Compare commits
22 Commits
bce2fa426c
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
571efa1bad | ||
|
|
6d5c80d257 | ||
|
|
0e28ba6261 | ||
|
|
c4888b796c | ||
|
|
a7ef223f67 | ||
|
|
005cd7dbd6 | ||
|
|
ef9059d27c | ||
|
|
bdf0ff9f06 | ||
|
|
669e1c889a | ||
|
|
b6b80f619a | ||
|
|
2529a251e7 | ||
|
|
5b103812b4 | ||
|
|
16f09e5723 | ||
|
|
83ada2df2a | ||
|
|
8f2e613b36 | ||
|
|
e69362ce3c | ||
|
|
6a0b35bb28 | ||
|
|
778538cce0 | ||
|
|
f3c54c4dc7 | ||
|
|
a861477d74 | ||
|
|
c51226328c | ||
|
|
ba9aedfc5a |
175
content/CSE4303/CSE4303_L10.md
Normal file
175
content/CSE4303/CSE4303_L10.md
Normal file
@@ -0,0 +1,175 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 10)
|
||||
|
||||
## MACs
|
||||
|
||||
### MACs from Hash Functions
|
||||
|
||||
Construction:
|
||||
|
||||
$S_{big}(k, m) = S(k, H(m))$
|
||||
$V_{big}(k, m, t) = V(k, H(m), t)$
|
||||
|
||||
If:
|
||||
- $S$ is secure MAC for short messages
|
||||
- $H$ is collision resistant
|
||||
|
||||
Then $S_{big}$ is secure MAC.
|
||||
|
||||
If collision exists:
|
||||
If $H(m_0) = H(m_1)$,
|
||||
query tag for $m_0$,
|
||||
forge $(m_1, t)$.
|
||||
|
||||
### HMAC
|
||||
|
||||
$HMAC(k, m) = H((k \oplus opad) \| H((k \oplus ipad) \| m))$
|
||||
|
||||
Used in:
|
||||
- TLS
|
||||
- IPsec
|
||||
- SSH
|
||||
|
||||
Properties:
|
||||
- Built from hash function (for example SHA-256)
|
||||
- Provably secure under PRF assumptions
|
||||
|
||||
### Timing Attacks on MAC Verification
|
||||
|
||||
Problem:
|
||||
Byte-by-byte comparison leaks timing information.
|
||||
|
||||
Attack:
|
||||
1. Send random tag.
|
||||
2. Guess first byte.
|
||||
3. Detect timing increase.
|
||||
4. Repeat per byte.
|
||||
|
||||
Defense 1:
|
||||
Constant-time comparison loop.
|
||||
|
||||
Defense 2:
|
||||
Double-HMAC comparison:
|
||||
Compare $HMAC(k, mac)$ with $HMAC(k, sig)$.
|
||||
|
||||
### Authenticated Encryption (AE)
|
||||
|
||||
AE provides:
|
||||
1. Confidentiality (CPA security)
|
||||
2. Ciphertext integrity
|
||||
|
||||
Cipher:
|
||||
|
||||
$E : K \times M \times N \to C$
|
||||
$D : K \times C \times N \to M \cup \{\bot\}$
|
||||
|
||||
Ciphertext integrity:
|
||||
Attacker cannot produce new valid ciphertext.
|
||||
|
||||
Theorem:
|
||||
AE implies CCA security.
|
||||
|
||||
Implication:
|
||||
If $D(k, c) \neq \bot$,
|
||||
receiver knows sender had key.
|
||||
|
||||
### Encrypt-then-MAC
|
||||
|
||||
Correct construction:
|
||||
|
||||
1. Compute $c = E(k_E, m)$
|
||||
2. Compute $tag = S(k_I, c)$
|
||||
3. Send $(c, tag)$
|
||||
|
||||
Encrypt-then-MAC is always secure ordering.
|
||||
|
||||
### AE Standards
|
||||
|
||||
- GCM: CTR mode encryption then polynomial MAC
|
||||
- CCM: CBC-MAC then CTR mode encryption
|
||||
- EAX: CTR mode encryption then CMAC
|
||||
|
||||
All support AEAD:
|
||||
Authenticated Encryption with Associated Data.
|
||||
Example: authenticate packet headers but do not encrypt them.
|
||||
|
||||
## Asymmetric Crypto Authentication: Digital Signatures
|
||||
|
||||
### Motivation
|
||||
|
||||
Goal:
|
||||
Bind document to author.
|
||||
|
||||
Digital problem:
|
||||
Anyone can copy a visible signature from one document to another.
|
||||
|
||||
Solution:
|
||||
Make signature depend on document contents.
|
||||
|
||||
### Digital Signature Scheme
|
||||
|
||||
Components:
|
||||
- Secret signing key $sk$
|
||||
- Public verification key $pk$
|
||||
- $Sign(sk, m) \to signature$
|
||||
- $Verify(pk, m, sig) \to$ accept or reject
|
||||
|
||||
Property:
|
||||
Anyone can verify.
|
||||
Only signer can produce valid signature.
|
||||
|
||||
### Signing a Certificate
|
||||
|
||||
Process:
|
||||
1. Compute hash of data.
|
||||
2. Sign hash with secret key.
|
||||
3. Attach signature to data.
|
||||
|
||||
Verification:
|
||||
1. Compute hash of received data.
|
||||
2. Verify signature using public key.
|
||||
3. Accept if hashes match.
|
||||
|
||||
### Software Signing
|
||||
|
||||
Software vendor:
|
||||
- Signs update with secret key.
|
||||
- Publishes update and signature.
|
||||
|
||||
Clients:
|
||||
- Use vendor public key.
|
||||
- Verify signature.
|
||||
- Install only if valid.
|
||||
|
||||
Allows distribution via untrusted hosting site.
|
||||
|
||||
## Review: Three Approaches to Data Integrity
|
||||
|
||||
1. Collision resistant hashing
|
||||
Requires secure read-only public space.
|
||||
No secret keys.
|
||||
Suitable for public verification.
|
||||
|
||||
2. MACs
|
||||
Requires shared secret key.
|
||||
Must compute new MAC per user.
|
||||
Suitable when one signs and one verifies.
|
||||
|
||||
3. Digital signatures
|
||||
Requires long-term secret key.
|
||||
Public verification.
|
||||
Suitable when one signs and many verify.
|
||||
|
||||
## Crypto Summary
|
||||
|
||||
Cryptographic goals:
|
||||
- Confidentiality
|
||||
- Data integrity
|
||||
- Authentication
|
||||
- Non-repudiation
|
||||
|
||||
Primitives:
|
||||
- Hash functions
|
||||
- MACs
|
||||
- Digital signatures
|
||||
- Symmetric ciphers
|
||||
- Public key ciphers
|
||||
5
content/CSE4303/CSE4303_L6.md
Normal file
5
content/CSE4303/CSE4303_L6.md
Normal file
@@ -0,0 +1,5 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 6)
|
||||
|
||||
Refer to this lecture notes
|
||||
|
||||
[CSE442T Lecture 3](https://notenextra.trance-0.com/CSE442T/CSE442T_L3/)
|
||||
144
content/CSE4303/CSE4303_L7.md
Normal file
144
content/CSE4303/CSE4303_L7.md
Normal file
@@ -0,0 +1,144 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 7)
|
||||
|
||||
## Cryptography in Symmetric Systems
|
||||
|
||||
### Symmetric systems
|
||||
|
||||
Symmetric (shared-key) encryption
|
||||
|
||||
- Classical techniques
|
||||
- Computer-aided techniques
|
||||
- Formal reasoning
|
||||
- Realizations:
|
||||
- Stream ciphers
|
||||
- Block ciphers
|
||||
|
||||
## Stream ciphers
|
||||
|
||||
1. Operate on PT one bit at a time (usually), as a bit "stream"
|
||||
2. Generate arbitrarily long keystream on demand
|
||||
|
||||
### Keystream
|
||||
|
||||
Keystream $G(k)$ generated from key $k$.
|
||||
|
||||
Encryption:
|
||||
$$
|
||||
E(k,m) = m \oplus G(k)
|
||||
$$
|
||||
|
||||
Decryption:
|
||||
$$
|
||||
D(k,c) = c \oplus G(k)
|
||||
$$
|
||||
|
||||
### Security abstraction
|
||||
|
||||
1. XOR transfers randomness of keystream to randomness of CT regardless of PT’s content
|
||||
2. Security depends on $G$ being "practically" indistinguishable from random string and "practically" unpredictable
|
||||
3. Idea: shouldn’t be able to predict next bit of generator given all bits seen so far
|
||||
|
||||
### Keystream $G(k)$
|
||||
|
||||
- Idea: shouldn’t be able to predict next bit of generator given all bits seen so far
|
||||
- Strategies and challenges: many!
|
||||
|
||||
#### Idea that doesn’t quite work: Linear Feedback Shift Register (LFSR)
|
||||
|
||||
- Choice of feedback: by algebra
|
||||
- Pro: fast, statistically close to random
|
||||
- Problem: susceptible to cryptanalysis (because linear)
|
||||
|
||||
#### LFSR-based modifications
|
||||
|
||||
- Use non-linear combo of multiple LFSRs
|
||||
- Use controlled clocking (e.g. only cycle the LFSR when another LFSR outputs a 1)
|
||||
- Etc.
|
||||
|
||||
#### Others
|
||||
|
||||
- Modular arithmetic-based constructions
|
||||
- Other algebraic constructions
|
||||
|
||||
### Hazards
|
||||
|
||||
1. Weak PRG
|
||||
2. Key re-use
|
||||
3. Predictable effect of modifying CT on decrypted PT
|
||||
|
||||
#### Weak PRG
|
||||
|
||||
- Makes semantic security impossible
|
||||
|
||||
#### Key re-use
|
||||
|
||||
Suppose:
|
||||
$$
|
||||
c_1 = m_1 \oplus G(k)
|
||||
$$
|
||||
and
|
||||
$$
|
||||
c_2 = m_2 \oplus G(k)
|
||||
$$
|
||||
|
||||
Then:
|
||||
$$
|
||||
c_1 \oplus c_2 = m_1 \oplus m_2
|
||||
$$
|
||||
|
||||
This may be enough to recover $m_1$ or $m_2$ using natural language properties.
|
||||
|
||||
##### IV (Initialization Vector)
|
||||
|
||||
Used to avoid key re-use:
|
||||
|
||||
- IV incremented per frame
|
||||
- But repeats after $2^{24}$ frames
|
||||
- Sometimes resets to 0
|
||||
- Enough to recover key within minutes
|
||||
|
||||
Note:
|
||||
|
||||
- Happens if keystream period is too short
|
||||
- Real-world example: WEP attack (802.11b)
|
||||
|
||||
#### Predictable modification of ciphertext
|
||||
|
||||
If attacker modifies ciphertext by XORing $p$:
|
||||
|
||||
Ciphertext becomes:
|
||||
$$
|
||||
(m \oplus k) \oplus p
|
||||
$$
|
||||
|
||||
Decryption yields:
|
||||
$$
|
||||
m \oplus p
|
||||
$$
|
||||
|
||||
- Affects integrity
|
||||
- Not CCA-secure for integrity
|
||||
|
||||
### Summary: Stream ciphers
|
||||
|
||||
Pros
|
||||
|
||||
- Fast
|
||||
- Memory-efficient
|
||||
- No minimum PT size
|
||||
|
||||
Cons
|
||||
|
||||
- Require good PRG
|
||||
- Can never re-use key
|
||||
- No integrity mechanism
|
||||
|
||||
Note
|
||||
|
||||
- Integrity mechanisms exist for other symmetric ciphers (block ciphers)
|
||||
- "Authenticated encryption"
|
||||
|
||||
Examples / Uses
|
||||
|
||||
- RC4: legacy stream cipher (e.g. WEP)
|
||||
- ChaCha / Salsa: Android cell phone encryption (Adiantum)
|
||||
320
content/CSE4303/CSE4303_L8.md
Normal file
320
content/CSE4303/CSE4303_L8.md
Normal file
@@ -0,0 +1,320 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 8)
|
||||
|
||||
## Block ciphers
|
||||
|
||||
1. Operate on PT one block at a time
|
||||
2. Use same key for multiple blocks (with caveats)
|
||||
3. Chaining modes intertwine successive blocks of CT (or not)
|
||||
|
||||
## Security abstraction
|
||||
|
||||
View cipher as a Pseudo-Random Permutation (PRP)
|
||||
|
||||
### Background: Pseudo-Random Function (PRF)
|
||||
|
||||
Defined over $(K,X,Y)$:
|
||||
$$
|
||||
F : K \times X \to Y
|
||||
$$
|
||||
|
||||
Such that there exists an efficient algorithm to evaluate $F(k,x)$.
|
||||
|
||||
Let:
|
||||
|
||||
- $\text{Funs}[X,Y]$ = set of all functions from $X$ to $Y$
|
||||
- $S_F = \{ F(k,\cdot) \mid k \in K \}$
|
||||
|
||||
Intuition:
|
||||
|
||||
A PRF is secure if a random function in $\text{Funs}[X,Y]$ is indistinguishable from a random function in $S_F$.
|
||||
|
||||
Adversarial game:
|
||||
|
||||
- Challenger samples $k \leftarrow K$
|
||||
- Or samples $f \leftarrow \text{Funs}[X,Y]$
|
||||
- Adversary queries oracle with $x \in X$
|
||||
- Receives either $F(k,x)$ or $f(x)$
|
||||
- Must distinguish
|
||||
|
||||
Goal: adversary’s advantage negligible
|
||||
|
||||
## PRP Definition
|
||||
|
||||
Defined over $(K,X)$:
|
||||
$$
|
||||
E : K \times X \to X
|
||||
$$
|
||||
|
||||
Such that:
|
||||
|
||||
1. Efficient deterministic algorithm to evaluate $E(k,x)$
|
||||
2. $E(k,\cdot)$ is one-to-one
|
||||
3. Efficient inversion algorithm $D(k,y)$ exists
|
||||
|
||||
i.e., a PRF that is an invertible one-to-one mapping from message space to message space
|
||||
|
||||
## Secure PRP
|
||||
|
||||
Let $\text{Perms}[X]$ be all permutations on $X$.
|
||||
|
||||
Intuition:
|
||||
|
||||
A PRP is secure if a random permutation in $\text{Perms}[X]$ is indistinguishable from a random element of:
|
||||
$$
|
||||
S_E = \{ E(k,\cdot) \mid k \in K \}
|
||||
$$
|
||||
|
||||
Adversarial game:
|
||||
|
||||
- Challenger samples $k \leftarrow K$
|
||||
- Or $\pi \leftarrow \text{Perms}[X]$
|
||||
- Adversary queries $x \in X$
|
||||
- Receives either $E(k,x)$ or $\pi(x)$
|
||||
- Must distinguish
|
||||
|
||||
Goal: negligible advantage
|
||||
|
||||
## Block cipher constructions
|
||||
|
||||
### Feistel network
|
||||
|
||||
Given:
|
||||
$$
|
||||
f_1, \dots, f_d : \{0,1\}^n \to \{0,1\}^n
|
||||
$$
|
||||
|
||||
Build invertible function:
|
||||
$$
|
||||
F : \{0,1\}^{2n} \to \{0,1\}^{2n}
|
||||
$$
|
||||
|
||||
Let input be split into $(L_0, R_0)$.
|
||||
|
||||
Round $i$:
|
||||
$$
|
||||
L_i = R_{i-1}
|
||||
$$
|
||||
$$
|
||||
R_i = L_{i-1} \oplus f_i(R_{i-1})
|
||||
$$
|
||||
|
||||
#### Invertibility
|
||||
|
||||
$$
|
||||
R_{i-1} = L_i
|
||||
$$
|
||||
$$
|
||||
L_{i-1} = R_i \oplus f_i(L_i)
|
||||
$$
|
||||
|
||||
Thus Feistel is invertible regardless of whether $f_i$ is invertible.
|
||||
|
||||
### Luby–Rackoff Theorem (1985)
|
||||
|
||||
If $f$ is a secure PRF, then 3-round Feistel is a secure PRP.
|
||||
|
||||
### DES (Data Encryption Standard) — 1976
|
||||
|
||||
- 16-round Feistel network
|
||||
- 64-bit block size
|
||||
- 56-bit key
|
||||
- Round functions:
|
||||
$$
|
||||
f_i(x) = F(k_i, x)
|
||||
$$
|
||||
|
||||
Round function uses:
|
||||
|
||||
- S-box (substitution box) — non-linear
|
||||
- P-box (permutation box)
|
||||
|
||||
To invert: use keys in reverse order.
|
||||
|
||||
Problem: 56-bit keyspace too small today (brute-force feasible).
|
||||
|
||||
### Substitution–Permutation Network (SPN)
|
||||
|
||||
Rounds of:
|
||||
|
||||
- Substitution (S-box layer)
|
||||
- Permutation (P-layer)
|
||||
- XOR with round key
|
||||
|
||||
All layers invertible.
