Compare commits
15 Commits
e69362ce3c
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
571efa1bad | ||
|
|
6d5c80d257 | ||
|
|
0e28ba6261 | ||
|
|
c4888b796c | ||
|
|
a7ef223f67 | ||
|
|
005cd7dbd6 | ||
|
|
ef9059d27c | ||
|
|
bdf0ff9f06 | ||
|
|
669e1c889a | ||
|
|
b6b80f619a | ||
|
|
2529a251e7 | ||
|
|
5b103812b4 | ||
|
|
16f09e5723 | ||
|
|
83ada2df2a | ||
|
|
8f2e613b36 |
175
content/CSE4303/CSE4303_L10.md
Normal file
175
content/CSE4303/CSE4303_L10.md
Normal file
@@ -0,0 +1,175 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 10)
|
||||
|
||||
## MACs
|
||||
|
||||
### MACs from Hash Functions
|
||||
|
||||
Construction:
|
||||
|
||||
$S_{big}(k, m) = S(k, H(m))$
|
||||
$V_{big}(k, m, t) = V(k, H(m), t)$
|
||||
|
||||
If:
|
||||
- $S$ is secure MAC for short messages
|
||||
- $H$ is collision resistant
|
||||
|
||||
Then $S_{big}$ is secure MAC.
|
||||
|
||||
If collision exists:
|
||||
If $H(m_0) = H(m_1)$,
|
||||
query tag for $m_0$,
|
||||
forge $(m_1, t)$.
|
||||
|
||||
### HMAC
|
||||
|
||||
$HMAC(k, m) = H((k \oplus opad) \| H((k \oplus ipad) \| m))$
|
||||
|
||||
Used in:
|
||||
- TLS
|
||||
- IPsec
|
||||
- SSH
|
||||
|
||||
Properties:
|
||||
- Built from hash function (for example SHA-256)
|
||||
- Provably secure under PRF assumptions
|
||||
|
||||
### Timing Attacks on MAC Verification
|
||||
|
||||
Problem:
|
||||
Byte-by-byte comparison leaks timing information.
|
||||
|
||||
Attack:
|
||||
1. Send random tag.
|
||||
2. Guess first byte.
|
||||
3. Detect timing increase.
|
||||
4. Repeat per byte.
|
||||
|
||||
Defense 1:
|
||||
Constant-time comparison loop.
|
||||
|
||||
Defense 2:
|
||||
Double-HMAC comparison:
|
||||
Compare $HMAC(k, mac)$ with $HMAC(k, sig)$.
|
||||
|
||||
### Authenticated Encryption (AE)
|
||||
|
||||
AE provides:
|
||||
1. Confidentiality (CPA security)
|
||||
2. Ciphertext integrity
|
||||
|
||||
Cipher:
|
||||
|
||||
$E : K \times M \times N \to C$
|
||||
$D : K \times C \times N \to M \cup \{\bot\}$
|
||||
|
||||
Ciphertext integrity:
|
||||
Attacker cannot produce new valid ciphertext.
|
||||
|
||||
Theorem:
|
||||
AE implies CCA security.
|
||||
|
||||
Implication:
|
||||
If $D(k, c) \neq \bot$,
|
||||
receiver knows sender had key.
|
||||
|
||||
### Encrypt-then-MAC
|
||||
|
||||
Correct construction:
|
||||
|
||||
1. Compute $c = E(k_E, m)$
|
||||
2. Compute $tag = S(k_I, c)$
|
||||
3. Send $(c, tag)$
|
||||
|
||||
Encrypt-then-MAC is always secure ordering.
|
||||
|
||||
### AE Standards
|
||||
|
||||
- GCM: CTR mode encryption then polynomial MAC
|
||||
- CCM: CBC-MAC then CTR mode encryption
|
||||
- EAX: CTR mode encryption then CMAC
|
||||
|
||||
All support AEAD:
|
||||
Authenticated Encryption with Associated Data.
|
||||
Example: authenticate packet headers but do not encrypt them.
|
||||
|
||||
## Asymmetric Crypto Authentication: Digital Signatures
|
||||
|
||||
### Motivation
|
||||
|
||||
Goal:
|
||||
Bind document to author.
|
||||
|
||||
Digital problem:
|
||||
Anyone can copy a visible signature from one document to another.
|
||||
|
||||
Solution:
|
||||
Make signature depend on document contents.
|
||||
|
||||
### Digital Signature Scheme
|
||||
|
||||
Components:
|
||||
- Secret signing key $sk$
|
||||
- Public verification key $pk$
|
||||
- $Sign(sk, m) \to signature$
|
||||
- $Verify(pk, m, sig) \to$ accept or reject
|
||||
|
||||
Property:
|
||||
Anyone can verify.
|
||||
Only signer can produce valid signature.
|
||||
|
||||
### Signing a Certificate
|
||||
|
||||
Process:
|
||||
1. Compute hash of data.
|
||||
2. Sign hash with secret key.
|
||||
3. Attach signature to data.
|
||||
|
||||
Verification:
|
||||
1. Compute hash of received data.
|
||||
2. Verify signature using public key.
|
||||
3. Accept if hashes match.
|
||||
|
||||
### Software Signing
|
||||
|
||||
Software vendor:
|
||||
- Signs update with secret key.
|
||||
- Publishes update and signature.
|
||||
|
||||
Clients:
|
||||
- Use vendor public key.
|
||||
- Verify signature.
|
||||
- Install only if valid.
|
||||
|
||||
Allows distribution via untrusted hosting site.
|
||||
|
||||
## Review: Three Approaches to Data Integrity
|
||||
|
||||
1. Collision resistant hashing
|
||||
Requires secure read-only public space.
|
||||
No secret keys.
|
||||
Suitable for public verification.
|
||||
|
||||
2. MACs
|
||||
Requires shared secret key.
|
||||
Must compute new MAC per user.
|
||||
Suitable when one signs and one verifies.
|
||||
|
||||
3. Digital signatures
|
||||
Requires long-term secret key.
|
||||
Public verification.
|
||||
Suitable when one signs and many verify.
|
||||
|
||||
## Crypto Summary
|
||||
|
||||
Cryptographic goals:
|
||||
- Confidentiality
|
||||
- Data integrity
|
||||
- Authentication
|
||||
- Non-repudiation
|
||||
|
||||
Primitives:
|
||||
- Hash functions
|
||||
- MACs
|
||||
- Digital signatures
|
||||
- Symmetric ciphers
|
||||
- Public key ciphers
|
||||
5
content/CSE4303/CSE4303_L6.md
Normal file
5
content/CSE4303/CSE4303_L6.md
Normal file
@@ -0,0 +1,5 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 6)
|
||||
|
||||
Refer to this lecture notes
|
||||
|
||||
[CSE442T Lecture 3](https://notenextra.trance-0.com/CSE442T/CSE442T_L3/)
|
||||
144
content/CSE4303/CSE4303_L7.md
Normal file
144
content/CSE4303/CSE4303_L7.md
Normal file
@@ -0,0 +1,144 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 7)
|
||||
|
||||
## Cryptography in Symmetric Systems
|
||||
|
||||
### Symmetric systems
|
||||
|
||||
Symmetric (shared-key) encryption
|
||||
|
||||
- Classical techniques
|
||||
- Computer-aided techniques
|
||||
- Formal reasoning
|
||||
- Realizations:
|
||||
- Stream ciphers
|
||||
- Block ciphers
|
||||
|
||||
## Stream ciphers
|
||||
|
||||
1. Operate on PT one bit at a time (usually), as a bit "stream"
|
||||
2. Generate arbitrarily long keystream on demand
|
||||
|
||||
### Keystream
|
||||
|
||||
Keystream $G(k)$ generated from key $k$.
|
||||
|
||||
Encryption:
|
||||
$$
|
||||
E(k,m) = m \oplus G(k)
|
||||
$$
|
||||
|
||||
Decryption:
|
||||
$$
|
||||
D(k,c) = c \oplus G(k)
|
||||
$$
|
||||
|
||||
### Security abstraction
|
||||
|
||||
1. XOR transfers randomness of keystream to randomness of CT regardless of PT’s content
|
||||
2. Security depends on $G$ being "practically" indistinguishable from random string and "practically" unpredictable
|
||||
3. Idea: shouldn’t be able to predict next bit of generator given all bits seen so far
|
||||
|
||||
### Keystream $G(k)$
|
||||
|
||||
- Idea: shouldn’t be able to predict next bit of generator given all bits seen so far
|
||||
- Strategies and challenges: many!
|
||||
|
||||
#### Idea that doesn’t quite work: Linear Feedback Shift Register (LFSR)
|
||||
|
||||
- Choice of feedback: by algebra
|
||||
- Pro: fast, statistically close to random
|
||||
- Problem: susceptible to cryptanalysis (because linear)
|
||||
|
||||
#### LFSR-based modifications
|
||||
|
||||
- Use non-linear combo of multiple LFSRs
|
||||
- Use controlled clocking (e.g. only cycle the LFSR when another LFSR outputs a 1)
|
||||
- Etc.
|
||||
|
||||
#### Others
|
||||
|
||||
- Modular arithmetic-based constructions
|
||||
- Other algebraic constructions
|
||||
|
||||
### Hazards
|
||||
|
||||
1. Weak PRG
|
||||
2. Key re-use
|
||||
3. Predictable effect of modifying CT on decrypted PT
|
||||
|
||||
#### Weak PRG
|
||||
|
||||
- Makes semantic security impossible
|
||||
|
||||
#### Key re-use
|
||||
|
||||
Suppose:
|
||||
$$
|
||||
c_1 = m_1 \oplus G(k)
|
||||
$$
|
||||
and
|
||||
$$
|
||||
c_2 = m_2 \oplus G(k)
|
||||
$$
|
||||
|
||||
Then:
|
||||
$$
|
||||
c_1 \oplus c_2 = m_1 \oplus m_2
|
||||
$$
|
||||
|
||||
This may be enough to recover $m_1$ or $m_2$ using natural language properties.
