Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

650
Basic Modern Algebra with Applications Mahima Ranjan Adhikari Avishek Adhikari

Transcript of Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Page 1: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Basic Modern Algebra with Applications

Mahima Ranjan AdhikariAvishek Adhikari

Page 2: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Basic Modern Algebra with Applications

Page 3: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Mahima Ranjan Adhikari � Avishek Adhikari

Basic Modern Algebrawith Applications

Page 4: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Mahima Ranjan AdhikariInstitute for Mathematics, Bioinformatics,

Information Technology and ComputerScience (IMBIC)

Kolkata, West Bengal, India

Avishek AdhikariDepartment of Pure MathematicsUniversity of CalcuttaKolkata, West Bengal, India

ISBN 978-81-322-1598-1 ISBN 978-81-322-1599-8 (eBook)DOI 10.1007/978-81-322-1599-8Springer New Delhi Heidelberg New York Dordrecht London

Library of Congress Control Number: 2013954442

© Springer India 2014This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting, reproduction on microfilms or in any other physical way, and transmission or informationstorage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodologynow known or hereafter developed. Exempted from this legal reservation are brief excerpts in connectionwith reviews or scholarly analysis or material supplied specifically for the purpose of being enteredand executed on a computer system, for exclusive use by the purchaser of the work. Duplication ofthis publication or parts thereof is permitted only under the provisions of the Copyright Law of thePublisher’s location, in its current version, and permission for use must always be obtained from Springer.Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violationsare liable to prosecution under the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoes not imply, even in the absence of a specific statement, that such names are exempt from the relevantprotective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date of pub-lication, neither the authors nor the editors nor the publisher can accept any legal responsibility for anyerrors or omissions that may be made. The publisher makes no warranty, express or implied, with respectto the material contained herein.

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Page 5: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

DedicatedtoNABA KUMAR ADHIKARI (1912–1996),a great teacher,on occasion of his birth centenary

Page 6: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Preface

This book is designed to serve as a basic text of modern algebra at the undergraduatelevel. Modern mathematics facilitates unification of different areas of mathematics.It is characterized by its emphasis on the systematic study of a number of abstractmathematical structures. Modern algebra provides a language for almost all disci-plines in contemporary mathematics.

This book introduces the basic language of modern algebra through a study ofgroups, group actions, rings, fields, vector spaces, modules, algebraic numbers, etc.The term Modern Algebra (or Abstract Algebra) is used to distinguish this areafrom classical algebra. Classical algebra grew over thousands of years. On the otherhand, modern algebra began as late as 1770. Modern algebra is used in many ar-eas of mathematics and other sciences. For example, it is widely used in algebraictopology of which the main objective is to solve topological and geometrical prob-lems by using algebraic objects. Category theory plays an important role in thisrespect. Grigory Perelman solved the Poincaré conjecture by using the tools ofmodern algebra and other modern mathematical concepts (beyond the scope of thediscussion in this book). A study of algebraic numbers includes studies of variousnumber rings which generalize the set of integers. It also offers a natural inspira-tion to reinterpret the results of classical algebra and number theory and providesa scope of greater unity and generality. Algebraic number theory provides impor-tant tools to solve many problems in mathematics. For example, Andrew Wilesproved Fermat’s last theorem by using algebraic number theory along with othertheories (not discussed in this book). Moreover, an attempt has been made to in-tegrate the classical materials of elementary number theory with modern algebrawith an eye to apply them in different disciplines, specially in cryptography. Someapplications unify computer science with mainstream mathematics. It dispels, atleast, partly a general feeling that much of abstract algebra is of little practicalvalue. The main purpose of this book is to give an accessible presentation to itsreaders. The materials discussed here have appeared elsewhere. Our contributionis the selection of the materials and their presentation. The title of the book sug-gests the scope of the book, which is expanded over 12 chapters and three appen-dices.

vii

Page 7: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

viii Preface

Chapter 1 studies basic concepts of set theory and properties of integers, whichare used throughout the book and in many other disciplines. Set theory occupies avery prominent place in modern science. There are two general approaches to settheory. The first one is called “naive set theory” initiated by Georg Cantor around1870; the second one is called “axiomatic set theory” originated by E. Zermelo in1908 and modified by A. Fraenkel and T. Skolem. This chapter develops a naiveset theory, which is a non-formalized theory by using a natural language to describesets and their basic properties. For a precise description of many notions of mod-ern algebra and also for mathematical reasoning, the concepts of relations, Zorn’slemma, mappings (functions), cardinality of sets are very important. They form thebasics of set theory and are discussed in this chapter. The set of integers plays animportant role in the development of science, engineering, technology and humancivilization. In this chapter, some basic concepts and properties of integers, such asPeano’s axioms leading to the principle of mathematical induction, well-orderingprinciple, division algorithm, greatest common divisors, prime numbers, fundamen-tal theorem of arithmetic, congruences on integers, etc., are also discussed. Furtherstudies on number theory are given in Chap. 10.

Chapter 2 gives an introduction to the group theory. This concept is used in sub-sequent chapters. Groups serve as one of the fundamental building blocks for thesubject called today modern algebra. The theory of groups began with the workof J.L. Lagrange (1736–1813) and E. Galois (1811–1832). At that time, mathemati-cians worked with groups of transformations. These were sets of mappings, that, un-der composition, possessed certain properties. Mathematicians, such as Felix Klein(1849–1925), adopted the idea of groups to unify different areas of geometry. In1870, L. Kronecker (1823–1891) gave a set of postulates for a group. Earlier def-initions of groups were generalized to the present concept of an abstract group inthe first decade of the twentieth century, which was defined by a set of axioms. Inthis chapter, we make an introductory study of groups with geometrical applicationsalong with a discussion of free abelian groups and structure theorem for finitelygenerated abelian groups. Moreover, semigroups, homology groups, cohomologygroups, topological groups, Lie groups, Hopf groups, and fundamental groups arealso studied here.

Chapter 3 discusses actions of semigroups, groups, topological groups, and Liegroups. Each element of a group determines a permutation on a set under a groupaction. For a topological group action on a topological space, this permutation is ahomeomorphism and for a Lie group action on a differentiable manifold it is a dif-feomorphism. Group actions are used in the proofs of the counting principle, Cay-ley’s Theorem, Cauchy’s Theorem and Sylow Theorems for finite groups. Countingprinciple is used to determine the structure of a group of prime power order. Thesegroups arise in the Sylow Theorems and in the description of finite abelian groups.Orbit spaces obtained by topological group actions, discussed in this chapter, arevery important in topology and geometry. For example, n-dimensional real andcomplex projective spaces are obtained as orbit spaces. Finally, semigroup actionsapplied to theoretical computer science, yield state machines which unify computerscience with mainstream mathematics.

Page 8: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Preface ix

Rings also serve as a fundamental building blocks for modern algebra. Chapter 4introduces the concept of rings, another fundamental concept in the study of mod-ern algebra. A “group” is endowed with only one binary operation while a “ring” isendowed with two binary operations connected by some interrelations. Fields forma very important class of rings. The concept of rings arose through the attempts toprove Fermat’s last theorem and was initiated by Richard Dedekind (1831–1916)around 1880. David Hilbert (1862–1943) coined the term “ring”. Emmy Noether(1882–1935) developed the theory of rings under his guidance. A very particularbut important type of rings is known as commutative rings that play an importantrole in algebraic number theory and algebraic geometry. Further, non-commutativerings are used in non-commutative geometry and quantum groups. In this chapter,Wedderburn theorem on finite division rings, and some special rings, such as ringsof power series, rings of polynomials, rings of continuous functions, rings of endo-morphisms of abelian groups and Boolean rings are also studied.

Chapter 5 continues the study of theory of rings, and introduces the concept ofideals which generalize many important properties of integers. Ideals and homomor-phisms of rings are closely related. Like normal subgroups in the theory of groups,ideals play an analogous role in the study of rings. The real significance of idealsin a ring is that they enable us to construct other rings which are associated withthe first in a natural way. Commutative rings and their ideals are closely related.Their relations develop ring theory and are applied in many areas of mathematics,such as number theory, algebraic geometry, topology and functional analysis. In thischapter, basic properties of ideals are discussed and explained with interesting ex-amples. Ideals of rings of continuous functions and Chinese remainder theorem forrings with their applications are also studied. Finally, applications of ideals to alge-braic geometry with Hilbert’s Nullstellensatz theorem, and the Zariski topology arediscussed and certain connections among algebra, geometry and topology are given.

Chapter 6 extends the concepts of divisibility, greatest common divisor, leastcommon multiple, division algorithm and fundamental theorem of arithmetic forintegers with the help of theory of ideals to the corresponding concepts for rings.The main aim of this chapter is to study the problem of factoring the elements ofan integral domain as products of irreducible elements. This chapter also catersto the study of the polynomial rings over a certain class of important rings andproves the Eisenstein irreducibility criterion, Gauss Lemma and related topics. Ourstudy culminates in proving the Gauss Theorem which provides an extensive classof uniquely factorizable domains.

Chapter 7 continues to develop the theory of rings and studies chain conditionsfor ideals of a ring. The motivation came from an interesting property of the ringof integers Z: that its every ascending chain of ideals terminates. This interestingproperty of Z was first recognized by the German mathematician Emmy Noether(1882–1935). This property leads to the concept of Noetherian rings, named afterNoether. On the other hand, Emil Artin (1898–1962) showed that there are somerings in which every descending chain of ideals terminates. Such rings are calledArtinian rings in honor of Emil Artin. This chapter studies special classes of rings,such as Noetherian rings and Artinian rings and obtains deeper results on ideal the-ory. This chapter further introduces a Noetherian domain and an Artinian domain

Page 9: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

x Preface

and establishes their interesting properties. Hilbert’s Basis Theorem, which gives anextensive class of Noetherian rings, is also proved in this chapter. Its application toalgebraic geometry is also discussed. This study culminates in rings with descendingchain condition for ideals, which determines their ideal structure.

Chapter 8 introduces another algebraic system, called vector spaces (linearspaces) interlinking both internal and external operations. In this chapter, vectorspaces and their closely related fundamental concepts, such as linear independence,basis, dimension, linear transformation and its matrix representation, eigenvalue,inner product space, etc., are presented. Such concepts form an integral part of lin-ear algebra. Vector spaces have multi-faceted applications. Such spaces over finitefields play an important role in computer science, coding theory, design of exper-iments and combinatorics. Vector spaces over the infinite field Q of rationals areimportant in number theory and design of experiments while vector spaces over Care essential for the study of eigenvalues. As the concept of a vector provides a ge-ometric motivation, vector spaces facilitate the study of many areas of mathematicsand integrate the abstract algebraic concepts with the geometric ideas.

Chapter 9 initiates module theory, which is one of the most important topics inmodern algebra. It is a generalization of an abelian group (which is a module overthe ring of integers Z) and also a natural generalization of a vector space (whichis a module over a division ring or over a field). Many results of vector spaces aregeneralized in some special classes of modules, such as free modules and finitelygenerated modules over principal ideal domains. Modules are closely related to therepresentation theory of groups. One of the basic concepts which accelerates thestudy of commutative algebra is module theory, as modules play the central role incommutative algebra. Modules are also widely used in structure theory of finitelygenerated abelian groups, finite abelian groups and rings, homological algebra, andalgebraic topology. In this chapter, we study the basic properties of modules. Wealso consider modules of special classes, such as free modules, modules over prin-cipal ideal domains along with structure theorems, exact sequences of modules andtheir homomorphisms, Noetherian and Artinian modules, homology and cohomol-ogy modules. Our study culminates in a discussion on the topology of the spectrumof modules and rings with special reference to the Zariski topology.

Chapter 10 discusses some more interesting properties of integers, in particular,properties of prime numbers and primality testing by using the tools of modern alge-bra, which are not studied in Chap. 1. In addition, we study the applications of num-ber theory, particularly those directed towards theoretical computer science. Numbertheory has been used in many ways to devise algorithms for efficient computer andfor computer operations with large integers. Both algebra and number theory playan increasingly significant role in computing and communication, as evidenced bythe striking applications of these subjects to the fields of coding theory and cryptog-raphy. The motivation of this chapter is to provide an introduction to the algebraicaspects of number theory, mainly the study of development of the theory of primenumbers with an emphasis on algorithms and applications, necessary for studyingcryptography to be discussed in Chap. 12. In this chapter, we start with the introduc-tion to prime numbers with a brief history. We provide several different proofs of

Page 10: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Preface xi

the celebrated Theorem of Euclid, stating that there exist infinitely many primes. Wefurther discuss Fermat number, Mersenne numbers, Carmichael numbers, quadraticreciprocity, multiplicative functions, such as Euler φ-function, number of divisorfunctions, sum of divisor functions, etc. This chapter ends with a discussion of pri-mality testing both deterministic and probabilistic, such as Solovay–Strassen andMiller–Rabin probabilistic primality tests.

Chapter 11 introduces algebraic number theory which developed through the at-tempts of mathematicians to prove Fermat’s last theorem. An algebraic number isa complex number, which is algebraic over the field Q of rational numbers. An al-gebraic number field is a subfield of the field C of complex numbers, which is afinite field extension of the field Q, and is obtained from Q by adjoining a finitenumber of algebraic elements. The concepts of algebraic numbers, algebraic inte-gers, Gaussian integers, algebraic number fields and quadratic fields are introducedin this chapter after a short discussion on general properties of field extension andfinite fields. There are several proofs of fundamental theorem of algebra. It is provedin this chapter by using homotopy (discussed in Chap. 2). Moreover, countability ofalgebraic numbers, existence of transcendental numbers, impossibility of duplica-tion of a general cube and that of trisection of a general angle are shown in thischapter.

Chapter 12 presents applications and initiates a study of cryptography. In themodern busy digital world, the word “cryptography” is well known to many of us.Everyday, knowingly or unknowingly, in many places we use different techniquesof cryptography. Starting from the logging on a PC, sending e-mails, withdraw-ing money from ATM by using a PIN code, operating the locker at a bank withthe help of a designated person from the bank, sending message by using a mobilephone, buying things through the internet by using a credit card, transferring moneydigitally from one account to another over internet, we are applying cryptographyeverywhere. If we observe carefully, we see that in every case we are required tohide some information to transfer information secretly. So, intuitively, we can guessthat cryptography has something to do with security. So, intuitively, we can guessthat cryptography and secrecy have a close connection. Naturally, the questions thatcome to our mind are: What is cryptography? How is it that it is important to ourdaily life? In this chapter, we introduce cryptography and provide a brief overviewof the subject and discuss the basic goals of cryptography and present the subject,both intuitively and mathematically. More precisely, various cryptographic notionsstarting from the historical ciphers to modern cryptographic notions like public keyencryption schemes, signature schemes, secret sharing schemes, oblivious transfer,etc., by using mathematical tools mainly based on modern algebra are explained. Fi-nally, the implementation issues of three public key cryptographic schemes, namelyRSA, ElGamal, and Rabin by using the open source software SAGE are discussed.

Appendix A studies some interesting properties of semirings. Semiring theory isa common generalization of the theory of associative rings and theory of distribu-tive lattices. Because of wide applications of results of semiring theory to differentbranches of computer science, it has now become necessary to study structural re-sults on semirings. This chapter gives some such structural results.

Page 11: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

xii Preface

Appendix B discusses category theory initiated by S. Eilenberg and S. Mac Laneduring 1942–1945, to provide a technique for unifying certain concepts. In general,the pedagogical methods compartmentalize mathematics into its different brancheswithout emphasizing their interconnections. But the category theory provides a con-venient language to tie together several notions and existing results of different areasof mathematics. This language is conveyed through the concepts of categories, func-tors, natural transformations, which form the basics of category theory and providetools to shift problems of one branch of mathematics to another branch to have abetter chance for solution. For example, the Brouwer fixed-point theorem is provedhere with the help of algebraic objects. Moreover, extension problems and classifi-cation of topological spaces are discussed in this chapter.

Appendix C gives a brief historical note highlighting contributions of somemathematicians to modern algebra and its closely related topics. The list includesa few names only, such as the names of Leonhard Euler (1707–1783), JosephLouis Lagrange (1736–1813), Carl Friedrich Gauss (1777–1855), Augustin LouisCauchy (1789–1857), Niels Henrik Abel (1802–1829), C.G.J. Jacobi (1804–1851),H. Grassmann (1809–1877), Evariste Galois (1811–1832), Arthur Cayley (1821–1895), Leopold Kronecker (1823–1891), Bernhard Riemann (1826–1866), RichardDedekind (1831–1926), Peter Ludvig Mejdell Sylow (1832–1918), Camille Jor-dan (1838–1922), Sophus Lie (1842–1899), Georg Cantor (1845–1918), C. Fe-lix Klein (1849–1925), Henri Poincaré (1854–1912), David Hilbert (1862–1943),Amalie Emmy Noether (1882–1935), MecLagan Wedderburn (1882–1948), EmilArtin (1898–1962) and Oscar Zariski (1899–1986).

The authors express their sincere thanks to Springer for publishing this book. Theauthors are very thankful to many individuals, our postgraduate and Ph.D. students,who have helped in proof reading the book. Our thanks are due to the instituteIMBIC, Kolkata, for kind support towards the manuscript development work of thisbook. Finally, we acknowledge, with heartfelt thanks, the patience and sacrifice ofour long-suffering family, specially Minati, Sahibopriya, and little Avipriyo.

Mahima Ranjan AdhikariAvishek Adhikari

Kolkata, India

Page 12: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Contents

1 Prerequisites: Basics of Set Theory and Integers . . . . . . . . . . . 11.1 Sets: Introductory Concepts . . . . . . . . . . . . . . . . . . . 21.2 Relations on Sets . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.2.1 Equivalence Relation . . . . . . . . . . . . . . . . . . 81.2.2 Partial Order Relations . . . . . . . . . . . . . . . . . . 121.2.3 Operations on Binary Relations . . . . . . . . . . . . . 171.2.4 Functions or Mappings . . . . . . . . . . . . . . . . . 18

1.3 Countability and Cardinality of Sets . . . . . . . . . . . . . . . 251.3.1 Continuum Hypothesis . . . . . . . . . . . . . . . . . 311.3.2 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 36

1.4 Integers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391.5 Congruences . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

1.5.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 521.6 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 53References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

2 Groups: Introductory Concepts . . . . . . . . . . . . . . . . . . . . 552.1 Binary Operations . . . . . . . . . . . . . . . . . . . . . . . . 552.2 Semigroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

2.2.1 Topological Semigroups . . . . . . . . . . . . . . . . . 682.2.2 Fuzzy Ideals in a Semigroup . . . . . . . . . . . . . . . 692.2.3 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 70

2.3 Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722.4 Subgroups and Cyclic Groups . . . . . . . . . . . . . . . . . . 822.5 Lagrange’s Theorem . . . . . . . . . . . . . . . . . . . . . . . 892.6 Normal Subgroups, Quotient Groups and Homomorphism

Theorems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922.7 Geometrical Applications . . . . . . . . . . . . . . . . . . . . . 99

2.7.1 Symmetry Groups of Geometric Figures in EuclideanPlane . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

2.7.2 Group of Rotations of the Sphere . . . . . . . . . . . . 101

xiii

Page 13: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

xiv Contents

2.7.3 Clock Arithmetic . . . . . . . . . . . . . . . . . . . . . 1022.8 Free Abelian Groups and Structure Theorem . . . . . . . . . . 103

2.8.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 1102.9 Topological Groups, Lie Groups and Hopf Groups . . . . . . . 112

2.9.1 Topological Groups . . . . . . . . . . . . . . . . . . . 1122.9.2 Lie Groups . . . . . . . . . . . . . . . . . . . . . . . . 1132.9.3 Hops’s Groups or H -Groups . . . . . . . . . . . . . . 113

2.10 Fundamental Groups . . . . . . . . . . . . . . . . . . . . . . . 1152.10.1 A Generalization of Fundamental Groups . . . . . . . . 116

2.11 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1212.12 Exercises (Objective Type) . . . . . . . . . . . . . . . . . . . . 1292.13 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 135References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

3 Actions of Groups, Topological Groups and Semigroups . . . . . . 1373.1 Actions of Groups . . . . . . . . . . . . . . . . . . . . . . . . 1373.2 Group Actions to Counting and Sylow’s Theorems . . . . . . . 142

3.2.1 p-Groups and Cauchy’s Theorem . . . . . . . . . . . . 1443.2.2 Class Equation and Sylow’s Theorems . . . . . . . . . 1453.2.3 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 149

3.3 Actions of Topological Groups and Lie Groups . . . . . . . . . 1513.3.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 152

3.4 Actions of Semigroups and State Machines . . . . . . . . . . . 1553.4.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 157

3.5 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 157References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

4 Rings: Introductory Concepts . . . . . . . . . . . . . . . . . . . . . 1594.1 Introductory Concepts . . . . . . . . . . . . . . . . . . . . . . 1594.2 Subrings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1664.3 Characteristic of a Ring . . . . . . . . . . . . . . . . . . . . . . 1684.4 Embedding and Extension for Rings . . . . . . . . . . . . . . . 1704.5 Power Series Rings and Polynomial Rings . . . . . . . . . . . . 1774.6 Rings of Continuous Functions . . . . . . . . . . . . . . . . . . 1844.7 Endomorphism Ring . . . . . . . . . . . . . . . . . . . . . . . 1864.8 Problems and Supplementary Examples . . . . . . . . . . . . . 188

4.8.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 1934.9 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 201References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

5 Ideals of Rings: Introductory Concepts . . . . . . . . . . . . . . . . 2035.1 Ideals: Introductory concepts . . . . . . . . . . . . . . . . . . . 2035.2 Quotient Rings . . . . . . . . . . . . . . . . . . . . . . . . . . 2065.3 Prime Ideals and Maximal Ideals . . . . . . . . . . . . . . . . . 2095.4 Local Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2135.5 Application to Algebraic Geometry . . . . . . . . . . . . . . . 214

Page 14: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Contents xv

5.5.1 Affine Algebraic Sets . . . . . . . . . . . . . . . . . . 2145.5.2 Ideal of a Set of Points in Kn . . . . . . . . . . . . . . 2155.5.3 Affine Variety . . . . . . . . . . . . . . . . . . . . . . 2175.5.4 The Zariski Topology in Kn . . . . . . . . . . . . . . . 217

5.6 Chinese Remainder Theorem . . . . . . . . . . . . . . . . . . . 2205.7 Ideals of C(X) . . . . . . . . . . . . . . . . . . . . . . . . . . 2225.8 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2275.9 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 235References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

6 Factorization in Integral Domains and in Polynomial Rings . . . . 2376.1 Divisibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2376.2 Euclidean Domains . . . . . . . . . . . . . . . . . . . . . . . . 2436.3 Factorization of Polynomials over a UFD . . . . . . . . . . . . 2466.4 Supplementary Examples (SE-I) . . . . . . . . . . . . . . . . . 2496.5 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2516.6 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 255References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

7 Rings with Chain Conditions . . . . . . . . . . . . . . . . . . . . . 2577.1 Noetherian and Artinian Rings . . . . . . . . . . . . . . . . . . 2577.2 An Application of Hilbert Basis Theorem to Algebraic Geometry 2677.3 An Application of Cohen’s Theorem . . . . . . . . . . . . . . . 2687.4 Supplementary Examples (SE-I) . . . . . . . . . . . . . . . . . 2697.5 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2697.6 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 271References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

8 Vector Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2738.1 Introductory Concepts . . . . . . . . . . . . . . . . . . . . . . 2738.2 Subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2768.3 Quotient Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . 279

8.3.1 Geometrical Interpretation of Quotient Spaces . . . . . 2798.4 Linear Independence and Bases . . . . . . . . . . . . . . . . . 280

8.4.1 Geometrical Interpretation . . . . . . . . . . . . . . . . 2828.4.2 Coordinate System . . . . . . . . . . . . . . . . . . . . 2888.4.3 Affine Set . . . . . . . . . . . . . . . . . . . . . . . . 2888.4.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 289

8.5 Linear Transformations and Associated Algebra . . . . . . . . . 2908.5.1 Algebra over a Field . . . . . . . . . . . . . . . . . . . 300

8.6 Correspondence Between Linear Transformations and Matrices 3038.7 Eigenvalues and Eigenvectors . . . . . . . . . . . . . . . . . . 3108.8 The Cayley–Hamilton Theorem . . . . . . . . . . . . . . . . . 3178.9 Jordan Canonical Form . . . . . . . . . . . . . . . . . . . . . . 3208.10 Inner Product Spaces . . . . . . . . . . . . . . . . . . . . . . . 326

8.10.1 Geometry in Rn and Cn . . . . . . . . . . . . . . . . . 326

Page 15: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

xvi Contents

8.10.2 Inner Product Spaces: Introductory Concepts . . . . . . 3268.11 Hilbert Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . 3308.12 Quadratic Forms . . . . . . . . . . . . . . . . . . . . . . . . . 334

8.12.1 Quadratic Forms: Introductory Concepts . . . . . . . . 3358.13 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3408.14 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 353References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

9 Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3559.1 Introductory Concepts . . . . . . . . . . . . . . . . . . . . . . 3559.2 Submodules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3589.3 Module Homomorphisms . . . . . . . . . . . . . . . . . . . . . 3669.4 Quotient Modules and Isomorphism Theorems . . . . . . . . . 3709.5 Modules of Homomorphisms . . . . . . . . . . . . . . . . . . . 3739.6 Free Modules, Modules over PID and Structure Theorems . . . 375

9.6.1 Free Modules . . . . . . . . . . . . . . . . . . . . . . 3759.6.2 Modules over PID . . . . . . . . . . . . . . . . . . . . 3809.6.3 Structure Theorems . . . . . . . . . . . . . . . . . . . 381

9.7 Exact Sequences . . . . . . . . . . . . . . . . . . . . . . . . . 3859.8 Modules with Chain Conditions . . . . . . . . . . . . . . . . . 3929.9 Representations . . . . . . . . . . . . . . . . . . . . . . . . . . 3949.10 Worked-Out Exercises . . . . . . . . . . . . . . . . . . . . . . 395

9.10.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 3999.11 Homology and Cohomology Modules . . . . . . . . . . . . . . 406

9.11.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 4099.12 Topology on Spectrum of Modules and Rings . . . . . . . . . . 409

9.12.1 Spectrum of Modules . . . . . . . . . . . . . . . . . . 4099.12.2 Spectrum of Rings and Associated Schemes . . . . . . 410

9.13 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 411References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411

10 Algebraic Aspects of Number Theory . . . . . . . . . . . . . . . . . 41310.1 A Brief History of Prime Numbers . . . . . . . . . . . . . . . . 41310.2 Some Properties of Prime Numbers . . . . . . . . . . . . . . . 416

10.2.1 Prime Number Theorem . . . . . . . . . . . . . . . . . 41910.2.2 Twin Primes . . . . . . . . . . . . . . . . . . . . . . . 419

10.3 Multiplicative Functions . . . . . . . . . . . . . . . . . . . . . 42010.3.1 Euler phi-Function . . . . . . . . . . . . . . . . . . . . 42110.3.2 Sum of Divisor Functions and Number of Divisor

Functions . . . . . . . . . . . . . . . . . . . . . . . . . 42310.4 Group of Units . . . . . . . . . . . . . . . . . . . . . . . . . . 42410.5 Quadratic Residues and Quadratic Reciprocity . . . . . . . . . 43010.6 Fermat Numbers . . . . . . . . . . . . . . . . . . . . . . . . . 44310.7 Perfect Numbers and Mersenne Numbers . . . . . . . . . . . . 44510.8 Analysis of the Complexity of Algorithms . . . . . . . . . . . . 448

10.8.1 Asymptotic Notation . . . . . . . . . . . . . . . . . . . 448

Page 16: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Contents xvii

10.8.2 Relational Properties Among the Asymptotic Notations 45110.8.3 Poly-time and Exponential-Time Algorithms . . . . . . 45110.8.4 Notations for Algorithms . . . . . . . . . . . . . . . . 45210.8.5 Analysis of Few Important Number Theoretic

Algorithms . . . . . . . . . . . . . . . . . . . . . . . . 45310.8.6 Euclidean and Extended Euclidean Algorithms . . . . . 45610.8.7 Modular Arithmetic . . . . . . . . . . . . . . . . . . . 46110.8.8 Square and Multiply Algorithm . . . . . . . . . . . . . 461

10.9 Primality Testing . . . . . . . . . . . . . . . . . . . . . . . . . 46310.9.1 Deterministic Primality Testing . . . . . . . . . . . . . 46310.9.2 AKS Algorithm . . . . . . . . . . . . . . . . . . . . . 465

10.10 Probabilistic or Randomized Primality Testing . . . . . . . . . . 46610.10.1 Solovay–Strassen Primality Testing . . . . . . . . . . . 46710.10.2 Pseudo-primes and Primality Testing Based

on Fermat’s Little Theorem . . . . . . . . . . . . . . . 46910.10.3 Miller–Rabin Primality Testing . . . . . . . . . . . . . 474

10.11 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48310.12 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 485References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486

11 Algebraic Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . 48711.1 Field Extension . . . . . . . . . . . . . . . . . . . . . . . . . . 487

11.1.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 49611.2 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498

11.2.1 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . 49911.3 Algebraic Numbers . . . . . . . . . . . . . . . . . . . . . . . . 50011.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50411.5 Algebraic Integers . . . . . . . . . . . . . . . . . . . . . . . . 50411.6 Gaussian Integers . . . . . . . . . . . . . . . . . . . . . . . . . 50611.7 Algebraic Number Fields . . . . . . . . . . . . . . . . . . . . . 50911.8 Quadratic Fields . . . . . . . . . . . . . . . . . . . . . . . . . 51011.9 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51111.10 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 515References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516

12 Introduction to Mathematical Cryptography . . . . . . . . . . . . 51712.1 Introduction to Cryptography . . . . . . . . . . . . . . . . . . . 51712.2 Kerckhoffs’ Law . . . . . . . . . . . . . . . . . . . . . . . . . 51912.3 Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

12.3.1 Brute-Force Search . . . . . . . . . . . . . . . . . . . 52112.4 Some Classical Cryptographic Schemes . . . . . . . . . . . . . 521

12.4.1 Caesarian Cipher or Shift Cipher . . . . . . . . . . . . 52212.4.2 Affine Cipher . . . . . . . . . . . . . . . . . . . . . . 52312.4.3 Substitution Cipher . . . . . . . . . . . . . . . . . . . 52312.4.4 Vigenère Cipher . . . . . . . . . . . . . . . . . . . . . 52512.4.5 Hill Cipher . . . . . . . . . . . . . . . . . . . . . . . . 526

Page 17: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

xviii Contents

12.5 Introduction to Public-Key Cryptography . . . . . . . . . . . . 52712.5.1 Discrete Logarithm Problem (DLP) . . . . . . . . . . . 53012.5.2 Diffie–Hellman Key Exchange . . . . . . . . . . . . . 530

12.6 RSA Public Key Cryptosystem . . . . . . . . . . . . . . . . . . 53212.6.1 Algorithm for RSA Cryptosystem (Rivest et al. 1978) . 53312.6.2 Sketch of the Proof of the Decryption . . . . . . . . . . 53412.6.3 Some Attacks on RSA Cryptosystem . . . . . . . . . . 534

12.7 ElGamal Cryptosystem . . . . . . . . . . . . . . . . . . . . . . 53612.7.1 Algorithm for ElGamal Cryptosystem . . . . . . . . . . 537

12.8 Rabin Cryptosystem . . . . . . . . . . . . . . . . . . . . . . . 53812.8.1 Square Roots Modulo N . . . . . . . . . . . . . . . . . 53812.8.2 Algorithm for a variant of Rabin Cryptosystem . . . . . 540

12.9 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . 54112.9.1 RSA Based Digital Signature Scheme . . . . . . . . . . 543

12.10 Oblivious Transfer . . . . . . . . . . . . . . . . . . . . . . . . 54412.10.1 OT Based on RSA . . . . . . . . . . . . . . . . . . . . 546

12.11 Secret Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . 54712.11.1 Shamir’s Threshold Secret Sharing Scheme . . . . . . . 549

12.12 Visual Cryptography . . . . . . . . . . . . . . . . . . . . . . . 55112.12.1 (2,2)-Visual Cryptographic Scheme . . . . . . . . . . 55212.12.2 Visual Threshold Schemes . . . . . . . . . . . . . . . . 55512.12.3 The Model for Black and White VCS . . . . . . . . . . 55512.12.4 Basis Matrices . . . . . . . . . . . . . . . . . . . . . . 55712.12.5 Share Distribution Algorithm . . . . . . . . . . . . . . 55712.12.6 (2, n)-Threshold VCS . . . . . . . . . . . . . . . . . . 55712.12.7 Applications of Linear Algebra to Visual Cryptographic

Schemes for (n,n)-VCS . . . . . . . . . . . . . . . . . 55812.12.8 Applications of Linear Algebra to Visual Cryptographic

Schemes for General Access Structure . . . . . . . . . 56012.13 Open-Source Software: SAGE . . . . . . . . . . . . . . . . . . 565

12.13.1 Sage Implementation of RSA Cryptosystem . . . . . . 56712.13.2 SAGE Implementation of ElGamal Plulic Key

Cryptosystem . . . . . . . . . . . . . . . . . . . . . . 57612.13.3 SAGE Implementation of Rabin Plulic Key

Cryptosystem . . . . . . . . . . . . . . . . . . . . . . 57712.14 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58012.15 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 583References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

Appendix A Some Aspects of Semirings . . . . . . . . . . . . . . . . . 585A.1 Introductory Concepts . . . . . . . . . . . . . . . . . . . . . . 585A.2 More Results on Semirings . . . . . . . . . . . . . . . . . . . . 588A.3 Ring Congruences and Their Characterization . . . . . . . . . . 591A.4 k-Regular Semirings . . . . . . . . . . . . . . . . . . . . . . . 593A.5 The Ring Completion of a Semiring . . . . . . . . . . . . . . . 596

Page 18: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Contents xix

A.6 Structure Spaces of Semirings . . . . . . . . . . . . . . . . . . 597A.7 Worked-Out Exercises and Exercises . . . . . . . . . . . . . . . 601A.8 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 603References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604

Appendix B Category Theory . . . . . . . . . . . . . . . . . . . . . . . 605B.1 Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605B.2 Special Morphisms . . . . . . . . . . . . . . . . . . . . . . . . 607B.3 Functors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608B.4 Natural Transformations . . . . . . . . . . . . . . . . . . . . . 610B.5 Presheaf and Sheaf . . . . . . . . . . . . . . . . . . . . . . . . 614B.6 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616B.7 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 618References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619

Appendix C A Brief Historical Note . . . . . . . . . . . . . . . . . . . 621C.1 Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . 630References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631

Page 19: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 1Prerequisites: Basics of Set Theory and Integers

Set theory occupies a very prominent place in modern science. There are two gen-eral approaches to set theory. The first is called “naive set theory” and the second iscalled “axiomatic set theory”, also known as “Zermelo–Fraenkel set theory”. Thesetwo approaches differ in a number of ways. The “naive set theory” was initiated bythe German mathematician Georg Cantor (1845–1918) around 1870. According toCantor, “a set is any collection of definite, distinguishable objects of our intuitionor of our intellect to be conceived as a whole”. Each object of a set is called an ele-ment or member of the set. The phrase “objects of our intuition or of our intellect”offers freedom to choose the objects in forming a set and thus a set is completelydetermined by its objects. He developed the mathematical theory of sets to study thereal numbers and Fourier series. Richard Dedekind (1831–1916) also enriched settheory during 1870s. However, Cantor’s set theory was not immediately acceptedby his contemporary mathematicians. His definition of a set leads to contradictionsand logical paradoxes. The most well known of them is the Russell paradox givenin 1918 by Bertrand Russell (1872–1970). Such paradoxes led to axiomatize Can-tor’s intuitive set theory giving the birth of Zermelo–Fraenkel Set Theory. Someauthors prefer to call it Zermelo–Fraenkel–Skolem Set Theory. The reason is that itis the theory of E. Zermelo of 1908 modified by both A. Fraenkel and T. Skolem.In 1910 Hilbert wrote “set theory is that mathematical discipline which today occu-pies an outstanding role in our science and radiates its powerful influence into allbranches of mathematics”. In this chapter, we develop a naive set theory, which isa non-formalized theory using a natural language to describe sets and their basicproperties. For precise description of many notions of modern algebra and also formathematical reasoning, the concepts of relations, Zorn’s Lemma, mappings (func-tions), cardinality of sets, are very important. They form the basics of set theory andare discussed in this chapter. Many concrete examples are based on them. The setof integers plays an important role in the development of science, technology, andhuman civilization. Number theory, in a general sense, is the study of set of integers.It has long been one of the favorite subjects not only for the students but also formany others. In this chapter, some basic concepts and properties of integers, such asPeano’s axioms, well-ordering principle, division algorithm, greatest common divi-

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_1, © Springer India 2014

1

Page 20: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2 1 Prerequisites: Basics of Set Theory and Integers

sors, prime numbers, fundamental theorem of arithmetic and modular arithmetic arestudied. More study on number theory is in Chap. 10.

1.1 Sets: Introductory Concepts

The concept of ‘set’ is very important in all branches of mathematics. We comeacross certain terms or concepts whose meanings need no explanation. Such termsare called undefined terms and are considered as primitive concepts. If one definesthe term ‘set’ as ‘a set is a well defined collection of objects’, then the meaning ofcollection is not clear. One may define ‘a collection’ as ‘an aggregate’ of objects.What is the meaning of ‘aggregate’? As our language is finite, other synonyms,such as ‘class’, ‘family’ etc., will exhaust. Mathematicians accept that there areundefined terms and ‘set’ shall be such an undefined term. But we accept the familiarexpressions, such as ‘set of all integers’, ‘set of all natural numbers’, ‘set of allrational numbers’, ‘set of all real numbers’ etc.

We shall neither attempt to give a formal definition of a set nor try to lay thegroundwork for an axiomatic theory of sets. Instead we shall take the operationaland intuitive approach to define a set. A set is a well defined collection of distin-guishable objects.

The term ‘well defined’ specifies that it can be determined whether or not certainobjects belong to the set in question. In most of our applications we deal with ratherspecific objects, and the nebulous notion of a set, in these, emerge as somethingquite recognizable. We usually denote sets by capital letters, such as A,B,C, . . . .The objects of a set are called the elements or members of the set and are usuallydenoted by small letters, such as a, b, c, . . . . Given a set A we use the notationthroughout ‘a ∈ A’ to indicate that an element a is a member of A and this is readas ‘a is an element of A’ or ‘a belongs to A’; and ‘a /∈ A’ to indicate that theelement a is not a member of A and this is read as ‘a is not an element of A’ or ‘adoes not belong to A’. Since a set is uniquely determined by its elements, we maydescribe a set either by a characterizing property of the elements or by listing theelements. The standard way to describe a set by listing elements is to list elementsof the set separated by commas, in braces. Thus a set A= {a, b, c} indicates that a,b, c are the only elements of A and nothing else. If B is a set which consists of a,b, c and possibly more, then notationally, B = {a, b, c, . . .}. On the other hand, a setconsisting of a single element x is sometimes called singleton x, denoted by {x}.By a statement, we mean a sentence about specific objects such that it has a truthvalue of either true or false but not both. If a set A is described by a characterizingproperty P(x) of its elements x, the brace notation {x : P(x)} or {x | P(x)} is alsooften used, and is read as ‘the set of all x such that the statement P(x) about x istrue.’ For example, A= {x : x is an even positive integer < 10}.

Throughout this book, we use the following notations:

N+ (or Z+) is the set of all positive integers (zero is excluded);N is the set of all non-negative integers (zero is included);

Page 21: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.1 Sets: Introductory Concepts 3

Z is the set of all integers (positive, negative, and zero);Q is the set of all rational numbers (i.e., numbers which can be expressed asquotients m/n of integers, where n �= 0);Q+ is the set of all positive rational numbers;R is the set of all real numbers;R+ is the set of all positive real numbers;C is the set of all complex numbers;∃ denotes ‘there exists’, ∀ denotes ‘for all’.

An implication is a statement of the form ‘P implies Q’ or ‘if P , then Q’ writtenas P ⇒Q. An implication is false if P is true and Q is false; it is true in all othercases. A logical equivalence or biconditional is a statement of the form ‘P impliesQ and Q implies P ’ and abbreviated to if and only if (iff) and written as P ⇔Q.Thus P ⇔Q is exactly true when both P and Q are either true or false.

Two elements a and b of a set S are said to be equal, denoted by a = b iffthey are the same elements, otherwise we denote a �= b. Two sets X and Y aresaid to be equal, denoted by X = Y iff they have the same elements. For example,{2,4,6,8} = {2x : x = 1,2,3,4}.

We introduce a special set which we call the ‘empty (or vacuous or null) set’;denoted by ∅, which we think of as ‘the set having no elements’. The empty set isonly a convention. It is important in the context of logical completeness. As ∅ isthought of as ‘the set with no elements’ the convention is that for any element x, therelation x ∈ ∅ does not hold. Thus {x : x is an even integer such that x2 = 2} = ∅. Ifa set A is such that A �= ∅, then A is called a non-empty (or non-vacuous or non-null) set and its null subset ∅A is {x ∈A : x �= x}. If X and Y are two sets such thatevery element of X is also an element of Y , then X is called subset of Y , denotedby X ⊆ Y (or simply by X ⊂ Y ), which reads X is contained in Y (or equivalently,Y ⊇ X or simply Y ⊃ X: which reads Y contains X). For example, N ⊆ Z andZ⊆Q. Clearly, X ⊆X for every set X.

Proposition 1.1.1 (i) X = Y if and only if X ⊆ Y and Y ⊆X;(ii) All null subsets are equal.

Proof (i) It follows from the definition of equality of sets.(ii) Let A and B be any two sets and ∅A, ∅B be the respective null subsets. If

∅A ⊆ ∅B is false, then there exists at least one element in ∅A which is not in ∅B ;but this is impossible. Consequently, ∅A ⊆ ∅B . Similarly, ∅B ⊆ ∅A. Hence by (i)∅A = ∅B and thus all null subsets are equal. �

Remark There is one and only one null set ∅, and is contained in every set.

If a set X is a subset of a set Y and there exists at least one element of Y whichis not an element of X, then X is called a proper subset of Y , denoted by X⊆

�=Y . If

a set X is not a subset of Y , we write X � Y .

Proposition 1.1.2 A set X of n elements has 2n subsets.

Page 22: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4 1 Prerequisites: Basics of Set Theory and Integers

Proof The number of the subsets having r (≤n) elements out of n elements of X isthe number of combinations of n elements taken r at a time, i.e.,

nCr = n!/r!(n− r)!.Hence the number of all subsets including X and ∅ is

n∑

r=0

nCr = nC0 + nC1 + · · · + nCn = (1+ 1)n = 2n.�

To avoid extraneos elements, we assume that all elements under considerationbelong to some fixed but arbitrary set, called the universal set, denoted by U.

Given two sets, we can combine them to form new sets. We can carry out thesame procedure for any number of sets, finite or infinite. We do so for two sets first,because it leads to the general construction.

Given two sets A and B , we can form a set that consists of exactly all the elementsof A together with all the elements of B . This is called the union of A and B .

Definition 1.1.1 The union (or join) of two sets A and B , written as A ∪B , is theset A∪B = {x : x ∈A or x ∈ B} (‘or’ has been used in the inclusive sense).

Remark In set theory, we say that x ∈ A or x ∈ B . This means x belongs to atleast one of A or B and may belong to both A and B . Clearly, A ∪ A = A; if B

is a subset of A, then A ∪ B = A; if A = {1,2,3}, B = {3,7,8,9}, then A ∪ B ={1,2,3,7,8,9}; A∪ ∅ =A for every set A.

Given two sets A and B , we can form a set that consists of exactly all elementscommon to A and B . This is called the intersection of A and B .

Definition 1.1.2 The meet (or intersection) of two sets A and B , written as A∩B ,is the set A∩B = {x : x ∈A and x ∈ B}.

Clearly, A ∩ A= A; if B is a subset of A, then A ∩ B = B; A ∩ ∅ = ∅; if A={1,2,3}, B = {3,7,8,9}, then A∩B = {3}.

Theorem 1.1.1 Each of the operations ∪ and ∩ is

(a) idempotent: A∪A=A=A∩A, for every set A;(b) associative: A ∪ (B ∪ C)= (A ∪ B) ∪ C and A ∩ (B ∩ C)= (A ∩ B) ∩ C for

any three sets A, B , C;(c) commutative: A∪B = B ∪A and A∩B = B ∩A for any two sets A, B;(d) ∩ distributes over ∪ and ∪ distributes over ∩:

(i) A∩ (B ∪C)= (A∩B)∪ (A∩C);(ii) A∪ (B ∩C)= (A∪B)∩ (A∪C) for any three sets A, B , C.

Page 23: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.1 Sets: Introductory Concepts 5

Proof Verification of (a)–(c) is trivial. We now give a set theoretic proof of (d)(i).The proof is divided into two parts:

A∩ (B ∪C)⊆ (A∩B)∪ (A∩C)

and

(A∩B)∪ (A∩C)⊆A∩ (B ∪C).