|
||||
|
||||
### AES (Advanced Encryption Standard) — 2000
|
||||
|
||||
- 10 substitution-permutation rounds (128-bit key version)
|
||||
- 128-bit block size
|
||||
|
||||
Each round includes:
|
||||
|
||||
- ByteSub (1-byte S-box)
|
||||
- ShiftRows
|
||||
- MixColumns
|
||||
- AddRoundKey
|
||||
|
||||
Key sizes:
|
||||
|
||||
- 128-bit
|
||||
- 192-bit
|
||||
- 256-bit
|
||||
|
||||
Currently de facto standard symmetric-key cipher (e.g. TLS/SSL).
|
||||
|
||||
## Block cipher modes
|
||||
|
||||
### Challenge
|
||||
|
||||
Encrypt PTs longer than one block using same key while maintaining security.
|
||||
|
||||
### ECB (Electronic Codebook)
|
||||
|
||||
Encrypt blocks independently:
|
||||
$$
|
||||
c_i = E(k, m_i)
|
||||
$$
|
||||
|
||||
Problem:
|
||||
|
||||
If $m_1 = m_2$, then:
|
||||
$$
|
||||
c_1 = c_2
|
||||
$$
|
||||
|
||||
Not semantically secure.
|
||||
|
||||
#### Formal non-security argument
|
||||
|
||||
Two-block challenge:
|
||||
|
||||
- Adversary submits:
|
||||
- $m_0 = \text{"Hello World"}$
|
||||
- $m_1 = \text{"Hello Hello"}$
|
||||
- If $c_1 = c_2$, output 0; else 1
|
||||
|
||||
Advantage = 1
|
||||
|
||||
### CPA model (Chosen Plaintext Attack)
|
||||
|
||||
Attacker:
|
||||
|
||||
- Sees many PT/CT pairs under same key
|
||||
- Can submit arbitrary PTs
|
||||
|
||||
Definition:
|
||||
$$
|
||||
\text{Adv}_{CPA}[A,E] =
|
||||
\left|
|
||||
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
|
||||
\right|
|
||||
$$
|
||||
|
||||
Must be negligible.
|
||||
|
||||
ECB fails CPA security.
|
||||
|
||||
### Moral
|
||||
|
||||
If same secret key is used multiple times, given same PT twice, encryption must produce different CT outputs.
|
||||
|
||||
## Secure block modes
|
||||
|
||||
### Idea
|
||||
|
||||
Augment key with:
|
||||
|
||||
- Per-block nonce
|
||||
- Or chaining data from prior blocks
|
||||
|
||||
### CBC (Cipher Block Chaining)
|
||||
|
||||
$$
|
||||
c_1 = E(k, m_1 \oplus IV)
|
||||
$$
|
||||
$$
|
||||
c_i = E(k, m_i \oplus c_{i-1})
|
||||
$$
|
||||
|
||||
IV must be random/unpredictable.
|
||||
|
||||
### CFB (Cipher Feedback)
|
||||
|
||||
Uses previous ciphertext as input feedback into block cipher.
|
||||
|
||||
### OFB (Output Feedback)
|
||||
|
||||
$$
|
||||
s_i = E(k, s_{i-1})
|
||||
$$
|
||||
$$
|
||||
c_i = m_i \oplus s_i
|
||||
$$
|
||||
|
||||
Can pre-compute keystream.
|
||||
|
||||
Acts like stream cipher.
|
||||
|
||||
### CTR (Counter Mode)
|
||||
|
||||
$$
|
||||
c_i = m_i \oplus E(k, \text{nonce} \| \text{counter}_i)
|
||||
$$
|
||||
|
||||
Encryption and decryption parallelizable.
|
||||
|
||||
Nonce must be unique.
|
||||
|
||||
### GCM (Galois Counter Mode)
|
||||
|
||||
- Most popular ("AES-GCM")
|
||||
- Provides authenticated encryption
|
||||
- Confidentiality + integrity
|
||||
|
||||
## Nonce-based semantic security
|
||||
|
||||
Encryption:
|
||||
$$
|
||||
c = E(k, m, n)
|
||||
$$
|
||||
|
||||
Adversarial experiment:
|
||||
|
||||
- Challenger picks $k$
|
||||
- Adversary submits $(m_{i,0}, m_{i,1})$ and nonce $n_i$
|
||||
- Receives $c_i = E(k, m_{i,b}, n_i)$
|
||||
- Nonces must be distinct
|
||||
|
||||
Definition:
|
||||
$$
|
||||
\text{Adv}_{nCPA}[A,E] =
|
||||
\left|
|
||||
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
|
||||
\right|
|
||||
$$
|
||||
|
||||
In practice:
|
||||
|
||||
- CBC: IV must be random
|
||||
- CTR/GCM: nonce must be unique but not necessarily random
|
||||
|
||||
## Symmetric Encryption Summary
|
||||
|
||||
### Stream Ciphers
|
||||
|
||||
- Rely on secure PRG
|
||||
- No key re-use
|
||||
- Fast
|
||||
- Low memory
|
||||
- Less robust
|
||||
- No built-in integrity
|
||||
|
||||
### Block Ciphers
|
||||
|
||||
- Rely on secure PRP
|
||||
- Allow key re-use across blocks (secure mode required)
|
||||
- Provide authenticated encryption in some modes (e.g. GCM)
|
||||
- Slower
|
||||
- Higher memory
|
||||
- More robust
|
||||
- Used in most practical secure systems (e.g. TLS)
|
||||
254
content/CSE4303/CSE4303_L9.md
Normal file
254
content/CSE4303/CSE4303_L9.md
Normal file
@@ -0,0 +1,254 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 9)
|
||||
|
||||
## Cryptographic Hash Functions
|
||||
|
||||
### What is a Hash Function
|
||||
|
||||
A hash function maps a variable-length input to a fixed-length output.
|
||||
|
||||
$h : X \to Y$
|
||||
|
||||
Typical examples:
|
||||
- Java hashCode(): input is an Object, output is a 4-byte integer.
|
||||
- String polynomial hash example:
|
||||
$h("cs433s") = 'c' \cdot 31^6 + 's' \cdot 31^5 + \dots + 's'$
|
||||
|
||||
Key property:
|
||||
- Domain $|X|$ is much larger than range $|Y|$.
|
||||
- Collisions are unavoidable in principle since $|X| > |Y|$.
|
||||
|
||||
Main uses:
|
||||
- Compact numerical representation
|
||||
- Hash tables (Set, Map, dictionaries)
|
||||
- Object comparison
|
||||
- Integrity checking (fingerprint)
|
||||
|
||||
### Security Properties
|
||||
|
||||
Let $h : X \to Y$.
|
||||
|
||||
1. Preimage Resistance (One-way)
|
||||
Given $y \in Y$, it is computationally infeasible to find $x \in X$ such that
|
||||
$h(x) = y$.
|
||||
|
||||
2. Second Preimage Resistance (Weak collision resistance)
|
||||
Given a specific $x \in X$, it is computationally infeasible to find $x' \neq x$ such that
|
||||
$h(x') = h(x)$.
|
||||
|
||||
3. Collision Resistance (Strong collision resistance)
|
||||
It is computationally infeasible to find any two distinct values $x, x' \in X$ such that
|
||||
$h(x) = h(x')$.
|
||||
|
||||
Adversarial definition:
|
||||
|
||||
Let $H : M \to T$ where $|M|$ is much larger than $|T|$.
|
||||
$H$ is collision resistant if for all efficient algorithms $A$:
|
||||
|
||||
$Adv_{CR}[A, H] = Pr[A$ outputs a collision for $H]$
|
||||
|
||||
is negligible.
|
||||
|
||||
### Generic Collision Attack (Birthday Attack)
|
||||
|
||||
Let $H : M \to \{0,1\}^n$.
|
||||
|
||||
Generic algorithm to find a collision in time on the order of $2^{n/2}$:
|
||||
|
||||
1. Choose $2^{n/2}$ random messages $m_1, \dots, m_{2^{n/2}}$.
|
||||
2. Compute $t_i = H(m_i)$.
|
||||
3. Look for $t_i = t_j$.
|
||||
|
||||
Birthday phenomenon:
|
||||
|
||||
If the output space size is $B$,
|
||||
high collision probability greater than $50\%$ occurs with about $\sqrt{B}$ samples.
|
||||
|
||||
Thus:
|
||||
- 128-bit hash gives about $2^{64}$ collision attack
|
||||
- 256-bit hash gives about $2^{128}$ collision attack
|
||||
|
||||
### Practical Hash Functions
|
||||
|
||||
From performance and security table (AMD Opteron 2.2 GHz):
|
||||
|
||||
- MD5: 128 bits, completely broken since 2004
|
||||
- SHA-1: 160 bits, practical collision attack demonstrated
|
||||
- SHA-256: 256 bits
|
||||
- SHA-512: 512 bits
|
||||
- Whirlpool: 512 bits
|
||||
|
||||
SHA-1 collision example: SHAttered attack (Google and CWI).
|
||||
Two different PDF files were produced with identical SHA-1 hash.
|
||||
|
||||
## Construction of Cryptographic Hash Functions
|
||||
|
||||
### Merkle-Damgard Construction
|
||||
|
||||
Given compression function:
|
||||
|
||||
$h : T \times X \to T$
|
||||
|
||||
We build:
|
||||
|
||||
$H : X^{\le L} \to T$
|
||||
|
||||
Process:
|
||||
- Split message into blocks $m[0], m[1], \dots, m[L]$.
|
||||
- Use fixed initialization vector $IV$.
|
||||
- Iterate chaining:
|
||||
|
||||
$H_0 = IV$
|
||||
$H_1 = h(H_0, m[0])$
|
||||
$H_2 = h(H_1, m[1])$
|
||||
$\dots$
|
||||
$H_L = h(H_{L-1}, m[L])$
|
||||
|
||||
- Apply padding:
|
||||
append $1000\ldots0$ concatenated with message length (64 bits).
|
||||
If no space remains, add another block.
|
||||
|
||||
Theorem:
|
||||
If compression function $h$ is collision resistant,
|
||||
then $H$ is collision resistant.
|
||||
|
||||
### Davies-Meyer Compression from Block Cipher
|
||||
|
||||
Given block cipher:
|
||||
|
||||
$E : K \times \{0,1\}^n \to \{0,1\}^n$
|
||||
|
||||
Define compression function:
|
||||
|
||||
$h(H, m) = E(m, H) \oplus H$
|
||||
|
||||
If $E$ behaves like an ideal cipher,
|
||||
finding a collision in $h$ takes about $2^{n/2}$ evaluations.
|
||||
|
||||
This is optimal for $n$-bit output.
|
||||
|
||||
### Example: SHA-256
|
||||
|
||||
Built using:
|
||||
- Merkle-Damgard construction
|
||||
- Davies-Meyer style compression
|
||||
- Block cipher-like core: SHACAL-2
|
||||
|
||||
Structure:
|
||||
- 512-bit message block
|
||||
- 256-bit chaining value
|
||||
- 256-bit output
|
||||
|
||||
## Applications for Integrity and Authentication
|
||||
|
||||
### Standalone Usage: Message Integrity
|
||||
|
||||
#### Application 1: Delayed Knowledge Verification
|
||||
|
||||
Idea:
|
||||
Publish $h(secret)$ first.
|
||||
Later reveal secret.
|
||||
Anyone can recompute hash and verify.
|
||||
|
||||
Justification:
|
||||
Preimage resistance ensures secret is hidden until revealed.
|
||||
|
||||
Example:
|
||||
Stock market prediction commitment.
|
||||
|
||||
<details>
|
||||
<summary>Example for delayed knowledge verification</summary>
|
||||
|
||||
1. Publish $H("Stock will rise on May 1")$.
|
||||
2. On May 1, reveal the prediction string.
|
||||
3. Anyone computes hash and checks equality.
|
||||
|
||||
</details>
|
||||
|
||||
#### Application 2: Password Storage
|
||||
|
||||
Model:
|
||||
System must verify password but not store plaintext.
|
||||
|
||||
Solution:
|
||||
Store hash of password.
|
||||
During login:
|
||||
- Hash input
|
||||
- Compare with stored value
|
||||
|
||||
Example:
|
||||
Linux stores hashed passwords in the /etc/shadow file.
|
||||
Includes:
|
||||
- Salt
|
||||
- Password hash
|
||||
- Metadata
|
||||
|
||||
Security relies on:
|
||||
- One-way property
|
||||
- Salting to prevent precomputed attacks
|
||||
|
||||
#### Application 3: Trusted Timestamping and Blockchains
|
||||
|
||||
Goal:
|
||||
Prove document existed before a given date.
|
||||
|
||||
Methods:
|
||||
- Publish document hash in newspaper.
|
||||
- Time Stamping Authority signs hash.
|
||||
- Publish hash in blockchain block.
|
||||
|
||||
Blockchain relies on:
|
||||
- One-way hash functions
|
||||
- Linking blocks via hash pointers
|
||||
|
||||
#### Application 4: Software Integrity with Secure Read-Only Space
|
||||
|
||||
Context:
|
||||
Trusted read-only public space (for example official website).
|
||||
|
||||
Process:
|
||||
1. Publisher computes $H(F_1), H(F_2), \dots, H(F_n)$.
|
||||
2. Publish hashes publicly.
|
||||
3. User downloads file $F_i$ and verifies hash.
|
||||
|
||||
If $H$ is collision resistant:
|
||||
Attacker cannot modify file without detection.
|
||||
|
||||
No encryption required.
|
||||
Public verifiability works if read-only space is trusted.
|
||||
|
||||
## Symmetric Crypto Authentication: MACs and AE
|
||||
|
||||
This section can also be found here [CSE442T Introduction to Cryptography (Lecture 18)](https://notenextra.trance-0.com/CSE442T/CSE442T_L18/#chapter-5-authentication)
|
||||
|
||||
### Message Authentication Codes (MACs)
|
||||
|
||||
Definition:
|
||||
MAC $I = (S, V)$ over $(K, M, T)$
|
||||
|
||||
- $S(k, m) \to t$
|
||||
- $V(k, m, t) \to$ yes or no
|
||||
|
||||
Security model:
|
||||
Attacker can query $S(k, m_i)$.
|
||||
Goal: produce new $(m, t)$ not previously seen such that $V$ accepts.
|
||||
|
||||
$Adv_{MAC}[A, I]$ must be negligible.
|
||||
|
||||
### MAC from PRF
|
||||
|
||||
Given PRF:
|
||||
|
||||
$F : K \times X \to Y$
|
||||
|
||||
Define MAC:
|
||||
|
||||
$S(k, m) = F(k, m)$
|
||||
$V(k, m, t)$ accepts if $t = F(k, m)$
|
||||
|
||||
Theorem:
|
||||
If $F$ is secure PRF and $|Y|$ is large,
|
||||
then derived MAC is secure.
|
||||
|
||||
Condition:
|
||||
$1 / |Y|$ must be negligible.
|
||||
Example: $|Y| = 2^{80}$.
|
||||
@@ -8,4 +8,8 @@ export default {
|
||||
CSE4303_L3: "Introduction to Computer Security (Lecture 3)",
|
||||
CSE4303_L4: "Introduction to Computer Security (Lecture 4)",
|
||||
CSE4303_L5: "Introduction to Computer Security (Lecture 5)",
|
||||
CSE4303_L6: "Introduction to Computer Security (Lecture 6)",
|
||||
CSE4303_L7: "Introduction to Computer Security (Lecture 7)",
|
||||
CSE4303_L8: "Introduction to Computer Security (Lecture 8)",
|
||||
CSE4303_L9: "Introduction to Computer Security (Lecture 9)",
|
||||
}
|
||||
|
||||
@@ -32,241 +32,8 @@ Please refer to the syllabus for our policy regarding the use of GenAI.
|
||||
>
|
||||
> This notation system is annoying since in mathematics, $A^*$ is the transpose of $A$, but since we are using literatures in physics, we keep the notation of $A^*$. In this report, I will try to make the notation consistent as possible and follows the **physics** convention in this report. So every vector you see will be in $\ket{\psi}$ form. And we will avoid using the $\langle v,w\rangle$ notation for inner product as it used in math, we will use $\langle v|w\rangle$ or $\langle v,w\rangle$ to denote the inner product.
|
||||
|
||||
A quantum error-correcting code is defined to be a unitary mapping (encoding) of $k$ qubits (two-state quantum systems) into a subspace of the quantum state space of $n$ qubuits such that if any $t$ of the qubits undergo arbitary decoherence, not necessarily independently, the resulting $n$ qubit state can be used to faithfully reconstruct the original quantum state of the $k$ encoded qubits.