|
||||
|
||||
##### IV (Initialization Vector)
|
||||
|
||||
Used to avoid key re-use:
|
||||
|
||||
- IV incremented per frame
|
||||
- But repeats after $2^{24}$ frames
|
||||
- Sometimes resets to 0
|
||||
- Enough to recover key within minutes
|
||||
|
||||
Note:
|
||||
|
||||
- Happens if keystream period is too short
|
||||
- Real-world example: WEP attack (802.11b)
|
||||
|
||||
#### Predictable modification of ciphertext
|
||||
|
||||
If attacker modifies ciphertext by XORing $p$:
|
||||
|
||||
Ciphertext becomes:
|
||||
$$
|
||||
(m \oplus k) \oplus p
|
||||
$$
|
||||
|
||||
Decryption yields:
|
||||
$$
|
||||
m \oplus p
|
||||
$$
|
||||
|
||||
- Affects integrity
|
||||
- Not CCA-secure for integrity
|
||||
|
||||
### Summary: Stream ciphers
|
||||
|
||||
Pros
|
||||
|
||||
- Fast
|
||||
- Memory-efficient
|
||||
- No minimum PT size
|
||||
|
||||
Cons
|
||||
|
||||
- Require good PRG
|
||||
- Can never re-use key
|
||||
- No integrity mechanism
|
||||
|
||||
Note
|
||||
|
||||
- Integrity mechanisms exist for other symmetric ciphers (block ciphers)
|
||||
- "Authenticated encryption"
|
||||
|
||||
Examples / Uses
|
||||
|
||||
- RC4: legacy stream cipher (e.g. WEP)
|
||||
- ChaCha / Salsa: Android cell phone encryption (Adiantum)
|
||||
320
content/CSE4303/CSE4303_L8.md
Normal file
320
content/CSE4303/CSE4303_L8.md
Normal file
@@ -0,0 +1,320 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 8)
|
||||
|
||||
## Block ciphers
|
||||
|
||||
1. Operate on PT one block at a time
|
||||
2. Use same key for multiple blocks (with caveats)
|
||||
3. Chaining modes intertwine successive blocks of CT (or not)
|
||||
|
||||
## Security abstraction
|
||||
|
||||
View cipher as a Pseudo-Random Permutation (PRP)
|
||||
|
||||
### Background: Pseudo-Random Function (PRF)
|
||||
|
||||
Defined over $(K,X,Y)$:
|
||||
$$
|
||||
F : K \times X \to Y
|
||||
$$
|
||||
|
||||
Such that there exists an efficient algorithm to evaluate $F(k,x)$.
|
||||
|
||||
Let:
|
||||
|
||||
- $\text{Funs}[X,Y]$ = set of all functions from $X$ to $Y$
|
||||
- $S_F = \{ F(k,\cdot) \mid k \in K \}$
|
||||
|
||||
Intuition:
|
||||
|
||||
A PRF is secure if a random function in $\text{Funs}[X,Y]$ is indistinguishable from a random function in $S_F$.
|
||||
|
||||
Adversarial game:
|
||||
|
||||
- Challenger samples $k \leftarrow K$
|
||||
- Or samples $f \leftarrow \text{Funs}[X,Y]$
|
||||
- Adversary queries oracle with $x \in X$
|
||||
- Receives either $F(k,x)$ or $f(x)$
|
||||
- Must distinguish
|
||||
|
||||
Goal: adversary’s advantage negligible
|
||||
|
||||
## PRP Definition
|
||||
|
||||
Defined over $(K,X)$:
|
||||
$$
|
||||
E : K \times X \to X
|
||||
$$
|
||||
|
||||
Such that:
|
||||
|
||||
1. Efficient deterministic algorithm to evaluate $E(k,x)$
|
||||
2. $E(k,\cdot)$ is one-to-one
|
||||
3. Efficient inversion algorithm $D(k,y)$ exists
|
||||
|
||||
i.e., a PRF that is an invertible one-to-one mapping from message space to message space
|
||||
|
||||
## Secure PRP
|
||||
|
||||
Let $\text{Perms}[X]$ be all permutations on $X$.
|
||||
|
||||
Intuition:
|
||||
|
||||
A PRP is secure if a random permutation in $\text{Perms}[X]$ is indistinguishable from a random element of:
|
||||
$$
|
||||
S_E = \{ E(k,\cdot) \mid k \in K \}
|
||||
$$
|
||||
|
||||
Adversarial game:
|
||||
|
||||
- Challenger samples $k \leftarrow K$
|
||||
- Or $\pi \leftarrow \text{Perms}[X]$
|
||||
- Adversary queries $x \in X$
|
||||
- Receives either $E(k,x)$ or $\pi(x)$
|
||||
- Must distinguish
|
||||
|
||||
Goal: negligible advantage
|
||||
|
||||
## Block cipher constructions
|
||||
|
||||
### Feistel network
|
||||
|
||||
Given:
|
||||
$$
|
||||
f_1, \dots, f_d : \{0,1\}^n \to \{0,1\}^n
|
||||
$$
|
||||
|
||||
Build invertible function:
|
||||
$$
|
||||
F : \{0,1\}^{2n} \to \{0,1\}^{2n}
|
||||
$$
|
||||
|
||||
Let input be split into $(L_0, R_0)$.
|
||||
|
||||
Round $i$:
|
||||
$$
|
||||
L_i = R_{i-1}
|
||||
$$
|
||||
$$
|
||||
R_i = L_{i-1} \oplus f_i(R_{i-1})
|
||||
$$
|
||||
|
||||
#### Invertibility
|
||||
|
||||
$$
|
||||
R_{i-1} = L_i
|
||||
$$
|
||||
$$
|
||||
L_{i-1} = R_i \oplus f_i(L_i)
|
||||
$$
|
||||
|
||||
Thus Feistel is invertible regardless of whether $f_i$ is invertible.
|
||||
|
||||
### Luby–Rackoff Theorem (1985)
|
||||
|
||||
If $f$ is a secure PRF, then 3-round Feistel is a secure PRP.
|
||||
|
||||
### DES (Data Encryption Standard) — 1976
|
||||
|
||||
- 16-round Feistel network
|
||||
- 64-bit block size
|
||||
- 56-bit key
|
||||
- Round functions:
|
||||
$$
|
||||
f_i(x) = F(k_i, x)
|
||||
$$
|
||||
|
||||
Round function uses:
|
||||
|
||||
- S-box (substitution box) — non-linear
|
||||
- P-box (permutation box)
|
||||
|
||||
To invert: use keys in reverse order.
|
||||
|
||||
Problem: 56-bit keyspace too small today (brute-force feasible).
|
||||
|
||||
### Substitution–Permutation Network (SPN)
|
||||
|
||||
Rounds of:
|
||||
|
||||
- Substitution (S-box layer)
|
||||
- Permutation (P-layer)
|
||||
- XOR with round key
|
||||
|
||||
All layers invertible.
|
||||
|
||||
### AES (Advanced Encryption Standard) — 2000
|
||||
|
||||
- 10 substitution-permutation rounds (128-bit key version)
|
||||
- 128-bit block size
|
||||
|
||||
Each round includes:
|
||||
|
||||
- ByteSub (1-byte S-box)
|
||||
- ShiftRows
|
||||
- MixColumns
|
||||
- AddRoundKey
|
||||
|
||||
Key sizes:
|
||||
|
||||
- 128-bit
|
||||
- 192-bit
|
||||
- 256-bit
|
||||
|
||||
Currently de facto standard symmetric-key cipher (e.g. TLS/SSL).
|
||||
|
||||
## Block cipher modes
|
||||
|
||||
### Challenge
|
||||
|
||||
Encrypt PTs longer than one block using same key while maintaining security.
|
||||
|
||||
### ECB (Electronic Codebook)
|
||||
|
||||
Encrypt blocks independently:
|
||||
$$
|
||||
c_i = E(k, m_i)
|
||||
$$
|
||||
|
||||
Problem:
|
||||
|
||||
If $m_1 = m_2$, then:
|
||||
$$
|
||||
c_1 = c_2
|
||||
$$
|
||||
|
||||
Not semantically secure.
|
||||
|
||||
#### Formal non-security argument
|
||||
|
||||
Two-block challenge:
|
||||
|
||||
- Adversary submits:
|
||||
- $m_0 = \text{"Hello World"}$
|
||||
- $m_1 = \text{"Hello Hello"}$
|
||||
- If $c_1 = c_2$, output 0; else 1
|
||||
|
||||
Advantage = 1
|
||||
|
||||
### CPA model (Chosen Plaintext Attack)
|
||||
|
||||
Attacker:
|
||||
|
||||
- Sees many PT/CT pairs under same key
|
||||
- Can submit arbitrary PTs
|
||||
|
||||
Definition:
|
||||
$$
|
||||
\text{Adv}_{CPA}[A,E] =
|
||||
\left|
|
||||
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
|
||||
\right|
|
||||
$$
|
||||
|
||||
Must be negligible.
|
||||
|
||||
ECB fails CPA security.
|
||||
|
||||
### Moral
|
||||
|
||||
If same secret key is used multiple times, given same PT twice, encryption must produce different CT outputs.
|
||||
|
||||
## Secure block modes
|
||||
|
||||
### Idea
|
||||
|
||||
Augment key with:
|
||||
|
||||
- Per-block nonce
|
||||
- Or chaining data from prior blocks
|
||||
|
||||
### CBC (Cipher Block Chaining)
|
||||
|
||||
$$
|
||||
c_1 = E(k, m_1 \oplus IV)
|
||||
$$
|
||||
$$
|
||||
c_i = E(k, m_i \oplus c_{i-1})
|
||||
$$
|
||||
|
||||
IV must be random/unpredictable.
|
||||
|
||||
### CFB (Cipher Feedback)
|
||||
|
||||
Uses previous ciphertext as input feedback into block cipher.
|
||||
|
||||
### OFB (Output Feedback)
|
||||
|
||||
$$
|
||||
s_i = E(k, s_{i-1})
|
||||
$$
|
||||
$$
|
||||
c_i = m_i \oplus s_i
|
||||
$$
|
||||
|
||||
Can pre-compute keystream.
|
||||
|
||||
Acts like stream cipher.
|
||||
|
||||
### CTR (Counter Mode)
|
||||
|
||||
$$
|
||||
c_i = m_i \oplus E(k, \text{nonce} \| \text{counter}_i)
|
||||
$$
|
||||
|
||||
Encryption and decryption parallelizable.
|
||||
|
||||
Nonce must be unique.
