Compare commits

17 Commits

Author SHA1 Message Date
Trance-0
571efa1bad update 2026-02-12 12:49:16 -06:00
Trance-0
6d5c80d257 Update CSE4303_L9.md 2026-02-12 12:41:50 -06:00
Trance-0
0e28ba6261 update 2026-02-12 11:56:24 -06:00
Zheyuan Wu
c4888b796c Update Math4302_L13.md
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-11 13:49:49 -06:00
Zheyuan Wu
a7ef223f67 Update Math4302_L13.md
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-11 12:51:56 -06:00
Zheyuan Wu
005cd7dbd6 fix typo 2026-02-11 12:51:31 -06:00
Zheyuan Wu
ef9059d27c updates 2026-02-11 11:53:48 -06:00
Zheyuan Wu
bdf0ff9f06 Update Math4303_L12.md
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-10 10:08:34 -06:00
Trance-0
669e1c889a add meta
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-09 12:23:36 -06:00
Zheyuan Wu
b6b80f619a updates 2026-02-09 12:20:26 -06:00
Trance-0
2529a251e7 Update index.md
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-06 14:09:32 -06:00
Trance-0
5b103812b4 Update Math4302_L11.md 2026-02-06 13:49:41 -06:00
Trance-0
16f09e5723 updates
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-06 12:28:17 -06:00
Zheyuan Wu
83ada2df2a updates
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-04 13:51:19 -06:00
Zheyuan Wu
8f2e613b36 fix errors and update news
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-03 14:59:32 -06:00
Zheyuan Wu
e69362ce3c Create Math4302_L9.md
Some checks failed
Sync from Gitea (main→main, keep workflow) / mirror (push) Has been cancelled
2026-02-02 13:50:03 -06:00
Zheyuan Wu
6a0b35bb28 updates 2026-02-02 13:01:07 -06:00
21 changed files with 2181 additions and 4 deletions

View File

@@ -0,0 +1,175 @@
# CSE4303 Introduction to Computer Security (Lecture 10)
## MACs
### MACs from Hash Functions
Construction:
$S_{big}(k, m) = S(k, H(m))$
$V_{big}(k, m, t) = V(k, H(m), t)$
If:
- $S$ is secure MAC for short messages
- $H$ is collision resistant
Then $S_{big}$ is secure MAC.
If collision exists:
If $H(m_0) = H(m_1)$,
query tag for $m_0$,
forge $(m_1, t)$.
### HMAC
$HMAC(k, m) = H((k \oplus opad) \| H((k \oplus ipad) \| m))$
Used in:
- TLS
- IPsec
- SSH
Properties:
- Built from hash function (for example SHA-256)
- Provably secure under PRF assumptions
### Timing Attacks on MAC Verification
Problem:
Byte-by-byte comparison leaks timing information.
Attack:
1. Send random tag.
2. Guess first byte.
3. Detect timing increase.
4. Repeat per byte.
Defense 1:
Constant-time comparison loop.
Defense 2:
Double-HMAC comparison:
Compare $HMAC(k, mac)$ with $HMAC(k, sig)$.
### Authenticated Encryption (AE)
AE provides:
1. Confidentiality (CPA security)
2. Ciphertext integrity
Cipher:
$E : K \times M \times N \to C$
$D : K \times C \times N \to M \cup \{\bot\}$
Ciphertext integrity:
Attacker cannot produce new valid ciphertext.
Theorem:
AE implies CCA security.
Implication:
If $D(k, c) \neq \bot$,
receiver knows sender had key.
### Encrypt-then-MAC
Correct construction:
1. Compute $c = E(k_E, m)$
2. Compute $tag = S(k_I, c)$
3. Send $(c, tag)$
Encrypt-then-MAC is always secure ordering.
### AE Standards
- GCM: CTR mode encryption then polynomial MAC
- CCM: CBC-MAC then CTR mode encryption
- EAX: CTR mode encryption then CMAC
All support AEAD:
Authenticated Encryption with Associated Data.
Example: authenticate packet headers but do not encrypt them.
## Asymmetric Crypto Authentication: Digital Signatures
### Motivation
Goal:
Bind document to author.
Digital problem:
Anyone can copy a visible signature from one document to another.
Solution:
Make signature depend on document contents.
### Digital Signature Scheme
Components:
- Secret signing key $sk$
- Public verification key $pk$
- $Sign(sk, m) \to signature$
- $Verify(pk, m, sig) \to$ accept or reject
Property:
Anyone can verify.
Only signer can produce valid signature.
### Signing a Certificate
Process:
1. Compute hash of data.
2. Sign hash with secret key.
3. Attach signature to data.
Verification:
1. Compute hash of received data.
2. Verify signature using public key.
3. Accept if hashes match.
### Software Signing
Software vendor:
- Signs update with secret key.
- Publishes update and signature.
Clients:
- Use vendor public key.
- Verify signature.
- Install only if valid.
Allows distribution via untrusted hosting site.
## Review: Three Approaches to Data Integrity
1. Collision resistant hashing
Requires secure read-only public space.
No secret keys.
Suitable for public verification.
2. MACs
Requires shared secret key.
Must compute new MAC per user.
Suitable when one signs and one verifies.
3. Digital signatures
Requires long-term secret key.
Public verification.
Suitable when one signs and many verify.
## Crypto Summary
Cryptographic goals:
- Confidentiality
- Data integrity
- Authentication
- Non-repudiation
Primitives:
- Hash functions
- MACs
- Digital signatures
- Symmetric ciphers
- Public key ciphers

View File

@@ -0,0 +1,5 @@
# CSE4303 Introduction to Computer Security (Lecture 6)
Refer to this lecture notes
[CSE442T Lecture 3](https://notenextra.trance-0.com/CSE442T/CSE442T_L3/)

View File

@@ -0,0 +1,144 @@
# CSE4303 Introduction to Computer Security (Lecture 7)
## Cryptography in Symmetric Systems
### Symmetric systems
Symmetric (shared-key) encryption
- Classical techniques
- Computer-aided techniques
- Formal reasoning
- Realizations:
- Stream ciphers
- Block ciphers
## Stream ciphers
1. Operate on PT one bit at a time (usually), as a bit "stream"
2. Generate arbitrarily long keystream on demand
### Keystream
Keystream $G(k)$ generated from key $k$.
Encryption:
$$
E(k,m) = m \oplus G(k)
$$
Decryption:
$$
D(k,c) = c \oplus G(k)
$$
### Security abstraction
1. XOR transfers randomness of keystream to randomness of CT regardless of PTs content
2. Security depends on $G$ being "practically" indistinguishable from random string and "practically" unpredictable
3. Idea: shouldnt be able to predict next bit of generator given all bits seen so far
### Keystream $G(k)$
- Idea: shouldnt be able to predict next bit of generator given all bits seen so far
- Strategies and challenges: many!
#### Idea that doesnt quite work: Linear Feedback Shift Register (LFSR)
- Choice of feedback: by algebra
- Pro: fast, statistically close to random
- Problem: susceptible to cryptanalysis (because linear)
#### LFSR-based modifications
- Use non-linear combo of multiple LFSRs
- Use controlled clocking (e.g. only cycle the LFSR when another LFSR outputs a 1)
- Etc.
#### Others
- Modular arithmetic-based constructions
- Other algebraic constructions
### Hazards
1. Weak PRG
2. Key re-use
3. Predictable effect of modifying CT on decrypted PT
#### Weak PRG
- Makes semantic security impossible
#### Key re-use
Suppose:
$$
c_1 = m_1 \oplus G(k)
$$
and
$$
c_2 = m_2 \oplus G(k)
$$
Then:
$$
c_1 \oplus c_2 = m_1 \oplus m_2
$$
This may be enough to recover $m_1$ or $m_2$ using natural language properties.
##### IV (Initialization Vector)
Used to avoid key re-use:
- IV incremented per frame
- But repeats after $2^{24}$ frames
- Sometimes resets to 0
- Enough to recover key within minutes
Note:
- Happens if keystream period is too short
- Real-world example: WEP attack (802.11b)
#### Predictable modification of ciphertext
If attacker modifies ciphertext by XORing $p$:
Ciphertext becomes:
$$
(m \oplus k) \oplus p
$$
Decryption yields:
$$
m \oplus p
$$
- Affects integrity
- Not CCA-secure for integrity
### Summary: Stream ciphers
Pros
- Fast
- Memory-efficient
- No minimum PT size
Cons
- Require good PRG
- Can never re-use key
- No integrity mechanism
Note
- Integrity mechanisms exist for other symmetric ciphers (block ciphers)
- "Authenticated encryption"
Examples / Uses
- RC4: legacy stream cipher (e.g. WEP)
- ChaCha / Salsa: Android cell phone encryption (Adiantum)