|
||||
|
||||
Asymptotic rate $k/n=1-2H_2(2t/n)$, where $H_2$ is the binary entropy function
|
||||
|
||||
$$
|
||||
H_2=-p\log_2(p)-(1-p)\log_2(1-p)
|
||||
$$
|
||||
|
||||
### Problem setting and motivation
|
||||
|
||||
#### Linear algebra 102
|
||||
|
||||
The main vector space we are interested in is $\mathbb{C}^n$, therefore, all the linear operator we defined are from $\mathbb{C}^n$ to $\mathbb{C}^n$.
|
||||
|
||||
We denote a vector in vector space as $\ket{\psi}=(z_1,\cdots,z_n)$ (might also be infinite dimensional, and $z_i\in\mathbb{C}$).
|
||||
|
||||
A natural inner product space defined on $\mathbb{C}^n$ is given by the Hermitian inner product:
|
||||
|
||||
$$
|
||||
\langle\psi|\varphi\rangle=\sum_{i=1}^n z_i\bar{z}_i
|
||||
$$
|
||||
|
||||
This satisfies the following properties:
|
||||
1. $\bra{\psi}\sum_i \lambda_i\ket{\varphi}=\sum_i \lambda_i \langle\psi|\varphi\rangle$ (linear on the second argument)
|
||||
2. $\langle\varphi|\psi\rangle=(\langle\psi|\varphi\rangle)^*$
|
||||
3. $\langle\psi|\psi\rangle\geq 0$ with equality if and only if $\ket{\psi}=0$
|
||||
|
||||
Here $\psi$ is just a label for the vector and you don't need to worry about it too much. This is also called the ket, where the counterpart:
|
||||
|
||||
- $\langle\psi\rangle$ is called the bra, used to denote the vector dual to $\psi$, such element is a linear functional if you really wants to know what that is.
|
||||
- $\langle\psi|\varphi\rangle$ is the inner product between two vectors, and $\bra{\psi} A\ket{\varphi}$ is the inner product between $A\ket{\varphi}$ and $\bra{\psi}$, or equivalently $A^\dagger \bra{\psi}$ and $\ket{\varphi}$.
|
||||
- Given a complex matrix $A=\mathbb{C}^{n\times n}$,
|
||||
- $A^*$ is the complex conjugate of $A$.
|
||||
- i.e., $A=\begin{bmatrix}1+i & 2+i & 3+i\\4+i & 5+i & 6+i\\7+i & 8+i & 9+i\end{bmatrix}$, $A^*=\begin{bmatrix}1-i & 2-i & 3-i\\4-i & 5-i & 6-i\\7-i & 8-i & 9-i\end{bmatrix}$
|
||||
- $A^\top$ is the transpose of $A$.
|
||||
- i.e., $A=\begin{bmatrix}1+i & 2+i & 3+i\\4+i & 5+i & 6+i\\7+i & 8+i & 9+i\end{bmatrix}$, $A^\top=\begin{bmatrix}1+i & 4+i & 7+i\\2+i & 5+i & 8+i\\3+i & 6+i & 9+i\end{bmatrix}$
|
||||
- $A^\dagger=(A^*)^\top$ is the complex conjugate transpose, referred to as the adjoint, or Hermitian conjugate of $A$.
|
||||
- i.e., $A=\begin{bmatrix}1+i & 2+i & 3+i\\4+i & 5+i & 6+i\\7+i & 8+i & 9+i\end{bmatrix}$, $A^\dagger=\begin{bmatrix}1-i & 4-i & 7-i\\2-i & 5-i & 8-i\\3-i & 6-i & 9-i\end{bmatrix}$
|
||||
- $A$ is unitary if $A^\dagger A=AA^\dagger=I$.
|
||||
- $A$ is hermitian (self-adjoint in mathematics literatures) if $A^\dagger=A$.
|
||||
|
||||
#### Motivation of Tensor product
|
||||
|
||||
Recall from the traditional notation of product space of two vector spaces $V$ and $W$, that is, $V\times W$, is the set of all ordered pairs $(\ket{v},\ket{w})$ where $\ket{v}\in V$ and $\ket{w}\in W$.
|
||||
|
||||
The space has dimension $\dim V+\dim W$.
|
||||
|
||||
We want to define a vector space with notation of multiplication of two vectors from different vector spaces.
|
||||
|
||||
That is
|
||||
|
||||
$$
|
||||
(\ket{v_1}+\ket{v_2})\otimes \ket{w}=(\ket{v_1}\otimes \ket{w})+(\ket{v_2}\otimes \ket{w})
|
||||
$$
|
||||
$$
|
||||
\ket{v}\otimes (\ket{w_1}+\ket{w_2})=(\ket{v}\otimes \ket{w_1})+(\ket{v}\otimes \ket{w_2})
|
||||
$$
|
||||
|
||||
and enables scalar multiplication by
|
||||
|
||||
$$
|
||||
\lambda (\ket{v}\otimes \ket{w})=(\lambda \ket{v})\otimes \ket{w}=\ket{v}\otimes (\lambda \ket{w})
|
||||
$$
|
||||
|
||||
And we wish to build a way associates the basis of $V$ and $W$ to the basis of $V\otimes W$. That makes the tensor product a vector space with dimension $\dim V\times \dim W$.
|
||||
|
||||
#### Definition of linear functional
|
||||
|
||||
> [!TIP]
|
||||
>
|
||||
> Note the difference between a linear functional and a linear map.
|
||||
>
|
||||
> A generalized linear map is a function $f:V\to W$ satisfying the condition
|
||||
>
|
||||
> 1. $f(\ket{u}+\ket{v})=f(\ket{u})+f(\ket{v})$
|
||||
> 2. $f(\lambda \ket{v})=\lambda f(\ket{v})$
|
||||
|
||||
A linear functional is a linear map from $V$ to $\mathbb{F}$.
|
||||
|
||||
#### Definition of bilinear functional
|
||||
|
||||
A bilinear functional is a bilinear function $\beta:V\times W\to \mathbb{F}$ satisfying the condition that $\ket{v}\to \beta(\ket{v},\ket{w})$ is a linear functional for all $\ket{w}\in W$ and $\ket{w}\to \beta(\ket{v},\ket{w})$ is a linear functional for all $\ket{v}\in V$.
|
||||
|
||||
The vector space of all bilinear functionals is denoted by $\mathcal{B}(V,W)$.
|
||||
|
||||
#### Definition of tensor product
|
||||
|
||||
Let $V,W$ be two vector spaces.
|
||||
|
||||
Let $V'$ and $W'$ be the dual spaces of $V$ and $W$, respectively, that is $V'=\{\psi:V\to \mathbb{F}\}$ and $W'=\{\phi:W\to \mathbb{F}\}$, $\psi, \phi$ are linear functionals.
|
||||
|
||||
The tensor product of vectors $v\in V$ and $w\in W$ is the bilinear functional defined by $\forall (\psi,\phi)\in V'\times W'$ given by the notation
|
||||
|
||||
$$
|
||||
(v\otimes w)(\psi,\phi)\coloneqq\psi(v)\phi(w)
|
||||
$$
|
||||
|
||||
The tensor product of two vector spaces $V$ and $W$ is the vector space $\mathcal{B}(V',W')$
|
||||
|
||||
Notice that the basis of such vector space is the linear combination of the basis of $V'$ and $W'$, that is, if $\{e_i\}$ is the basis of $V'$ and $\{f_j\}$ is the basis of $W'$, then $\{e_i\otimes f_j\}$ is the basis of $\mathcal{B}(V',W')$.
|
||||
|
||||
That is, every element of $\mathcal{B}(V',W')$ can be written as a linear combination of the basis.
|
||||
|
||||
Since $\{e_i\}$ and $\{f_j\}$ are bases of $V'$ and $W'$, respectively, then we can always find a set of linear functionals $\{\phi_i\}$ and $\{\psi_j\}$ such that $\phi_i(e_j)=\delta_{ij}$ and $\psi_j(f_i)=\delta_{ij}$.
|
||||
|
||||
Here $\delta_{ij}=\begin{cases}
|
||||
1 & \text{if } i=j \\
|
||||
0 & \text{otherwise}
|
||||
\end{cases}$ is the Kronecker delta.
|
||||
|
||||
$$
|
||||
V\otimes W=\left\{\sum_{i=1}^n \sum_{j=1}^m a_{ij} \phi_i(v)\psi_j(w): \phi_i\in V', \psi_j\in W'\right\}
|
||||
$$
|
||||
|
||||
Note that $\sum_{i=1}^n \sum_{j=1}^m a_{ij} \phi_i(v)\psi_j(w)$ is a bilinear functional that maps $V'\times W'$ to $\mathbb{F}$.
|
||||
|
||||
This enables basis free construction of vector spaces with proper multiplication and scalar multiplication.
|
||||
|
||||
This vector space is equipped with the unique inner product $\langle v\otimes w, u\otimes x\rangle_{V\otimes W}$ defined by
|
||||
|
||||
$$
|
||||
\langle v\otimes w, u\otimes x\rangle=\langle v,u\rangle_V\langle w,x\rangle_W
|
||||
$$
|
||||
|
||||
In practice, we ignore the subscript of the vector space and just write $\langle v\otimes w, u\otimes x\rangle=\langle v,u\rangle\langle w,x\rangle$.
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> All those definitions and proofs can be found in Linear Algebra Done Right by Sheldon Axler.
|
||||
|
||||
#### Definition of two-state quantum system
|
||||
|
||||
The finite dimensional Hilbert space $\mathcscr{H}
|
||||
|
||||
#### Definition of Coherent states from the view of physics
|
||||
|
||||
#### Side node: Why quantum error-correcting code is hard
|
||||
|
||||
Decoherence process
|
||||
|
||||
#### No-cloning theorem
|
||||
|
||||
> Reference from P.532 of the book
|
||||
|
||||
Suppose we have a quantum system with two slots $A$, and $B$, the data slot, starts out in an unknown but pure quantum state $\ket{\psi}$. This is the state which is to be copied into slot $B$m the target slot. We assume that the target slot starts out in some standard pure state $\ket{s}$. Thus the initial state of the copying machine is $\ket{\psi}\otimes \ket{s}$.
|
||||
|
||||
Assume there exists some unitary operator $U$ such that $U(\ket{\psi}\otimes \ket{s})=\ket{\psi}\otimes \ket{\psi}$.
|
||||
|
||||
Consider two pure states $\ket{\psi}$ and $\ket{\varphi}$, such that $U(\ket{\psi}\otimes \ket{s})=\ket{\psi}\otimes \ket{\psi}$ and $U(\ket{\varphi}\otimes \ket{s})=\ket{\varphi}\otimes \ket{\varphi}$. The inner product of the two equation yields:
|
||||
|
||||
$$
|
||||
\langle \psi|\varphi\rangle =(\langle \psi|\varphi\rangle)^2
|
||||
$$
|
||||
|
||||
This equation has only two solutions, either $\langle \psi|\varphi\rangle=0$ or $\langle \psi|\varphi\rangle=1$.
|
||||
|
||||
If $\langle \psi|\varphi\rangle=0$, then $\ket{\psi}=\ket{\varphi}$, no cloning for trivial case.
|
||||
|
||||
If $\langle \psi|\varphi\rangle=1$, then $\ket{\psi}$ and $\ket{\varphi}$ are orthogonal.
|
||||
|
||||
#### Proposition: Encoding 8 to 9 that correct 1 errors
|
||||
|
||||
Recover 1 qubit from a 9 qubit quantum system. (Shor code, 1995)
|
||||
|
||||

|
||||
|
||||
### Tools and related topics
|
||||
|
||||
#### Theoretical upper bound for quantum error-correcting code
|
||||
|
||||
From quantum information capacity of a quantum channel
|
||||
|
||||
$$
|
||||
\min\{1-H_2(2t/3n),H_2(\frac{1}{2}+\sqrt{(1-t/n)t/n})\}
|
||||
$$
|
||||
|
||||
#### Definition of quantum error-correcting code from binary linear error-correcting code
|
||||
|
||||
All the operations will be done in $\mathbb{F}_2=\{0,1\}$.
|
||||
|
||||
Consider two binary vectors $v=[v_1,...,v_n],v_i\in\{0,1\}$ and $w=[w_1,...,w_n],w_i\in\{0,1\}$ with size $n$.
|
||||
|
||||
Recall from our lecture that
|
||||
|
||||
$d$ denotes the Hamming weight of a vector.
|
||||
|
||||
$d_H(v,w)=\sum_{i=1}^{n}\begin{cases} 0 & \text{if } v_i=w_i \\ 1 & \text{if } v_i\neq w_i \end{cases}$ denotes the Hamming distance between $v$ and $w$.
|
||||
|
||||
$\operatorname{supp}(v)=\{i\in[n]:v_i\neq 0\}$ denotes the support of $v$.
|
||||
|
||||
$v|_S$ denotes the projection of $v$ onto the subspace $S$, we usually denote the $S$ by a set of coordinates, that is $S\subseteq[n]$.
|
||||
|
||||
When projecting a vector $v$ onto a another vector $w$, we usually write $v|_E\coloneqq v|_{\operatorname{supp} w}$.
|
||||
|
||||
When we have two vector we may use $v\leqslant w$ (Note that this is different than $\leq$ sign) to mean $\operatorname{supp}(v)\subseteq \operatorname{supp}(w)$.
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Let $v=[1,0,0,1,1,1,1]$ and $w=[1,0,0,1,0,0,1]$, then $\operatorname{supp}(v)=\{1,4,5,6,7\}$, $\operatorname{supp}(w)=\{1,4,7\}$. Therefore $w\leqslant v$.
|
||||
|
||||
$v|_w=[v_1,v_4,v_7]=[1,1,0]$
|
||||
</details>
|
||||
|
||||
$\mathcal{C}$ denotes the code, a set of arbitrary binary vectors with length $n$.
|
||||
|
||||
$d(\mathcal{C})=\{d(v,w)|v,w\in\mathcal{C}\}$ denotes the minimum distance of the code.
|
||||
|
||||
If $\mathcal{C}$ is linear then the minimum distance is the minimum Hamming weight of a non-zero codeword.
|
||||
|
||||
A $[n,k,d]$ linear code is a linear code of $n$ bits codeword with $k$ message bits that can correct $d$ errors.
|
||||
|
||||
$R\coloneqq\frac{\operatorname{dim}\mathcal{C}}{n}$ is the rate of code $\mathcal{C}$.
|
||||
|
||||
$\mathcal{C}^{\perp}\coloneqq\{v\in\mathbb{F}_2^n:v\cdot w=0\text{ for all }w\in\mathcal{C}\}$ is the dual code of a code $\mathcal{C}$. From linear algebra, we know that $\dim\mathcal{C}^{\perp}+\dim\mathcal{C}=n$.
|
||||
|
||||
<details>
|
||||
<summary>Example used in the paper</summary>
|
||||
|
||||
Consider the $[7,4,3]$ Hamming code with generator matrix $G$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Proposition: Encoding $k$ to $n$ that correct $t$ errors
|
||||
|
||||
### Evaluation of paper
|
||||
|
||||
### Limitation and suggestions
|
||||
|
||||
### Further direction and research
|
||||
|
||||
#### Toric code, surface code
|
||||
|
||||
This is the topic I really want to dig into.
|
||||
|
||||
This method gives a [2nm+n+m+1, 1, min(n,m)] error correcting code with only needs local stabilizer checks and really interests me.
|
||||
|
||||
### References
|
||||
<iframe src="https://git.trance-0.com/Trance-0/CSE5313F1/raw/branch/main/latex/ZheyuanWu_CSE5313_FinalAssignment.pdf" width="100%" height="600px" style="border: none;" title="Embedded PDF Viewer">
|
||||
<!-- Fallback content for browsers that do not support iframes or PDFs within them -->
|
||||
<iframe src="https://git.trance-0.com/Trance-0/CSE5313F1/raw/branch/main/latex/ZheyuanWu_CSE5313_FinalAssignment.pdf" width="100%" height="500px">
|
||||
<p>Your browser does not support iframes. You can <a href="https://git.trance-0.com/Trance-0/CSE5313F1/raw/branch/main/latex/ZheyuanWu_CSE5313_FinalAssignment.pdf">download the PDF</a> file instead.</p>
|
||||
</iframe>
|
||||
|
||||
@@ -53,4 +53,4 @@ $$
|
||||
|
||||
This part is intentionally left blank and may be filled near the end of the semester, by assignments given in CSE5313.
|
||||
|
||||
[Link to self-contained report](../../CSE5313/Exam_reviews/CSE5313_F1.md)
|
||||
[Link to self-contained report](https://notenextra.trance-0.com/CSE5313/Exam_reviews/CSE5313_F1/)
|
||||
@@ -4,6 +4,7 @@ I made this little book for my Honor Thesis, showing the relevant parts of my wo
|
||||
|
||||
Contents updated as displayed and based on my personal interest and progress with Prof.Feres.
