Skip to content →

Tag: puzzle

Chinese remainders and adele classes

Oystein Ore mentions the following puzzle from Brahma-Sphuta-Siddhanta (Brahma’s Correct System) by Brahmagupta :

An old woman goes to market and a horse steps on her basket and crashes the eggs. The rider offers to pay for the damages and asks her how many eggs she had brought. She does not remember the exact number, but when she had taken them out two at a time, there was one egg left. The same happened when she picked them out three, four, five, and six at a time, but when she took them seven at a time they came out even. What is the smallest number of eggs she could have had?

Here’s a similar problem from “Advanced Number Theory” by Harvey Cohn (( always, i wonder how one might ‘discreetly request’ these remainders… )) :

Exercise 5 : In a game for guessing a person’s age x, one discreetly requests three remainders : r1 when x is divided by 3, r2 when x is divided by 4, and r3 when x is divided by 5. Then x=40 r1 + 45 r2 + 36 r3 modulo 60.

Clearly, these problems are all examples of the Chinese Remainder Theorem.

Chinese because one of the first such problems was posed by Sunzi [Sun Tsu] (4th century AD)
in the book Sunzi Suanjing. (( according to ChinaPage the answer is contained in the song on the left hand side. ))

There are certain things whose number is unknown.
Repeatedly divided by 3, the remainder is 2;
by 5 the remainder is 3;
and by 7 the remainder is 2.
What will be the number?

The Chinese Remainder Theorem asserts that when $N=n_1n_2 \ldots n_k $ with the $n_i $ pairwise coprime, then there is an isomorphism of abelian groups $\mathbb{Z}/N \mathbb{Z} \simeq \mathbb{Z}/n_1 \mathbb{Z} \times \mathbb{Z}/n_2 \mathbb{Z} \times \ldots \times \mathbb{Z}/n_k \mathbb{Z} $. Equivalently, given coprime numbers $n_i $ one cal always solve the system of congruence identities

$\begin{cases} x \equiv a_1~(\text{mod}~n_1) \\ x \equiv a_2~(\text{mod}~n_2) \\ \vdots \\ x \equiv a_k~(\text{mod}~n_k) \end{cases} $

and all integer solutions are congruent to each other modulo $N=n_1 n_2 \ldots n_k $.

We will need this classical result to prove that
$\mathbb{Q}/\mathbb{Z} \simeq \mathcal{A}/\mathcal{R} $
where (as last time) $\mathcal{A} $ is the additive group of all adeles and where $\mathcal{R} $ is the subgroup $\prod_p \mathbb{Z}_p $ (i’ll drop all ‘hats’ from now on, so the p-adic numbers are $\mathbb{Q}_p = \hat{\mathbb{Q}}_p $ and the p-adic integers are denoted $\mathbb{Z}_p = \hat{\mathbb{Z}}_p $).

As we will have to do calculations with p-adic numbers, it is best to have them in a canonical form using digits. A system of digits $\mathbf{D} $ of $\mathbb{Q}_p $ consists of zero and a system of representatives of units of $\mathbb{Z}_p^* $ modulo $p \mathbb{Z}_p $. The most obvious choice of digits is $\mathbf{D} = { 0,1,2,\ldots,p-1 } $ which we will use today. (( later we will use another system of digits, the Teichmuller digits using $p-1 $-th root of unities in $\mathbb{Q}_p $. )) Fixing a set of digits $\mathbf{D} $, any p-adic number $a_p \in \mathbb{Q}_p $ can be expressed uniquely in the form

$a_p = \sum_{n=deg(a_p)}^{\infty} a_p(n) p^n $ with all ‘coefficients’ $a_p(n) \in \mathbf{D} $ and $deg(a_p) $ being the lowest p-power occurring in the description of $a_p $.

Recall that an adele is an element $a = (a_2,a_3,a_5,\ldots ) \in \prod_p \mathbb{Q}_p $ such that for almost all prime numbers p $a_p \in \mathbb{Z}_p $ (that is $deg(a_p) \geq 0 $). Denote the finite set of primes p such that $deg(a_p) < 0 $ with $\mathbf{P} = { p_1,\ldots,p_k } $ and let $d_i = -deg(a_{p_i}) $. Then, with $N=p_1^{d_1}p_2^{d_2} \ldots p_k^{d_k} $ we have that $N a_{p_i} \in \mathbb{Z}_{p_i} $. Observe that for all other prime numbers $q \notin \mathbf{P} $ we have $~(N,q)=1 $ and therefore $N $ is invertible in $\mathbb{Z}_q $.