View File

@@ -0,0 +1,320 @@
# CSE4303 Introduction to Computer Security (Lecture 8)
## Block ciphers
1. Operate on PT one block at a time
2. Use same key for multiple blocks (with caveats)
3. Chaining modes intertwine successive blocks of CT (or not)
## Security abstraction
View cipher as a Pseudo-Random Permutation (PRP)
### Background: Pseudo-Random Function (PRF)
Defined over $(K,X,Y)$:
$$
F : K \times X \to Y
$$
Such that there exists an efficient algorithm to evaluate $F(k,x)$.
Let:
- $\text{Funs}[X,Y]$ = set of all functions from $X$ to $Y$
- $S_F = \{ F(k,\cdot) \mid k \in K \}$
Intuition:
A PRF is secure if a random function in $\text{Funs}[X,Y]$ is indistinguishable from a random function in $S_F$.
Adversarial game:
- Challenger samples $k \leftarrow K$
- Or samples $f \leftarrow \text{Funs}[X,Y]$
- Adversary queries oracle with $x \in X$
- Receives either $F(k,x)$ or $f(x)$
- Must distinguish
Goal: adversarys advantage negligible
## PRP Definition
Defined over $(K,X)$:
$$
E : K \times X \to X
$$
Such that:
1. Efficient deterministic algorithm to evaluate $E(k,x)$
2. $E(k,\cdot)$ is one-to-one
3. Efficient inversion algorithm $D(k,y)$ exists
i.e., a PRF that is an invertible one-to-one mapping from message space to message space
## Secure PRP
Let $\text{Perms}[X]$ be all permutations on $X$.
Intuition:
A PRP is secure if a random permutation in $\text{Perms}[X]$ is indistinguishable from a random element of:
$$
S_E = \{ E(k,\cdot) \mid k \in K \}
$$
Adversarial game:
- Challenger samples $k \leftarrow K$
- Or $\pi \leftarrow \text{Perms}[X]$
- Adversary queries $x \in X$
- Receives either $E(k,x)$ or $\pi(x)$
- Must distinguish
Goal: negligible advantage
## Block cipher constructions
### Feistel network
Given:
$$
f_1, \dots, f_d : \{0,1\}^n \to \{0,1\}^n
$$
Build invertible function:
$$
F : \{0,1\}^{2n} \to \{0,1\}^{2n}
$$
Let input be split into $(L_0, R_0)$.
Round $i$:
$$
L_i = R_{i-1}
$$
$$
R_i = L_{i-1} \oplus f_i(R_{i-1})
$$
#### Invertibility
$$
R_{i-1} = L_i
$$
$$
L_{i-1} = R_i \oplus f_i(L_i)
$$
Thus Feistel is invertible regardless of whether $f_i$ is invertible.
### LubyRackoff Theorem (1985)
If $f$ is a secure PRF, then 3-round Feistel is a secure PRP.
### DES (Data Encryption Standard) — 1976
- 16-round Feistel network
- 64-bit block size
- 56-bit key
- Round functions:
$$
f_i(x) = F(k_i, x)
$$
Round function uses:
- S-box (substitution box) — non-linear
- P-box (permutation box)
To invert: use keys in reverse order.
Problem: 56-bit keyspace too small today (brute-force feasible).
### SubstitutionPermutation Network (SPN)
Rounds of:
- Substitution (S-box layer)
- Permutation (P-layer)
- XOR with round key
All layers invertible.
### AES (Advanced Encryption Standard) — 2000
- 10 substitution-permutation rounds (128-bit key version)
- 128-bit block size
Each round includes:
- ByteSub (1-byte S-box)
- ShiftRows
- MixColumns
- AddRoundKey
Key sizes:
- 128-bit
- 192-bit
- 256-bit
Currently de facto standard symmetric-key cipher (e.g. TLS/SSL).
## Block cipher modes
### Challenge
Encrypt PTs longer than one block using same key while maintaining security.
### ECB (Electronic Codebook)
Encrypt blocks independently:
$$
c_i = E(k, m_i)
$$
Problem:
If $m_1 = m_2$, then:
$$
c_1 = c_2
$$
Not semantically secure.
#### Formal non-security argument
Two-block challenge:
- Adversary submits:
- $m_0 = \text{"Hello World"}$
- $m_1 = \text{"Hello Hello"}$
- If $c_1 = c_2$, output 0; else 1
Advantage = 1
### CPA model (Chosen Plaintext Attack)
Attacker:
- Sees many PT/CT pairs under same key
- Can submit arbitrary PTs
Definition:
$$
\text{Adv}_{CPA}[A,E] =
\left|
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
\right|
$$
Must be negligible.
ECB fails CPA security.
### Moral
If same secret key is used multiple times, given same PT twice, encryption must produce different CT outputs.
## Secure block modes
### Idea
Augment key with:
- Per-block nonce
- Or chaining data from prior blocks
### CBC (Cipher Block Chaining)
$$
c_1 = E(k, m_1 \oplus IV)
$$
$$
c_i = E(k, m_i \oplus c_{i-1})
$$
IV must be random/unpredictable.
### CFB (Cipher Feedback)
Uses previous ciphertext as input feedback into block cipher.
### OFB (Output Feedback)
$$
s_i = E(k, s_{i-1})
$$
$$
c_i = m_i \oplus s_i
$$
Can pre-compute keystream.
Acts like stream cipher.
### CTR (Counter Mode)
$$
c_i = m_i \oplus E(k, \text{nonce} \| \text{counter}_i)
$$
Encryption and decryption parallelizable.
Nonce must be unique.
### GCM (Galois Counter Mode)
- Most popular ("AES-GCM")
- Provides authenticated encryption
- Confidentiality + integrity
## Nonce-based semantic security
Encryption:
$$
c = E(k, m, n)
$$
Adversarial experiment:
- Challenger picks $k$
- Adversary submits $(m_{i,0}, m_{i,1})$ and nonce $n_i$
- Receives $c_i = E(k, m_{i,b}, n_i)$
- Nonces must be distinct
Definition:
$$
\text{Adv}_{nCPA}[A,E] =
\left|
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
\right|
$$
In practice:
- CBC: IV must be random
- CTR/GCM: nonce must be unique but not necessarily random
## Symmetric Encryption Summary
### Stream Ciphers
- Rely on secure PRG
- No key re-use
- Fast
- Low memory
- Less robust
- No built-in integrity
### Block Ciphers
- Rely on secure PRP
- Allow key re-use across blocks (secure mode required)
- Provide authenticated encryption in some modes (e.g. GCM)
- Slower
- Higher memory
- More robust
- Used in most practical secure systems (e.g. TLS)

View File

@@ -0,0 +1,254 @@
# CSE4303 Introduction to Computer Security (Lecture 9)
## Cryptographic Hash Functions
### What is a Hash Function
A hash function maps a variable-length input to a fixed-length output.
$h : X \to Y$
Typical examples:
- Java hashCode(): input is an Object, output is a 4-byte integer.
- String polynomial hash example:
$h("cs433s") = 'c' \cdot 31^6 + 's' \cdot 31^5 + \dots + 's'$
Key property:
- Domain $|X|$ is much larger than range $|Y|$.
- Collisions are unavoidable in principle since $|X| > |Y|$.
Main uses:
- Compact numerical representation
- Hash tables (Set, Map, dictionaries)
- Object comparison
- Integrity checking (fingerprint)
### Security Properties
Let $h : X \to Y$.
1. Preimage Resistance (One-way)
Given $y \in Y$, it is computationally infeasible to find $x \in X$ such that
$h(x) = y$.
2. Second Preimage Resistance (Weak collision resistance)
Given a specific $x \in X$, it is computationally infeasible to find $x' \neq x$ such that
$h(x') = h(x)$.
3. Collision Resistance (Strong collision resistance)
It is computationally infeasible to find any two distinct values $x, x' \in X$ such that
$h(x) = h(x')$.
Adversarial definition:
Let $H : M \to T$ where $|M|$ is much larger than $|T|$.
$H$ is collision resistant if for all efficient algorithms $A$:
$Adv_{CR}[A, H] = Pr[A$ outputs a collision for $H]$
is negligible.
### Generic Collision Attack (Birthday Attack)
Let $H : M \to \{0,1\}^n$.
Generic algorithm to find a collision in time on the order of $2^{n/2}$:
1. Choose $2^{n/2}$ random messages $m_1, \dots, m_{2^{n/2}}$.
2. Compute $t_i = H(m_i)$.
3. Look for $t_i = t_j$.
Birthday phenomenon:
If the output space size is $B$,
high collision probability greater than $50\%$ occurs with about $\sqrt{B}$ samples.
Thus:
- 128-bit hash gives about $2^{64}$ collision attack
- 256-bit hash gives about $2^{128}$ collision attack
### Practical Hash Functions
From performance and security table (AMD Opteron 2.2 GHz):
- MD5: 128 bits, completely broken since 2004
- SHA-1: 160 bits, practical collision attack demonstrated
- SHA-256: 256 bits
- SHA-512: 512 bits
- Whirlpool: 512 bits
SHA-1 collision example: SHAttered attack (Google and CWI).
Two different PDF files were produced with identical SHA-1 hash.
## Construction of Cryptographic Hash Functions
### Merkle-Damgard Construction
Given compression function:
$h : T \times X \to T$
We build:
$H : X^{\le L} \to T$
Process:
- Split message into blocks $m[0], m[1], \dots, m[L]$.
- Use fixed initialization vector $IV$.
- Iterate chaining:
$H_0 = IV$
$H_1 = h(H_0, m[0])$
$H_2 = h(H_1, m[1])$
$\dots$
$H_L = h(H_{L-1}, m[L])$
- Apply padding:
append $1000\ldots0$ concatenated with message length (64 bits).
If no space remains, add another block.
Theorem:
If compression function $h$ is collision resistant,
then $H$ is collision resistant.
### Davies-Meyer Compression from Block Cipher
Given block cipher:
$E : K \times \{0,1\}^n \to \{0,1\}^n$
Define compression function:
$h(H, m) = E(m, H) \oplus H$
If $E$ behaves like an ideal cipher,
finding a collision in $h$ takes about $2^{n/2}$ evaluations.
This is optimal for $n$-bit output.
### Example: SHA-256
Built using:
- Merkle-Damgard construction
- Davies-Meyer style compression
- Block cipher-like core: SHACAL-2
Structure:
- 512-bit message block
- 256-bit chaining value
- 256-bit output
## Applications for Integrity and Authentication
### Standalone Usage: Message Integrity
#### Application 1: Delayed Knowledge Verification
Idea:
Publish $h(secret)$ first.
Later reveal secret.
Anyone can recompute hash and verify.
Justification:
Preimage resistance ensures secret is hidden until revealed.
Example:
Stock market prediction commitment.
<details>
<summary>Example for delayed knowledge verification</summary>
1. Publish $H("Stock will rise on May 1")$.
2. On May 1, reveal the prediction string.
3. Anyone computes hash and checks equality.
</details>
#### Application 2: Password Storage
Model:
System must verify password but not store plaintext.
Solution:
Store hash of password.
During login:
- Hash input
- Compare with stored value
Example:
Linux stores hashed passwords in the /etc/shadow file.
Includes:
- Salt
- Password hash
- Metadata
Security relies on:
- One-way property
- Salting to prevent precomputed attacks
#### Application 3: Trusted Timestamping and Blockchains
Goal:
Prove document existed before a given date.
Methods:
- Publish document hash in newspaper.
- Time Stamping Authority signs hash.
- Publish hash in blockchain block.
Blockchain relies on:
- One-way hash functions
- Linking blocks via hash pointers
#### Application 4: Software Integrity with Secure Read-Only Space
Context:
Trusted read-only public space (for example official website).
Process:
1. Publisher computes $H(F_1), H(F_2), \dots, H(F_n)$.
2. Publish hashes publicly.
3. User downloads file $F_i$ and verifies hash.
If $H$ is collision resistant:
Attacker cannot modify file without detection.
No encryption required.
Public verifiability works if read-only space is trusted.
## Symmetric Crypto Authentication: MACs and AE
This section can also be found here [CSE442T Introduction to Cryptography (Lecture 18)](https://notenextra.trance-0.com/CSE442T/CSE442T_L18/#chapter-5-authentication)
### Message Authentication Codes (MACs)
Definition:
MAC $I = (S, V)$ over $(K, M, T)$
- $S(k, m) \to t$
- $V(k, m, t) \to$ yes or no
Security model:
Attacker can query $S(k, m_i)$.
Goal: produce new $(m, t)$ not previously seen such that $V$ accepts.
$Adv_{MAC}[A, I]$ must be negligible.
### MAC from PRF
Given PRF:
$F : K \times X \to Y$
Define MAC:
$S(k, m) = F(k, m)$
$V(k, m, t)$ accepts if $t = F(k, m)$
Theorem:
If $F$ is secure PRF and $|Y|$ is large,
then derived MAC is secure.
Condition:
$1 / |Y|$ must be negligible.
Example: $|Y| = 2^{80}$.

