Richard Fateman CS 282 Lecture 2c1 Basic Extensions for Computer Algebra System Domains Lecture 2c.

Slides:



Advertisements
Similar presentations
Richard Fateman CS 282 Lecture eea1 Extended Euclidean Algorithm Lecture eea.
Advertisements

Mathematics of Cryptography Part II: Algebraic Structures
Cryptography and Network Security, Finite Fields From Third Edition by William Stallings Lecture slides by Mustafa Sakalli so much modified..
Cryptography and Network Security
CSE 123 Symbolic Processing. Declaring Symbolic Variables and Constants To enable symbolic processing, the variables and constants involved must first.
RATIONAL EXPRESSIONS Chapter Quotients of Monomials.
Math 3121 Abstract Algebra I
Richard Fateman CS 282 Lecture 201 Loose Ends: Evaluation, Mathematical Types, DLMF, Syntax and OCR Lecture 20.
Richard Fateman CS 282 Lecture 21 Basic Domains of Interest used in Computer Algebra Systems Lecture 2.
Richard Fateman CS 282 Lecture 31 Operations, representations Lecture 3.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Richard Fateman CS 282 Lecture 101 The Finite-Field FFT Lecture 10.
Richard Fateman CS 282 Lecture 2b1 Basic Domains of Interest used in Computer Algebra Systems Lecture 2b.
Faster Multiplication, Powering of Polynomials
Introduction to Gröbner Bases for Geometric Modeling Geometric & Solid Modeling 1989 Christoph M. Hoffmann.
Richard Fateman CS 282 Lecture 41 Polynomial representations Lecture 4.
Richard Fateman CS 282 Lecture 131 Algebraic Simplification, Yet more Lecture 13.
Richard Fateman CS 282 Lecture 31 Operations, representations Lecture 3.
Richard Fateman CS 282 Lecture 61 Evaluation/Interpolation (I) Lecture 6.
College Algebra Prerequisite Topics Review
THE BINOMIAL THEOREM Robert Yen
Algebra Review. Polynomial Manipulation Combine like terms, multiply, FOIL, factor, etc.
1 1.0 Students solve equations and inequalities involving absolute value. Algebra 2 Standards.
FINITE FIELDS 7/30 陳柏誠.
CPSC 3730 Cryptography and Network Security
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Great Theoretical Ideas in Computer Science.
Obj: To solve equations using the Rational Root Theorem.
Canonical Representation Genetic Programming John Woodward and Ruibin Bai The University of Nottingham Ningbo.
7.6 Rational Zero Theorem Algebra II w/ trig. RATIONAL ZERO THEOREM: If a polynomial has integer coefficients, then the possible rational zeros must be.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Great Theoretical Ideas in Computer Science.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Scott CH Huang COM5336 Cryptography Lecture 11 Euclidean Domains & Division Algorithm Scott CH Huang COM 5336 Cryptography Lecture 10.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Pertemuan #5 Pengantar ke Number Theory Kuliah Pengaman Jaringan.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Cryptography and Network Security Chapter 4 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Hardware Implementations of Finite Field Primitives
Expression Term Equation Coefficient Identity Function Polynomial Root
May 9, 2001Applied Symbolic Computation1 Applied Symbolic Computation (CS 680/480) Lecture 6: Multiplication, Interpolation, and the Chinese Remainder.
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Polynomial Long Division
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Mathematical Background: Extension Fields
Lecture 3.2: Public Key Cryptography II
Administrivia Syllabus and other course information posted on the internet: links on blackboard & at Check assignment sheet for reading.
Basic Extensions for Computer Algebra System Domains
Building Java Programs Chapter 2
Building Java Programs Chapter 2
Appendix A.4 Rational Expression.
Building Java Programs
Building Java Programs
Building Java Programs
Building Java Programs Chapter 2
296.3:Algorithms in the Real World
Mathematical Background: Extension Finite Fields
Presentation transcript:

Richard Fateman CS 282 Lecture 2c1 Basic Extensions for Computer Algebra System Domains Lecture 2c

Richard Fateman CS 282 Lecture 2c2 Preview: Extensions if x is an indeterminate, and if D is a domain, we can talk about D[x], polynomials in x with coefficients in D or D(x) ratios of polys in x. Or D[[x]] : (truncated) power series in x over D. Or Matrices over D.

Richard Fateman CS 282 Lecture 2c3 Beware of notation A particular polynomial expression might be referred to as p(x), which notation is also used to denote a function or mapping p:D 1  D 2 or a function application if x is not an indeterminate but a element in a field as p(3). Confused? The notation is unfortunate. Not confused? You are probably used to it.

Richard Fateman CS 282 Lecture 2c4 Aside 2.1: canonical forms vs. mathematical equivalence Mathematically, we don’t distinguish between two equivalent elements in Z(x), say 1/(x+1) and (x-1)/(x 2 -1). Computationally these can be distinguished, and generally they must be distinguished. Often we must compute a canonical form for an expression by finding a particular “simplest” form in an equivalence class.

Richard Fateman CS 282 Lecture 2c5 Aside 2.2: Simplification is almost everything in this business.. Trivial reduction. All computational problems in computer algebra can be reduced to simplification: simplify (ProblemStatement) to CanonicalSolution

Richard Fateman CS 282 Lecture 2c6 Aside 2.3: Computer representation and canonical forms A computer might distinguish between two strings “abc” and “abc” if they are stored in different locations in memory. Or might not. Usually it is advantageous to store an object only once in memory, but not always. (Should we store 43 just once? How about ? How about ax 2 +bx+c?)

Richard Fateman CS 282 Lecture 2c7 Back to extensions if r is a root of an irreducible polynomial p, that is, p(r)=0, we will also talk about a ring or field extended by r: Q[r]. E.g. p(r)=r 2 +1=0 means r = p (-1) or i, and we have just constructed the complex rationals Q[r]. Z[i] is called “Gaussian integers" The set of elements a+bi, with a, b, integers. Q[i] would allow rational a, b. (remember rationalizing denominators?) Given such a field, you can extend it again. IF you want to represent Q extended by sqrt(2), and then THAT extended by sqrt(3), you can do so. Don't extend it again by sqrt(6). (why?)

Richard Fateman CS 282 Lecture 2c8 More on extensions In nice cases (primitive element), algebraic arithmetic can be done by "reducing" modulo r. This is accomplished by dividing by p(r) and discarding the remainder: if E = a+b*p(r) then E ´ a You may need reminders of shortcuts. e.g. remainder of p(x) / (x-a) is the same as substituting a for x in p. (other terms we will use on occasion: Euclidean domains, unique factorization domains, ideals, differential fields, algebraic curves. We’ll motivate them when needed)

Richard Fateman CS 282 Lecture 2c9 Other extensions Differential fields have what amounts to log() and exp() extensions. And an operation of differentiation such that D(exp(x)) = exp(x), D(log(x)) =1/x. Exp and log can be nested, and you can make trig functions:

Richard Fateman CS 282 Lecture 2c10 There’s more… Other kinds of symbolic computation Whole careers have been made out of other kinds of symbolic computation: theorem proving, string manipulation, group representations, geometric computation, type theory/programming language representations, etc. (J. Symbolic Computation publishes broadly…) We will not probably not get to any of these areas in this course, although I could be swayed by student interest… also projects involving these topics are generally appropriate.