Also $N = p_i^{d_i} K_i $ with $K_i \in \mathbb{Z}_{p_i}^* $. With respect to the system of digits $\mathbf{D} = { 0,1,\ldots,p-1 } $ we have

$N a_{p_i} = \underbrace{K_i \sum_{j=0}^{d_i-1} a_{p_i}(-d_i+j) p_i^j}_{= \alpha_i} + K_i \sum_{j \geq d_i} a_{p_i}(-d_i+j)p_i^j \in \mathbb{Z}_{p_i} $

Note that $\alpha_i \in \mathbb{Z} $ and the Chinese Remainder Theorem asserts the existence of an integral solution $M \in \mathbb{Z} $ to the system of congruences

$\begin{cases} M \equiv \alpha_1~\text{modulo}~p_1^{d_1} \\
M \equiv \alpha_2~\text{modulo}~p_2^{d_2} \\
\vdots \\ M \equiv \alpha_k~\text{modulo}~p_k^{d_k} \end{cases} $

But then, for all $1 \leq i \leq k $ we have $N a_{p_i} – M = p_i^{d_i} \sum_{j=0}^{\infty} b_i(j) p^j $ (with the $b_i(j) \in \mathbf{D} $) and therefore

$a_{p_i} – \frac{M}{N} = \frac{1}{K_i} \sum_{j=0}^{\infty} b_i(j) p^j \in \mathbb{Z}_{p_i} $

But for all other primes $q \notin \mathbf{P} $ we have that $\alpha_q \in \mathbb{Z}_q $ and that $N \in \mathbb{Z}_q^* $ whence for those primes we also have that $\alpha_q – \frac{M}{N} \in \mathbb{Z}_q $.

Finally, observe that the diagonal embedding of $\mathbb{Q} $ in $\prod_p \mathbb{Q}_p $ lies entirely in the adele ring $\mathcal{A} $ as a rational number has only finitely many primes appearing in its denominator. Hence, identifying $\mathbb{Q} \subset \mathcal{A} $ via the diagonal embedding we can rephrase the above as

$a – \frac{M}{N} \in \mathcal{R} = \prod_p \mathbb{Z}_p $

That is, any adele class $\mathcal{A}/\mathcal{R} $ has as a representant a rational number. But then, $\mathcal{A}/\mathcal{R} \simeq \mathbb{Q}/\mathbb{Z} $ which will allow us to give an adelic version of the Bost-Connes algebra!

Btw. there were 301 eggs.

Leave a Comment

sobering-up

Kea’s post reminded me to have a look at my search terms (the things people type into search engines to get redirected here). Quite a sobering experience…

Via Google Analytics I learn that 49,51% of traffic comes from Search Engines (compared to 26,17% from Referring Sites and 24,32% from direct hits) so I should take Search Terms more seriously! Above you can find the top-25.

On 1. there is neverendingbooks. Well, some people seem to remember the blog-name, but require google to remember the URL (neverendingbooks.org)…, okay, fair enough. But from then on… all search terms are iTouch related! The first ‘other’ term is puzzle m at 24. and believe me things do not improve afterwards. Here the only non-Touch related search terms in the top 100 :

  • neverendingbooks.org (40)
  • “puzzle m” (42)
  • moonshine mathematics (79)
  • necklace algebra (80)
  • “calabi-yau algebra (90)
  • “dessin d enfant” (91)
  • “lieven le bruyn” (95)
  • Mathieu group + M(13) (97)
  • 13 points 5 lines puzzle (98)
  • 15 itouch sliding puzzle (99)

the last one is really touching (sic). Is there anybody out there still interested in the mathematics, or should I turn this blog into a yaib (yet another iTouch blog) ???

Leave a Comment

tori & crypto : Diffie-Hellman or GCHQ?

Boris Kunyavskii arXived the paper Algebraic tori – thirty years after dedicated to the 80th anniversary of V. E. Voskresenskii. The goal is to give an overview of results of V. E. Voskresenskii on arithmetic and birational properties of algebraic tori which culminated in his monograph “Algebraic Tori” published in Russian 30 years ago. As Ive worked on this stuff a long time ago I glanced through the paper and it contains a nice summary of the work of V.E. Voskresenskii, and later of Jean-Louis Colliot-Thelene, Jean-Jacques Sansuc and David Saltman. To my surprise I also made a guest-appearance and even seem to have a conjecture (??!!). Fortunately the ‘conjecture’ turned out to be correct as was proved by Nicole Lemire and Martin Lorenz. But a much bigger surprise (at least to me) is contained in the final section of the paper where applications of (stable) rationality of certain tori are given to primality testing and public key cryptography!