View File

@@ -8,4 +8,8 @@ export default {
CSE4303_L3: "Introduction to Computer Security (Lecture 3)", CSE4303_L3: "Introduction to Computer Security (Lecture 3)",
CSE4303_L4: "Introduction to Computer Security (Lecture 4)", CSE4303_L4: "Introduction to Computer Security (Lecture 4)",
CSE4303_L5: "Introduction to Computer Security (Lecture 5)", CSE4303_L5: "Introduction to Computer Security (Lecture 5)",
CSE4303_L6: "Introduction to Computer Security (Lecture 6)",
CSE4303_L7: "Introduction to Computer Security (Lecture 7)",
CSE4303_L8: "Introduction to Computer Security (Lecture 8)",
CSE4303_L9: "Introduction to Computer Security (Lecture 9)",
} }

View File

@@ -21,7 +21,7 @@ If $\mathbb{R}_l$ is second countable, then for any real number $x$, there is an
Any such open sets is of the form $[x,x+\epsilon)\cap A$ with $\epsilon>0$ and any element of $A$ being larger than $\min(U_x)=x$. Any such open sets is of the form $[x,x+\epsilon)\cap A$ with $\epsilon>0$ and any element of $A$ being larger than $\min(U_x)=x$.
In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. SO there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathbb{B}$ is uncountable. In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. So there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathcal{B}$ is uncountable.
</details> </details>

View File

@@ -27,7 +27,7 @@ $$
Let $(X,\mathcal{T})$ be a topological space. Let $\mathcal{C}\subseteq \mathcal{T}$ be a collection of subsets of $X$ satisfying the following property: Let $(X,\mathcal{T})$ be a topological space. Let $\mathcal{C}\subseteq \mathcal{T}$ be a collection of subsets of $X$ satisfying the following property:
$$ $$
\forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } U\subseteq C \forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } C\subseteq U
$$ $$
Then $\mathcal{C}$ is a basis and the topology generated by $\mathcal{C}$ is $\mathcal{T}$. Then $\mathcal{C}$ is a basis and the topology generated by $\mathcal{C}$ is $\mathcal{T}$.

View File

@@ -0,0 +1,100 @@
# Math4202 Topology II (Lecture 10)
## Algebraic Topology
### Path homotopy
#### Theorem for properties of product of paths
1. If $f\simeq_p f_1, g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$. (Product is well-defined)
2. $([f]*[g])*[h]=[f]*([g]*[h])$. (Associativity)
3. Let $e_{x_0}$ be the constant path from $x_0$ to $x_0$, $e_{x_1}$ be the constant path from $x_1$ to $x_1$. Suppose $f$ is a path from $x_0$ to $x_1$.
$$
[e_{x_0}]*[f]=[f],\quad [f]*[e_{x_1}]=[f]
$$
(Right and left identity)
4. Given $f$ in $X$ a path from $x_0$ to $x_1$, we define $\bar{f}$ to be the path from $x_1$ to $x_0$ where $\bar{f}(t)=f(1-t)$.
$$
f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}
$$
$$
[f]*[\bar{f}]=[e_{x_0}],\quad [\bar{f}]*[f]=[e_{x_1}]
$$
<details>
<summary>Proof</summary>
(1) If $f\simeq_p f_1$, $g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$.
Let $F$ be homotopy between $f$ and $f_1$, $G$ be homotopy between $g$ and $g_1$.
We can define
$$
F*G:[0,1]\times [0,1]\to X,\quad F*G(s,t)=\left(F(-,t)*G(-,t)\right)(s)=\begin{cases}
F(2s,t) & 0\leq s\leq \frac{1}{2}\\
G(2s-1,t) & \frac{1}{2}\leq s\leq 1
\end{cases}
$$
$F*G$ is a homotopy between $f*g$ and $f_1*g_1$.
We can check this by enumerating the cases from definition of homotopy.
---
(2) $([f]*[g])*[h]=[f]*([g]*[h])$.
For $f*(g*h)$, along the interval $[0,\frac{1}{2}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{2},\frac{3}{4}]$ we map $x_2\to x_3$, then along the interval $[\frac{3}{4},1]$ we map $x_3\to x_4$.
For $(f*g)*h$, along the interval $[0,\frac{1}{4}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{4},\frac{1}{2}]$ we map $x_2\to x_3$, then along the interval $[\frac{1}{2},1]$ we map $x_3\to x_4$.
We can construct the homotopy between $f*(g*h)$ and $(f*g)*h$ as follows.
Let $f((4-2t)s)$ for $F(s,t)$,
when $t=0$, $F(s,0)=f(4s)\in f*(g*h)$, when $t=1$, $F(s,1)=f(2s)\in (f*g)*h$.
....
_We make the linear maps between $f*(g*h)$ and $(f*g)*h$ continuous, then $f*(g*h)\simeq_p (f*g)*h$. With our homotopy constructed above_
---
(3) $e_{x_0}*f\simeq_p f\simeq_p f*e_{x_1}$.
We can construct the homotopy between $e_{x_0}*f$ and $f$ as follows.
$$
H(s,t)=\begin{cases}
x_0 & t\geq 2s\\
f(2s-t) & t\leq 2s
\end{cases}
$$
or you may induct from $f(\frac{s-t/2}{1-t/2})$ if you like.
---
(4) $f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}$.
Note that we don't need to reach $x_1$ every time.
$f_t=f(ts)$ $s\in[0,\frac{1}{2}]$.
$\bar{f}_t=\bar{f}(1-ts)$ $s\in[\frac{1}{2},1]$.
</details>
> [!CAUTION]
>
> Homeomorphism does not implies homotopy automatically.
#### Definition for the fundamental group
The fundamental group of $X$ at $x$ is defined to be
$$
(\Pi_1(X,x),*)
$$

