mod n) B Class knew about modular arithmetic, so this didn't need definition. Euler s Totient Function Euler s totient function 2, or Φn, is a count of the numbers that are less than n and relatively prime to n. For example Φ 10 is 4 as there are four number less than ten that are relatively prime to 10 { 1, 3, 7, 9 }, Φ 11 is 10 as 11 is prime all numbers less than it are relatively prime to it and Φ 6 is 2 as 1 and 5 are relatively prime to 6 but 2,3 and 4 are not. 1 http://en.wikipedia.org/wiki/euler's_theorem 2 http://mathworld.wolfram.com/totientfunction.html Mathematics SL and HL teacher support material 3

Below is a table of the totients of the numbers up to 20. B Small n in text. Condoned N Φ N 2 1 3 2 4 2 5 4 6 2 7 6 8 4 9 6 10 4 11 10 12 4 13 12 14 6 15 8 16 8 17 16 18 6 19 18 20 8 Some examples will serve to demonstrate Euler s totient theorem. Let n = 10 and a = 3. Note that 10 and 3 are relatively prime. From the table Φ 10 = 4. Then, 3 4 = 81 1(mod 10). Also, if n = 15 and a = 2 we see that 2 8 = 256 1 (mod 15). Fermat s Little Theorem Euler s totient theorem is a generalisation of Fermat s little theorem 3 and works for all n relatively prime to a. Fermat s little theorem only works for a and p relatively prime 3 http://mathworld.wolfram.com/fermatslittletheorem.html Mathematics SL and HL teacher support material 4

where p is itself prime and states: a p a (mod p) or a p-1 1 (mod p) It is immediately apparent that this fits in with Euler s totient theorem for primes p, as we have seen Φp, where p is a prime, is always p-1. As an introduction to Euler s totient theorem I shall prove Fermat s little theorem. Proving Fermat s Little Theorem RTP: a p a (mod p) Take two numbers a and p which are relatively prime, and where p itself is prime. Consider the set of the multiples of a { a, 2a, 3a, 4a, 5a... (p-1)a } Consider the set of numbers { 1, 2, 3, 4, 5... (p-1) } If taken to the modulus p each element of the first set will be congruent to an element in the second, there will be one to one correspondence between the two sets and this is proven as lemma 1. If we take the product of the first set { a x 2a x 3a x 4a x 5a... (p-1)a } and the product of the second { 1 x 2 x 3 x 4 x 5... (p-1) } we can see that they are congruent to one another (as each element in the first is congruent to an element in the second) Therefore { a x 2a x 3a x 4a x 5a... (p-1)a } { 1 x 2 x 3 x 4 x 5... (p-1) } (mod p) We can take out a factor of a p-1 from the left hand side Giving a p-1 { 1 x 2 x 3 x 4 x 5... (p-1) } { 1 x 2 x 3 x 4 x 5... (p-1) } (mod p) By dividing each side by { 1 x 2 x 3 x 4 x 5... (p-1) } which is valid as p is prime we get QED. a p-1 1 (mod p) or a p a (mod p) Mathematics SL and HL teacher support material 5

Lemma 1: Each number in the first set must be congruent to one and only one number in the second and each number in the second set must be congruent to one and only one number in the first. This may not be obvious at first but can be proved through three logical steps. (1) Each number in the first set must be congruent to one of the elements in the second as all possible congruences save 0 are present, none will be congruent to 0 as a and p are relatively prime. (2) A number cannot be congruent to two numbers in the second set as a number can only be congruent to numbers which differ by a multiple of p, as all elements of the second set are smaller than p a number can only be congruent to one of them. (3) No two numbers in the first set, call them ba and ca, can be congruent to the same number in the second. This would indicate that the two numbers were congruent to each other ba ca (mod p) which would indicate that b c (mod p) which is not true as they are both different and less than p itself. Therefore, through these three steps Lemma 1 is proven. As Fermat s little theorem is a special case of Euler s totient theorem (where n is prime) the two proofs are quite similar and in fact only slight adjustments need to be made to the proof of Fermat s little theorem to give you Euler s totient theorem 4. RTP: a Φn 1 (mod n) Take two numbers, a and n which are relatively prime Consider the set N of numbers that are relatively prime to n { 1, n 1, n 2...n Φn } This set will have Φn elements (Φn is defined as the number of numbers relatively prime to n) Consider the set an, where each element is the product of a and an element of N { a, an 1, an 2... an Φn } Each element in set an will be congruent to an element in set N (mod n), this is follows by the same argument as in lemma 1 and so the two sets will be congruent to each other Therefore { a x an 1 x an 2 x... x an Φn } { 1 x n 1 x n 2 x... x n Φn } (mod n) 4 http://planetmath.org/?op=getobj&from=objects&id=335 Mathematics SL and HL teacher support material 6

By taking out a factor of a Φn from the left hand side we get a Φn { 1 x n 1 x n 2 x... x n Φn } { 1 x n 1 x n 2 x... x n Φn } (mod n) If we then divide through by { 1 x n 1 x n 2 x... x n Φn } which is valid as all elements are relatively prime to n we get QED. a Φn 1 (mod n) A Complete. Achieves aim. Concise! Applications Unlike some of Euler s other work in number theory such as his proof of the two square theorem Euler s totient theorem has very real uses and applications in the world and like much of number theory those uses are almost exclusively in the world of cryptography and cryptanalysis. Both Fermat s little theorem and Euler s totient theorem are used in the encryption and decryption of data, specifically in the RSA encryption system 5, whose protection revolves around large prime numbers raised to large powers being difficult to factorise. Conclusion This theorem may not be Euler s most elegant piece of mathematics (my personal favourite is his proof of the two square theorem by infinite descent) or at the time seemed like his most important piece of work at the time but this, in number theory at least, is probably his most useful piece of mathematics to the world today. This proof has given me a chance to link up some of the work I have done in the largely separate discrete mathematics and sets relations and groups options. These two options appear to me to be the purest sections of mathematics that I have studied but are for whatever reason seldom linked in class, this project has allowed me to explore the links between them and use knowledge from one in relation to the other, broadening my view of maths. D Reflection. Linking mathematical ideas 5 http://www.muppetlabs.com/~breadbox/txt/rsa.html#7 A Conclusion C Personally involved Mathematics SL and HL teacher support material 7