|
||||
|
||||
|
||||
<iframe src="https://git.trance-0.com/Trance-0/HonorThesis/raw/branch/main/main.pdf" width="100%" height="600px" style="border: none;" title="Embedded PDF Viewer">
|
||||
<!-- Fallback content for browsers that do not support iframes or PDFs within them -->
|
||||
<iframe src="https://git.trance-0.com/Trance-0/HonorThesis/raw/branch/main/main.pdf" width="100%" height="500px">
|
||||
|
||||
@@ -21,7 +21,7 @@ If $\mathbb{R}_l$ is second countable, then for any real number $x$, there is an
|
||||
|
||||
Any such open sets is of the form $[x,x+\epsilon)\cap A$ with $\epsilon>0$ and any element of $A$ being larger than $\min(U_x)=x$.
|
||||
|
||||
In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. SO there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathbb{B}$ is uncountable.
|
||||
In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. So there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathcal{B}$ is uncountable.
|
||||
|
||||
</details>
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@ $$
|
||||
Let $(X,\mathcal{T})$ be a topological space. Let $\mathcal{C}\subseteq \mathcal{T}$ be a collection of subsets of $X$ satisfying the following property:
|
||||
|
||||
$$
|
||||
\forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } U\subseteq C
|
||||
\forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } C\subseteq U
|
||||
$$
|
||||
|
||||
Then $\mathcal{C}$ is a basis and the topology generated by $\mathcal{C}$ is $\mathcal{T}$.
|
||||
|
||||
100
content/Math4202/Math4202_L10.md
Normal file
100
content/Math4202/Math4202_L10.md
Normal file
@@ -0,0 +1,100 @@
|
||||
# Math4202 Topology II (Lecture 10)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Path homotopy
|
||||
|
||||
|
||||
#### Theorem for properties of product of paths
|
||||
|
||||
1. If $f\simeq_p f_1, g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$. (Product is well-defined)
|
||||
2. $([f]*[g])*[h]=[f]*([g]*[h])$. (Associativity)
|
||||
3. Let $e_{x_0}$ be the constant path from $x_0$ to $x_0$, $e_{x_1}$ be the constant path from $x_1$ to $x_1$. Suppose $f$ is a path from $x_0$ to $x_1$.
|
||||
$$
|
||||
[e_{x_0}]*[f]=[f],\quad [f]*[e_{x_1}]=[f]
|
||||
$$
|
||||
(Right and left identity)
|
||||
4. Given $f$ in $X$ a path from $x_0$ to $x_1$, we define $\bar{f}$ to be the path from $x_1$ to $x_0$ where $\bar{f}(t)=f(1-t)$.
|
||||
$$
|
||||
f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}
|
||||
$$
|
||||
$$
|
||||
[f]*[\bar{f}]=[e_{x_0}],\quad [\bar{f}]*[f]=[e_{x_1}]
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
(1) If $f\simeq_p f_1$, $g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$.
|
||||
|
||||
Let $F$ be homotopy between $f$ and $f_1$, $G$ be homotopy between $g$ and $g_1$.
|
||||
|
||||
We can define
|
||||
|
||||
$$
|
||||
F*G:[0,1]\times [0,1]\to X,\quad F*G(s,t)=\left(F(-,t)*G(-,t)\right)(s)=\begin{cases}
|
||||
F(2s,t) & 0\leq s\leq \frac{1}{2}\\
|
||||
G(2s-1,t) & \frac{1}{2}\leq s\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
$F*G$ is a homotopy between $f*g$ and $f_1*g_1$.
|
||||
|
||||
We can check this by enumerating the cases from definition of homotopy.
|
||||
|
||||
---
|
||||
|
||||
(2) $([f]*[g])*[h]=[f]*([g]*[h])$.
|
||||
|
||||
For $f*(g*h)$, along the interval $[0,\frac{1}{2}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{2},\frac{3}{4}]$ we map $x_2\to x_3$, then along the interval $[\frac{3}{4},1]$ we map $x_3\to x_4$.
|
||||
|
||||
For $(f*g)*h$, along the interval $[0,\frac{1}{4}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{4},\frac{1}{2}]$ we map $x_2\to x_3$, then along the interval $[\frac{1}{2},1]$ we map $x_3\to x_4$.
|
||||
|
||||
We can construct the homotopy between $f*(g*h)$ and $(f*g)*h$ as follows.
|
||||
|
||||
Let $f((4-2t)s)$ for $F(s,t)$,
|
||||
|
||||
when $t=0$, $F(s,0)=f(4s)\in f*(g*h)$, when $t=1$, $F(s,1)=f(2s)\in (f*g)*h$.
|
||||
|
||||
....
|
||||
|
||||
_We make the linear maps between $f*(g*h)$ and $(f*g)*h$ continuous, then $f*(g*h)\simeq_p (f*g)*h$. With our homotopy constructed above_
|
||||
|
||||
---
|
||||
|
||||
(3) $e_{x_0}*f\simeq_p f\simeq_p f*e_{x_1}$.
|
||||
|
||||
We can construct the homotopy between $e_{x_0}*f$ and $f$ as follows.
|
||||
|
||||
$$
|
||||
H(s,t)=\begin{cases}
|
||||
x_0 & t\geq 2s\\
|
||||
f(2s-t) & t\leq 2s
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
or you may induct from $f(\frac{s-t/2}{1-t/2})$ if you like.
|
||||
|
||||
---
|
||||
|
||||
(4) $f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}$.
|
||||
|
||||
Note that we don't need to reach $x_1$ every time.
|
||||
|
||||
$f_t=f(ts)$ $s\in[0,\frac{1}{2}]$.
|
||||
|
||||
$\bar{f}_t=\bar{f}(1-ts)$ $s\in[\frac{1}{2},1]$.
|
||||
|
||||
</details>
|
||||
|
||||
> [!CAUTION]
|
||||
>
|
||||
> Homeomorphism does not implies homotopy automatically.
|
||||
|
||||
#### Definition for the fundamental group
|
||||
|
||||
The fundamental group of $X$ at $x$ is defined to be
|
||||
|
||||
$$
|
||||
(\Pi_1(X,x),*)
|
||||
$$
|
||||
132
content/Math4202/Math4202_L11.md
Normal file
132
content/Math4202/Math4202_L11.md
Normal file
@@ -0,0 +1,132 @@
|
||||
# Math4201 Topology II (Lecture 11)
|
||||
|
||||
## Algebraic topology
|
||||
|
||||
### Fundamental group
|
||||
|
||||
The $*$ operation has the following properties:
|
||||
|
||||
#### Properties for the path product operation
|
||||
|
||||
Let $[f],[g]\in \Pi_1(X)$, for $[f]\in \Pi_1(X)$, let $s:\Pi_1(X)\to X, [f]\mapsto f(0)$ and $t:\Pi_1(X)\to X, [f]\mapsto f(1)$.
|
||||
|
||||
Note that $t([f])=s([g])$, $[f]*[g]=[f*g]\in \Pi_1(X)$.
|
||||
|
||||
This also satisfies the associativity. $([f]*[g])*[h]=[f]*([g]*[h])$.
|
||||
|
||||
We have left and right identity. $[f]*[e_{t(f)}]=[f], [e_{s(f)}]*[f]=[f]$.
|
||||
|
||||
We have inverse. $[f]*[\bar{x}]=[e_{s(f)}], [\bar{x}]*[f]=[e_{t(f)}]$
|
||||
|
||||
#### Definition for Groupoid
|
||||
|
||||
Let $f,g$ be paths where $g,f:[0,1]\to X$, and consider the function of all pathes in $G$, denoted as $\mathcal{G}$,
|
||||
|
||||
Set $t:\mathcal{G}\to X$ be the source map, for this case $t(f)=f(0)$, and $s:\mathcal{G}\to X$ be the target map, for this case $s(f)=f(1)$.
|
||||
|
||||
We define
|
||||
|
||||
$$
|
||||
\mathcal{G}^{(2)}=\{(f,g)\in \mathcal{G}\times \mathcal{G}|t(f)=s(g)\}
|
||||
$$
|
||||
|
||||
And we define the operation $*$ on $\mathcal{G}^{(2)}$ as the path product.
|
||||
|
||||
This satisfies the following properties:
|
||||
|
||||
- Associativity: $(f*g)*h=f*(g*h)$
|
||||
|
||||
Consider the function $\eta:X\to \mathcal{G}$, for this case $\eta(x)=e_{x}$.
|
||||
|
||||
- We have left and right identity: $\eta(t(f))*f=f, f*\eta(s(f))=f$
|
||||
|
||||
- Inverse: $\forall g\in \mathcal{G}, \exists g^{-1}\in \mathcal{G}, g*g^{-1}=\eta(s(g))$, $g^{-1}*g=\eta(t(g))$
|
||||
|
||||
#### Definition for loop
|
||||
|
||||
Let $x_0\in X$. A path starting and ending at $x_0$ is called a loop based at $x_0$.
|
||||
|
||||
#### Definition for the fundamental group
|
||||
|
||||
The fundamental group of $X$ at $x$ is defined to be
|
||||
|
||||
$$
|
||||
(\Pi_1(X,x),*)
|
||||
$$
|
||||
|
||||
where $*$ is the product operation, and $\Pi_1(X,x)$ is the set o homotopy classes of loops in $X$ based at $x$.
|
||||
|
||||
<details>
|
||||
<summary>Example of fundamental group</summary>
|
||||
|
||||
Consider $X=[0,1]$, with subspace topology from standard topology in $\mathbb{R}$.
|
||||
|
||||
$\Pi_1(X,0)=\{e\}$, (constant function at $0$) since we can build homotopy for all loops based at $0$ as follows $H(s,t)=(1-t)f(s)+t$.
|
||||
|
||||
And $\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
|
||||
|
||||
---
|
||||
|
||||
Let $X=\{1,2\}$ with discrete topology.
|
||||
|
||||
$\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
|
||||
|
||||
$\Pi_1(X,2)=\{e\}$, (constant function at $2$.)
|
||||
|
||||
---
|
||||
|
||||
Let $X=S^1$ be the circle.
|
||||
|
||||
$\Pi_1(X,1)=\mathbb{Z}$ (related to winding numbers, prove next week).
|
||||
|
||||
</details>
|
||||
|
||||
A natural question is, will the fundamental group depends on the basepoint $x$?
|
||||
|
||||
#### Definition for $\hat{\alpha}$
|
||||
|
||||
Let $\alpha$ be a path in $X$ from $x_0$ to $x_1$. $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$. Define $\hat{\alpha}:\Pi_1(X,x_0)\to \Pi_1(X,x_1)$ as follows:
|
||||
|
||||
$$
|
||||
\hat{\alpha}(\beta)=[\bar{\alpha}]*[f]*[\alpha]
|
||||
$$
|
||||
|
||||
#### $\hat{\alpha}$ is a group homomorphism
|
||||
|
||||
$\hat{\alpha}$ is a group homomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f,g\in \Pi_1(X,x_0)$, then $\hat{\alpha}(f*g)=\hat{\alpha}(f)\hat{\alpha}(g)$
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\hat{\alpha}(f*g)&=[\bar{\alpha}]*[f]*[g]*[\alpha]\\
|
||||
&=[\bar{\alpha}]*[f]*[e_{x_0}]*[g]*[\alpha]\\
|
||||
&=[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]*[g]*[\alpha]\\
|
||||
&=([\bar{\alpha}]*[f]*[\alpha])*([\bar{\alpha}]*[g]*[\alpha])\\
|
||||
&=(\hat{\alpha}(f))*(\hat{\alpha}(g))
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
---
|
||||
|
||||
Next, we will show that $\hat{\alpha}\circ \hat{\bar{\alpha}}([f])=[f]$, and $\hat{\bar{\alpha}}\circ \hat{\alpha}([f])=[f]$.
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\hat{\alpha}\circ \hat{\bar{\alpha}}([f])&=\hat{\alpha}([\bar{\alpha}]*[f]*[\alpha])\\
|
||||
&=[\alpha]*[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]\\
|
||||
&=[e_{x_0}]*[f]*[e_{x_1}]\\
|
||||
&=[f]
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
The other case is the same
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary of fundamental group
|
||||
|
||||
If $X$ is path-connected and $x_0,x_1\in X$, then $\Pi_1(X,x_0)$ is isomorphic to $\Pi_1(X,x_1)$.
|
||||
119
content/Math4202/Math4202_L12.md
Normal file
119
content/Math4202/Math4202_L12.md
Normal file
@@ -0,0 +1,119 @@
|
||||
# Math4201 Topology II (Lecture 12)
|
||||
|
||||
## Algebraic topology
|
||||
|
||||
### Fundamental group
|
||||
|
||||
Recall from last lecture, the $(\Pi_1(X,x_0),*)$ is a group, and for any two points $x_0,x_1\in X$, the group $(\Pi_1(X,x_0),*)$ is isomorphic to $(\Pi_1(X,x_1),*)$ if $x_0,x_1$ is path connected.
|
||||
|
||||
> [!TIP]
|
||||
>
|
||||
> How does the $\hat{\alpha}$ (isomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$) depend on the choice of $\alpha$ (path) we choose?
|
||||
|
||||
#### Definition of simply connected
|
||||
|
||||
A space $X$ is simply connected if
|
||||
|
||||
- $X$ is [path-connected](https://notenextra.trance-0.com/Math4201/Math4201_L23/#definition-of-path-connected-space) ($\forall x_0,x_1\in X$, there exists a continuous function $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$)
|
||||
- $\Pi_1(X,x_0)$ is the trivial group for some $x_0\in X$
|
||||
|
||||
<details>
|
||||
<summary>Example of simply connected space</summary>
|
||||
|
||||
Intervals are simply connected.
|
||||
|
||||
---
|
||||
|
||||
Any star-shaped is simply connected.
|
||||
|
||||
---
|
||||
|
||||
$S^1$ is not simply connected, but $n\geq 2$, then $S^n$ is simply connected.
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for simply connected space
|
||||
|
||||
In a simply connected space $X$, and two paths having the same initial and final points are path homotopic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f,g$ be paths having the same initial and final points, then $f(0)=g(0)=x_0$ and $f(1)=g(1)=x_1$.
|
||||
|
||||
Therefore $[f]*[\bar{g}]\simeq_p [e_{x_0}]$ (by simply connected space assumption).
|
||||
|
||||
Then
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
[f]*[\bar{g}]&\simeq_p [e_{x_0}]\\
|
||||
([f]*[\bar{g}])*[g]&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]*([\bar{g}]*[g])&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]*[e_{x_1}]&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]&\simeq_p [g]
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition of group homomorphism induced by continuous map
|
||||
|
||||
Let $h:(X,x_0)\to (Y,y_0)$ be a continuous map, define $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ where $h(x_0)=y_0$. by $h_*([f])=[h\circ f]$.
|
||||
|
||||
$h_*$ is called the group homomorphism induced by $h$ relative to $x_0$.
|
||||
|
||||
<details>
|
||||
<summary>Check the homomorphism property</summary>
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
h_*([f]*[g])&=h_*([f*g])\\
|
||||
&=[h_*[f*g]]\\
|
||||
&=[h_*[f]*h_*[g]]\\
|
||||
&=[h_*[f]]*[h_*[g]]\\
|
||||
&=h_*([f])*h_*([g])
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Theorem composite of group homomorphism
|
||||
|
||||
If $h:(X,x_0)\to (Y,y_0)$ and $k:(Y,y_0)\to (Z,z_0)$ are continuous maps, then $k_* \circ h_*:\Pi_1(X,x_0)\to \Pi_1(Z,z_0)$ where $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$, $k_*:\Pi_1(Y,y_0)\to \Pi_1(Z,z_0)$,is a group homomorphism.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f$ be a loop based at $x_0$.