Now, x ∈ A ∩ (B ∪ C)⇒ x ∈ A and x ∈ B ∪ C ⇒ (x ∈ A and x ∈ B) or (x ∈ A

and x ∈ C)⇒ x ∈A∩B or x ∈A∩C⇒ x ∈ (A∩B)∪ (A∩C)⇒A∩ (B ∪C)⊆(A∩B)∪ (A∩C), as x is an arbitrary element of A∩ (B ∪C). We now prove thereverse inclusion.

Since B ⊆ B ∪C, A∩B ⊆A∩ (B ∪C).Similarly, A∩C ⊆A∩ (B ∪C).Consequently, (A∩B)∪ (A∩C)⊆A∩ (B ∪C).Hence d(i) follows by Proposition 1.1.1(i). �

Definition 1.1.3 Two non-null sets A and B are said to be disjoint iff A∩B = ∅.

For example, if A is the set of all negative integers, then A∩N+ = ∅.

Definition 1.1.4 The (relative) complement (or difference) of a set A with respectto a set B , denoted by B − A (or B\A) is the set of exactly all elements whichbelong to B but not to A, i.e., B −A= {x ∈ B : x /∈A}.

If U is the universal set, the complement of A in U (i.e., with respect to U) isdenoted by Ac or A′. This implies (A′)′ =A, U′ = ∅, ∅′ =U, A∪A′ =U, A∩A′ =∅, B −A= B ∩A′, B −A �=A−B for A �= B .

Definition 1.1.5 The symmetric difference of two given sets A and B , denoted byA�B , is defined by A�B = (A−B)∪ (B −A).

This implies clearly, A�B = B�A, A�(B�C) = (A�B)�C, A�∅ = A,A�A= ∅, A�B = (A∪B)− (A∩B) and A�C = B�C⇒A= B .

It is extremely useful to imagine geometric figures in terms of which we canvisualize sets and operations on them. A convenient way to do so is to represent theuniversal set U by a rectangular area in a plane and the elements of U by the pointsof the area. Sets can be pictured by circles within this rectangle and diagrams can bedrawn illustrating operations on sets and relations between them. Such diagrams areknown as Venn diagrams, named after John Venn (1834–1923), a British logician.

Our three set operations are represented by shaded regions in Fig. 1.1.The cartesian product is one of the most important constructions of set theory. It

enables us to express many concepts in terms of sets. The concept of cartesian prod-uct owes to the coordinate plane of the analytical geometry. It welds together thesets of a given family into a single new set. With two objects a, b there corresponds

Page 24: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6 1 Prerequisites: Basics of Set Theory and Integers

Fig. 1.1 Venn diagramsrepresenting three setoperations: union,intersection, and setdifference

a new object (a, b), called their ordered pair. Ordered pairs are subject to one con-dition (a, b)= (c, d) iff a = c and b= d . In particular, (a, b)= (b, a) iff a = b; a iscalled the first coordinate and b is called the second coordinate of the pair (a, b).The ancestor of this concept is the coordinate plane of analytic geometry.

Definition 1.1.6 Let A and B be two non-null sets (distinct or not). Their cartesianproduct A×B is the set defined by A×B = {(a, b) : a ∈A,b ∈ B}.

Example 1.1.1 (i) If A = {1,2}, B = {2,3,4}, then A× B = {(1,2), (1,3), (1,4),

(2,2), (2,3), (2,4)}.(ii) If A= B =R1 (Euclidean line), then A×B , being the set of all ordered pairs

of reals, represents the points in the Euclidean plane.

Proposition 1.1.3 A×B �= ∅ if and only if A �= ∅ and B �= ∅.

Proof If A×B �= ∅, then there exists some (a, b) ∈A×B such that a ∈A,b ∈ B .This shows that A �= ∅. B �= ∅. Conversely, if A �= ∅ and B �= ∅, there exist somea ∈A and b ∈ B . As the pair (a, b) ∈A×B,A×B �= ∅. �

Proposition 1.1.4 If C ×D �= ∅, then C ×D ⊆A×B iff C ⊆A and D ⊆ B .

Proof Left as an exercise. �

Proposition 1.1.5 For non-empty sets A and B , A × B = B × A if and only ifA= B (the operation A×B is therefore not commutative).

Proof Left as an exercise. �

If a set A has n elements, then the set A×A has n2 elements.The set of elements {(a, a) : a ∈A} in A×A is called the diagonal of A×A.

Theorem 1.1.2 ‘×’ distributes over ∪, ∩ and ‘−’:

(i) A× (B ∪C)=A×B ∪A×C;(ii) A× (B ∩C)=A×B ∩A×C;

(iii) A× (B −C)=A×B −A×C.

Proof Left as an exercise. �

Remark Definition 1.1.6 is extended to the product of n sets for any positive integern > 2. If A1,A2, . . . ,An are non-empty sets, then their product A1×A2×· · ·×An

Page 25: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.1 Sets: Introductory Concepts 7

is the set of all ordered n-tuples (a1, a2, . . . , an), where ai is in Ai for each i. If inparticular, A1 = A2 = · · · = An = A, then their product is denoted by the symbolAn. These ideas yield well known sets Rn and Cn.

The operation ‘×’ is not associative: (A×B)×C �=A× (B×C) in general [seeEx. 11 of SE-I].

Family of Sets Let I �= ∅ be a set. If for each i ∈ I , there exists a set Ai , then thecollection of sets {Ai : i ∈ I } is called a family of sets, and I is called an indexingset for the family. For some i �= j,Aj may be equal to Ai .

Any non-empty collection Ω of sets can be converted to a family of sets by ‘selfindexing’. We use Ω itself as an indexing set and assign to each member of Ω theset it represents.

We extend the notions of unions and intersections to family of sets.

Definition 1.1.7 Let A be a given set, and {Ai : i ∈ I be a family of subsets of A}.The union

⋃i Ai (or

⋃i∈I Ai or

⋃〈i∈I 〉Ai or

⋃{Ai : i ∈ I }) of the family isthe set

⋃i Ai = {x ∈ A : x ∈ Ai for some i ∈ I } and the intersection

⋂i Ai (or⋂

i∈I Ai or⋂〈i∈I 〉Ai or

⋂{Ai : i ∈ I }) of the family is the set⋂

i Ai = {x ∈A : x ∈Ai for each i ∈ I }.

Clearly, for any set A, A=⋃{{x} : x ∈A} =⋃x∈A{x}. In case of infinite inter-sections and unions, some non-intuitive situations may occur:

Example 1.1.2 (i) Let Ap = {n ∈ Z : n ≥ p,p = 1,2,3, . . .}. Then A1 ⊃ A2 ⊃A3 ⊃ · · · and each Ap is non-empty set such that each Ap contains its successorAp+1. Clearly,

⋂Ap = ∅.

(ii) Let An = [0,1−2−n] and Bn = [0,1−3−n] for each positive integer n. Theneach An is a proper subset of Bn and An �= Br for each n and r . Clearly,

n

An =⋃

n

Bn = [0,1).

Definition 1.1.8 Let A be a non-null set. Its power set P(A) is the set of all subsetsof A.

Clearly, ∅ ∈ P(A) and A ∈ P(A) for any set A; B ⊆ A⇔ B ∈ P(A); a ∈ A⇔{a} ∈ P(A).

Proposition 1.1.6⋂

i P(Ai)=P(⋂

i Ai).

Proof Left as an exercise. �

Remark⋃

i P(Ai) �= P(⋃

i Ai). For example, let A1 = {1}, A2 = {2}. Then⋃i P(Ai) has three elements, viz. ∅, {1} and {2}, whereas P(

⋃i Ai) has four el-

ements viz. ∅, {1}, {2} and {1,2}.

Page 26: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8 1 Prerequisites: Basics of Set Theory and Integers

1.2 Relations on Sets

In mathematics, two types of very important relations, such as equivalence relationand ordered relations arise frequently. Sometimes, we need study decompositionsof a non-empty set X into disjoint subsets whose union is the entire set X (i.e., X

is filled up by these subsets). Equivalence relations on X provide tools to generatesuch decompositions of X and produce new sets bearing a natural connection withthe original set X.

A binary relation R on a non-empty set A is a mathematical concept and intu-itively is a proposition such that for each ordered pair (a, b) of elements of A, wecan determine whether aRb (read as a is in relation R to b) is true or false. Wedefine it formally in terms of the set concept.

Definition 1.2.1 A binary relation R on a non-empty set A is a subset R ⊆A×A

and a binary relation S from A to B is a subset S of A× B . The pair (a, b) ∈ R isalso denoted as aRb.

A binary relation S from A to B is sometimes written as S : A→ B . Instead ofwriting a binary relation on A, we write only a relation on A, unless there is anyconfusion.

Example 1.2.1 For any set A, the diagonal Δ = {(a, a) : a ∈ A} ⊆ A × A is therelation of equality.

In a binary relation R on A, each pair of elements of A need not be related i.e.,(a, b) may not belong to R for all pairs (a, b) ∈A×A.

For example, if a �= b, then (a, b) /∈Δ and also (b, a) /∈Δ.

Example 1.2.2 The relation of inclusion on P(A) is {(A,B) ∈ P(A)×P(A) :A⊆B} ⊆P(A)×P(A).

1.2.1 Equivalence Relation

A fundamental mathematical construction is to start with a non-empty set X and todecompose the set into a family of disjoint subsets of X whose union is the wholeset X, called a partition of X and to form a new set by equating each such subsetto an element of a new set, called a quotient set of X given by the partition. Forthis purpose we introduce the concept of an equivalence relation which is logicallyequivalent to a partition.

Definition 1.2.2 A binary relation R on A is said to be an equivalence relation onA iff

(a) R is reflexive: (a, a) ∈R for all a ∈A;(b) R is symmetric: if (a, b) ∈R, then (b, a) ∈R for a, b ∈A;(c) R is transitive: if (a, b) ∈R and (b, c) ∈R, then (a, c) ∈R for a, b, c ∈A.

Page 27: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 9

Instead of speaking about subsets of A× A, we can also define an equivalencerelation as below by writing aRb in place of (a, b) ∈R.

Definition 1.2.3 A binary relation R on A is said to be an equivalence relationiff R is

(a’) reflexive: aRa for all a ∈A;(b’) symmetric: aRb implies bRa for a, b ∈A;(c’) transitive: aRb and bRc imply aRc for a, b, c ∈A.

Example 1.2.3 Define R on Z by aRb⇔ a−b is divisible by a fixed integer n > 1.Then R is an equivalence relation.

Proof Since a − a = 0 is divisible by n for all a ∈ Z, aRa for all a ∈ Z, hence R

is reflexive. If a − b is divisible by n, then b − a is also divisible by n; hence R

is symmetric. Finally, if a − b and b − c are both divisible by n, then their suma− c is also divisible by n; hence R is transitive. Consequently, R is an equivalencerelation. (See Example 1.2.9.) �

Example 1.2.4 Let T be the set of all triangles in the Euclidean plane. DefineαRβ⇔ α and β are similar for α,β ∈ T . Then R is an equivalence relation.

Definition 1.2.4 A relation R on a set A is said to be antisymmetric iff xRy andyRx imply x = y for x, y ∈A.

Example 1.2.5 Consider the inclusion relation ‘⊆’ on P(A) of a given set A. ThenP ⊆Q and Q⊆ P imply P =Q for two subsets P,Q ∈ P(A); hence ‘⊆’ is anti-symmetric.

Remark The relations: reflexive, symmetric (or antisymmetric) and transitive areindependent of each other.

Example 1.2.6 A relation which is reflexive, symmetric but not transitive: Let R

be the binary relation on Z given by (x, y) ∈ R iff x − y = 0,5 or −5. Then R isreflexive, since x−x = 0⇒ (x, x) ∈R, for all x ∈ Z. R is symmetric, since (x, y) ∈R implies x − y = 0,5 or −5 and hence y − x = 0,−5 or 5, so that (y, x) ∈R. ButR is not transitive, since (12,7) ∈R and (7,2) ∈R but (12,2) /∈R.

Example 1.2.7 A relation which is reflexive and transitive but neither symmetricnor antisymmetric: Let Z∗ be the set of all non-zero integers and R be the relationon Z∗ given by (a, b) ∈R iff a is a factor b, i.e., iff a|b. Since a|a for all a ∈ Z∗; a|band b|c⇒ a|c, hence R is reflexive and transitive. 2|8 but 8|2 is not true; hence R

is not symmetric. Again 7|−7 and −7|7 but 7 �= −7; hence R is not antisymmetric.

Example 1.2.8 A relation which is symmetric and transitive but not reflexive: LetR be the set of all real numbers and ρ be the relation on R given by (a, b) ∈ ρ iffab > 0. Clearly, ρ is symmetric and transitive. Since (0,0) /∈ ρ, ρ is not reflexive.

Page 28: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10 1 Prerequisites: Basics of Set Theory and Integers

Definition 1.2.5 Let X be a non-null set. Then a family P = {Ai : i ∈ I } of subsetsof X is said to be a partition of X iff

(i) Each Ai is non-empty, i ∈ I ;(ii) Ai ∩Aj = ∅ for all i �= j , i, j ∈ I ;(iii)⋃{Ai :Ai ∈ P} =X.

Thus a partition of X is a disjoint class of non-empty subsets of X whose unionis the set X itself and a partition of X is the result of splitting the set X into non-empty subsets in such a way that each x ∈ X belongs to one and only one of thegiven subsets.

Partition of a set is not unique. For example, if X = {1,2,3,4,5,6}, then{1,3,5}, {2,4,6} and {1,2,3,4}, {5,6} are two different partitions of X.

We shall show in Theorem 1.2.9 that there is a bijective correspondence betweenthe set of equivalence relations on a set X �= ∅ and the set of all partitions of X.

Theorem 1.2.1 Let ρ be an equivalence relation on a set X �= ∅ and let foreach x ∈ X, the class (x), denoted by (x) (or [x]), be defined by (x) = {y ∈ X :(x, y) ∈ ρ}. Then

(i) For each x ∈X, x ∈ (x);(ii) If x, y ∈X, either (x)= (y) or (x)∩ (y)= ∅;

(iii)⋃{(x) : x ∈X} =X;

(iv) If Pρ = {(x) : x ∈X}, then Pρ is a partition of X, called the partition inducedby ρ and denoted by X/ρ.

Proof (i) Since ρ is reflexive, (x, x) ∈ ρ for each x ∈X. Hence by definition of (x),x ∈ (x).

(ii) Let (x) ∩ (y) �= ∅. Then there exists some z ∈ (x) ∩ (y). Consequently,(x, z) ∈ ρ and (y, z) ∈ ρ by definition of classes. Let w be an arbitrary elementsuch that w ∈ (x). Then (x,w) ∈ ρ. Now (x, z) ∈ ρ⇒ (z, x) ∈ ρ as ρ is symmetric.So, (z, x) ∈ ρ and (x,w) ∈ ρ⇒ (z,w) ∈ ρ as ρ is transitive, and hence

(y, z) ∈ ρ and (z,w) ∈ ρ ⇒ (y,w) ∈ ρ ⇒ w ∈ (y) ⇒ (x)⊆ (y)

(1.1)as w is an arbitrary element of (x).

Interchanging the role of x and y by symmetric property of ρ, we have

(y)⊆ (x). (1.2)

Hence (1.1) and (1.2) show that (x)= (y).(iii) Since for each x ∈X, x ∈ (x), it follows that

X ⊆⋃{

(x) : x ∈X}. (1.3)

Again as (x)⊆X for each x ∈X, it follows that⋃{

(x) : x ∈X}⊆X. (1.4)

Hence (1.3) and (1.4) show that⋃{(x) : x ∈X} =X.

Page 29: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 11

(iv) By using (ii) and (iii), it follows by definition of a partition that Pρ is apartition of X. �

The class (x) associated with ρ is sometimes denoted by (x)ρ to avoid any con-fusion. The set (x) is called the equivalence class (with respect to ρ) determinedby x.

Converse of Theorem 1.2.1 is also true.

Theorem 1.2.2 Let P be a given partition of a non-null set X. Define a relationρ = ρP (depending on P) on X by (x, y) ∈ ρP iff there exists A ∈ P such thatx, y ∈ A (i.e., iff y belongs to the same class as x). Then ρP is an equivalencerelation, induced by P . Moreover,

(a) P(ρP )=P (partition induced by ρP );(b) ρ(Pρ)= ρ (equivalence relation induced by partition Pρ ).

Proof Let x ∈ X. Since P is a partition, there exists A ∈ P , such that x ∈ A. So,(x, x) ∈ ρ. This implies ρ is reflexive. If (x, y) ∈ ρ, then (y, x) ∈ ρ from the defi-nition of ρ. So, ρ is symmetric. Let (x, y) ∈ ρ and (y, z) ∈ ρ. Then there exist A,B ∈ P such that x, y ∈A and y, z ∈ B . Consequently, y ∈A ∩B . Since P is a par-tition, A= B . Consequently, x, z ∈A ∈ P ; therefore, (x, z) ∈ ρ. So, ρ is transitive.As a result ρ is an equivalence relation.

(a) We now show that P(ρP ) = P . Let A ∈ P and x ∈ A. Then for every y ∈A, (x, y) ∈ ρP . Consequently, y ∈ (x)ρP ⇒ A⊆ (x)ρP . Next let z ∈ (x)ρP . Thenthere exists some B ∈ P such that x, z ∈ B . But x ∈A⇒ x ∈A ∩ B ⇒A= B (bythe property of a partition). Consequently, z ∈A⇒ (x)ρP ⊆A. As a result,

(x)ρP =A, but (x)ρP ∈P(ρP ).

Consequently, P ⊆P(ρP ). Moreover both P and P(ρP ) are partitions of the sameset X. Clearly, P =P(ρP ).

(b) To prove ρ(Pρ)= ρ, let (x, y) ∈ ρ. Then y ∈ (x)ρ ∈Pρ ⇒ (x, y) ∈ ρ(Pρ)⇒ρ ⊆ ρ(Pρ). Again (x, y) ∈ ρ(Pρ)⇒ there is an equivalence class (z)ρ such thatx, y ∈ (z)ρ ⇒ (z, x) ∈ ρ and (z, y) ∈ ρ ⇒ (x, z) ∈ ρ and (z, y) ∈ ρ ⇒ (x, y) ∈ ρ

(by transitive property of ρ)⇒ ρ(Pρ)⊆ ρ. As a result ρ = ρ(Pρ). �

The disjoint classes (x) into which a set X is partitioned by an equivalence re-lation ρ constitute a set, called the quotient set of X by ρ, denoted by X/ρ, where(x) denotes the class containing the element x ∈X. Each element x of the class (x)

is called a representative of (x) and a set formed by taking one element from eachclass is called a representative system of the partition.

The following example shows that the quotient set of an infinite set may be finite.

Example 1.2.9 (i) The set of residue classes Zn: In Definition 1.2.3, we have definedan equivalence relation R on Z; when an integer a (positive, negative or 0) is dividedby a positive integer n, there are n possible remainders, viz., 0,1, . . . , n− 1. If r is

Page 30: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12 1 Prerequisites: Basics of Set Theory and Integers

the remainder for a, then a − r is divisible by n, so that a ∈ (r) = {y ∈ Z : y − r

is divisible by n}. Hence every integer belongs to one and only one of the n classes(0), (1), . . . , (n − 1). Thus the quotient set Z/R consists of the n distinct classes(0), (1), . . . , (n−1); called the set of residue classes modulo n and is denoted by Zn.The integers 0,1, . . . , n− 1 form a representative system of the partition.

The equivalence relation R on Z defined in this example is called the congruencemodulo n. Two integers a and b in the same residue class are said to be congruent,denoted by a ≡ b (modn). The set Zn provides very strong different algebraic struc-tures which we shall study in the subsequent chapters.

(ii) Visual Description of Z12: We can use a clock to describe Z12 visually. Takethe real number line R1 and wrap it around a circumference bearing the numbers 1to 12 located as usual on a clock. Since R1 is infinitely long, it will wrap infinitelymany times around the circle, and so each ‘hour point’ on the clock will coincidewith infinitely many integers. The integers located at the hour r for r = 1,2, . . . ,12are all integers x such that x − r is divisible by 12 i.e., are all integers congruent tor modulo 12 (see also clock arithmetic in Sect. 2.7.3 of Chap. 2).

Example 1.2.10 Let ρ be the binary relation on N+×N+ defined by (a, b)ρ(c, d)⇔ad = bc. Thus ρ is an equivalence relation. We assume commutative, associative,and cancellative laws for multiplication on N+. The relation ρ is clearly reflexiveand symmetric. Next suppose (a, b)ρ(c, d) and (c, d)ρ(e, f ). Then ad = bc andcf = de ⇒ (ad)(cf ) = (bc)(de) ⇒ af = be ⇒ (a, b)ρ(e, f ) ⇒ ρ is transitive.Consequently, ρ is an equivalence relation on N+ ×N+.

Remark If the ordered pair (a, b) ∈ N+ × N+ is written as a fraction ab

, then theabove relation ρ is the usual definition of equality of two fractions: a

b= c

d⇔

ad = bc.

1.2.2 Partial Order Relations

We have made so far little use of reflexive, antisymmetric, and transitive laws. Weare familiar with the natural ordering≤ between two positive integers. This examplesuggests the abstract concept of a partial order relation, which is a reflexive, anti-symmetric, and transitive relation. Partial order relations and their special types playan important role in mathematics. For example, partial order relations are essentialin Zorn’s Lemma, which provides a very powerful tool in mathematics and in latticetheory whose applications are enormous in different sciences.

Definition 1.2.6 A reflexive, antisymmetric, and transitive relation R on a non-empty set P is called a partial order relation. Then the pair (P,R) is called a par-tially ordered set or a poset.

We adopt the symbol ‘≤’ to represent a partial order relation. So writing a ≤ b

in place of aRb, from Definition 1.2.6 it follows that

Page 31: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 13

Fig. 1.2 Hasse diagramrepresenting a < b

(i) a ≤ a for all a ∈ P ;(ii) a ≤ b and b ≤ a in P ⇒ a = b for a, b ∈ P and

(iii) a ≤ b and b ≤ c in P ⇒ a ≤ c for a, b, c ∈ P .

The following three examples are quite different in nature but possess identicalimportant properties.

Example 1.2.11 (i) (R,≤) is a poset, where ‘≤’ denotes the natural ordering in R(i.e., a ≤ b⇔ b−a ≥ 0). Similarly, (R,≥) is a poset under natural ordering≥ in R.

(ii) (P(A),≤) is a poset under the inclusion relation ⊆ between subsets of A.(iii) (N+,≤) is a poset under divisibility relation (i.e., a ≤ b⇔ a divides b in N+,

denoted by a|b).

A poset with a finite number of elements can be conveniently represented bymeans of a diagram, called the Hasse diagram, where a < b is represented by meansof a diagram of the form as shown in Fig. 1.2, where a, b are represented by smallcircles, a being written below b and the two circles being joined by a straight line.Thus we have the following examples of posets as described in Fig. 1.3 of Exam-ple 1.2.12.

Example 1.2.12 In Fig. 1.3, we have shown six different partial order relations((i)–(vi)).

In a poset (P,≤), we say a < b iff a ≤ b and a �= b. If a < b, we say that a

precedes b (or a is a predecessor of b or b succeeds a).

Definition 1.2.7 If a poset (P,≤) is such that, for every pair of elements a, b

of P , exactly one of a < b,a = b, b < a holds [i.e., if any two elements of P arecomparable], then (P,≤) is called a totally (fully or linearly) ordered set or simplyan ordered set or a chain.

Remark The partial order relation in a chain has a fourth property: ‘any two ele-ments are comparable’, in addition to the properties required in Definition 1.2.6.

Fig. 1.3 Different partial order relations

Page 32: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

14 1 Prerequisites: Basics of Set Theory and Integers

Example 1.2.13 (i) The poset (R,≤) (in Example 1.2.11(i)) is totally ordered.(ii) The poset (N+,≤) (in Example 1.2.11(iii)) is not totally ordered, since the

integers 5 and 8 are not comparable, as neither divides the other.(iii) The poset (P(X),≤) (in Example 1.2.11(ii)) is not totally ordered, provided

that X has at least two elements. For example, if X = {1,2,3},A = {1,2},B ={2,3}, then neither A⊆ B nor B ⊆A holds.

Definition 1.2.8 Let (P,≤) be a poset and a, b ∈ P . An element x ∈ P , wherex ≤ a and x ≤ b is called a lower bound of a and b. If x is a lower bound of a, b inP and y ≤ x holds for any lower bound y of a and b, then x (uniquely determined)is called the greatest lower bound (glb or infimum or meet) of a and b and is denotedby a ∧ b (or ab).

Similarly, an element x ∈ P , where a ≤ x and b ≤ x is called an upper bound ofa and b. If x is an upper bound of a, b in P and x ≤ y holds for any upper boundy of a and b, then x (uniquely determined) is called the least upper bound (lub orsupremum or join) of a and b and is denoted by a ∨ b (or a + b).

Definition 1.2.9 A poset in which each pair of elements

(i) has the lub is called an upper semilattice;(ii) has the glb is called a lower semilattice; and

(iii) has both the lub and the glb are called a lattice.

Example 1.2.12(ii)–(iv), as shown in Fig. 1.3, are both upper and lower semi-lattices and hence are lattices. But Example 1.2.12(i), (v) and (vi) are not so. In-deed, Example 1.2.12(i) is neither an upper semilattice nor a lower semilattice;Example 1.2.12(vi) is an upper semilattice but not a lower semilattice; and Exam-ple 1.2.12(v) is a lower semilattice but not an upper semilattice.

The definition of a lower bound and upper bound, glb and lub, can be generalizedfor any given collection of two or more elements of a poset.

Definition 1.2.10 A lattice (P,≤) is said to be complete iff every non-empty col-lection of elements of P has both a glb and a lub.

Example 1.2.14 (i) (P(A),≤) is a poset (cf. Example 1.2.11(ii)). Let P,Q ∈ P(A).Then P ∩Q⊆ P and P ∩Q⊆Q, so P ∩Q is a lower bound of the pair P , Q. Also,if R is any lower bound of the pair P , Q, i.e., R ⊆ P and R ⊆Q, then R ⊆ P ∩Q.This shows that P ∩Q is the glb of the pair P,Q ∈ P(A) i.e., P ∧Q = P ∩Q.Similarly, P ∨Q= P ∪Q. Thus every pair of elements of P(A) has both the glb andthe lub. Hence (P(A),≤) is a lattice. Again for any non-empty collection of subsetsof A, their meet and join are the glb and lub of the given collection, respectively.Hence (P(A),≤) is a complete lattice.

(ii) The poset (N+,≤) in Example 1.2.11(iii) is a lattice, called the divisibil-ity lattice, where x ∧ y = gcd(x, y) and x ∨ y = lcm(x, y), where gcd(x, y) and

Page 33: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 15

lcm(x, y) denote, respectively, the greatest common divisor and least common mul-tiple of x, y ∈N+. But this lattice is not complete. For, the subset X = {1,2,22, . . .}has no lub.

Remark A totally ordered set is a lattice, but its converse is not true in general. FromExamples 1.2.14(ii) and 1.2.13(ii) it appears that (N+,≤) is a lattice, but it is nottotally ordered.

Definition 1.2.11 A lattice (L,≤) is said to be distributive iff x ∨ (y ∧ z)= (x ∨y)∧ (x ∨ z) (or, equivalently, x ∧ (y ∨ z)= (x ∧ y)∨ (x ∧ z)) for all x, y, z ∈ L.

Definition 1.2.12 A lattice (L,≤) is said to be modular (or Dedekind) iff forx, y, z ∈ L,x ∨ y = z ∨ y, x ∧ y = z ∧ y and x ≤ z imply x = z (or, equivalently,for x, y, z ∈ L,x ≤ z, the modular law (x ∨ y)∧ z= x ∨ (y ∧ z) holds in L).

Example 1.2.15 (i) The divisibility lattice (N+,≤) is modular and distributive.(ii) Every distributive lattice is modular but the converse is not true.[Hint. (ii) Let (L,≤) be a distributive lattice and x, y, z ∈ L be such that x ≤ z.

Then x ∨ (y ∧ z)= (x ∨ y)∧ (x ∨ z)= (x ∨ y)∧ z (as L is distributive). This showsby Definition 1.2.12 that L is modular.]

Note that its converse is not true. (See Ex. 10 of Exercises-I and Ex. 20 of SE-I.)

Theorem 1.2.3 If in a poset (P,≤), every subset (including ∅) has a glb in P , thenP is a complete lattice.

Proof Left as an exercise. �

Remark Any non-void complete lattice contains a least element 0 and a greatestelement 1.

Corollary If a poset P has 1, and every non-empty subset X of P has a glb, thenP is a complete lattice.

Example 1.2.16 The pentagonal lattice (L,≤) is not modular, since v(u+ b)= v

and u+ vb= u. As u < v and u+ vb < v(u+ b), the modular law does not hold inL and L is therefore non-modular as shown in Fig. 1.4.

Theorem 1.2.4 A lattice is non-modular iff it contains the pentagonal lattice as asublattice.

Proof Let (L,≤) be non-modular lattice. Then in L there exist five elements u, v,b, u+ b= v+ b, ub= vb, which form the pentagonal lattice as shown in Fig. 1.5.

For the validity of the converse, see Example 1.2.16. �

Page 34: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

16 1 Prerequisites: Basics of Set Theory and Integers

Fig. 1.4 Pentagonal lattice

Fig. 1.5 Pentagonal latticewith u+ b= v+ b= 1 andub= vb= 0

Definition 1.2.13 Let (P,≤) be a poset. An element x ∈ P is said to be a minimalelement of P iff a ∈ P and a ≤ x imply a = x. Similarly, an element x ∈ P is saidto be a maximal element of P iff a ∈ P and x ≤ a imply a = x.

Thus an element x ∈ P is minimal (or maximal) iff no other element of P pre-cedes (or exceeds) x.

Example 1.2.17 (i) The poset (R,≤) (cf. Example 1.2.11(i)) has neither minimalnor maximal elements.

(ii) The minimal elements of the poset (P(X)− ∅,≤) are the singleton subsetsof X.

(iii) In the divisibility lattice, the prime numbers serve as minimal elements.

Note Lattices are used in different areas, such as theoretical computer science,quantum mechanics, social science, biosystems, music etc. For applications of lat-tices to quantum mechanics, the books (Varadarajan 1968) and (Von Neumann1955) are referred to.

Our main aim is now to state ‘Zorn’s Lemma’. A non-constructive criterion forthe existence of maximal elements is given by the so called maximality principle,which is called Zorn’s Lemma (the principle goes back to Hausdorff and Kura-towski, but Zorn gave a formulation of it which is particularly suitable to algebra,analysis, and topology).

Lemma 1.2.1 (Zorn’s Lemma) Let (S,≤) be a non-empty partially ordered set.Suppose every subset A ⊆ S which is totally ordered by ≤ has an upper bound(in S). Then S possesses at least one maximal element.

Page 35: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 17

Remark Zorn’s Lemma is indispensable to prove many interesting results of math-ematics, one is given in this section and some are given in subsequent chapters.

An abstract Boolean algebra has a close connection with lattices. The followingis necessary to understand the concept of Boolean algebra.

By a finite collection of sets we always mean one which is empty or consists ofn sets for some positive integer n and by finite unions and finite intersections wemean unions and intersections of finite collection of sets. If we say that a collectionB of sets is closed under the formation of finite unions, we mean that B containsthe union of each of its finite sub-collections; and since the empty sub-collectionqualifies as a finite sub-collection of B, we see that its union and the empty set, eachis necessarily an element of B. In the same way, a collection of sets, which is closedunder the formation of finite intersections is necessarily an element of B.

We assume that universal set U �= ∅.

Definition 1.2.14 A Boolean algebra of sets is a non-empty collection B of subsetsof U which satisfies the following conditions:

(i) A and B ∈ B imply A∪B ∈ B;(ii) A and B ∈ B imply A∩B ∈ B;

(iii) A ∈ B implies A′ ∈ B.

Since B �= ∅, it contains at least one set A.

Condition (iii) shows that A′ is in B along with A and since A ∩ A′ = ∅ andA ∪ A′ = U , (i) and (ii) show that ∅ ∈ B and U ∈ B. Clearly, {U,∅} is a Booleanalgebra of sets and every Boolean algebra of sets contains it. The other extreme isthe collection of all subsets P(U) of U , which is also Boolean algebra of sets.

Let B be a Boolean algebra of sets. If {A1,A2, . . . ,An} is a non-empty finitesub-collection of B, then A1 ∪ A2 ∪ · · · ∪ An ∈ B and A1 ∩ A2 ∩ · · · ∩ An ∈ B.Moreover ∅,U ∈ B. Clearly, B is closed under the formation of finite unions, finiteintersections and complements. Conversely, let B be a collection of sets which isclosed under the formation of finite unions, finite intersections, and complements.Then ∅ ∈ B and U ∈ B. Clearly, B is a Boolean algebra of sets. Consequently, wemay characterize Boolean algebras of sets as collections of sets which are closedunder the formation of finite unions, finite intersections, and complements.

Remark An abstract Boolean algebra may be defined by means of lattices (Ex. 7 ofExercises-I).

1.2.3 Operations on Binary Relations

Operations on pairs of binary relations arise in many occasions in the study of mod-ern algebra. Such an operation is defined now.

Let R :X→ Y and S : Y → Z be two binary relations. Then the composite S ◦R

of R and S is defined by

Page 36: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

18 1 Prerequisites: Basics of Set Theory and Integers

S ◦ R = {(x, z) ∈ X × Z: if there exists y ∈ Y such that (x, y) ∈R and (y, z) ∈S} ⊆X×Z.

So, S ◦R is a binary relation from X→Z.

If R is a binary relation from X to Y , the inverse R−1 is defined by

R−1 = {(y, x) : (x, y) ∈R}⊆ Y ×X.

So, R−1 is a binary relation from Y to X.

Proposition 1.2.1 Let R :X→ Y and S : Y → Z and T : Z→W be binary rela-tions. Then

(i) (T ◦ S) ◦R = T ◦ (S ◦R) (associative property);(ii) (S ◦R)−1 =R−1 ◦ S−1.

Proof (i) Clearly, both (T ◦ S) ◦ R and T ◦ (S ◦ R) are binary relations from X

to W . Now (x,w) ∈ (T ◦ S) ◦ R ⇔ there exists y ∈ Y such that (x, y) ∈ R and(y,w) ∈ T ◦ S, where x ∈X,w ∈W ⇔ there exists y ∈ Y such that (x, y) ∈ R andthere exists z ∈Z such that (y, z) ∈ S and (z,w) ∈ T ⇔ there exist y ∈ Y and z ∈ Z

such that (x, y) ∈R, (y, z) ∈ S and (z,w) ∈ T . Thus (x,w) ∈ (T ◦S)◦R⇔∃z ∈ Z

such that (x, z) ∈ S ◦R and (z,w) ∈ T ⇔ (x,w) ∈ T ◦ (S ◦R).Consequently, (T ◦ S) ◦R = T ◦ (S ◦R).(ii) Again S ◦R :X→Z⇔ (S ◦R)−1 :Z→X.Clearly, both (S ◦R)−1 and R−1 ◦ S−1 are relations from Z to X.Then for z ∈ Z, x ∈X, (z, x) ∈ (S ◦R)−1 ⇔ (x, z) ∈ S ◦R⇔∃y ∈ Y such that

(x, y) ∈ R and (y, z) ∈ S ⇔ ∃y ∈ Y such that (y, x) ∈ R−1 and (z, y) ∈ S−1 ⇔∃y ∈ Y such that (z, y) ∈ S−1 and (y, x) ∈R−1 ⇔ (z, x) ∈R−1 ◦ S−1.

Consequently, (S ◦R)−1 =R−1 ◦ S−1. �

Example 1.2.18 Let R be a relation on a set S. Then R is an equivalence relationon S iff

(i) Δ⊆R, where Δ= {(x, x) : x ∈ S};(ii) R =R−1 and

(iii) R ◦R ⊆R

hold.

1.2.4 Functions or Mappings

The concept of functions (mappings) is perhaps the single most important and uni-versal notion used in all branches of mathematics. Sets and functions are closelyrelated. They have the capacity for vast and intricate development. We are now in aposition to define a function in terms of a binary relation.

Page 37: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 19

Definition 1.2.15 Let X and Y be two non-empty sets. A function f from X to Y

is defined to be a binary relation f such that

(x, y) ∈ f and (x, z) ∈ f imply y = z

(i.e., f is single valued).

The domain of f denoted by domf , range of f denoted by rangef are definedby

domf = {x ∈X : (x, y) ∈ f for some y ∈ Y}⊆X;

rangef = {y ∈ Y : (x, y) ∈ f for some x ∈X}⊆ Y.

Remark 1 Definition 1.2.15 means for each x ∈ domf , there exists a uniquey ∈ rangef ⊆ Y such that (x, y) ∈ f . Thus a function f from a set X to aset Y is a correspondence which assigns to each x ∈ domf exactly one elementy ∈ rangef ⊆ Y . If (x, y) ∈ f , we write y = f (x); y is called the image of x underf and x is called a preimage of y under f .

Remark 2 In elementary calculus, all the functions have the same range, namely,the real numbers, (depicted geometrically as y-axis), in algebra there are many dif-ferent ranges, so that when we introduce a function it is important to specify boththe domain and the range of the function as part of the definition of a function.

The notation f : X → Y (or f : X f−→ Y ) is used to mean that domf = X.Sometimes it is convenient to denote the effect of the function f on an element x ofX by x �→ f (x).

A function f :X→ Y is sometimes called a map or mapping.

Remark The definition of function identifies with the graph of a function in its usualdefinition (by means of correspondence).

Definition 1.2.16 Two functions f,g : X → Y are said to be equal, denoted byf = g, iff f (x)= g(x) ∀x ∈X.

Definition 1.2.17 Let f : X → Y be a binary relation such that if A ⊆ X andB ⊆ Y , then the image of A under f , denoted by f (A), is defined by

f (A)= {y ∈ Y : (x, y) ∈ f for some x ∈A}⊆ Y ;

the inverse image of B under f denoted by f−1(B) is defined by

f−1(B)= {x ∈X : (x, y) ∈ f for some y ∈ B}= {x ∈X : f (x) ∈ B

}⊆X.

If B ∩ rangef = ∅, f−1(B)= ∅.

Page 38: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

20 1 Prerequisites: Basics of Set Theory and Integers

Let f :X→ Y and A⊆X. Thus f (A) is defined by

f (A)= {y ∈ Y : y = f (x) for some x ∈A⊆X}

= set of all images of points in A under f.

Similarly, f−1(B)=⋃y∈B{f−1(y)}.

Theorem 1.2.5 Let f :X→ Y be a binary relation and A,B ⊆X and C,D ⊆ Y .Then

(1) f (A∪B)= f (A)∪ f (B);(2) f (A∩B)⊆ f (A)∩ f (B);(3) f−1(C ∪D)= f−1(C)∪ f−1(D);(4) f−1(C ∩D)= f−1(C)∩ f−1(D).

More generally, if {Ai : i ∈ I } and {Bj : j ∈ J } are two families of subsets X and Y ,respectively, then

(1’) f (⋃

i∈I {Ai : i ∈ I })=⋃i∈I f (Ai);(2’) f (

⋂{Ai : i ∈ I })⊆⋂{f (Ai) : i ∈ I };(3’) f−1(

⋃{Bj : j ∈ J })=⋃{f−1(Bj ) : j ∈ J };(4’) f−1(

⋂{Bj : j ∈ J })=⋂{f−1(Bj ) : j ∈ J }.

Proof (1’) y ∈ f (⋃{Ai : i ∈ I })⇔ ∃x ∈⋃Ai such that y = f (x)⇔ ∃x ∈ Ai for

some i ∈ I and y = f (x)⇔ for some i ∈ I, y ∈ f (Ai)⇔ y ∈⋃{f (Ai), i ∈ I }.This proves (1’).

(2’) Clearly, M =⋂{Ai : i ∈ I } ⊆ Ai for each i ∈ I ⇒ f (M)⊆ f (Ai) for eachi ∈ I ⇒ f (M)⊆⋂{f (Ai) : i ∈ I }. This proves (2’).

(3’) x ∈ f−1(⋃{Bj : j ∈ J }) ⇔ ∃y ∈ ⋃Bj such that f (x) = y ⇔ ∃y ∈ Bj

for some j ∈ J such that f (x) = y ⇔ x ∈ f−1(Bj ) for some j ∈ J ⇔ x ∈⋃{f−1(Bj ) : j ∈ J }. This proves (3’).(4’) x ∈ f−1(

⋂{Bj : j ∈ J })⇔ f (x) ∈⋂{Bj : j ∈ J } ⇔ f (x) ∈ Bj , for eachj ∈ J ⇔ x ∈ f−1(Bj ), for each j ∈ J ⇔ x ∈⋂j∈J f−1(Bj ). This proves (4’). �

Remark Equality in (2) i.e., f (A ∩ B) = f (A) ∩ f (B) does not occur in general;but occurs iff x1 �= x2 in X ⇒ f (x1) �= f (x2) for all pairs x1, x2 ∈ X i.e., iff f is1–1 (see Definition 1.2.18).

Example 1.2.19 Consider the map f : R2 → R2 by f (x, y) = (x,0). Let A ={(x, y) : x − y = 0} and B = {(x, y) : x − y = 1}. Then A ∩ B = ∅ and f (A) ∩f (B)= x axis, because geometrically, A, B represent parallel lines and both f (A)

and f (B) represent x-axis. Consequently, f (A∩B)= ∅ �= f (A)∩ f (B).

Remark Let there exist a pair x1, x2 ∈X such that x1 �= x2 but f (x1)= f (x2)= y

(say). Take A = {x1}, B = {x2}. Then A ∩ B = ∅, f (A ∩ B) = ∅, f (A) = {y} =f (B). So, f (A) ∩ f (B) = {y} � f (A ∩ B). Equality holds iff x1 �= x2 in X ⇒f (x1) �= f (x2) i.e., iff f is 1–1 (see below).

Page 39: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 21

Definition 1.2.18 A map f :X→ Y is said to be

(i) injective (or one–one i.e., 1–1) iff x, x′ ∈ X, x �= x′ ⇒ f (x) �= f (x′); i.e., iff∀x, x′ ∈X, f (x)= f (x′)⇒ x = x′;

(ii) surjective (or a surjection or onto) iff f (X)= Y ; i.e., iff for each y ∈ Y , ∃ somex ∈X such that f (x)= y;

(iii) bijective (or a bijection or a one-to-one correspondence) iff f is both injectiveand surjective.

Clearly, for any non-null set X, the identity map IX :X→X defined by IX(x)=x ∀x ∈X is bijective.

Remark Dirichlet observed that for two natural numbers m and n (m > n), there isno injective map f : {1,2, . . . ,m}→ {1,2, . . . , n} and proved the following princi-ple known as the ‘Pigeonhole Principle’. This principle states that for two naturalnumbers m and n (m > n), if m objects are distributed over n boxes, then somebox must contain more than one of the objects. In other words, if n objects are dis-tributed over n boxes in such a way that no box receives more than one object, theneach box receives exactly one object.

We now consider some other important concepts related to maps that are fre-quently used in different branches of mathematics.

Definition 1.2.19 Given a function f : X→ Y and A ⊂ X, the function from A

to Y (i.e., the function considered only on A), given by a �→ f (a), ∀a ∈A is calledthe restriction of f to A and is denoted by f |A :A→ Y .

In particular, IX|A : A→ X is called the inclusion map of A into X and is de-noted by i :A ↪→X.

To the contrary, given A⊂X and a function f : A→ Y , a function F :X→ Y

coinciding with f on A (i.e., satisfying F |A= f ) is called an extension of f over X

relative to Y .It is clear from the definitions that restriction of a function is unique but extension

of a function is not unique.If f :X→ Y , A⊂X, and g = f |A :A→ Y , then f is an extension of g over X.

Definition 1.2.20 Let f :X→ Y and g : Y → Z be two functions. The compositeof f and g is the function X→Z given by x �→ g(f (x)), x ∈X.

The composite function is denoted by g ◦ f or simply by gf . Clearly g ◦ f ismeaningful whenever rangef ⊆ domg.

Proposition 1.2.2 Let f :X→ Y and g : Y →Z be two maps. Then

(i) f and g are injective imply that g ◦ f is injective;(ii) f and g are surjective imply that g ◦ f is surjective;

(iii) g ◦ f is injective implies that f is injective;(iv) g ◦ f is surjective implies that g is surjective;(v) f and g are bijective imply that g ◦ f is bijective;

(vi) g ◦ f is bijective implies that f is injective and g is surjective.

Page 40: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

22 1 Prerequisites: Basics of Set Theory and Integers

Proof (i) Let f and g be injective. Then for each x, x′ ∈ X, (g ◦ f )(x) = (g ◦f )(x′) ⇒ g(f (x)) = g(f (x′)) (by definition of g ◦ f ) ⇒ f (x) = f (x′) as g isinjective⇒ x = x′ as f is also injective⇒ g ◦ f :X→ Z is injective.