In [GPS]
the authors propose to use a similar idea of compression for using tori
in an even more recent cryptographic protocol (so-called pairing-based
cryptography). It is interesting to note that the efficiency (compression factor) of the above mentioned cryptosystems heavily depends on
rationality of tori under consideration (more precisely, on an explicit
rational parameterization of the underlying variety). As the tori used
by Rubin and Silverberg are known to be stably rational, the seemingly abstract question on rationality of a given stably rational torus
is moving to the area of applied mathematics. The first challenging
problem here is to obtain an explicit rational parameterization of the
8-dimensional torus $T_{30} $ , deรฏfined over a finite field k and splitting over
its cyclic extension L of degree 30.

This is a particular case of a problem posed by Voskresenskii [Vo77,
Problem 5.12] 30 years ago. Let us hope that we will not have to wait
another 30 years for answering this question on a degree 30 extension.

That’s all it takes to get me seriously side-tracked… so the last couple of hours I’ve been reading up on this connection between tori and cryptography. I will spend a couple of posts on these beautiful results. The latest seems to be that, while rationality of $T_{30} $ is still unknown, one can use an explicit stable-rationality description of it to get a better bound than the XTR-system (the system corresponding to the torus $T_{6} $) which in turn is better than the LUC-system (corresponding to $T_2 $), which is turn is twice as efficient as the Diffie-Hellman key exchange system… So let us start gently with the latter one…

Whitfield Diffie (r.) and Martin Hellman (m.) published in 1976 their public key-exchange system. Take a large prime power $q=p^N $, make it public and consider the finite field $\mathbb{F}_q $ which is known to have a cyclic group of units $\mathbb{F}^*_q $ of order $q-1 $. Now, take $g $ to be an element in it of large order (preferable a generator but that isnt necessary) and also make this element public.

Now choose a random integer $a $ (your hidden secret) and compute the element $g^a \in \mathbb{F}_q $ and publicize this element. Suppose someone else published his/her element $g^b $ constructed from his/her secret integer $b $ then both you and this other person can compute from the published data and their secret numbers the element (the shared key)

$g^{ab}=(g^b)^a = (g^a)^b $

(because you know $a $ and the published $g^b $ and your correspondent knows $b $ and the published $g^a $) but nobody else can compute it from the public-available data only because discrete logarithms cannot be feasibly computed in the group $\mathbb{F}_q^* $. Hellman suggests to call this system the Diffie-Hellman-Merkl key-exchange (via this link)

The first researchers to discover and publish the concepts of PKC were Whitfield Diffie and Martin Hellman from Stanford University, and Ralph Merkle from the University of California at Berkeley. As so often happens in the scientific world, the two groups were working independently on the same problem — Diffie and Hellman on public key cryptography and Merkle on public key distribution — when they became aware of each other’s work and realized there was synergy in their approaches. In Hellman’s words: “We each had a key part of the puzzle and while it’s true one of us first said X, and another of us first said Y, and so on, it was the combination and the back and forth between us that allowed the discovery.”

And that was the full story until 1997. In December, 1997, it was revealed that researchers at the GCHQ organization did some work in the early 1970’s in the field of “non-secret encryption”. The people involved are James Ellis, Clifford Cocks and Malcolm Williamson (r.).

Here is a note by Ellis on his recollection of the history of ‘Non-secret encryption” :

Cryptography is a most unusual science. Most professional scientists aim to be the first to publish their work,
because it is through dissemination that the work realises its value. In contrast, the fullest value of cryptography
is realised by minimising the information available to potential adversaries. Thus professional cryptographers
normally work in closed communities to provide sufficient professional interaction to ensure quality while
maintaining secrecy from outsiders. Revelation of these secrets is normally only sanctioned in the interests
of historical accuracy after it has been demonstrated clearly that no further benefit can be obtained from
continued secrecy.
In keeping with this tradition it is now appropriate to tell the story of the invention and development within
CESG of non-secret encryption (NSE) which was our original name for what is now called PKC. The task of writing
this paper has devolved on me because NSE was my idea and I can therefore describe these early developments from
personal experience. No techniques not already public knowledge, or specific applications of NSE will be mentioned…

The once secret notes of Williamson are also available. NON-SECRET ENCRYPTION USING A FINITE FIELD
by M J Williamson, 21 January 1974
and THOUGHTS ON CHEAPER NON-SECRET ENCRYPTION
M J Williamson, 10 August 1976
.

Leave a Comment