View File

@@ -0,0 +1,132 @@
# Math4201 Topology II (Lecture 11)
## Algebraic topology
### Fundamental group
The $*$ operation has the following properties:
#### Properties for the path product operation
Let $[f],[g]\in \Pi_1(X)$, for $[f]\in \Pi_1(X)$, let $s:\Pi_1(X)\to X, [f]\mapsto f(0)$ and $t:\Pi_1(X)\to X, [f]\mapsto f(1)$.
Note that $t([f])=s([g])$, $[f]*[g]=[f*g]\in \Pi_1(X)$.
This also satisfies the associativity. $([f]*[g])*[h]=[f]*([g]*[h])$.
We have left and right identity. $[f]*[e_{t(f)}]=[f], [e_{s(f)}]*[f]=[f]$.
We have inverse. $[f]*[\bar{x}]=[e_{s(f)}], [\bar{x}]*[f]=[e_{t(f)}]$
#### Definition for Groupoid
Let $f,g$ be paths where $g,f:[0,1]\to X$, and consider the function of all pathes in $G$, denoted as $\mathcal{G}$,
Set $t:\mathcal{G}\to X$ be the source map, for this case $t(f)=f(0)$, and $s:\mathcal{G}\to X$ be the target map, for this case $s(f)=f(1)$.
We define
$$
\mathcal{G}^{(2)}=\{(f,g)\in \mathcal{G}\times \mathcal{G}|t(f)=s(g)\}
$$
And we define the operation $*$ on $\mathcal{G}^{(2)}$ as the path product.
This satisfies the following properties:
- Associativity: $(f*g)*h=f*(g*h)$
Consider the function $\eta:X\to \mathcal{G}$, for this case $\eta(x)=e_{x}$.
- We have left and right identity: $\eta(t(f))*f=f, f*\eta(s(f))=f$
- Inverse: $\forall g\in \mathcal{G}, \exists g^{-1}\in \mathcal{G}, g*g^{-1}=\eta(s(g))$, $g^{-1}*g=\eta(t(g))$
#### Definition for loop
Let $x_0\in X$. A path starting and ending at $x_0$ is called a loop based at $x_0$.
#### Definition for the fundamental group
The fundamental group of $X$ at $x$ is defined to be
$$
(\Pi_1(X,x),*)
$$
where $*$ is the product operation, and $\Pi_1(X,x)$ is the set o homotopy classes of loops in $X$ based at $x$.
<details>
<summary>Example of fundamental group</summary>
Consider $X=[0,1]$, with subspace topology from standard topology in $\mathbb{R}$.
$\Pi_1(X,0)=\{e\}$, (constant function at $0$) since we can build homotopy for all loops based at $0$ as follows $H(s,t)=(1-t)f(s)+t$.
And $\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
---
Let $X=\{1,2\}$ with discrete topology.
$\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
$\Pi_1(X,2)=\{e\}$, (constant function at $2$.)
---
Let $X=S^1$ be the circle.
$\Pi_1(X,1)=\mathbb{Z}$ (related to winding numbers, prove next week).
</details>
A natural question is, will the fundamental group depends on the basepoint $x$?
#### Definition for $\hat{\alpha}$
Let $\alpha$ be a path in $X$ from $x_0$ to $x_1$. $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$. Define $\hat{\alpha}:\Pi_1(X,x_0)\to \Pi_1(X,x_1)$ as follows:
$$
\hat{\alpha}(\beta)=[\bar{\alpha}]*[f]*[\alpha]
$$
#### $\hat{\alpha}$ is a group homomorphism
$\hat{\alpha}$ is a group homomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$
<details>
<summary>Proof</summary>
Let $f,g\in \Pi_1(X,x_0)$, then $\hat{\alpha}(f*g)=\hat{\alpha}(f)\hat{\alpha}(g)$
$$
\begin{aligned}
\hat{\alpha}(f*g)&=[\bar{\alpha}]*[f]*[g]*[\alpha]\\
&=[\bar{\alpha}]*[f]*[e_{x_0}]*[g]*[\alpha]\\
&=[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]*[g]*[\alpha]\\
&=([\bar{\alpha}]*[f]*[\alpha])*([\bar{\alpha}]*[g]*[\alpha])\\
&=(\hat{\alpha}(f))*(\hat{\alpha}(g))
\end{aligned}
$$
---
Next, we will show that $\hat{\alpha}\circ \hat{\bar{\alpha}}([f])=[f]$, and $\hat{\bar{\alpha}}\circ \hat{\alpha}([f])=[f]$.
$$
\begin{aligned}
\hat{\alpha}\circ \hat{\bar{\alpha}}([f])&=\hat{\alpha}([\bar{\alpha}]*[f]*[\alpha])\\
&=[\alpha]*[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]\\
&=[e_{x_0}]*[f]*[e_{x_1}]\\
&=[f]
\end{aligned}
$$
The other case is the same
</details>
#### Corollary of fundamental group
If $X$ is path-connected and $x_0,x_1\in X$, then $\Pi_1(X,x_0)$ is isomorphic to $\Pi_1(X,x_1)$.

View File

@@ -0,0 +1,119 @@
# Math4201 Topology II (Lecture 12)
## Algebraic topology
### Fundamental group
Recall from last lecture, the $(\Pi_1(X,x_0),*)$ is a group, and for any two points $x_0,x_1\in X$, the group $(\Pi_1(X,x_0),*)$ is isomorphic to $(\Pi_1(X,x_1),*)$ if $x_0,x_1$ is path connected.
> [!TIP]
>
> How does the $\hat{\alpha}$ (isomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$) depend on the choice of $\alpha$ (path) we choose?
#### Definition of simply connected
A space $X$ is simply connected if
- $X$ is [path-connected](https://notenextra.trance-0.com/Math4201/Math4201_L23/#definition-of-path-connected-space) ($\forall x_0,x_1\in X$, there exists a continuous function $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$)
- $\Pi_1(X,x_0)$ is the trivial group for some $x_0\in X$
<details>
<summary>Example of simply connected space</summary>
Intervals are simply connected.
---
Any star-shaped is simply connected.
---
$S^1$ is not simply connected, but $n\geq 2$, then $S^n$ is simply connected.
</details>
#### Lemma for simply connected space
In a simply connected space $X$, and two paths having the same initial and final points are path homotopic.
<details>
<summary>Proof</summary>
Let $f,g$ be paths having the same initial and final points, then $f(0)=g(0)=x_0$ and $f(1)=g(1)=x_1$.
Therefore $[f]*[\bar{g}]\simeq_p [e_{x_0}]$ (by simply connected space assumption).
Then
$$
\begin{aligned}
[f]*[\bar{g}]&\simeq_p [e_{x_0}]\\
([f]*[\bar{g}])*[g]&\simeq_p [e_{x_0}]*[g]\\
[f]*([\bar{g}]*[g])&\simeq_p [e_{x_0}]*[g]\\
[f]*[e_{x_1}]&\simeq_p [e_{x_0}]*[g]\\
[f]&\simeq_p [g]
\end{aligned}
$$
</details>
#### Definition of group homomorphism induced by continuous map
Let $h:(X,x_0)\to (Y,y_0)$ be a continuous map, define $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ where $h(x_0)=y_0$. by $h_*([f])=[h\circ f]$.
$h_*$ is called the group homomorphism induced by $h$ relative to $x_0$.
<details>
<summary>Check the homomorphism property</summary>
$$
\begin{aligned}
h_*([f]*[g])&=h_*([f*g])\\
&=[h_*[f*g]]\\
&=[h_*[f]*h_*[g]]\\
&=[h_*[f]]*[h_*[g]]\\
&=h_*([f])*h_*([g])
\end{aligned}
$$
</details>
#### Theorem composite of group homomorphism
If $h:(X,x_0)\to (Y,y_0)$ and $k:(Y,y_0)\to (Z,z_0)$ are continuous maps, then $k_* \circ h_*:\Pi_1(X,x_0)\to \Pi_1(Z,z_0)$ where $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$, $k_*:\Pi_1(Y,y_0)\to \Pi_1(Z,z_0)$,is a group homomorphism.
<details>
<summary>Proof</summary>
Let $f$ be a loop based at $x_0$.
$$
\begin{aligned}
k_*(h_*([f]))&=k_*([h\circ f])\\
&=[k\circ h\circ f]\\
&=[(k\circ h)\circ f]\\
&=(k\circ h)_*([f])\\
\end{aligned}
$$
</details>
#### Corollary of composite of group homomorphism
Let $\operatorname{id}:(X,x_0)\to (X,x_0)$ be the identity map. This induces $(\operatorname{id})_*:\Pi_1(X,x_0)\to \Pi_1(X,x_0)$.
If $h$ is a homeomorphism with the inverse $k$, with
$$
k_*\circ h_*=(k\circ h)_*=(\operatorname{id})_*=I=(\operatorname{id})_*=(h\circ k)_*
$$
This induced $h_*: \Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ is an isomorphism.
#### Corollary for homotopy and group homomorphism
If $h,k:(X,x_0)\to (Y,y_0)$ are homotopic maps form $X$ to $Y$ such that the homotopy $H_t(x_0)=y_0,\forall t\in I$, then $h_*=k_*$.
$$
h_*([f])=[h\circ f]\simeq_p[k\circ h]=k_*([f])
$$