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
k_*(h_*([f]))&=k_*([h\circ f])\\
|
||||
&=[k\circ h\circ f]\\
|
||||
&=[(k\circ h)\circ f]\\
|
||||
&=(k\circ h)_*([f])\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary of composite of group homomorphism
|
||||
|
||||
Let $\operatorname{id}:(X,x_0)\to (X,x_0)$ be the identity map. This induces $(\operatorname{id})_*:\Pi_1(X,x_0)\to \Pi_1(X,x_0)$.
|
||||
|
||||
If $h$ is a homeomorphism with the inverse $k$, with
|
||||
|
||||
$$
|
||||
k_*\circ h_*=(k\circ h)_*=(\operatorname{id})_*=I=(\operatorname{id})_*=(h\circ k)_*
|
||||
$$
|
||||
|
||||
This induced $h_*: \Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ is an isomorphism.
|
||||
|
||||
#### Corollary for homotopy and group homomorphism
|
||||
|
||||
If $h,k:(X,x_0)\to (Y,y_0)$ are homotopic maps form $X$ to $Y$ such that the homotopy $H_t(x_0)=y_0,\forall t\in I$, then $h_*=k_*$.
|
||||
|
||||
$$
|
||||
h_*([f])=[h\circ f]\simeq_p[k\circ h]=k_*([f])
|
||||
$$
|
||||
59
content/Math4202/Math4202_L13.md
Normal file
59
content/Math4202/Math4202_L13.md
Normal file
@@ -0,0 +1,59 @@
|
||||
# Math4202 Topology II (Lecture 13)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Covering space
|
||||
|
||||
#### Definition of partition into slice
|
||||
|
||||
Let $p:E\to B$ be a continuous surjective map. The open set $U\subseteq B$ is said to be evenly covered by $p$ if it's inverse image $p^{-1}(U)$ can be written as the union of **disjoint open sets** $V_\alpha$ in $E$. Such that for each $\alpha$, the restriction of $p$ to $V_\alpha$ is a homeomorphism of $V_\alpha$ onto $U$.
|
||||
|
||||
The collection of $\{V_\alpha\}$ is called a **partition** $p^{-1}(U)$ into slice.
|
||||
|
||||
_Stack of pancakes ($\{V_\alpha\}$) on plate $U$, each $V_\alpha$ is a pancake homeomorphic to $U$_
|
||||
|
||||
_Note that all the sets in the definition are open._
|
||||
|
||||
#### Definition of covering space
|
||||
|
||||
Let $p:E\to B$ be a continuous surjective map. If every point $b$ of $B$ has a neighborhood **evenly covered** by $p$, which means $p^{-1}(U)$ is partitioned into slice, then $p$ is called a covering map and $E$ is called a covering space.
|
||||
|
||||
<details>
|
||||
<summary>Examples of covering space</summary>
|
||||
|
||||
identity map is a covering map
|
||||
|
||||
---
|
||||
|
||||
Consider the $B\times \Gamma\to B$ with $\Gamma$ being the discrete topology with the projection map onto $B$.
|
||||
|
||||
This is a covering map.
|
||||
|
||||
---
|
||||
|
||||
Let $S^1=\{z\mid |z|=1\}$, then $p=z^n$ is a covering map to $S^1$.
|
||||
|
||||
Solving the inverse image for the $e^{i\theta}$ with $\epsilon$ interval, we can get $n$ slices for each neighborhood of $e^{i\theta}$, $-\epsilon< \theta< \epsilon$.
|
||||
|
||||
You can continue the computation and find the exact $\epsilon$ so that the inverse image of $p^{-1}$ is small and each interval don't intersect (so that we can make homeomorphism for each interval).
|
||||
|
||||
Usually, we don't choose the $U$ to be the whole space.
|
||||
|
||||
---
|
||||
|
||||
Consider the projection for the boundary of mobius strip into middle circle.
|
||||
|
||||
This is a covering map since the boundary of mobius strip is winding the middle circle twice, and for each point on the middle circle with small enough neighborhood, there will be two disjoint interval on the boundary of mobius strip that are homeomorphic to the middle circle.
|
||||
|
||||
</details>
|
||||
|
||||
#### Proposition of covering map is open map
|
||||
|
||||
If $p:E\to B$ is a covering map, then $p$ is an open map.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Consider arbitrary open set $V\subseteq E$, consider $U=p(V)$, for every point $q\in U$, with neighborhood $q\in W$, the inverse image of $W$ is open, continue next lecture.
|
||||
|
||||
</details>
|
||||
@@ -1,4 +1,4 @@
|
||||
# Math4202 Topology II (Lecture 5)
|
||||
# Math4202 Topology II (Lecture 6)
|
||||
|
||||
## Manifolds
|
||||
|
||||
|
||||
63
content/Math4202/Math4202_L7.md
Normal file
63
content/Math4202/Math4202_L7.md
Normal file
@@ -0,0 +1,63 @@
|
||||
# Math4202 Topology II (Lecture 7)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
Classify 2-dimensional topological manifolds (connected) up to homeomorphism/homotopy equivalence.
|
||||
|
||||
Use fundamental groups.
|
||||
|
||||
We want to show that:
|
||||
|
||||
1. The fundamental group is invariant under the equivalence relation.
|
||||
2. develop some methods to compute the groups.
|
||||
3. 2-dimensional topological spaces with the same fundamental group are equivalent (homeomorphism).
|
||||
|
||||
### Homotopy of paths
|
||||
|
||||
#### Definition of path
|
||||
|
||||
If $f$ and $f'$ are two continuous maps from $X$ to $Y$, where $X$ and $Y$ are topological spaces. Then we say that $f$ is homotopic to $f'$ if there exists a continuous map $F:X\times [0,1]\to Y$ such that $F(x,0)=f(x)$ and $F(x,1)=f'(x)$ for all $x\in X$.
|
||||
|
||||
The map $F$ is called a homotopy between $f$ and $f'$.
|
||||
|
||||
We use $f\simeq f'$ to mean that $f$ is homotopic to $f'$.
|
||||
|
||||
#### Definition of homotopic equivalence map
|
||||
|
||||
Let $f:X\to Y$ and $g:Y\to X$ be two continuous maps. If $f\circ g:Y\to Y$ and $g\circ f:X\to X$ are homotopic to the identity maps $\operatorname{id}_Y$ and $\operatorname{id}_X$, then $f$ and $g$ are homotopic equivalence maps. And the two spaces $X$ and $Y$ are homotopy equivalent.
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> This condition is weaker than homeomorphism. (In homeomorphism, let $g=f^{-1}$, we require $g\circ f=\operatorname{id}_X$ and $f\circ g=\operatorname{id}_Y$.)
|
||||
|
||||
<details>
|
||||
<summary>Example of homotopy equivalence maps</summary>
|
||||
|
||||
Let $X=\{a\}$ and $Y=[0,1]$ with standard topology.
|
||||
|
||||
Consider $f:X\to Y$ by $f(a)=0$ and $g:Y\to X$ by $g(y)=a$, where $y\in [0,1]$.
|
||||
|
||||
$g\circ f=\operatorname{id}_X$ and $f\circ g=[0,1]\mapsto 0$.
|
||||
|
||||
$g\circ f\simeq \operatorname{id}_X$
|
||||
|
||||
and $f\circ g\simeq \operatorname{id}_Y$.
|
||||
|
||||
Consider $F:X\times [0,1]\to Y$ by $F(a,0)=0$ and $F(a,t)=(1-t)y$. $F$ is continuous and homotopy between $f\circ g$ and $\operatorname{id}_Y$.
|
||||
|
||||
This gives example of homotopy but not homeomorphism.
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition of null homology
|
||||
|
||||
If $f:X\to Y$ is homotopy to a constant map. $f$ is called null homotopy.
|
||||
|
||||
#### Definition of path homotopy
|
||||
|
||||
Let $f,f':I\to X$ be a continuous maps from an interval $I=[0,1]$ to a topological space $X$.
|
||||
|
||||
Two pathes $f$ and $f'$ are path homotopic if
|
||||
|
||||
- there exists a continuous map $F:I\times [0,1]\to X$ such that $F(i,0)=f(i)$ and $F(i,1)=f'(i)$ for all $i\in I$.
|
||||
- $F(s,0)=f(0)$ and $F(s,1)=f(1)$, $\forall s\in I$.
|
||||
88
content/Math4202/Math4202_L8.md
Normal file
88
content/Math4202/Math4202_L8.md
Normal file
@@ -0,0 +1,88 @@
|
||||
# Math4202 Topology II (Lecture 8)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Path homotopy
|
||||
|
||||
#### Recall definition of path homotopy
|
||||
|
||||
Let $f,f':I\to X$ be a continuous maps from an interval $I=[0,1]$ to a topological space $X$.
|
||||
|
||||
Two pathes $f$ and $f'$ are path homotopic if
|
||||
|
||||
- there exists a continuous map $F:I\times [0,1]\to X$ such that $F(i,0)=f(i)$ and $F(i,1)=f'(i)$ for all $i\in I$.
|
||||
- $F(s,0)=f(0)$ and $F(s,1)=f(1)$, $\forall s\in I$.$F(s,0)=f(0)$ and $F(s,1)=f(1)$, $\forall s\in I$
|
||||
|
||||
#### Lemma: Homotopy defines an equivalence relation
|
||||
|
||||
The $\simeq$, $\simeq_p$ are both equivalence relations.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
**Reflexive**:
|
||||
|
||||
$f:I\to X$, $F:I\times I\to X$, $F(s,t)=f(s)$.
|
||||
|
||||
$F$ is a homotopy between $f$ and $f$ itself.
|
||||
|
||||
**Symmetric**:
|
||||
|
||||
Suppose $f,g:I\to X$,
|
||||
|
||||
$F:I\times I\to X$ is a homotopy between $f$ and $g$.
|
||||
|
||||
Let $H: I\times I\to X$ be a homotopy between $g$ and $f$ defined as follows:
|
||||
|
||||
$H(s,t)=F(s,1-t)$.
|
||||
|
||||
$H(s,0)=F(s,1)=g(s)$, $H(s,1)=F(s,0)=f(s)$.
|
||||
|
||||
Therefore $H$ is a homotopy between $g$ and $f$.
|
||||
|
||||
**Transitive**:
|
||||
|
||||
Suppose we have $f\simeq_p g$ with homotopy $F_1$, and $g\simeq_p h$ with homotopy $F_2$.
|
||||
|
||||
Then we can glue the two homotopies together to get a homotopy $F$ between $f$ and $h$ using pasting lemma.
|
||||
|
||||
$F(s,t)=(F_1*F_2)(s,t)\coloneqq\begin{cases}
|
||||
F_1(s,2t), & t\in [0,\frac{1}{2}]\\
|
||||
F_2(s,2t-1), & t\in [\frac{1}{2},1]
|
||||
\end{cases}$
|
||||
|
||||
Therefore $f\simeq_p h$ with homotopy $F$.
|
||||
|
||||
</details>
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> We use $[x]$ to denote the equivalence class of $x$.
|
||||
|
||||
<details>
|
||||
<summary>Example of equivalence classes in path homotopy</summary>
|
||||
|
||||
Let $X=\{pt\}$, $\operatorname{Path}(X)=\{\text{constant map}\}$.$\operatorname{Path}/_{\simeq_p}(X)=\{[\text{constant map}]\}$.
|
||||
|
||||
---
|
||||
|
||||
$X=\{p,q\}$ with discrete topology, $\operatorname{Path}(X)=\{f_{p},f_{q}\}$.$\operatorname{Path}/_{\simeq_p}(X)=\{[f_{p}], [f_{q}]\}$
|
||||
|
||||
This applied to all discrete topological spaces.
|
||||
|
||||
---
|
||||
|
||||
Let $X=\mathbb{R}$ with standard topology.
|
||||
|
||||
$\operatorname{Path}(X)=\{f:[0,1]\to \mathbb{R}\in C^0\}$
|
||||
|
||||
Let $f_1,f_2:[0,1]\to \mathbb{R}$ where $f_1(0)=f_2(0)$, $f_1(1)=f_2(1)$.
|
||||
|
||||
Then we can construct a homotopy between $f_1$ and $f_2$.
|
||||
|
||||
$F:[0,1]\times [0,1]\to \mathbb{R}$, $F(s,t)=(1-t)f_1(s)+tf_2(s)$ is a homotopy between $f_1$ and $f_2$.
|
||||
|
||||
$\operatorname{Path}/_{\simeq_p}(X)=\{(x_1,x_1)|x_1,x_2\in \mathbb{R}\}$
|
||||
|
||||
This applies to any convex space $V$ in $\mathbb{R}^n$.
|
||||
</details>
|
||||
145
content/Math4202/Math4202_L9.md
Normal file
145
content/Math4202/Math4202_L9.md
Normal file
@@ -0,0 +1,145 @@
|
||||
# Math4202 Topology II (Lecture 9)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Path homotopy
|
||||
|
||||
Consider the space of paths up to homotopy equivalence.
|
||||
|
||||
$$
|
||||
\operatorname{Path}/\simeq_p(X) =\Pi_1(X)
|
||||
$$
|
||||
|
||||
We want to impose some group structure on $\operatorname{Path}/\simeq_p(X)$.
|
||||
|
||||
Consider the $*$ operation on $\operatorname{Path}/\simeq_p(X)$.
|
||||
|
||||
Let $f,g:[0,1]\to X$ be two paths, where $f(0)=a$, $f(1)=g(0)=b$ and $g(1)=c$.
|
||||
|
||||
$$
|
||||
f*g:[0,1]\to X,\quad f*g(t)=\begin{cases}
|
||||
f(2t) & 0\leq t\leq \frac{1}{2}\\
|
||||
g(2t-1) & \frac{1}{2}\leq t\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
This connects our two paths.
|
||||
|
||||
#### Definition for product of paths
|
||||
|
||||
Given $f$ a path in $X$ from $x_0$ to $x_1$ and $g$ a path in $X$ from $x_1$ to $x_2$.
|
||||
|
||||
Define the product $f*g$ of $f$ and $g$ to be the map $h:[0,1]\to X$.
|
||||
|
||||
#### Definition for equivalent classes of paths
|
||||
|
||||
$\Pi_1(X,x)$ is the equivalent classes of paths starting and ending at $x$.
|
||||
|
||||
On $\Pi_1(X,x)$,, we define $\forall [f],[g],[f]*[g]=[f*g]$.
|
||||
|
||||
$$
|
||||
[f]\coloneqq \{f_i:[0,1]\to X|f_0(0)=f(0),f_i(1)=f(1)\}
|
||||
$$
|
||||
|
||||
#### Lemma
|
||||
|
||||
If we have some path $k:X\to Y$ is a continuous map, and if $F$ is path homotopy between $f$ and $f'$ in $X$, then $k\circ F$ is path homotopy between $k\circ f$ and $k\circ f'$ in $Y$.
|
||||
|
||||
If $k:X\to Y$ is a continuous map, and $f,g$ are two paths in $X$ with $f(1)=g(0)$, then
|
||||
|
||||
$$
|
||||
(k\circ f)*(k\circ g)=k\circ(f*g)
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
We check the definition of path homotopy.
|
||||
|
||||
$k\circ F:I\times I\to Y$ is continuous.
|
||||
|
||||
$k\circ F(s,0)=k(F(s,0))=k(f(s))=k\circ f(s)$.
|
||||
|
||||
$k\circ F(s,1)=k(F(s,1))=k(f'(s))=k\circ f'(s)$.
|
||||
|
||||
$k\circ F(0,t)=k(F(0,t))=k(f(0))=k(x_0$.
|
||||
|
||||
$k\circ F(1,t)=k(F(1,t))=k(f'(1))=k(x_1)$.
|
||||
|
||||
Therefore $k\circ F$ is path homotopy between $k\circ f$ and $k\circ f'$ in $Y$.
|
||||
|
||||
---
|
||||
|
||||
For the second part of the lemma, we proceed from the definition.
|
||||
|
||||
$$
|
||||
(k\circ f)*(k\circ g)(t)=\begin{cases}
|
||||
k\circ f(2t) & 0\leq t\leq \frac{1}{2}\\
|
||||
k\circ g(2t-1) & \frac{1}{2}\leq t\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
and
|
||||
|
||||
$$
|
||||
k\circ(f*g)=k(f*g(t))=k\left(\begin{cases}
|
||||
f(2t) & 0\leq t\leq \frac{1}{2}\\
|
||||
g(2t-1) & \frac{1}{2}\leq t\leq 1
|
||||
\end{cases}\right)=\begin{cases}
|
||||
k(f(2t))=k\circ f(2t) & 0\leq t\leq \frac{1}{2}\\
|
||||
k(g(2t-1))=k\circ g(2t-1) & \frac{1}{2}\leq t\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Theorem for properties of product of paths
|
||||
|
||||
1. If $f\simeq_p f_1, g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$. (Product is well-defined)
|
||||
2. $([f]*[g])*[h]=[f]*([g]*[h])$. (Associativity)
|
||||
3. Let $e_{x_0}$ be the constant path from $x_0$ to $x_0$, $e_{x_1}$ be the constant path from $x_1$ to $x_1$. Suppose $f$ is a path from $x_0$ to $x_1$.
|
||||
$$
|
||||
[e_{x_0}]*[f]=[f],\quad [f]*[e_{x_1}]=[f]
|
||||
$$
|
||||
(Right and left identity)
|
||||
4. Given $f$ in $X$ a path from $x_0$ to $x_1$, we define $\bar{f}$ to be the path from $x_1$ to $x_0$ where $\bar{f}(t)=f(1-t)$.
|
||||
$$
|
||||
f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}
|
||||
$$
|
||||
$$
|
||||
[f]*[\bar{f}]=[e_{x_0}],\quad [\bar{f}]*[f]=[e_{x_1}]
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
(1) If $f\simeq_p f_1$, $g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$.
|
||||
|
||||
Let $F$ be homotopy between $f$ and $f_1$, $G$ be homotopy between $g$ and $g_1$.
|
||||
|
||||
We can define
|
||||
|
||||
$$
|
||||
F*G:[0,1]\times [0,1]\to X,\quad F*G(s,t)=\left(F(-,t)*G(-,t)\right)(s)=\begin{cases}
|
||||
F(2s,t) & 0\leq s\leq \frac{1}{2}\\
|
||||
G(2s-1,t) & \frac{1}{2}\leq s\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
$F*G$ is a homotopy between $f*g$ and $f_1*g_1$.
|
||||
|
||||
We can check this by enumerating the cases from definition of homotopy.
|
||||
|
||||
---
|
||||
|
||||
Continue next time.
