Unit6 - Subjective Questions
MTH401 • Practice Questions with Detailed Answers
Define the concept of Divisibility in integers. State and prove the transitivity property of divisibility.
Definition of Divisibility:
Let and be integers with $a
eq 0aba|bkb = ak$.
Transitivity Property:
If and , then .
Proof:
- Since , there exists an integer such that .
- Since , there exists an integer such that .
- Substituting the value of from step 1 into step 2:
- Since and are integers, their product is also an integer.
- Thus, , which implies .
Hence, divisibility is transitive.
Use the Extended Euclidean Algorithm to find the greatest common divisor (GCD) of 252 and 198, and express it as a linear combination of these two numbers.
We apply the Euclidean Algorithm to find :
Step 1: Euclidean Algorithm
The last non-zero remainder is 18. Thus, .
Step 2: Back Substitution (Linear Combination)
We express 18 in terms of 252 and 198 using the equations above in reverse order:
From (3):
Substitute (2) ():
Substitute (1) ():
Result:
State Bezout's Lemma. Explain its significance in relation to linear congruences.
Statement of Bezout's Lemma:
For any integers and (not both zero), there exist integers and such that:
Here, is the greatest common divisor of and .
Significance in Linear Congruences:
Bezout's Lemma is fundamental to solving linear congruences of the form .
- Existence of Solutions: The congruence has a solution if and only if divides . This comes directly from the fact that the linear Diophantine equation is solvable only if divides .
- Modular Inverse: Specifically, if , Bezout's Lemma guarantees integers and such that . Taking modulo , we get . This means is the modular multiplicative inverse of . Finding this inverse is crucial for cryptography algorithms like RSA and the Affine cipher.
State the Fundamental Theorem of Arithmetic and define the relationship between the GCD and LCM of two integers and .
Fundamental Theorem of Arithmetic:
Every integer can be represented as a product of prime numbers in a unique way, except for the order of the factors. That is, any integer can be written as:
where are distinct primes and are integers.
Relationship between GCD and LCM:
For any two positive integers and , the product of their Greatest Common Divisor (GCD) and Least Common Multiple (LCM) equals the product of the numbers themselves:
This implies:
Solve the linear congruence:
To solve , we need to eliminate the coefficient 4 by multiplying by its modular inverse.
Step 1: Check GCD
. Since 1 divides 5, a unique solution exists modulo 9.
Step 2: Find the modular inverse of 4 mod 9
We look for an integer such that .
Using Extended Euclidean or inspection:
Taking modulo 9:
Since , the inverse is 7.
(Check: ).
Step 3: Multiply original congruence by the inverse
Step 4: Reduce modulo 9
Answer: .
Describe the mathematical procedure for Encryption and Decryption using the Caesar Cipher. Encrypt the text "DATA" with a shift of .
Caesar Cipher Procedure:
The Caesar cipher is a substitution cipher where each letter in the plaintext is shifted by a fixed number of positions .
- Mapping: Map letters A-Z to integers 0-25 ().
- Encryption: Let be the numerical value of a plaintext letter. The ciphertext value is calculated as:
- Decryption: To recover from :
Example: Encrypting "DATA" with :
- D: Value $3$. . Map 6 G.
- A: Value $0$. . Map 3 D.
- T: Value $19$. . Map 22 W.
- A: Value $0$. . Map 3 D.
Ciphertext: GDWD
State the Chinese Remainder Theorem (CRT). Solve the system of congruences:\n\n\n
Statement of CRT:
Let be positive integers that are pairwise relatively prime (i.e., for $i
eq j$). Then the system of congruences:
has a unique solution modulo .
Solution for the given system:
Given: ; ; .
-
Calculate :
. -
Calculate :
-
Calculate Modular Inverses such that :
-
Calculate :
-
Final reduction:
Answer:
Explain the Affine Cipher. Why must the multiplicative key be coprime to the modulus ? Find the decryption function for the encryption function .