View File

@@ -0,0 +1,59 @@
# Math4202 Topology II (Lecture 13)
## Algebraic Topology
### Covering space
#### Definition of partition into slice
Let $p:E\to B$ be a continuous surjective map. The open set $U\subseteq B$ is said to be evenly covered by $p$ if it's inverse image $p^{-1}(U)$ can be written as the union of **disjoint open sets** $V_\alpha$ in $E$. Such that for each $\alpha$, the restriction of $p$ to $V_\alpha$ is a homeomorphism of $V_\alpha$ onto $U$.
The collection of $\{V_\alpha\}$ is called a **partition** $p^{-1}(U)$ into slice.
_Stack of pancakes ($\{V_\alpha\}$) on plate $U$, each $V_\alpha$ is a pancake homeomorphic to $U$_
_Note that all the sets in the definition are open._
#### Definition of covering space
Let $p:E\to B$ be a continuous surjective map. If every point $b$ of $B$ has a neighborhood **evenly covered** by $p$, which means $p^{-1}(U)$ is partitioned into slice, then $p$ is called a covering map and $E$ is called a covering space.
<details>
<summary>Examples of covering space</summary>
identity map is a covering map
---
Consider the $B\times \Gamma\to B$ with $\Gamma$ being the discrete topology with the projection map onto $B$.
This is a covering map.
---
Let $S^1=\{z\mid |z|=1\}$, then $p=z^n$ is a covering map to $S^1$.
Solving the inverse image for the $e^{i\theta}$ with $\epsilon$ interval, we can get $n$ slices for each neighborhood of $e^{i\theta}$, $-\epsilon< \theta< \epsilon$.
You can continue the computation and find the exact $\epsilon$ so that the inverse image of $p^{-1}$ is small and each interval don't intersect (so that we can make homeomorphism for each interval).
Usually, we don't choose the $U$ to be the whole space.
---
Consider the projection for the boundary of mobius strip into middle circle.
This is a covering map since the boundary of mobius strip is winding the middle circle twice, and for each point on the middle circle with small enough neighborhood, there will be two disjoint interval on the boundary of mobius strip that are homeomorphic to the middle circle.
</details>
#### Proposition of covering map is open map
If $p:E\to B$ is a covering map, then $p$ is an open map.
<details>
<summary>Proof</summary>
Consider arbitrary open set $V\subseteq E$, consider $U=p(V)$, for every point $q\in U$, with neighborhood $q\in W$, the inverse image of $W$ is open, continue next lecture.
</details>

View File

@@ -0,0 +1,145 @@
# Math4202 Topology II (Lecture 9)
## Algebraic Topology
### Path homotopy
Consider the space of paths up to homotopy equivalence.
$$
\operatorname{Path}/\simeq_p(X) =\Pi_1(X)
$$
We want to impose some group structure on $\operatorname{Path}/\simeq_p(X)$.
Consider the $*$ operation on $\operatorname{Path}/\simeq_p(X)$.
Let $f,g:[0,1]\to X$ be two paths, where $f(0)=a$, $f(1)=g(0)=b$ and $g(1)=c$.
$$
f*g:[0,1]\to X,\quad f*g(t)=\begin{cases}
f(2t) & 0\leq t\leq \frac{1}{2}\\
g(2t-1) & \frac{1}{2}\leq t\leq 1
\end{cases}
$$
This connects our two paths.
#### Definition for product of paths
Given $f$ a path in $X$ from $x_0$ to $x_1$ and $g$ a path in $X$ from $x_1$ to $x_2$.
Define the product $f*g$ of $f$ and $g$ to be the map $h:[0,1]\to X$.
#### Definition for equivalent classes of paths
$\Pi_1(X,x)$ is the equivalent classes of paths starting and ending at $x$.
On $\Pi_1(X,x)$,, we define $\forall [f],[g],[f]*[g]=[f*g]$.
$$
[f]\coloneqq \{f_i:[0,1]\to X|f_0(0)=f(0),f_i(1)=f(1)\}
$$
#### Lemma
If we have some path $k:X\to Y$ is a continuous map, and if $F$ is path homotopy between $f$ and $f'$ in $X$, then $k\circ F$ is path homotopy between $k\circ f$ and $k\circ f'$ in $Y$.
If $k:X\to Y$ is a continuous map, and $f,g$ are two paths in $X$ with $f(1)=g(0)$, then
$$
(k\circ f)*(k\circ g)=k\circ(f*g)
$$
<details>
<summary>Proof</summary>
We check the definition of path homotopy.
$k\circ F:I\times I\to Y$ is continuous.
$k\circ F(s,0)=k(F(s,0))=k(f(s))=k\circ f(s)$.
$k\circ F(s,1)=k(F(s,1))=k(f'(s))=k\circ f'(s)$.
$k\circ F(0,t)=k(F(0,t))=k(f(0))=k(x_0$.
$k\circ F(1,t)=k(F(1,t))=k(f'(1))=k(x_1)$.
Therefore $k\circ F$ is path homotopy between $k\circ f$ and $k\circ f'$ in $Y$.
---
For the second part of the lemma, we proceed from the definition.
$$
(k\circ f)*(k\circ g)(t)=\begin{cases}
k\circ f(2t) & 0\leq t\leq \frac{1}{2}\\
k\circ g(2t-1) & \frac{1}{2}\leq t\leq 1
\end{cases}
$$
and
$$
k\circ(f*g)=k(f*g(t))=k\left(\begin{cases}
f(2t) & 0\leq t\leq \frac{1}{2}\\
g(2t-1) & \frac{1}{2}\leq t\leq 1
\end{cases}\right)=\begin{cases}
k(f(2t))=k\circ f(2t) & 0\leq t\leq \frac{1}{2}\\
k(g(2t-1))=k\circ g(2t-1) & \frac{1}{2}\leq t\leq 1
\end{cases}
$$
</details>
#### Theorem for properties of product of paths
1. If $f\simeq_p f_1, g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$. (Product is well-defined)
2. $([f]*[g])*[h]=[f]*([g]*[h])$. (Associativity)
3. Let $e_{x_0}$ be the constant path from $x_0$ to $x_0$, $e_{x_1}$ be the constant path from $x_1$ to $x_1$. Suppose $f$ is a path from $x_0$ to $x_1$.
$$
[e_{x_0}]*[f]=[f],\quad [f]*[e_{x_1}]=[f]
$$
(Right and left identity)
4. Given $f$ in $X$ a path from $x_0$ to $x_1$, we define $\bar{f}$ to be the path from $x_1$ to $x_0$ where $\bar{f}(t)=f(1-t)$.
$$
f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}
$$
$$
[f]*[\bar{f}]=[e_{x_0}],\quad [\bar{f}]*[f]=[e_{x_1}]
$$
<details>
<summary>Proof</summary>
(1) If $f\simeq_p f_1$, $g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$.
Let $F$ be homotopy between $f$ and $f_1$, $G$ be homotopy between $g$ and $g_1$.
We can define
$$
F*G:[0,1]\times [0,1]\to X,\quad F*G(s,t)=\left(F(-,t)*G(-,t)\right)(s)=\begin{cases}
F(2s,t) & 0\leq s\leq \frac{1}{2}\\
G(2s-1,t) & \frac{1}{2}\leq s\leq 1
\end{cases}
$$
$F*G$ is a homotopy between $f*g$ and $f_1*g_1$.
We can check this by enumerating the cases from definition of homotopy.
---
Continue next time.
</details>
#### Definition for the fundamental group
The fundamental group of $X$ at $x$ is defined to be
$$
(\Pi_1(X,x),*)
$$

View File

@@ -11,4 +11,9 @@ export default {
Math4202_L6: "Topology II (Lecture 6)", Math4202_L6: "Topology II (Lecture 6)",
Math4202_L7: "Topology II (Lecture 7)", Math4202_L7: "Topology II (Lecture 7)",
Math4202_L8: "Topology II (Lecture 8)", Math4202_L8: "Topology II (Lecture 8)",
Math4202_L9: "Topology II (Lecture 9)",
Math4202_L10: "Topology II (Lecture 10)",
Math4202_L11: "Topology II (Lecture 11)",
Math4202_L12: "Topology II (Lecture 12)",
Math4202_L13: "Topology II (Lecture 13)",
} }