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition for the fundamental group
|
||||
|
||||
The fundamental group of $X$ at $x$ is defined to be
|
||||
|
||||
$$
|
||||
(\Pi_1(X,x),*)
|
||||
$$
|
||||
@@ -9,4 +9,11 @@ export default {
|
||||
Math4202_L4: "Topology II (Lecture 4)",
|
||||
Math4202_L5: "Topology II (Lecture 5)",
|
||||
Math4202_L6: "Topology II (Lecture 6)",
|
||||
Math4202_L7: "Topology II (Lecture 7)",
|
||||
Math4202_L8: "Topology II (Lecture 8)",
|
||||
Math4202_L9: "Topology II (Lecture 9)",
|
||||
Math4202_L10: "Topology II (Lecture 10)",
|
||||
Math4202_L11: "Topology II (Lecture 11)",
|
||||
Math4202_L12: "Topology II (Lecture 12)",
|
||||
Math4202_L13: "Topology II (Lecture 13)",
|
||||
}
|
||||
|
||||
131
content/Math4302/Math4302_L10.md
Normal file
131
content/Math4302/Math4302_L10.md
Normal file
@@ -0,0 +1,131 @@
|
||||
# Math4302 Modern Algebra (Lecture 10)
|
||||
|
||||
## Groups
|
||||
|
||||
### Group homomorphism
|
||||
|
||||
Recall the kernel of a group homomorphism is the set
|
||||
|
||||
$$
|
||||
\operatorname{ker}(\phi)=\{a\in G|\phi(a)=e'\}
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Let $\phi:(\mathbb{Z},+)\to (\mathbb{Z}_n,+)$ where $\phi(k)=k\mod n$.
|
||||
|
||||
The kernel of $\phi$ is the set of all multiples of $n$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Theorem for one-to-one group homomorphism
|
||||
|
||||
$\phi:G\to G'$ is one-to-one if and only if $\operatorname{ker}(\phi)=\{e\}$
|
||||
|
||||
If $\phi$ is one-to-one, then $\phi(G)\leq G'$, $G$ is isomorphic ot $\phi(G)$ (onto automatically).
|
||||
|
||||
If $A$ is a set, then a permutation of $A$ is a bijection $f:A\to A$.
|
||||
|
||||
#### Cayley's Theorem
|
||||
|
||||
Every group $G$ is isomorphic to a subgroup of $S_A$ for some $A$ (and if $G$ is finite then $A$ can be taken to be finite.)
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
$D_n\leq S_n$, so $A=\{1,2,\cdots,n\}$
|
||||
|
||||
---
|
||||
|
||||
$\mathbb{Z}_n\leq S_n$, (use the set of rotations) so $A=\{1,2,\cdots,n\}$ $\phi(i)=\rho^i$ where $i\in \mathbb{Z}_n$ and $\rho\in D_n$
|
||||
|
||||
---
|
||||
|
||||
$GL(2,\mathbb{R})$. Set $A=\mathbb{R}^2$, for every $A\in GL(2,\mathbb{R})$, let $\phi(A)$ be the permutation of $\mathbb{R}^2$ induced by $A$, so $\phi(A)=f_A:\mathbb{R}^2\to \mathbb{R}^2$, $f_A(\begin{pmatrix}x\\y\end{pmatrix})=A\begin{pmatrix}x\\y\end{pmatrix}$
|
||||
|
||||
We want to show that this is a group homomorphism.
|
||||
|
||||
- $\phi(AB)=\phi(A)\phi(B)$ (it is a homomorphism)
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
f_{AB}(\begin{pmatrix}x\\y\end{pmatrix})&=AB\begin{pmatrix}x\\y\end{pmatrix}\\
|
||||
&=f_A(B\begin{pmatrix}x\\y\end{pmatrix})\\
|
||||
&=f_A(f_B(\begin{pmatrix}x\\y\end{pmatrix}))\\
|
||||
&=(f_A\circ f_B)(\begin{pmatrix}x\\y\end{pmatrix})\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
- Then we need to show that $\phi$ is one-to-one.
|
||||
|
||||
It is sufficient to show that $\operatorname{ker}(\phi)=\{e\}$.
|
||||
|
||||
Solve $f_A(\begin{pmatrix}x\\y\end{pmatrix})=\begin{pmatrix}x\\y\end{pmatrix}$, the only choice for $A$ is the identity matrix.
|
||||
|
||||
Therefore $\operatorname{ker}(\phi)=\{e\}$.
|
||||
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary>Proof for Cayley's Theorem</summary>
|
||||
|
||||
Let $A=G$, for every $g\in G$, define $\lambda_g:G\to G$ by $\lambda_g(x)=gx$.
|
||||
|
||||
Then $\lambda_g$ is a **permutation** of $G$. (not homomorphism)
|
||||
|
||||
- $\lambda_g$ is one-to-one by cancellation on the left.
|
||||
- $\lambda_g$ is onto since $\lambda_g(g^{-1}y)=y$ for every $y\in G$.
|
||||
|
||||
We claim $\phi: G\to S_G$ define by $\phi(g)=\lambda_g$ is a group homomorphism that is one-to-one.
|
||||
|
||||
First we show that $\phi$ is homomorphism.
|
||||
|
||||
$\forall x\in G$
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\phi(g_1)\phi(g_2)&=\lambda_{g_1}(\lambda_{g_2}(x))\\
|
||||
&=\lambda_{g_1g_2}(x)\\
|
||||
&=\phi(g_1g_2)x\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
This is one to one since if $\phi(g_1)=\phi(g_2)$, then $\lambda_{g_1}=\lambda_{g_2}\forall x$, therefore $g_1=g_2$.
|
||||
|
||||
</details>
|
||||
|
||||
### Odd and even permutations
|
||||
|
||||
#### Definition of transposition
|
||||
|
||||
A $\sigma\in S_n$ is a transposition is a two cycle $\sigma=(i j)$
|
||||
|
||||
Fact: Every permutation in $S_n$ can be written as a product of transpositions. (may not be disjoint transpositions)
|
||||
|
||||
<details>
|
||||
<summary>Example of a product of transpositions</summary>
|
||||
|
||||
Consider $(1234)=(14)(13)(12)$.
|
||||
|
||||
In general, $(i_1,i_2,\cdots,i_m)=(i_1i_m)(i_2i_{m-1})(i_3i_{m-2})\cdots(i_1i_2)$
|
||||
|
||||
This is not the unique way.
|
||||
|
||||
$$
|
||||
(12)(34)=(42)(34)(23)(12)
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
But the parity of the number of transpositions is unique.
|
||||
|
||||
#### Theorem for parity of transpositions
|
||||
|
||||
If $\sigma\in S_n$ is written as a product of transposition, then the number of transpositions is either always odd or even.
|
||||
|
||||
#### Definition of odd and even permutations
|
||||
|
||||
$\sigma$ is an even permutation if the number of transpositions is even.
|
||||
|
||||
$\sigma$ is an odd permutation if the number of transpositions is odd.
|
||||
163
content/Math4302/Math4302_L11.md
Normal file
163
content/Math4302/Math4302_L11.md
Normal file
@@ -0,0 +1,163 @@
|
||||
# Math4302 Modern Algebra (Lecture 11)
|
||||
|
||||
## Groups
|
||||
|
||||
### Symmetric groups
|
||||
|
||||
#### Definition of odd and even permutations
|
||||
|
||||
$\sigma$ is an even permutation if the number of transpositions is even.
|
||||
|
||||
$\sigma$ is an odd permutation if the number of transpositions is odd.
|
||||
|
||||
#### Theorem for parity of transpositions
|
||||
|
||||
The parity of the number of transpositions is unique.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Prove using the determinant of a matrix, swapping the rows of the matrix multiply the determinant by $-1$.
|
||||
|
||||
Consider the identity matrix $I_n$. Then the determinant is $1$, let $(ij)A$, where $i\neq j$ denote the matrix obtained from $A$ by swapping the rows $j$ and $i$, then the determinant of $(1j)A$ is $-1$.
|
||||
|
||||
And,
|
||||
|
||||
$$
|
||||
\det((a_1b_1)(a_2b_2)\cdots(a_nb_n)A)=(-1)^n\det(A)
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
$S_3$ has 6 permutations $\{e,(12),(13),(23),(12)(23),(13)(23)\}$, 3 of them are even $\{e,(12)(23),(13)(23)\}$ and 3 of them are odd $\{(13),(12),(23)\}$.
|
||||
|
||||
#### Theorem for the number of odd and even permutations in symmetric groups
|
||||
|
||||
In general, $S_n$ has $n!$ permutations, half of them are even and half of them are odd.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Consider the set of odd permutations in $S_n$ and set of even permutations in $S_n$. Consider the function: $\alpha:S_n\to S_n$ where $\alpha(\sigma)=\sigma(12)$.
|
||||
|
||||
$\sigma$ is a bijection,
|
||||
|
||||
If $\sigma_1(12)=\sigma_2(12)$, then $\sigma_1=\sigma_2$.
|
||||
|
||||
If $\phi$ is an even permutation, $\alpha(\phi(12))=\phi(12)(12)=\phi$, therefore the number of elements in the set of odd and even permutations are the same.
|
||||
</details>
|
||||
|
||||
#### Definition for sign of permutations
|
||||
|
||||
For $\sigma\in S_n$, the sign of $\sigma$ is defined by $\operatorname{sign}(\sigma)=1$ if sigma is even and $-1$ if sigma is odd.
|
||||
|
||||
Then $\beta: S_n\to \{1,-1\}$ is a group under multiplication, where $\beta(\sigma)=\operatorname{sign}(\sigma)$.
|
||||
|
||||
Then $\beta$ is a group homomorphism.
|
||||
|
||||
#### Definition of alternating group
|
||||
|
||||
$\ker(\beta)\leq S_n$, and $\ker(\beta)$ is the set of even permutations. Therefore the set of even permutations is a subgroup of $S_n$. We denote as $A_n$ (also called alternating group).
|
||||
|
||||
and $|A_n|=\frac{n!}{2}$.
|
||||
|
||||
### Direct product of groups
|
||||
|
||||
#### Definition of direct product of groups
|
||||
|
||||
Let $G_1,G_2$ be two groups. Then the direct product of $G_1$ and $G_2$ is defined as
|
||||
|
||||
$$
|
||||
G_1\times G_2=\{(g_1,g_2):g_1\in G_1,g_2\in G_2\}
|
||||
$$
|
||||
|
||||
The operations are defined by $(a_1,b_1)*(a_2,b_2)=(a_1*a_2,b_1*b_2)$.
|
||||
|
||||
This group is well defined since:
|
||||
|
||||
The identity is $(e_1,e_2)$, where $e_1\in G_1$ and $e_2\in G_2$. (easy to verify)
|
||||
|
||||
The inverse is $(a_1,b_1)^{-1}=(a_1^{-1},b_1^{-1})$.
|
||||
|
||||
Associativity automatically holds by associativity of $G_1$ and $G_2$.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
Consider $\mathbb{Z}_\1\times \mathbb{Z}_2$.
|
||||
|
||||
$$
|
||||
\mathbb{Z}_\1\times \mathbb{Z}_2=\{(0,0),(0,1),(1,0),(1,1)\}
|
||||
$$
|
||||
|
||||
$(0,0)^2=(0,0)$, $(0,1)^2=(0,0)$, $(1,0)^2=(0,0)$, $(1,1)^2=(0,0)$
|
||||
|
||||
This is not a cyclic group, this is isomorphic to klein four group.
|
||||
|
||||
---
|
||||
|
||||
Consider $\mathbb{Z}_2\times \mathbb{Z}_3$.
|
||||
|
||||
$$
|
||||
\mathbb{Z}_2\times \mathbb{Z}_3=\{(0,0),(0,1),(0,2),(1,0),(1,1),(1,2),(2,0),(2,1),(2,2)\}
|
||||
$$
|
||||
|
||||
This is cyclic ((2,3) are coprime)
|
||||
|
||||
Consider:
|
||||
|
||||
$$
|
||||
\langle (1,1)\rangle=\{(0,0),(1,1),(0,2),(1,0),(0,1),(1,2)\}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for direct product of cyclic groups
|
||||
|
||||
$\mathbb{Z}_m\times \mathbb{Z}_n\simeq \mathbb{Z}_{mn}$ if and only if $m$ and $n$ have greatest common divisor $1$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
First assume $\operatorname{gcd}(m,n)=d>1$
|
||||
|
||||
Consider $(r,s)\in \mathbb{Z}_m\times \mathbb{Z}_n$.
|
||||
|
||||
We claim that order of $(r,s)$ is at most $\frac{mn}{d}<mn$.
|
||||
|
||||
Since $\frac{mn}{d}$ is integer, $\frac{mn}{d}=m_1dn_1$ where $m_1d$ is multiple of $m$ and $n_1d$ is multiple of $n$.
|
||||
|
||||
Therefore $r$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_m$ and $s$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_n$.
|
||||
|
||||
---
|
||||
|
||||
Other direction:
|
||||
|
||||
Assume $\operatorname{gcd}(m,n)=1$.
|
||||
|
||||
Claim order of $(1,1)=mn$, so $\mathbb{Z}_m\times \mathbb{Z}_n=\langle (1,1)\rangle$.
|
||||
|
||||
If $k$ is the order of $(1,1)$, then $k$ is a multiple of $m$ and a multiple of $n$.
|
||||
|
||||
</details>
|
||||
|
||||
Similarly, if $G_1,G_2,G_3,\ldots,G_k$ are groups, then
|
||||
|
||||
$$
|
||||
G_1\times G_2\times G_3\times \cdots\times G_k=\{(g_1,g_2,\ldots,g_k):g_1\in G_1,g_2\in G_2,\ldots,g_k\in G_k\}
|
||||
$$
|
||||
|
||||
is a group.
|
||||
|
||||
Easy to verify by associativity. $(G_1\times G_2)\times G_3=G_1\times G_2\times G_3$.
|
||||
|
||||
#### Some extra facts for direct product
|
||||
|
||||
1. $G_1\times G_2\simeq G_2\times G_1$, with $\phi(a_1,a_2)=(a_2,a_1)$.
|
||||
2. If $H_1\leq G_1$ and $H_2\leq G_2$, then $H_1\times H_2\leq G_1\times G_2$.
|
||||
|
||||
> [!WARNING]
|
||||
>
|
||||
> Not every subgroup of $G_1\times G_2$ is of the form $H_1\times H_2$.
|
||||
>
|
||||
> Consider $\mathbb{Z}_2\times \mathbb{Z}_2$ with subgroup $\{(0,0),(1,1)\}$, This forms a subgroup but not of the form $H_1\times H_2$.
|
||||
135
content/Math4302/Math4302_L12.md
Normal file
135
content/Math4302/Math4302_L12.md
Normal file
@@ -0,0 +1,135 @@
|
||||
# Math4303 Modern Algebra (Lecture 12)
|
||||
|
||||
## Groups
|
||||
|
||||
### Direct products
|
||||
|
||||
$\mathbb{Z}_m\times \mathbb{Z}_n$ is cyclic if and only if $m$ and $n$ have greatest common divisor $1$.
|
||||
|
||||
More generally, for $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times \cdots \times \mathbb{Z}_{n_k}$, if $n_1,n_2,\cdots,n_k$ are pairwise coprime, then the direct product is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
For the forward direction, use $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}=\mathbb{Z}_{n_1n_2}$. if $n_1, n_2$ are coprime.
|
||||
|
||||
|
||||
For the backward, suppose to the contrary that for example $\gcd(n_1,n_2)=d>1$, then $G=\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times H$, where any element in $H$ has order $\leq |H|$ and any element in $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}$ has order $<\frac{n_1n_2}{d}$, therefore, all the elements in $G$ will have order strictly less than the size $n_1n_2\ldots n_k$ of the group.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for composition of cyclic groups
|
||||
|
||||
If $n=p_1^{m_1}\ldots p_k^{m_k}$, where $p_i$ are distinct primes, then the group
|
||||
|
||||
$$
|
||||
G=\mathbb{Z}_n=\mathbb{Z}_{p_1^{m_1}}\times \mathbb{Z}_{p_2^{m_2}}\times \cdots \times \mathbb{Z}_{p_k^{m_k}}
|
||||
$$
|
||||
|
||||
is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Example for product of cyclic groups and order of element</summary>
|
||||
|
||||
$$
|
||||
\mathbb{Z}_{8}\times\mathbb{Z}_8\times \mathbb{Z}_12
|
||||
$$
|
||||
|
||||
the order for $(1,1,1)$ is 24.