Affine Cipher:
An affine cipher encrypts a letter using the function , where and are keys and is the size of the alphabet.
Requirement for Coprimality:
The key must be coprime to (i.e., ) so that has a multiplicative inverse modulo . If an inverse exists, the encryption function is a bijection (one-to-one mapping), allowing unique decryption. If $\gcd(a, m)
eq 1$, multiple plaintext letters map to the same ciphertext letter, making unique decryption impossible.
Finding Decryption Function:
Given .
We need to solve for : .
-
Find the inverse of .
Using Extended Euclidean Algo: .
.
.
So, . -
Multiply the equation by :
-
Reduce constant:
.
So .
.
Or (since ).
Decryption Function: .
State Fermat’s Little Theorem. Using this theorem, find the remainder when is divided by 11.
Fermat's Little Theorem:
If is a prime number and is an integer not divisible by (i.e., ), then:
Alternatively, for any integer :
Calculation of :
Here and . Since 11 is prime and 3 is not divisible by 11, we apply the theorem:
We express the exponent 31 in terms of 10:
.
So,
Applying the theorem ():
Remainder: 3
Distinguish between Primes and Composite numbers. Prove that there are infinitely many prime numbers.
Distinction:
- Prime Number: An integer whose only positive divisors are 1 and itself (e.g., 2, 3, 5, 7).
- Composite Number: An integer that is not prime, meaning it has at least one divisor other than 1 and itself (e.g., 4, 6, 9).
Proof (Euclid's Proof of Infinite Primes):
- Assume, for the sake of contradiction, that there are finitely many primes: .
- Consider the integer .
- By the Fundamental Theorem of Arithmetic, has at least one prime divisor, say .
- If is one of the existing primes , then divides the product .
- Since divides and divides , must divide their difference:
- However, no prime number can divide 1.
- This contradiction implies that the assumption was false. Therefore, there are infinitely many primes.
Calculate the inverse of 13 modulo 24. Does it exist? If so, derive it.
Condition for Existence:
The inverse of exists if and only if .
Check :
Since 13 is prime and does not divide 24, . The inverse exists.
Derivation using Extended Euclidean Algorithm:
Back Substitution:
Substitute (2) into above ():
Substitute (1) into above ():
Result:
Taking modulo 24:
The inverse is .
To make it positive: .
Answer: The inverse of 13 modulo 24 is 13.
What is Modular Arithmetic? Prove the property: .
Modular Arithmetic:
A system of arithmetic for integers, where numbers "wrap around" when reaching a certain value, called the modulus. We write if divides .
Proof:
Let and .
By definition of division algorithm:
where
where
Now consider :
Taking modulo on both sides:
Since is a multiple of , it becomes 0 modulo :
Substituting back and :
Hence proved.
Discuss the vulnerabilities of the Caesar Cipher. How does the Affine Cipher improve upon it, and what is its remaining weakness?
Vulnerabilities of Caesar Cipher:
- Small Key Space: The key is an integer between 1 and 25. An attacker can easily perform a Brute Force attack by trying all 25 shifts.
- Frequency Analysis: Since it is a mono-alphabetic substitution cipher, the frequency distribution of letters in the ciphertext matches the underlying language (e.g., 'E' is the most common letter in English). An attacker can map the most frequent ciphertext letter to 'E' to find the key.
Affine Cipher Improvement:
The Affine cipher uses a linear function .
- Key Space: There are 12 possible values for (coprime to 26) and 26 values for . Total keys = . This is significantly larger than the Caesar cipher's 25 keys, making brute force slightly harder (though still trivial for computers).
Remaining Weakness:
- Still Mono-alphabetic: Like Caesar, Affine maps one plaintext letter to exactly one ciphertext letter consistently. It preserves the frequency distribution of the language, making it vulnerable to Frequency Analysis. If an attacker guesses mappings for two common letters (e.g., 'e' and 't'), they can solve the system of linear equations to find and .