|
||||
|
||||
### GCM (Galois Counter Mode)
|
||||
|
||||
- Most popular ("AES-GCM")
|
||||
- Provides authenticated encryption
|
||||
- Confidentiality + integrity
|
||||
|
||||
## Nonce-based semantic security
|
||||
|
||||
Encryption:
|
||||
$$
|
||||
c = E(k, m, n)
|
||||
$$
|
||||
|
||||
Adversarial experiment:
|
||||
|
||||
- Challenger picks $k$
|
||||
- Adversary submits $(m_{i,0}, m_{i,1})$ and nonce $n_i$
|
||||
- Receives $c_i = E(k, m_{i,b}, n_i)$
|
||||
- Nonces must be distinct
|
||||
|
||||
Definition:
|
||||
$$
|
||||
\text{Adv}_{nCPA}[A,E] =
|
||||
\left|
|
||||
\Pr[\text{EXP}(0)=1] - \Pr[\text{EXP}(1)=1]
|
||||
\right|
|
||||
$$
|
||||
|
||||
In practice:
|
||||
|
||||
- CBC: IV must be random
|
||||
- CTR/GCM: nonce must be unique but not necessarily random
|
||||
|
||||
## Symmetric Encryption Summary
|
||||
|
||||
### Stream Ciphers
|
||||
|
||||
- Rely on secure PRG
|
||||
- No key re-use
|
||||
- Fast
|
||||
- Low memory
|
||||
- Less robust
|
||||
- No built-in integrity
|
||||
|
||||
### Block Ciphers
|
||||
|
||||
- Rely on secure PRP
|
||||
- Allow key re-use across blocks (secure mode required)
|
||||
- Provide authenticated encryption in some modes (e.g. GCM)
|
||||
- Slower
|
||||
- Higher memory
|
||||
- More robust
|
||||
- Used in most practical secure systems (e.g. TLS)
|
||||
254
content/CSE4303/CSE4303_L9.md
Normal file
254
content/CSE4303/CSE4303_L9.md
Normal file
@@ -0,0 +1,254 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 9)
|
||||
|
||||
## Cryptographic Hash Functions
|
||||
|
||||
### What is a Hash Function
|
||||
|
||||
A hash function maps a variable-length input to a fixed-length output.
|
||||
|
||||
$h : X \to Y$
|
||||
|
||||
Typical examples:
|
||||
- Java hashCode(): input is an Object, output is a 4-byte integer.
|
||||
- String polynomial hash example:
|
||||
$h("cs433s") = 'c' \cdot 31^6 + 's' \cdot 31^5 + \dots + 's'$
|
||||
|
||||
Key property:
|
||||
- Domain $|X|$ is much larger than range $|Y|$.
|
||||
- Collisions are unavoidable in principle since $|X| > |Y|$.
|
||||
|
||||
Main uses:
|
||||
- Compact numerical representation
|
||||
- Hash tables (Set, Map, dictionaries)
|
||||
- Object comparison
|
||||
- Integrity checking (fingerprint)
|
||||
|
||||
### Security Properties
|
||||
|
||||
Let $h : X \to Y$.
|
||||
|
||||
1. Preimage Resistance (One-way)
|
||||
Given $y \in Y$, it is computationally infeasible to find $x \in X$ such that
|
||||
$h(x) = y$.
|
||||
|
||||
2. Second Preimage Resistance (Weak collision resistance)
|
||||
Given a specific $x \in X$, it is computationally infeasible to find $x' \neq x$ such that
|
||||
$h(x') = h(x)$.
|
||||
|
||||
3. Collision Resistance (Strong collision resistance)
|
||||
It is computationally infeasible to find any two distinct values $x, x' \in X$ such that
|
||||
$h(x) = h(x')$.
|
||||
|
||||
Adversarial definition:
|
||||
|
||||
Let $H : M \to T$ where $|M|$ is much larger than $|T|$.
|
||||
$H$ is collision resistant if for all efficient algorithms $A$:
|
||||
|
||||
$Adv_{CR}[A, H] = Pr[A$ outputs a collision for $H]$
|
||||
|
||||
is negligible.
|
||||
|
||||
### Generic Collision Attack (Birthday Attack)
|
||||
|
||||
Let $H : M \to \{0,1\}^n$.
|
||||
|
||||
Generic algorithm to find a collision in time on the order of $2^{n/2}$:
|
||||
|
||||
1. Choose $2^{n/2}$ random messages $m_1, \dots, m_{2^{n/2}}$.
|
||||
2. Compute $t_i = H(m_i)$.
|
||||
3. Look for $t_i = t_j$.
|
||||
|
||||
Birthday phenomenon:
|
||||
|
||||
If the output space size is $B$,
|
||||
high collision probability greater than $50\%$ occurs with about $\sqrt{B}$ samples.
|
||||
|
||||
Thus:
|
||||
- 128-bit hash gives about $2^{64}$ collision attack
|
||||
- 256-bit hash gives about $2^{128}$ collision attack
|
||||
|
||||
### Practical Hash Functions
|
||||
|
||||
From performance and security table (AMD Opteron 2.2 GHz):
|
||||
|
||||
- MD5: 128 bits, completely broken since 2004
|
||||
- SHA-1: 160 bits, practical collision attack demonstrated
|
||||
- SHA-256: 256 bits
|
||||
- SHA-512: 512 bits
|
||||
- Whirlpool: 512 bits
|
||||
|
||||
SHA-1 collision example: SHAttered attack (Google and CWI).
|
||||
Two different PDF files were produced with identical SHA-1 hash.
|
||||
|
||||
## Construction of Cryptographic Hash Functions
|
||||
|
||||
### Merkle-Damgard Construction
|
||||
|
||||
Given compression function:
|
||||
|
||||
$h : T \times X \to T$
|
||||
|
||||
We build:
|
||||
|
||||
$H : X^{\le L} \to T$
|
||||
|
||||
Process:
|
||||
- Split message into blocks $m[0], m[1], \dots, m[L]$.
|
||||
- Use fixed initialization vector $IV$.
|
||||
- Iterate chaining:
|
||||
|
||||
$H_0 = IV$
|
||||
$H_1 = h(H_0, m[0])$
|
||||
$H_2 = h(H_1, m[1])$
|
||||
$\dots$
|
||||
$H_L = h(H_{L-1}, m[L])$
|
||||
|
||||
- Apply padding:
|
||||
append $1000\ldots0$ concatenated with message length (64 bits).
|
||||
If no space remains, add another block.
|
||||
|
||||
Theorem:
|
||||
If compression function $h$ is collision resistant,
|
||||
then $H$ is collision resistant.
|
||||
|
||||
### Davies-Meyer Compression from Block Cipher
|
||||
|
||||
Given block cipher:
|
||||
|
||||
$E : K \times \{0,1\}^n \to \{0,1\}^n$
|
||||
|
||||
Define compression function:
|
||||
|
||||
$h(H, m) = E(m, H) \oplus H$
|
||||
|
||||
If $E$ behaves like an ideal cipher,
|
||||
finding a collision in $h$ takes about $2^{n/2}$ evaluations.
|
||||
|
||||
This is optimal for $n$-bit output.
|
||||
|
||||
### Example: SHA-256
|
||||
|
||||
Built using:
|
||||
- Merkle-Damgard construction
|
||||
- Davies-Meyer style compression
|
||||
- Block cipher-like core: SHACAL-2
|
||||
|
||||
Structure:
|
||||
- 512-bit message block
|
||||
- 256-bit chaining value
|
||||
- 256-bit output
|
||||
|
||||
## Applications for Integrity and Authentication
|
||||
|
||||
### Standalone Usage: Message Integrity
|
||||
|
||||
#### Application 1: Delayed Knowledge Verification
|
||||
|
||||
Idea:
|
||||
Publish $h(secret)$ first.
|
||||
Later reveal secret.
|
||||
Anyone can recompute hash and verify.
|
||||
|
||||
Justification:
|
||||
Preimage resistance ensures secret is hidden until revealed.
|
||||
|
||||
Example:
|
||||
Stock market prediction commitment.
|
||||
|
||||
<details>
|
||||
<summary>Example for delayed knowledge verification</summary>
|
||||
|
||||
1. Publish $H("Stock will rise on May 1")$.
|
||||
2. On May 1, reveal the prediction string.
|
||||
3. Anyone computes hash and checks equality.
|
||||
|
||||
</details>
|
||||
|
||||
#### Application 2: Password Storage
|
||||
|
||||
Model:
|
||||
System must verify password but not store plaintext.
|
||||
|
||||
Solution:
|
||||
Store hash of password.
|
||||
During login:
|
||||
- Hash input
|
||||
- Compare with stored value
|
||||
|
||||
Example:
|
||||
Linux stores hashed passwords in the /etc/shadow file.
|
||||
Includes:
|
||||
- Salt
|
||||
- Password hash
|
||||
- Metadata
|
||||
|
||||
Security relies on:
|
||||
- One-way property
|
||||
- Salting to prevent precomputed attacks
|
||||
|
||||
#### Application 3: Trusted Timestamping and Blockchains
|
||||
|
||||
Goal:
|
||||
Prove document existed before a given date.
|
||||
|
||||
Methods:
|
||||
- Publish document hash in newspaper.
|
||||
- Time Stamping Authority signs hash.
|
||||
- Publish hash in blockchain block.
|
||||
|
||||
Blockchain relies on:
|
||||
- One-way hash functions
|
||||
- Linking blocks via hash pointers
|
||||
|
||||
#### Application 4: Software Integrity with Secure Read-Only Space
|
||||
|
||||
Context:
|
||||
Trusted read-only public space (for example official website).
|
||||
|
||||
Process:
|
||||
1. Publisher computes $H(F_1), H(F_2), \dots, H(F_n)$.
|
||||
2. Publish hashes publicly.
|
||||
3. User downloads file $F_i$ and verifies hash.
|
||||
|
||||
If $H$ is collision resistant:
|
||||
Attacker cannot modify file without detection.
|
||||
|
||||
No encryption required.
|
||||
Public verifiability works if read-only space is trusted.
|
||||
|
||||
## Symmetric Crypto Authentication: MACs and AE
|
||||
|
||||
This section can also be found here [CSE442T Introduction to Cryptography (Lecture 18)](https://notenextra.trance-0.com/CSE442T/CSE442T_L18/#chapter-5-authentication)
|
||||
|
||||
### Message Authentication Codes (MACs)
|
||||
|
||||
Definition:
|
||||
MAC $I = (S, V)$ over $(K, M, T)$
|
||||
|
||||
- $S(k, m) \to t$
|
||||
- $V(k, m, t) \to$ yes or no
|
||||
|
||||
Security model:
|
||||
Attacker can query $S(k, m_i)$.
|
||||
Goal: produce new $(m, t)$ not previously seen such that $V$ accepts.
|
||||
|
||||
$Adv_{MAC}[A, I]$ must be negligible.