|
||||
|
||||
What is the maximum order of an element in this group?
|
||||
|
||||
Guess:
|
||||
|
||||
$8*3=24$
|
||||
|
||||
</details>
|
||||
|
||||
### Structure of finitely generated abelian groups
|
||||
|
||||
#### Theorem for finitely generated abelian groups
|
||||
|
||||
Every finitely generated abelian group $G$ is isomorphic to
|
||||
|
||||
$$
|
||||
Z_{p_1}^{n_1}\times Z_{p_2}^{n_2}\times \cdots \times Z_{p_k}^{n_k}\times\underbrace{\mathbb{Z}\times \ldots \times \mathbb{Z}}_{m\text{ times}}
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
If $G$ is abelian of size $8$, then $G$ is isomorphic to one of the following:
|
||||
|
||||
- $\mathbb{Z}_2\times \mathbb{Z}_2\times \mathbb{Z}_2$ (non cyclic)
|
||||
- $\mathbb{Z}_2\times \mathbb{Z}_4$ (non cyclic)
|
||||
- $\mathbb{Z}_2$ (cyclic)
|
||||
|
||||
And any two of them are not isomorphic
|
||||
|
||||
---
|
||||
|
||||
Find all abelian group of order $72$.
|
||||
|
||||
Since $72=2^3*3^2$, There are 3 possibilities for the $2^3$ part, and there are 2 possibilities for the $3^2$ part.
|
||||
|
||||
Note that $\mathbb{Z}_8\times\mathbb{Z}_9$, where $8,9$ are coprime, $\mathbb{Z}_8\times\mathbb{Z}_9=\mathbb{Z}_{72}$, is cyclic.
|
||||
|
||||
There are 6 possibilities in total.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for divisor size of abelian subgroup
|
||||
|
||||
If $g$ is abelian and $|G|=n$, then for every divisor $m$ of $n$, $G$ has a subgroup of order $m$.
|
||||
|
||||
> [!WARNING]
|
||||
>
|
||||
> This is not true if $G$ is not abelian.
|
||||
>
|
||||
> Consider $A_4$ (alternating group for $S_4$) does not have a subgroup of order 6.
|
||||
|
||||
|
||||
<details>
|
||||
<summary>Proof for the corollary</summary>
|
||||
|
||||
Write $G=\mathbb{Z}_{p_1}^{n_1}\times \mathbb{Z}_{p_2}^{n_2}\times \cdots \times \mathbb{Z}_{p_k}^{n_k}$ where $p_i$ are distinct primes.
|
||||
|
||||
Therefore $n=p_1^{m_1}\ldots p_k^{m_k}$.
|
||||
|
||||
For any divisor $d$ of $n$, we can write $d=p_1^{m_1}\ldots p_k^{m_k}$, where $m_i\leq n_i$.
|
||||
|
||||
Now for each $p_i$, we choose the subgroup $H_i$ of size $p_i^{m_i}$ in $\mathbb{Z}_{p_i}^{n_i}$. (recall that every cyclic group of size $r$ and any divisor $s$ of $r$, there is a subgroup of order $s$. If the group is generated by $a$, then use $a^{\frac{r}{s}}$ to generate the subgroup.)
|
||||
|
||||
We can construct the subgroup $H=H_1\times H_2\times \cdots \times H_k$ is the subgroup of $G$ of order $d$.
|
||||
</details>
|
||||
|
||||
### Cosets
|
||||
|
||||
#### Definition of Cosets
|
||||
|
||||
Let $G$ be a group and $H$ its subgroup.
|
||||
|
||||
Define a relation on $G$ and $a\sim b$ if $a^{-1}b\in H$.
|
||||
|
||||
This is an equivalence relation.
|
||||
|
||||
- Reflexive: $a\sim a$: $a^{-1}a=e\in H$
|
||||
- Symmetric: $a\sim b\Rightarrow b\sim a$: $a^{-1}b\in H$, $(a^{-1}b)^{-1}=b^{-1}a\in H$
|
||||
- Transitive: $a\sim b$ and $b\sim c\Rightarrow a\sim c$ : $a^{-1}b\in H, b^{-1}c\in H$, therefore their product is also in $H$, $(a^{-1}b)(b^{-1}c)=a^{-1}c\in H$
|
||||
|
||||
So we get a partition of $G$ to equivalence classes.
|
||||
|
||||
Let $a\in G$, the equivalence class containing $a$
|
||||
|
||||
$$
|
||||
aH=\{x\in G| a\sim x\}=\{x\in G| a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
|
||||
$$
|
||||
|
||||
This is called the coset of $a$ in $H$.
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Consider $G=S_3$
|
||||
|
||||
</details>
|
||||
143
content/Math4302/Math4302_L13.md
Normal file
143
content/Math4302/Math4302_L13.md
Normal file
@@ -0,0 +1,143 @@
|
||||
# Math4302 Modern Algebra (Lecture 13)
|
||||
|
||||
## Groups
|
||||
|
||||
### Cosets
|
||||
|
||||
Last time we see that (left coset) $a\sim b$ (to differentiate from right coset, we may denote it as $a\sim_L b$) by $a^{-1}b\in H$ defines an equivalence relation.
|
||||
|
||||
#### Definition of Equivalence Class
|
||||
|
||||
Let $a\in H$, and the equivalence class containing $a$ is defined as:
|
||||
|
||||
$$
|
||||
aH=\{x|a\simeq x\}=\{x|a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
|
||||
$$.
|
||||
|
||||
#### Properties of Equivalence Class
|
||||
|
||||
$aH=bH$ if and only if $a\sim b$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
If $aH=bH$, then since $a\in aH, a\in bH$, then for some $h$, $a=bh$, since $b^{-1}a\in H$, so $a^{-1}b\in H$, therefore $a\simeq b$.
|
||||
|
||||
If $a\sim b$, then $aH\subseteq bH$, since anything in $aH$ is related to $a$, therefore it is related to $b$ so $a\in bH$.
|
||||
|
||||
$bH\subseteq aH$, apply the reflexive property for equivalence relation, therefore $b\in aH$.
|
||||
|
||||
So $aH=bH$.
|
||||
|
||||
</details>
|
||||
|
||||
If $aH\cap bH\neq \emptyset$, then $aH=bH$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
If $x\in aH\cap bH$, then $x\sim a$ and $x\sim b$, so $a\sim b$, so $aH=bH$.
|
||||
|
||||
</details>
|
||||
|
||||
$aH=H$ if and only if $a\in H$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
$aH=eH$ if and only if $a\sim e$, if and only if $a\in H$.
|
||||
|
||||
</details>
|
||||
|
||||
$aH$ is called **left coset** of $a$ in $H$.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
Consider $G=S_3=\{e,\rho,\rho^2,\tau_1,\tau_2,\tau_3\}$.
|
||||
|
||||
where $\rho=(123),\rho^2=(132),\tau_1=(12),\tau_2=(23),\tau_3=(13)$.
|
||||
|
||||
$H=\{e,\rho,\rho^2\}$.
|
||||
|
||||
All the left coset for $H$ is $H=eH=\rho H=\rho^2H$.
|
||||
|
||||
$$
|
||||
\tau_1\rho=(23)=\tau_2\\
|
||||
\tau_1\rho^2=(13)=\tau_3\\
|
||||
\tau_2\rho=(31)=\tau_3\\
|
||||
\tau_2\rho^2=(12)=\tau_1
|
||||
\tau_3\rho=(12)=\tau_1\\
|
||||
\tau_3\rho^2=(23)=\tau_2
|
||||
$$
|
||||
|
||||
$$
|
||||
\tau_1H=\{\tau_1,\tau_2,\tau_3\}=\tau_2H=\tau_3H\\
|
||||
$$
|
||||
|
||||
---
|
||||
|
||||
Consider $G=\mathbb{Z}$ with $H=5\mathbb{Z}$.
|
||||
|
||||
We have 5 cosets, $H,1+H,2+H,3+H,4+H$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for size of cosets
|
||||
|
||||
Any coset of $H$ has the same cardinality as $H$.
|
||||
|
||||
Define $\phi:H\to aH$ by $\phi(h)=ah$.
|
||||
|
||||
$\phi$ is an bijection, if $ah=ah'\implies h=h'$, it is onto by definition of $aH$.
|
||||
|
||||
#### Corollary: Lagrange's Theorem
|
||||
|
||||
If $G$ is a finite group, and $H\leq G$, then $|H|\big\vert |G|$. (size of $H$ divides size of $G$)
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Suppose $H$ has $r$ distinct cosets, then $|G|=r|H|$, so $|H|$ divides $|G|$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for Lagrange's Theorem
|
||||
|
||||
If $|G|=p$, where $p$ is a prime number, then $G$ is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Prick $e\neq a\in G$, let $H=\langle a\rangle \leq G$, then $|H|$ divides $|G|$, since $p$ is prime, then $|H|=|G|$, so $G=\langle a \rangle$.
|
||||
|
||||
</details>
|
||||
|
||||
If $G$ is finite and $a\in G$, then $\operatorname{ord}(a)\big\vert|G|$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Since $\operatorname{ord}(a)=|\langle a\rangle|$, and $\langle a\rangle $ is a subgroup, so $\operatorname{ord}(a)\big\vert|G|$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition of index
|
||||
|
||||
Suppose $H\leq G$, the number of distinct left cosets of $H$ is called the index of $H$ in $G$. Notation is $(G:H)$.
|
||||
|
||||
#### Definition of right coset
|
||||
|
||||
Suppose $H\leq G$, define the equivalence relation by $a\sim 'b$ (or $a\sim_R b$ in some textbook) if $a b^{-1}\in H$. (note the in left coset, we use $a^{-1}b \in H$, or equivalently $b^{-1}a \in H$, these are different equivalence relations)
|
||||
|
||||
The equivalent class is defined
|
||||
|
||||
$$
|
||||
Ha=\{x\in G|x\sim'a\}=\{x\in G|xa^{-1}\in H\}=\{x|x=ha\text{ for some }h\in H\}
|
||||
$$
|
||||
|
||||
Some properties are the same as the left coset
|
||||
|
||||
- $Ha=H\iff a\in H$
|
||||
- $Ha=Hb$ if and only if $a\sim'b\iff a b^{-1}\in H$.
|
||||
- $Ha\cap Hb\neq \emptyset\iff Ha=Hb$.
|
||||
|
||||
Some exercises: Find all the left and right cosets of $G=S_3$, there should be 2 left cosets and 2 right cosets (giving different partition of $G$).
|
||||
83
content/Math4302/Math4302_L7.md
Normal file
83
content/Math4302/Math4302_L7.md
Normal file
@@ -0,0 +1,83 @@
|
||||
# Math4302 Modern Algebra (Lecture 7)
|
||||
|
||||
## Subgroups
|
||||
|
||||
### Cyclic group
|
||||
|
||||
Last time, let $G$ be a group and $a\in G$. $|\langle a\rangle|=$ smallest positive $n$ such that $a^n=e$.
|
||||
|
||||
$\langle a\rangle=\{a^0,a^1,a^2,\cdots,a^{n-1}\}$.
|
||||
|
||||
|
||||
#### Lemma subgroup of cyclic group is cyclic
|
||||
|
||||
Every subgroup of a cyclic group is cyclic.
|
||||
|
||||
$G=\langle a\rangle$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $H\leq G$ be a subgroup.
|
||||
|
||||
If $H=\{e\}$, we are done.
|
||||
|
||||
Otherwise, let $m$ be the smallest positive integer such that $a^m\in H$. We claim $H=\langle a^m\rangle$.
|
||||
|
||||
- $\langle a^m\rangle\subseteq H$. trivial since $a^m\in H$ and $H$ is a subgroup.
|
||||
- $H\subseteq\langle a^m\rangle$. Suppose $a^k\in H$, need to show $a^k\in \langle a^m\rangle$
|
||||
Divide $k$ by $m$: $k=qm+r$, $0\leq r\leq m-1$, Then $a^k\in H\implies a^{qm+r}\in H$. Also $a^m\in H$, then $(a^m)^q\in H$, so $a^mq\in H$, $a^-mq\in H$, so $a^{k}a^{-mq}\in H$, so $a^r\in H$, so $r$ has to be zero.
|
||||
By our choice of $m$, $k=mq$, so $a^k=a^mq\in \langle a^m\rangle$.
|
||||
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Every subgroup of $(\mathbb{Z},+)$ is of the form
|
||||
|
||||
like the multiples of $n$: $n\mathbb{Z}=\langle n\rangle$ for some $n\geq 0$.
|
||||
|
||||
In particular, if $n,m\geq 1$ are in $\mathbb{Z}$, then the subgroup $\{nr+ms|r,s\in \mathbb{Z}\}\leq \mathbb{Z}$.
|
||||
|
||||
is equal to $d\mathbb{Z}$ where $d=\operatorname{gcd}(n,m)$.
|
||||
|
||||
</details>
|
||||
|
||||
Skip $\operatorname{gcd}$ part, check for Math 4111 notes in this site.
|
||||
|
||||
|
||||
#### Lemma for size of cyclic subgroup
|
||||
|
||||
Let $G=\langle a\rangle$, $|G|=n$, and $H=\langle a^m\rangle\subseteq G$. Then $|H|=\frac{n}{d}$ where $d=\operatorname{gcd}(|G|,|H|)$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Recall $|H|$ is the smallest power of $a^m$ which is equal to $e$.
|
||||
|
||||
Let $d=\operatorname{gcd}(m,n)$, so $m=m_1d$, $n=n_1d$. and $\frac{n}{\operatorname{gcd}(m,n)}=n_1$,
|
||||
|
||||
- $(a^m)^{n_1}=a^{mn_1}=a^{m_1dn_1}=a^{m_1n}=(a^n)^{m_1}=e$.
|
||||
- If $(a^m)^k=e$, the $a^{mk}=e\implies$ $mk$ is a multiple of $n$,
|
||||
- If $a^\ell=e$, divide $\ell$ by $n$, $\ell=nq+r$, $0\leq r\leq n-1$, then $e=a^\ell=a^{nq+r}=a^r$, $r$ has to be zero, so $a^\ell=a^r=e$. $n|\ell$.
|
||||
- $n_1d|m_1dk$, but by the definition of smallest common divisor, $m_1,n_1$ should not have common divisor other than $1$. So $n_1|m_1k$, $n_1|k\implies k\geq n_1$.
|
||||
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary>Example Applying the lemma</summary>
|
||||
|
||||
Let $G=\langle a \rangle$, $|G|=6$, $H=\langle a^4\rangle$. Then $|H|=\frac{6}{d}=3$ where $d=\operatorname{gcd}(6,4)=2$.
|
||||
|
||||
To check this we do enumeration $\langle a^4\rangle=\{e,a^4,a^2\}$.
|
||||
|
||||
---
|
||||
|
||||
Find generator of $\mathbb{Z}_9$:
|
||||
|
||||
Using the coprime, we have $g=\{1,2,4,5,7,8\}$.
|
||||
|
||||
</details>
|
||||
|
||||
Corollary: $\langle a^m\rangle=G\iff |H|=n\iff \frac{n}{d}=n\iff \operatorname{gcd}(m,n)=1$ $m,n$ are coprime.
|
||||
146
content/Math4302/Math4302_L8.md
Normal file
146
content/Math4302/Math4302_L8.md
Normal file
@@ -0,0 +1,146 @@
|
||||
# Math4302 Modern Algebra (Lecture 8)
|
||||
|
||||
## Subgroups
|
||||
|
||||
### Cyclic group
|
||||
|
||||
#### Subgroup of cyclic group is cyclic
|
||||
|
||||
Every subgroup of a cyclic group is cyclic.
|
||||
|
||||
#### Order of subgroup of cyclic group
|
||||
|
||||
If $a\in G$ and $|\langle a\rangle|$ be the smallest positive $n$ such that $a^n=e$, then $\langle a\rangle=\{e,a,a^2,\cdots,a^{n-1}\}$ and $a^{m_1}=a^{m_2}\iff m_1=m_2\mod n$. ($n$ divides $m_1-m_2$)
|
||||
|
||||
#### Size of subgroup of cyclic group
|
||||
|
||||
Let $G=\langle a\rangle$ and $H=\langle a^m\rangle$. Then $|H|=\frac{|G|}{d}$ where $d=\operatorname{gcd}(|G|,|H|)$. In particular, $\langle a^m\rangle=G\iff \operatorname{gcd}(n,m)=1$.
|
||||
|
||||
#### GCD decides the size of subgroup
|
||||
|
||||
Suppose $G=\langle a\rangle$, $|G|=n$.