(ii) Suppose f , g are surjective. Then (g ◦ f )(X) = g(f (X)) (by definition ofg ◦ f )= g(Y ) (as f is surjective) = Z as g is surjective⇒ g ◦ f is surjective.

(v) From (i) and (ii) it follows that if f and g are bijective, then g ◦ f is alsobijective.

(iii), (iv) and (vi) are left as exercises. �

Remark If g ◦ f is bijective, neither f nor g may be bijective.

Example 1.2.20 Let X = {1,2,3}, Y = {3,4,5,6}. Define f : X → Y and g :Y →X by

f (1)= 3, f (2)= 4, f (3)= 5;g(3)= 1, g(4)= 2, g(5)= 3, g(6)= 3.

Then g ◦f = IX . As IX is bijective, g ◦f is bijective but neither f nor g is bijective.

Theorem 1.2.6 Let f :X→ Y , g : Y → Z and h :Z→W be maps. Then (h◦g)◦f = h ◦ (g ◦ f ) (associative law).

Proof ((h ◦g) ◦f )(x)= (h ◦g)(f (x))= h(g(f (x))) and (h ◦ (g ◦f ))(x)= h((g ◦f )(x))= h(g(f (x)), for all x ∈X. Consequently, (h ◦ g) ◦ f = h ◦ (g ◦ f ). �

Let f : X → Y be a binary relation. Then f−1 is always defined as a binaryrelation, but it need not be a function.

For example, if f : R→ R+ is defined by f (x) = x2, ∀x ∈ R, then f−1(x) ={±x1/2} for x > 0⇒ f−1 is not a function as f−1(x) consists of two elements.

In order that f−1 : Y → X is a function it is necessary that (y, x1), (y, x2) ∈f−1 ⇒ x1 = x2 i.e., (x1, y), (x2, y) ∈ f ⇒ x1 = x2 i.e., f (x1)= f (x2)⇒ x1 = x2i.e., f is injective.

Theorem 1.2.7 Let f :X→ Y be a map. Then

(i) f is injective iff there is a map g : Y →X such that g ◦ f = IX .(ii) f is surjective iff there is a map h : Y →X such that f ◦ h= IY .

Proof (i) Let f be injective. Then for each y ∈ f (X) there is a unique x ∈X suchthat f (x)= y. Choose a fixed element x0 ∈X.

Define g : Y →X by

g(y)={

x if y ∈ f (X) and f (x)= y

x0 if y /∈ f (X)

Then g ◦ f = IX .Conversely, let there be a map g : Y → X such that g ◦ f = IX . Since IX is

bijective, it follows from Proposition 1.2.2(vi) that f is injective.

Page 41: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.2 Relations on Sets 23

(ii) Suppose f is surjective. Then f−1(y) ⊆ X is a non-empty set for everyy ∈ Y . For each y ∈ Y , choose xy ∈ f−1(y). Then the map h : Y → X, y �→ xy

is such that f ◦ h= IY .Conversely, let there be a map h : Y → X such that f ◦ h = IY . Since IY is

bijective, f ◦ h is bijective and hence by Proposition 1.2.2(vi) it follows that f issurjective. �

The maps g and h defined in Theorem 1.2.7 are, respectively, called a left inverseof f and a right inverse of f .

If a map f : X → Y has both a left inverse g and a right inverse h, then theyare equal. This is so because g = g ◦ IY = g ◦ (f ◦ h)= (g ◦ f ) ◦ h= IX ◦ h= h.

The map g = h is called an inverse (or two sided inverse) of f . Thus the inverseof a map f (if it exists) is unique.

Corollary A map f : X → Y is bijective ⇔ f has an inverse ⇔ there exists g :Y →X such that g ◦ f = IX and f ◦ g = IY .

Proof Left as an exercise. �

The unique inverse of a bijection f is denoted by f−1. Thus if f is bijective,then for each y ∈ Y , there exists a unique element x ∈ X such that f (x) = y andhence f−1(y) consists of a single element of X. Therefore there exists a corre-spondence that assigns to each y ∈ Y , a unique element f−1(y) ∈X. Accordingly,f−1 : Y →X is a function.

A map satisfying any one condition of Corollary of Theorem 1.2.7 is said to beinvertible.

Theorem 1.2.8 Let f : X → Y and g : Y → Z have inverse functions f−1 :Y → X and g−1 : Z → Y . Then the composite function g ◦ f : X → Z has aninverse function which is f−1 ◦ g−1 :Z→X.

Proof As f : X→ Y and g : Y → Z have inverse functions, then f−1 ◦ f = IX ,f ◦ f−1 = IY , g−1 ◦ g = IY , g ◦ g−1 = IZ .

Now(f−1 ◦ g−1) ◦ (g ◦ f )= f−1 ◦ (g−1 ◦ (g ◦ f )

)= f−1 ◦ ((g−1 ◦ g) ◦ f)

= f−1 ◦ IY ◦ f = f−1 ◦ f = IX.

Similarly, (g ◦ f ) ◦ (f−1 ◦ g−1)= IZ .Hence the theorem follows by using the Corollary of Theorem 1.2.7. �

We now reach the climax of this sequence of theorems.

Theorem 1.2.9 If X is a non-null set, then the assignment ρ �→ X/ρ defines abijection from the set E(X) of all equivalence relations on X onto the set P(X) ofall partitions of X.

Page 42: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

24 1 Prerequisites: Basics of Set Theory and Integers

Proof If ρ is an equivalence relation on X, the set X/ρ of equivalence classes is thepartition Pρ of X by Theorem 1.2.1 so that ρ �→X/ρ =Pρ defines a function

f :E(X)→P(X).

Define a function g :P(X)→E(X) as follows:If P = {Xi : i ∈ I } is a partition of X, let g(P) be the equivalence relation ρP on

X given by:

(a, b) ∈ ρP ⇔ a ∈Xi and b ∈Xi for some (unique) i ∈ I.

Then ρP is an equivalence relation on X by Theorem 1.2.2. Hence g is welldefined. It is clear that g ◦ f = IE(X) and f ◦ g = IP(X)

.Because g(f (ρ)) = g(Pρ) = ρ(Pρ) = ρ (by Theorem 1.2.2(b)), for all ρ ∈

E(X)⇒ g ◦ f = IE(X).

Again (f ◦ g)(P) = f (ρP ) = P(ρP ) = P (by Theorem 1.2.2(a)), for all P ∈P(X)⇒ f ◦ g = IP(X)

.Then the theorem follows from Theorem 1.2.7. �

Obviously, the question arises whether or not given two sets have the same num-ber of elements. For sets of finite number of elements the answer is obtained bycounting the number of elements in each set. But the difficulty arises if the numberof elements of the set is not finite.

The following concept, introduced by German mathematician Georg Cantor(1845–1918), removed this difficulty and led to the theory of sets.

Definition 1.2.21 A set X is equivalent (or similar or equipotent) to a set Y denotedby X ∼ Y iff there is a bijective map f :X→ Y .

Theorem 1.2.10 The relation ∼ on the class of all sets is an equivalence relation.

Proof X ∼ X as IX : X → X is a bijective map for every X. Again X ∼ Y ⇒Y ∼X, since a bijective map f :X→ Y has an inverse f−1 : Y →X which is alsobijective. Finally, X ∼ Y and Y ∼ Z⇒X ∼ Z, since if f :X→ Y and g : Y → Z

are bijective maps, then g ◦ f :X→Z is also bijective. �

Example 1.2.21 (i) Consider the concentric circles C1 = {(x, y) ∈ R × R : x2 +y2 = a2} and C2 = {(x, y) ∈ R×R : x2 + y2 = b2} with center O = (0,0), where0 < a < b and the function f : C2 → C1, where f (x) is the point of intersection ofC1 and the line segment from the center O to x ∈ C2. Then f is a bijection.

The bijection of sets yields equivalent sets. Here C1 and C2 are equivalent as setsas shown in Example-1 of Fig. 1.6.

(ii) Let C∞ =C∪{∞} be the extended complex plane and S2 = {(x, y, z) ∈R3 :x2 + y2 + z2 = 1} be the unit sphere in R3. There exists a bijection f : S2 → C∞[Conway 1973] called stereographic projection, as shown in Example-2 of Fig. 1.6,and hence S2 and C∞ are equivalent sets. Thus C∞ is represented as the sphere S2

called the Riemann sphere.

Page 43: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 25

Fig. 1.6 Example-1 represents the equivalent sets C1 and C2 and Example-2 represents stereo-graphic projection

Definition 1.2.22 A set X is said to be finite iff either X = ∅ or X ∼ Zn for somepositive integer n > 1 i.e., iff X and Zn have the same number of elements.

Proposition 1.2.3 A finite set X cannot be equivalent to a proper subset of X.

Proof It follows from Definition 1.2.22. �

Definition 1.2.23 A set which is not finite is said to be infinite. Z, N are evidentlyexamples of infinite sets.

1.3 Countability and Cardinality of Sets

We are familiar with positive integers 1,2,3, . . . , and in daily life we use them forcounting. They are adequate for counting the elements of a finite set. Beyond thearea of mathematics, all sets are generally finite sets. But in mathematics, we comeacross many infinite sets, such as set of all natural numbers, set of all integers, setof all rational numbers, set of all real numbers, set of all points in a square or in aplane etc. We now describe a method, essentially due to Cantor for counting suchinfinite sets by introducing the concepts of countability and cardinality. The conceptof countability of a set is very important in mathematics, in particular, in algebra,analysis, topology etc. This concept has great aesthetic appeal and develops throughnatural stages into an excellent structure of thought.

Definition 1.3.1 A set X is said to be countable iff either X is finite or there existsa bijection f :X→N+. (In the latter case X is said to be infinitely countable.)

Proposition 1.3.1 Let X be a countable set and f :X→ Y be a bijection. Then Y

is also a countable set.

Page 44: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

26 1 Prerequisites: Basics of Set Theory and Integers

Proof Suppose X is a non-empty finite set. Then there is a bijection g :X→ Zn forsome integer n > 1. Hence g ◦ f−1 : Y → Zn is also a bijection and so Y is finiteand hence Y is countable. If g :X→N+ is a bijection, then g ◦ f−1 : Y →N+ is abijection i.e., X is infinitely countable iff Y is infinitely countable. �

Lemma 1.3.1 Every subset of N+ is countable.

Proof Let A be a subset of N+. If A is finite, the proof is obvious. Next let A be notfinite. Then by well-ordering principle (see Sect. 1.4), A has a least element n1 (say).If {n1} �= A, A− {n1} has a least element n2 (say). If A �= {n1} ∪ {n2} = {n1, n2},the same process is continued to obtain

A= {n1, n2, . . .}.Clearly, there exists a bijection f : A→ N+ by f (nr) = r for r = 1,2,3, . . . .

Consequently, A is countable. �

This result can be generalized as follows.

Theorem 1.3.1 Every subset of a countable set is countable.

Proof Let X be countable and Y ⊆X. If Y = ∅ or Y is finite, the proof is obvious.We now consider the other case. As X is infinitely countable, there exists a bijec-tion f : X→ N+. We define a map g : Y → N+ by taking g = f |Y . Since f is abijection and Y ⊆X, g is injective and hence g : Y → g(Y )⊆N+ is a bijection. Asg(Y ) is countable by Lemma 1.3.1 and g−1 : g(Y )→ Y is a bijection and hence Y

is countable by Proposition 1.3.1. �

If a set X is infinitely countable, then there exists a bijection f : X→ N+. Theparticular x, for which f (x)= n is called the suffix of the element x denoted by xn,for n = 1,2,3, . . . . Every element of X may thus be suffixed, and the elements ofX can be arranged as x1, x2, x3, . . . in order of the suffixes 1,2,3, . . . . The set X,thus arranged, is called a sequence, and is usually denoted by {xn}.

Proposition 1.3.2 Every infinite set contains a countable subset.

Proof Let X be an infinite set and x1 ∈X. Let x2 ∈X−{x1}, x3 ∈X−{x1, x2}, . . . ,xn ∈X − {x1, x2, . . . , xn−1}. Continuing this process, we obtain a sequence of dis-tinct elements x1, x2, . . . , xn, . . . , of X. Then X contains a countable subset {x1,

x2, . . . , xn, . . .}. �

Theorem 1.3.2 The union of a countable aggregate of countable sets is countable.

Proof Let X1,X2, . . . , be a countable aggregate of countable sets Xi . Let Xi ={xi1, xi2, . . . : i ∈ N+}. Then the elements of their union X = X1 ∪ X2 ∪ X3 ∪ · · ·

Page 45: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 27

can be arranged as a double array:

x11, x12, x13, · · ·x21, x22, x23, · · ·

......

......

xi1, xi2, xi3, · · ·...

...... · · ·

where the elements of the ith set Xi are arranged in the ith row. Rearranging theelements we obtain a sequence:

x11; x12, x21; x13, x22, x31; . . .

which consists of ‘blocks’ separated by semicolons, of elements xij , where the nthblock consists of all xij for which i + j = n+ 1, with i increasing. In particular,an element xij occupies the ith position in the (i + j − 1)th block; the positionbeing [{1+ 2+ · · · + (i + j − 2)} + i]th from the beginning. Consequently, X iscountable. �

Theorem 1.3.3 The set Q of all rationals is countable.

Proof The set Q+ of all positive rational numbers is countable by Theorem 1.3.2,since Q+ is the union of the countable aggregate of countable sets X1,X2, . . . ,

Xr, . . . , where Xr is the countable set {n/r} for r = 1,2, . . . . Similarly, Q− of allnegative rational numbers is also countable. Consequently, the set Q=Q+ ∪ {0} ∪Q− is countable.

We now utilize the concept of countability to define a cardinal number. Let Bbe the collection of sets. Then the relation ∼ (equivalent) is an equivalence relationon B (by Theorem 1.2.10). Consequently ∼ partitions B into sets of disjoint equiv-alence classes; each class carries a special name, called a cardinal number. Everyset belongs to a cardinal number; this is generally expressed by saying that a sethas a cardinal number. Finite sets, which are equivalent have the same number ofelements; hence the number of elements of a finite set may be taken as its cardi-nal number. The cardinal numbers of each of the sets ∅, {1}, {1,2}, {a, b, c}, . . . are0,1,2,3, . . . respectively. �

Cantor discovered that the infinite set of all real numbers is not countable. Weprove this by using the following theorem.

Theorem 1.3.4 The set X = (0,1] of all positive real numbers≤1 is not countable.

Proof Assume to the contrary, i.e., assume that X is countable. Then X = {x1, x2,

. . . , xn, . . .}, say. Now each element xn ∈ X can be expressed uniquely as a non-terminating decimal expression: xn = 0.xn1xn2xn3 . . . , where xni ∈ {0,1,2, . . . ,9},in a non-trivial manner (i.e., when all xni , for all i > some m are not zero;

Page 46: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

28 1 Prerequisites: Basics of Set Theory and Integers

a terminating decimal expression is replaced by a non-terminating one, viz.,0.12= 0.119999 . . . ). Then each element in X can be written as follows:

x1= 0.x11 x12 x13 . . .

x2= 0.x21 x22 x23 . . .

......

......

xn=0.xn1 xn2 xn3 . . .

......

...... · · ·

A non-terminating decimal expression y = 0.y1y2y3 . . . yn . . . , where yn is takento be a non-zero digit different from xnn for n = 1,2,3, . . . , does not enter in X,since y differs from every xn at the nth place after decimal. But y determines a realnumber ∈X. This contradicts that every real number r ∈X occurs in the sequence{x1, x2, . . . , xn, . . .}. Consequently, X must be non-countable. �

Corollary The set R of all real numbers is non-countable.

We extend the notion of counting by assigning to every set X (finite or infinite)an object |X|, called its cardinal number or cardinality, defined in such a way that|X| = |Y | if and only if X is equipotent to Y i.e., X ∼ Y . This definition carriessense by Theorem 1.2.10. Thus if X is a finite set of n elements then |X| = n. Theconcept of countability accommodates more infinite sets for determination of theircardinality; e.g., |N| = |Q|. The cardinal number d or c of an infinite set X assertsthat the set is countable or not countable, respectively.

The cardinal number of an infinite set is called a transfinite cardinal number. Inparticular, the cardinal number of N+, and hence also of every infinite countable set,is denoted by the symbol d (or κ0 i.e., aleph with suffix 0). Let the cardinal numberof a set X be denoted by |X|. Then |N+| = d . As R is non-countable, |R| �= d and|R| is denoted by c (or κ1 i.e., aleph with suffix 1); and is called the power (orpotency) of the continuum. In practice, infinite sets have cardinal number d or c.

We now extend the concept of natural ordering of positive integers to the set ofcardinal numbers.

Let A and B be two sets such that |A| = α and |B| = β . Then we say that α ≤ β

(equivalently β ≥ α) iff the set A is equipotent to a subset of B . Also, we say α < β

(or β > α) iff α ≤ β and α �= β hold.

Proposition 1.3.3 d is the smallest transfinite cardinal number.

Proof d ≤ c by Proposition 1.3.2. But d �= c by the Corollary of Theorem 1.3.4. �

The following theorems are used to show that the above relation ‘≤’ is antisym-metric.

Theorem 1.3.5 (Schroeder–Bernstein Equivalence Principle) Let X, X1 and X2 bethree sets such that X ⊃X1 ⊃X2 and X ∼X2. Then X ∼X1.

Page 47: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 29

Proof Since X ∼X2, there exists a bijection f :X→X2. Furthermore, since X ⊃X1, f |X1 is injective and hence X1 ∼ f (X1) = X3 (say) ⊂ X2. Recursively, letf (Xr)=Xr+2, for r = 1,2,3, . . . . Consequently, we have

X ⊃X1 ⊃X2 ⊃X3 ⊃ · · · ⊃Xr ⊃Xr+1 ⊃Xr+2 ⊃ · · · ,where X ∼ X2 ∼ X4 ∼ X6 ∼ · · · and X1 ∼ X3 ∼ X5 ∼ X7 ∼ · · · and hence X −X1 ∼X2−X3 ∼X4−X5 ∼X6−X7 ∼ · · · holds under f . Thus (X−X1)∪ (X2−X3) ∪ (X4 −X5) ∪ (X6 −X7) ∪ · · · ∼ (X2 −X3) ∪ (X4 −X5) ∪ (X6 −X7) ∪ · · ·holds under f .

Let

Y =X ∩X1 ∩X2 ∩X3 ∩ · · · .Then

X = Y ∪ (X−X1)∪ (X1 −X2)∪ (X2 −X3)∪ (X3 −X4)∪ · · · ,and

X1 = Y ∪ (X1 −X2)∪ (X2 −X3)∪ (X3 −X4)∪ (X4 −X5)∪ · · · .Define the map g :X→X1 as follows:

g(x)={

f (x), if x ∈ (X−X1)∪ (X2 −X3)∪ (X4 −X5)∪ · · · ,x, if x ∈ (X1 −X2)∪ (X3 −X4)∪ (X5 −X6)∪ · · · or x ∈ Y.

Then g is a bijection. Consequently, X ∼X1. �

Theorem 1.3.6 (Schroeder–Bernstein Theorem) If for given two sets X and Y ,X ∼ Y1 ⊂ Y and Y ∼X1 ⊂X, then X ∼ Y .

Proof Let f :X→ Y1 be a bijection and f (X1)= Y2. Then X1 ∼ Y2 and Y1 ⊃ Y2.Now Y ⊃ Y1 ⊃ Y2. Moreover, Y ∼ X1 (by hypothesis) and X1 ∼ Y2 ⇒ Y ∼ Y2.Then Y ∼ Y1 by Theorem 1.3.5. Hence X ∼ Y1 and Y ∼ Y1 ⇒X ∼ Y . �

Corollary If α and β are two cardinal numbers such that α ≤ β and β ≤ α, thenα = β .

Applications of Zorn’s Lemma and the Schroeder–Bernstein Theorem

A(i) Let A be a partially ordered set. Then ∃ a totally ordered subset of A which isnot a proper subset of any other totally ordered subset of A.

Proof Let B be the class of all totally ordered subsets of A. Order B partially by setinclusion. We prove by Zorn’s Lemma (Lemma 1.2.1) that B has a maximal element.Let A= {Bi : i ∈ I } be a totally ordered subclass of B and X =⋃{Bi : i ∈ I }. ThenBi ⊂ A ∀Bi ∈A⇒X ⊂A. We claim that X is totally ordered. Let x, y ∈X. Then∃Bj , Bk ∈ A such that x ∈ Bj , y ∈ Bk for some j, k ∈ I . As A is totally ordered

Page 48: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

30 1 Prerequisites: Basics of Set Theory and Integers

by set inclusion, one of them is a subset of other. Without loss of generality, letBj ⊂ Bk . Then x, y ∈ Bk ∈ A, a totally ordered subset of A. Hence either x ≤ y

or y ≤ x. Then X is a totally ordered subset of A and hence X ∈ B. As Bi ⊂ X

∀Bi ∈ A,X is an upper bound of A. Thus every totally ordered subset of B hasan upper bound in B. Hence by Zorn’s Lemma B has a maximal element. In otherwords, ∃ a totally ordered subset of A which is not a proper subset of any othertotally ordered subset of A. �

A(ii) Let {Ai}ı∈I be any infinite family of countable sets. If A=⋃i∈I Ai , then cardA≤ card I , i.e., |A| ≤ |I |.

Proof If I is countably infinite, then A being the countable union of countable setsis also countable by Theorem 1.3.2. If I is uncountable, then A can be representedby Zorn’s Lemma as the union of a disjoint family of countably infinite subsets.Hence card A≤ card I . �

B Let I = [0,1] and In = {(x1, x2, . . . , xn) : xi ∈ I, for i = 1, . . . , n} be the n-dimensional unit cube. Then I ∼ In.

Proof Define T = {(x,0,0, . . . ,0) ∈ In}. Then T ⊂ In. Define a bijection f : I →T by f (x)= (x,0,0 . . . ,0).

Hence I ∼ T ⊂ In.Again for (x1, x2, . . . , xn) ∈ In, xi can be expressed uniquely as a non-terminating

decimal expression:

xi = 0.xi1xi2 . . . , for i = 1,2, . . . , n.

Now define an injective map g : In→ I by

g(0.x11x12 . . . ,0.x21x22 . . . , . . . ,0.xn1xn2 . . .)= 0.x11x21 . . . xn1x12x22 . . . xn2 . . . .

Then g yields a bijection from In onto g(In)= V ⊂ I .Thus In ∼ V ⊂ I .By the Schroeder–Bernstein Theorem, (i) and (ii) yield In ∼ I . �

Remark The cardinal numbers of In and I are the same.

There is a question arising naturally: does there exist any transfinite cardinalnumber greater than c? The answer is affirmative. The following theorem prescribesa definite method for obtaining a set, whose cardinal number is greater than thecardinal number of the given set.

Theorem 1.3.7 If A is a non-empty set and P(A) is its power set, then |A|< |P(A)|.

Proof The map f : A→ P(A) defined by f (a) = {a}, for all a ∈ A is injective.Hence, |A| ≤ |P(A)|. But there is no bijection g : A→ P(A) (see Ex. 8 of SE-I).Hence, |A| �= |P(A)| implies that |A|< |P(A)|. �

Page 49: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 31

Using this theorem and the result in Ex. 14 of SE-I, the following corollary fol-lows.

Corollary For any cardinal number α, α < 2α , where α is the cardinality of someset A and 2α is the cardinality of the set of all functions from A to {0,1}. In partic-ular, c < 2c .

Remark Like natural numbers, the law of trichotomy holds for cardinal numbers.

1.3.1 Continuum Hypothesis

We have shown the existence of three distinct transfinite cardinal numbers d , c and2c such that d < c < 2c.

We now state the following natural questions which are still unsolved:

Unsolved Problem 1 Does there exist any cardinal number α such that d < α < c?

Unsolved Problem 2 Does there exist any cardinal number β such that c < β < 2c?

Cantor’s continuum hypothesis stated by Georg Cantor in 1878 says that there isno cardinal number α strictly lying between d and c. Karl Gödel showed in 1939that if the usual axioms of set theory are consistent, then the introduction of con-tinuum hypothesis does not make any inconsistency [see Cohn (2002)]. Again, thegeneralized continuum hypothesis asserts that there is no cardinal number β satis-fying α < β < 2α , for any transfinite cardinal α. P.J. Cohen showed in 1963 thatthe generalized continuum hypothesis is independent of axioms of set theory [seeCohen (1966)].

Supplementary Examples (SE-I)

1 Let A, B , C, and D be non-empty sets. Then

(i) (A×B)∩ (C ×D)= (A∩C)× (B ∩D);(ii) (A×B)⊆ C ×C⇒A⊆ C;

(iii) A×B = B ×A⇔A= B (see Proposition 1.1.5);(iv) A �= B⇒A×B �= B ×A.

[Hint. (i) (a, b) ∈ (A×B)∩ (C×D)⇒ (a, b) ∈A×B and (a, b) ∈ (C×D)⇒a ∈A,b ∈ B,a ∈ C and b ∈D⇒ a ∈A ∩C and b ∈ B ∩D⇒ (a, b) ∈ (A ∩C)×(B ∩D)⇒ (A×B)∩ (C ×D)⊆ (A∩C)× (B ∩D).

Similarly, (a, b) ∈ (A ∩ C)× (B ∩D)⇒ (a, b) ∈ (A× B) ∩ (C ×D)⇒ (A ∩C)× (B ∩D) ⊆ (A× B) ∩ (C ×D). Consequently, (A× B) ∩ (C ×D) = (A ∩C)× (B ∩D).

(ii) Let b be an arbitrary element of B . Then a ∈A⇒ (a, b) ∈A×B ⊆ C×C⇒a ∈ C⇒A⊆ C.

Page 50: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

32 1 Prerequisites: Basics of Set Theory and Integers

(iii) (a, b) ∈A×B = B×A⇒ a ∈ B and b ∈A⇒A⊆ B and B ⊆A⇒A= B .The converse is trivial.

(iv) Suppose A �= B . If possible A× B = B × A. Then (iii) yields A = B ⇒ acontradiction.]

2 For each n ∈N+, let An = [0, 1n]. Then

⋂∞n=1 An = {0}.

[Hint. Let M =⋂∞n=1 An. Clearly 0 ∈M . We claim that M = {0}. Otherwise,there is a real number x ∈M such that 0 < x ≤ 1

nfor all n ∈N+. Then n < 1

xfor all

n ∈N+ ⇒ a contradiction.]

3 Let A, B be two given sets such that A⊂ B . A relation ρ is defined on P(B) by(X,Y ) ∈ ρ⇔X ∩A= Y ∩A. Then

(i) ρ is an equivalence relation;(ii) ρ class ∅ρ of ∅ is P(B −A);

(iii) |A| =m⇒ |P(B)/ρ| = 2m.

4 (i) A relation ρ on R2 is defined by ((a, b), (x, y)) ∈ ρ ⇔ a + y = b+ x. Thenρ is an equivalence relation.

(ii) Let ρ and μ be the relations on R defined by ρ = {(x, y) : x2 + y2 = 1} andμ = {(y, z) : 2y + 3z = 4}. Then μ ◦ ρ = {(x, z) : 4x2 + 9z2 − 24z + 12 = 0} (byeliminating y from the above two equations).

Remark Considering R2 as the Euclidean plane, the ρ-class (a, b)ρ, in 4(i), rep-resents geometrically the straight line having gradient 1 and passing through thepoint (a, b).

5 Let Mn(R) denote the set of n× n real matrices. Define a binary relation ρ onMn(R) by (A,B) ∈ ρ ⇔ Ar = Bt for some r , t ∈ N+. Then ρ is an equivalencerelation.

6 For any real x, the symbol [x] denotes the greatest integer less than or equal to x

(for existence of [x], see Ex. 5 of SE-II).

(a) Let the relation ρ be defined on R by (x, y) ∈ ρ ⇔ [x] = [y]. Then ρ is anequivalence relation and for each n ∈N+, nρ = [n,n+ 1).

(b) Let f,g : N+ → N+ be the mapping given by f (x) = 2x, g(x) = [ 12 (x + 1)].

Then f is injective but not surjective, and g is surjective but not injective.(c) Let h :N+ → Z be defined by h(n)= (−1)n[n2 ].

Then h is a bijection.

7 Let the relation ρ be defined on N+ × N+ by (a, b)ρ(x, y)⇔ a + y = b + x.Then ρ is an equivalence relation. Define a map f : (N+ ×N+)/ρ→ Z by

f((a, b)ρ

)= a − b, ∀a, b ∈N+.

Then f is well defined and bijective.

Page 51: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 33

8 Let S be a non-empty set. Then there exists no bijection f : S→ P(S).[Hint. If possible there exists a bijection f : S → P(S). Define A by the

rule: A = {x ∈ S : x /∈ f (x)}. Then A ∈ P(S). Clearly, f is a bijection ⇒there exists an s ∈ S such that f (s) = A. Now the definition of A showsthat if s ∈ A, then s /∈ f (s) = A and conversely. This yields a contradic-tion.]

9 Let A= {0,1} and B , C be non-empty sets and f : B → C be a non-surjectivemap. Then there exist distinct maps g,h : C→A such that g ◦ f = h ◦ f .

[Hint. Define g,h : C→A by g(x)= 0 for all x ∈ C and h(x)= 0 if x ∈ Imf �C = 1 if x ∈ (C − Imf) (�= ∅). Show that g �= h but g ◦ f = h ◦ f .]

10 If f :A→ B , g : B→ C and h : B→ C are maps such that g ◦ f = h ◦ f andf is surjective. Then g = h.

[Hint. Let b be an arbitrary element of B . Then there exists some a ∈A such thatb = f (a), since f is surjective. Now g(b)= g(f (a))= (g ◦ f )(a)= (h ◦ f )(a)=h(f (a)) = h(b) ⇒ g = h (since g,h : B → C and b is an arbitrary elementof B).]

11 (A×B)×C =A× (B ×C)⇔ at least one of the sets A, B , C is empty.[Hint. If one of the sets A, B , C is empty, then by Proposition 1.1.3, (A×B)×

C = ∅=A× (B ×C). Conversely, suppose (A×B)×C =A× (B ×C). If noneof the sets A, B , C is ∅, then there exists at least one element (a, c) ∈ (A×B)×C

where a ∈ A × B and c ∈ C. By hypothesis (a, c) ∈ A × (B × C)⇒ a ∈ A⇒a contradiction.]

12 (i) Any two open intervals (a, b) and (c, d) are equivalent;(ii) All the intervals (0,1), [0,1) and (0,1] are equivalent to [0,1];(iii) Any open interval is equivalent to [0,1];(iv) R is equivalent to [0,1].[Hint. (i) The map f : (a, b)→ (c, d) defined by f (x) = c + d−c

b−a(x − a) is a

bijection.(ii) Let A = {x ∈ (0,1) : x cannot be expressed in the form 1

nfor integers n >

1} = (0,1)− { 12 , 1

3 , 14 , . . .}. Hence (0,1)=A∪ { 1

2 , 13 , 1

4 , . . .}.Then the function f : [0,1]→ (0,1) defined by

f (x) = 1

n+ 2if x = 1

n, n ∈N+

= 1

2if x = 0

= x if x ∈A

is a bijection.

Page 52: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

34 1 Prerequisites: Basics of Set Theory and Integers

The sets [0,1] and [0,1) are equivalent under the bijection g : [0,1] → [0,1)

defined by

g(x) = x if x �= 1

n, n ∈N+

= 1

n+ 1if x = 1

n, n ∈N+.

(iii) Any open interval (a, b) is equivalent to (0,1) by (i) and (0,1) is equivalentto [0,1] by (ii). Hence (a, b) is equivalent to [0,1] by Theorem 1.2.10.

(iv) Consider the bijection f : (−π2 , π

2 )→R defined by f (x)= tanx. Then use(iii) and Theorem 1.2.10.]

13 For any non-empty set A, the collection B(A) of all characteristic functions onthe power set of A is equivalent to the power set P(A).

[Hint. Define the function f : P(A)→ B(A) by f (X) = χX , the characteristicfunction of X, given by

χX :X→{0,1};where

χX(x) = 1 if x ∈X

= 0 if x ∈A−X =X′.Then f is a bijection.]

14 Let f :A→ B be one–one. Then f induces a set function f ∗ : P(A)→ P(B)

such that f ∗ is one–one.[Hint. Define f ∗ :P(A)→ P(B) by f ∗ (X)= f (X).If A= ∅, P(A)= {∅} and hence f ∗ is one–one.If A �= ∅, P(A) has at least two elements. Let X,Y ∈ P(A) be such that X �= Y .

Then ∃p ∈ X such that p /∈ Y , (or p ∈ Y , p /∈ X). Thus f (p) ∈ f (X) and sincef is one–one, f (p) /∈ f (Y ) (or f (p) ∈ f (Y ) but f (p) /∈ f (X)). Hence f (X) �=f (Y )⇒ f ∗ is one–one.]

15 Let ρ be an equivalence relation on a non-empty set A. Then the natural pro-jection map p : A→ A/ρ defined by p(a) = aρ = (a), the equivalence class of a

under ρ is not injective but surjective.

16 Let f : A→ B be a map and ρ be an equivalence relation on A defined byaρb⇔ f (a) = f (b). Let f : A/ρ → f (A) be the map defined by f (aρ) = f (a).Then f is a bijection.

[Hint. (i) f is independent of the choice of the representatives of the classes andhence f is well defined. Again for any x ∈ f (A), ∃a ∈A such that x = f (a). Thenf (aρ)= f (a)= x shows that f is surjective. Clearly, f is a bijection.]

Page 53: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 35

Fig. 1.7 Graphs of ρ and ρ−1

17 Let ρ be the relation on R defined by xρy⇔ 0≤ x− y ≤ 1. Express ρ and ρ−1

as subsets of R×R and draw their graphs, where

ρ = {(x, y) : x, y ∈R, 0≤ x − y ≤ 1}⊂R×R

and

ρ−1 = {(x, y) : (y, x) ∈ ρ}= {(x, y) : x, y ∈R, 0≤ y − x ≤ 1

}⊂R×R.

[Hint. See Fig. 1.7.]

18 Let ρ be a relation from a set A to a set B . Then ρ uniquely defines a subset ρ∗of A×B as follows:

ρ∗ = {(a, b) ∈A×B : aρb}⊂A×B.

Again any subset ρ∗ of A × B defines a relation ρ from A to B by aρb ⇔(a, b) ∈ ρ∗.

Domain of ρ = {a ∈A : (a, b) ∈ ρ for some b ∈ B},

Range of ρ = {b ∈ B : (a, b) ∈ ρ for some a ∈A}.

Note that this correspondence between the relation ρ from A to B and subsets ofA×B justifies Definition 1.2.1.

Let ρ be a relation from A to B , i.e., ρ ⊂ A× B and suppose that the domainof ρ is A. Then ∃ a subset f ∗ of ρ such that f ∗ is a function from A into B .

Let B be the class of subsets f of ρ such that f ⊂ ρ is a function from a subset ofA into B . Order B partially by set inclusion. If f :A1 → B is subset of g :A2 → B ,then A1 ⊂A2.

Page 54: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

36 1 Prerequisites: Basics of Set Theory and Integers

Fig. 1.8 Modular but notdistributive lattice

[Hint. Let A = {fi : Ai → B}i∈I be a totally ordered subset of B. Then f =⋃i fi is a function from

⋃i Ai into B . Moreover, f ⊂ ρ. Hence f is an upper

bound of A. Then, by Zorn’s Lemma, B has a maximal element f ∗ : A∗ → B . Weclaim that A∗ = A. If A∗ �= A, ∃a ∈ A such that a /∈ A∗. Since domain of ρ = A,∃ an ordered pair (a, b) ∈ ρ. Hence f ∗ ∪ {(a, b)} is a function from A∗ ∪ {a} into B .This contradicts the fact that f ∗ is a maximal element in B. Hence A∗ = A provesthe result.]

19 Let ρ be the relation on N+ defined by (a, b) ∈ ρ ⇔ a < b. Hence (a, b) ∈ρ−1 ⇔ b < a. Then ρ ◦ ρ−1 �= ρ−1 ◦ ρ.

[Hint. ρ ◦ ρ−1 = {(x, y) ∈ N+ × N+ : ∃b ∈ N+ such that (x, b) ∈ ρ−1, (b, y) ∈ρ} = {(x, y) ∈ N+ × N+ : ∃b ∈ N+ such that b < x,b < y} = (N+ − {1}) ×(N+ − {1}).

Again

ρ−1 ◦ ρ = {(x, y) ∈N+ ×N+ : ∃b ∈N+ such that (x, b) ∈ ρ, (b, y) ∈ ρ−1}

= {(x, y) ∈N+ ×N+ : ∃b ∈N+ such that x < b,y < b}

=N+ ×N+.]

20 The lattice given by the following poset is modular, but not distributive, asshown in Fig. 1.8. Because x ∨ (y ∧ z)= x ∨ 0= x �= 1= (x ∨ y)∧ (x ∨ z).

1.3.2 Exercises

Exercises-I

1. Let U be the universal set and A, B , S, T , X are sets. Prove that

(i) A∩B ⊆A and A∩B ⊆ B;(ii) U ∩A=A;

(iii) A∩ ∅= ∅;(iv) (A−B)⊆A;(v) (A−B)∩B = ∅;

(vi) B −A⊆A′;(vii) B −A′ = B ∩A;

(viii) A∩ (B�C)= (A∩B)�(A∩C);

Page 55: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.3 Countability and Cardinality of Sets 37

Fig. 1.9 Commutativity ofthe diagram

(ix) (A∪B)∩ (A∪B ′)=A;(x) (A∩B)∪ (A∩B ′)=A;

(xi)(A∪B)′ =A′ ∩B ′ and (A∩B)′ =A′ ∪B ′︸ ︷︷ ︸

De Morgan’s Law.

(xii) S ⊆ T ⇒ S ∪X ⊆ T ∪X and S ∩X ⊆ T ∩X for any set X;(xiii) S ⊆ T and T ⊆X⇒ S ⊆X;(xiv) S ⊆ T ⇔ S ∩ T = S;(xv) T ⊆ S⇔ S = T ∪ S;

(xvi) T ⊆ S⇒ (S − T )∪ T = S;(xvii) S × T = T × S⇔ either S = T or at least one of S, T is ∅;

(xviii) S × T = S ×A⇔ either T =A or S = ∅;(xix) (S × T )×A= S × (T ×A)⇔ at least one of the sets S, T , A is ∅.

2. Prove the following:

(i) If S is any set, then S × S is an equivalence relation on S.(ii) If ρ and σ are symmetric relations on a set A, then ρ◦σ is also a symmetric

relation on A⇔ ρ ◦ σ = σ ◦ ρ.(iii) If a relation ρ on a set A is transitive, then σ−1 is also transitive on A.(iv) ρ is a reflexive and transitive relation on A⇒ ρ ∩ ρ−1 is an equivalence

relation.

3. If A and B are two sets and f :A→ B is a surjection, then show that

(i) f induces an equivalence relation ρ on A;(ii) there is a surjection g :A→A/ρ; and

(iii) there is a bijection h : B→A/ρ such that the diagram as shown in Fig. 1.9is commutative, i.e., h ◦ f = g.

4. If A, B , C are sets, then show that

(a) (i) A×B ∼ B ×A;(ii) (A×B)×C ∼A×B ×C ∼A× (B ×C);

(b) (0,1)∼R.

5. Let L be a lattice. If x, y, z ∈ L, then prove that

(i) x ∧ x = x and x ∨ x = x;(ii) x ∧ y = y ∧ x and x ∨ y = y ∨ x;

(iii) x ∧ (y ∧ x)= (x ∧ y)∧ z and x ∨ (y ∨ z)= (x ∨ y)∨ z;(iv) (x ∧ y)∨ x = x and (x ∨ y)∧ x = x.

6. Let L be a non-empty set in which two operations ∧ and ∨ are defined andassume that these operations satisfy the conditions of Exercise 5. A binary rela-tion ≤ are defined on L : x ≤ y⇔ x∧y = x. Then prove that (L,≤) is a latticein which x ∧ y and x ∨ y are the glb and lub of x and y, respectively.

Page 56: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

38 1 Prerequisites: Basics of Set Theory and Integers

Fig. 1.10 Diamond lattice

7. A lattice (L,≤) is said to be complemented iff it contains distinct elements 0and 1 such that 0 ≤ x ≤ 1 for every x ∈ L and each element x has a comple-ment x′ with the property: x∧x′ = 0 and x∨x′ = 1. Boolean algebra is definedto be a complemented distributive lattice. If B is a Boolean algebra, then provethat

(i) each element has only one complement;(ii) 0′ = 1 and 1′ = 0;

(iii) x ≤ y⇔ y′ ≤ x′ for x, y ∈ B;(iv) (x ∧ y)′ = x′ ∨ y′ and (x ∨ y)′ = x′ ∧ y′ for all x, y ∈ B .

8. Prove the following:

(a) If in a poset P , every subset (including ∅) has a glb in P , then P is acomplete lattice.

(b) If a poset P has 1, and every non-empty subset X of P has a glb, then P isa complete lattice.

9. If L is a lattice, prove that the following statements are equivalent:

(i) L is distributive;(ii) ab+ c= (a + c)(b+ c);

(iii) ab+bc+ ca = (a+b)(b+ c)(c+a),∀a, b, c ∈ L, (where a∧b= ab anda ∨ b= a + b).

10. Give an example of a lattice which is modular but not distributive. Consider thediamond as shown in Fig. 1.10. This lattice is modular, as there is no pentagon.But it is not distributive, since a(b+c)= a1= a and ab+ac= 0⇒ a(b+c) �=ab+ ac.

11. Prove the following:

(i) If A and B are two finite sets such that |A| = m and |B| = n, then |A×B| =mn;

(ii) If |X| = n, then

(a) the set of all possible mappings X→X consists of nn elements;(b) the set of all bijections X→X consists of n! elements (each bijection

on X is called a permutation of X).

12. Let α and β be cardinal numbers and A, B disjoint sets that |A| = α, |B| = β .Define α+ β = |A∪B|, αβ = |A×B| and βα = |BA|, the cardinal number ofthe set BA of all functions from A to B . Prove that for any cardinal numbers α,β and γ ,

Page 57: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.4 Integers 39

(i) (α + β)+ γ = α + (β + γ );(ii) (αβ)γ = α(βγ );

(iii) α+ β = β + α;(iv) αβ = βα;(v) α(β + γ )= αβ + αγ ;

(vi) αβαγ = αβ+γ ;(vii) (αβ)γ = αβγ ;

(viii) (αβ)γ = aγ βγ .

13. Show by examples that the cancellation law for the operations of addition andmultiplication of cardinal numbers is not true.

14. Let α = |A| and β = |B|. Furthermore, let A ∼ Bi ⊆ B; i.e., suppose there isa mapping f : A→ B which is injective. Then write A ≤ B which reads ‘Aprecedes B’, and α ≤ β which reads ‘α is less than or equal to β’.

Suppose A < B means A≤ B and A �= B; α < β means α ≤ β and α �= β .Then prove the following:

(i) the relation on sets defined by A ≤ B is reflexive and transitive, and therelation on the cardinal numbers defined by α ≤ β is also reflexive andtransitive;

(ii) for any cardinal number α, α < 2α (Cantor’s Theorem);(iii) for cardinal numbers α and β , α ≤ β and β ≤ α⇒ α = β .

1.4 Integers

We are familiar with positive integers as natural numbers from our childhoodthrough the process of counting and start mathematics with them in an informalway by learning to count followed by learning addition and multiplication, the latterbeing a repeated process of addition. The discovery of positive integers goes back toearly human civilization. Leopold Kronecker (1823–1891), a great mathematician,once said ‘God made the positive integers, all else is due to man’. The aim of thissection is to establish certain elementary properties of integers, which we need inorder to develop and illustrate the materials of later chapters. Moreover, some re-sults on theory of numbers are proved in Chap. 10 with an eye to apply them toBasic Cryptography (Chap. 12).

G. Peano (1858–1932), an Italian mathematician, first showed in 1889 that thepositive integers can be defined formally by a set of axioms, which is now known asPeano’s axioms, which form the foundation of arithmetic.

Peano’s Axiom A non-empty set N+, having the following properties is calledthe set of natural numbers and every element of N+ is called a natural number:

(1) to every n ∈ N+, there corresponds a unique element s(n) ∈ N+, called thesuccessor of n and n is called the predecessor of s(n);

(2) s(n)= s(m) implies n=m;

Page 58: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

40 1 Prerequisites: Basics of Set Theory and Integers

(3) there exists an element of N+, denoted by 1, which is not the successor of anyelement of N+, i.e., 1 has no predecessor;

(4) if A⊆N+ is such that 1 ∈A, and n ∈A implies s(n) ∈A, then A=N+.

The axiom (4) leads to one of the important principles of mathematics known asthe ‘Principle of Mathematical Induction’ i.e., if p is a property such that 1 has theproperty p and whenever a particular natural number n has the property p, impliess(n) has also the property, then every natural number has the property p.