View File

@@ -0,0 +1,131 @@
# Math4302 Modern Algebra (Lecture 10)
## Groups
### Group homomorphism
Recall the kernel of a group homomorphism is the set
$$
\operatorname{ker}(\phi)=\{a\in G|\phi(a)=e'\}
$$
<details>
<summary>Example</summary>
Let $\phi:(\mathbb{Z},+)\to (\mathbb{Z}_n,+)$ where $\phi(k)=k\mod n$.
The kernel of $\phi$ is the set of all multiples of $n$.
</details>
#### Theorem for one-to-one group homomorphism
$\phi:G\to G'$ is one-to-one if and only if $\operatorname{ker}(\phi)=\{e\}$
If $\phi$ is one-to-one, then $\phi(G)\leq G'$, $G$ is isomorphic ot $\phi(G)$ (onto automatically).
If $A$ is a set, then a permutation of $A$ is a bijection $f:A\to A$.
#### Cayley's Theorem
Every group $G$ is isomorphic to a subgroup of $S_A$ for some $A$ (and if $G$ is finite then $A$ can be taken to be finite.)
<details>
<summary>Example</summary>
$D_n\leq S_n$, so $A=\{1,2,\cdots,n\}$
---
$\mathbb{Z}_n\leq S_n$, (use the set of rotations) so $A=\{1,2,\cdots,n\}$ $\phi(i)=\rho^i$ where $i\in \mathbb{Z}_n$ and $\rho\in D_n$
---
$GL(2,\mathbb{R})$. Set $A=\mathbb{R}^2$, for every $A\in GL(2,\mathbb{R})$, let $\phi(A)$ be the permutation of $\mathbb{R}^2$ induced by $A$, so $\phi(A)=f_A:\mathbb{R}^2\to \mathbb{R}^2$, $f_A(\begin{pmatrix}x\\y\end{pmatrix})=A\begin{pmatrix}x\\y\end{pmatrix}$
We want to show that this is a group homomorphism.
- $\phi(AB)=\phi(A)\phi(B)$ (it is a homomorphism)
$$
\begin{aligned}
f_{AB}(\begin{pmatrix}x\\y\end{pmatrix})&=AB\begin{pmatrix}x\\y\end{pmatrix}\\
&=f_A(B\begin{pmatrix}x\\y\end{pmatrix})\\
&=f_A(f_B(\begin{pmatrix}x\\y\end{pmatrix}))\\
&=(f_A\circ f_B)(\begin{pmatrix}x\\y\end{pmatrix})\\
\end{aligned}
$$
- Then we need to show that $\phi$ is one-to-one.
It is sufficient to show that $\operatorname{ker}(\phi)=\{e\}$.
Solve $f_A(\begin{pmatrix}x\\y\end{pmatrix})=\begin{pmatrix}x\\y\end{pmatrix}$, the only choice for $A$ is the identity matrix.
Therefore $\operatorname{ker}(\phi)=\{e\}$.
</details>
<details>
<summary>Proof for Cayley's Theorem</summary>
Let $A=G$, for every $g\in G$, define $\lambda_g:G\to G$ by $\lambda_g(x)=gx$.
Then $\lambda_g$ is a **permutation** of $G$. (not homomorphism)
- $\lambda_g$ is one-to-one by cancellation on the left.
- $\lambda_g$ is onto since $\lambda_g(g^{-1}y)=y$ for every $y\in G$.
We claim $\phi: G\to S_G$ define by $\phi(g)=\lambda_g$ is a group homomorphism that is one-to-one.
First we show that $\phi$ is homomorphism.
$\forall x\in G$
$$
\begin{aligned}
\phi(g_1)\phi(g_2)&=\lambda_{g_1}(\lambda_{g_2}(x))\\
&=\lambda_{g_1g_2}(x)\\
&=\phi(g_1g_2)x\\
\end{aligned}
$$
This is one to one since if $\phi(g_1)=\phi(g_2)$, then $\lambda_{g_1}=\lambda_{g_2}\forall x$, therefore $g_1=g_2$.
</details>
### Odd and even permutations
#### Definition of transposition
A $\sigma\in S_n$ is a transposition is a two cycle $\sigma=(i j)$
Fact: Every permutation in $S_n$ can be written as a product of transpositions. (may not be disjoint transpositions)
<details>
<summary>Example of a product of transpositions</summary>
Consider $(1234)=(14)(13)(12)$.
In general, $(i_1,i_2,\cdots,i_m)=(i_1i_m)(i_2i_{m-1})(i_3i_{m-2})\cdots(i_1i_2)$
This is not the unique way.
$$
(12)(34)=(42)(34)(23)(12)
$$
</details>
But the parity of the number of transpositions is unique.
#### Theorem for parity of transpositions
If $\sigma\in S_n$ is written as a product of transposition, then the number of transpositions is either always odd or even.
#### Definition of odd and even permutations
$\sigma$ is an even permutation if the number of transpositions is even.
$\sigma$ is an odd permutation if the number of transpositions is odd.

View File

@@ -0,0 +1,163 @@
# Math4302 Modern Algebra (Lecture 11)
## Groups
### Symmetric groups
#### Definition of odd and even permutations
$\sigma$ is an even permutation if the number of transpositions is even.
$\sigma$ is an odd permutation if the number of transpositions is odd.
#### Theorem for parity of transpositions
The parity of the number of transpositions is unique.
<details>
<summary>Proof</summary>
Prove using the determinant of a matrix, swapping the rows of the matrix multiply the determinant by $-1$.
Consider the identity matrix $I_n$. Then the determinant is $1$, let $(ij)A$, where $i\neq j$ denote the matrix obtained from $A$ by swapping the rows $j$ and $i$, then the determinant of $(1j)A$ is $-1$.
And,
$$
\det((a_1b_1)(a_2b_2)\cdots(a_nb_n)A)=(-1)^n\det(A)
$$
</details>
$S_3$ has 6 permutations $\{e,(12),(13),(23),(12)(23),(13)(23)\}$, 3 of them are even $\{e,(12)(23),(13)(23)\}$ and 3 of them are odd $\{(13),(12),(23)\}$.
#### Theorem for the number of odd and even permutations in symmetric groups
In general, $S_n$ has $n!$ permutations, half of them are even and half of them are odd.
<details>
<summary>Proof</summary>
Consider the set of odd permutations in $S_n$ and set of even permutations in $S_n$. Consider the function: $\alpha:S_n\to S_n$ where $\alpha(\sigma)=\sigma(12)$.
$\sigma$ is a bijection,
If $\sigma_1(12)=\sigma_2(12)$, then $\sigma_1=\sigma_2$.
If $\phi$ is an even permutation, $\alpha(\phi(12))=\phi(12)(12)=\phi$, therefore the number of elements in the set of odd and even permutations are the same.
</details>
#### Definition for sign of permutations
For $\sigma\in S_n$, the sign of $\sigma$ is defined by $\operatorname{sign}(\sigma)=1$ if sigma is even and $-1$ if sigma is odd.
Then $\beta: S_n\to \{1,-1\}$ is a group under multiplication, where $\beta(\sigma)=\operatorname{sign}(\sigma)$.
Then $\beta$ is a group homomorphism.
#### Definition of alternating group
$\ker(\beta)\leq S_n$, and $\ker(\beta)$ is the set of even permutations. Therefore the set of even permutations is a subgroup of $S_n$. We denote as $A_n$ (also called alternating group).
and $|A_n|=\frac{n!}{2}$.
### Direct product of groups
#### Definition of direct product of groups
Let $G_1,G_2$ be two groups. Then the direct product of $G_1$ and $G_2$ is defined as
$$
G_1\times G_2=\{(g_1,g_2):g_1\in G_1,g_2\in G_2\}
$$
The operations are defined by $(a_1,b_1)*(a_2,b_2)=(a_1*a_2,b_1*b_2)$.
This group is well defined since:
The identity is $(e_1,e_2)$, where $e_1\in G_1$ and $e_2\in G_2$. (easy to verify)
The inverse is $(a_1,b_1)^{-1}=(a_1^{-1},b_1^{-1})$.
Associativity automatically holds by associativity of $G_1$ and $G_2$.
<details>
<summary>Examples</summary>
Consider $\mathbb{Z}_\1\times \mathbb{Z}_2$.
$$
\mathbb{Z}_\1\times \mathbb{Z}_2=\{(0,0),(0,1),(1,0),(1,1)\}
$$
$(0,0)^2=(0,0)$, $(0,1)^2=(0,0)$, $(1,0)^2=(0,0)$, $(1,1)^2=(0,0)$
This is not a cyclic group, this is isomorphic to klein four group.
---
Consider $\mathbb{Z}_2\times \mathbb{Z}_3$.
$$
\mathbb{Z}_2\times \mathbb{Z}_3=\{(0,0),(0,1),(0,2),(1,0),(1,1),(1,2),(2,0),(2,1),(2,2)\}
$$
This is cyclic ((2,3) are coprime)
Consider:
$$
\langle (1,1)\rangle=\{(0,0),(1,1),(0,2),(1,0),(0,1),(1,2)\}
$$
</details>
#### Lemma for direct product of cyclic groups
$\mathbb{Z}_m\times \mathbb{Z}_n\simeq \mathbb{Z}_{mn}$ if and only if $m$ and $n$ have greatest common divisor $1$.
<details>
<summary>Proof</summary>
First assume $\operatorname{gcd}(m,n)=d>1$
Consider $(r,s)\in \mathbb{Z}_m\times \mathbb{Z}_n$.
We claim that order of $(r,s)$ is at most $\frac{mn}{d}<mn$.
Since $\frac{mn}{d}$ is integer, $\frac{mn}{d}=m_1dn_1$ where $m_1d$ is multiple of $m$ and $n_1d$ is multiple of $n$.
Therefore $r$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_m$ and $s$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_n$.
---
Other direction:
Assume $\operatorname{gcd}(m,n)=1$.
Claim order of $(1,1)=mn$, so $\mathbb{Z}_m\times \mathbb{Z}_n=\langle (1,1)\rangle$.
If $k$ is the order of $(1,1)$, then $k$ is a multiple of $m$ and a multiple of $n$.
</details>
Similarly, if $G_1,G_2,G_3,\ldots,G_k$ are groups, then
$$
G_1\times G_2\times G_3\times \cdots\times G_k=\{(g_1,g_2,\ldots,g_k):g_1\in G_1,g_2\in G_2,\ldots,g_k\in G_k\}
$$
is a group.
Easy to verify by associativity. $(G_1\times G_2)\times G_3=G_1\times G_2\times G_3$.
#### Some extra facts for direct product
1. $G_1\times G_2\simeq G_2\times G_1$, with $\phi(a_1,a_2)=(a_2,a_1)$.
2. If $H_1\leq G_1$ and $H_2\leq G_2$, then $H_1\times H_2\leq G_1\times G_2$.
> [!WARNING]
>
> Not every subgroup of $G_1\times G_2$ is of the form $H_1\times H_2$.
>
> Consider $\mathbb{Z}_2\times \mathbb{Z}_2$ with subgroup $\{(0,0),(1,1)\}$, This forms a subgroup but not of the form $H_1\times H_2$.