|
||||
|
||||
### MAC from PRF
|
||||
|
||||
Given PRF:
|
||||
|
||||
$F : K \times X \to Y$
|
||||
|
||||
Define MAC:
|
||||
|
||||
$S(k, m) = F(k, m)$
|
||||
$V(k, m, t)$ accepts if $t = F(k, m)$
|
||||
|
||||
Theorem:
|
||||
If $F$ is secure PRF and $|Y|$ is large,
|
||||
then derived MAC is secure.
|
||||
|
||||
Condition:
|
||||
$1 / |Y|$ must be negligible.
|
||||
Example: $|Y| = 2^{80}$.
|
||||
@@ -8,4 +8,8 @@ export default {
|
||||
CSE4303_L3: "Introduction to Computer Security (Lecture 3)",
|
||||
CSE4303_L4: "Introduction to Computer Security (Lecture 4)",
|
||||
CSE4303_L5: "Introduction to Computer Security (Lecture 5)",
|
||||
CSE4303_L6: "Introduction to Computer Security (Lecture 6)",
|
||||
CSE4303_L7: "Introduction to Computer Security (Lecture 7)",
|
||||
CSE4303_L8: "Introduction to Computer Security (Lecture 8)",
|
||||
CSE4303_L9: "Introduction to Computer Security (Lecture 9)",
|
||||
}
|
||||
|
||||
@@ -21,7 +21,7 @@ If $\mathbb{R}_l$ is second countable, then for any real number $x$, there is an
|
||||
|
||||
Any such open sets is of the form $[x,x+\epsilon)\cap A$ with $\epsilon>0$ and any element of $A$ being larger than $\min(U_x)=x$.
|
||||
|
||||
In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. SO there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathbb{B}$ is uncountable.
|
||||
In summary, for any $x\in \mathbb{R}$, there is an element $U_x\in \mathcal{B}$ with $(U_x)=x$. In particular, if $x\neq y$, then $U_x\neq U_y$. So there is an injective map $f:\mathbb{R}\rightarrow \mathcal{B}$ sending $x$ to $U_x$. This implies that $\mathcal{B}$ is uncountable.
|
||||
|
||||
</details>
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@ $$
|
||||
Let $(X,\mathcal{T})$ be a topological space. Let $\mathcal{C}\subseteq \mathcal{T}$ be a collection of subsets of $X$ satisfying the following property:
|
||||
|
||||
$$
|
||||
\forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } U\subseteq C
|
||||
\forall U\in \mathcal{T}, \exists C\in \mathcal{C} \text{ such that } C\subseteq U
|
||||
$$
|
||||
|
||||
Then $\mathcal{C}$ is a basis and the topology generated by $\mathcal{C}$ is $\mathcal{T}$.
|
||||
|
||||
100
content/Math4202/Math4202_L10.md
Normal file
100
content/Math4202/Math4202_L10.md
Normal file
@@ -0,0 +1,100 @@
|
||||
# Math4202 Topology II (Lecture 10)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Path homotopy
|
||||
|
||||
|
||||
#### Theorem for properties of product of paths
|
||||
|
||||
1. If $f\simeq_p f_1, g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$. (Product is well-defined)
|
||||
2. $([f]*[g])*[h]=[f]*([g]*[h])$. (Associativity)
|
||||
3. Let $e_{x_0}$ be the constant path from $x_0$ to $x_0$, $e_{x_1}$ be the constant path from $x_1$ to $x_1$. Suppose $f$ is a path from $x_0$ to $x_1$.
|
||||
$$
|
||||
[e_{x_0}]*[f]=[f],\quad [f]*[e_{x_1}]=[f]
|
||||
$$
|
||||
(Right and left identity)
|
||||
4. Given $f$ in $X$ a path from $x_0$ to $x_1$, we define $\bar{f}$ to be the path from $x_1$ to $x_0$ where $\bar{f}(t)=f(1-t)$.
|
||||
$$
|
||||
f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}
|
||||
$$
|
||||
$$
|
||||
[f]*[\bar{f}]=[e_{x_0}],\quad [\bar{f}]*[f]=[e_{x_1}]
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
(1) If $f\simeq_p f_1$, $g\simeq_p g_1$, then $f*g\simeq_p f_1*g_1$.
|
||||
|
||||
Let $F$ be homotopy between $f$ and $f_1$, $G$ be homotopy between $g$ and $g_1$.
|
||||
|
||||
We can define
|
||||
|
||||
$$
|
||||
F*G:[0,1]\times [0,1]\to X,\quad F*G(s,t)=\left(F(-,t)*G(-,t)\right)(s)=\begin{cases}
|
||||
F(2s,t) & 0\leq s\leq \frac{1}{2}\\
|
||||
G(2s-1,t) & \frac{1}{2}\leq s\leq 1
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
$F*G$ is a homotopy between $f*g$ and $f_1*g_1$.
|
||||
|
||||
We can check this by enumerating the cases from definition of homotopy.
|
||||
|
||||
---
|
||||
|
||||
(2) $([f]*[g])*[h]=[f]*([g]*[h])$.
|
||||
|
||||
For $f*(g*h)$, along the interval $[0,\frac{1}{2}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{2},\frac{3}{4}]$ we map $x_2\to x_3$, then along the interval $[\frac{3}{4},1]$ we map $x_3\to x_4$.
|
||||
|
||||
For $(f*g)*h$, along the interval $[0,\frac{1}{4}]$ we map $x_1\to x_2$, then along the interval $[\frac{1}{4},\frac{1}{2}]$ we map $x_2\to x_3$, then along the interval $[\frac{1}{2},1]$ we map $x_3\to x_4$.
|
||||
|
||||
We can construct the homotopy between $f*(g*h)$ and $(f*g)*h$ as follows.
|
||||
|
||||
Let $f((4-2t)s)$ for $F(s,t)$,
|
||||
|
||||
when $t=0$, $F(s,0)=f(4s)\in f*(g*h)$, when $t=1$, $F(s,1)=f(2s)\in (f*g)*h$.
|
||||
|
||||
....
|
||||
|
||||
_We make the linear maps between $f*(g*h)$ and $(f*g)*h$ continuous, then $f*(g*h)\simeq_p (f*g)*h$. With our homotopy constructed above_
|
||||
|
||||
---
|
||||
|
||||
(3) $e_{x_0}*f\simeq_p f\simeq_p f*e_{x_1}$.
|
||||
|
||||
We can construct the homotopy between $e_{x_0}*f$ and $f$ as follows.
|
||||
|
||||
$$
|
||||
H(s,t)=\begin{cases}
|
||||
x_0 & t\geq 2s\\
|
||||
f(2s-t) & t\leq 2s
|
||||
\end{cases}
|
||||
$$
|
||||
|
||||
or you may induct from $f(\frac{s-t/2}{1-t/2})$ if you like.
|
||||
|
||||
---
|
||||
|
||||
(4) $f*\bar{f}=e_{x_0},\quad \bar{f}*f=e_{x_1}$.
|
||||
|
||||
Note that we don't need to reach $x_1$ every time.
|
||||
|
||||
$f_t=f(ts)$ $s\in[0,\frac{1}{2}]$.
|
||||
|
||||
$\bar{f}_t=\bar{f}(1-ts)$ $s\in[\frac{1}{2},1]$.
|
||||
|
||||
</details>
|
||||
|
||||
> [!CAUTION]
|
||||
>
|
||||
> Homeomorphism does not implies homotopy automatically.
|
||||
|
||||
#### Definition for the fundamental group
|
||||
|
||||
The fundamental group of $X$ at $x$ is defined to be
|
||||
|
||||
$$
|
||||
(\Pi_1(X,x),*)
|
||||
$$
|
||||
132
content/Math4202/Math4202_L11.md
Normal file
132
content/Math4202/Math4202_L11.md
Normal file
@@ -0,0 +1,132 @@
|
||||
# Math4201 Topology II (Lecture 11)
|
||||
|
||||
## Algebraic topology
|
||||
|
||||
### Fundamental group
|
||||
|
||||
The $*$ operation has the following properties:
|
||||
|
||||
#### Properties for the path product operation
|
||||
|
||||
Let $[f],[g]\in \Pi_1(X)$, for $[f]\in \Pi_1(X)$, let $s:\Pi_1(X)\to X, [f]\mapsto f(0)$ and $t:\Pi_1(X)\to X, [f]\mapsto f(1)$.
|
||||
|
||||
Note that $t([f])=s([g])$, $[f]*[g]=[f*g]\in \Pi_1(X)$.
|
||||
|
||||
This also satisfies the associativity. $([f]*[g])*[h]=[f]*([g]*[h])$.
|
||||
|
||||
We have left and right identity. $[f]*[e_{t(f)}]=[f], [e_{s(f)}]*[f]=[f]$.
|
||||
|
||||
We have inverse. $[f]*[\bar{x}]=[e_{s(f)}], [\bar{x}]*[f]=[e_{t(f)}]$
|
||||
|
||||
#### Definition for Groupoid
|
||||
|
||||
Let $f,g$ be paths where $g,f:[0,1]\to X$, and consider the function of all pathes in $G$, denoted as $\mathcal{G}$,
|
||||
|
||||
Set $t:\mathcal{G}\to X$ be the source map, for this case $t(f)=f(0)$, and $s:\mathcal{G}\to X$ be the target map, for this case $s(f)=f(1)$.
|
||||
|
||||
We define
|
||||
|
||||
$$
|
||||
\mathcal{G}^{(2)}=\{(f,g)\in \mathcal{G}\times \mathcal{G}|t(f)=s(g)\}
|
||||
$$
|
||||
|
||||
And we define the operation $*$ on $\mathcal{G}^{(2)}$ as the path product.
|
||||
|
||||
This satisfies the following properties:
|
||||
|
||||
- Associativity: $(f*g)*h=f*(g*h)$
|
||||
|
||||
Consider the function $\eta:X\to \mathcal{G}$, for this case $\eta(x)=e_{x}$.
|
||||
|
||||
- We have left and right identity: $\eta(t(f))*f=f, f*\eta(s(f))=f$
|
||||
|
||||
- Inverse: $\forall g\in \mathcal{G}, \exists g^{-1}\in \mathcal{G}, g*g^{-1}=\eta(s(g))$, $g^{-1}*g=\eta(t(g))$
|
||||
|
||||
#### Definition for loop
|
||||
|
||||
Let $x_0\in X$. A path starting and ending at $x_0$ is called a loop based at $x_0$.