Definition 1.4.1 For n,m ∈N+, we define

(a) addition ‘+’ recursively by n+ 1= s(n), n+ s(m)= s(n+m);(b) multiplication ‘·’ by n · 1= n, n · s(m)= n ·m+ n;(c) order relation > (or <): m is said to be greater than n denoted by m > n (or

equivalently, n is said to be less than m denoted by n < m) iff m = n+ p forsome p ∈N+.

Then some basic properties of natural numbers follow:

Proposition 1.4.1 For all m,n,p ∈N+, we have

(i) associative property of addition: (m+ n)+ p =m+ (n+ p);(ii) associative property of multiplication: (m · n) · p =m · (n · p);

(iii) commutative property of addition: m+ n= n+m;(iv) commutative property of multiplication: m · n= n ·m;(v) cancellation property of addition: m+ n=m+ p implies n= p;

(vi) cancellation property of multiplication: m · n=m · p implies n= p;(vii) left distributive property: m · (n+ p)=m · n+m · p;

right distributive property: (n+ p) ·m= n ·m+ p ·m;(viii) property of trichotomy: Exactly one of the following holds:

m > n, m < n, m= n.

In respect of subtraction and division in N+, if m > n, then m− n is defined tobe the positive integer p such that m = n+ p. Thus m − n has a meaning in N+iff m > n. Similarly, if there is a positive integer p such that m= np, then m/n isdefined to be the positive integer p. Thus m/n has a meaning iff n is a factor of m.Clearly, for any two positive integers m and n we cannot always define m − n orm/n in N+. These difficulties are overcome by extending the set N+ to the set ofintegers Z and to the set of rational numbers Q, respectively.

Remark If we define Q as the set S of all numbers of the form m/n, where m and n

are integers and n �= 0, then each element of Q is represented by an infinite numberof elements of S. For example, 3/4= 6/8= 12/16= · · · . While doing mathemat-ics, we identify all the elements of S that represent the same rational number by anequivalence relation ∼ on S: a/b ∼ c/d if and only if ad = bc. Each equivalenceclass of S is considered to be a rational number.

Page 59: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.4 Integers 41

We now extend the set Q of rational numbers to a larger set containing Q inwhich all the properties of Q along with an additional property, called order com-pleteness property (i.e., every bounded set has the greatest lower bound and the leastupper bound, which is analogous concepts of the greatest common divisor and leastcommon multiple in the theory of divisibility). This extended set denoted by R iscalled the set of real numbers. We have already used the term Euclidean line withoutany explanation. We use the letter R (or R1) to denote an ordinary geometric straightline whose points have been identified with the set R of real numbers. We use thesame letter R to denote the real line and the set of real numbers and say that a realnumber corresponds to a unique point on the line and conversely. We assume thatthe reader is familiar with the properties of the real line, such as inequality of realnumbers, usual addition, subtraction, multiplication, division, and lub. We use theseproperties in subsequent chapters to prove many interesting results. Apart from thisapproach, there are essentially two methods of constructions of R.

1. Dedekind’s Method of completion by cuts and2. Cantor’s Method of sequences.

Clearly, N+ � Z � Q � R.In the rest of the section we study the properties of integers only and we discuss

some of the important tools that are useful for proving theorems. We assume thatthe reader is thoroughly familiar with the set Z of integers, the set N+ of positiveintegers and elementary properties of addition, multiplication, and order relation onZ and N+. We begin by stating an important axiom, the well-ordering principle.

Principle of Well-Ordering Every non-empty subset S of N+ contains a leastelement b ∈ S (i.e., ∃ an element b ∈ S such that b ≤ a for all a ∈ S).

Next we shall show a close connection between the principle of well-orderingand the principle of mathematical induction.

Theorem 1.4.1 The principle of well-ordering implies the principle of mathemati-cal induction.

Proof Let S be a non-empty subset of N+ such that 1 ∈ S and every n ∈ S impliesn+ 1 ∈ S. We claim that S = N+. If N+ − S �= ∅, then by well-ordering principle,N+ − S contains a least positive integer n > 1 (as 1 /∈ N+ − S). Consequently,n− 1 is a positive integer such that n− 1 /∈ N+ − S. As a result n− 1 ∈ S. Thenn= (n−1)+1 ∈ S by hypothesis. But this is a contradiction. Therefore, N+−S = ∅and hence N+ = S. �

Remark We now show that the principle of mathematical induction with usual orderrelation ‘≤’ on N+ implies the principle of well-ordering.

Proof Let S be a non-empty subset of N+ and T ={n ∈N+ : n≤p for every p in S}(usual order relation ‘≤’ on N+ is assumed). Then 1 ∈ T , so T �= ∅. Again T �=N+,because s ∈ S ⇒ s + 1 /∈ T (since s + 1 �≤ s). Then there exists a natural number

Page 60: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

42 1 Prerequisites: Basics of Set Theory and Integers

q ∈ T such that q + 1 /∈ T , otherwise, it follows by the principle of mathematicalinduction that T = N+. Now by definition of T ,q ≤ every p ∈ S. We claim thatq ∈ S. If not, then q /∈ S⇒ q < p, ∀p ∈ S. Thus for every p ∈ S,p = q + r , so thatp = q + 1 (when r = 1) or p = q + s(ν), where ν is the predecessor of r and s(ν)

denotes the successor of ν. Consequently, q + 1≤ p for every p ∈ S⇒ q + 1 ∈ T ,a contradiction. As a result q ∈ S and q is a least element in S. Moreover, from theantisymmetric property of the relation ‘≤’ it follows that q is unique. �

We now present “division algorithm” for integers. An algorithm means a proce-dure or a method. The usual method of dividing an integer a by a positive integerb gives a quotient q and a remainder r , which may be 0 or a positive integer lessthan b. This concept, essentially due to Euclid, is now called ‘Division Algorithm’.A geometrical proof is given first, followed by an analytical proof by using the‘well-ordering principle’.

A geometrical proof of division algorithm is given when a and b are positiveintegers.

Theorem 1.4.2 (Division algorithm) Let a, b ∈ N+ and b �= 0. Then there existunique integers q and r such that

a = bq + r, and 0≤ r < b.

Geometrical Proof Consider all positive multiples of b and plot them on the realline. Then the integer a lies at some point qb or between two points qb and (q+1)b.In the first case, a − qb = r = 0. In the second case qb < a < (q + 1)b. Hence0 < r = a − qb < ((q + 1)b− qb)= b implies a = qb+ r , where 0 < r < b. �

A more general form of Division algorithm is now presented.

Theorem 1.4.3 (Division algorithm) Let a, b ∈ Z and b �= 0. Then there existunique integers q and r such that

a = bq + r, and 0≤ r < |b|.

Proof We first prove the existence of q and r . If a = 0, then q = 0 and r = 0. Sowe assume that a �= 0.

Case 1. Suppose b > 0. Then b ≥ 1. If b= 1, then q = a and r = 0. If a = bm forsome m ∈ Z, then q =m and r = 0. For the remaining possibility, consider the set

S = {a − bm :m ∈ Z and a − bm > 0}.Since b > 1, a − (−|a|)b = a + |a|b > 0 and hence a − (−|a|)b ∈ S. Conse-

quently, S �= ∅. Hence by the well-ordering principle S has a least element r . Thusthere exists an integer q such that r = a − bq > 0. Hence a = bq + r , 0 < r . Wenow prove that r < b. Suppose r > b. Then r = b+ c for some integer c such that

Page 61: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.4 Integers 43

0 < c < r . Hence c = r − b= a − bq − b = a − b(q + 1) ∈ S. This contradicts theminimality of r in S. Hence r < b.

Case 2. Suppose b < 0. Since −b > 0, by case 1, there exist q ′, r in Z such that

a = (−b)q ′ + r, 0≤ r <−b= |b|.Taking q =−q ′, it follows that a = bq + r , 0≤ r < |b|.

From the above two cases we find that there exist q and r in Z such that

a = bq + r, 0≤ r < |b|. (i)

Suppose now a = bq1+r1, where 0≤ r1 < |b| for some q1, r1 ∈ Z and a = bq2+r2,where 0≤ r2 < |b|, for some q2, r2 ∈ Z.

Then b(q1 − q2)= (r2 − r1). Hence |b||q1 − q2| = |r2 − r1|. If r2 − r1 �= 0, then|b| ≤ |r2 − r1|. Since 0 ≤ r1 < |b| and 0 ≤ r2 < |b|, we have |r2 − r1| < |b|. Thiscontradiction implies that r1 = r2. Now from b(q2−q1)= 0, (b �= 0), it follows thatq2 − q1 = 0. Hence r1 = r2 and q1 = q2 ⇒ uniqueness of q and r in (i). �

Definition 1.4.2 A non-zero integer b is said to divide (or b is a factor of) an integera iff there exists an integer c such that a = bc. If b divides a, then we write it insymbol b|a. In case b does not divide a, we write b|a.

Some immediate consequences of this definition are listed below:

Theorem 1.4.4 Let a, b, c be integers.

(1) If 0 �= a, then a|0, a|a,1|b.(2) If 0 �= a, 0 �= c, then a|b implies ac|bc.(3) If 0 �= a, 0 �= b, then a|b and b|c imply a|c.(4) If 0 �= a, then a|b and a|c imply a|(bn+ cm) for every n,m,∈ Z.

Proof Left as an exercise. �

We now introduce the notion of greatest common divisor.

Definition 1.4.3 Let a, b be two integers, not both zero. A non-zero integer d issaid to be a greatest common divisor of a and b iff the following hold:

(1) d|a and d|b (d is a common factor of a and b);(2) if c �= 0 be an integer such that c|a and c|b, then c|d .

A natural question to ask is whether the elements a, b ∈ Z can possess two differ-ent greatest common divisors. Suppose d1 and d2 are two greatest common divisorsof a, b. Then from the definition, d1|d2 and d2|d1. Hence d1 =±d2. This shows thatone of d1 and d2 is a positive integer. Then one will be the negative of the other. Thepositive one is called the positive greatest common divisor. For two integers a, b,the positive greatest common divisor, if it exists, is denoted by gcd(a, b) or simplyby (a, b).

Page 62: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

44 1 Prerequisites: Basics of Set Theory and Integers

Theorem 1.4.5 If a and b are integers, not both zero, then gcd(a, b) exists uniquelyand gcd(a, b) is expressible in the form

gcd(a, b)= pa + qb for some p,q ∈ Z.

Proof Let S = {ma + nb : m,n ∈ Z}. Since a and b are not both zero, S con-tains non-zero integers. Suppose 0 �=ma + nb ∈ S. Then −(ma + nb)= (−m)a +(−n)b ∈ S. Since ma + nb and −(ma + nb) both belong to S, we find that S con-tains positive integers. Let S+ be the set of all positive integers of S. Since S+ �= ∅,by the well-ordering principle, it follows that S+ contains a least positive integer d .Hence d ≤ t , for all t ∈ S+ and d = pa + qb for some p,q ∈ Z. We show thatd = gcd(a, b). From the division algorithm there exist integers c and r such that

a = c(pa + qb)+ r, 0≤ r < pa + qb= d.

Suppose r > 0. Now r = (1− cp)a + (−cq)b shows that r ∈ S+. As 0 < r < d ,it contradicts the fact that d is the least element in S+. Hence r = 0. Consequently,(pa+qb)|a. Similarly, we show that (pa+qb)|b. Next, assume that u is a non-zerointeger such that u|a and u|b. Then from Theorem 1.4.4 it follows that u|(pa+qb).Hence pa+ qb is a greatest common divisor of a, b. But pa+ qb is positive. Con-sequently gcd(a, b) exists and gcd(a, b) = pa + qb. The uniqueness of gcd(a, b)

follows from the antisymmetric property of the divisibility relation on N+ (see Ex-ample 1.2.11(iii)). �

Corollary Let a and b be two integers. Then gcd(a, b)= 1 if and only if there existintegers u and v such that au+ bv = 1.

Proof First let gcd(a, b) = 1. Then by Theorem 1.4.5, there exist integers u andv such that au + bv = 1. Conversely, let there exist integers u and v such thatau+ bv = 1. Let d = gcd(a, b). Then by definition of greatest common divisor, d

divides both a and b and hence au+ bv. Thus d divides 1, resulting in d = 1. �

Remark If gcd(a, b) = pa + qb, for p,q ∈ Z, then p, q may not be unique. Forexample, gcd(1492,1066)=−5 · 1492+ 7 · 1066. So here p =−5 and q = 7. Nowwe may take, p′ = p+1066=−5+1066= 1061 and q ′ = q−1492= 7−1492=−1485. Then 1492p′ + 1066q ′ = 1492p + 1492 · 1066+ 1066q − 1066 · 1492 =1492p+ 1066q = gcd(1492,1066).

We now list some of the interesting properties of gcd(a, b). All these can beproved easily.

Proposition 1.4.2 If a, b, c are any three non-zero integers, then

(i) gcd(a,gcd(b, c))= gcd(gcd(a, b), c);(ii) gcd(a,1)= 1;

(iii) gcd(ca, cb)= c gcd(a, b);

Page 63: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.4 Integers 45

(iv) gcd(a, b)= 1 and gcd(a, c)= 1 imply that gcd(a, bc)= 1;(v) a|c, b|c and gcd(a, b)= 1 imply that ab|c.

Definition 1.4.4 An integer p > 1 is called a prime integer iff only factors of p

are ±1 and ±p in Z, otherwise p is said to be a composite number. Two integers a

and b are called relatively prime (or co-prime) iff gcd(a, b)= 1.

The following theorem gives an alternative definition of a prime integer.

Theorem 1.4.6 An integer p > 1 is a prime integer iff ∀a, b ∈ Z with p|ab implieseither p|a or p|b.

Proof Suppose p is a prime integer and p|ab. We want to show that either p|a orp|b. Suppose p|a. Since p is prime, we know that 1 and p are the only positivedivisors of p. Hence gcd(p, a)= 1. Then Theorem 1.4.5 asserts that

1= cp+ da for some integers c and d.

Hence b= 1 · b= cpb+ dab. Now p|p and p|ab. Consequently p|cpb and p|dab.Then p|(cpb+ dab). This proves that p|b.

Conversely, assume that p > 1 is an integer such that p|ab (a, b ∈ Z) implies thatp|a or p|b. We now prove that p is prime. Suppose 0 �=m and m|p. Then p =mn

for some n ∈ Z. Now p|p. Hence p|mn. Then either p|m or p|n.Suppose p|m. Then there exists d ∈ Z such that m = pd . Then p = pdn. This

implies dn= 1. Since d , n are integers, we find that d = 1 and n= 1 or d =−1 andn=−1. Now from p =mn it follows that m=±p.

Again, if we assume that p|n, then proceeding as above we can show that n=±p

and then m=±1. Consequently ±1 and ±p are the only factors of p. As a result p

is a prime integer. �

Corollary Let n be a positive integer and a1, a2, . . . , an be integers such thatp|a1a2 · · ·an, where p is prime. Then p|ai for some i such that 1 ≤ i ≤ n i.e., p

divides at least one of a1, a2, . . . , an.

Proof We prove this corollary by using principle of mathematical induction on n.If n= 1, the result is trivially true. Assume that the result is valid for some m suchthat 1≤m < n. Let p|a1a2 · · ·amam+1. Then from Theorem 1.4.6 either p|am+1 orp|a1a2 · · ·am. If p|a1a2 · · ·am, then from our hypothesis p|ai for some i such that1≤ i ≤m. Hence either p|am+1 or p divides at least one of a1, a2, . . . , am. Now theresult follows by the principle of mathematical induction. �

Remark As a generalization of Theorem 1.4.6 one can prove the following. Let a,b and m �= 0 be integers such that gcd(a,m)= 1 and m|ab. Then m|b.

The prime numbers form blocks of integers. First we shall show that there existinfinitely many primes. To prove this we use the following lemma.

Page 64: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

46 1 Prerequisites: Basics of Set Theory and Integers

Lemma 1.4.1 If a > 1 is an integer, then there exists a prime integer p suchthat p|a.

Proof Let S = {b ∈ Z : b is an integer >1 and b|a}. Now a ∈ S and then S �= ∅. Bywell-ordering principle, there exists an integer p in S such that p ≤ q for all q ∈ S.This clearly shows p > 1 and p|a. Suppose p is not a prime integer. Then p has afactor m such that 1 < m < p. Now m|p and p|a. Hence m|a. As a result m ∈ S.This contradicts the minimality of p in S. Consequently p is a prime integer. �

We are now in a position to prove the following celebrated result.

Theorem 1.4.7 (Euclid) There are infinitely many prime integers.

Proof It is true that there are prime integers such as: 2, 3, 5, 7. Suppose there is onlya finite number of distinct primes, say p1,p2, . . . , pn. Consider the positive integer

m= p1p2 · · ·pn + 1.

Now m= p1(p2 · · ·pn)+ 1 shows that p1|m. Similarly we can show that noneof p2,p3, . . . , pn divides m. Since m > 1, Lemma 1.4.1 asserts that there exists aprime integer p such that p|m. This prime p is clearly different from p1,p2, . . . , pn.Consequently, there is no finite listing of prime integers. In other words, there existinfinite number of prime integers. �

We shall prove a little later another celebrated theorem known as the fundamentaltheorem of arithmetic which proves that primes are indeed the building blocks forintegers. For this purpose we introduce the concept of factorization of integers.

Definition 1.4.5 An integer n > 1 is said to be factorizable in N+ iff there existprime integers p1,p2, . . . , pk such that n= p1p2 · · ·pk .

An integer n > 1 is said to be uniquely factorizable in N+ iff the following twoconditions hold:

(i) n is factorizable;(ii) if n= p1p2 · · ·pr = q1q2 · · ·qs be two factorizations of n (as a product of prime

integers), then r = s and the two factorizations differ only in the order of thefactors.

We now prove the following basic result.

Theorem 1.4.8 (The Fundamental Theorem of Arithmetic) Every integer n > 1 isuniquely factorizable (up to order).

We prove this result by using the second principle of mathematical inductionwhich is stated as follows.

Page 65: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.4 Integers 47

Lemma 1.4.2 (Second Principle of Mathematical Induction or Principle of StrongMathematical Induction) Let S be a non-empty subset of N+ such that

(i) some fixed positive integer n0 ∈ S and(ii) for each positive integer m > n0, each of n0+ 1, n0+ 2, . . . ,m− 1 ∈ S implies

m ∈ S.

Then S = {n ∈N+ : n≥ n0}.Proof Let X =N+ − {1,2, . . . , n0− 1} and T =X− S. If we can show that T = ∅,then the lemma follows. Suppose T �= ∅. Then T is a non-empty subset of N+. Thusby the well-ordering principle T contains a least element, say m. As m ∈ T , m /∈ S

and m /∈ {1,2, . . . , n0− 1}. Now by (i), m �= n0. For every x satisfying n0 ≤ x < m,x /∈ T = X − S = X ∩ S′, where S′ is the complement of S in N+. This impliesx ∈X′ ∪ S. As X′ = {1,2, . . . , n0− 1}, this implies x ∈ S. Thus by (ii), m ∈ S. Thisis a contradiction. Consequently T = ∅ and then S = {n ∈N+ : n≥ n0}. �

Corollary Let S be a subset of N+ such that

(i) 1 ∈ S, and(ii) if n > 1 and n ∈ S for all n < m, implies m ∈ S.

Then S =N+.

Proof of the Fundamental Theorem of Arithmetic Let n > 1. We first show that n isfactorizable (as a product of prime integers). We prove this by the second principleof induction. If n = 2, then there exists a prime integer p1 = 2 such that n = p1(=2). Suppose that any integer r , 2≤ r < n can be expressed as a product of primes.

Consider now the integer n. From Lemma 1.4.1 there exists a prime integer p1such that p1|n. Then we can write n= p1n1 for some integer n1. Since n > 2, p1 >

1, we must have n1 ≥ 1. If n1 = 1, then n= p1. Suppose n1 �= 1. Then 2≤ n1 < n

and from the induction hypothesis we can write,

n1 = p2p3 · · ·pt for some primes p2,p3, . . . , pt .

Hence n= p1n1 = p1p2p3 · · ·pt .Thus from the second principle of mathematical induction, it follows that any

positive integer n≥ 2 can be expressed as a product of prime integers.We now show that the factorization of a positive integer n > 1 is unique up to

the rearrangement of the order of the factors. We prove this also by the method ofinduction. If n= 2, then the factorization of n is unique. Assume that the uniquenessof factorization is true for any positive integer m such that 2 < m < n. Consider theinteger n (>2). Suppose n = p1p2 · · ·ps = q1q2 · · ·qt be two factorizations of n

(as a product of prime integers). Since p1(p2 · · ·ps) = q1q2 · · ·qt , it follows thatp1|q1q2 · · ·qt and hence p1 divides some qi (1 ≤ i ≤ t). But 1 and qi are the onlypositive divisors of qi . Consequently p1 = qi . We may assume that the qi ’s are soarranged such that q1 = p1. Thus

p1p2 · · ·ps = p1q2 · · ·qt .

Page 66: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

48 1 Prerequisites: Basics of Set Theory and Integers

Since p1 �= 0, we may cancel p1 and get p2p3 · · ·ps = q2q3 · · ·qt = n1 (say). But1≤ n1 < n. Then by induction hypothesis it follows that n1 is uniquely factorizable.Hence s − 1= t − 1 and that the factorization q2q3 · · ·qs is just a rearrangement ofthe pi ’s, i = 2,3, . . . , s. Thus s = t and since p1 = q1 it follows that n is uniquelyfactorizable. Hence by induction we find that any integer n > 1 is uniquely factor-izable. �

From the fundamental theorem of arithmetic, we can write n > 1 as a productof primes and since the prime factors are not necessarily distinct, the result can bewritten in the form

n= pα11 p

α22 · · ·pαr

r ,

where p1,p2, . . . , pr are distinct primes and α1, α2, . . . , αr are positive integers. Inturns out that the above representation of n as a product of primes is unique in thesense that, for a fixed n (>1), any other representation is merely a permutation ofthe factors.

Remark We usually take p1 > p2 > · · ·> pr .

Alternative Form of the Second Principle of Mathematical Induction LetP(n) be a statement which makes sense for any positive integer n ≥ n0. If the fol-lowing two statements are true:

(a) P(n0) is true and(b) for all k ≥ n0, each of P(n0+ 1),P (n0+ 2), . . . ,P (k− 1) is true implies P(k)

is true,

then P(n) is true for all n≥ n0.

1.5 Congruences

The language of congruences plays an important role not only in number theory butalso an important topic of abstract algebra. It was developed at the beginning of thenineteenth century by Karl Friedrich Gauss (1777–1855). Here we study modulararithmetic, that is, arithmetic of congruence classes where we simplify number the-oretic problems by replacing each integer by its remainder when divided by somefixed positive integer n.

Definition 1.5.1 If a and b are integers, we say that a is congruent to b modulo apositive integer n, denoted by a ≡ b (modn), iff n|(a − b). If n|(a − b) we writea �≡ b (modn), and say that a and b are incongruent modulo n.

Example 1.5.1 We have 3 ≡ 23 (mod 10), as 10 divides 3–23. Similarly, 2 ≡5 (mod 3).

The following proposition provides some important properties of congruences.

Page 67: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.5 Congruences 49

Proposition 1.5.1 Let n be a positive integer. Then the congruence modulo thepositive integer n satisfies the following properties:

(i) reflexive property: If a is an integer, then a ≡ a (modn);(ii) symmetric property: If a and b are integers such that a ≡ b (modn), then

b≡ a (modn);(iii) transitive property: If a, b, and c are integers with a ≡ b (modn) and b ≡

c (modn), then a ≡ c (modn).

From Proposition 1.5.1, we see that the set of integers is divided into n differentsets called congruence classes modulo n, each containing integers which are mutu-ally congruent modulo n. The reader may also revisit Examples 1.2.3 and 1.2.9.

Arithmetic with congruences is very common in number theory. Congruences(≡) have many of the properties that “equalities” (=) have. The following proposi-tion states that addition, subtraction, or multiplication to both sides of a congruencepreserve the congruence.

Proposition 1.5.2 If a, b, c are integers and n is a positive integer such that a ≡b (modn), the following properties are satisfied:

(i) a + c≡ b+ c (modn);(ii) a − c≡ b− c (modn);

(iii) ac≡ bc (modn).

A very natural question that comes to our mind is: what happens when both sidesof a congruence are divided by a non-zero integer? Let us consider the followingexample.

Example 1.5.2 Let us consider 14 modulo 6. We have 7 · 2 ≡ 4 · 2 (mod 6). But7 �≡ 4 (mod 6).

This example shows that it is not necessarily true that it preserves a congruencewhen we divide both sides by an integer. However, the following proposition gives avalid congruence when both sides of a congruence are divided by the same integer.

Theorem 1.5.1 If a, b, c, and n are integers such that n > 0, d = gcd(c, n), andac≡ bc (modn), then a ≡ b (modn/d).

Proof As ac ≡ bc (modn), there exists an integer t such that c(a − b) = nt . Thisimplies that c(a− b)/d = nt/d . Again, gcd(c/d,n/d)= 1 implies that n/d divides(a − b). Hence a ≡ b (modn/d). �

Example 1.5.3 Let us take the example of 65 modulo 15. We have 65 ≡35 (mod 15). As gcd(5,15) = 5, by the above theorem we have 65/5 ≡35/5 (mod 15/5) which implies 13≡ 7 (mod 3).

The following corollary is immediate.

Page 68: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

50 1 Prerequisites: Basics of Set Theory and Integers

Corollary If a, b, c and n are integers such that n > 0, gcd(c, n) = 1 and ac ≡bc (modn), then a ≡ b (modn).

The following proposition, which is more general than Proposition 1.5.2, is alsouseful.

Proposition 1.5.3 If a, b, c, d are integers and n is a positive integer such thata ≡ b (modn) and c≡ d (modn), the following properties are satisfied:

(i) a + c≡ b+ d (modn);(ii) a − c≡ b− d (modn);

(iii) ac≡ bd (modn).

The following theorem shows that a congruence is preserved when both sides areraised to the same positive integral power.

Theorem 1.5.2 If a, b are integers and n and k are positive integers such thata ≡ b (modn), then ak ≡ bk (modn).

Proof As a ≡ b (modn), n divides a− b. Now, ak − bk = (a− b)(ak−1+ ak−2b+· · ·+ abk−2+ bk−1) implies that a− b divides ak− bk and hence n divides ak− bk .Thus ak ≡ bk (modn). �

Supplementary Examples (SE-II)

1 (i) The integer 32n − 1 is divisible by 8 ∀n≥ 1;(ii) 32n ≡ 1 (mod 8) ∀n≥ 1;(iii) 32n − 1≡ 0 (mod 8) ∀n≥ 1.[Hint. (i) Let P(n) be the statement that the integer 32n − 1 is divisible by 8

∀n ≥ 1. Then P(1) is true, since 9 − 1 = 8 is divisible by 8. Next suppose thatP(n) is true for some k ∈ N+ i.e., 32k − 1 is divisible by 8. Now 32(k+1) − 1 =32k32−32+32−1= 32(32k−1)+(32−1) is divisible by 8. Hence by the principleof mathematical induction, P(n) is true ∀n ∈N+.

(ii) follows from (i).(iii) follows from (ii).]

2 (i) 2n ≥ 1+ n ∀n ∈N+;(ii) 2n ≥ 2n+ 1 for all integers n≥ 3.[Hint. (i) Let P(n) be the statement: 2n ≥ 1 + n ∀n ≥ N+. Then P(1) is true.

Next suppose that P(k) is true for some integer k ≥ 1 i.e., suppose that 2k ≥ 1+ k

for some integer k ≥ 1. Then it follows that 2k+1 = 2k2≥ (1+ k)2= 2+ 2k > 1+(k + 1)⇒ P(k + 1) is also true. Hence by the principle of mathematical induction,P(n) is true ∀n ∈N+.

(ii) Let P(n) be the statement: 2n ≥ 2n + 1 ∀ integers n ≥ 3. Then 23 = 8 >

2.3+ 1⇒ P(3) is true. Next let P(n) be true for some n ≥ 3 i.e., 2n ≥ 2n+ 1 forsome integer n≥ 3. Now 2n+1 = 2n · 2≥ (2n+ 1) · 2≥ 2(n+ 1)+ 1⇒ P(n+ 1) is

Page 69: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

1.5 Congruences 51

true. Hence by the principle of mathematical induction, P(n) is true for all integersn≥ 3.]

3 Let m,n ∈N+. Then

(i) n �=m+ n;(ii) n=mn⇔m= 1.

[Hint. (i) Let P(n) be the statement that n �= m + n for arbitrary m ∈ N+ andevery n ∈ N+. Then by Peano’s axiom (3), 1 �= m + 1 ⇒ P(1) is true. Next letP(n) be true for some n ∈ N+ and arbitrary m ∈ N+. Then n �= m + n⇒ s(n) �=s(m + n)⇒ n + 1 �= m + (n + 1)⇒ P(n + 1) is true. Hence by the principle ofmathematical induction P(n) is true for arbitrary m ∈ N+ and every n ∈ N+ i.e.,P(n) is true ∀m,n ∈N+.

(ii) n = 1 · n proves the sufficiency of the condition. To prove the necessity ofthe condition, let m �= 1. Then ∃ some c ∈ N+ such that s(c) = m. Hence mn =s(c)n = (c + 1)n = cn + n. Hence for m �= 1, n = mn would imply n = cn + n,which contradicts (i).]

4 Show that√

n ∈Q⇒√n ∈N+(n ∈N+).

[Hint. Suppose√

n= a/b where a, b ∈ N+. Then a2 = b2n. Now taking primedecomposition, it follows that n is a perfect square⇒√

n ∈N+.]

5 Let x ∈ R i.e., x be a real number. We assume that ∃ integers which are ≤x. Sothe set S of all such integers is non-empty and is bounded above (x being an upperbound). Hence by Zorn’s Lemma there is a greatest integer in S which is less thanor equal to x. This integer is called the integral part of x and is noted by [x]. Showthat [x] satisfies the following properties:

(i) [x] ≤ x < [x] + 1;(ii) x − [x] ∈ [0,1);

(iii) if x = n+ r , where n ∈ Z and r ∈ [0,1), then n= [x];(iv) let m ∈ Z and n ∈N+ and m= nq+ r where q, r ∈ Z and 0≤ r ≤ n− 1. Then

q = [mn] and r =m− n[m

n].

[Hint. As mn= q + r

nand 0≤ r

n≤ n−1

n< 1.

Hence by (iii), q = [mn] and so r =m− n[m

n].]

6 If a ≡ b (modn), then gcd(a,n)= gcd(b,n) (a, b,n ∈N+).[Hint. Let d1 = gcd(a,n) and d2 = gcd(b,n). Now a ≡ b (modn)⇒ b= a+ kn

for some k ∈ Z. Hence d1|n and d1|a⇒ d1|b (by Theorem 1.4.4)⇒ d1 is a commonfactor of b,n⇒ d1 ≤ d2. Similarly, d2 ≤ d1. Hence d1 = d2.]

7 Let m and n be non-zero integers. The least common multiple of m and n, denotedby lcm(m,n), is defined to be the positive integer l such that in Z,

(i) m|l and n|l and(ii) m|c and n|c⇒ l|c.

Page 70: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

52 1 Prerequisites: Basics of Set Theory and Integers

Then lcm(m,n) exists and is unique and lcm(m,n) has the following relationswith gcd(m,n):

(a) gcd(m,n) · lcm(m,n)= |mn|;(b) lcm(m,n)= |mn| ⇔ gcd(m,n)= 1.

Supplementary Examples (SE-III)

1 If n is odd, then n2 is also odd.[Hint. Suppose n is odd and n = 2m + 1 for some m ∈ Z. Then n2 = 4(m2 +

m)+ 1 is odd as 4(m2 +m) is even.]

2 For every integer n, neither n2 ≡ 2 (mod 5) nor n2 ≡ 3 (mod 5).[Hint. Let n be an arbitrary integer. Then on division n by 5, the only possible

remainders r are 0,1,2,3,4 i.e., n ≡ r (mod 5) for r = 0,1,2,3 and 4 i.e., n2 ≡r2 (mod 5) for r = 0,1,2,3 and 4 i.e., n2 �≡ 2 (mod 5) and n2 �≡ 3 (mod 5).]

3 There exists no integral solution of the equation 7x2 − 15y2 = 1.[Hint. Suppose there exist integers n, m such that 7n2 − 15m2 = 1. Then 7n2 ≡

1 (mod 5), since 15m2 ≡ 0 (mod 5).Again

7≡ 2 (mod 5)⇒ 7n2 ≡ 2n2 (mod 5)⇒ 2n2 ≡ 1 (mod 5). (i)

By using the above Supplementary Example 2, ∀n ∈ Z, n2 ≡ 0 (mod 5) or n2 ≡4 (mod 5) or n2 ≡ 1 (mod 5)⇒ 2n2 ≡ 0 (mod 5) or 2n2 ≡ 8 (mod 5) ≡ 3 (mod 5)

or 2n2 ≡ 2 (mod 5)⇒ a contradiction if (i).]

4 Every positive integer n is congruent to the sum of its digits modulo 9. Hencededuce a test for divisibility by 9.

[Hint. Suppose n= nrnr−1 · · ·n2n1n0 (written in the customary notation).Then n= nr10r + nr−110r−1 + · · · + n2102 + n110+ n0. ⇒ n≡ (nr + nr−1 +

· · ·+n2+n1+n0) (mod 9) (since 10m ≡ 1 (mod 9) for all integers m≥ 0). Clearly,n is divisible by 9 iff the sum of its digits is divisible by 9.]

1.5.1 Exercises

Exercises-II

1. Prove for any positive integer n:

(i) 33n+1 ≡ 3.5n (mod 11);(ii) 24n+3 ≡ 8.5n (mod 11);

(iii) 33n+1 + 24n+3 ≡ 0 mod(11);

[Hint. (i) 33 ≡ 5 (mod 11)⇒ 33n ≡ 5n mod(11)⇒ 33n+1 ≡ 3.5n (mod 11).]

Page 71: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 53

2. Show that there is no solution in integers of the equation

x2 + y2 = 3z2

except x = y = z= 0.3. Let n be an integer such that n is a perfect square and n= rt where r and t are

relatively prime positive integers. Show that r and t are perfect squares.[Hint. Consider prime decomposition of n. Note that an integer m ≥ 2 is a

perfect square ⇔ every prime appearing in the decomposition of m is of evenpower.]

4. Prove that any prime of the form 3n+ 1 is of the form 6r + 1.5. Prove that any positive integer of the form 3n+ 2 has a prime factor of the same

form.6. Prove that gcd(n,n+ 2)= 1 or 2 for every integer n.7. Prove that there are infinitely many primes of the form 4n+ 3 or 6n+ 5.8. Show that n > 1 is a prime integer iff for any integer r either gcd(r, n)= 1 or n|r .9. Prove that there are arbitrarily large gaps in the series of primes.

[Hint. See Chap. 10.]

1.6 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Burton 1989; Halmos1974; Hungerford 1974; Jones and Jones 1998; Rosen 1993; Simmons 1963) forfurther details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Burton, D.M.: Elementary Number Theory. Brown, Dulreque (1989)Cohen, P.J.: Set Theory and Continuum Hypothesis. Benjamin, New York (1966)Cohn, P.M.: Basic Algebra: Groups, Rings and Fields. Springer, London (2002)Conway, J.B.: Functions of One Complex Variable. Springer, New York (1973)Halmos, P.R.: Naive Set Theory. Springer, New York (1974)Hungerford, T.W.: Algebra. Springer, New York (1974)Jones, G.A., Jones, J.M.: Elementary Number Theory. Springer, London (1998)Von Neumann, J.: Mathematical Foundations of Quantum Mechanics. Princeton University Press,

Princeton (1955)Rosen, K.H.: Elementary Number Theory and Its Applications. Addison-Wesley, Reading (1993)Simmons, G.F.: Topology and Modern Analysis. McGraw-Hill, New York (1963)Varadarajan, V.S.: Geometry of Quantum Theory, I and II. Van Nostrand, Princeton (1968)

Page 72: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 2Groups: Introductory Concepts

Groups serve as one of the fundamental building blocks for the subject called todaymodern algebra. This chapter gives an introduction to the group theory and closelyrelated topics. The idea of group theory was used as early as 1770 by J.L. Lagrange(1736–1813). Around 1830, E. Galois (1811–1832) extended Lagrange’s work inthe investigation of solutions of equations and introduced the term ‘group’. At thattime, mathematicians worked with groups of transformations. These were sets ofmappings that, under composition, possessed certain properties. Originally, groupwas a set of permutations (i.e., bijections) with the property that the combination ofany two permutations again belongs to the set. Felix Klein (1849–1925) adopted theidea of groups to unify different areas of geometry. In 1870, L. Kronecker (1823–1891) gave a set of postulates for a group. Earlier definitions of groups were gen-eralized to the present concept of an abstract group in the first decade of the twen-tieth century, which was defined by a set of axioms. The theory of abstract groupsplays an important role in the present day mathematics and science. Groups arisein a number of apparently unrelated disciplines. They appear in algebra, geome-try, analysis, topology, physics, chemistry, biology, economics, computer scienceetc. So the study of groups is essential and very interesting. In this chapter, wemake an introductory study of groups with geometrical applications along with freeabelian groups and structure theorem for finitely generated abelian groups. More-over, semigroups, homology groups, cohomology groups, topological groups, Liegroups, Hopf groups, and fundamental groups are discussed.

2.1 Binary Operations

Operations on the pairs of elements of a non-empty set arise in several contexts,such as the usual addition of two integers, usual addition of two residue classes inZn, usual multiplication of two real or complex square matrices of the same orderand similar others. In such cases, we speak of a binary operation. The concept ofbinary operations is essential in the study of modern algebra. It provides algebraicstructures on non-empty sets. The concept of binary operations is now introduced.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_2, © Springer India 2014

55

Page 73: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

56 2 Groups: Introductory Concepts

Definition 2.1.1 Let S be a non-empty set. A binary operation on S is a functionf : S × S→ S.

There are several commonly used notations for the image f (a, b) ∈ S for a, b ∈S, such as ab or a ·b (multiplicative notation), a+b (additive notation), a∗b etc. Wemay therefore think the usual addition in Z, as being a function: Z×Z→ Z, wherethe image of every pair of integers (m,n) ∈ Z× Z is denoted by m+ n. Clearly, abinary operation ‘·’ on S is equivalent to the statement: if a, b ∈ S, then a · b ∈ S

(known as the closure axiom). In this event S is said to be closed under ‘·’. Theremay be several binary operations on a non-empty set S. For example, usual addition(a, b) �→ a + b; usual multiplication (a, b) �→ ab; (a, b) �→ maximum {a, b}, min-imum {a, b}, lcm {a, b}, gcd {a, b} for (a, b) ∈ N+ ×N+ are binary operations onN+.

A binary operation on a set S is sometimes called a composition in S.

Example 2.1.1 Two binary operations, called addition and multiplication are de-fined on Zn (see Chap. 1) by ((a), (b)) �→ (a + b) and ((a), (b)) �→ (ab), respec-tively. Clearly, each of these operations is independent of the choice of representa-tives of the classes and hence is well defined.

Example 2.1.2 Let S be any non-empty set. Then

(i) both union and intersection of two subsets of S define binary operations onP(S), the power set of S;

(ii) the usual composition ‘◦’ of two mappings of M(S), the set of all mappingsof S into S, is a binary operation on M(S) i.e., (f, g) �→ f ◦ g, f,g ∈M(S),defines a binary operation on M(S).

Clearly, f ◦ g �= g ◦ f , f,g ∈M(S) for an arbitrary set S.For example, if S = {1,2,3} and f,g ∈M(S) are defined by

f (s) = 1 ∀s ∈ S and g(s)= 2 ∀s ∈ S, then (g ◦ f )(s)= g(f (s))

= g(1)= 2 and (f ◦ g)(s)= f(g(s))= f (2)= 1, ∀s ∈ S

⇒ g ◦ f �= f ◦ g.

We may construct a table called the Cayley table as a convenient way of defininga binary operation only on a finite set S or tabulating the effect of a binary operationon S. Let S be a set with n distinct elements. To construct a table, the elements ofS are arranged horizontally in a row, called initial row or 0-row: these are againarranged vertically in a column, called the initial column or 0-column. The elementin the ith position in the 0-column determines a horizontal row across it, called theith row of the table.

Similarly, the element in the j th position in the 0-row determines a vertical col-umn below it, called the j th column of the table. The (i, j)th position in the table isdetermined by the intersection of the ith row and the j th column.

Page 74: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.1 Binary Operations 57

The (i, j)th positions (i, j = 1,2, . . . , n) are filled up by elements of S in anymanner. Accordingly, a binary operation on S is determined.

For two elements u,v ∈ S, where u occupies ith position in the 0-column and v

occupies j th position in the 0-row, (u, v) �→ u ◦ v, where u ◦ v is the element in the(i, j)th position, i, j = 1,2,3, . . . , n.

There is also a reverse procedure: given a binary operation f on a finite set S, wecan construct a table displaying the effect of f . For example, let S = {1,2,3} and f

a binary operation on S defined by

f (1,1)= 1, f (1,2)= 1, f (1,3)= 2, f (2,1)= 2, f (2,2)= 3,

f (2,3)= 3, f (3,1)= 1, f (3,2)= 3, f (3,3)= 2.

Then the corresponding table is

f : 1 2 3

1 1 1 22 2 3 33 1 3 2

A table of this kind is termed a multiplication table or composition table or Cayley’stable on S.

Definition 2.1.2 A groupoid is an ordered pair (S,◦), where S is a non-empty setand ‘◦’ is a binary operation on S and a non-empty subset H of S is said to be asubgroupoid of (S,◦) iff (H,◦H ) is a groupoid, where ◦H is the restriction of ‘◦’ toH ×H .

Supplementary Examples (SE-IA)

1 Let R be the set of all real numbers and R∗ =R− {0}.(i) Define a binary operation ◦ on R∗ by x ◦y = |x|y. Then (x ◦y)◦z= x ◦ (y ◦z)

for all x, y, z ∈R∗ but x ◦ y �= y ◦ x for some x, y ∈R∗.(ii) Define a binary operation ◦ on R∗ by x ◦ y = |x − y|. Then (x ◦ y) ◦ z �=

x ◦ (y ◦ z) for some x, y, z ∈R∗ but x ◦ y = y ◦ x for all x, y ∈R∗.(iii) Define a binary operation ◦ on R∗ by x ◦ y = min{x, y}. Then (x ◦ y) ◦ z =

x ◦ (y ◦ z) and x ◦ y = y ◦ x for all x, y, z ∈R∗.

2 Let Q∗ be the set of all non-zero rational numbers. Define a binary relation ◦ onQ∗ by x ◦ y = x/y (usual division).

Then x ◦ y �= y ◦ x and (x ◦ y) ◦ z �= x ◦ (y ◦ z) for some x, y, z ∈Q∗.

3 A homomorphism f from a groupoid (G,◦) into a groupoid (H,∗) is a mappingf :G→H such that f (x ◦ y)= f (x) ∗ f (y) for all x, y ∈G. A homomorphism f

is said to be a monomorphism, epimorphism or isomorphism (∼=) according as f isinjective, surjective or bijective.

Page 75: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

58 2 Groups: Introductory Concepts

(i) Isomorphism relation of groupoids is an equivalence relation.(ii) If G and H are finite groupoids such that |G| �= |H |. Then G cannot be iso-

morphic to H .(iii) The groupoids (Z,◦) and (Z,∗) under the compositions defined by x ◦ y =

x + y + xy and x ∗ y = x + y − xy are isomorphic.[Hint. The function f : (Z,◦)→ (Z,∗) defined by f (x)=−x ∀x ∈ Z is an

isomorphism.](iv) Let (C,+) be the groupoid of complex numbers under usual addition and f :

(C,+)→ (C,+) be defined by f (a+ ib)= a− ib. Then f is an isomorphism.(v) Let (N+, ·) and (R,+) be groupoids under usual multiplication of positive

integers and usual addition of real numbers. Then f : (N+, ·)→ (R,+) definedby f (n)= log10 n is a monomorphism but not an epimorphism.

[Hint. 0 = log10 1 < log10 2 < log10 3 < · · · ⇒ there is no integer n ∈ N+such that log10 n=−1 ∈R⇒ f is not an epimorphism.]

2.2 Semigroups

Our main interest in this chapter is in groups. Semigroups and monoids are con-venient algebraic systems for stating some theorems on groups. Semigroups playan important role in algebra, analysis, topology, theoretical computer science, andin many other branches of science. Semigroup actions unify computer science withmathematics.

Definition 2.2.1 A semigroup is an ordered pair (S, ·), where S is non-empty setand the dot ‘.’ is a binary operation on S, i.e., a mapping (a, b) �→ a · b from S × S

to S such that for all a, b, c ∈ S, (a · b) · c= a · (b · c) (associative law).