View File

@@ -0,0 +1,135 @@
# Math4303 Modern Algebra (Lecture 12)
## Groups
### Direct products
$\mathbb{Z}_m\times \mathbb{Z}_n$ is cyclic if and only if $m$ and $n$ have greatest common divisor $1$.
More generally, for $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times \cdots \times \mathbb{Z}_{n_k}$, if $n_1,n_2,\cdots,n_k$ are pairwise coprime, then the direct product is cyclic.
<details>
<summary>Proof</summary>
For the forward direction, use $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}=\mathbb{Z}_{n_1n_2}$. if $n_1, n_2$ are coprime.
For the backward, suppose to the contrary that for example $\gcd(n_1,n_2)=d>1$, then $G=\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times H$, where any element in $H$ has order $\leq |H|$ and any element in $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}$ has order $<\frac{n_1n_2}{d}$, therefore, all the elements in $G$ will have order strictly less than the size $n_1n_2\ldots n_k$ of the group.
</details>
#### Corollary for composition of cyclic groups
If $n=p_1^{m_1}\ldots p_k^{m_k}$, where $p_i$ are distinct primes, then the group
$$
G=\mathbb{Z}_n=\mathbb{Z}_{p_1^{m_1}}\times \mathbb{Z}_{p_2^{m_2}}\times \cdots \times \mathbb{Z}_{p_k^{m_k}}
$$
is cyclic.
<details>
<summary>Example for product of cyclic groups and order of element</summary>
$$
\mathbb{Z}_{8}\times\mathbb{Z}_8\times \mathbb{Z}_12
$$
the order for $(1,1,1)$ is 24.
What is the maximum order of an element in this group?
Guess:
$8*3=24$
</details>
### Structure of finitely generated abelian groups
#### Theorem for finitely generated abelian groups
Every finitely generated abelian group $G$ is isomorphic to
$$
Z_{p_1}^{n_1}\times Z_{p_2}^{n_2}\times \cdots \times Z_{p_k}^{n_k}\times\underbrace{\mathbb{Z}\times \ldots \times \mathbb{Z}}_{m\text{ times}}
$$
<details>
<summary>Example</summary>
If $G$ is abelian of size $8$, then $G$ is isomorphic to one of the following:
- $\mathbb{Z}_2\times \mathbb{Z}_2\times \mathbb{Z}_2$ (non cyclic)
- $\mathbb{Z}_2\times \mathbb{Z}_4$ (non cyclic)
- $\mathbb{Z}_2$ (cyclic)
And any two of them are not isomorphic
---
Find all abelian group of order $72$.
Since $72=2^3*3^2$, There are 3 possibilities for the $2^3$ part, and there are 2 possibilities for the $3^2$ part.
Note that $\mathbb{Z}_8\times\mathbb{Z}_9$, where $8,9$ are coprime, $\mathbb{Z}_8\times\mathbb{Z}_9=\mathbb{Z}_{72}$, is cyclic.
There are 6 possibilities in total.
</details>
#### Corollary for divisor size of abelian subgroup
If $g$ is abelian and $|G|=n$, then for every divisor $m$ of $n$, $G$ has a subgroup of order $m$.
> [!WARNING]
>
> This is not true if $G$ is not abelian.
>
> Consider $A_4$ (alternating group for $S_4$) does not have a subgroup of order 6.
<details>
<summary>Proof for the corollary</summary>
Write $G=\mathbb{Z}_{p_1}^{n_1}\times \mathbb{Z}_{p_2}^{n_2}\times \cdots \times \mathbb{Z}_{p_k}^{n_k}$ where $p_i$ are distinct primes.
Therefore $n=p_1^{m_1}\ldots p_k^{m_k}$.
For any divisor $d$ of $n$, we can write $d=p_1^{m_1}\ldots p_k^{m_k}$, where $m_i\leq n_i$.
Now for each $p_i$, we choose the subgroup $H_i$ of size $p_i^{m_i}$ in $\mathbb{Z}_{p_i}^{n_i}$. (recall that every cyclic group of size $r$ and any divisor $s$ of $r$, there is a subgroup of order $s$. If the group is generated by $a$, then use $a^{\frac{r}{s}}$ to generate the subgroup.)
We can construct the subgroup $H=H_1\times H_2\times \cdots \times H_k$ is the subgroup of $G$ of order $d$.
</details>
### Cosets
#### Definition of Cosets
Let $G$ be a group and $H$ its subgroup.
Define a relation on $G$ and $a\sim b$ if $a^{-1}b\in H$.
This is an equivalence relation.
- Reflexive: $a\sim a$: $a^{-1}a=e\in H$
- Symmetric: $a\sim b\Rightarrow b\sim a$: $a^{-1}b\in H$, $(a^{-1}b)^{-1}=b^{-1}a\in H$
- Transitive: $a\sim b$ and $b\sim c\Rightarrow a\sim c$ : $a^{-1}b\in H, b^{-1}c\in H$, therefore their product is also in $H$, $(a^{-1}b)(b^{-1}c)=a^{-1}c\in H$
So we get a partition of $G$ to equivalence classes.
Let $a\in G$, the equivalence class containing $a$
$$
aH=\{x\in G| a\sim x\}=\{x\in G| a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
$$
This is called the coset of $a$ in $H$.
<details>
<summary>Example</summary>
Consider $G=S_3$
</details>

View File

@@ -0,0 +1,143 @@
# Math4302 Modern Algebra (Lecture 13)
## Groups
### Cosets
Last time we see that (left coset) $a\sim b$ (to differentiate from right coset, we may denote it as $a\sim_L b$) by $a^{-1}b\in H$ defines an equivalence relation.
#### Definition of Equivalence Class
Let $a\in H$, and the equivalence class containing $a$ is defined as:
$$
aH=\{x|a\simeq x\}=\{x|a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
$$.
#### Properties of Equivalence Class
$aH=bH$ if and only if $a\sim b$.
<details>
<summary>Proof</summary>
If $aH=bH$, then since $a\in aH, a\in bH$, then for some $h$, $a=bh$, since $b^{-1}a\in H$, so $a^{-1}b\in H$, therefore $a\simeq b$.
If $a\sim b$, then $aH\subseteq bH$, since anything in $aH$ is related to $a$, therefore it is related to $b$ so $a\in bH$.
$bH\subseteq aH$, apply the reflexive property for equivalence relation, therefore $b\in aH$.
So $aH=bH$.
</details>
If $aH\cap bH\neq \emptyset$, then $aH=bH$.
<details>
<summary>Proof</summary>
If $x\in aH\cap bH$, then $x\sim a$ and $x\sim b$, so $a\sim b$, so $aH=bH$.
</details>
$aH=H$ if and only if $a\in H$.
<details>
<summary>Proof</summary>
$aH=eH$ if and only if $a\sim e$, if and only if $a\in H$.
</details>
$aH$ is called **left coset** of $a$ in $H$.
<details>
<summary>Examples</summary>
Consider $G=S_3=\{e,\rho,\rho^2,\tau_1,\tau_2,\tau_3\}$.
where $\rho=(123),\rho^2=(132),\tau_1=(12),\tau_2=(23),\tau_3=(13)$.
$H=\{e,\rho,\rho^2\}$.
All the left coset for $H$ is $H=eH=\rho H=\rho^2H$.
$$
\tau_1\rho=(23)=\tau_2\\
\tau_1\rho^2=(13)=\tau_3\\
\tau_2\rho=(31)=\tau_3\\
\tau_2\rho^2=(12)=\tau_1
\tau_3\rho=(12)=\tau_1\\
\tau_3\rho^2=(23)=\tau_2
$$
$$
\tau_1H=\{\tau_1,\tau_2,\tau_3\}=\tau_2H=\tau_3H\\
$$
---
Consider $G=\mathbb{Z}$ with $H=5\mathbb{Z}$.
We have 5 cosets, $H,1+H,2+H,3+H,4+H$.
</details>
#### Lemma for size of cosets
Any coset of $H$ has the same cardinality as $H$.
Define $\phi:H\to aH$ by $\phi(h)=ah$.
$\phi$ is an bijection, if $ah=ah'\implies h=h'$, it is onto by definition of $aH$.
#### Corollary: Lagrange's Theorem
If $G$ is a finite group, and $H\leq G$, then $|H|\big\vert |G|$. (size of $H$ divides size of $G$)
<details>
<summary>Proof</summary>
Suppose $H$ has $r$ distinct cosets, then $|G|=r|H|$, so $|H|$ divides $|G|$.
</details>
#### Corollary for Lagrange's Theorem
If $|G|=p$, where $p$ is a prime number, then $G$ is cyclic.
<details>
<summary>Proof</summary>
Prick $e\neq a\in G$, let $H=\langle a\rangle \leq G$, then $|H|$ divides $|G|$, since $p$ is prime, then $|H|=|G|$, so $G=\langle a \rangle$.
</details>
If $G$ is finite and $a\in G$, then $\operatorname{ord}(a)\big\vert|G|$.
<details>
<summary>Proof</summary>
Since $\operatorname{ord}(a)=|\langle a\rangle|$, and $\langle a\rangle $ is a subgroup, so $\operatorname{ord}(a)\big\vert|G|$.
</details>
#### Definition of index
Suppose $H\leq G$, the number of distinct left cosets of $H$ is called the index of $H$ in $G$. Notation is $(G:H)$.
#### Definition of right coset
Suppose $H\leq G$, define the equivalence relation by $a\sim 'b$ (or $a\sim_R b$ in some textbook) if $a b^{-1}\in H$. (note the in left coset, we use $a^{-1}b \in H$, or equivalently $b^{-1}a \in H$, these are different equivalence relations)
The equivalent class is defined
$$
Ha=\{x\in G|x\sim'a\}=\{x\in G|xa^{-1}\in H\}=\{x|x=ha\text{ for some }h\in H\}
$$
Some properties are the same as the left coset
- $Ha=H\iff a\in H$
- $Ha=Hb$ if and only if $a\sim'b\iff a b^{-1}\in H$.
- $Ha\cap Hb\neq \emptyset\iff Ha=Hb$.
Some exercises: Find all the left and right cosets of $G=S_3$, there should be 2 left cosets and 2 right cosets (giving different partition of $G$).