Solve the system of congruences using the method of substitution (or verify CRT): and .
We need to find such that:
Method of Substitution:
From (1), we can write:
for some integer .
Substitute this into (2):
To solve for , multiply by the inverse of 3 mod 5 (which is 2):
So, , or .
Substitute back into the expression for :
Result:
.
(Check: and . Correct.)
Prove that if is a prime number and is an integer such that , then the binomial coefficient is divisible by .
Formula:
The binomial coefficient is given by:
Proof:
- Rearrange the equation:
- Since is prime, it appears in the prime factorization of exactly once (as the factor itself). all other factors are less than .
- Look at the Right Hand Side (RHS): and are products of integers all strictly less than (since ).
- Because is prime, if divides a product , it must divide or . Since does not divide any integer less than itself, cannot divide nor .
- Therefore, for the equation to hold, must divide .
Hence, is divisible by .
Find the last digit of the number . (Hint: Use properties of modular arithmetic mod 10 or Euler/Fermat concepts).
Finding the last digit is equivalent to finding .
Using Modular Arithmetic Patterns:
Powers of 7 modulo 10:
(Pattern repeats: 7, 9, 3, 1).
The cycle length is 4.
Calculation:
We need . Since the exponent 100 is a multiple of 4 ():
Answer: The last digit is 1.
Explain the role of Number Theory in Cryptography. Specifically, how do properties of prime numbers and modular inverse facilitate secure communication?
Number theory is the mathematical backbone of modern cryptography, particularly Public Key Cryptography (Asymmetric Encryption).
1. Hardness of Factoring (Primes):
Systems like RSA rely on the fact that while it is easy to multiply two large prime numbers together (), it is computationally infeasible to factor the resulting large integer back into and . This asymmetry allows to be public (part of the public key) while keeping and private.
2. Modular Arithmetic & Inverses:
Encryption and decryption operations often involve modular exponentiation (). To decrypt, one needs a private key , which is the modular multiplicative inverse of the public key modulo .
- .
- The existence and calculation of this inverse (via Euclidean algorithm) ensure that the original message can be mathematically recovered (), but only by someone who knows the trapdoor information (the factors of ).
Determine if the following linear congruence has a solution: . If yes, find all incongruent solutions modulo 9.
Condition for Solvability:
A linear congruence has a solution if and only if divides .
Step 1: Calculate GCD
.
.
Step 2: Check Divisibility
Does divide ? Does 3 divide 6?
Yes. Therefore, there are exactly incongruent solutions modulo 9.
Step 3: Solve
Divide the entire equation by :
Reduce coefficients mod 3:
Divide by 2 (or multiply by inverse of 2 mod 3, which is 2):
.
Step 4: Find General Solutions
The solutions are of the form for .
Step size .
Solutions:
Answer: The solutions are .
Using Fermat's Little Theorem, prove that for any integer , is divisible by 2730. (Hint: )
We need to show . Since , it suffices to show for each prime factor .
- Mod 13: By Fermat's Little Theorem (FLT), . Holds.
- Mod 7: FLT says .
. Holds. - Mod 5: FLT says .
. Holds. - Mod 3: FLT says .
. Holds. - Mod 2: . Obviously (parity matches). Holds.
Since is divisible by all pairwise coprime factors 2, 3, 5, 7, and 13, it is divisible by their product 2730.
Define Relative Primes (Coprimes). If and are relatively prime, prove that is either 1 or 2.
Definition:
Two integers and are relatively prime (or coprime) if their Greatest Common Divisor is 1, i.e., .
Proof:
Let .
By definition of GCD, divides both and .
Since divides these terms, it must divide their sum and their difference:
- Sum:
- Difference:
So, is a common divisor of and .
Therefore, divides .
.
Since we are given that and are relatively prime, .
Thus, divides , which means .
The positive divisors of 2 are 1 and 2.
Therefore, must be either 1 or 2.