For convenience, (S, ·) is abbreviated to S and a · b to ab. The associative prop-erty in a semigroup ensures that the two products a(bc) and (ab)c are same, whichcan be denoted as abc.

Definition 2.2.2 A semigroup S is said to be commutative iff ab = ba for alla, b ∈ S; otherwise S is said to be non-commutative.

Example 2.2.1 (i) (Z,+) and (Z, ·) are commutative semigroups, where the binaryoperations on Z are usual addition and multiplication of integers.

(ii) (P(S),∩) and (P(S),∪) (cf. Example 2.1.2(i)) are commutative semigroups.(iii) (M(S),◦) (cf. Example 2.1.2(ii)) is a non-commutative semigroup.

Definition 2.2.3 Let S be a semigroup. An element 1 ∈ S is called a left (right)identity in S iff 1a = a (a1 = a) for all a ∈ S and 1 is called an identity iff it is aboth left and right identity in S.

Page 76: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 59

Proposition 2.2.1 If a semigroup S contains a left identity e and a right identityf , then e= f is an identity and there is no other identity.

Proof ef = f , as e is a left identity and also ef = e, as f is a right identity. Conse-quently, e = f is an identity. Next let 1 ∈ S is also an identity. Then 1 is both a leftand a right identity. Consequently, e= 1 and f = 1. �

This proposition shows that a semigroup has at most one identity element and wedenote the identity element (if it exists) of a semigroup by 1.

Definition 2.2.4 Let S be a semigroup. An element 0 ∈ S is called a left (right)zero in S iff 0a = 0 (a0= 0) for all a ∈ S and 0 is called a zero iff it is a both leftand right zero in S.

If an element a ∈ S is such that a �= 0, then a is called a non-zero element of S.

Proposition 2.2.2 If a semigroup S contains a left zero z and also a right zero w,then z=w is a zero and there is no other zero.

Proof Similar to proof of Proposition 2.2.1. �

Definition 2.2.5 A semigroup S with the identity element is called a monoid.

Example 2.2.2 (i) (Z, ·) is a monoid under usual multiplication, where 1 is theidentity.

(ii) The set of even integers is not a monoid under usual multiplication.If a semigroup S has no identity element, it is easy to adjoin an extra element 1 to

the set S. For this we extend the given binary operation ‘·’ on S to S∪{1} by defining1 · a = a · 1= a for all a ∈ S and 1 · 1= 1. Then S ∪ {1} becomes a semigroup withidentity element 1.

Analogously, it is easy to adjoin an element 0 to S and extend the given binaryoperation on S to S ∪ {0} by defining 0 · a = a · 0 = 0 for all a ∈ S and 0 · 0 = 0.Then S ∪ {0} becomes a semigroup with zero element 0.

Definition 2.2.6 Let S be a semigroup with zero element 0. If for two non-zeroelements a, b ∈ S, ab = 0, then a and b are called respectively a left and a rightdivisor of zero.

Example 2.2.3 M2(Z), the set of 2 × 2 matrices over Z is semigroup (non-commutative) under usual multiplication of matrices with

( 0 00 0

)as zero element.

Clearly,( 2 0

3 0

)and( 0 0

1 5

)are non-zero elements of M2(Z) such that

( 2 03 0

)( 0 01 5

) =( 0 00 0

). As a result,

( 2 03 0

)is a left divisor of zero, having

( 0 01 5

)the corresponding

right divisor of zero. Again(−3 2−6 4

)( 2 03 0

) = ( 0 00 0

)shows that

( 2 03 0

)is also a right

divisor of zero, having a different matrix(−3 2−6 4

)the corresponding left divisor of

zero.

Page 77: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

60 2 Groups: Introductory Concepts

If a1, a2, . . . , an are elements of a semigroup S, we define the product a1a2 · · ·an

inductively, as (a1 a2 · · ·an−1)an.

Theorem 2.2.1 Let S be a semigroup. Then all the products obtained by insertionof parentheses in the sequence a1, a2, . . . , an, an+1, an+2 of elements of S are equalto the product a1a2 · · ·anan+1an+2. (Generalized associative law.)

Proof By associative property in S, the theorem holds for n = 1. Let the theoremhold for all values of n such that 1 ≤ n ≤ r and let p and p′ be the product ofan ordered set of 2 + r + 1 elements a1, a2, . . . , a2+r+1, for two different modesof association obtained by insertion of parentheses. Since the theorem holds forall values of n ≤ r , the parentheses can all be deleted up to the penultimate stage.Then we have p = (a1a2 · · ·at )(at+1 · · ·a2+r+1), where 1 ≤ t ≤ 2 + r , and p′ =(a1 · · ·ai)(ai+1 · · ·a2+r+1), where 1 ≤ i ≤ 2+ r . If i = t , then p = p′. Otherwise,we can assume without loss of generality that i > t . Then

p′ = ((a1a2 · · ·at )(at+1 · · ·ai))(ai+1 · · ·a2+r+1)

= (a1 · · ·at )((at+1 · · ·ai)(ai+1 · · ·a2+r+1)

), by associativity in S

= (a1 · · ·at )(at+1 · · ·aiai+1 · · ·a2+r+1)= p.

Thus p = p′ in either case, and the theorem holds for n = r + 1 also. Hence bythe principle of mathematical induction the theorem holds for all positive integralvalues of n. �

Powers of an Element Let S be a semigroup and a ∈ S. Then the powers of a

are defined recursively:

a1 = a, an+1 = an · a for n= 1,2,3, . . . ;n is called the index of an. Thus the powers of a are defined for all positive integralvalues of n.

Proposition 2.2.3 Let S be a semigroup. Then for any element a ∈ S, arat = ar+t

and (ar )t = art , r, t are positive integers.

Proof The proof follows from Theorem 2.2.1. �

Definition 2.2.7 Let S be a semigroup with identity 1 and a ∈ S. An element a′ ∈ S

is said to be a left inverse of a with respect to 1 iff a′a = 1. Similarly, an elementa∗ ∈ S is a right inverse of a iff aa∗ = 1. An element, which is both a left and rightinverse of an element a, with respect to 1, is called a two-sided inverse or an inverseof a.

Theorem 2.2.2 Let G be a semigroup with an identity element 1. If a ∈G has aninverse, then it is unique.

Page 78: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 61

Proof Let b and b′ be inverses of a in G. Then

b = b1

= b(ab′), since b′ is an inverse of a.

= (ba)b′ (by associativity in G)

= 1b′, since ba = 1

= b′. �

We denote by a−1 the unique inverse (if it exists) of an element a of a semigroup.The set M(X) of all mappings of a given non-empty set X into itself, where

the binary operation is the usual composition ‘◦’ of mappings, forms an importantsemigroup.

Proposition 2.2.4 If X is a non-empty set, M(X) is a monoid.

Proof Clearly, (M(X),◦) is a semigroup under usual composition of mappings. Let1X :X→X be the identity map defined by 1X(x)= x for all x ∈X. Then for anyf ∈M(X), (1X ◦ f )(x) = 1X(f (x)) = f (x) and (f ◦ 1X)(x) = f (1X(x)) = f (x)

for all x ∈ X imply 1X ◦ f = f ◦ 1X = f . Consequently, M(X) is a monoid with1X as its identity element. �

Remark Every element in M(X) may not have an inverse.For example, if X = {1,2,3}, then f ∈ M(X) defined by f (1) = f (2) =

f (3) = 1 has no inverse in M(X). Otherwise, there exists an element g ∈M(X)

such that f ◦ g = g ◦ f = 1X . Then 1= 1X(1)= (g ◦ f )(1)= g(f (1))= g(1) and2= 1X(2)= (g ◦ f )(2)= g(f (2))= g(1) imply that g(1) has two distinct values.This contradicts the assumption that g is a map.

We now characterize the elements of M(X) which have inverses.

Theorem 2.2.3 An element f in the monoid M(X) has an inverse iff f is a bijec-tion.

Proof The proof follows from Corollary of Theorem 1.2.7 of Chap. 1 (by takingX = Y in particular). �

Let X be a non-empty set and B(X) denote the set of all binary relations on X.Define a binary operation ‘◦’ on B(X) as follows:

If ρ,σ ∈ B(X), then σ ◦ ρ = {(x, y) ∈ X × X : if ∃z ∈ X such that (x, z) ∈ρ and (z, y) ∈ σ }.

Then B(X) is a semigroup with identity element Δ= {(x, x) : x ∈X}.

Definition 2.2.8 A relation ρ on a semigroup S is called a congruence relation onS iff

Page 79: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

62 2 Groups: Introductory Concepts

(i) ρ is an equivalence relation on S;(ii) (a, b) ∈ ρ⇒ (ca, cb) ∈ ρ and (ac, bc) ∈ ρ for all c ∈ S.

Let ρ be a congruence relation on a semigroup S and S/ρ the set of all ρ-equivalence classes aρ,a ∈ S. Define a binary operation ‘◦’ on S/ρ by aρ ◦ bρ =(ab)ρ, for all a, b ∈ S. Clearly, the operation ‘◦’ is well defined.

Then (S/ρ,◦) becomes a semigroup.

Definition 2.2.9 A mapping f from a semigroup S into a semigroup T is called ahomomorphism iff for all a, b ∈ S,

f (ab)= f (a)f (b).

Let S and T be semigroups. Then a homomorphism f : S→ T is called

(i) an epimorphism iff f is surjective;(ii) a monomorphism iff f is injective; and

(iii) an isomorphism iff f is bijective.

If f : S→ T is an isomorphism, we say that S is isomorphic to T denoted S ∼= T .

Proposition 2.2.5 Let S be a semigroup and ρ a congruence relation on S. Thenthe map p : S → S/ρ defined by p(a)= aρ for all a ∈ S is a homomorphism fromS onto S/ρ (p is called natural homomorphism).

Proof Trivial. �

Definition 2.2.10 Let S and T be two semigroups and f : S→ T a homomorphismfrom S onto T . The kernel of f denoted by kerf is defined by kerf = {(a, b) ∈S × S : f (a)= f (b)}.

Clearly, ρ = kerf is a congruence relation on S. Then S/ρ is a semigroup.

Proposition 2.2.6 Let f be a homomorphism from a semigroup S onto a semi-group T . Then the semigroup S/kerf is isomorphic to T .

Proof Suppose ρ = kerf . Define g : S/ρ → T by g(aρ) = f (a) for all a ∈ S.Clearly, g is an isomorphism. �

Definition 2.2.11 A non-empty subset I of a semigroup S is called a left (right)ideal of S iff xa ∈ I (ax ∈ I ) for all x ∈ S, for all a ∈ I and I is called an ideal ofS iff I is both a left ideal and a right ideal of S.

Example 2.2.4 Let S be a semigroup. Then

(i) S is an ideal of S;

Page 80: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 63

(ii) for each a ∈ S,Sa = {sa : s ∈ S} is a left ideal and aS = {as : s ∈ S} is a rightideal of S.

Definition 2.2.12 A semigroup S is called left (right) simple iff S has no left (right)ideals other than S.

Definition 2.2.13 Let S be a semigroup. An element a ∈ S is called an idempotentiff aa = a2 = a.

Clearly if 1 or 0 ∈ S, they are idempotents. The set of idempotents of S is denotedby E(S).

If a semigroup S contains 0, then an element c ∈ S is said to be a nilpotentelement of rank n for n ≥ 2 iff cn = 0, but cn−1 �= 0 and hence (cn−1)2 = 0, since2(n − 1) ≥ n, so that cn−1 is a nilpotent element of rank 2. Thus the followingproposition is immediate.

Proposition 2.2.7 If a semigroup S contains any nilpotent element, then there alsoexists a nilpotent element of rank 2 in S.

Definition 2.2.14 A semigroup S is called a band iff S = E(S), i.e., iff every ele-ment of S is idempotent. S is called a right (left) group, iff S is right (left) simpleand left (right) cancellative.

Let S be a band. Define a relation ‘≤’ on S by e ≤ f , iff ef = f e = e. Thenclearly, ≤ is a partial order on S. A band S is said to be commutative, iff S is acommutative semigroup.

Let X and Y be two sets and define a binary operation on S =X× Y as follows:(x, y)(z, t) = (z, t), where x, z ∈ X and y, t ∈ Y . Then S is a non-commutativeband. We call S the rectangular band on X× Y .

Definition 2.2.15 Let S be a semigroup. An element a ∈ S is called regular iffa ∈ aSa, i.e., iff a = axa for some x ∈ S. A semigroup S is called regular iff everyelement of S is regular.

Clearly, if axa = a, then e= ax and f = xa are idempotents in S.Let a ∈ S. An element b ∈ S is said to be an inverse of a iff aba = a and bab= b.

Clearly, if a is a regular element of S, then a has at least one inverse.

Example 2.2.5 (i) Every right group is a regular semigroup.(ii) Every band is a regular semigroup.(iii) M(X) (cf. Proposition 2.2.4) is a regular semigroup under usual composition

of mappings.(iv) Let M2(Q) be the set of all 2× 2 matrices

(a bc d

)over Q, the set of rationals.

Then M2(Q) is a regular semigroup with respect to the usual matrix multiplication.

Page 81: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

64 2 Groups: Introductory Concepts

Definition 2.2.16 A regular semigroup S is called an inverse semigroup iff forevery element a of S there exists a unique element a−1 such aa−1a = a anda−1aa−1 = a−1.

Clearly, every inverse semigroup is a regular semigroup, but there are regularsemigroups which are not inverse semigroups. For example, a rectangular band is aregular semigroup, but it is not an inverse semigroup.

Let (S,◦) be a semigroup. A non-empty subset T of S is called a sub-semigroupof S iff ∀a, b ∈ T , a ◦ b ∈ T i.e., iff (T ,◦) is also a semigroup where the latteroperation ‘◦’ is the restriction of ‘◦’ to T × T .

For example, (N, ·) is a sub-semigroup of (Z, ·), where ‘·’ denotes the usualmultiplication. Clearly, for any semigroup S, S is a sub-semigroup of itself.

Example 2.2.6 Let S =M2(R) be the multiplicative semigroup of all 2 × 2 realmatrices and T the subset of all matrices of the form

(a 00 0

), a ∈ R. Then T is a

sub-semigroup of S.S has an identity I = ( 1 0

0 1

)and T has an identity I ′ = ( 1 0

0 0

)but I �= I ′.

This example shows that a semigroup S with an identity 1 may have a sub-semigroup with an identity e such that e �= 1.

Proposition 2.2.8 If {Ai} is any collection of sub-semigroups of a semigroup S,then⋂

i Ai is also a sub-semigroup of S, provided⋂

i Ai �= ∅.

Proof Let M =⋂i Ai (�=∅) and a, b ∈M . Then a, b ∈Ai ⇒ ab ∈Ai for each sub-semigroup Ai ⇒ ab ∈M ⇒M is a sub-semigroup of S, as associative property ishereditary. �

If X is a non-empty subset of a semigroup S, then 〈X〉, the sub-semigroup of S

generated by X defined by the intersection of all sub-semigroups of S containing X,is the smallest sub-semigroup of S. We say that X generates S iff 〈X〉 = S. Clearly〈S〉 = S.

Let a ∈ S, then 〈{a}〉 = 〈a〉 is called the cyclic sub-semigroup of S generatedby a. A semigroup S is called cyclic iff there exists an element a ∈ S such thatS = 〈a〉.

Let S be an inverse semigroup and a, b ∈ S. Then the relation ‘≤’ defined bya ≤ b iff there exists an idempotent e ∈ S such that a = eb is a partial order relation.

Let E(S) be the set of all idempotents of an inverse semigroup S. Then E(S)

is a sub-semigroup of S. Moreover, E(S) is a semilattice, called the semilattice ofidempotents of S.

Some Other Semigroups A semigroup S is called fully idempotent iff each idealI of S is idempotent, i.e., iff I 2 = I .

The following statements for a semigroup S are equivalent:

(a) S is fully idempotent;

Page 82: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 65

(b) for each pair of ideals, I, J of S, I ∩ J = IJ ;(c) for each right ideal R and two-sided ideal I,R ∩ I ⊆ IR;(d) for each left ideal L and two-sided ideal I , L∩ I ⊆ LI .

Definition 2.2.17 A function l(r) on a semigroup S is said to be left (right) trans-lation on S iff l(r) is written as a left (right) operator and satisfies

l(xy)= (lx)y((xy)r = x(yr)

) ∀x, y ∈ S.

The pair (l, r) is said to be linked iff x(ly) = (xr)y ∀x, y ∈ S and is then called abitranslation on S.

The set L(S) of all left translations (R(S) of all right translations) on S with theoperation of multiplication defined by (ll1)x = l(l1x)(x(rr1)= (xr)r1) ∀x ∈ S is asemigroup.

The set B(S) of all bitranslations on S with the operation defined by (l, r)(l1, r1)=(ll1, rr1) is a semigroup and it called the translational hull of S.

Two bitranslations (l, r) and (l1, r1) are said to be equal iff l = l1 and r = r1.For any s ∈ S, the functions ls and rs given by lsx = sx, xrs = xs ∀x ∈ S are

called respectively the inner left and inner right translation on S induced by s; thepair Ts = (ls , rs) is called the inner bitranslation on S induced by s.

The set T (S) of all inner bitranslations on S is called the inner part of B(S).If Li(S) and Ri(S) are two sets of all inner left and inner right translations on S

respectively, then T (S)⊂ B(S), Li(S)⊂ L(S), and Ri(S)⊂R(S).

Lemma 2.2.1 If l ∈ L(S), r ∈ R(S), ls ∈ Li(S), rs ∈ Ri(S), Ts ∈ T (S),w =(l, r) ∈ B(S), then for every s ∈ S,

(i) lls = lls , ls l = lsr ;(ii) rsr = rsr , rrs = rls and

(iii) wTs = Tls, Tsw = Tsr .

Proof (i) (lls)x = l(lsx)= l(sx)= (ls)x = llsx ∀x ∈ S⇒ lls = lls ∈ Li(S).Again (ls l)x = ls(lx)= s(lx)= (sr)x = lsrx ∀x ∈ S⇒ ls l = lsr ∈ Li(S).(ii) x(rsr)= (xrs)r = (xs)r = x(sr)= xrsr ∀x ∈ S⇒ rsr = rsr ∈Ri(S).Similarly, rrs = rls ∈Ri(S).By using (i) and (ii) it follows that(iii) wTs = (l, r)(ls , rs)= (lls , rrs)= (lls , rls)= Tls ∈ T (S).Similarly, Tsw = Tsr ∈ T (S). �

Corollary 1 For a semigroup S,

(i) Li(S) is an ideal of L(S);(ii) Ri(S) is an ideal of R(S); and

(iii) T (S) is an ideal of B(S).

Corollary 2 For a semigroup S,

(i) Li(S) is a sub-semigroup of L(S);

Page 83: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

66 2 Groups: Introductory Concepts

(ii) Ri(S) is a sub-semigroup of R(S); and(iii) T (S) is a sub-semigroup of B(S).

Definition 2.2.18 A semigroup S is said to be left (right) reductive, iff xa = xb

(ax = bx) ∀x ∈ S ⇒ a = b. If S is both left and right reductive, then S is said tobe reductive. If xa = xb and ax = bx ∀x ∈ S⇒ a = b, then S is said to be weaklyreductive.

Clearly, a reductive semigroup is also weakly reductive.For the application of category theory we follow the terminology of Appendix B.

It is easy to check that semigroups and their homomorphisms form a category de-noted by SG.

We note that for a semigroup S ∈ SG,T (S) is also a semigroup ∈ SG. For f :S → W in SG, define f∗ = T (f ) : T (S)→ T (W) by f∗((lr , rs)) = (lf (s), rf (s)).Then for g :W →X in SG, (gf )∗ : T (S)→ T (X) in SG is such that

(gf )∗((ls , rs)) = (l(gf )(s), r(gf )(s))= (lg(f (s)), rg(f (s)))= g∗((lf (s), rf (s)))

= g∗(f∗((ls , rs))

) ∀(ls , rs) ∈ T (S) ⇒ (gf )∗ = g∗f∗.

Also for the identity homomorphism IS : S→ S in SG, IS∗ : T (S)→ T (S) in SG issuch that IS∗((ls , rs)) = (lIS(s), rIS(s)) = (ls , rs) ∀(ls, rs) ∈ T (S)⇒ IS∗ is the iden-tity homomorphism. The following theorem is immediate from the above discus-sions.

Theorem 2.2.4 T : SG→ SG is a covariant functor (see Appendix B).

Lemma 2.2.2 For a semigroup S, the function f : S → T (S) defined by f (s) =Ts ∀s ∈ S is a homomorphism from S onto T (S).

Proof f (st) = Tst = TsTt = f (s)f (t) ∀s, t ∈ S ⇒ f is a homomorphism. More-over, for any Ts ∈ T (S), we can find s ∈ S such that f (s)= Ts . �

Theorem 2.2.5 The function f : S → T (S) defined by f (s) = Ts is an isomor-phism iff S is reductive.

Proof Suppose S is reductive and f (s)= f (t) for some s, t ∈ S. Then Ts = Tt ⇒(ls , rs)= (lt , rt )⇒ ls = lt and rs = rt ⇒ sx = tx and xs = xt ∀x ∈ S⇒ s = t ⇒ f

is injective. Hence by Lemma 2.2.2, f is an isomorphism.Conversely, let f be an isomorphism and ax = bx, xa = xb hold ∀a, b ∈ S and

∀x ∈ S. Then lax = lbx and xra = xrb hold ∀x ∈ S. This shows that la = lb andra = rb yielding f (a)= Ta = (la, ra)= (lb, rb)= Tb = f (b). Hence a = b⇒ S isreductive. �

Corollary If S is a cancellative semigroup, then the function f : S→ T (S) definedby f (s)= Ts is an isomorphism.

Page 84: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 67

For a given semigroup S ∈ SG, the set FS(X) of all semigroup homomorphismsfrom S to X in SG forms a semigroup under usual multiplication of functions.

We also define for each homomorphism f : X → Y in SG, the semigroup ho-momorphism f∗ = FS(f ) : FS(X)→ FS(Y ) by f∗(g)= f ◦ g ∀g : S → X in SG.Hence the following lemma is immediate

Lemma 2.2.3 FS : SG→ SG is a covariant functor.Let (FS,T ) denote the set of all natural transformations from the covariant func-

tor FS to the covariant functor T : SG→ SG (see Appendix B).

Theorem 2.2.6 For each semigroup S ∈ SG, the set (FS,T ) admits a semigroupstructure such that (FS,T ) is isomorphic to T (S).

Proof Using the Yoneda Lemma (see Appendix B) for covariant functors FS and T

we find that there is a bijection fS : T (S)→ (FS,T ) for every S ∈ SG. As T (S) isa semigroup, fS induces composition on the set (FS,T ) admitting it a semigroupstructure such that (FS,T ) is isomorphic to T (S). �

Theorem 2.2.7 A semigroup S is isomorphic to the semigroup (FS,T ) iff S isreductive.

Proof The theorem is immediate by using Theorems 2.2.5 and 2.2.6. �

Remark Theorem 2.2.6 yields a representation of the covariant functor T : SG →SG. In this way the problem of classifying semigroups, i.e., of computing T (S) hasbeen reduced to the determination of the set of natural transformations (FS,T ).

Let S be a semigroup. T a sub-semigroup of S and w ∈ B(T ). Then a bitransla-tion w ∈ B(S) is said to be an extension of w to S iff wx =wx and xw = xw ∀x ∈ T

and we write w|T =w.

Theorem 2.2.8 Let S be a semigroup, T a reductive semigroup, f : S → T anepimorphism and let w ∈ B(S). Then there exists a unique element w′ ∈ B(T ) suchthat for each x ∈ S, w′f (x)= f (wx) and f (x)w′ = f (xw).

Proof For t ∈ T ,∃s ∈ S such that f (s) = t . Now define w′t = f (ws) and tw′ =f (xw). Then the theorem follows. �

Theorem 2.2.9 Let S be a reductive semigroup and l, r : S → S are such that thepair (l, r) is linked, then (l, r) ∈ B(S).

Proof It is sufficient to show that l ∈ L(S) and r ∈R(S). Let x, y ∈ S. Then for eacht ∈ S, t (lx)(y) = (t (lx))y = (tr)(x)y = (tr)(xy) = t (l(xy)). Since S is reductive,(lx)y = l(xy)⇒ l ∈ L(S). Similarly, r ∈R(S). �

Page 85: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

68 2 Groups: Introductory Concepts

2.2.1 Topological Semigroups

Let S be a semigroup. If A and B are subsets of S, we define AB = {ab : a ∈A and b ∈ B}. If a subgroup S is a Hausdorff space such that the multiplicationfunction (x, y) �→ xy is continuous with the product topology on S × S, then S iscalled a topological semigroup. The condition that the multiplication on S is contin-uous is equivalent to the condition that for each x, y ∈ S and each open set W in S

with xy ∈W , ∃ open sets U and V such that x ∈U , y ∈ V and UV ⊂W .Note that any semigroup can be made into a topological semigroup by endowing

it the discrete topology and hence a finite semigroup is a compact semigroup.Let C be the space of complex numbers with complex multiplication. Then C

becomes a topological semigroup with a zero and an identity and no other idempo-tents. The unit disk D = {z ∈ C : |z| ≤ 1} is a complex sub-semigroup of C. Thecircle S1 = {z ∈C : |z| = 1} is also a sub-semigroup of C.

Problems

A Let A and B be subsets of a topological semigroup S.

(a) If A and B are compact, then AB is compact.(b) If A and B are connected, then AB is connected.(c) If B is closed, then {x ∈ S : xA⊂ B} is closed.(d) If B is closed, then {x ∈ S :A⊂ xB} is closed.(e) If B is compact, then {x ∈ S : xA⊂ Bx} is closed.(f) If A is compact and B is open, then {x ∈ S : xA⊂ B} is open.(g) If A is compact and B is closed, then {x ∈ S : xA∩B �= ∅} is closed.

Proof [See Carruth et al. (1983, 1986)]. �

B If S is a topological semigroup which is a Hausdorff space, then the set E(S) ofall idempotents of S is a closed subset of S.

Proof E(S) is the set of fixed points of the continuous function f : S→ S definedby x �→ x2.

Define g : S→ S×S by g(x)= (f (x), x)= (x2, x). Then g is continuous. Sincethe diagonal of a Hausdorff space is closed in S × S,g−1(Δ(S))= {x ∈ S : x2 = x}is closed. �

Semigroups of Continuous Self Maps Let S(X) denote the semigroup of allcontinuous maps from a topological space X into itself under composition of maps.

At present there are at least four broad areas where active researches on S(X)

are going on.These are:

(1) homomorphisms from S(X) into S(Y );(2) finitely generated sub-semigroups of S(X);

Page 86: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 69

(3) Green’s relations and related topics for S(X);(4) congruences on S(X).

We list some problems:

Problem 1 (a) If X and Y are homeomorphic spaces, then S(X) and S(Y ) are iso-morphic semigroups. Is its converse true?

[Hint. Let X be a discrete space with more than one element and Y be the sameset, but endowed with the indiscrete topology. Then X and Y are not homeomorphicbut S(X) and S(Y ) are isomorphic under identity map.]

(b) If X and Y are two compact 0-dimensional metric spaces, then X and Y arehomeomorphic⇔ the semigroups S(X) and S(Y ) are isomorphic.

Problem 2 Determine Green’s relations for elements of S(X) which are not neces-sarily regular.

Remark Some work has been done in this direction but there is much yet to do.

Problem 3 Determine all congruences on S(X).

Remark If X is discrete, this was solved. For the case when X is not discrete [seeMagil Jr. (1982)].

Problem 4 If X is Hausdorff and locally compact, then S(X) endowed with com-pact open topology is a topological semigroup. Is the converse true?

Remark The converse is not true [see De Groot (1959)].

2.2.2 Fuzzy Ideals in a Semigroup

Let S be a non-empty set. Consider the closed interval [0,1]. Any mapping fromS → [0,1] is called a fuzzy subset of S. It is a generalization of the usual conceptof a subset of S in the following sense.

Let A be a subset of S. Define its characteristic function κA by

κA(x) = 1 when x ∈A

= 0 when x /∈A.

So for each subset A of S there corresponds a fuzzy subset κA.Conversely, suppose A : S→[0,1] is a mapping such that Im A= {0,1}.Let A= {x ∈ S : A(x)= 1}.Now A is a subset of S and A is the characteristic function of A.

Page 87: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

70 2 Groups: Introductory Concepts

Definition 2.2.19 Let S be a semigroup. A fuzzy subset A (that is, a mapping fromS→[0,1]) is called a left (right) fuzzy ideal iff

A(xy)≥ A(y)(A(xy)≥ A(x)

).

Definition 2.2.20 Let A, B be two fuzzy subsets in a semigroup S. Define A ∪ B ,A∩ B, A ◦ B by

(A∪ B)(x) = max(A(x), B(x)

), ∀x ∈ S;

(A∩ B)(x) = min(A(x), B(x)

), ∀x ∈ S;

(A ◦ B)(x) = max{min(A(u), B(v)

)}, if x = uv, u, v ∈ S

= 0, if x cannot be expressed in the form x = uv.

2.2.3 Exercises

Exercises-IA

1. Verify that the following ‘∗’ are binary operations on the Euclidean plane R2:For (x, y), (x′, y′) ∈R2,

(i) (x, y) ∗ (x′, y′)= (x, y) [if (x, y)= (x′, y′)] = midpoint of the line joiningthe point (x, y) to the point (x′, y′) if (x, y) �= (x′, y′);

(ii) (x, y) ∗ (x′, y′)= (x + x′, y + y′), where + is the usual addition in R;(iii) (x, y) ∗ (x′, y′)= (x · x′, y · y′), where ‘·’ is the usual multiplication in R.

2. Verify that the following ‘◦’ are binary operations on Q:

(i) x ◦ y = x − y − xy;(ii) x ◦ y = x+y+xy

2 ;(iii) x ◦ y = x+y

3 .

Determine which of the above binary operations are associative and commuta-tive.

3. Determine the number different binary operations which can be defined on a setof three elements.

4. Let S be the set of the following six mappings fi :R\{0,1}→R, defined by

f1 : x �→ x; f2 : x �→ 1

1− x; f3 : x �→ x − 1

x; f4 : x �→ 1

x;

f5 : x �→ x

x − 1; f6 : x �→ 1− x.

Verify that usual composition of mappings is a binary operation on S and con-struct the corresponding multiplicative table.

Page 88: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.2 Semigroups 71

Exercises-IB

1. A binary operation ∗ is defined on Z by x ∗ y = x + y − xy, x, y ∈ Z. Showthat (Z,∗) is a semigroup. Let A = {x ∈ Z;x ≤ 1}. Show that {A,∗} is a sub-semigroup of (Z,∗).

2. Let A be a non-empty set and S = P(A) its power set. Show that (S,∩) and(S,∪) are semigroups. Do these semigroups have identities? If so, find them.

3. Show that for every element a in a finite semigroup, there is a power of a whichis idempotent.

4. Let (Z,+) be the semigroup of integers under usual addition and (E,+) be thesemigroup of even integers with integer 0 under usual addition. Then the map-ping f : Z→ E defined by z �→ 2z ∀z ∈ Z is a homomorphism. Find a homo-morphism g : Z→ E such that g �= f .

5. Show that the following statements are equivalent:

(i) S is an inverse semigroup;(ii) S is regular and its idempotents commute.

6. Prove the following:

(a) Let I be a left ideal of a semigroup S. Then its characteristic function κI

is a fuzzy left ideal. Conversely, if for any subset I of S its characteristicfunction κI is a fuzzy left ideal, then I is a left ideal of S;

(b) If A, B are fuzzy ideals of a semigroup S, then A∩ B, A∪ B, A◦ B are fuzzyideals of S.

7. Let S be an inverse semigroup and E(S) the semilattice of idempotents of S.Prove that

(i) (a−1)−1 = a, ∀a ∈ S

(ii) e−1 = e, ∀e ∈E(S)

(iii) (ab)−1 = b−1a−1, ∀a, b ∈ S

(iv) aea−1 ∈E(S) ∀a ∈ S and e ∈E(S).

8. Let ‘≤’ be a partial order on S such that (S,◦,≤) is a partially ordered (p.o.)semigroup. Define the set P 0

l (S)= {p ∈ S : a ≤ p ◦ a ∀a ∈ S} of all left positiveelements of (S,◦,≤) and correspondingly the set P 0

r (S) of all right positiveones, and P 0(S)= P 0

l (S) ∩ P 0r (S). Let E0(S) denote the set of all idempotents

of (S, o). Prove the following:

(i) If the p.o. semigroup (S,◦,≤) has a least element u, i.e., u≤ a ∀a ∈ S, thenu is idempotent, iff u= x ◦ y holds for some x, y ∈ S;

(ii) If P 0(S)= S and f ∈E0(S), then x ≤ f ⇔ x ◦ f = f ⇔ f ◦ x = f holds∀x ∈ S.

(iii) If P 0(S) = S holds and u is the least element of (S,≤), then S\{u} is anideal of (S, o), which is a maximal one. The converse holds if (S,≤) is afully ordered set, and if, for a < b⇒ a ◦ x = b for some x ∈ S.

9. A non-empty subset A of a semigroup S is called a generalized left semi-ideal(gls ideal), iff x2A⊆A for every x ∈ S.

Page 89: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

72 2 Groups: Introductory Concepts

(a) Let Z∗ denote the set of all non-negative integers. Then Z∗ is a semigroupunder usual multiplication. Show that A= {x ∈ Z∗ : x ≥ 6} is a gls ideal.

(b) In an idempotent semigroup S, prove that A is a left ideal of S⇔A is a glsideal.

(c) Let S be a semigroup prove that S is regular iff for each generalized leftsemi-ideal A of S and for each right ideal B of S,B ∩ A = B∗A, whereB∗ = {b2 : b ∈ B}.

2.3 Groups

Historically, the concept of a group arose through the study of bijective mappingsA(S) on a non-empty set S. Any mathematical concept comes naturally in a veryconcrete form from specific sources. We start with two familiar algebraic systems:(Z,+) (under usual addition of integers) and (Q+, ·) (under usual multiplication ofpositive rational numbers). We observe that the system (Z,+) possesses the follow-ing properties:

1. ‘+’ is a binary operation on Z;2. ‘+’ is associative in Z;3. Z contains an additive identity element, i.e., there is a special element, namely 0,

such that x + 0= 0+ x = x for every x in Z;4. Z contains additive inverses, i.e., to each x ∈ Z, there is an element (−x) in Z,

called its negative, such that x + (−x)= (−x)+ x = 0.

We also observe that the other system (Q+, ·) possesses similar properties:

1. multiplication ‘·’ is a binary operation on Q+;2. multiplication ‘·’ is associative in Q+;3. Q+ contains a multiplicative identity element, i.e., there is a special element,

namely 1, such that x · 1= 1 · x = x for every x in Q+;4. Q+ contains multiplicative inverses, i.e., to each x ∈Q+, there is an element x−1

which is the reciprocal of x in Q+, such that x · (x−1)= (x−1) · x = 1.

If we consciously ignore the notation and terminology, the above four properties areidentical in the algebraic systems (Z,+) and (Q+, ·). The concept of a group maybe considered as a distillation of the common structural forms of (Z,+) and (Q+, ·)and of many other similar algebraic systems.

Remark The algebraic system (A(S),◦) of bijective mappings A(S) on a non-empty set S(under usual composition of mappings) satisfies all the above four prop-erties. This group of transformations is not the only system satisfying all the aboveproperties. For example, the non-zero rationals, reals or complex numbers also sat-isfy above four properties under usual multiplication. So it is convenient to introducean abstract concept of a group to include these and other examples.

Page 90: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.3 Groups 73

The above properties lead to introduce the abstract concept of a group. We definea group as a monoid in which every element has an inverse. We repeat the definitionin more detail.

Definition 2.3.1 A group G is an ordered pair (G, ·) consisting of a non-empty setG together with a binary operation ‘.’ defined on G such that

(i) if a, b, c ∈G, then (a · b) · c= a · (b · c) (associative law);(ii) there exists an element 1 ∈G such that 1 · a = a · 1= a for all a ∈G (identity

law);(iii) for each a ∈G, there exists a′ ∈G such that a′ · a = a · a′ = 1 (inverse law).

Clearly, the identity element 1 is unique by Proposition 2.2.1. The element a′called an inverse of a is unique by Theorem 2.2.2 and is denoted by a−1.

A group G is said to be commutative iff its binary operation ‘·’ is commutative:a · b= b · a, for all a, b ∈G, otherwise G is said to be non-commutative.

The definition of a group may be re-written using additive notation: We writea + b for a · b,−a for a−1, and 0 for 1; a + b,−a, and 0 are, respectively, calledthe sum of a and b, negative of a, additive identity or zero and (G,+) is called anadditive group.

The binary operation in a group need not be commutative. Sometimes a commu-tative group is called an Abelian group in honor of Niels Henrick Abel (1802–1829);one of the pioneers in the study of groups.

Throughout this section a group G will denote an arbitrary multiplicative groupwith identity 1 (unless stated otherwise).

Proposition 2.3.1 If G is a group, then

(i) a ∈G and aa = a imply a = 1;(ii) for all a, b, c ∈G,ab = ac implies b = c and ba = ca implies b = c (left and

right cancellation laws);(iii) for each a ∈G,(a−1)−1 = a;(iv) for a, b ∈G,(ab)−1 = b−1a−1;(v) for a, b ∈G, each of the equations ax = b and ya = b has a unique solution

in G.

Proof (i) aa = a⇒ a−1(aa)= a−1a⇒ (a−1a)a = 1⇒ a = 1.(ii) ab= ac⇒ a−1(ab)= a−1(ac)⇒ (a−1a)b= (a−1a)c⇒ 1b= 1c⇒ b= c.

Similarly, ba = ca⇒ b= c.(iii) aa−1 = a−1a = 1⇒ (a−1)−1 = a.(iv) (b−1a−1)(ab) = b−1(a−1(ab)) = b−1((a−1a)b) = b−1(1b) = b−1b = 1

and (ab)(b−1a−1)= a(bb−1)a−1 = a1a−1 = aa−1 = 1⇒ (ab)−1 = b−1a−1.(v) a−1b = a−1(ax) = (a−1a)x = 1x = x and ba−1 = (ya)a−1 = y(aa−1) =

y1= y are solutions of the equations ax = b and ya = b, respectively.Uniqueness of the two solutions follow from the cancellation laws (ii). �

Page 91: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

74 2 Groups: Introductory Concepts

Corollary If a1, a2, . . . , an ∈G, then (a1 a2 a3 · · ·an)−1 = a−1

n · · ·a−12 a−1

1 .

Proposition 2.3.2 Let G be a semigroup. Then G is a group iff the following con-ditions hold:

(i) there exists a left identity e in G;(ii) for each a ∈G, there exists a left inverse a′ ∈G of a with respect to e, so that

a′a = e.

Proof If G is a group, then conditions (i) and (ii) follow trivially. Next let a semi-group G satisfy conditions (i) and (ii). As e ∈G,G �= ∅. If a ∈G, then by using (ii)it follows that aa′ = e. Thus a′ = a−1 is an inverse of a with respect to e, whereae = a(a−1a) = (aa−1)a = ea = a ∀a ∈ G⇒ e is an identity. Therefore G is agroup. �

Proposition 2.3.3 Let G be a semigroup. Then G is a group iff for all a, b ∈G theequations ax = b and ya = b have solutions in G.

Proof If G is a group, then by Proposition 2.3.1(v), the equations ax = b and ya =b have solutions in G. Conversely, let the equation ya = a have a solution e ∈G.Then ea = a. For any b ∈G, if t (depending on a and b) be a solution of the equationax = b, then at = b.

Now, eb= e(at)= (ea)t = at = b.Consequently, eb= b, ∀b ∈G⇒ e is a left identity in G.Next a left inverse of an element a ∈G is given by the solution ya = e and the

solution belongs to G. Consequently, for each a ∈ G, there exists a left inverse inG. As a result G is a group by Proposition 2.3.2. �

Corollary A semigroup G is a group iff aG=G and Ga =G for all a ∈G, whereaG= {ax : x ∈G} and Ga = {xa : x ∈G}.

Definition 2.3.2 The order of a group G is the cardinal number |G| and G is saidto be finite (infinite) according as |G| is finite (infinite).

Example 2.3.1 (Z,+), (Q,+) and (R,+) are infinite abelian groups, where +denotes ordinary addition. They are called additive group of integers, additive groupof rational numbers and additive group of real numbers, respectively.

Example 2.3.2 (Q∗, ·), (R∗, ·) and (C∗, ·), (S1, ·) (S1 = {z ∈ C : |z| = 1}) formgroups under usual multiplication, where Q∗,R∗,C∗ and C denote respectively theset of all non-zero rational numbers, non-zero real numbers, non-zero complex num-bers and all complex numbers. They are called multiplicative groups of non-zero ra-tionals, multiplicative group of non-zero reals and multiplicative group of non-zerocomplex numbers, respectively. (S1, ·) is called circle group in C.

We now present vast sources of interesting groups.

Page 92: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.3 Groups 75

Example 2.3.3 (Permutation group) Let S be a non-empty set and A(S) be the setof all bijective mappings from S onto itself. Let f,g ∈A(S).

Define

fg by (fg)(x)= f(g(x)), for all x ∈ S. (2.1)

First we show that fg ∈ A(S). Suppose x, y ∈ S and (fg)(x) = (fg)(y). Thenf (g(x)) = f (g(y)). Since f is injective, it follows that g(x) = g(y). Again thisimplies x = y as g is injective. Consequently, fg is an injective mapping. Nowlet x ∈ S. Since f is surjective, there exists y ∈ S such that f (y) = x. Again g issurjective. Hence g(z) = y for some z ∈ S. Then (fg)(z) = f (g(z)) = f (y) = x.This implies that fg is surjective and hence fg ∈ A(S). Since every element ofA(S) has an inverse, we find that A(S) is a group under the composition defined by(2.1) This group is called the permutation group or the group of all permutationson S.

Example 2.3.4 (Symmetric group) In Example 2.3.3, if S contains only n (n ≥ 1)

elements, say S = In = {1,2, . . . n}, then the group A(S) is called the symmetricgroup Sn on n elements. If f ∈A(S), then f can be described by listing the elementsof In on a row and the image of each element under f directly below it. Accordingto this assumption we write

f =(

1 2 · · · n

i1 i2 · · · in

), where f (t)= it ∈ In, t ∈ In.

Suppose now i1, i2, . . . , ir (r ≤ n) are r distinct elements of In. If f ∈ A(S) besuch that f maps i1 �→ i2, i2 �→ i3, . . . , ir−1 �→ ir , ir �→ i1 and maps every otherelements of In onto itself, then f is also written as f = (i1i2 · · · ir ). This is calledan r-cycle. A 2-cycle is called a transposition. The permutations α1, α2, . . . , αt inSn are said to be disjoint iff for every i, 1 ≤ i ≤ t and every k in In, αi(k) �= k

imply αj (k) = k for every j , 1 ≤ j ≤ t . A permutation α ∈ Sn is said to be evenor odd according as α can be expressed as a product of even or odd number oftranspositions. The set of all even permutations in Sn forms a group, called thealternating group of degree n, denoted by An. For n ≥ 3, it is a normal subgroupof Sn (see Ex. 14 of SE-II).

The groups Sn are very useful to the study of finite groups. As n increases thestructure of Sn becomes complicated. But we can work out the case n= 3 comfort-ably. The symmetric group S3 has six elements and is the smallest group whose lawof composition is not commutative.

Because of importance of this group, we now describe this group as follows:For n = 3, I3 = {1,2,3} and A(S) = S3. This symmetric groups S3 consists of

exactly six elements:

e : 1 �→ 1, f1 : 1 �→ 2, f2 : 1 �→ 3, f3 : 1 �→ 1, f4 : 1 �→ 3, f5 : 1 �→ 22 �→ 2 2 �→ 3 2 �→ 1 2 �→ 3 2 �→ 2 2 �→ 13 �→ 3 3 �→ 1 3 �→ 2 3 �→ 2 3 �→ 1 3 �→ 3.

Page 93: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

76 2 Groups: Introductory Concepts

We can describe these six mappings in the following way:

e=(

1 2 31 2 3

)= (1), f1 =

(1 2 32 3 1

)= (1 2 3),

f2 =(

1 2 33 1 2

)= (1 3 2), f3 =

(1 2 31 3 2

)= (2 3),

f4 =(

1 2 33 2 1

)= (1 3), f5 =

(1 2 32 1 3

)= (1 2).

In

S3, e=(

1 2 31 2 3

)

is the identity element.Now

f1f3 =(

1 2 32 1 3

)= f5 and f3f1 =

(1 2 33 2 1

)= f4.

Hence f1f3 �= f3f1. Consequently S3 is not a commutative group.

Example 2.3.5 (General linear group) Let GL(2,R) denote the set of all 2 × 2matrices

(a bc d

), where a, b, c, d are real numbers and ad − bc �= 0. Taking usual

multiplication of matrices as the group operation, we can show that GL(2,R) is agroup where

( 1 00 1

)is the identity element and the element

(d

ad−bc−b

ad−bc−c

ad−bca

ad−bc

)

is the inverse of(

a bc d

)in GL(2,R).

