Professional Documents
Culture Documents
Hakimrasullmuhammad
Hakimrasullmuhammad
Hakimrasullmuhammad
College of Engineering
Salahaddin University-Erbil
Academic Year 2019-2020
1
ABSTRACT
Number theory is the study of the integers (e.g. whole numbers) and related
objects. Topics studied by number theorists include the problem of
determining the distribution of prime numbers within the integers and the
structure and number of solutions of systems of polynomial equations with
integer coefficients. Many problems in number theory, while simple to
state, have proofs that involve apparently unrelated areas of mathematics.
A beautiful illustration is given by the use of complex analysis to prove the
“Prime Number Theorem,” which gives an asymptotic formula for the
distribution of prime numbers. Yet other problems currently studied in
number theory call upon deep methods from harmonic analysis.
2
CONTENTS
Abstract 2
Contents 3
Introduction 4
Conclusion 13
References 14
3
INTRODUCTION
The older term for number theory is arithmetic. By the early twentieth
century, it had been superseded by "number theory". (The word
"arithmetic" is used by the general public to mean "elementary
calculations"; it has also acquired other meanings in mathematical logic, as
in Peano arithmetic, and computer science, as in floating point arithmetic.)
The use of the term arithmetic for number theory regained some ground in
the second half of the 20th century, arguably in part due to French
influence.] In particular, arithmetical is preferred as an adjective to number-
theoretic.
4
BACKGROUND & REVIEW
Math is the Universe’s natural tongue. Since the very beginning of our
existence as a species, numbers have deeply fascinated us. Often inviting
our greatest thinkers to unravel the many, deep mysteries of the cosmos, the
study of natural numbers, Number Theory, is one of the oldest branches of
mathematics.
5
Two distinct moments in history stand out as inflection points in the
development of Number Theory. First, in archaic times, Euclid put forth his
GCD (Greatest Common Divisor) algorithm — a brilliant set of steps that
simplifies fractions to their simplest form using geometrical observations.
Then, approximately two-thousand years later, Karl Gauss formalized
Euclid’s principles by marrying together Euclid’s informal writings with his
own extensive proofs in the timeless Disquistiones Arithmeticae.
6
Euclid & The Greatest Common Divisor
7
METHODS
For thousands of years people have searched for the way to send a message
secretly. There is a story that, in ancient time, a king needed to send a
secret message to his general in battle. The king took a servant, shaved his
head and wrote the message on his head. He waited for the servant’s hair to
grow back and then sent the servant to the general. The general then shaved
the servant’s head and read the message. If the enemy had captured the
servant, they presumably would not have known to shave his head and
message would have been safe. Cryptography is the study of methods to
send and receive the secret messages. In general we have a sender who is
trying to send a message to receiver. There is also an adversary, who wants
to steal the message. We are successful if sender is able to communicate a
message to the receiver without adversary learning what the message was.
8
greatest common divisor of a and b if d | a and d | b i.e. d is common
divisor of a and b .
And if any integer c is such that c | a and c | b then c | d i.e. any other
common divisor of a and b will divide d it is denoted by d (a,b)
Congruence: Let a and b be two integers and m is any positive integer then
a is said to congruent to b modulo m if m divide difference of a and b i.e.
m| a b . It is denoted by a b(modm) For Example: 27 13(mod 4)
And (mn) (m)(n) where m and n are relatively prime. Some simple
properties of congruence are given below: (1) a b(modm) iff b a(mod
m) (2) a b c (modm) iff a c b(modm) (3) (mod ) a1 b1 m and (mod
) a2 b2 m then (mod ) a1 a2 b1 b2 m (4) a b(modm) and c is any
integer then ca cb(modm) (5) a mk a(modm) where k is any integer.
9
Important concepts in Cryptography
(4) In private key cryptography, the sender and receiver agree in advance
on a secret code, and then send message using that code.
(8) A Caesar cipher is one in which each letter of the alphabet is shifted by
a fixed point.
10
THEORY / DESIGN / OUTCOMES
There are two main questions: "Can we compute this?" and "Can we
compute it rapidly?" Anyone can test whether a number is prime or, if it is
not, split it into prime factors; doing so rapidly is another matter. We now
know fast algorithms for testing primality, but, in spite of much work (both
theoretical and practical), no truly fast algorithm for factoring.
11
For example, these functions can be such that their inverses can be
computed only if certain large integers are factorized. While many difficult
computational problems outside number theory are known, most working
encryption protocols nowadays are based on the difficulty of a few number-
theoretical problems.
Some things may not be computable at all; in fact, this can be proven in
some instances. For instance, in 1970, it was proven, as a solution
to Hilbert's 10th problem, that there is no Turing machine which can solve
all Diophantine equations.
12
CONCLUSION
13
14
REFERENCES
2) Number Theory
https://math.duke.edu/research/number-theory
15