|
||||
|
||||
Then $\langle a^{m_1}\rangle=\langle a^{m_2}\rangle\iff \operatorname{gcd}(n,m_2)=\operatorname{gcd}(n,m_1)$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
$\implies$:
|
||||
|
||||
$\langle a^{m_1}\rangle=\langle a^{m_2}\rangle\implies \operatorname{gcd}(n,m_1)=\operatorname{gcd}(n,m_2)$
|
||||
|
||||
$\impliedby$:
|
||||
|
||||
Suppose $d=\operatorname{gcd}(n,m_1)=\operatorname{gcd}(n,m_2)$.
|
||||
|
||||
Enough to show $a^{m_1}\in \langle a^{m_2}\rangle$. (then we conclude $\langle a^{m_1}\rangle=\langle a^{m_2}\rangle$ and by symmetry $\langle a^{m_2}\rangle=\langle a^{m_1}\rangle$.)
|
||||
|
||||
Equivalent to show that $a^{m_1}=(a^{m_2})^k$ for some integer $k$. That is $n$ divides $m_1-km_2$ for some $k\in \mathbb{Z}$.
|
||||
|
||||
From last lecture, we know that $d$ can be written as $d=nr+m_2 s$ for some $r,s\in \mathbb{Z}$.
|
||||
|
||||
Multiply by $\frac{m_1}{d}$, (since $d$ divides $m_1$, this is an integer).
|
||||
|
||||
So $m_1=nr\frac{m_1}{d}+m_2s\frac{m_1}{d}$.
|
||||
|
||||
Therefore $n$ divides $m_1-(\frac{m_1}{d}s)m_2$, so $k=\frac{m_1}{d}s$. works.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollaries for subgroup of cyclic group
|
||||
|
||||
Let $G=\langle a\rangle$ be a cyclic group of finite order.
|
||||
|
||||
1. If $H\leq G$, then $|H|$ is a divisor of $|G|$. (More generally true for finite groups.)
|
||||
2. For any $d$ divides $|G|$, there is exactly one subgroup of $G$ of order $d$. $\langle a^m\rangle$ where $m=\frac{|G|}{d}$.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
$(\mathbb{Z}_18,+)$.
|
||||
|
||||
The subgroup with size $6$ is $\langle 3\rangle=\{0,3,6,9,12,15\}=\langle 15\rangle$.
|
||||
|
||||
Note that $\operatorname{gcd}(18,3)=3=\operatorname{gcd}(18,15)$.
|
||||
|
||||
$\langle 6\rangle=\{0,6,12\}$.
|
||||
|
||||
$\langle 9\rangle=\{0,9\}$.
|
||||
|
||||
$\langle 2\rangle=\{0,2,4,6,8,10,12,14,16\}$ (generators are $2,4,8,10,14,16$ since they have gcd $2$ with $18$).
|
||||
|
||||
</details>
|
||||
|
||||
### Non-cyclic groups
|
||||
|
||||
Let $G$ be a group and $a,b\in G$, then we use $\langle a,b\rangle$ to mean the subgroup of $G$ generated by combination of $a$ and $b$.
|
||||
|
||||
$$
|
||||
\langle a,b\rangle\coloneqq \{e,a,b,ab,ba,a^{-1},b^{-1},(ab)^{-1},(ba)^{-1},\ldots\}
|
||||
$$
|
||||
|
||||
This is a subgroup of $G$ since it is closed and $e=a^0$.
|
||||
|
||||
#### Klein 4 group
|
||||
|
||||
Klein 4 group is abelian but not cyclic.
|
||||
|
||||
|*|e|a|b|c|
|
||||
|--|---|---|---|---|
|
||||
|e|e|a|b|c|
|
||||
|a|a|e|c|b|
|
||||
|b|b|c|e|a|
|
||||
|c|c|b|a|e|
|
||||
|
||||
The subgroups are
|
||||
|
||||
$\langle e\rangle=\{e\}$
|
||||
|
||||
$\langle a\rangle=\{e,a\}$
|
||||
|
||||
$\langle b\rangle=\{e,b\}$
|
||||
|
||||
$\langle c\rangle=\{e,c\}$
|
||||
|
||||
Therefore $G$ is **not cyclic** and **not isomorphic** to $\mathbb{Z}_4$.
|
||||
|
||||
Here $G=\langle a,b\rangle=\{e,a,b,ab=c\}$.
|
||||
|
||||
More generally, if we have $a_i\in G$, where $i\in I$, then $\langle a_i,i\in I\rangle=$ all possible combinations of $a_i$ with their inverses. Is a subgroup of $G$.
|
||||
|
||||
Another way to describe is that $\langle a_i,i\in I\rangle=\bigcap_{H\leq G, a_i\in H,i\in I}H$.
|
||||
|
||||
#### Definition of finitely generated group
|
||||
|
||||
If $G$ is a group and if there is a finite set $a_1,\ldots, a_n\in G$ such that $G=\langle a_1,\ldots, a_n\rangle$, then $G$ is called finitely generated.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
Any finite group is finitely generated.
|
||||
|
||||
---
|
||||
|
||||
$(\mathbb{Q},+)$ is not finitely generated.
|
||||
|
||||
Suppose for the contrary, there is a finite set $\frac{a_1}{b_1},\ldots,\frac{a_n}{b_n}\in \mathbb{Q}$ such that
|
||||
|
||||
$$
|
||||
\mathbb{Q}=\langle \frac{a_1}{b_1},\ldots,\frac{a_n}{b_n}\rangle=\{t_1\frac{a_1}{b_1},\ldots,t_n\frac{a_n}{b_n}|t_1,t_2,\ldots,t_n\in \mathbb{Z}\}
|
||||
$$.
|
||||
|
||||
Pick prime $p$ such that $p>|b_1|,\ldots,|b_n|$. Then $\frac{1}{p}\in \mathbb{Q}$.
|
||||
|
||||
$$
|
||||
\frac{1}{p}=t_1\frac{a_1}{b_1}+t_2\frac{a_2}{b_2}+\cdots+t_n\frac{a_n}{b_n}=\frac{A}{b_1b_2\cdots b_n}
|
||||
$$
|
||||
|
||||
This implies that $pA=b_1b_2\cdots b_n$.
|
||||
|
||||
Since $p$ is prime, $p|b_i$ for some $i$.
|
||||
|
||||
However, by our construction, $p>|b_i|$ and cannot divide $b_i$.
|
||||
|
||||
Contradiction.
|
||||
|
||||
</details>
|
||||
138
content/Math4302/Math4302_L9.md
Normal file
138
content/Math4302/Math4302_L9.md
Normal file
@@ -0,0 +1,138 @@
|
||||
# Math4302 Modern Algebra (Lecture 9)
|
||||
|
||||
## Groups
|
||||
|
||||
### Non-cyclic groups
|
||||
|
||||
#### Dihedral groups
|
||||
|
||||
The dihedral group $D_n$ is the group of symmetries of a regular $n$-gon.
|
||||
|
||||
(Permutation that sends adjacent vertices to adjacent vertices)
|
||||
|
||||
$D_n<S_n$
|
||||
|
||||
$|S_n|=n!, |D_n|=2n$
|
||||
|
||||
We can classify dihedral groups as follows:
|
||||
|
||||
$\rho \in D_n$ as the rotation of a regular $n$-gon by $\frac{2\pi}{n}$.
|
||||
|
||||
$\phi\in D_n$ as a reflection of a regular $n$-gon with respect to $x$-axis.
|
||||
|
||||
We can enumerate the elements of $D_n$ as follows:
|
||||
|
||||
$$
|
||||
D_n=\langle \phi,\rho\rangle=\{e,\rho,\rho^2,\cdots,\rho^{n-1},\phi,\phi\rho,\phi\rho^2,\cdots,\phi\rho^{n-1}\}
|
||||
$$
|
||||
|
||||
We claim these elements are all distinct.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Consider the first half, clearly $\rho_i\neq \rho_j$ if $0\leq i<j\leq n-1$.
|
||||
|
||||
Also $\phi\rho_i\neq \phi\rho_j$ if $0\leq i<j\leq n-1$. otherwise $\rho_i=\rho_j$
|
||||
|
||||
Also $\rho^i\neq \rho^j\phi$ where $0\leq i,j\leq n-1$.
|
||||
|
||||
Otherwise $\rho^{i-j}=\phi$, but reflection (with some point fixed) cannot be any rotation (no points are fixed).
|
||||
|
||||
</details>
|
||||
|
||||
In $D_n$, $\phi\rho=\rho^{n-1}\phi$, more generally, $\phi\rho^i=\rho^{n-i}\phi$ for any $i\in\mathbb{Z}$.
|
||||
|
||||
### Group homomorphism
|
||||
|
||||
#### Definition for group homomorphism
|
||||
|
||||
Let $G,G'$ be groups.
|
||||
|
||||
$\phi:G\to G'$ is called a group homomorphism if $\phi(g_1g_2)=\phi(g_1)\phi(g_2)$ for all $g_1,g_2\in G$ (Note that $\phi$ may not be bijective).
|
||||
|
||||
This is a weaker condition than isomorphism.
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
$GL(2,\mathbb{R})=\{A\in M_{2\times 2}(\mathbb{R})|det(A)\neq 0\}$
|
||||
|
||||
Then $\phi:GL(2,\mathbb{R})\to (\mathbb{R}-\{0\},\cdot)$ where $\phi(A)=\det(A)$ is a group homomorphism, since $\det(AB)=\det(A)\det(B)$.
|
||||
|
||||
This is not one-to-one but onto, therefore not an isomorphism.
|
||||
|
||||
---
|
||||
|
||||
$(\mathbb{Z}_n,+)$ and $D_n$ has homomorphism $(\mathbb{Z}_n,+)\to D_n$ where $\phi(k)=\rho^k$
|
||||
|
||||
$\phi(i+j)=\rho^{i+j\mod n}=\rho^i\rho^j=\phi(i)+\phi(j)$.
|
||||
|
||||
This is not onto but one-to-one, therefore not an isomorphism.
|
||||
|
||||
---
|
||||
|
||||
Let $G,G'$ be two groups, let $e$ be the identity of $G$ and let $e'$ be the identity of $G'$.
|
||||
|
||||
Let $\phi:G\to G'$, $\phi(a)=e'$ for all $a\in G$.
|
||||
|
||||
This is a group homomorphism,
|
||||
|
||||
$$
|
||||
\phi(ab)=\phi(a)\phi(b)=e'e'=e'
|
||||
$$
|
||||
|
||||
This is generally not onto and not one-to-one, therefore not an isomorphism.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for group homomorphism
|
||||
|
||||
Let $G,G'$ be groups and $\phi:G\to G'$ be a group homomorphism. $e$ is the identity of $G$ and $e'$ is the identity of $G'$.
|
||||
|
||||
1. $\phi(e)=e'$
|
||||
2. $\phi(a^{-1})=(\phi(a))^{-1}$ for all $a\in G$
|
||||
3. If $H\leq G$, then $\phi(H)\leq G'$, where $\phi(H)=\{\phi(a)|a\in H\}$.
|
||||
4. If $K\leq G'$ then $\phi^{-1}(K)\leq G$, where $\phi^{-1}(K)=\{a\in G|\phi(a)\in K\}$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
(1) $\phi(e)=e'$
|
||||
|
||||
Consider $\phi(ee)=\phi(e)\phi(e)$, therefore $\phi(e)=e'$ by cancellation on the left.
|
||||
|
||||
---
|
||||
|
||||
(2) $\phi(a^{-1})=(\phi(a))^{-1}$
|
||||
|
||||
Consider $\phi(a^{-1}a)=\phi(a^{-1})\phi(a)=\phi(e)$, therefore $\phi(a^{-1})$ is the inverse of $\phi(a)$ in $G'$.
|
||||
|
||||
---
|
||||
|
||||
(3) If $H\leq G$, then $\phi(H)\leq G'$, where $\phi(H)=\{\phi(a)|a\in H\}$.
|
||||
|
||||
- $e\in H$ implies that $e'=\phi(e)\in\phi(H)$.
|
||||
- If $x\in \phi(H)$, then $x=\phi(a)$ for some $a\in H$. So $x^{-1}=(\phi(x))^{-1}=\phi(x^{-1})\in\phi(H)$. But $x\in H$, so $x^{-1}\in H$, therefore $x^{-1}\in\phi(H)$.
|
||||
- If $x,y\in \phi(H)$, then $x,y=\phi(a),\phi(b)$ for some $a,b\in H$. So $xy=\phi(a)\phi(b)=\phi(ab)\in\phi(H)$ (by homomorphism). Since $ab\in H$, $xy\in\phi(H)$.
|
||||
|
||||
---
|
||||
|
||||
(4) If $K\leq G'$ then $\phi^{-1}(K)\leq G$, where $\phi^{-1}(K)=\{a\in G|\phi(a)\in K\}$.
|
||||
|
||||
- $e'\in K$ implies that $e=\phi^{-1}(e')\in\phi^{-1}(K)$.
|
||||
- If $x\in \phi^{-1}(K)$, then $x=\phi(a)$ for some $a\in G$. So $x^{-1}=(\phi(x))^{-1}=\phi(x^{-1})\in\phi^{-1}(K)$. But $x\in G$, so $x^{-1}\in G$, therefore $x^{-1}\in\phi^{-1}(K)$.
|
||||
- If $x,y\in \phi^{-1}(K)$, then $x,y=\phi(a),\phi(b)$ for some $a,b\in G$. So $xy=\phi(a)\phi(b)=\phi(ab)\in\phi^{-1}(K)$ (by homomorphism). Since $ab\in G$, $xy\in\phi^{-1}(K)$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition for kernel and image of a group homomorphism
|
||||
|
||||
Let $G,G'$ be groups and $\phi:G\to G'$ be a group homomorphism.
|
||||
|
||||
$\operatorname{ker}(\phi)=\{a\in G|\phi(a)=e'\}=\phi^{-1}(\{e'\})$ is called the kernel of $\phi$.
|
||||
|
||||
Facts:
|
||||
|
||||
- $\operatorname{ker}(\phi)$ is a subgroup of $G$. (proof by previous corollary (4))
|
||||
- $\phi$ is onto if and only if $\operatorname{ker}(\phi)=\{e\}$ (the trivial subgroup of $G$). (proof forward, by definition of one-to-one; backward, if $\phi(a)=\phi(b)$, then $\phi(a)\phi(b)^{-1}=e'$, so $\phi(a)\phi(b^{-1})=e'$, so $ab^{-1}=e$, so $a,b=e$, so $a=b$)
|
||||
@@ -9,4 +9,11 @@ export default {
|
||||
Math4302_L4: "Modern Algebra (Lecture 4)",
|
||||
Math4302_L5: "Modern Algebra (Lecture 5)",
|
||||
Math4302_L6: "Modern Algebra (Lecture 6)",
|
||||
Math4302_L7: "Modern Algebra (Lecture 7)",
|
||||
Math4302_L8: "Modern Algebra (Lecture 8)",
|
||||
Math4302_L9: "Modern Algebra (Lecture 9)",
|
||||
Math4302_L10: "Modern Algebra (Lecture 10)",
|
||||
Math4302_L11: "Modern Algebra (Lecture 11)",
|
||||
Math4302_L12: "Modern Algebra (Lecture 12)",
|
||||
Math4302_L13: "Modern Algebra (Lecture 13)",
|
||||
}
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
# Welcome to NoteNextra
|
||||
|
||||
> [!WARNING]
|
||||
><!-- > This site use [Algolia Search](https://www.algolia.com/) to search the content. However, due to some unknown reasons, when the index page is loaded, the search bar is calling default PageFind package from Nextra. **If you find the search bar is not working**, please try to redirect to another page and then back to the index page or search in another page. -->
|
||||
> This site use [Algolia Search](https://www.algolia.com/) to search the content. Index updated on weekly basis, the search result may be delayed. For latest search, please use github document search if possible.
|
||||
>
|
||||
> This site use SSG to generate the static pages. And cache is stored to your browser, this may not reveal the latest updates. **If you find some notes are not shown on sidebar but the class already ends more than 24 hours**, please try to access the page directly via the URL, or force reload the cache (for example, change the URL to `.../Math4201/Math4201_L{number}` to access the note of the lecture `Math4201_L{number}` and then refresh the page).
|
||||
|
||||
@@ -13,7 +13,7 @@ The primary audience of this project is for those challenge takers who are takin
|
||||
|
||||
So here it is. A lite server for you to read my notes.
|
||||
|
||||
**Remember, I take notes don't means that I like them and paying attention to the lecture.**
|
||||
**Remember, I take notes don't means that I like them and paying attention to the lectures.**
|
||||
|
||||
<p style="color: red; font-weight: bold">It's because I'm too easy to fall asleep if I stop doing something on my hand when my mind is wandering.</p>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user