This is a non-commutative group, as( 1 2

3 4

),( 5 6

7 8

) ∈ GL(2,R) and( 1 2

3 4

)( 5 67 8

) =( 19 2243 50

)and( 5 6

7 8

)( 1 23 4

)= ( 23 3431 46

).

This group is called the general linear group of order 2 over the set of all realnumbers R.

Remark The group GL(2,C) defined in a similar way is called general linear groupof order 2 over C. In general, GL(n,R) (GL(n,C)), the group of all invertible n×n

real (complex) matrices is called general linear group of order n over R (C).

The concept of congruence of integers (see Chap. 1) is essentially due to Gauss.This is one of the most important concepts in number theory. This suggests theconcept of congruence relations on groups, which is important in modern algebra,because every congruence relation on a group produces a new group.

Page 94: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.3 Groups 77

We now introduce the concept of congruence relation on a group. An equivalencerelation ρ on a group G is said to be a congruence relation on G iff (a, b) ∈ ρ

implies (ca, cb) ∈ ρ and (ac, bc) ∈ ρ, for all c ∈G. Let a be an element of a groupG and ρ be a congruence relation on G. Then the subset {x ∈ G : (a, x) ∈ ρ} iscalled a congruence class for the element a. This subset is denoted by (a). Thefollowing theorem lists some properties of congruence classes.

Theorem 2.3.1 Let ρ be a congruence relation on a group G. Then

(i) a ∈ (a);(ii) (a)= (b) iff (a, b) ∈ ρ;

(iii) if a, b ∈G, then either (a)= (b) or (a)∩ (b)= ∅;(iv) If (a)= (b) and (c)= (d), then (ac)= (bd) and (ca)= (db).

Proof (i) Left as an exercise.(ii) Left as an exercise.(iii) Suppose (a)∩ (b) �= ∅. Let c ∈ (a)∩ (b). Then (a, c) ∈ ρ and (b, c) ∈ ρ. Let

x ∈ (a). Then (a, x) ∈ ρ. From the symmetric and transitive property of ρ and from(a, c) ∈ ρ and (a, x) ∈ ρ we find that (c, x) ∈ ρ. Hence (b, c) ∈ ρ and (c, x) ∈ ρ

imply that (b, x) ∈ ρ. As a result x ∈ (b) and hence (a) ⊆ (b). Similarly, we canshow that (b)⊆ (a). Consequently (a)= (b).

(iv) From the assumption, (a, b) ∈ ρ and (c, d) ∈ ρ. Now ρ is a congruencerelation. Hence (ca, cb) ∈ ρ and (cb, db) ∈ ρ. The transitive property of ρ impliesthat (ca, db) ∈ ρ. Hence (ca)= (db). Similarly (ac)= (bd). �

The following theorem will show how one can construct a new group from agiven group G if a congruence relation ρ on G is given.

Theorem 2.3.2 Let ρ be a congruence relation on a group G. If G/ρ is the setof all congruence classes for ρ on G, then G/ρ becomes a group under the binaryoperation given by (a)(b)= (ab).

Proof Let (a), (b) ∈ G/ρ. Suppose (a) = (c) and (b) = (d) (c, d ∈ G). Then(a, c) ∈ ρ and (b, d) ∈ ρ. Hence from (iv) of Theorem 2.3.1, we find that (ab, cd) ∈ρ. This shows that (ab)= (cd). Therefore the operation defined by (a)(b)= (ab) iswell defined. Now, let (a), (b) and (c) be three elements of G. Then ((a)(b))(c)=(ab)(c) = ((ab)c) = (a(bc)) = (a)(bc) = (a)((b)(c)). Therefore G/ρ is a semi-group. We can show that the congruence class (1) containing the identity element 1of G is the identity element of G/ρ. If (a) ∈G/ρ, then a ∈G and hence a−1 ∈G

implies (a−1) ∈G/ρ. Now (a−1)(a)= (a−1a)= (1)= (aa−1)= (a)(a−1). Hencethe inverse of (a) exists in G/ρ. Consequently G/ρ is a group. �

Corollary 1 If G is a commutative group and ρ is a congruence on G, then G/ρ

is a commutative group.

Page 95: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

78 2 Groups: Introductory Concepts

Example 2.3.6 (Additive group of integers modulo m) Let (Z,+) be the additivegroup of integers. Let m be a fixed positive integer. Define a relation ρ on Z by

ρ = {(a, b) ∈ Z×Z : a − b is divisible by m}.

Clearly, ρ is a congruence relation. This relation is usually called congruence rela-tion modulo m. Two integers a and b are said to be congruent modulo m, writtena ≡ b (modm), iff a− b is divisible by m. For each integer a, the congruence classto which a belongs is (a)= {x ∈ Z : x ≡ a (modm)} = {a + km : k ∈ Z}. Let Z/ρ

denote the set of all congruence classes modulo m.From Theorem 2.3.2, we find that Z/ρ is a group where the group operation + is

defined by

(a)+ (b)= (a + b).

This group is a commutative group. In this group the identity element is the con-gruence class (0) and (−a) is the inverse of (a). Generally we denote this groupby Zm and this group is said to be the additive group of integers modulo m.(0), (1), . . . , (m− 1) exhaust all the elements of Zm. Given an arbitrary integer a,the division algorithm implies that there exist unique integers q nd r such that

a =mq + r, 0≤ r < m.

From the definition of congruence a ≡ r (modm), it follows that (a) = (r).Clearly, there are m possible remainders: 0,1, . . . ,m − 1. Consequently, everyinteger belongs to one and only one of the m different congruence classes:(0), (1), . . . , (m− 1) and Zm consists of exactly these elements.

Remark The above example shows that for every positive integer m, there exists anabelian group G such that |G| =m.

Note 1 Zm may be considered to be a group consisting of m integers 0,1, . . . ,m−1together with the binary operation ∗ given by the rule:

for t, s ∈ Z, t ∗ s = t + s, if t + s < m

= r, if t + s ≥m, where r is the remainder

when t + s is divided by m.

One of the basic problems in group theory is to classify groups up to isomorphisms.For such a classification, we have to either construct an explicit expression for anisomorphism or we have to show that no such isomorphism exists. An isomorphismis a special homomorphism and it identifies groups for their classifications. Theconcept of a homomorphism is itself very important in modern algebra.

In the context of group theory (like semigroup), the word homomorphism meansa mapping from a group to another, which respects binary operations defined on thetwo groups: If f :G→G′ is a mapping between groups G and G′, then f is called

Page 96: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.3 Groups 79

a homomorphism iff f (ab) = f (a)f (b) for all a, b ∈G. The kernel of the homo-morphism f denoted by kerf is defined by kerf = {a ∈G : f (a)= 1G′ = 1′}.

Remark Taking a = b = 1, the identity element in G, we find f (1) = f (1)f (1),which shows that f (1) is the identity element 1′ of G′. Again taking b = a−1, wefind f (1)= f (a)f (a−1). This implies f (a−1)= [f (a)]−1. Thus a homomorphismof groups maps identity element into identity element and the inverse element intothe inverse element.

Note 2 If f :G→G′ is a homomorphism of groups, then

f(an)= (f (a)

)n, a ∈G, n ∈ Z

(an is defined in Definition 2.3.4

).

Proof It follows by induction on n that for n= 1,2,3, . . . ,

f(an)= (f (a)

)n.

Again f (a−1)= (f (a))−1 shows that for n=−k, k = 1,2,3, . . . ,

f(an)= f

((a−1)k)= (f (a−1))k = (f (a)

)−k = (f (a))n

Finally, f (a0)= f (1)= 1′ = (f (a))0. �

Definition 2.3.3 A homomorphism f :G→G′ between groups is called

(i) an epimorphism iff f is surjective (i.e., onto);(ii) a monomorphism iff f is injective (i.e., 1–1);

(iii) an isomorphism iff f is an epimorphism and a monomorphism;

An isomorphism of a group onto itself is called an automorphism and a homo-morphism of a group G into itself is called an endomorphism.

Remark Since two isomorphic groups have the identical properties, it is convenientto identify them to each other. They may be considered as replicas of each other.

If f :G→ H and g : H → K are homomorphisms of groups, then their usualcomposition g ◦ f :G→K defined by (g ◦ f )(a)= g(f (a)), a ∈G, is again a ho-momorphism. Because if a, b ∈G, then (g ◦ f )(ab)= g(f (ab))= g(f (a)f (b))=g(f (a))g(f (b))= (g ◦ f )(a)(g ◦ f )(b).

Theorem 2.3.3 Let f :G→G′ be a homomorphism of groups. Then

(i) f is a monomorphism iff kerf = {1};(ii) f is an epimorphism iff Imf =G′;

(iii) f is an isomorphism iff there is a homomorphism g :G′ →G such that g ◦f =IG and f ◦ g = IG′ , where IG is the identity homomorphism of G.

Page 97: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

80 2 Groups: Introductory Concepts

Proof (i) Let f be a monomorphism. Then f is injective and hence kerf = {1}.Conversely, let kerf = {1}. Now if f (a)= f (b), then f (ab−1)= f (a)f (b)−1 = 1shows that ab−1 ∈ kerf = {1}, and hence a = b. Consequently, f is injective.

(ii) and (iii) follow trivially. �

Theorem 2.3.4 Let G be a group and AutG be the set of all automorphisms of G.Then AutG is a group, called the automorphism group of G.

Proof For f,g ∈ AutG, define f ◦ g to be the usual composition. Clearly, f ◦ g ∈AutG. Then AutG becomes a group with identity homomorphism IG of G as iden-tity and f−1 as the inverse of f ∈AutG. �

Example 2.3.7 (i) Let (R∗, ·) be the multiplicative group of non-zero reals andGL(2,R) be the general linear group defined in Example 2.3.5. Consider the mapf : GL(2,R)→ R∗ defined by f (A) = detA. Then for A,B ∈ GL(2,R),AB ∈GL(2,R) and f (AB) = det(AB) = detAdetB = f (A)f (B). This shows that f

is a homomorphism. As 1 ∈ R∗ is the identity element of (R∗, ·), kerf = {A ∈GL(2,R) : f (A)= detA= 1}.

(ii) Let G be the group under binary operation on R3 defined by (a, b, c) ∗(x, y, z)= (a + x, b+ y, c+ z+ ay) and H be the group of matrices

⎧⎨

⎝1 a c

0 1 b

0 0 1

⎠ : a, b, c ∈R

⎫⎬

under usual matrix multiplication. Then the map f :G→H defined by

f (a, b, c)=⎛

⎝1 a c

0 1 b

0 0 1

is an isomorphism.(iii) Let G be an abelian group and f :G→G be the map defined by f (a) =

a−1. Then f is an automorphism of G. This automorphism is different from theidentity automorphism.

(iv) Let (R,+) and (R+, ·) denote the additive group of reals and multiplicationgroup of positive reals, respectively. Then the map f :R→R+ defined by f (x)=ex is an isomorphism.

(v) Let (Q,+) and (Q+, ·) denote the additive group of rationals and multiplica-tive group of positive rationals, respectively. Then these groups cannot be isomor-phic. To prove this, let ∃ an isomorphism f : (Q,+)→ (Q+, ·). Then for 2 ∈Q+,∃ a unique element x ∈ Q such that f (x) = 2. Now x = x

2 + x2 and x

2 ∈ Q showthat 2= f (x)= f (x

2 + x2 )= f (x

2 )f (x2 )= [f (x

2 )]2. This cannot hold as f (x2 ) is a

positive rational. Hence f cannot be an isomorphism.

In any group, the integral powers an of a group element a play an important roleto study finitely generated groups, in particular, cyclic groups.

Page 98: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.3 Groups 81

Powers of an element have been defined in a semigroup, for positive integralindices. In a group, however, powers can be defined for all integral values of theindex, i.e., positive, negative, and zero.

Definition 2.3.4 Let a be an element of a group G. Define

(i) a0 = 1 and a1 = a;(ii) an+1 = ana for any non-negative integer n;

If n=−m (m > 0) be a negative integer, then define a−m = (am)−1 = (a−1)m;an is said to be the nth power of a.

The exponents so defined have the following properties:

aman = am+n and(am)n = amn.

Definition 2.3.5 Let G be a group. An element a ∈G is said to be of finite order iffthere exists a positive integer n such that an = 1. If a is an element of finite order,then the smallest positive integer of the set {m ∈ N+ : am = 1} (existence of thesmallest positive integer is guaranteed by the well-ordering principle) is called theorder or period of a (denoted by O(a)). An element a ∈G is said to be of infiniteorder, iff there is no positive integer n such that an = 1.

Example 2.3.8 Let G= {1,−1, i,−i}. Then G is a group under usual multiplica-tion of complex numbers. In the group, −1 is an element of order 2 and i is anelement of order 4.

Remark An element a of a group G is of infinite order iff ar �= at whenever r �= t .This is so because ar = at ⇔ ar−t = 1; that is, a is of finite order, unless r = t .

Theorem 2.3.5 Let G be a group and a ∈G such that O(a)= t . Then

(i) the elements 1= a0, a, . . . , at−1 are all distinct;(ii) an = 1, iff t |n;

(iii) an = am, iff n≡m (mod t);(iv) O(ar)= t/gcd(t, r), (r,m,n ∈ Z).

Proof (i) If for 0 < n < m < t , am = an, then am−n = am(an)−1 = 1. This contra-dicts the property of the order of a, since o < m− n < t and O(a)= t .

(ii) If n = tm, then an = atm = (at )m = 1. Conversely, if an = 1, taking n =tm+r , where 0≤ r < t , we have 1= an = atm+r = (at )mar = ar . This implies r =0, since t is the smallest positive integer for which at = 1 and 0≤ r < t . Thereforen= tm, and hence t is a factor of n.

(iii) am = an⇔ an−m = 1⇔ t is a factor of n−m by (ii)⇔ n≡m (mod t).(iv) Let gcd(t, r)=m and t/gcd(t, r)= n. Then t = nm.Let r = ms, where gcd(n, s) = 1. Now (ar )q = arq = 1 ⇔ t |rq by (ii) ⇔

nm|msq ⇔ n|sq ⇔ n|q , since gcd(n, s) = 1. Thus the smallest positive integer q

Page 99: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

82 2 Groups: Introductory Concepts

for which (ar )q = 1 holds is given by q = n. This implies n = t/gcd(t, r) is theorder of ar . �

Remark Any power an is equal to one of the elements given in (i).

Definition 2.3.6 A group G is called a

(i) torsion group or a periodic group iff every element of G is of finite order;(ii) torsion-free group iff every element of G except the identity element is of infi-

nite order;(iii) mixed group iff some elements of G are of infinite order and some excepting 1

are of finite order.

Example 2.3.9 (i) (Finite torsion group) Consider the multiplicative group G ={1,−1, i,−i}. Then G is a torsion group.

(ii) (Group of rationals modulo 1) Consider the additive group Q of all rationalnumbers. Let ρ = {(a, b) ∈Q×Q : a−b ∈ Z}. Then ρ is a congruence relation on Qand hence Q/ρ is a group under the composition (a)+ (b)= (a+b). Now ( 1

n), n=

1,2,3, . . . , are distinct elements of Q/ρ. Then Q/ρ contains infinite number ofelements. Let p/q be any rational number such that q > 0. Now q(p/q)= (p)= (0)

shows that (p/q) is an element of finite order. Consequently, Q/ρ is a torsion group.This is an infinite abelian group, called the group of rationals modulo 1, denoted byQ/Z.

Example 2.3.10 (Torsion-free group) The positive rational numbers form a multi-plicative group Q+ under usual multiplication. The integer 1 is the identity elementof this group and it is the only element of finite order. Consequently, Q+ is a torsion-free group.

Example 2.3.11 (Mixed group) The multiplicative group of non-zero complexnumbers C∗ contains infinitely many elements of finite order, viz. every nth rootof unity, for n= 1,2, . . . . It also contains infinitely many elements reiθ , with r �= 1,of infinite order. Consequently, C∗ is a mixed group.

2.4 Subgroups and Cyclic Groups

Arbitrary subsets of a group do not generally invite any attention. But subsets form-ing groups contained in larger groups create interest. For example, the group of evenintegers with 0, under usual addition is contained in the larger group of all integersand the group of positive rational numbers under usual multiplication is containedin the larger group of positive real numbers. Such examples suggest the concept of asubgroup, which is very important in the study of group theory. The cyclic subgroupis an important subgroup and is generated by an element g of a group G. It is thesmallest subgroup of G which contains g. In this section we study subgroups andcyclic groups.

Page 100: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.4 Subgroups and Cyclic Groups 83

Let (G,◦) be a group and H a non-empty subset of G. If for any two elementsa, b ∈ H , it is true that a ◦ b ∈ H , then we say that H is closed under this groupoperation of G. Suppose now H is closed under the group operation ‘◦’ on G.Then we can define a binary operation ◦H :H ×H →H by a ◦H b = a ◦ b for alla, b ∈H . This operation ◦H is said to be the restriction of ‘◦’ to H ×H . We explainthis with the help of the following example.

Example 2.4.1 Consider the additive group (R,+) of real numbers. If Q∗ is theset of all non-zero rational numbers, then Q∗ is a non-empty subset of R. Now forany two a, b ∈Q∗, we find that ab (under usual product of rational numbers) is anelement of Q∗. But we cannot say that Q∗ is closed under the group operation ‘+’on R. Consider now the set Z of integers. We can show easily that Z is closed underthe group operation ‘+’ on R.

Definition 2.4.1 A subset H of a group (G,◦) is said to be a subgroup of the groupG iff

(i) H �= ∅;(ii) H is closed under the group operation ‘◦’ on G and

(iii) (H,◦H ) is itself a group, where ◦H is the restriction of ‘◦’ to H ×H .

Obviously, every subgroup becomes automatically a group.

Remark (Q∗, ·) is not a subgroup of the additive group (R,+). But (Z,+) is asubgroup of the group (R,+).

The following theorem makes it easier to verify that a particular subset H ofa group G is actually a subgroup of G. In stating the theorem we again use themultiplicative notation.

Theorem 2.4.1 Let G be a group and H a subset of G. Then H is a subgroup ofG iff H �= ∅ and ab−1 ∈H for all a, b ∈H .

Proof Let H be a subgroup of G and a, b ∈H . Then b−1 ∈H and hence ab−1 ∈H .Conversely, let the given conditions hold in H . Then aa−1 = 1 ∈ H and 1a−1 =a−1 ∈H for all a ∈H . Clearly, associative property holds in H (as it is hereditary).Finally, for all a, b ∈H,ab= a(b−1)−1 ∈H , since b−1 ∈H . Consequently, H is asubgroup of G. �

Corollary A subset H of a group G is a subgroup of G iff H �= ∅ and ab ∈ H ,a−1 ∈H for all a, b ∈H .

Proof It follows from Theorem 2.4.1. �

Using the above theorem we can prove the following:

(i) G is a subgroup of the group G.(ii) H = {1} is a subgroup of the group G.

Page 101: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

84 2 Groups: Introductory Concepts

Hence we find that every group G has at least two subgroups: G and {1}. Theseare called trivial subgroups. Other subgroups of G (if they exist) are called propersubgroups of G.

We now give an interesting example of a subgroup.

Definition 2.4.2 The center of a group G, written Z(G) is the set of those ele-ments of G which commute with every element in G, that is, Z(G)= {a ∈G : ab=ba for all b ∈G}.

This set is extremely important in group theory. In an abelian group G, Z(G)=G. The center is in fact a subgroup of G. This follows from the following theorem.

Theorem 2.4.2 The center Z(G) of a group G is a subgroup of G.

Proof Since 1b = b = b1 for all b ∈ G,1 ∈ Z(G). Hence Z(G) �= ∅. Let a, b ∈Z(G). Then for all x ∈ G,ax = xa and bx = xb. Hence ax = xa and xb−1 =b−1x. Now (ab−1)x = a(b−1x) = a(xb−1) = (ax)b−1 = (xa)b−1 = x(ab−1) forall x ∈G. Hence ab−1 ∈Z(G). Consequently Z(G) is a subgroup of G. �

We now introduce the concepts of conjugacy class and conjugate subgroup.Let G be a group and a ∈ G. An element b ∈ G is said to be a conjugate of a

in G iff ∃g ∈ G, such that b = gag−1. Then the relation ρ on G defined by ρ ={(a, b) ∈G×G : b is a conjugate of a} is an equivalence relation, called conjugacyon G; the equivalence class (a) of the relation ρ is called a conjugacy class of a inG. Two subgroups H and K of G are said to be conjugate subgroups iff there existssome g in G such that K = gHg−1. Clearly, conjugacy is an equivalence relationon the collection of subgroups of G. The equivalence class of the subgroup H iscalled the conjugacy class or the conjugate class of H .

Theorem 2.4.3 Let H be a subgroup of a group G and g ∈G. Then gHg−1 is asubgroup of G such that H ∼= gHg−1.

Proof Since 1 = g1g−1 ∈ gHg−1, gHg−1 �= ∅. For gh1g−1, gh2g

−1 ∈ gHg−1,we have (gh1g

−1)(gh2g−1)−1 = gh1g

−1gh−12 g−1 = gh1h

−12 g−1 ∈ gHg−1. Hence

gHg−1 is a subgroup of G. Consider the map f :H → gHg−1 defined by f (h)=ghg−1 ∀h ∈ H . For h1, h2 ∈ H,h1 = h2 ⇒ gh1g

−1 = gh2g−1 ⇒ f is well de-

fined. Also for a ∈ gHg−1, there exists h= g−1ag ∈H such that f (h)= ghg−1 =gg−1agg−1 = a. Moreover, f (h1) = f (h2)⇒ gh1g

−1 = gh2g−1 ⇒ h1 = h2. Fi-

nally, f (h1h2) = g(h1h2)g−1 = (gh1g

−1)(gh2g−1) = f (h1)f (h2) ∀h1, h2 ∈ H .

Consequently, f is an isomorphism. �

Let H and K be two subgroups of a group G. Now both subgroups H and K

contain the identity 1 of G. Hence H ∩K �= ∅. Let a, b ∈ H ∩K . Then a, b ∈ H

and also a, b ∈ K . Since H and K are both subgroups, ab−1 ∈ H and ab−1 ∈ K .Hence ab−1 ∈ H ∩ K for all a, b ∈ H ∩ K . Consequently, H ∩ K in a subgroupof G. The more general theorem follows:

Page 102: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.4 Subgroups and Cyclic Groups 85

Theorem 2.4.4 Let {Hi : i ∈ I } be a family of subgroups of a group G. Then⋂i∈I Hi is a subgroup of G.

Proof Trivial. �

Theorem 2.4.5 Let f :G→K be a homomorphism of groups. Then

(i) Imf = {f (a) : a ∈G} is a subgroup of K ;(ii) kerf = {a ∈G : f (a)= 1K } is a subgroup of G, where 1K denotes the identity

element of K .

Proof It follows by using Theorem 2.4.1. �

Remark Let C be a given collection of groups. Define a relation ‘∼’ on C by G1 ∼G2 iff ∃ an isomorphism f :G1 →G2. Then ‘∼’ is an equivalence relation whichpartitions C into mutually disjoint classes of isomorphic groups. Two isomorphicgroups are abstractly indistinguishable. The main problem of group theory is: givena group G, how is one to determine the above equivalence class containing G, i.e., todetermine the class of all groups which are isomorphic to G? In other words, giventwo groups G1 and G2, the problem is to determine whether G1 is isomorphic to G2or not i.e., either to determine an isomorphism f :G1 →G2 or to show that theredoes not exist such an isomorphism. We can solve such problems partially by usingthe concept of generator, which is important for a study of certain classes of groups,such as cyclic groups, finitely generated groups which have applications to numbertheory and homological algebra.

Finitely Generated Groups and Cyclic Groups There are some groups G whichare generated by a finite set of elements of G. Such groups are called finitely gener-ated and are very important in mathematics. A cyclic group is, in particular, gener-ated by a single element.

Let G be a group and A be a non-empty subset of G. Consider the family C of allsubgroups of G containing A. This is a non-empty family, because G ∈ C. Now theintersection of all subgroups of this family is again a subgroup of G. This subgroupcontains A and this subgroup is denoted by 〈A〉.

Definition 2.4.3 If A is a non-empty subset of a group G, then 〈A〉 is called thesubgroup generated by A in the group G. If 〈A〉 =G, then G is said to be generatedby A, and if, A contains finite number of elements, then G is said to be finitelygenerated.

If A contains a finite number of elements, say A= {a1, a2, . . . , an}, then we write〈a1, a2, . . . an〉 in place of 〈{a1, a2, . . . , an}〉.

The particular case when A consists of a single element of the group is of im-mense interest. For example, for the circle S of radius 1 in the Euclidean plane, if r

is a rotation through an angle 2π/n radians about the origin, then rn = r ◦ r ◦ · · · ◦ r

(n times) is the identity. This example leads to the concept of cyclic groups.

Page 103: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

86 2 Groups: Introductory Concepts

Definition 2.4.4 A subgroup H of a group G is called a cyclic subgroup of G iff∃ an element a ∈G such that H = 〈a〉 and G is said to be cyclic iff ∃ an elementa ∈G such that G= 〈a〉, a is called a generator of G.

Theorem 2.4.6 Let G be a group and a ∈G. Then 〈a〉 = {an : n ∈ Z}.

Proof Let T = {an : n ∈ Z}. Then for c, d ∈ T , there exist r, t ∈ Z such that c = ar

and d = at . Now cd−1 = ar(at )−1 = ara−t = ar−t ∈ T ⇒ T is subgroup of G.Clearly, {a} ⊆ T . Let H be a subgroup of G such that {a} ⊆ H . Then a ∈ H andhence a−1 ∈H . As a result an ∈H for any n ∈ Z and then T ⊆H . Hence T is theintersection of all subgroups of G containing {a}. This shows that 〈a〉 = T = {an :n ∈ Z}. �

Remark If a group G is cyclic, then there exists an element a ∈ G such that anyx ∈G is a power of a, that is, x = an for some n ∈ Z. Then the mapping f : Z→G

defined by f (n)= an is an epimorphism. Moreover, if kerf = {0}, f is a monomor-phism by Theorem 2.3.3(i), and hence f is an isomorphism, and such G is calledan infinite cyclic group or a free cyclic group. For example, Z is an infinite additivecyclic group with generator 1. Clearly, −1 is also a generator.

Remark Every cyclic group is commutative. Its converse is not true. For example,the Klein four-group (see Ex. 22 of Exercises-III) is a finite commutative groupwhich is not cyclic and (Q,+) is an infinite commutative group which is not finitelygenerated (see Ex. 1 of SE-I) and hence not cyclic.

Theorem 2.4.7 An infinite cyclic group is torsion free.

Proof Let G be an infinite cyclic group and 1 �= a ∈ G. Then G = 〈g〉 for someg ∈ G. Consequently, a = gt , where t is a non-zero integer. If a is of finite orderr > 0, then gtr = ar = 1, a contradiction. Consequently, a is of infinite order. �

Let G be a group. If G contains a finite number of elements, then the group G

is said to be a finite group, otherwise, the group G is called an infinite group. Thenumber of elements of a finite group is called the order of the group. We write |G|or O(G) to denote the order of a group G.

Theorem 2.4.8 Let G be a group and a ∈G. Then the order of the cyclic subgroup〈a〉 is equal to O(a), when it is finite, and is infinite when O(a) is infinite.

Proof It follows from Theorem 2.3.5, and Remark of Definition 2.3.5. �

In particular, if gcd(t, r)= 1 in Theorem 2.3.5(iv), then O(a)=O(ar) and there-fore each of a and ar generates the same group G. This proves the following theo-rem.

Page 104: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.4 Subgroups and Cyclic Groups 87

Theorem 2.4.9 If G is a cyclic group of order n, then there are φ(n) distinct el-ements in G, each of which generates G, where φ(n) is the number of positiveintegers less than and relatively prime to n.

The function φ(n) is called the Euler φ-function in honor of Leonhard Euler(1707–1783).

For example, for Z14, φ(14) = 6 and Z14 can be generated by each of the ele-ments (1), (3), (5), (9), (11) and (13), since r(1) is a generator iff gcd (r,14) = 1,where 0 < r < 14.

Remark If a, b are relatively prime positive integers then φ(ab)= φ(a)φ(b). More-over, for any positive prime integer p, φ(p) = p − 1, φ(pn) = pn − pn−1 for allintegers n ≥ 1 and if n = p

n11 p

n22 . . . p

nrr , then φ(n) = p

n1−11 (p1 − 1)p

n2−12 (p2 −

1) . . . pnr−1r (pr − 1) (see Chap. 10).

Theorem 2.4.10 Every non-trivial subgroup of the additive group Z is cyclic.

Proof Let H be a subgroup of Z, and H �= {0}. Then H contains a smallest positiveinteger a (say). To prove the theorem it is sufficient to show that any integer x ∈H isof the form na for some n ∈ Z. If x = na+ r where 0≤ r < a, then r = x−na ∈H

as H is a group. Consequently, r = 0, so x = na. �

Theorem 2.4.11 If G is a cyclic group, then every subgroup of G is cyclic.

Proof If G is infinite cyclic, then by definition G∼= Z. Then the proof follows fromTheorem 2.4.10. Next suppose that G is a finite cyclic group generated by a and H asubgroup of G. Let t be the smallest positive integer such that at ∈H . We claim thatat is a generator of H . Let am ∈ H . If m = tq + r , 0 ≤ r < t , then ar = am−tq =am(at )−q ∈ H , since am,at ∈ H . Since 0 ≤ r < t , it follows by the property of t

that r = 0. Therefore m= tq and hence am = (at )q . Thus every element am ∈H issome power of at . Again, since at ∈H , every power of at is in H . Hence H = 〈at 〉.Thus H is cyclic. �

The following theorem gives a characterization of the cyclic groups.

Theorem 2.4.12 Let (G, ·) be a cyclic group. Then

(i) (G, ·) is isomorphic to (Z,+) iff G is infinite;(ii) (G, ·) is isomorphic to (Zn,+) iff G is finite and |G| = n.

Proof (i) Let (G, ·) be an infinite cyclic group. Then the group (G, ·) is isomorphicto (Z,+). Conversely, suppose (G, ·) is isomorphic to (Z,+). In this case, since(Z,+) is infinite, (G, ·) is also infinite, as an isomorphism is a bijection.

(ii) Suppose (G, ·) is a finite cyclic group. Then the case (i) cannot arise andtherefore the case (ii) must occur. In this case (G, ·) is isomorphic to (Zn,+), where

Page 105: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

88 2 Groups: Introductory Concepts

n = |G|. Conversely, suppose (G, ·) is isomorphic to (Zn,+). Then |Zn| = n⇒|G| = n⇒G is finite. �

Remark Let G and K be finite cyclic groups such that |G| =m �= n= |K|. Then G

and K cannot be isomorphic, i.e., there cannot exist an isomorphism f :G→K .

Theorem 2.4.13 Let G be a cyclic group of order n and H a cyclic group of orderm such that gcd(m,n)= 1. Then G×H is a cyclic group of order mn. Moreover, ifa is a generator of G and b a generator of H , then (a, b) is a generator of G×H .

Proof Clearly, G × H is a group under pointwise multiplication defined by(g,h)(g′, h′)= (gg′, hh′) for all g,g′ in G and h,h′ in H . If e1 and e2 be identityelements of G and H respectively, then an = e1 and 1≤ r < n⇒ ar �= e1, bm = e2and 1 ≤ r < m⇒ br �= e2. Let x = (a, b) ∈ G × H . Then xmn = (amn, bmn) bydefinition of multiplication (i.e., pointwise multiplication) in

G×H ⇒ xmn = (e1, e2) ⇒ order x ≤mn (2.2)

Again

xt = (e1, e2) ⇒ (at , bt)= (e1, e2)

⇒ at = e1 and bt = e2

⇒ n|t and m|t⇒ mn|t (since gcd(m,n)= 1

)

⇒ t ≥mn

⇒ order x ≥mn (2.3)

Consequently, (2.2) and (2.3)⇒ order x = order (a, b)=mn. Since |G×H | =mn and the order of the element (a, b)=mn, it follows that (a, b) generates G×H

i.e., G×H is a cyclic group of order mn. �

Remark The converse of the last part of Theorem 2.4.13 is also true. Suppose (u, v)

is a generator of G× H . Let a be a fixed generator of G and b a fixed generatorof H . Then since 〈(u, v)〉 =G×H , ∃ positive integers n and r such that (u, v)n =(a, e2) ∈G×H and (u, v)r = (e1, b) ∈G×H . Then un = a and vr = b⇒G =〈a〉 ⊆ 〈u〉 ⊆G and H = 〈b〉 ⊆ 〈v〉 ⊆H ⇒〈u〉 =G and 〈v〉 =H ⇒ u is a generatorof G and v is a generator of H .

Problems

Problem 1 Let G (�={1}) be a group which has no other subgroup except G and{1}. Show that G is isomorphic to Zp for some prime p.

Solution Let a ∈G−{1} (since G �= {1}). If T = 〈a〉, then T =G (since a ∈ T anda �= 1) ⇒G is a cyclic group generated by a. If possible, let G be infinite cyclic.

Page 106: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.5 Lagrange’s Theorem 89

Then G= {an : n ∈ Z}, am �= an for n �=m and a0 = 1. Consider H = {a2n : n ∈ Z}.Then H is proper subgroup of G (as a �∈H ) and H �= {1}. This contradicts the factthat only subgroups of G are G and {1}. So, G cannot be infinite cyclic. In otherwords, G must be finite cyclic. Let |G| = n. If possible, let n = rs, 1 < r < n,1 < s < n. Since r||G| and G is cyclic, G has a cyclic subgroup H of order r .This contradicts the fact that only subgroups of G are G and {1}. So, n cannot becomposite, i.e., n is some prime p, since G �= {1}. Thus (G, ·) is a cyclic group oforder p and hence isomorphic to (Zp,+) by Theorem 2.4.12(ii).

Problem 2 Let G be a group which is isomorphic to every proper subgroup H ofG with H �= {1} and assume that there exists at least one such proper subgroupH �= {1}. Show that G is infinite cyclic. Conversely, if G is an infinite cyclic group,show that G is isomorphic to every proper subgroup H of G such that H �= {1}.

Solution There exists an element a ∈G such that a �= 1. Let P be the cyclic sub-group generated by a. So, by hypothesis, P is isomorphic to G as P �= {1}. Since P

is cyclic, G must be also cyclic. Consequently, G is infinite.Conversely, let G be an infinite cyclic group and H a proper subgroup of G such

that H �= {1}. Then H = 〈ar 〉(r ≥ 1), where a is a generator of G. Consider a func-tion f :G→H by f (a)= ar . Then f (an)= arn. Clearly, f is an isomorphism.

2.5 Lagrange’s Theorem

One of the most important invariants of a finite group is its order. While studyingfinite groups Lagrange established a relation between the order of a finite group andthe order of its any subgroup. He proved that the order of any subgroup H of a finitegroup G divides the order of G. This is established by certain decompositions ofthe underlying set G into a family of subsets {aH : a ∈G} or {Ha : a ∈G}, calledcosets of H .

Let G be a group and H subgroup of G. If a ∈G, then aH denotes the subset{ah ∈G : h ∈H } and Ha denotes the subset {ha ∈G : h ∈H } of G. Now a = a1=1a shows that a ∈ aH and a ∈ Ha. The set aH is called the left coset of H in G

containing a and Ha is called the right coset of H in G containing a. A subset A

of G is called a left (right) coset of H in G iff A= aH (=Ha) for some a ∈G.

Lemma 2.5.1 If H is a subgroup of a group G and a, b ∈ G, then each of thefollowing statements is true.

(i) aH =H iff a ∈H ;(i)’ Ha =H iff a ∈H ;(ii) aH = bH iff a−1b ∈H ;

(ii)’ Ha =Hb iff ab−1 ∈H ;(iii) Either aH = bH or aH ∩ bH = ∅;

(iii)’ Either Ha =Hb or Ha ∩Hb= ∅;

Page 107: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

90 2 Groups: Introductory Concepts

(iv) G=⋃〈a∈G〉 aH ;(iv)’ G=⋃〈a∈G〉Ha;

(v) There exists a bijection aH →H for each a ∈G;(v)’ There exists a bijection Ha→H for each a ∈G;(vi) If L is the set of all left cosets of H in G and R is the set of all right cosets of

H in G, then there exists a bijection from L onto R.

Proof (i)–(iv) follow trivially.(v) If x ∈ aH , then there exists h ∈H such that x = ah.Suppose x = ah1 = ah2 (h1, h2 ∈ H). Then h1 = a−1(ah1) = a−1(ah2) = h2.

Hence for each x ∈ aH there exists a unique h ∈ H such that x = ah. Define f :aH →H by f (x)= h when x = ah ∈ aH . Now one can show that f is a bijectivemapping from aH onto H .

(vi) Define f : L→R by f (aH)=Ha−1. One can show that f is a well definedbijective mapping. �

Example 2.5.1 (i) Consider the group S3 on the set I3 = {1,2,3}. In S3,H ={e, (12)} is a subgroup. For this subgroup eH = {e, (12)}, (13)H = {(13), (123)}and (23)H = {(23), (132)} are three distinct left cosets and S3 = eH ∪ (13)H ∪(23)H . Again He = {e, (12)}, H(13) = {(13), (132)}, H(23) = {(23), (123)} arethree distinct right cosets of H and

S3 =He ∪H(13)∪H(23).

Hence the number of left cosets of H is three and the number of right cosets of H

is also three. But L �=R.(ii) Consider the group Z6 = {0,1,2,3,4,5} (see Example 2.3.6). In Z6, H =

{0,3} is a subgroup. Using additive notation, the left cosets H = {0,3},1 + H ={1,4},2+H = {2,5} partition Z6.

We now prove several interesting results about finite groups.One of the most important invariance of a finite group is its order.Let G be a finite group. Any subgroup H of G is also a finite group. Lagrange’s

Theorem (Theorem 2.5.1) establishes a relation between the order of H and theorder of G. It plays a very important role in the study of finite groups.

Theorem 2.5.1 (Lagrange’s Theorem) The order of a subgroup of a finite groupdivides the order of the group.

Proof Let G be a finite group of order n and H a subgroup of G. Let |H | = m.Now 1 ≤m ≤ n. We can write G=⋃a∈G aH . Since any two left cosets of H areeither identical or disjoint, there exist elements a1, a2, . . . , at (t ≤ n) such that leftcosets a1H,a2H, . . . , atH are all distinct and G = a1H ∪ a2H · · · ∪ atH . Hence|G| = |a1H |+ |a2H |+ · · ·+ |atH | (|aiH | denotes the number of elements in aiH ).

Let H = {h1, h2, . . . , hm}. Then aH = {ah1, ah2, . . . , ahm}. The cancellationproperty of a group implies that ah1, ah2, . . . , ahm are m distinct elements, so that

Page 108: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.5 Lagrange’s Theorem 91

|H | = |aH | (|aH | denotes the number of elements in aH ). Therefore n = |G| =|a1H |+ |a2H |+ · · ·+ |atH | = |H |+ |H |+ · · ·+ |H |(t times)= t |H | = tm. Hencem divides n, where n= |G|. �

Corollary 1 The order of an element of a finite group divides the order of thegroup.

Proof Let G be a finite group and a ∈ G. Then O(a) = |〈a〉| by Theorem 2.4.8.Hence the corollary follows from Lagrange’s Theorem 2.5.1. �

Corollary 2 A group of prime order is cyclic.

Proof Let G be a group of prime order p and 1 �= a ∈G. Then O(a) is a factor of p

by Corollary 1. As p is prime, either O(a)= p or O(a)= 1. Now a �= 1⇒O(a)=p⇒ |〈a〉| = p = |G| ⇒G is a cyclic group, since 〈a〉 ⊆G. �

Remark The converse of the Lagrange Theorem asserts that if a positive integer m

divides the order n of a finite group G, then G contains a subgroup of order m. Butit is not true in general. For example, the alternating group A4 of order 12 has nosubgroup of order 6 (see Ex. 4 of SE-I). However, the following properties of specialfinite groups show that the partial converse is true.

1. If G is a finite abelian group, then corresponding to every positive divisor m ofn, there exists a subgroup of order m (see Corollary 2 of Cauchy’s Theorem inChap. 3).

2. If m = p, a prime integer, then G has a subgroup of order p (see Cauchy’sTheorem in Chap. 3).

3. If m is a power of a prime p, then G has a subgroup of order m (see Sylow’sFirst Theorem in Chap. 3).

Let G be a group and H be a subgroup of G. We have proved that there exists abijective mapping f : L→R, where L is the set of all left cosets of H in G and Ris the set of all right cosets of H in G. Then the cardinal number of L is the sameas the cardinal number of R. This cardinal number is called the index of H in G

and is denoted by [G :H ]. If L is a finite set, then the cardinal number of L is thenumber of left cosets of H in G. Hence in this case the number of left cosets of H

(equivalently the number of right cosets of H ) in G is the index of H in G.

Theorem 2.5.2 If H is a subgroup of a finite group G, then

[G :H ] = |G||H | .

Proof Let G be a finite group of order n. Then a subgroup H of G must also be offinite order, r (say). Every left coset of H contains exactly r distinct elements. If[G :H ] = i, then n= ri, since the cosets are disjoint. This proves the theorem. �

Page 109: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

92 2 Groups: Introductory Concepts

Given two finite subgroups H and K of a group G, HK = {hk : h ∈H and k ∈K} may not be a subgroup of G. Hence |HK| may not divide |G|. However, Theo-rem 2.5.3 determines |HK|.

Theorem 2.5.3 If H and K are two finite subgroups of a group G, then

|HK| = |H ||K||H ∩K| .

Proof Let A = H ∩K . Then A is a subgroup of G such that A ⊆ H and A ⊆ K .Now A is a subgroup of the finite group H . Hence [H : A] is finite. Let [H : A] =t . Then there exist elements x1, x2, . . . , xt in H such that x1A,x2A, . . . , xtA aredistinct left cosets of A in H and H =⋃t

i=1 xiA. Now HK = (⋃t

i=1 xiA)K =⋃ti=1 xiK , since A⊆K . We claim that x1K,x2K, . . . , xtK are t distinct left cosets

of K .Suppose xiK = xjK for some i and j , where 1 ≤ i �= j ≤ t . Then x−1

j xi ∈ K .

But x−1j xi ∈H . Hence x−1

j xi ∈H ∩K =A. This shows that xiA= xjA; this is nottrue as x1A, . . . , xtA are distinct. As a result |HK| = |x1K| + |x2K| + · · · + |xtK|.Also, by Lemma 2.5.1(v) it follows that |xiK| = |K|. Consequently,

|HK| = t |K| = [H :A]|K| = |H ||K||A| = |H ||K||H ∩K| . �

Corollary If H and K are finite subgroups of a group G such that H ∩K = {1},then |HK| = |H ||K|.

2.6 Normal Subgroups, Quotient Groups and HomomorphismTheorems

In this section we make the study of normal subgroups and develop the theory ofquotient groups with the help of homomorphisms. We show how to construct iso-morphic replicas of all homomorphic images of a specified abstract group. For thispurpose we introduce the concept of normal subgroups. For some subgroups of agroup, every left coset is a right coset and conversely, which implies that for somesubgroups, the concepts of a left coset and a right coset coincide. Such subgroupsare called normal subgroups. Galois first recognized that those subgroups for whichleft and right cosets coincide are a distinguished one. We shall now study those sub-groups H of a group G such that aH = Ha for all a ∈ G. Such subgroups playan important role in determining both the structure of a group and the nature of thehomomorphisms with domain G.

Definition 2.6.1 Let H be a subgroup of a group G and a, b ∈G. Then a is said tobe right (left) congruent to b modulo H , denoted by aρrb (modH) (aρlb (modH))

iff ab−1 ∈H (a−1b ∈H).

Page 110: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.6 Normal Subgroups, Quotient Groups and Homomorphism Theorems 93

Theorem 2.6.1 Let H be a subgroup of a group H . Then the relation ρr (ρl) on G

is an equivalence relation and the corresponding equivalence class of a ∈G is theright (left) coset Ha (aH). ρr (ρl) is called the right (left) congruence relation onG modulo H .

Proof We write aρb for aρrb (modH) and then prove the theorem only for rightcongruence ρ and right cosets.

aa−1 = 1 ∈ H ⇒ aρa ∀a ∈ G. Again aρb ⇒ ab−1 ∈ H ⇒ (ab−1)−1 ∈H ⇒ ba−1 ∈ H ⇒ bρa. Finally, aρb and bρc ⇒ ab−1 ∈ H and bc−1 ∈ H ⇒(ab−1)(bc−1) ∈ H ⇒ ac−1 ∈ H ⇒ aρc. Consequently, ρ is an equivalence re-lation. Now for each a ∈ G, aρ = {x ∈ G : xρa} = {x ∈ G : xa−1 ∈ H } = {x ∈G : xa−1 = h for some h ∈ H } = {x ∈ G : x = ha,h ∈ H } = {ha ∈ G : h ∈ H } =Ha. �

Theorem 2.6.2 If H is a subgroup of a group G, then the following conditions areequivalent.