|
||||
|
||||
#### Definition for the fundamental group
|
||||
|
||||
The fundamental group of $X$ at $x$ is defined to be
|
||||
|
||||
$$
|
||||
(\Pi_1(X,x),*)
|
||||
$$
|
||||
|
||||
where $*$ is the product operation, and $\Pi_1(X,x)$ is the set o homotopy classes of loops in $X$ based at $x$.
|
||||
|
||||
<details>
|
||||
<summary>Example of fundamental group</summary>
|
||||
|
||||
Consider $X=[0,1]$, with subspace topology from standard topology in $\mathbb{R}$.
|
||||
|
||||
$\Pi_1(X,0)=\{e\}$, (constant function at $0$) since we can build homotopy for all loops based at $0$ as follows $H(s,t)=(1-t)f(s)+t$.
|
||||
|
||||
And $\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
|
||||
|
||||
---
|
||||
|
||||
Let $X=\{1,2\}$ with discrete topology.
|
||||
|
||||
$\Pi_1(X,1)=\{e\}$, (constant function at $1$.)
|
||||
|
||||
$\Pi_1(X,2)=\{e\}$, (constant function at $2$.)
|
||||
|
||||
---
|
||||
|
||||
Let $X=S^1$ be the circle.
|
||||
|
||||
$\Pi_1(X,1)=\mathbb{Z}$ (related to winding numbers, prove next week).
|
||||
|
||||
</details>
|
||||
|
||||
A natural question is, will the fundamental group depends on the basepoint $x$?
|
||||
|
||||
#### Definition for $\hat{\alpha}$
|
||||
|
||||
Let $\alpha$ be a path in $X$ from $x_0$ to $x_1$. $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$. Define $\hat{\alpha}:\Pi_1(X,x_0)\to \Pi_1(X,x_1)$ as follows:
|
||||
|
||||
$$
|
||||
\hat{\alpha}(\beta)=[\bar{\alpha}]*[f]*[\alpha]
|
||||
$$
|
||||
|
||||
#### $\hat{\alpha}$ is a group homomorphism
|
||||
|
||||
$\hat{\alpha}$ is a group homomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f,g\in \Pi_1(X,x_0)$, then $\hat{\alpha}(f*g)=\hat{\alpha}(f)\hat{\alpha}(g)$
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\hat{\alpha}(f*g)&=[\bar{\alpha}]*[f]*[g]*[\alpha]\\
|
||||
&=[\bar{\alpha}]*[f]*[e_{x_0}]*[g]*[\alpha]\\
|
||||
&=[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]*[g]*[\alpha]\\
|
||||
&=([\bar{\alpha}]*[f]*[\alpha])*([\bar{\alpha}]*[g]*[\alpha])\\
|
||||
&=(\hat{\alpha}(f))*(\hat{\alpha}(g))
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
---
|
||||
|
||||
Next, we will show that $\hat{\alpha}\circ \hat{\bar{\alpha}}([f])=[f]$, and $\hat{\bar{\alpha}}\circ \hat{\alpha}([f])=[f]$.
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\hat{\alpha}\circ \hat{\bar{\alpha}}([f])&=\hat{\alpha}([\bar{\alpha}]*[f]*[\alpha])\\
|
||||
&=[\alpha]*[\bar{\alpha}]*[f]*[\alpha]*[\bar{\alpha}]\\
|
||||
&=[e_{x_0}]*[f]*[e_{x_1}]\\
|
||||
&=[f]
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
The other case is the same
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary of fundamental group
|
||||
|
||||
If $X$ is path-connected and $x_0,x_1\in X$, then $\Pi_1(X,x_0)$ is isomorphic to $\Pi_1(X,x_1)$.
|
||||
119
content/Math4202/Math4202_L12.md
Normal file
119
content/Math4202/Math4202_L12.md
Normal file
@@ -0,0 +1,119 @@
|
||||
# Math4201 Topology II (Lecture 12)
|
||||
|
||||
## Algebraic topology
|
||||
|
||||
### Fundamental group
|
||||
|
||||
Recall from last lecture, the $(\Pi_1(X,x_0),*)$ is a group, and for any two points $x_0,x_1\in X$, the group $(\Pi_1(X,x_0),*)$ is isomorphic to $(\Pi_1(X,x_1),*)$ if $x_0,x_1$ is path connected.
|
||||
|
||||
> [!TIP]
|
||||
>
|
||||
> How does the $\hat{\alpha}$ (isomorphism between $(\Pi_1(X,x_0),*)$ and $(\Pi_1(X,x_1),*)$) depend on the choice of $\alpha$ (path) we choose?
|
||||
|
||||
#### Definition of simply connected
|
||||
|
||||
A space $X$ is simply connected if
|
||||
|
||||
- $X$ is [path-connected](https://notenextra.trance-0.com/Math4201/Math4201_L23/#definition-of-path-connected-space) ($\forall x_0,x_1\in X$, there exists a continuous function $\alpha:[0,1]\to X$ such that $\alpha(0)=x_0$ and $\alpha(1)=x_1$)
|
||||
- $\Pi_1(X,x_0)$ is the trivial group for some $x_0\in X$
|
||||
|
||||
<details>
|
||||
<summary>Example of simply connected space</summary>
|
||||
|
||||
Intervals are simply connected.
|
||||
|
||||
---
|
||||
|
||||
Any star-shaped is simply connected.
|
||||
|
||||
---
|
||||
|
||||
$S^1$ is not simply connected, but $n\geq 2$, then $S^n$ is simply connected.
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for simply connected space
|
||||
|
||||
In a simply connected space $X$, and two paths having the same initial and final points are path homotopic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f,g$ be paths having the same initial and final points, then $f(0)=g(0)=x_0$ and $f(1)=g(1)=x_1$.
|
||||
|
||||
Therefore $[f]*[\bar{g}]\simeq_p [e_{x_0}]$ (by simply connected space assumption).
|
||||
|
||||
Then
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
[f]*[\bar{g}]&\simeq_p [e_{x_0}]\\
|
||||
([f]*[\bar{g}])*[g]&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]*([\bar{g}]*[g])&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]*[e_{x_1}]&\simeq_p [e_{x_0}]*[g]\\
|
||||
[f]&\simeq_p [g]
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition of group homomorphism induced by continuous map
|
||||
|
||||
Let $h:(X,x_0)\to (Y,y_0)$ be a continuous map, define $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ where $h(x_0)=y_0$. by $h_*([f])=[h\circ f]$.
|
||||
|
||||
$h_*$ is called the group homomorphism induced by $h$ relative to $x_0$.
|
||||
|
||||
<details>
|
||||
<summary>Check the homomorphism property</summary>
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
h_*([f]*[g])&=h_*([f*g])\\
|
||||
&=[h_*[f*g]]\\
|
||||
&=[h_*[f]*h_*[g]]\\
|
||||
&=[h_*[f]]*[h_*[g]]\\
|
||||
&=h_*([f])*h_*([g])
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Theorem composite of group homomorphism
|
||||
|
||||
If $h:(X,x_0)\to (Y,y_0)$ and $k:(Y,y_0)\to (Z,z_0)$ are continuous maps, then $k_* \circ h_*:\Pi_1(X,x_0)\to \Pi_1(Z,z_0)$ where $h_*:\Pi_1(X,x_0)\to \Pi_1(Y,y_0)$, $k_*:\Pi_1(Y,y_0)\to \Pi_1(Z,z_0)$,is a group homomorphism.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Let $f$ be a loop based at $x_0$.
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
k_*(h_*([f]))&=k_*([h\circ f])\\
|
||||
&=[k\circ h\circ f]\\
|
||||
&=[(k\circ h)\circ f]\\
|
||||
&=(k\circ h)_*([f])\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary of composite of group homomorphism
|
||||
|
||||
Let $\operatorname{id}:(X,x_0)\to (X,x_0)$ be the identity map. This induces $(\operatorname{id})_*:\Pi_1(X,x_0)\to \Pi_1(X,x_0)$.
|
||||
|
||||
If $h$ is a homeomorphism with the inverse $k$, with
|
||||
|
||||
$$
|
||||
k_*\circ h_*=(k\circ h)_*=(\operatorname{id})_*=I=(\operatorname{id})_*=(h\circ k)_*
|
||||
$$
|
||||
|
||||
This induced $h_*: \Pi_1(X,x_0)\to \Pi_1(Y,y_0)$ is an isomorphism.
|
||||
|
||||
#### Corollary for homotopy and group homomorphism
|
||||
|
||||
If $h,k:(X,x_0)\to (Y,y_0)$ are homotopic maps form $X$ to $Y$ such that the homotopy $H_t(x_0)=y_0,\forall t\in I$, then $h_*=k_*$.
|
||||
|
||||
$$
|
||||
h_*([f])=[h\circ f]\simeq_p[k\circ h]=k_*([f])
|
||||
$$
|
||||
59
content/Math4202/Math4202_L13.md
Normal file
59
content/Math4202/Math4202_L13.md
Normal file
@@ -0,0 +1,59 @@
|
||||
# Math4202 Topology II (Lecture 13)
|
||||
|
||||
## Algebraic Topology
|
||||
|
||||
### Covering space
|
||||
|
||||
#### Definition of partition into slice
|
||||
|
||||
Let $p:E\to B$ be a continuous surjective map. The open set $U\subseteq B$ is said to be evenly covered by $p$ if it's inverse image $p^{-1}(U)$ can be written as the union of **disjoint open sets** $V_\alpha$ in $E$. Such that for each $\alpha$, the restriction of $p$ to $V_\alpha$ is a homeomorphism of $V_\alpha$ onto $U$.
|
||||
|
||||
The collection of $\{V_\alpha\}$ is called a **partition** $p^{-1}(U)$ into slice.
|
||||
|
||||
_Stack of pancakes ($\{V_\alpha\}$) on plate $U$, each $V_\alpha$ is a pancake homeomorphic to $U$_
|
||||
|
||||
_Note that all the sets in the definition are open._
|
||||
|
||||
#### Definition of covering space
|
||||
|
||||
Let $p:E\to B$ be a continuous surjective map. If every point $b$ of $B$ has a neighborhood **evenly covered** by $p$, which means $p^{-1}(U)$ is partitioned into slice, then $p$ is called a covering map and $E$ is called a covering space.