View File

@@ -0,0 +1,138 @@
# Math4302 Modern Algebra (Lecture 9)
## Groups
### Non-cyclic groups
#### Dihedral groups
The dihedral group $D_n$ is the group of symmetries of a regular $n$-gon.
(Permutation that sends adjacent vertices to adjacent vertices)
$D_n<S_n$
$|S_n|=n!, |D_n|=2n$
We can classify dihedral groups as follows:
$\rho \in D_n$ as the rotation of a regular $n$-gon by $\frac{2\pi}{n}$.
$\phi\in D_n$ as a reflection of a regular $n$-gon with respect to $x$-axis.
We can enumerate the elements of $D_n$ as follows:
$$
D_n=\langle \phi,\rho\rangle=\{e,\rho,\rho^2,\cdots,\rho^{n-1},\phi,\phi\rho,\phi\rho^2,\cdots,\phi\rho^{n-1}\}
$$
We claim these elements are all distinct.
<details>
<summary>Proof</summary>
Consider the first half, clearly $\rho_i\neq \rho_j$ if $0\leq i<j\leq n-1$.
Also $\phi\rho_i\neq \phi\rho_j$ if $0\leq i<j\leq n-1$. otherwise $\rho_i=\rho_j$
Also $\rho^i\neq \rho^j\phi$ where $0\leq i,j\leq n-1$.
Otherwise $\rho^{i-j}=\phi$, but reflection (with some point fixed) cannot be any rotation (no points are fixed).
</details>
In $D_n$, $\phi\rho=\rho^{n-1}\phi$, more generally, $\phi\rho^i=\rho^{n-i}\phi$ for any $i\in\mathbb{Z}$.
### Group homomorphism
#### Definition for group homomorphism
Let $G,G'$ be groups.
$\phi:G\to G'$ is called a group homomorphism if $\phi(g_1g_2)=\phi(g_1)\phi(g_2)$ for all $g_1,g_2\in G$ (Note that $\phi$ may not be bijective).
This is a weaker condition than isomorphism.
<details>
<summary>Example</summary>
$GL(2,\mathbb{R})=\{A\in M_{2\times 2}(\mathbb{R})|det(A)\neq 0\}$
Then $\phi:GL(2,\mathbb{R})\to (\mathbb{R}-\{0\},\cdot)$ where $\phi(A)=\det(A)$ is a group homomorphism, since $\det(AB)=\det(A)\det(B)$.
This is not one-to-one but onto, therefore not an isomorphism.
---
$(\mathbb{Z}_n,+)$ and $D_n$ has homomorphism $(\mathbb{Z}_n,+)\to D_n$ where $\phi(k)=\rho^k$
$\phi(i+j)=\rho^{i+j\mod n}=\rho^i\rho^j=\phi(i)+\phi(j)$.
This is not onto but one-to-one, therefore not an isomorphism.
---
Let $G,G'$ be two groups, let $e$ be the identity of $G$ and let $e'$ be the identity of $G'$.
Let $\phi:G\to G'$, $\phi(a)=e'$ for all $a\in G$.
This is a group homomorphism,
$$
\phi(ab)=\phi(a)\phi(b)=e'e'=e'
$$
This is generally not onto and not one-to-one, therefore not an isomorphism.
</details>
#### Corollary for group homomorphism
Let $G,G'$ be groups and $\phi:G\to G'$ be a group homomorphism. $e$ is the identity of $G$ and $e'$ is the identity of $G'$.
1. $\phi(e)=e'$
2. $\phi(a^{-1})=(\phi(a))^{-1}$ for all $a\in G$
3. If $H\leq G$, then $\phi(H)\leq G'$, where $\phi(H)=\{\phi(a)|a\in H\}$.
4. If $K\leq G'$ then $\phi^{-1}(K)\leq G$, where $\phi^{-1}(K)=\{a\in G|\phi(a)\in K\}$.
<details>
<summary>Proof</summary>
(1) $\phi(e)=e'$
Consider $\phi(ee)=\phi(e)\phi(e)$, therefore $\phi(e)=e'$ by cancellation on the left.
---
(2) $\phi(a^{-1})=(\phi(a))^{-1}$
Consider $\phi(a^{-1}a)=\phi(a^{-1})\phi(a)=\phi(e)$, therefore $\phi(a^{-1})$ is the inverse of $\phi(a)$ in $G'$.
---
(3) If $H\leq G$, then $\phi(H)\leq G'$, where $\phi(H)=\{\phi(a)|a\in H\}$.
- $e\in H$ implies that $e'=\phi(e)\in\phi(H)$.
- If $x\in \phi(H)$, then $x=\phi(a)$ for some $a\in H$. So $x^{-1}=(\phi(x))^{-1}=\phi(x^{-1})\in\phi(H)$. But $x\in H$, so $x^{-1}\in H$, therefore $x^{-1}\in\phi(H)$.
- If $x,y\in \phi(H)$, then $x,y=\phi(a),\phi(b)$ for some $a,b\in H$. So $xy=\phi(a)\phi(b)=\phi(ab)\in\phi(H)$ (by homomorphism). Since $ab\in H$, $xy\in\phi(H)$.
---
(4) If $K\leq G'$ then $\phi^{-1}(K)\leq G$, where $\phi^{-1}(K)=\{a\in G|\phi(a)\in K\}$.
- $e'\in K$ implies that $e=\phi^{-1}(e')\in\phi^{-1}(K)$.
- If $x\in \phi^{-1}(K)$, then $x=\phi(a)$ for some $a\in G$. So $x^{-1}=(\phi(x))^{-1}=\phi(x^{-1})\in\phi^{-1}(K)$. But $x\in G$, so $x^{-1}\in G$, therefore $x^{-1}\in\phi^{-1}(K)$.
- If $x,y\in \phi^{-1}(K)$, then $x,y=\phi(a),\phi(b)$ for some $a,b\in G$. So $xy=\phi(a)\phi(b)=\phi(ab)\in\phi^{-1}(K)$ (by homomorphism). Since $ab\in G$, $xy\in\phi^{-1}(K)$.
</details>
#### Definition for kernel and image of a group homomorphism
Let $G,G'$ be groups and $\phi:G\to G'$ be a group homomorphism.
$\operatorname{ker}(\phi)=\{a\in G|\phi(a)=e'\}=\phi^{-1}(\{e'\})$ is called the kernel of $\phi$.
Facts:
- $\operatorname{ker}(\phi)$ is a subgroup of $G$. (proof by previous corollary (4))
- $\phi$ is onto if and only if $\operatorname{ker}(\phi)=\{e\}$ (the trivial subgroup of $G$). (proof forward, by definition of one-to-one; backward, if $\phi(a)=\phi(b)$, then $\phi(a)\phi(b)^{-1}=e'$, so $\phi(a)\phi(b^{-1})=e'$, so $ab^{-1}=e$, so $a,b=e$, so $a=b$)

View File

@@ -11,4 +11,9 @@ export default {
Math4302_L6: "Modern Algebra (Lecture 6)", Math4302_L6: "Modern Algebra (Lecture 6)",
Math4302_L7: "Modern Algebra (Lecture 7)", Math4302_L7: "Modern Algebra (Lecture 7)",
Math4302_L8: "Modern Algebra (Lecture 8)", Math4302_L8: "Modern Algebra (Lecture 8)",
Math4302_L9: "Modern Algebra (Lecture 9)",
Math4302_L10: "Modern Algebra (Lecture 10)",
Math4302_L11: "Modern Algebra (Lecture 11)",
Math4302_L12: "Modern Algebra (Lecture 12)",
Math4302_L13: "Modern Algebra (Lecture 13)",
} }

View File

@@ -1,7 +1,7 @@
# Welcome to NoteNextra # Welcome to NoteNextra
> [!WARNING] > [!WARNING]
><!-- > This site use [Algolia Search](https://www.algolia.com/) to search the content. However, due to some unknown reasons, when the index page is loaded, the search bar is calling default PageFind package from Nextra. **If you find the search bar is not working**, please try to redirect to another page and then back to the index page or search in another page. --> > This site use [Algolia Search](https://www.algolia.com/) to search the content. Index updated on weekly basis, the search result may be delayed. For latest search, please use github document search if possible.
> >
> This site use SSG to generate the static pages. And cache is stored to your browser, this may not reveal the latest updates. **If you find some notes are not shown on sidebar but the class already ends more than 24 hours**, please try to access the page directly via the URL, or force reload the cache (for example, change the URL to `.../Math4201/Math4201_L{number}` to access the note of the lecture `Math4201_L{number}` and then refresh the page). > This site use SSG to generate the static pages. And cache is stored to your browser, this may not reveal the latest updates. **If you find some notes are not shown on sidebar but the class already ends more than 24 hours**, please try to access the page directly via the URL, or force reload the cache (for example, change the URL to `.../Math4201/Math4201_L{number}` to access the note of the lecture `Math4201_L{number}` and then refresh the page).
@@ -13,7 +13,7 @@ The primary audience of this project is for those challenge takers who are takin
So here it is. A lite server for you to read my notes. So here it is. A lite server for you to read my notes.
**Remember, I take notes don't means that I like them and paying attention to the lecture.** **Remember, I take notes don't means that I like them and paying attention to the lectures.**
<p style="color: red; font-weight: bold">It's because I'm too easy to fall asleep if I stop doing something on my hand when my mind is wandering.</p> <p style="color: red; font-weight: bold">It's because I'm too easy to fall asleep if I stop doing something on my hand when my mind is wandering.</p>