(i) Left congruence ρl and right congruence ρr on G modulo H coincide;(ii) every left coset of H in G is also a right coset of H in G;

(iii) aH =Ha for all a ∈G;(iv) for all a ∈G, aHa−1 ⊆H , where aHa−1 = {aha−1 : h ∈H }.Proof (i) ⇔ (iii) ρl = ρr ⇔ aρl = aρr ∀a ∈ G ⇔ aH = Ha ∀a ∈ G by Theo-rem 2.6.1.

(iii)⇔ (iv) Suppose aH =Ha ∀a ∈G. Then for each h ∈H , ah= h′a for someh′ ∈H . Consequently, aha−1 = h′ ∈H ∀h ∈H . This shows that aHa−1 ⊆H forevery a ∈G. Again let for every a ∈G, aHa−1 ⊆H . Then H = a(a−1Ha)a−1 ⊆aHa−1, since a−1Ha ⊆ H (by hypothesis). Consequently, aHa−1 = H for everya ∈G. This shows that aH =Ha ∀a ∈G.

(ii)⇔ (iii) Suppose aH =Hb for a, b ∈G. Then a ∈Ha ∩Hb. Since two rightcosets of H in G are either disjoint or equal, it follows that Ha =Hb and hence (ii)⇒ (iii). Its converse is trivial. �

Definition 2.6.2 Let G be a group and H a subgroup of G. Then H is said to bea normal subgroup of G denoted by H�G iff H satisfies any one of the equivalentconditions of Theorem 2.6.2.

Thus for a normal subgroup, we need not distinguish between the left and rightcosets.

In any group G, G and {1} are normal subgroups, called trivial normal subgroups.Every subgroup of a commutative group is a normal subgroup.

Example 2.6.1 If S3 is the symmetric group of order 6, then H = {e, (123), (132)}is a subgroup of S3. Now for any a ∈ H , aH = H = Ha. The elements (12),(23), and (13) �∈H . Now (12)H = {(12), (23), (13)} =H(12). Similarly, (13)H =H(13) and (23)H =H(23). Consequently, H is a normal subgroup of S3. Clearly,K = {e, (12)} is not a normal subgroup of S3.

Page 111: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

94 2 Groups: Introductory Concepts

Theorem 2.6.3 Let A and B be two subgroups of a group G.

(i) If A is a normal subgroup of a group G, then AB = BA is a subgroup of G.(ii) If A and B are normal subgroups of G, then A∩B is a normal subgroup of G.

(iii) If A and B are normal subgroups of G such that A ∩ B = {1}, then ab =ba ∀a ∈A and ∀b ∈ B .

Proof (i) Let x = ab ∈ AB . Now bA = Ab ⇒ ab = ba1 for some a1 ∈ A ⇒x = ba1 ∈ BA ⇒ AB ⊆ BA. Similarly, BA ⊆ AB . Consequently, AB = BA.Again for b, b′ ∈ B and a, a′ ∈ A, (ba)(b′a′)−1 = ba(a

′−1b′−1)= b(aa

′−1)b′−1 =

ba1b′−1(a1 ∈ A) = b1a2, where a2 ∈ A, b1 ∈ B . This implies BA = AB is a sub-

group of G.(ii) Clearly, H = A ∩ B is a normal subgroup of G, since if h ∈ H and g ∈G,

then ghg−1 belongs to both A and B and hence is in H .(iii) Consider the element x = aba−1b−1(a ∈A,b ∈ B). Now x = (aba−1)b−1 ∈

(aBa−1)b−1 ⊆ Bb−1 = B and again x = a(ba−1b−1) ∈ a(bAb−1) ⊆ aA = A.Hence x ∈ A ∩ B = {1}. Consequently, aba−1b−1 = 1. This shows that ab =ba ∀a ∈A and ∀b ∈ B . �

We now show how to make the set of cosets into a group, called a quotient group.

Theorem 2.6.4 Let H be a normal subgroup of a group G and G/H the set of allcosets of H in G. Then G/H is a group.

Proof Define multiplication of cosets by (aH) · (bH) = (ab)H, ∀a, b ∈ G. Weshow that the multiplication is well defined. Let aH = xH and bH = yH . Thena ∈ aH and b ∈ bH are such that a = xh1 and b= yh2 for some h1, h2 ∈H . Now,(xy)−1(ab) = y−1x−1ab = y−1x−1xh1yh2 = y−1h1yh2 ∈ H , since y−1h1y ∈ H

as H is a normal subgroup of G. Consequently, by Lemma 2.5.1, it follows that(ab)H = (xy)H ⇒ (aH) · (bH)= (xH) · (yH). Then G/H is a group where theidentity element is the coset H , and the inverse of aH is a−1H . �

Corollary If H is a normal subgroup of a finite group G then |G/H | = |G|/|H |.

Proof It follows from Theorem 2.5.2. �

Definition 2.6.3 If H is a normal subgroup of a group G, then group G/H is calledthe factor group (or quotient group) of G by H .

Remark If G is an additive abelian group, the group operation on G/H is defined by

(a +H)+ (b+H)= (a + b)+H

and the corresponding quotient group G/H is sometimes called difference group.

We now show that the construction of quotient groups is closely related to homo-morphisms of groups and prove a natural series of theorems.

Page 112: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.6 Normal Subgroups, Quotient Groups and Homomorphism Theorems 95

Theorem 2.6.5 If f :G→ T is a homomorphism of groups, then the kernel of f

is a normal subgroup of G. Conversely, if H is a normal subgroup of G, then themap

π :G→G/H, given by π(g)= gH, g ∈G

is an epimorphism with kernel H .

Proof Clearly, 1 ∈ kerf . So, kerf �= ∅. Let x, y ∈ kerf . Then f (xy−1) =f (x)f (y−1) = f (x)(f (y))−1 = 1 · 1 = 1 ∀x, y ∈ kerf ⇒ kerf is a subgroupof G by Theorem 2.4.1. Again if g ∈ G, then f (gxg−1) = f (g)f (x)(f (g))−1 =f (g) · 1 · (f (g))−1 = 1⇒ gxg−1 ∈ kerf ⇒ kerf is a normal subgroup of G.

The map π : G→ G/H given by π(g) = gH is clearly surjective. Moreover,π(gg′)= gg′H = gHg′H = π(g)π(g′) ∀g,g′ ∈G⇒ π is an epimorphism, calledthe canonical epimorphism or projection or natural homomorphism. Now kerπ ={g ∈G : π(g)=H } = {g ∈G : gH =H } = {g ∈G : g ∈H } =H . �

Remark Let G be a group and H a subgroup of G. Then H is a normal subgroupof G iff H is the kernel of some homomorphism.

Theorem 2.6.6 (Fundamental Homomorphism Theorem for groups) Let f :G→H be a homomorphism of groups and N a normal subgroup of G such that N ⊆kerf . Then there is a unique homomorphism f : G/N → H such that f (gN) =f (g) ∀g ∈ G, Im f = Imf and ker f = kerf/N . Moreover, f is an isomorphismiff f is an epimorphism and kerf =N .

Proof If x ∈ gN , then x = gn for some n ∈ N and f (x) = f (gn) = f (g)f (n) =f (g)1 = f (g), since by hypothesis N ⊆ kerf . This shows that the effect of f

is the same on every element of the coset gN . Thus the map f : G/N → H ,gN �→ f (g) is well defined. Now f (gN · hN)= f (ghN)= f (gh)= f (g)f (h)=f (gN)f (hN) ∀g,h ∈G⇒ f is a homomorphism. From the definition of f , it isclear that Im f = Imf . Moreover, gN ∈ ker f ⇔ f (g) = 1⇔ g ∈ kerf . Conse-quently, ker f = {gN : g ∈ kerf } = kerf/N . Since f is completely determined byf , f is unique. Clearly, f is a monomorphism iff ker f = kerf/N is a trivial sub-group of G/N . The latter holds iff kerf = N . Moreover, f is an epimorphism ifff is an epimorphism. Consequently, f is an isomorphism iff f is an epimorphismand kerf =N . �

Corollary 1 (First Isomorphism Theorem) If f : G→ H is a homomorphism ofgroups, then f induces an isomorphism f :G/kerf → Imf .

Corollary 2 If G and H are groups and f :G→H is an epimorphism, then thegroup G/kerf and H are isomorphic.

Remark The homomorphic images of a given abstract group G are the quotientgroups G/N by its different normal subgroups N .

Page 113: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

96 2 Groups: Introductory Concepts

Proposition 2.6.1 If G and H are groups and f :G→H is a homomorphism ofgroups, N is a normal subgroup of G, and T is a normal subgroup of H such thatf (N)⊆ T , then there is a homomorphism f :G/N →H/T .

Proof Define f :G/N →H/T by f (gN)= f (g)T . �

Corollary If f :G→H is a homomorphism of groups with kerf =N , then thereis a monomorphism f :G/N →H .

Proof We have f (N) = {1} and {1} is a trivial normal subgroup of H . Then byProposition 2.6.1, f induces a homomorphism f :G/N → H given by f (gN) =f (g) ∀g ∈G. This shows that f is a monomorphism. Moreover, if f :G→ H isan epimorphism, then f :G/N →H is also an epimorphism. �

Remark These results also prove the First Isomorphism Theorem.

Theorem 2.6.7 (Subgroup Isomorphism Theorem or the Second Isomorphism The-orem) Let N be a normal subgroup of a group G and H a subgroup of G. ThenH ∩N is a normal subgroup of H,HN is a subgroup of G and H/H ∩N ∼=HN/N

(or NH/N ), where HN = {hn : h ∈H,n ∈N}.

Proof Suppose x ∈H ∩N and h ∈H . Then h−1xh ∈N as N is a normal subgroupof G. Moreover, h−1xh ∈ H as x ∈ H . Consequently, h−1xh ∈ H ∩N ⇒ H ∩N

is a normal subgroup of H . Clearly, HN �= ∅. Now x, y ∈ HN ⇒ x = hn andy = h′n′ for some n,n′ ∈ N,h,h′ ∈ H ⇒ xy−1 = hn(h′n′)−1 = hnn′ −1h′ −1 =hn1h

′ −1 (for some n1 ∈N )= hh′ −1h′n1h′ −1 = h1n2 (where hh′ −1 = h1 ∈H and

h′n1h′ −1 = n2 ∈N as N is a normal subgroup of G) ∈HN ⇒HN is a subgroup

of G.Define f :H →HN/N by h �→ hN . Then f is an epimorphism. By using First

Isomorphism Theorem, H/kerf ∼= f (H)=HN/N .Now kerf = {x ∈ H : f (x) = N} = {x : x ∈ H and xN = N} = {x : x ∈

H and x ∈N} =H ∩N . Consequently, H/H ∩N ∼=HN/N . �

Theorem 2.6.8 (Factor of a Factor Theorem or Third Isomorphism Theorem) Ifboth H and K are normal subgroups of a group G and K ⊆ H , then H/K is anormal subgroup of G/K and G/H ∼= (G/K)/(H/K).

Proof Clearly, G/K , G/H and H/K are groups.Consider the map f :G/K →G/H given by

f (aK)= aH, ∀a ∈G.

As aK = bK ⇒ a−1b ∈K ⊆H ⇒ aH = bH , the map f is well defined.

Page 114: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.6 Normal Subgroups, Quotient Groups and Homomorphism Theorems 97

Again,

f (aK · bK) = f (abK)= abH = aHbH

= f (aK)f (bK), for all aK,bK ∈G/K

shows that f is a homomorphism.Clearly, f is an epimorphism. We have

kerf = {aK ∈G/K : f (aK)= aH =H}

= {aK : a ∈H } =H/K.

Consequently, by the First Isomorphism Theorem, (G/K)/(H/K)∼=G/H . �

Theorem 2.6.9 Let f : G→ K be an epimorphism of groups and S a subgroupof K . Then H = f−1(S) is a subgroup of G such that kerf ⊆H . Moreover, if S isnormal in K , then H is normal in G. Furthermore, if H1 ⊇ kerf is any subgroupof G such that f (H1)= S, then H1 =H .

Proof It is clear that, as 1 ∈ H , H �= ∅. For g,h ∈ H,f (gh−1) = f (g)f (h−1) =f (g)f (h)−1 ∈ S ⇒ gh−1 ∈ H ⇒ H is a subgroup of G. Now kerf = {g ∈ G :f (g)= 1K ∈ S} ⇒ kerf ⊆H . Next let S be normal in K,g ∈G and h ∈H . Thenf (ghg−1)= f (g)f (h)f (g)−1 ∈ S⇒ ghg−1 ∈H ⇒H is normal in G.

Finally, let H1 ⊇ kerf be a subgroup of G such that f (H1)= S. We claim thatH1 = H . Now h1 ∈ H1 ⇒ f (h1) ∈ S ⇒ H1 ⊆ H . Again h ∈ H ⇒ f (h) = s ∈ S.Choose h1 ∈ H1 such that f (h1) = s. Then f (hh−1

1 ) = f (h)f (h1)−1 = ss−1 =

1K ⇒ hh−11 ∈ kerf ⊆H1 ⇒ h ∈H1 ⇒H ⊆H1. Consequently, H =H1. �

Corollary 1 (Correspondence Theorem) If f : G → K is an epimorphism ofgroups, then the assignment H �→ f (H) defines an one-to-one correspondence be-tween the set S(G) of all subgroups H of G which contain kerf and the set S(K)

of all subgroups of K such that normal subgroups correspond to normal subgroups.

Proof The assignment H �→ f (H) defines a map ψ : S(G) → S(K). By Theo-rem 2.6.9 it follows that ψ is a bijection. Moreover, the last part also follows fromthis theorem. �

Corollary 2 If N is a normal subgroup of a group G, then every subgroup of G/N

is of the form T/N , where T is a subgroup of G that contains N .

Proof Apply Corollary 1 (Theorem 2.6.9) to the natural epimorphism π : G →G/N . �

By using the First Isomorphism Theorem, the structure of certain quotient groupsis determined.

Example 2.6.2 (i) Let G = GL(n,R) be the group of all non-singular n × n ma-trices over R under usual matrix multiplication and H the subset of all matrices

Page 115: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

98 2 Groups: Introductory Concepts

X ∈ GL(n,R) such that detX = 1, i.e., H = {X ∈ GL(n,R) : detX = 1}. Sincethe identity matrix In ∈ H,H �= ∅. Let X,Y ∈ H , so that detX = detY = 1. Byusing the properties of determinants, we have det(XY−1) = detX · det(Y−1) =detX · (1/detY) = 1. Thus X,Y ∈ H ⇒ XY−1 ∈ H ⇒ H is a subgroup of G byTheorem 2.4.1. Moreover, H is a normal subgroup of G by Theorem 2.6.5, be-cause H is the kernel of the determinant function det : GL(n,R)→ R∗ given byX �→ detX, where R∗ is the multiplicative group of non-zero reals. As the imageset of this homomorphism is R∗, we have GL(n,R)/H ∼=R∗.

Remark A similar result holds for GL(n,C) with complex entries.

(ii) Let f : (R,+)→ (C∗, ·) be the homomorphism defined by f (x)= e2πix =cos 2πx+ i sin 2πx ∀x ∈R. Then kerf is the additive group (Z,+) and Imf is themultiplicative group H of all complex numbers with modulus 1. Hence the additivequotient group R/Z is isomorphic to the multiplicative group H .

Problem If H is a non-normal subgroup of a group G, is it possible to make theset {aH } of left cosets of H in G a group with the rule of multiplication aH · bH =abH ∀a, b ∈G?

Solution (The answer is no.) If it was possible, then the mapping f :G→G′, thegroup formed by the cosets, given by x �→ xH , would be a homomorphism with H

as kernel. But this is not possible unless H is normal in G.

We now study a very important subgroup defined below which is closely associ-ated with given subgroup.

Definition 2.6.4 If H is a subgroup of a group G, then the set N(H) = {a ∈ G :aHa−1 =H } = {a ∈G : aH =Ha} is called the normalizer of H and H is said tobe invariant under each a ∈N(H).

Proposition 2.6.2 If N(H) is the normalizer of a subgroup H of a group G, then

(i) N(H) is a subgroup of G;(ii) H is a normal subgroup of N(H);

(iii) if H and K are subgroups of G, and H is a normal subgroup of K , thenK ⊆N(H);

(iv) H is a normal subgroup of G⇔N(H)=G.

Proof (i) Since 1 ∈N(H), N(H) �= ∅. Now x ∈N(H)⇒ xH =Hx⇒ x−1(xH)=x−1(Hx)⇒H = (x−1H)x⇒Hx−1 = x−1H .

Then a, x ∈N(H)⇒ aH =Ha and x−1H =Hx−1 ⇒ (ax−1)H = a(x−1H)=a(Hx−1)= (aH)x−1 =Hax−1 ⇒N(H) is a subgroup of G.

(ii) and (iii) follow trivially.(iv) H is a normal subgroup of G⇒ for each g ∈G, gH =Hg⇒G⊆N(H).

Consequently, G=N(H). The converse part follows from (ii). �

Page 116: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.7 Geometrical Applications 99

In abelian groups every subgroup is normal but it is not true in an arbitrary non-abelian group. There are some groups in which no normal subgroup exists exceptits trivial subgroups. Such groups are called simple groups.

Definition 2.6.5 A group G is said to be simple iff G and {1} are its only normalsubgroups.

Definition 2.6.6 A normal subgroup H of a group G is said to be a maximal normalsubgroup iff H �=G and there is no normal subgroup N of G such that H � N � G.

Theorem 2.6.10 If H is a normal subgroup of a group G, then G/H is simple iffH is a maximal normal subgroup of G.

Proof Let H be a maximal normal subgroup of G. Consider the canonical homo-morphism f : G → G/H . As f is an epimorphism, f−1 of any proper normalsubgroup of G/H would be a proper normal subgroup of G containing H , whichcontradicts the maximality of H . Consequently G/H must be simple. Conversely,let G/H be simple. If N is a normal subgroup of G properly containing H , thenf (N) is a normal subgroup of G/H and if also N �= G, then f (N) �= G/H andf (N) �=H , which is not possible. So no such N exists and hence H is maximal. �

Remark There was a long-standing conjecture that a non-abelian simple group offinite order has an even number of elements. This conjecture has been proved to betrue by Walker Feit and John Thompson.

2.7 Geometrical Applications

2.7.1 Symmetry Groups of Geometric Figures in Euclidean Plane

The study of symmetry gives the most appealing applications in group theory.While studying symmetry we use geometric reasoning. Symmetry is a commonphenomenon in science. In general a symmetry of a geometrical figure is a one-onetransformation of its points which preserves distance. Any symmetry of a polygonof n sides in the Euclidean plane is uniquely determined by its effect on its ver-tices, say {1,2, . . . , n}. The group of symmetries of a regular polygon of n sidesis called the dihedral group of degree n denoted by Dn which is a subgroup of Sn

and contains 2n elements. Dn is generated by rotation r of the regular polygon ofn sides through an angle 2π/n radians in its own plane about the origin in anti-clockwise direction and certain reflections s satisfying some relations (see Ex. 19 ofExercises-III).

(a) Isosceles triangle. Figure 2.1 is symmetric about the perpendicular bisector1D. So the symmetry group consists of identity and reflection about the line 1D. In

Page 117: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

100 2 Groups: Introductory Concepts

Fig. 2.1 Group ofsymmetries of isoscelestriangle (S2)

Fig. 2.2 Group ofsymmetries of equilateraltriangle (S3)

terms of permutations of vertices this group is{(

1 2 31 2 3

),

(1 2 31 3 2

)}∼= S2.

(b) Equilateral triangle. In Fig. 2.2, the symmetry consists of three rotationsof magnitudes 2π

3 , 4π3 , 6π

3 = 2π about the center G denoted by r1, r2 and r3, re-spectively, together with three reflections about the perpendicular lines 1D,2E,3F

denoted by t1, t2, and t3, respectively. So in terms of permutations of vertices thesymmetry group is

{r1 =(

1 2 32 3 1

), r2 =

(1 2 33 1 2

), r3 =

(1 2 31 2 3

),

t1 =(

1 2 31 3 2

), t2 =

(1 2 33 2 1

), t3 =

(1 2 32 1 3

)}∼= S3.

(c) Rectangle (not a square). In this case, the symmetry group consists of theidentity I , reflections r1, r2 about DE,FG (lines joining the midpoints of oppositesides), respectively, and reflection r3 about O (which is actually a rotation about O

through an angle π ). In terms of permutations of vertices this group is{I =(

1 2 3 41 2 3 4

), r1 =

(1 2 3 44 3 2 1

),

r2 =(

1 2 3 42 1 4 3

), r3 =

(1 2 3 43 4 1 2

)},

which is Klein’s 4-group (see Ex. 22 of Exercises-III).(d) Square. In Fig. 2.3, the symmetry group consists of four rotations r1, r2, r3, r4

(= Identity I) of magnitudes π2 ,π, 3π

2 ,2π about the circumcenter O respectivelyand four reflections t1, t2, t3, t4 about DE,FG,13,24.

Page 118: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.7 Geometrical Applications 101

Fig. 2.3 Group ofsymmetries of the square(D4)

In terms of permutations of vertices involved here, this group is{r1 =(

1 2 3 44 1 2 3

), r2 =

(1 2 3 43 4 1 2

), r3 =

(1 2 3 42 3 4 1

),

r4 =(

1 2 3 41 2 3 4

)= I, t1 =

(1 2 3 44 3 2 1

), t2 =

(1 2 3 42 1 4 3

),

t3 =(

1 2 3 41 4 3 2

), t4 =

(1 2 3 43 2 1 4

)}.

This group is called the group of symmetries of the square (also called octicgroup) and is the dihedral group D4 (see Ex. 19 of Exercises-III).

Remark In this group D4 there are eight (hence octic) mappings of a square intoitself that preserve distance between points and distance between their images, mapadjacent vertices into adjacent vertices, center into center so that the only distancepreserving mappings are rotations of the square about its center, reflections (flips)about various bisectors, and the identity map.

2.7.2 Group of Rotations of the Sphere

A sphere with a fixed center O can be brought from a given position into any otherposition by rotating the sphere about an axis through O . Clearly, the rotations aboutthe same axis have the same result iff they differ by a multiple of 2π . Thus if r(S)

denotes the set of all rotations about the same axis, then we call the rotations r and r ′in r(S) equal or different iff they differ by a multiple of 2π or not. Clearly, the resultof two successive rotations in r(S) can also be obtained by a single rotation in r(S).It follows that r(S) forms a group. (The identity is a rotation in r(S) through anangle 0 and the inverse of a rotation r in r(S) has the same angle but in the oppositedirection of r). Thus if any rotation r in r(S) has the angle of rotation θ about theaxis, then the map f : r(S)→ S1 defined by f (r) = eiθ is a group isomorphismfrom the group r(S) onto the circle group S1 (see Example 2.3.2).

Remark The rotations of R2 or R3 about the origin are the linear operators whosematrices with respect to the natural basis are orthogonal and have determinant 1 (seeChap. 8).

Page 119: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

102 2 Groups: Introductory Concepts

Fig. 2.4 Structure of CH4

2.7.3 Clock Arithmetic

On a 24-hour clock, let the cyclic group 〈a〉 of order 24 represent hours. Theneach of 24 numerals of the dial serves as representatives of a coset of hours. Herewe use the fact that a 10 hour journey starting at 20 hrs (8 o’clock) ends at 30hrs, i.e., 10 + 20 = 30 ≡ 6 o’clock (the following day). In shifting from a 24-hour clock to a 12 hour clock, we take the 24 hours modulo the normal subgroupH = {1, a12}. Then the quotient group 〈a〉/H is a group of 12 cosets or a group ofrepresentatives: {a, a2, a3, a11, a12}, where (a)= {a, a13}, (a2)= {a2, a14}, (a3)={a3, a15}, (a11) = {a11, a23} and (a12) = {a12, a24}. A seven hour journey startingat 9 AM (9 PM) ends at 4 PM (4 AM). On the 12-hour clock we do not distinguishbetween the congruent elements in the same coset {4 AM,4 PM}.A Note on Symmetry Group Group theory is an ideal tool to study symmetries.In this note we call any subset of R2 or R3 an object. We study orthogonal mapsfrom R2 to R2 or from R3 to R3 and these are rotations or reflections or rotation-reflections. As orthogonal maps are only those linear maps which keep lengths andangles invariant, they do not include translations.

Let X be an object in R2 or R3. Then the set S(X) of all orthogonal maps g withg(X) = X is a group with respect to the usual composition of maps. This groupis called the symmetry group of X. The elements of S(X) are called symmetryoperations on X. Let S2(X) (or S3(X)) correspond to the symmetric group of X inR2 (or R3).

Examples (a) If X = regular n-gon in R2 with center at (0, 0), then S2(X) =Dn,the dihedral group with 2n elements and for S3(X), we also get the reflection aboutthe xy-plane and its compositions with all g ∈ S2(X), i.e., S3(X)=Dn ×Z2.

(b) If X = regular tetrahedron with center at (0, 0, 0), then S3(X)∼= S4.(c) If X = cube, then S3(X)= S4 ×Z2.(d) If X = the letter M , then S2(X)∼= Z2 and S3(X)∼= Z2 ×Z2.(e) If X = a circle, then S2(X) = O2(R), the whole orthogonal group of all

orthogonal maps from R2 to R2.

For applications to chemistry and crystallography, X is considered a moleculeand S(X) depends on the structural configuration of the molecule X.

For example, methane CH4 (see Fig. 2.4) has the shape of a regular tetrahe-dron with H-atoms at the vertices and C-atom at its center (0, 0, 0). Then by (b),S3(CH4)∼= S4.

Page 120: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.8 Free Abelian Groups and Structure Theorem 103

Weyl (1952) first realized the importance of group theory to study symmetry innature and the application of group theory was boosted by him. Molecules, crys-tals, and elementary particles are different, but they have very similar theories ofsymmetry.

Applications of groups to physics are described in Elliot and Dawber (1979) andSternberg (1994) and those to Chemistry in Cotton (1971) and Farmer (1996).

2.8 Free Abelian Groups and Structure Theorem

If we look at the dihedral group Dn (see Ex. 19 of SE-III) we see that Dn has twogenerators r and s satisfying some relations other than the associative property. Butwe now consider groups which have a set of generators satisfying no relations otherthan associativity which is implied by the group axioms. Such groups are called freegroups. In this section we study free abelian groups and prove the ‘FundamentalTheorem of Finitely Generated Abelian Groups’ which is a structure theorem. Thistheorem gives notions of ‘Betti numbers’ and ‘invariant factors’. We also introducethe concept of ‘homology and cohomology groups’ which are very important inhomological algebra and algebraic topology.

A free abelian groups is a direct sum of copies of additive abelian group of inte-gers Z. It has some properties similar to vector spaces. Every free abelian group hasa basis and its rank is defined as the cardinality of a basis. The rank determines thegroups up to isomorphisms and the elements of such a group can be written as finiteformal sums of the basis elements.

The concept of free abelian groups is very important in mathematics. It has wideapplications in homology theory. Algebraic topology is also used to prove someinteresting properties of free abelian groups [see Rotman (1988)].

We consider in this section an additive abelian group G.

Definition 2.8.1 Let G be an additive abelian group and {Gi}i∈I be a family ofsubgroups of G. Then G is said to be generated by {Gi} iff every element x ∈ G

can be expressed as

x = xi1 + · · · + xin, where the additive indices it are distinct.

We sometimes use the following notation:

x =∑

i∈I

xi, where we take xi = 0, if i is not one of the indices i1, i2, . . . , in.

If the subgroups {Gi} generate G, we write

G=∑

i∈I

Gi, in general, and G=n∑

i=1

Gi, when I = {1,2, . . . , n}.

Page 121: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

104 2 Groups: Introductory Concepts

Fig. 2.5 Commutativity ofthe triangle

Definition 2.8.2 If a group G is generated by the groups {Gi}i∈I and every elementx ∈G has the unique representation as x =∑i∈I xi , where xi = 0 for all but finitelymany i, then G is said to be direct sum of the groups Gi , written

G=⊕

i∈I

Gi, in general and G=n∑

i=1

Gi, if I = {1,2, . . . , n}.

Remark For n= 2, see Ex. 21 of Exercises-III.

A Characterization of Direct Sums Let G be an abelian group and {Gi} bea family of subgroups of G. We say that G satisfies the extension condition (EC)for direct sums iff given any abelian group A and any family of homomorphismshi : Gi → A, there exists a unique homomorphism h : G→ A extending hi , foreach i, i.e., h|Gi = hi , i.e., making the diagram in Fig. 2.5 commutative, whereki :Gi ↪→G is an inclusion map for each i.

Proposition 2.8.1 Let G be an abelian group and {Gi} be a family of subgroupsof G.

(a) If G=⊕Gi , then G satisfies the condition (EC);(b) if G is generated by {Gi} and G satisfies the condition (EC), then G=⊕Gi .

Proof (a) Let G = ⊕Gi . Then for the given homomorphisms hi = Gi → A, wedefine a homomorphism h :G→A as follows.

If x =∑xi (unique finite), then the homomorphism h given by h(x)=∑hi(xi)

is well defined and is our required homomorphism.(b) Let x =∑xi =∑yi . Given an index j , let A=Gj .Define hi :Gi →Gj as follows:

hi = id, if i = j ;= 0, if i �= j.

Let h : G→ Gj be the homomorphism extending each hi by the condition (EC).Then

h(x)=∑

i∈I

hi(xi)= xj and h(x)=∑

i∈I

hi(yi)= yj .

Hence xj = yj ⇒ x has a unique representation⇒G=⊕Gi . �

Corollary 1 Let G=H ⊕K , where H and K are subgroups of G such that H =⊕i∈I Gi and K =⊕j∈J Gj and I ∩ J = ∅. Then G=⊕t∈I∪J Gt .

Page 122: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.8 Free Abelian Groups and Structure Theorem 105

Proof Let A be an abelian group. If hi : Gi → A and hj : Gj → A are familiesof homomorphisms, then by Proposition 2.8.1, they can be extended to homomor-phisms f :H →A and g :K →A, respectively. Again f and g can be extended toa homomorphism h :G→A by Proposition 2.8.1. Hence G=⊕t∈I∪J Gt . �

Corollary 2 (G1 ⊕G2)⊕G3 =G1 ⊕ (G2 ⊕G3)=G1 ⊕G2 ⊕G3 for any sub-groups G1,G2 and G3 of a group G.

Corollary 3 For any group G and subgroups G1 and G2, G = G1 ⊕ G2 ⇒G/G2 ∼=G1.

Proof Let A=G1 and h1 :G1 →A=G1 be the identity homomorphism and h2 :G2 →A be the zero homomorphism. If h :G→A is the homomorphism extendingh1 and h2, then h is an epimorphism with kerh=G2. Hence G/G2 ∼=G1. �

We are now in a position to study free abelian groups. Let G be an additive group.Then (m+ n)x =mx + nx ∀x ∈G and ∀m,n ∈ Z.

If the group G is abelian, then n(x + y)= nx + ny, ∀x, y ∈G and ∀n ∈ Z.If S (�=∅) is a subset of G, then the subgroup 〈S〉 generated by S is given by

〈S〉 = {n1s1 + n2s2 + · · · + nt st : ni ∈ Z, si ∈ S}.In particular, if S = {s}, then 〈s〉 = {ns : n ∈ Z} is the cyclic group generated by

s and if S = ∅, then 〈S〉 = {0}. The subset S is said to be independent iff∑

nisi =0⇒ ni = 0, ∀i.

Definition 2.8.3 Let G be an additive abelian group. The group G is said to be afree abelian group with a basis B iff

(i) for each b ∈ B , the cyclic subgroup 〈b〉 is infinite cyclic; and(ii) G=⊕b∈B〈b〉 (direct sum).

Remark A free abelian group G is a direct sum of copies of Z and every elementx ∈ G can be expressed uniquely as x =∑nbb, where nb ∈ Z and almost all nb

(i.e., all but a finite number of nb) are zero.

Using the extension condition (EC) for direct sums, the following characteriza-tion of free abelian groups follows.

Proposition 2.8.2 Let G be an abelian group and {bi} be a family of elements of G

that generates G. Then G is a free abelian group with a basis {bi} iff for any abeliangroup A and any family {ai} of elements of A, there is a unique homomorphismh :G→A such that h(bi)= ai for each i.

Proof Let Gi = 〈bi〉. Then {Gi} is a family of subgroups of G. First suppose thatthe condition (EC) holds. We claim that each Gi is infinite cyclic. If for some in-dex j , the element bj generates a finite cyclic subgroup of G, then taking A = Z,

Page 123: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

106 2 Groups: Introductory Concepts

there exists no homomorphism h :G→ A, mapping each bi to the number 1. Thisis so because bj is of finite order but 1 is not of finite order in Z. Hence by Proposi-tion 2.8.1(b), G=⊕Gi .

Conversely, let G be a free group with a basis {bi}. Then given elements {ai}of A, ∃ homomorphisms hi :Gi → A such that hi(bi)= ai , because Gi is infinitecyclic. Hence the proof is completed by using Proposition 2.8.1(a). �

Theorem 2.8.1 If G is a free abelian group with a basis B = {b1, b2, . . . , bn}, thenn is uniquely determined by G.

Proof By hypothesis, G= Z⊕Z+ · · · ⊕Z (n summands). Then 2G is a subgroupof G such that

2G∼= 2Z⊕ 2Z+ · · · + 2Z (n summands).

Hence G/2G ∼= Z/2Z ⊕ Z/2Z ⊕ · · · ⊕ Z/2Z (n summands) shows that card(G/2G)= 2n. �

Definition 2.8.4 An abelian group G is said to be a finitely generated free abeliangroup iff G has a finite basis.

Remark The basis of a finitely generated free abelian group is not unique. For ex-ample, {(1,0), (0,1)} and {(−1,0), (0,−1)} are two different bases of G= Z⊕Z.

Corollary 1 Let G be a finitely generated abelian group. Then any two bases of G

have the same cardinal number.

Proof Let B = {b1, b2, . . . , bn} and X = {x1, x2, . . . xr} be two bases of G. Then byTheorem 2.8.1, card (G/2G)= 2n and also card (G/2G)= 2r . Hence n= r . �

For more general result, like vector spaces, we prove the following theorem.

Theorem 2.8.2 Any two bases of a free abelian group F have the same cardinality.

Proof Let B and C be two bases of F . Given a prime integer p > 1, the quotientgroup F/pF is a vector space over the field Zp (see Chap. 8 and Example 4.1.5of Chap. 4). Hence the cosets {b + pF : b ∈ B} form a basis ⇒ dimZp

(F/pF) =card B . Similarly, dimZp

(F/pF)= card C. Hence card B = card C. �

Remark If V = F/pF is infinite dimensional, Zorn’s Lemma is used to prove theexistence of a basis of V and then using the result that the family of all finite subsetsof an infinite set B has the same cardinality as B the invariance of the cardinality ofa basis is proved.

Definition 2.8.5 Let F be a free abelian group with a basis B . The cardinality of B

is called the rank of F , denoted rank F . In particular, if F is finitely generated, thenthe number of elements in a basis of F is the rank F .

Page 124: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.8 Free Abelian Groups and Structure Theorem 107

Remark Rank F is well defined by Theorem 2.8.2.

Like vector spaces free abelian groups are characterized by their ranks. Moreprecisely, two free abelian groups are isomorphic iff they have the same rank. Let G

be an arbitrary abelian group. We define its rank as follows:

Definition 2.8.6 An abelian group G has rank r (possibly infinite) iff ∃ a freeabelian subgroup F of G such that

(a) rank F = r ;(b) G/F is a torsion group (i.e., every element of G/F is of finite order).

Existence of F : Let B be an independent subset of G. Then the subgroup 〈B〉generated by B is abelian and free with a basis B . Let S be a maximal independentsubset of G, which exists by Zorn’s Lemma. Then F = 〈S〉 is a free abelian groupand G/F is a torsion group.

Remark Rank F precisely depends on G, since rank G = dimQ(Q ⊗ G), whereQ⊗G is a vector space over Q [see Chaps. 8 and 9]. Hence rank G is well defined.

Sometimes, given an arbitrary family of abelian groups {Gi}, we can find a groupG that contains subgroups Hi isomorphic to the group Gi , such that G is isomorphicto the direct sum of these groups. This leads to the concept of the external direct sumof groups.

Definition 2.8.7 Let {Gi} be a family of abelian groups. If G is an abelian groupand fi :Gi →G is a family of monomorphisms, such that G is the direct sum ofthe groups fi(Gi). Then we say that G is the external direct sum of the groups Gi ,relative to the monomorphisms fi :Gi →G.

We prescribe a construction of G.

Theorem 2.8.3 Given a family of abelian groups {Gi}i∈I , there exists an abeliangroup G and a family of monomorphisms fi :Gi →G such that G=⊕fi(Gi).

Proof We consider the cartesian product∏

i∈I Gi . It is an abelian group under com-ponentwise addition. Let G be the subgroup of the cartesian product consisting ofthose tuples (xi)i∈I such that xi = oi , for all but a finitely many values of i. Givenan index j , define fj :Gj →G by fj (x) be the tuple that has x at its j th coordi-nate and 0 at its ith coordinate for i �= j . Then fj is a monomorphism. Since eachelement x ∈ G has only finitely many non-zero coordinates, x can be expresseduniquely as a finite sum of elements from the groups fj (Gj ). �

A Characterization of External Direct Sums of Groups Like extension con-dition (EC) of direct sums, extension condition (ED) for external direct sums isdefined.

Page 125: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

108 2 Groups: Introductory Concepts

Fig. 2.6 Commutativity ofthe triangle for external directsum

Let {Gi}i∈I be a family of abelian groups, G be an abelian group and fi :Gi →G be a family of homomorphisms. Then G is said to satisfy the condition (ED)iff given any abelian group A and a family of homomorphisms hi : Gi → A, ∃ aunique homomorphism h : G→ A making the diagram in Fig. 2.6 commutative,i.e., h ◦ fi = hi, ∀i.

Proposition 2.8.3 Let {Gi} be a family of abelian groups and A be an abeliangroup.

(a) If each fi :Gi →G is a monomorphism and G=⊕i∈I fi(Gi), then G satisfiesthe condition (ED).

(b) Conversely, if {fi(Gi)} generates G and G satisfies the condition (ED), theneach fi :Gi →G is a monomorphism and G=⊕i∈I fi(Gi).

Proof Left as an exercise. �

We now prove the following structure theorem for finitely generated abeliangroups and also prove as its corollary the structure theorem of an arbitrary finiteabelian group (also known as fundamental theorem of finite abelian groups).

Theorem 2.8.4 (Fundamental theorem for finitely generated abelian groups) Everyfinitely generated abelian group can be expressed uniquely as

G∼=r summands︷ ︸︸ ︷

Z⊕Z⊕ · · · ⊕Z⊕Zn1 ⊕Zn2 ⊕ · · · ⊕Znt

for some integers r, n1, n2, . . . nt such that

(i) r ≥ 0 and nj ≥ 2, ∀j ; and(ii) ni |ni+1, for 1≤ i ≤ t − 1.

Proof As finitely generated Z-modules are finitely generated abelian groups, thetheorem follows from Theorem 9.6.5 of Chap. 9 by taking R = Z. �

Definition 2.8.8 The integer r in Theorem 2.8.4 is called the free rank or Bettinumber of the group G and the integers n1, n2, . . . , ni are called the invariant fac-tors of G.

Remark Betti numbers are very important in mathematics. For example, two closedsurfaces are homeomorphic iff their homology groups have the same Betti numbersin all dimensions [see Massey (1991)].

Page 126: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.8 Free Abelian Groups and Structure Theorem 109

Theorem 2.8.5 Two finitely generated abelian groups are isomorphic iff they havethe same rank and the same invariant factors (up to units).

Proof It follows from Theorem 9.6.11 of Chap. 9 by taking R = Z. �

Remark If we write F(G)= Z⊕· · ·⊕Z (r summands) and T (G)= Zn1⊕· · ·⊕Znt

in Theorem 2.8.4, then G∼= F(G)⊕T (G). F(G) is called a free subgroup of G andT (G) is called a torsion subgroup of G.

Corollary 1 (Structure Theorem for finite abelian groups) Any finite abelian groupG can be expressed uniquely as G∼= Zn2 ⊕ · · · ⊕Znt such that ni |ni+1, for 1≤ i ≤t − 1.

Proof The finite abelian group G is certainly finitely generated (which is generatedby the finite set consisting of all its elements). Hence, in this case, F(G)= 0. �

Corollary 2 Two finite abelian groups are isomorphic iff they have the same in-variant factors.

Supplementary Examples (SE-IB)

1 For any abelian group G, the following statements are equivalent:

(a) G has a finite basis;(b) G is the internal direct sum of a family of infinite cyclic groups;(c) G is isomorphic to a finite direct sum of finite copies of Z.

[Hint. (a) ⇒ (b). Let B = {b1, b2, . . . , bt } be a basis of G. Let nbi = 0 for somen ∈ Z⇒ ob1 + · · · + nbi + · · ·obt = 0⇒ n= 0⇒ bi is of infinite order ⇒ 〈bi〉 isan infinite cyclic group for 1≤ i ≤ t ⇒G=⊕t

i=1〈bi〉.(b)⇒ (c). Let G=⊕t

i=1 Gi , where each Gi∼= Z. This implies (c).

(c)⇒ (a). Let G∼= Z⊕Z+· · ·+⊕Z= Zt (say) be a finite direct sum of t copiesof Z and f :G→ Zt be an isomorphism.

Let ei = (0, . . . ,0,1,0 . . . ,0) ∈ Zt , where 1 is at the i the place.Then ∃bi ∈G, such that f (bi)= ei for each i.Clearly, B = 〈b1, bi, . . . , bt 〉 forms a basis of G.]

2 Let F be a free abelian group with a basis B and G be an abelian group.

(a) For every group f : B→G, ∃ a unique group homomorphism f : F →G suchthat f (b)= f (b), ∀b ∈ B .

(b) For every abelian group G, ∃ a free abelian group F such that G is isomorphicto a quotient group of F .

[Hint. (a) x ∈ F ⇒∃nb ∈ Z such that x =∑nbb.Define f : F →G, by f (x) =∑nbf (b). Unique expression of x ⇒ f is well

defined.

Page 127: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

110 2 Groups: Introductory Concepts

Clearly, f is a homomorphism such that f is unique, because homomorphismsagreeing on the set of basis are equal (like linear transformations of vector spaces).

(b) For each g ∈ G, take an infinite cyclic group generated by bg (say). ThenF =⊕g∈G〈bg〉 is a free abelian group with a basis B = {bg : g ∈G}. Define a mapf : B→G, bg �→ g and extend it by linearity.

Then by (a), ∃ a unique homomorphism f : F → G such that f (bg) =f (bg)= g. Hence f is an epimorphism⇒G∼= F/ker f .]

3 Every finitely generated abelian group G is the homomorphic image of a finitelygenerated free abelian group F .

[Hint. Let G = 〈X〉, where X = {x1, x2, . . . , xt } and B = {b1, b2, . . . , bt } be abasis of F .

Define a map f : F → G, bi �→ xi and extend it by linearity. Then f is welldefined and an epimorphism⇒G= f (F )].

4 Let F = 〈x〉 be a free abelian group. Then F/〈nx〉 ∼= Zn, for all integers n≥ 0.[Hint. Define map f : F → Zn, mx �→ [m], ∀m ∈ Z. Then f is an epimorphism

with kerf = 〈nx〉⇒ F/〈nx〉 ∼= Zn.]

2.8.1 Exercises

Exercises-II

1. For a given non-empty set S, define a word to be a finite product xn11 x

n22 · · ·xnt

t ,where xi ∈ S and ni ∈ Z. The word is said to be reduced iff xi �= xi+1 and ni ’sare non-zero. We can make a given word reduced by collecting up powers ofthe adjacent elements xi and omitting the zero powers and continue the processaccording to the necessity.

We consider the word x01 as the empty word. Let F(S) denote the set of all

reduced words on S. If S = ∅, F(S) is taken to be the trivial group. If S �= ∅,we define a binary operation on F(S) by concatenation of reduced words, i.e.,(x

n11 · · ·xnt

t )(ym11 · · ·ymr

r ) = xn11 · · ·xnt

t ym11 · · ·ymr

r = w (say) (making the wordreduced).

Show that

(a) F(S) becomes a group under this operation with the empty word as its iden-tity element and x

−ntt · · ·x−n1

1 as the inverse of the reduced word xn11 · · ·xnt

t ;(b) |X| = |S| ⇒ F(X)∼= F(S);(c) The free group F({x}) is the infinite cyclic group having only possible non-

empty reduced words are the powers xr ;(d) If S consists of more than one element, then F(S) is not abelian.