|
||||
|
||||
<details>
|
||||
<summary>Examples of covering space</summary>
|
||||
|
||||
identity map is a covering map
|
||||
|
||||
---
|
||||
|
||||
Consider the $B\times \Gamma\to B$ with $\Gamma$ being the discrete topology with the projection map onto $B$.
|
||||
|
||||
This is a covering map.
|
||||
|
||||
---
|
||||
|
||||
Let $S^1=\{z\mid |z|=1\}$, then $p=z^n$ is a covering map to $S^1$.
|
||||
|
||||
Solving the inverse image for the $e^{i\theta}$ with $\epsilon$ interval, we can get $n$ slices for each neighborhood of $e^{i\theta}$, $-\epsilon< \theta< \epsilon$.
|
||||
|
||||
You can continue the computation and find the exact $\epsilon$ so that the inverse image of $p^{-1}$ is small and each interval don't intersect (so that we can make homeomorphism for each interval).
|
||||
|
||||
Usually, we don't choose the $U$ to be the whole space.
|
||||
|
||||
---
|
||||
|
||||
Consider the projection for the boundary of mobius strip into middle circle.
|
||||
|
||||
This is a covering map since the boundary of mobius strip is winding the middle circle twice, and for each point on the middle circle with small enough neighborhood, there will be two disjoint interval on the boundary of mobius strip that are homeomorphic to the middle circle.
|
||||
|
||||
</details>
|
||||
|
||||
#### Proposition of covering map is open map
|
||||
|
||||
If $p:E\to B$ is a covering map, then $p$ is an open map.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Consider arbitrary open set $V\subseteq E$, consider $U=p(V)$, for every point $q\in U$, with neighborhood $q\in W$, the inverse image of $W$ is open, continue next lecture.
|
||||
|
||||
</details>
|
||||
@@ -12,4 +12,8 @@ export default {
|
||||
Math4202_L7: "Topology II (Lecture 7)",
|
||||
Math4202_L8: "Topology II (Lecture 8)",
|
||||
Math4202_L9: "Topology II (Lecture 9)",
|
||||
Math4202_L10: "Topology II (Lecture 10)",
|
||||
Math4202_L11: "Topology II (Lecture 11)",
|
||||
Math4202_L12: "Topology II (Lecture 12)",
|
||||
Math4202_L13: "Topology II (Lecture 13)",
|
||||
}
|
||||
|
||||
131
content/Math4302/Math4302_L10.md
Normal file
131
content/Math4302/Math4302_L10.md
Normal file
@@ -0,0 +1,131 @@
|
||||
# Math4302 Modern Algebra (Lecture 10)
|
||||
|
||||
## Groups
|
||||
|
||||
### Group homomorphism
|
||||
|
||||
Recall the kernel of a group homomorphism is the set
|
||||
|
||||
$$
|
||||
\operatorname{ker}(\phi)=\{a\in G|\phi(a)=e'\}
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Let $\phi:(\mathbb{Z},+)\to (\mathbb{Z}_n,+)$ where $\phi(k)=k\mod n$.
|
||||
|
||||
The kernel of $\phi$ is the set of all multiples of $n$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Theorem for one-to-one group homomorphism
|
||||
|
||||
$\phi:G\to G'$ is one-to-one if and only if $\operatorname{ker}(\phi)=\{e\}$
|
||||
|
||||
If $\phi$ is one-to-one, then $\phi(G)\leq G'$, $G$ is isomorphic ot $\phi(G)$ (onto automatically).
|
||||
|
||||
If $A$ is a set, then a permutation of $A$ is a bijection $f:A\to A$.
|
||||
|
||||
#### Cayley's Theorem
|
||||
|
||||
Every group $G$ is isomorphic to a subgroup of $S_A$ for some $A$ (and if $G$ is finite then $A$ can be taken to be finite.)
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
$D_n\leq S_n$, so $A=\{1,2,\cdots,n\}$
|
||||
|
||||
---
|
||||
|
||||
$\mathbb{Z}_n\leq S_n$, (use the set of rotations) so $A=\{1,2,\cdots,n\}$ $\phi(i)=\rho^i$ where $i\in \mathbb{Z}_n$ and $\rho\in D_n$
|
||||
|
||||
---
|
||||
|
||||
$GL(2,\mathbb{R})$. Set $A=\mathbb{R}^2$, for every $A\in GL(2,\mathbb{R})$, let $\phi(A)$ be the permutation of $\mathbb{R}^2$ induced by $A$, so $\phi(A)=f_A:\mathbb{R}^2\to \mathbb{R}^2$, $f_A(\begin{pmatrix}x\\y\end{pmatrix})=A\begin{pmatrix}x\\y\end{pmatrix}$
|
||||
|
||||
We want to show that this is a group homomorphism.
|
||||
|
||||
- $\phi(AB)=\phi(A)\phi(B)$ (it is a homomorphism)
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
f_{AB}(\begin{pmatrix}x\\y\end{pmatrix})&=AB\begin{pmatrix}x\\y\end{pmatrix}\\
|
||||
&=f_A(B\begin{pmatrix}x\\y\end{pmatrix})\\
|
||||
&=f_A(f_B(\begin{pmatrix}x\\y\end{pmatrix}))\\
|
||||
&=(f_A\circ f_B)(\begin{pmatrix}x\\y\end{pmatrix})\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
- Then we need to show that $\phi$ is one-to-one.
|
||||
|
||||
It is sufficient to show that $\operatorname{ker}(\phi)=\{e\}$.
|
||||
|
||||
Solve $f_A(\begin{pmatrix}x\\y\end{pmatrix})=\begin{pmatrix}x\\y\end{pmatrix}$, the only choice for $A$ is the identity matrix.
|
||||
|
||||
Therefore $\operatorname{ker}(\phi)=\{e\}$.
|
||||
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary>Proof for Cayley's Theorem</summary>
|
||||
|
||||
Let $A=G$, for every $g\in G$, define $\lambda_g:G\to G$ by $\lambda_g(x)=gx$.
|
||||
|
||||
Then $\lambda_g$ is a **permutation** of $G$. (not homomorphism)
|
||||
|
||||
- $\lambda_g$ is one-to-one by cancellation on the left.
|
||||
- $\lambda_g$ is onto since $\lambda_g(g^{-1}y)=y$ for every $y\in G$.
|
||||
|
||||
We claim $\phi: G\to S_G$ define by $\phi(g)=\lambda_g$ is a group homomorphism that is one-to-one.
|
||||
|
||||
First we show that $\phi$ is homomorphism.
|
||||
|
||||
$\forall x\in G$
|
||||
|
||||
$$
|
||||
\begin{aligned}
|
||||
\phi(g_1)\phi(g_2)&=\lambda_{g_1}(\lambda_{g_2}(x))\\
|
||||
&=\lambda_{g_1g_2}(x)\\
|
||||
&=\phi(g_1g_2)x\\
|
||||
\end{aligned}
|
||||
$$
|
||||
|
||||
This is one to one since if $\phi(g_1)=\phi(g_2)$, then $\lambda_{g_1}=\lambda_{g_2}\forall x$, therefore $g_1=g_2$.
|
||||
|
||||
</details>
|
||||
|
||||
### Odd and even permutations
|
||||
|
||||
#### Definition of transposition
|
||||
|
||||
A $\sigma\in S_n$ is a transposition is a two cycle $\sigma=(i j)$
|
||||
|
||||
Fact: Every permutation in $S_n$ can be written as a product of transpositions. (may not be disjoint transpositions)
|
||||
|
||||
<details>
|
||||
<summary>Example of a product of transpositions</summary>
|
||||
|
||||
Consider $(1234)=(14)(13)(12)$.
|
||||
|
||||
In general, $(i_1,i_2,\cdots,i_m)=(i_1i_m)(i_2i_{m-1})(i_3i_{m-2})\cdots(i_1i_2)$
|
||||
|
||||
This is not the unique way.
|
||||
|
||||
$$
|
||||
(12)(34)=(42)(34)(23)(12)
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
But the parity of the number of transpositions is unique.
|
||||
|
||||
#### Theorem for parity of transpositions
|
||||
|
||||
If $\sigma\in S_n$ is written as a product of transposition, then the number of transpositions is either always odd or even.
|
||||
|
||||
#### Definition of odd and even permutations
|
||||
|
||||
$\sigma$ is an even permutation if the number of transpositions is even.
|
||||
|
||||
$\sigma$ is an odd permutation if the number of transpositions is odd.
|
||||
163
content/Math4302/Math4302_L11.md
Normal file
163
content/Math4302/Math4302_L11.md
Normal file
@@ -0,0 +1,163 @@
|
||||
# Math4302 Modern Algebra (Lecture 11)
|
||||
|
||||
## Groups
|
||||
|
||||
### Symmetric groups
|
||||
|
||||
#### Definition of odd and even permutations
|
||||
|
||||
$\sigma$ is an even permutation if the number of transpositions is even.
|
||||
|
||||
$\sigma$ is an odd permutation if the number of transpositions is odd.
|
||||
|
||||
#### Theorem for parity of transpositions
|
||||
|
||||
The parity of the number of transpositions is unique.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Prove using the determinant of a matrix, swapping the rows of the matrix multiply the determinant by $-1$.
|
||||
|
||||
Consider the identity matrix $I_n$. Then the determinant is $1$, let $(ij)A$, where $i\neq j$ denote the matrix obtained from $A$ by swapping the rows $j$ and $i$, then the determinant of $(1j)A$ is $-1$.
|
||||
|
||||
And,
|
||||
|
||||
$$
|
||||
\det((a_1b_1)(a_2b_2)\cdots(a_nb_n)A)=(-1)^n\det(A)
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
$S_3$ has 6 permutations $\{e,(12),(13),(23),(12)(23),(13)(23)\}$, 3 of them are even $\{e,(12)(23),(13)(23)\}$ and 3 of them are odd $\{(13),(12),(23)\}$.
|
||||
|
||||
#### Theorem for the number of odd and even permutations in symmetric groups
|
||||
|
||||
In general, $S_n$ has $n!$ permutations, half of them are even and half of them are odd.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Consider the set of odd permutations in $S_n$ and set of even permutations in $S_n$. Consider the function: $\alpha:S_n\to S_n$ where $\alpha(\sigma)=\sigma(12)$.
|
||||
|
||||
$\sigma$ is a bijection,
|
||||
|
||||
If $\sigma_1(12)=\sigma_2(12)$, then $\sigma_1=\sigma_2$.
|
||||
|
||||
If $\phi$ is an even permutation, $\alpha(\phi(12))=\phi(12)(12)=\phi$, therefore the number of elements in the set of odd and even permutations are the same.
|
||||
</details>
|
||||
|
||||
#### Definition for sign of permutations
|
||||
|
||||
For $\sigma\in S_n$, the sign of $\sigma$ is defined by $\operatorname{sign}(\sigma)=1$ if sigma is even and $-1$ if sigma is odd.
|
||||
|
||||
Then $\beta: S_n\to \{1,-1\}$ is a group under multiplication, where $\beta(\sigma)=\operatorname{sign}(\sigma)$.
|
||||
|
||||
Then $\beta$ is a group homomorphism.
|
||||
|
||||
#### Definition of alternating group
|
||||
|
||||
$\ker(\beta)\leq S_n$, and $\ker(\beta)$ is the set of even permutations. Therefore the set of even permutations is a subgroup of $S_n$. We denote as $A_n$ (also called alternating group).
|
||||
|
||||
and $|A_n|=\frac{n!}{2}$.
|
||||
|
||||
### Direct product of groups
|
||||
|
||||
#### Definition of direct product of groups
|
||||
|
||||
Let $G_1,G_2$ be two groups. Then the direct product of $G_1$ and $G_2$ is defined as
|
||||
|
||||
$$
|
||||
G_1\times G_2=\{(g_1,g_2):g_1\in G_1,g_2\in G_2\}
|
||||
$$
|
||||
|
||||
The operations are defined by $(a_1,b_1)*(a_2,b_2)=(a_1*a_2,b_1*b_2)$.
|
||||
|
||||
This group is well defined since:
|
||||
|
||||
The identity is $(e_1,e_2)$, where $e_1\in G_1$ and $e_2\in G_2$. (easy to verify)
|
||||
|
||||
The inverse is $(a_1,b_1)^{-1}=(a_1^{-1},b_1^{-1})$.
|
||||
|
||||
Associativity automatically holds by associativity of $G_1$ and $G_2$.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
Consider $\mathbb{Z}_\1\times \mathbb{Z}_2$.
|
||||
|
||||
$$
|
||||
\mathbb{Z}_\1\times \mathbb{Z}_2=\{(0,0),(0,1),(1,0),(1,1)\}
|
||||
$$
|
||||
|
||||
$(0,0)^2=(0,0)$, $(0,1)^2=(0,0)$, $(1,0)^2=(0,0)$, $(1,1)^2=(0,0)$
|
||||
|
||||
This is not a cyclic group, this is isomorphic to klein four group.
|
||||
|
||||
---
|
||||
|
||||
Consider $\mathbb{Z}_2\times \mathbb{Z}_3$.
|
||||
|
||||
$$
|
||||
\mathbb{Z}_2\times \mathbb{Z}_3=\{(0,0),(0,1),(0,2),(1,0),(1,1),(1,2),(2,0),(2,1),(2,2)\}
|
||||
$$
|
||||
|
||||
This is cyclic ((2,3) are coprime)
|
||||
|
||||
Consider:
|
||||
|
||||
$$
|
||||
\langle (1,1)\rangle=\{(0,0),(1,1),(0,2),(1,0),(0,1),(1,2)\}
|
||||
$$
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for direct product of cyclic groups
|
||||
|
||||
$\mathbb{Z}_m\times \mathbb{Z}_n\simeq \mathbb{Z}_{mn}$ if and only if $m$ and $n$ have greatest common divisor $1$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
First assume $\operatorname{gcd}(m,n)=d>1$
|
||||
|
||||
Consider $(r,s)\in \mathbb{Z}_m\times \mathbb{Z}_n$.
|
||||
|
||||
We claim that order of $(r,s)$ is at most $\frac{mn}{d}<mn$.
|
||||
|
||||
Since $\frac{mn}{d}$ is integer, $\frac{mn}{d}=m_1dn_1$ where $m_1d$ is multiple of $m$ and $n_1d$ is multiple of $n$.
|
||||
|
||||
Therefore $r$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_m$ and $s$ combine with itself $\frac{mn}{d}$ times is $0$ in $\mathbb{Z}_n$.
|
||||
|
||||
---
|
||||
|
||||
Other direction:
|
||||
|
||||
Assume $\operatorname{gcd}(m,n)=1$.
|
||||
|
||||
Claim order of $(1,1)=mn$, so $\mathbb{Z}_m\times \mathbb{Z}_n=\langle (1,1)\rangle$.
|
||||
|
||||
If $k$ is the order of $(1,1)$, then $k$ is a multiple of $m$ and a multiple of $n$.
|
||||
|
||||
</details>
|
||||
|
||||
Similarly, if $G_1,G_2,G_3,\ldots,G_k$ are groups, then
|
||||
|
||||
$$
|
||||
G_1\times G_2\times G_3\times \cdots\times G_k=\{(g_1,g_2,\ldots,g_k):g_1\in G_1,g_2\in G_2,\ldots,g_k\in G_k\}
|
||||
$$
|
||||
|
||||
is a group.
|
||||
|
||||
Easy to verify by associativity. $(G_1\times G_2)\times G_3=G_1\times G_2\times G_3$.
|
||||
|
||||
#### Some extra facts for direct product
|
||||
|
||||
1. $G_1\times G_2\simeq G_2\times G_1$, with $\phi(a_1,a_2)=(a_2,a_1)$.
|
||||
2. If $H_1\leq G_1$ and $H_2\leq G_2$, then $H_1\times H_2\leq G_1\times G_2$.
|
||||
|
||||
> [!WARNING]
|
||||
>
|
||||
> Not every subgroup of $G_1\times G_2$ is of the form $H_1\times H_2$.
|
||||
>
|
||||
> Consider $\mathbb{Z}_2\times \mathbb{Z}_2$ with subgroup $\{(0,0),(1,1)\}$, This forms a subgroup but not of the form $H_1\times H_2$.
|
||||
135
content/Math4302/Math4302_L12.md
Normal file
135
content/Math4302/Math4302_L12.md
Normal file
@@ -0,0 +1,135 @@
|
||||
# Math4303 Modern Algebra (Lecture 12)
|
||||
|
||||
## Groups
|
||||
|
||||
### Direct products
|
||||
|
||||
$\mathbb{Z}_m\times \mathbb{Z}_n$ is cyclic if and only if $m$ and $n$ have greatest common divisor $1$.
|
||||
|
||||
More generally, for $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times \cdots \times \mathbb{Z}_{n_k}$, if $n_1,n_2,\cdots,n_k$ are pairwise coprime, then the direct product is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
For the forward direction, use $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}=\mathbb{Z}_{n_1n_2}$. if $n_1, n_2$ are coprime.
|
||||
|
||||
|
||||
For the backward, suppose to the contrary that for example $\gcd(n_1,n_2)=d>1$, then $G=\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}\times H$, where any element in $H$ has order $\leq |H|$ and any element in $\mathbb{Z}_{n_1}\times \mathbb{Z}_{n_2}$ has order $<\frac{n_1n_2}{d}$, therefore, all the elements in $G$ will have order strictly less than the size $n_1n_2\ldots n_k$ of the group.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for composition of cyclic groups
|
||||
|
||||
If $n=p_1^{m_1}\ldots p_k^{m_k}$, where $p_i$ are distinct primes, then the group
|
||||
|
||||
$$
|
||||
G=\mathbb{Z}_n=\mathbb{Z}_{p_1^{m_1}}\times \mathbb{Z}_{p_2^{m_2}}\times \cdots \times \mathbb{Z}_{p_k^{m_k}}
|
||||
$$
|
||||
|
||||
is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Example for product of cyclic groups and order of element</summary>
|
||||
|
||||
$$
|
||||
\mathbb{Z}_{8}\times\mathbb{Z}_8\times \mathbb{Z}_12
|
||||
$$
|
||||
|
||||
the order for $(1,1,1)$ is 24.
|
||||
|
||||
What is the maximum order of an element in this group?
|
||||
|
||||
Guess:
|
||||
|
||||
$8*3=24$
|
||||
|
||||
</details>
|
||||
|
||||
### Structure of finitely generated abelian groups
|
||||
|
||||
#### Theorem for finitely generated abelian groups
|
||||
|
||||
Every finitely generated abelian group $G$ is isomorphic to
|
||||
|
||||
$$
|
||||
Z_{p_1}^{n_1}\times Z_{p_2}^{n_2}\times \cdots \times Z_{p_k}^{n_k}\times\underbrace{\mathbb{Z}\times \ldots \times \mathbb{Z}}_{m\text{ times}}
|
||||
$$
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
If $G$ is abelian of size $8$, then $G$ is isomorphic to one of the following:
|
||||
|
||||
- $\mathbb{Z}_2\times \mathbb{Z}_2\times \mathbb{Z}_2$ (non cyclic)
|
||||
- $\mathbb{Z}_2\times \mathbb{Z}_4$ (non cyclic)
|
||||
- $\mathbb{Z}_2$ (cyclic)
|
||||
|
||||
And any two of them are not isomorphic
|
||||
|
||||
---
|
||||
|
||||
Find all abelian group of order $72$.
|
||||
|
||||
Since $72=2^3*3^2$, There are 3 possibilities for the $2^3$ part, and there are 2 possibilities for the $3^2$ part.
|
||||
|
||||
Note that $\mathbb{Z}_8\times\mathbb{Z}_9$, where $8,9$ are coprime, $\mathbb{Z}_8\times\mathbb{Z}_9=\mathbb{Z}_{72}$, is cyclic.
|
||||
|
||||
There are 6 possibilities in total.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for divisor size of abelian subgroup
|
||||
|
||||
If $g$ is abelian and $|G|=n$, then for every divisor $m$ of $n$, $G$ has a subgroup of order $m$.
|
||||
|
||||
> [!WARNING]
|
||||
>
|
||||
> This is not true if $G$ is not abelian.
|
||||
>
|
||||
> Consider $A_4$ (alternating group for $S_4$) does not have a subgroup of order 6.
|
||||
|
||||
|
||||
<details>
|
||||
<summary>Proof for the corollary</summary>
|
||||
|
||||
Write $G=\mathbb{Z}_{p_1}^{n_1}\times \mathbb{Z}_{p_2}^{n_2}\times \cdots \times \mathbb{Z}_{p_k}^{n_k}$ where $p_i$ are distinct primes.
|
||||
|
||||
Therefore $n=p_1^{m_1}\ldots p_k^{m_k}$.
|
||||
|
||||
For any divisor $d$ of $n$, we can write $d=p_1^{m_1}\ldots p_k^{m_k}$, where $m_i\leq n_i$.
|
||||
|
||||
Now for each $p_i$, we choose the subgroup $H_i$ of size $p_i^{m_i}$ in $\mathbb{Z}_{p_i}^{n_i}$. (recall that every cyclic group of size $r$ and any divisor $s$ of $r$, there is a subgroup of order $s$. If the group is generated by $a$, then use $a^{\frac{r}{s}}$ to generate the subgroup.)
|
||||
|
||||
We can construct the subgroup $H=H_1\times H_2\times \cdots \times H_k$ is the subgroup of $G$ of order $d$.
|
||||
</details>
|
||||
|
||||
### Cosets
|
||||
|
||||
#### Definition of Cosets
|
||||
|
||||
Let $G$ be a group and $H$ its subgroup.
|
||||
|
||||
Define a relation on $G$ and $a\sim b$ if $a^{-1}b\in H$.
|
||||
|
||||
This is an equivalence relation.
|
||||
|
||||
- Reflexive: $a\sim a$: $a^{-1}a=e\in H$
|
||||
- Symmetric: $a\sim b\Rightarrow b\sim a$: $a^{-1}b\in H$, $(a^{-1}b)^{-1}=b^{-1}a\in H$
|
||||
- Transitive: $a\sim b$ and $b\sim c\Rightarrow a\sim c$ : $a^{-1}b\in H, b^{-1}c\in H$, therefore their product is also in $H$, $(a^{-1}b)(b^{-1}c)=a^{-1}c\in H$
|
||||
|
||||
So we get a partition of $G$ to equivalence classes.
|
||||
|
||||
Let $a\in G$, the equivalence class containing $a$
|
||||
|
||||
$$
|
||||
aH=\{x\in G| a\sim x\}=\{x\in G| a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
|
||||
$$
|
||||
|
||||
This is called the coset of $a$ in $H$.
|
||||
|
||||
<details>
|
||||
<summary>Example</summary>
|
||||
|
||||
Consider $G=S_3$
|
||||
|
||||
</details>
|
||||
143
content/Math4302/Math4302_L13.md
Normal file
143
content/Math4302/Math4302_L13.md
Normal file
@@ -0,0 +1,143 @@
|
||||
# Math4302 Modern Algebra (Lecture 13)
|
||||
|
||||
## Groups
|
||||
|
||||
### Cosets
|
||||
|
||||
Last time we see that (left coset) $a\sim b$ (to differentiate from right coset, we may denote it as $a\sim_L b$) by $a^{-1}b\in H$ defines an equivalence relation.
|
||||
|
||||
#### Definition of Equivalence Class
|
||||
|
||||
Let $a\in H$, and the equivalence class containing $a$ is defined as:
|
||||
|
||||
$$
|
||||
aH=\{x|a\simeq x\}=\{x|a^{-1}x\in H\}=\{x|x=ah\text{ for some }h\in H\}
|
||||
$$.
|
||||
|
||||
#### Properties of Equivalence Class
|
||||
|
||||
$aH=bH$ if and only if $a\sim b$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
If $aH=bH$, then since $a\in aH, a\in bH$, then for some $h$, $a=bh$, since $b^{-1}a\in H$, so $a^{-1}b\in H$, therefore $a\simeq b$.
|
||||
|
||||
If $a\sim b$, then $aH\subseteq bH$, since anything in $aH$ is related to $a$, therefore it is related to $b$ so $a\in bH$.
|
||||
|
||||
$bH\subseteq aH$, apply the reflexive property for equivalence relation, therefore $b\in aH$.
|
||||
|
||||
So $aH=bH$.
|
||||
|
||||
</details>
|
||||
|
||||
If $aH\cap bH\neq \emptyset$, then $aH=bH$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
If $x\in aH\cap bH$, then $x\sim a$ and $x\sim b$, so $a\sim b$, so $aH=bH$.
|
||||
|
||||
</details>
|
||||
|
||||
$aH=H$ if and only if $a\in H$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
$aH=eH$ if and only if $a\sim e$, if and only if $a\in H$.
|
||||
|
||||
</details>
|
||||
|
||||
$aH$ is called **left coset** of $a$ in $H$.
|
||||
|
||||
<details>
|
||||
<summary>Examples</summary>
|
||||
|
||||
Consider $G=S_3=\{e,\rho,\rho^2,\tau_1,\tau_2,\tau_3\}$.
|
||||
|
||||
where $\rho=(123),\rho^2=(132),\tau_1=(12),\tau_2=(23),\tau_3=(13)$.
|
||||
|
||||
$H=\{e,\rho,\rho^2\}$.
|
||||
|
||||
All the left coset for $H$ is $H=eH=\rho H=\rho^2H$.
|
||||
|
||||
$$
|
||||
\tau_1\rho=(23)=\tau_2\\
|
||||
\tau_1\rho^2=(13)=\tau_3\\
|
||||
\tau_2\rho=(31)=\tau_3\\
|
||||
\tau_2\rho^2=(12)=\tau_1
|
||||
\tau_3\rho=(12)=\tau_1\\
|
||||
\tau_3\rho^2=(23)=\tau_2
|
||||
$$
|
||||
|
||||
$$
|
||||
\tau_1H=\{\tau_1,\tau_2,\tau_3\}=\tau_2H=\tau_3H\\
|
||||
$$
|
||||
|
||||
---
|
||||
|
||||
Consider $G=\mathbb{Z}$ with $H=5\mathbb{Z}$.
|
||||
|
||||
We have 5 cosets, $H,1+H,2+H,3+H,4+H$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Lemma for size of cosets
|
||||
|
||||
Any coset of $H$ has the same cardinality as $H$.
|
||||
|
||||
Define $\phi:H\to aH$ by $\phi(h)=ah$.
|
||||
|
||||
$\phi$ is an bijection, if $ah=ah'\implies h=h'$, it is onto by definition of $aH$.
|
||||
|
||||
#### Corollary: Lagrange's Theorem
|
||||
|
||||
If $G$ is a finite group, and $H\leq G$, then $|H|\big\vert |G|$. (size of $H$ divides size of $G$)
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Suppose $H$ has $r$ distinct cosets, then $|G|=r|H|$, so $|H|$ divides $|G|$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Corollary for Lagrange's Theorem
|
||||
|
||||
If $|G|=p$, where $p$ is a prime number, then $G$ is cyclic.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Prick $e\neq a\in G$, let $H=\langle a\rangle \leq G$, then $|H|$ divides $|G|$, since $p$ is prime, then $|H|=|G|$, so $G=\langle a \rangle$.
|
||||
|
||||
</details>
|
||||
|
||||
If $G$ is finite and $a\in G$, then $\operatorname{ord}(a)\big\vert|G|$.
|
||||
|
||||
<details>
|
||||
<summary>Proof</summary>
|
||||
|
||||
Since $\operatorname{ord}(a)=|\langle a\rangle|$, and $\langle a\rangle $ is a subgroup, so $\operatorname{ord}(a)\big\vert|G|$.
|
||||
|
||||
</details>
|
||||
|
||||
#### Definition of index
|
||||
|
||||
Suppose $H\leq G$, the number of distinct left cosets of $H$ is called the index of $H$ in $G$. Notation is $(G:H)$.
|
||||
|
||||
#### Definition of right coset
|
||||
|
||||
Suppose $H\leq G$, define the equivalence relation by $a\sim 'b$ (or $a\sim_R b$ in some textbook) if $a b^{-1}\in H$. (note the in left coset, we use $a^{-1}b \in H$, or equivalently $b^{-1}a \in H$, these are different equivalence relations)
|
||||
|
||||
The equivalent class is defined
|
||||
|
||||
$$
|
||||
Ha=\{x\in G|x\sim'a\}=\{x\in G|xa^{-1}\in H\}=\{x|x=ha\text{ for some }h\in H\}
|
||||
$$
|
||||
|
||||
Some properties are the same as the left coset
|
||||
|
||||
- $Ha=H\iff a\in H$
|
||||
- $Ha=Hb$ if and only if $a\sim'b\iff a b^{-1}\in H$.
|
||||
- $Ha\cap Hb\neq \emptyset\iff Ha=Hb$.
|
||||
|
||||
Some exercises: Find all the left and right cosets of $G=S_3$, there should be 2 left cosets and 2 right cosets (giving different partition of $G$).
|
||||
@@ -11,4 +11,9 @@ export default {
|
||||
Math4302_L6: "Modern Algebra (Lecture 6)",
|
||||
Math4302_L7: "Modern Algebra (Lecture 7)",
|
||||
Math4302_L8: "Modern Algebra (Lecture 8)",
|
||||
Math4302_L9: "Modern Algebra (Lecture 9)",
|
||||
Math4302_L10: "Modern Algebra (Lecture 10)",
|
||||
Math4302_L11: "Modern Algebra (Lecture 11)",
|
||||
Math4302_L12: "Modern Algebra (Lecture 12)",
|
||||
Math4302_L13: "Modern Algebra (Lecture 13)",
|
||||
}
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
# Welcome to NoteNextra
|
||||
|
||||
> [!WARNING]
|
||||
><!-- > This site use [Algolia Search](https://www.algolia.com/) to search the content. However, due to some unknown reasons, when the index page is loaded, the search bar is calling default PageFind package from Nextra. **If you find the search bar is not working**, please try to redirect to another page and then back to the index page or search in another page. -->
|
||||
> This site use [Algolia Search](https://www.algolia.com/) to search the content. Index updated on weekly basis, the search result may be delayed. For latest search, please use github document search if possible.
|
||||
>
|
||||
> This site use SSG to generate the static pages. And cache is stored to your browser, this may not reveal the latest updates. **If you find some notes are not shown on sidebar but the class already ends more than 24 hours**, please try to access the page directly via the URL, or force reload the cache (for example, change the URL to `.../Math4201/Math4201_L{number}` to access the note of the lecture `Math4201_L{number}` and then refresh the page).
|
||||
|
||||
@@ -13,7 +13,7 @@ The primary audience of this project is for those challenge takers who are takin
|
||||
|
||||
So here it is. A lite server for you to read my notes.
|
||||
|
||||
**Remember, I take notes don't means that I like them and paying attention to the lecture.**
|
||||
**Remember, I take notes don't means that I like them and paying attention to the lectures.**
|
||||
|
||||
<p style="color: red; font-weight: bold">It's because I'm too easy to fall asleep if I stop doing something on my hand when my mind is wandering.</p>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user