2. Show that the following statements on an abelian group G are equivalent:

(a) G has a non-empty basis;(b) G is the internal direct sum of a family of infinite cyclic subgroups;

Page 128: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.8 Free Abelian Groups and Structure Theorem 111

(c) G is isomorphic to a direct sum of copies of Z;(d) for a subset S and a map g : S→G such that given an abelian group A and a

map h : S→A, ∃ a unique homomorphism f :G→A satisfying f ◦g = h.

3. Show that given an abelian group A, ∃ a free abelian group G and an epimor-phism f :G→A.

[Hint. Show that any abelian group is the homomorphic image of a freeabelian group.]

4. Let G and H be free abelian groups on the set S w.r.t. maps g : S → G andh : S → H respectively. Show that ∃ a unique isomorphism f : G→ H suchthat f ◦ g = h.

5. If A is a free abelian group of rank n, then any subgroup B of A is a free abeliangroup of rank at most n.

[Hint. Let A= Z⊕Z⊕ · · ·⊕Z (n summands) and πi :A→ Z be the projec-tion on the ith coordinate.

Given t ≤ n, let Bt = {b ∈ B : πi(b) = 0, ∀i > t}. Then Bt is a subgroup ofB⇒ πt (Bt ) is a subgroup of Z. If πt (Bt ) �= 0, take xt ∈ Bt such that πt (xt ) is agenerator of this group. Otherwise, take xt = 0. Then

(i) Bt = 〈x1, x2, . . . , xt 〉, for each t ;(ii) the non-zero elements of {x1, x2, . . . , xt } form a basis of Bt , for each t ;

(iii) Bt = B is a free abelian group with rank B at most n.]

6. Homology and cohomology groups (see Sect. 9.11 of Chap. 9). A sequence {Cn}of abelian groups and a sequence {∂n} of homomorphisms ∂n : Cn→ Cn−1 suchthat ∂n−1 ◦ ∂n = 0, ∀n ∈ Z, are called a chain complex C = (Cn, ∂n) of abeliangroups. Given two chain complexes C = (Cn, ∂n) and C′ = (C′n, ∂ ′n), a sequencef = {fn} of homomorphisms fn : Cn→ C′n such that fn−1 ◦ ∂n = ∂ ′n ◦ fn, ∀n ∈Z, is called a chain map f : C → C′. The elements of Zn = ker ∂n are calledn-cycles, elements of Bn = Im ∂n+1 are called n-boundaries. f = {fn} is said tobe an isomorphism iff each fn is an isomorphism of groups. Then the quotientgroup Zn/Bn, denoted Hn(C) exists and is called the nth homology group ofC. Moreover each fn induces a group homomorphism fn∗ : Hn(C)→ Hn(C

′)defined by fn ∗ ([z]) = [f (z)], ∀[z] ∈ Hn(C) and f∗ = {fn∗} is said to be anisomorphism iff each fn∗ is an isomorphism.

The nth cohomology group Hn(C) is defined dually.

(a) (Eilenberg–Steenrod). Let the groups in the chain complexes C and C′ befree and f : C→ C′ be a chain map. Let K = {Kn = kerfn}. Show that f∗is an isomorphism iff Hn(K)= 0 ∀n ∈ Z.

(b) Show that the complex C is exact (see Sect. 9.7 of Chap. 9) iff H(C)= 0.(c) Establish the dual results of (a) and (b) for Hn(C).

7. Using the techniques of algebraic topology, the following results of free groupscan be proved [see Rotman (1988, p. 305)]:

(a) Every subgroup G of a free group F is itself free;(b) a free group F of rank 2 contains a subgroup that is not finitely generated;

Page 129: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

112 2 Groups: Introductory Concepts

(c) let F be a free group of finite rank n, and let G be a subgroup of finiteindex j . Then G is a free group of finite rank; indeed rank G= jn− j + 1.

2.9 Topological Groups, Lie Groups and Hopf Groups

An abstract group endowed with an additional structure having its group operations(multiplication and inversion) compatible with the additional structure, invites fur-ther attraction. Some of such groups are studied in this section. For example, westudy topological groups, Lie groups and Hopf groups which are very importantin topology, geometry, and physics. Topological groups were first considered by S.Lie (1842–1899). A topological group is a topological space whose elements forman abstract group such that the group operations are continuous with respect to thetopology of the space. A Lie group is a topological group having the structure ofa smooth manifold for which the group operations are smooth functions. On theother hand, a Hopf group (H -group) is a pointed topological space with a contin-uous multiplication such that it satisfies all the axioms of a group up to homotopy.The concept of an H -group is a generalization of the concept of topological groups.Lie groups are an important branch of group theory. The importance of Lie groupslies in the fact that Lie groups include almost all important groups of geometry andanalysis. The theory of Lie groups stands at the crossing point of the theories ofdifferential manifolds, topological groups, and Lie algebras.

2.9.1 Topological Groups

Definition 2.9.1 A topological group G is a non-empty set with a group structureand a topology on G such that the function f : G × G→ G, (x, y) �→ xy−1 iscontinuous.

The above condition of continuity is equivalent to the statement:The functions G×G→G, (x, y) �→ xy and G→G, x �→ x−1 are both con-

tinuous.Some important examples of topological groups.

Example 2.9.1 (i) (R,+), under usual addition of real numbers and with the topol-ogy induced by the Euclidean metric d(x, y)= |x − y|.

(ii) The circle group (S1, ·) in C, topologized by considering it as a subset of R2.(iii) (Rn,+), under usual coordinatewise addition and with product topology.(iv) (GL(n,R), ·), under usual multiplication of real matrices and with the Eu-

clidean subspace topology of Rn2(n > 1).

(v) The orthogonal group (O(n), ·) of real matrices with the Euclidean subspacetopology (n > 1). It is a subgroup of GL(n,R).

Page 130: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.9 Topological Groups, Lie Groups and Hopf Groups 113

(vi) The general linear group (GL(n,C), ·) over C topologized by considering itas a subspace of R2n2

.(vii) (U(n), ·) of all n× n complex matrices A such that AAT = I . It is a sub-

group of GL(n,C).

2.9.2 Lie Groups

A Lie group is a topological group which is also a manifold with some compati-bility conditions. Lie groups have algebraic structures and they are also subsets ofwell known spaces and have a geometry, moreover, they are locally Euclidean in thesense that a small portion of them looks like a Euclidean space making it possible todo analysis on them. Thus Lie groups and other topological groups lie at the cross-ing of different areas of mathematics. Representations of Lie groups and Lie alge-bras have revealed many beautiful connections with other branches of mathematics,such as number theory, combinatorics, algebraic topology as well as mathematicalphysics.

Definition 2.9.2 A topological group G is called a real Lie group iff

(i) G is a differentiable manifold;(ii) the group operations (x, y) �→ xy and x �→ x−1 are both differentiable.

Definition 2.9.3 A topological G is called a complex Lie group iff

(i) G is a complex manifold;(ii) the group operations (x, y) �→ xy and x �→ x−1 are both holomorphic.

The name Lie group is in honor of Sophus Lie. The dimension of a Lie group isdefined as its dimension as a manifold.

Some Important Examples of Lie Groups

Example 2.9.2 (i) (Rn,+) is an n-dimensional Lie group over R.(ii) (Cn,+) is an n-dimensional Lie group over C, but it is a 2n-dimensional Lie

group over R.(iii) GL(n,R) is a real Lie group of dimension n2.(iv) GL(n,C) is a complex Lie group of dimension n2.(v) SL(n,R) is a real Lie group of dimension n2 − 1.(vi) SL(n,C) is a complex Lie group of dimension n2 − 1.

2.9.3 Hops’s Groups or H -Groups

A pointed topological space is a non-empty topological space with a distinguishedelement.

Page 131: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

114 2 Groups: Introductory Concepts

Let P and Q be pointed topological spaces and f,g : P → Q be base pointpreserving continuous maps. Then f and g are said to be homotopic relative tothe base point p0 ∈ P , denoted by f # g relp0, iff there exists a continuous one-parameter family of maps

ft : P →Q,

such that f0 = f,f1 = g and ft (p0) = f (p0) = g(p0) for all t ∈ I = [0,1]. ft iscalled a homotopy between f and g relative to p0, denoted by ft : f # g relp0.

Since ‘#’ is an equivalence relation; one can speak of homotopy class of mapsbetween two spaces. Thus [P ;Q] usually denotes the set of all homotopy classes ofbase point preserving continuous maps P →Q (all homotopies are relative to thebase point).

Definition 2.9.4 A pointed topological space P is called a Hopf group or H -groupiff ∃ a continuous multiplication μ : P × P → P such that

(i) μ(c,1P )# 1p # μ(1P , c);(ii) μ(μ× 1P )# μ(1P ×μ);

(iii) μ(1P ,φ)# c# μ(φ,1P ),

where c : P → p0 ∈ P is the constant map (p0 is the base point of P ), 1P : P → P

is the identity map and φ : P → P is a continuous map and φ is called a homotopyinverse for P and μ. Then the homotopy class [c] of c is a homotopy identity and[φ] is homotopy inverse for P and μ.

Clearly, any topological group is an H -group with identity element e as a basepoint.

Theorem 2.9.1 Let X be an arbitrary pointed topological space and P be an H -group. Then [X;P ] is a group.

Proof Define for every pair of maps g1, g2 : X → P , the product g1g2 : X → P

by (g1g2)(x)= μ(g1(x), g2(x))= g1(x)g2(x); where the right hand multiplicationis the multiplication μ in the H -group P . This law of composition carries overto give an operation on homotopy classes such that [g1][g2] = [g1g2]. As the twohomotopic maps determine the same homotopy class, the group axioms for [X;P ]follow from (i)–(iii) of Definition 2.9.4. �

Theorem 2.9.2 If f : X→ Y is a base point preserving continuous map, then f

induces a group homomorphism

f ∗ : [Y ;P ]→ [X;P ] for each H-group P.

Proof Define f ∗ by f ∗[h] = [h ◦ f ]. This map is well defined, since h0 # h1 ⇒h0of # h1of (cf. Spanier 1966, Th. 6, p. 24). Verify that f ∗ is a group homomor-phism. �

Page 132: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.10 Fundamental Groups 115

Let P and P ′ be H -groups with multiplications μ and μ′, respectively. Thena continuous map α : P → P ′ is called a homomorphism of H -groups, iff αμ #μ′(α× α).

Theorem 2.9.3 If α : P → P ′ is a homomorphism between H -groups, then α in-duces a group homomorphism α∗ : [X;P ]→ [X;P ′].

Proof Define α∗ : [X;P ] → [X;P ′] by α∗[f ] = [α ◦ f ]. Then α∗ is well definedand a homomorphism. �

Remark For further results, see Appendix B.

2.10 Fundamental Groups

Homotopy theory plays an important role in mathematics. In this section, we definefundamental group of a topological space X based at a point x0 in X. This group isan algebraic invariant in the sense that the fundamental groups of two homeomor-phic spaces are isomorphic. By using the fundamental groups many problems ofalgebra, topology, and geometry are solved by reducing them into algebraic prob-lems. For example, the fundamental theorem of algebra is proved in Chap. 11 byhomotopy theory and the Brouwer Fixed Point Theorem for dimension 2 is provedin Appendix B by the fundamental group.

Definition 2.10.1 Let X be a topological space and x0 be a fixed point of X, calleda base point of X. A continuous map f : I →X (where I = [0,1]) is called a pathin X; f (0) and f (1) are called the initial point and the terminal point of the pathf , respectively. If f (0)= f (1)= x0, the path f is called a loop in X based at x0.A space X is said to be path connected, iff any two points of X can be joined bya path. Let f,g : I →X be two loops based at x0. Then they are called homotopicrelative to 0 and 1, denoted by f # g rel{0,1} iff ∃ a continuous map F : I × I →X

such that

F(t,0)= f (t), F (t,1)= g(t), F (0, s)= F(1, s)= x0 ∀t, s ∈ I.

The above homotopy relation between loops is an equivalence relation, and thisgives the set of homotopy classes relative to 0 and 1 of the loops based at x0 and thisis denoted by π1(X,x0). Given loops f,g : I →X based at x0, their product f ∗ g

is a loop f ∗ g : I →X at x0 defined by

(f ∗ g)(t)={

f (2t), 0≤ t ≤ 12 ,

g(2t − 1), 12 ≤ t ≤ 1.

If [f ] and [g] are two elements of π1(X,x0), define their product [f ] ◦ [g] =[f ∗ g]. This product is well defined and π1(X,x0) is group under this composition.This group is called the fundamental group of X based at x0.

Page 133: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

116 2 Groups: Introductory Concepts

Clearly, if X is path connected, π1(X,x0) is independent of its base point x0.We now find geometrically the fundamental group of the unit circle S1 which

is the boundary of the unit ball or disc E2 in R2. Since S1 is path connected, itsfundamental group π1(S

1, x0) is independent of its base point x0. A loop f in S1

based at x0 is a closed path starting at x0 and ending at x0. Then f is either a null-path (constant path) or f is given by one or more complete description (clockwiseor anti-clockwise) around the circle. Let f and g be two loops in S1 based at thesame point x0 such that f describes S1, m times and g describes S1, n times. Ifm > n, then f ∗ g−1 is a path describing (m− n) times the circle S1 and such thatit is not homotopic to a null path. Thus the homotopy classes of loops in S1 basedat x0 are in bijective correspondence with Z. Hence π1(S

1, x0) is isomorphic to Z.Proceeding as above, for a solid disc E2 the fundamental π1(E

2, x0)= 0, sincethe space E2 is a convex subspace of R2.

For an analytical proof use the degree function d defined in (v) below or [seeRotman (1988)].

Let I = {0,1} be the end point of the closed interval I = [0,1]. Then a loop inS1 based at 1 is a continuous map f : (I, I )→ (S1,1). Let p : (R, r0)→ (S1,1) bethe exponential map defined by p(t)= e2πit , ∀t ∈R, where r0 ∈ Z. We now presentsome interesting properties of fundamental groups (see Rotman (1988)).

(i) There exists a unique continuous map f : I → R such that p ◦ f = f andf (0)= 0.

(ii) If g : (I, I )→ (S1,1) is continuous and f # g relative to I , then f # g relativeto I and f (1)= g(1), where p ◦ g = g and g(0)= 0.

(iii) If f : (I, I ) → (S1,1) is continuous, the degree of f denoted by deg f isdefined by deg f = f (1), where f is the unique lifting of f with f (0) = 0.Then deg f is an integer.

(iv) If f (x)= xn, then degf = n and the degree of a constant loop is 0.(v) The function d : π1(S

1,1)→ Z, defined by d([f ])= degf , is an isomorphismof groups.

(vi) Two loops in S1 at the base point 1 are homotopic relative to I if and only ifthey have the same degree.

2.10.1 A Generalization of Fundamental Groups

Rodes (1966) introduced the fundamental group σ(X,x0,G) of a transformationgroup (X,G,σ) (see Definition 3.1.1), where X is a path connected space with x0as base point. Given an element g ∈G, a path α of order g with base point x0 is acontinuous map α : I →X such that α(0)= x0, α(1)= gx0. A path α1 of order g1and a path α2 of order g2 give rise to a path α1 + gα2 of order g1g2 defined by theequations

(α1 + gα2)(s)={

α1(2s), 0≤ s ≤ 12 ,

g1α2(2s − 1), 12 ≤ s ≤ 1.

Page 134: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.10 Fundamental Groups 117

Two paths α and β of the same order g are said to be homotopic iff ∃ a continuousmap F : I × I →X such that

F(s,0)= α(s), 0≤ s ≤ 1;F(s,1)= β(s), 0≤ s ≤ 1;F(0, t)= x0, 0≤ t ≤ 1;F(1, t)= gx0, 0≤ t ≤ 1.

The homotopy class of a path α of order g is denoted by [α;g]. Prove that the set ofhomotopy classes of paths of prescribed order with rule of composition ‘◦’ form agroup where ◦ is defined by

[α;g1] ◦ [β;g2] = [α + g1β;g1g2].This group denoted by σ(X,x0,G) is called the fundamental group of (X,G,σ)

with base point x0.

Problems and Supplementary Examples (SE-I)

1 Show that (Q,+) is not finitely generated (+ denotes usual addition of rationalnumbers).

Solution If possible, suppose (Q,+) is finitely generated. Then there exists a finiteset

S ={

p1

q1,p2

q2, . . . ,

pn

qn

}

of rational numbers such that Q= 〈S〉. Now we can find a prime p such that p doesnot divide q1, q2, . . . , qn. Let x ∈Q. Then there exist integers m1,m2, . . . ,mn suchthat

x =m1p1

q1+m2

p2

q2+ · · · +mn

pn

qn

= m

q1q2 · · ·qn

for some integer m. Since p does not divide q1, q2, . . . , qn, p does not divideq1q2 . . . qn. Hence p does not divide the denominator of any rational number (ex-pressed in lowest terms) of 〈S〉. This shows that 1

p�∈ 〈S〉 =Q. This yields a contra-

diction. Hence (Q,+) is not finitely generated.

2 Let Sn be the symmetric group on {x1, x2, . . . , xn} with identity e. For i =1,2, . . . , n − 1, write σi for the permutation of S which transposes xi and xi+1and keep the remaining elements fixed. Then show that

(i) σ 2i = e for i = 1,2, . . . , n− 1;

(ii) σiσj = σjσi if |i − j |> 2;(iii) (σiσi+1)

3 = e for 1≤ i ≤ n− 2;(vi) σ1, σ2, . . . , σn−1 generate the group Sn.(v) The relations (i)–(iii) between the generators determine the Cayley table of Sn

completely (these relations are called the defining relations of Sn).

Page 135: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

118 2 Groups: Introductory Concepts

3 Consider as a conjecture. “Let H be a subgroup of a finite group G. If H isabelian, then H is normal in G.” Disprove the conjecture by reference to the Octicgroup and one of its subgroups.

4 Show by an example that the converse of Lagrange’s Theorem is not true forarbitrary finite groups.

Solution We show that the alternating group A4 of order 12 has no subgroup H oforder 6. If possible, let |H | = 6. All the following eight 3-cycles (1 2 3), (1 3 2),(1 2 4), (1 4 2), (1 3 4), (1 4 3), (2 3 4), (2 4 3) are in A4. As |H | = 6, H cannotcontain all these elements. Let β = (x y z) be a 3-cycle in A4 such that β �∈H . LetK = {β,β2, β3 = 1}. Then K is a subgroup of A4. Hence H ∩K = {1} shows thatHK = |H ||K|

|H∩K| = 18. But HK ⊆A4 implies a contradiction.

Problems and Supplementary Examples (SE-II)

1 Let G be a group and H be a subgroup of G. Show that ∀g ∈ G, gH = H ⇔g ∈H .

Solution Let g ∈ G and gH = H . Then g = g · 1 ∈ gH = H ⇒ g ∈ H . Thus∀g ∈ G, gH = H ⇒ g ∈ H . Conversely, suppose g ∈ H . Then for ∀h ∈ H , gh ∈H ⇒ gH ⊆ H . Again g,h ∈H ⇒ g−1h ∈H ⇒ h= g(g−1h) ∈ gH ⇒H ⊆ gH .Thus for any g ∈H , gH =H .

2 Show that any factor group of a cyclic group is cyclic.

Solution Let G = 〈a〉 be a cyclic group and N be a normal subgroup of G. Thencomputation of all powers of aN amounts to computing in G, all powers of therepresentative a and these powers give all the elements of G. Hence the powers ofaN give all the cosets of N and thus G/N = 〈aN〉⇒G/N is cyclic.

3 Find the kernel of the homomorphism: f : (R,+)→ (C∗, ·) defined by f (x)=eix and hence find the factor group R/kerf .

Solution

kerf = {x ∈R : eix = 1}= {x ∈R : cosx + i sinx = 1}

= {x ∈R : x = 2πn,n ∈ Z} = 〈2π〉.Thus R/kerf =R/〈2π〉 ∼= Imf = S1 (circle group in C∗, see Example 2.3.2).

4 Show that a group having only a finite number of subgroups is finite.

Solution If G = {1}, then G is finite. Suppose G �= {1}. Then ∃ an elementa (�=1) ∈G. Thus H = 〈a〉 is a finite subgroup of G.

Page 136: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.10 Fundamental Groups 119

Otherwise, (H, ·)∼= (Z,+) and (Z,+) has infinite number of subgroups viz. 〈n〉(by Theorem 2.4.10), n = 0,1,2, . . . would imply that H has an infinite numberof subgroups contradicting our hypothesis. Thus O(a) is also finite. If G = 〈a〉,the proof ends. If G �= 〈a〉, then ∃ only a finite number of elements in (G− 〈a〉).Otherwise, for each g ∈ (G− 〈a〉), 〈g〉 is a subgroup of G⇒∃ an infinitely manynon-trivial subgroups of G⇒ a contradiction of hypothesis. Consequently, G isfinite.

5 Let G be a finite group and H be a proper subgroup of G such that for x, y ∈G−H,xy ∈H . Prove that H is a normal subgroup of G such that |G| is an eveninteger.

Solution g ∈H ⇒ ghg−1 ∈H, ∀h ∈H . Again g �∈H ⇒ hg−1 �∈H, ∀h ∈H . Thisis so because hg−1 ∈ H and h,h−1 ∈ H ⇒ h−1(hg−1) ∈ H ⇒ g−1 ∈ H ⇒ g ∈H ⇒ a contradiction. Thus g,hg−1 ∈ G − H ⇒ g(hg−1) ∈ H by hypothesis ⇒ghg−1 ∈ H . Hence it follows that H is a normal subgroup of G. Thus G/H is agroup. We now show that |G| is of even order. By hypothesis, ∃x ∈ G such thatx �∈H but x2 ∈H . Hence x2H =H ⇒ (xH)2 = eH . Again x �∈H ⇒ xH �= eH .Thus O(xH) = |xH | = 2. Now |xH | divides |G/H | ⇒ 2 divides |G/H |. Hence|G/H | is an even integer⇒ |G| = |G/H | · |H | is an even integer.

6 Let G be a finite group and H,K be subgroups of G such that K ⊆ H . Then[G :K] = [G :H ][H :K].

Solution H =⋃i xiK and G =⋃j yjH , where both are disjoint union ⇒ G =⋃i,j yj xiK is also a disjoint union⇒ [G :K] = [G :H ][H :K].

7 Let G be a finite cyclic group of order n. Show that corresponding to each posi-tive divisor d of n, ∃ a unique subgroup of G of order d .

Solution Let G= 〈g〉 for some g ∈G and d a positive divisor of n. Then n=md

for some m ∈ Z.Now gm ∈G⇒O(gm)= O(g)

gcd(m,n)= n

m= d by Theorem 2.3.5.

Let H = 〈gm〉. Then H is subgroup of G of order d .

Uniqueness of H : Let K be a subgroup of G of order d . Let t be the smallestpositive integer such that gt ∈ K . Then K = 〈gt 〉. Now |K| = d ⇒ O(gt ) = d ⇒d = O(g)

gcd(t,n)= n

gcd(t,n)by Theorem 2.3.5⇒ gcd(t, n)= n

d=m⇒m|t . If t =ml for

some l ∈ Z, then gt = gml = (gm)l ∈H ⇒K ⊆H ⇒K =H , since |H | = |K|.

8 Let G be a finite group and f :G→ Z15 be an epimorphism. Show that G hasnormal subgroups with indices 3 and 5.

Solution G/kerf ∼= Z15 by the First Isomorphism Theorem. Then Z15 being acyclic group of order 15, G/kerf is a cyclic group of order 15 ⇒ G/kerf has

Page 137: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

120 2 Groups: Introductory Concepts

a normal subgroup N1 of order 5 and a normal subgroup N2 of order 3⇒∃ normalsubgroups H1 and H2 of G such that kerf ⊆H1, kerf ⊆H2, H1/kerf =N1 andH2/kerf = N2 by the Correspondence Theorem. Hence 15 = |G/kerf | = [G :kerf ] = [G : H1][H1 : kerf ] (by Ex. 6 of SE-II) = [G : H1] · 5⇒ [G : H1] = 3.Similarly, [G :H1] = 5.

9 Prove that the group Zm ×Zn is isomorphic to the group Zmm⇔ gcd(m,n)= 1i.e., Zm ×Zn

∼= Zmn⇔m,n are relatively prime.

Solution Zm and Zn are cyclic groups of order m and n, respectively. Ifgcd(m,n) = 1, then Zm × Zn is a cyclic group of order mn and hence isomor-phic to Zmn (see Theorems 2.4.12 and 2.4.13). Conversely, let Zmn

∼= Zm × Zn.If gcd(m,n) = d > 1, then mn = d · l cm(m,n)⇒ mn

d= l cm(m,n)⇒ mn

d= t is

divisible by both m and n. Now for (x, y) ∈ Zm×Zn, (x, y)+ (x, y)+ ·+ (x, y) (tsummand) = (0,0)⇒ no element (x, y) ∈ Zm × Zn can generate the entire groupZm × Zn. Hence Zm × Zn cannot be cyclic and therefore cannot be isomorphic toZmn. So we reach a contradiction. Hence gcd(m,n)= 1.

10 If n = pn11 p

n22 · · ·pnr

n , where pi ’s are distinct primes, ni ≥ 0, show that Zn isisomorphic to Zn1

p1 ×Zn2p2 × · · · ×Znr

pr.

Solution The result follows from Ex. 9 of SE-II by an induction argument.

11 Prove that a finitely generated group cannot be expressed as the union of anascending sequence of its proper subgroups.

Solution Let G be a finitely generated group G = 〈a1, a2, . . . , an〉. If possible,let G = ⋃i Ai , where A1 ⊆ A2 ⊆ · · · and each Ai is a proper subgroup ofG, i = 1,2, . . . . Then ∃ a positive integer t such that a1, a2, . . . , an ∈ At . ThenG= 〈a1, a2, . . . , an〉 ⊆At . Again At ⊆G. Hence G=At ⇒ a contradiction, sinceAt is a proper subgroup of G.

12 Show that every finitely generated subgroup of (Q,+) is cyclic.

Solution Let H be a finitely generated subgroup of (Q,+). Then any element x ofH is of the form

x = m

q1q2 · · ·qn

for some integer m (proceed as Ex. 1 of SE-I)

⇒ H ⊆⟨

1

q1q2 · · ·qn

⟩=K (say)

⇒ K is a cyclic group generated by1

q1q2 · · ·qn

∈Q

⇒ H is a cyclic group.

Page 138: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.11 Exercises 121

13 Prove that every finite subgroup of (C∗, ·) is cyclic.

Solution Let (H, ·) be a finite subgroup of (C∗, ·). Let |H | = n and x ∈ H . Thenxn = 1.

The nth roots of xn = 1 are given by

1,w,w2, . . . ,wn−1, where w = cos2kπ

n+ i sin

2kπ

n, k = 0,1,2, . . . , n− 1.

Then each of the roots belongs to H and O(w)= n= |H |. Hence H = 〈w〉⇒H iscyclic.

14 Prove that the alternating group An of order n (≥3) is a normal subgroup of Sn

(see Ex. 58 of Exercises-III).

Solution Consider the subgroup G = ({1,−1}, ·) of (R∗, ·). Define a mapping ψ :Sn→G by

ψ(σ)={

1 if σ is an even permutation,

−1 if σ is an odd permutation.

Then ψ is an epimorphism such that kerψ = {σ ∈ Sn :ψ(σ)= 1} =An.Hence An is a normal subgroup of Sn by Theorem 2.6.5.

15 Let H be a normal subgroup of a group G such that H and G/H are bothcyclic. Show that G is not in general cyclic.

Solution Take G= S3 and H = {e, (1 2 3), (1 3 2)}.Then |G/H | = 2⇒H is a normal subgroup of G. Hence G/H is also a group.

Since |G/H | = 2 and |H | = 3, which are both prime, G/H and H are both cyclicgroups. But G is not commutative⇒ S3 is not cyclic.

16 Let G be a non-cyclic group of order p2 (p is a prime integer) and g(�=e) ∈G.Show that O(g)= p.

Solution O(g)||G| = p2 ⇒O(g)= 1, p or p2. Now g �= e⇒O(g) �= 1. If O(g)=p2, then G contains an element g such that O(g)= |G|. Hence G is cyclic⇒ a con-tradiction of hypothesis⇒O(g) �= p2. Thus O(g) �= 1, O(g) �= p2 ⇒O(g)= p.

2.11 Exercises

Exercises-III

1. Prove that a semigroup S is a group iff for each a ∈ S, aS = Sa = S.

Page 139: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

122 2 Groups: Introductory Concepts

2. Let S be a semigroup. A non-empty subset A of S is called a pseudo-ideal (left,right) iff ab ∈ A ∀a, b ∈ A; x2A ⊆ A and Ax2 ⊆ A(x2A ⊆ A,Ax2 ⊆ A) forevery x ∈ S. Show that a semigroup S is a group iff x(A\B)x ⊆A\B for everyx ∈ S when A\B �= ∅, where A,B are either both left pseudo-ideals or bothright pseudo-ideals of S.

3. Show that (a) in the semigroup (Z∗, ·) (of all non-zero integers under usualmultiplication), A= {a ∈ Z∗ : a ≥ 6} is a pseudo-ideal but not an ideal of Z∗.

In the multiplicative group (Q∗, ·) of all non-zero rational numbers, A ={r2 : r ∈Q∗} is a proper pseudo-ideal of Q∗.

(This example shows that a group may contain a proper pseudo-ideal.)4. Define a binary operation o on Z by a ◦ b = a + b − 2. Show that (Z,◦) is a

commutative group.5. Let G be the set of all rational numbers excepting−1. Define a binary operation

‘◦’ on G by a ◦ b= a + b+ ab. Show that (G,◦) is a group.6. Define a binary operation ‘◦’ on the set of non-zero rational numbers by a ◦b=|a|b. Is (R∗,◦) a group? Justify your answer.

7. Let

G={(

a b

c d

): a, b, c, d ∈R (or Z) and ad − bc= 1

}.

Show that G is a group under usual multiplication. Is this group commutative?8. (i) A semigroup (X,o) is said to be cancellative iff for each x, y, z ∈ X,x ◦

y = x ◦ z⇒ y = z and y ◦ x = z ◦ x ⇒ y = z. Show that a finite cancellativesemigroup (X,◦) is a group.

Does this result hold if the semigroup is not finite?(ii) Show that a cancellative semigroup can be extended to a group iff it is

commutative.9. Let SL(n,R) (SL(n,C)) be the set of all n × n (n > 1) unimodular matri-

ces A (i.e., detA = 1) with real (complex) entries. Show that (SL(n,R), ·)((SL(n,C), ·)) is a group under usual multiplication.

10. Let Un (n > 1) denote the set of all n×n complex matrices A such that AAT =I . Show that (Un, ·) is a non-commutative group and is a subgroup of GL(n,C)

(under usual multiplication). ((Un, ·) is called unitary group.)[Hint. AAT ⇒ I ⇒ |detA|2 = 1.] Show that in particular, the set SUn of

all unitary matrices A with detA = 1 is a non-commutative group (known asspecial unitary group).

11. Let On (n > 1) denote the set of all orthogonal n × n real matrices A (i.e.,AAT = I ). Show that (On, ·) is a non-commutative group (under usual multi-plication).

12. Let SOn be the special orthogonal group consisting of all orthogonal matri-ces A such that detA= 1. Show that (SOn, ·) is a non-commutative group but(SOn,+) is not a group (where ‘·’ and ‘+’ denote usual multiplication andaddition of matrices respectively).

[Hint. (SOn,+) does not contain identity.]

Page 140: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.11 Exercises 123

13. Let (G, ·) be a group and S,T subsets of G. Then define the product S ◦ T as

S ◦ T ={

z ∈G : z= xy for some x ∈ S,y ∈ T

∅ if either S or T is empty.

Then the inverse of the set S denoted by S−1 is defined by

S−1 ={

z ∈G : z= x−1 for some x ∈ S

∅ iff S = ∅.Show that if S,T ,W are subsets of G, then

(a) (S ◦ T ) ◦W = S ◦ (T ◦W);(b) (S ◦ T )−1 = T −1 ◦ S−1;(c) S ◦ T �= T ◦ S (in general).

14. Show that a non-empty subset T of a group (G, ·) is a subgroup of G iff T ◦T ⊆T and T −1 ⊆ T or equivalently, T ◦ T −1 ⊆ T .

15. Let S,T be subgroups of a group (G, ·). Show that S ◦ T is a subgroup of G iffS ◦ T = T ◦ S.

16. Let G be a group and T1, T2 two proper subgroups of G.Show that T1 ∪ T2 is a subgroup of G iff T1 ⊆ T2 or T2 ⊆ T1. Hence show

that a group cannot be the union of two proper subgroups.17. Let (G, ·) be a group and S a non-empty subset of G.

Show that the subgroup 〈S〉 generated by S consists of all elements of theform x1x2 · · ·xn, where xi ∈ S ∪ S−1 for all integers n≥ 1 and, moreover, if S

is a countable subset of G, then 〈S〉 is countable.[Hint. T be the set of all finite products of the given form x1x2 · · ·xn. Taking

n= 1 and allowing x1 run over S, it follows that S ⊆ T . Suppose a = x1x2 · · ·xn

and b = y1y2 · · ·ym ∈ T . Now ab−1 = x1x2 · · ·xnxn+1xn+2 · · ·xn+m, wherexn+i = (ym−i+1)

−1.But yj ∈ S ∪ S−1 ⇒ yj−1 ∈ S ∪ S−1. Consequently, xn+i ∈ S ∪ S−1 ⇒ xi ∈

S ∪ S−1, i = 1,2, . . . , m+ n⇒ ab−1 ∈ T ⇒ T is a subgroup of G. Now S ⊆T ⇒〈S〉 ⊆ T . Since S ⊆ 〈S〉 and 〈S〉 is a subgroup, S−1 ⊆ 〈S〉.

S ∪ S−1 ⊆ 〈S〉. By closure property and induction, it follows that any finiteproduct of elements of S ∪ S−1 is also contained in 〈S〉 i.e., T ⊆ 〈S〉.]

18. Show that (R,+) is not finitely generated (+ denotes usual addition of reals).[Hint. If possible, ∃ a finite subset S ⊂ R such that 〈S〉 = R. Then S is

countable⇒R is countable⇒ a contradiction.]19. The dihedral group Dn: The group Dn is completely determined by two gen-

erators s, t ; and the defining relations tn = 1, s2 = 1, (ts)2 = 1, and tk �= 1 for0 < k < n, where 1 denotes the identity element. Find |Dn|. Construct the Cay-ley table for the group D3. Interpret Dn as a group of symmetries of a regularn-gon.

20. The quaternion group H . This group is completely determined by two gen-erators s, t ; and the defining relations s4 = 1, t2 = s2, ts = s3t . Construct itsCayley table.

Page 141: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

124 2 Groups: Introductory Concepts

21. (a) External direct product of groups. Let H and K be groups. Show that

(i) H × K is a group under binary operation: (h, k)(h′, k′) = (hh′, kk′)∀h,h′ ∈H and k, k′ ∈K ;

(ii) If H �= {1} and K �= {1}, H ×K is neither isomorphic to H nor to K ;(iii) H ×K is an abelian group iff H and K are both abelian groups.

(b) Internal direct product of subgroups. Let G be a group and H,K benormal subgroups of G such that G=HK and H ∩K = {1}. Then G is calledthe internal direct product of H and K . If G is an additive abelian group, thenit is called the internal direct sum of H and K and denoted by G=H ⊕K .

Prove the following:

(i) G = H ⊕ K iff every element x ∈ G can be expressed uniquely as x =h+ k for some h ∈H and k ∈K .

(ii) Let G be the internal direct product of normal subgroups H and K . ThenG is isomorphic to H ×K .

(iii) If G=H ×K , then H and K are isomorphic to suitable subgroups H andK of G respectively, such that G is the internal direct product of H andK .

(iv) Let f : G→ H and g : H → K be homomorphisms of abelian groupssuch that g ◦ f is an isomorphism. Then H = Imf ⊕ kerf .

22. Klein four-group C×C: If C is the cyclic group of order 2 generated by g, showby using Ex. 21 that C × C is a group of order 4. Work out the multiplicationtable for C × C. Show that the cyclic group of order 4, C4 = {1, a, a2, a3},where a4 = 1 and the group C ×C are not isomorphic.

[Hint. All elements other than (1, 1) of C×C are of order 2 but it is not truefor C4.]

Remark The Klein 4-group is named after Felix Klein (1849–1925). This groupmay also be defined as the set {1, a, b, c} together with the multiplication de-fined by the following table:

• 1 a b c

1 1 a b c

a a 1 c b

b b c 1 a

c c b a 1

23. (a) Show that a finite group G of order r is cyclic iff it contains an element g oforder r .

(b) Let 〈a〉 be a finite cyclic group of order n. Show that 〈a〉 = {a, a2, . . . ,

an−1}.24. Show that every element a (�=1) in a group of prime order p has period p.25. Show that a group in which every element a (�=1) has period 2 is abelian.26. Show that every group of order <6 is abelian.

Page 142: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.11 Exercises 125

27. Let G be a non-abelian group of order 10. Prove that G contains at least oneelement of period 5.

28. If G is a group of order p2 (p is prime >1), show that G is abelian (see Ex. 3of Exercises-I, Chap. 3).

29. Let A and B be different subgroups of a group G such that both A and B are ofprime order p. Show that A∩B = {1}.

30. Let G be a group of order 27. Prove that G contains a subgroup of order 3.31. Let G be a finite group and A,B subgroups of G such that B ⊆ A. Show that

[G :A] is a factor of [G : B].32. Let f be a homomorphism from G to G′, where G and G′ are finite groups.

Show that | Imf | divides |G′| and gcd(|G|, |G′|).[Hint. Use Theorem 2.4.5(i) and Theorem 2.5.1.]

33. Show that

(i) two cyclic groups of the same order are isomorphic;(ii) every cyclic group of order n is isomorphic to Zn (cf. Theorem 2.4.12);

(iii) Z4 is cyclic and both 1 and 3 are generators;(iv) Zp has no proper subgroup if p is a prime integer;(v) an infinite cycle group has exactly two generators.

34. Find all the subgroups of Z18 and give their lattice diagram.35. (a) Let G be a group of order pq , where p and q are primes. Verify that every

proper subgroup of G is cyclic.(b) Prove that finite groups of rotations of the Euclidean plane are cyclic.

36. Let G be a finite group of order 30. Can G contain a subgroup of order 9?Justify your answer.

37. If the index of a subgroup H in a group G is 2, prove that aH = Ha ∀a ∈G

and G/H is isomorphic to a cyclic group of order 2.38. Give an example of a subgroup H in a group G satisfying aH = Ha ∀a ∈ H

but [G :H ]> 2.39. If H is a subgroup of finite index in G, prove that there is only a finite number

of distinct subgroups of G of the form aHa−1.40. Show that the order of an element of finite group G divides the order of G.

[Hint. The order of an element a ∈ G is the same as the order of 〈a〉 (byTheorem 2.4.8) and then apply Lagrange’s Theorem.]

41. Let G be a group and x ∈G be such that x is of finite order m. If xr = 1, showthat m|r .

42. (i) Let G be a cyclic group of prime order p. Show that G has no proper sub-groups.

(ii) Show that the only non-trivial groups which have no proper subgroupsare the cyclic groups of prime order p.

43. Let (G, ·), (H, ·) and (K, ·) be groups and f :G→H and g :H →K be grouphomomorphisms. Show that

(i) g ◦ f : G → K is also a homomorphism. Further, if f,g are bothmonomorphisms (epimorphisms), then g◦f is also a monomorphism (epi-morphism);

Page 143: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

126 2 Groups: Introductory Concepts

(ii) in particular, if f and g are both isomorphisms, then g ◦ f is also an iso-morphism;

(iii) further, if f : G→ H is an isomorphism, then f−1 : H → G is also anisomorphism.

44. Let P be the set of all polynomials with integral coefficients. Show that (P,+)

is an abelian group isomorphic to the multiplicative group (Q+, .) of positiverationals.

[Hint. Let {pn}∞n=0 be an enumeration of positive rationals in increasingorder: p0 < p1 < p2 < · · ·< pn < · · · .

Define f : P →Q+ as follows: for p(x)= a0 + a1x + a2x2 + · · · + anx

n ∈P , f (p(x))= p

a00 p

a11 p

a22 · · ·pan

n ∈Q+.Verify that f is a homomorphism with kerf = {a0 + a1x + · · · + an ∈ P :

pa00 p

a11 · · ·pan

n = 1} = {0}. Check that f is an isomorphism.]45. A homomorphism of a group into itself is called an endomorphism. Let (C∗, ·)

be the multiplicative group of non-zero complex numbers. Define f : (C∗, ·)→(C∗, ·) by f (z)= zn (n is a positive integer). Show that f is an endomorphism.Find kerf .

46. Let G be a group. Show that a mapping f :G→G defined by x �→ x−1 is anautomorphism of G iff G is abelian.

47. Let G be a group and a ∈ G. Then the mapping fa : G → G defined byfa(x) = a−1xa (∀x ∈ X) is an automorphism of G (called an inner automor-phism induced by a) and f1 = 1G is an inner automorphism (called a trivial au-tomorphism). Show that for an abelian group G, the only inner automorphismis 1G but for a non-abelian group there exist non-trivial automorphisms.

48. Show that

(a) the map f : (R+, ·)→ (R,+) defined by f (x)= loge x is an isomorphism;(b) the map g : (R,+)→ (R+, ·) defined by g(x)= ex is an isomorphism.

[Hint. Check that f and g are homomorphisms such that g ◦ f = 1 andf ◦ g = 1].

49. Show that every homomorphic image of an abelian group is abelian but theconverse is not true.

50. Show that

(a) a homomorphism from any group to a simple group is either trivial or sur-jective;

(b) a homomorphism from a simple group is either trivial or one-to-one.

51. Prove the following:

Aut Z6 ∼= Z2 and Aut Z5 ∼= Z4

(see Theorem 2.3.4).52. (a) If G is a cyclic group and f :G→G′ is a homomorphism of groups, show

that Imf is cyclic.(b) Let G be a group such that every cyclic subgroup of G is normal in G.

Show that every subgroup of G is a normal subgroup of G.

Page 144: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.11 Exercises 127

53. If G is a cyclic group and a, b are generators of G. Show that there is an auto-morphism of G which maps a onto b and also any automorphism of G maps agenerator onto a generator.

54. Let A(S) be the permutation group on S(�=∅). If two permutations f,g ∈A(S)

are such that for any x ∈ S, f (x) �= x ⇒ g(x) = x and for any y ∈ S, g(y) �=y ⇒ f (y) = y, (then f and g are called disjoint), examine the validity of theequality fg = gf .

55. Show that every permutation can be expressed as a product of disjoint cycles(the number of cycle may be 1), where the component cycles are uniquely de-termined except for their order of combination.

56. Show that a permutation σ can be expressed as a product of transpositions (i.e.,cycles of order 2) in different ways but the number of transpositions in such adecomposition is always odd or always even.

(σ is said to be an odd or even permutation according as r is odd or even,where r is the number of transpositions in a decomposition.)

57. Show that in a permutation group G, either all permutations are even or exactlyhalf the permutations are even, which form a subgroup of G.

58. Show that all even permutations of a set of n distinct elements (n ≥ 3) form anormal subgroup An of the symmetric group Sn (An is called the alternatinggroup of degree n).

Find its order (see Ex. 14 of SE-II).59. (i) Show that the alternating group An is generated by the following cycles of

degree 3: (123), (124), . . . , (12n).(ii) If a normal subgroup H of the alternating group An contains a cycle of

degree 3, show that H =An.(iii) Show that the groups S3 and Z6 are not isomorphic but for every proper

subgroup G of S3, there exists a proper subgroup H of Z6 such that G∼=H .60. Let G be a group and a, b ∈ G. The element aba−1b−1 denoted by [a, b] is

called a commutator of G. The subgroup of G whose elements are finite prod-ucts of commutators of G is called the commutator subgroup of G. Denote thissubgroup by C(G). Show that

(i) [a, b][b, a] = 1;(ii) G is an abelian group iff C(G)= {1};

(iii) C(G) is a normal subgroup of G;(iv) the quotient group G/C(G) is abelian;(v) if H is any normal subgroup of G such that G/H is abelian, then

C(G)⊂H ;(vi) C(S3)=A3.

61. A group G is called a quaternion group iff G is generated by two elementsa, b ∈G satisfying the relations:

O(a)= 4, a2 = b2 and ba = a3b (see Ex. 20).

Let G be a subgroup of the General Linear group GL(2,C) of order 2 over C,generated by A= ( 0 1

−1 0

)and B = ( 0 i

i 0

). Show that G is a quaternion group.

Page 145: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

128 2 Groups: Introductory Concepts

62. Prove the following:

(a) A semigroup S is a semilattice of groups iff S is a regular semigroup, all ofwhose one sided ideals are two sided.

(b) A semigroup S is a semilattice of left groups iff S is a regular semigroup,all of whose left ideals are two sided.

(c) (i) A semigroup S is a semilattice of left groups iff the condition I ∩L ∩R = RLI holds for any two-sided ideal I , every ideal left L and rightideal R of S;

(ii) a semigroup S is a semilattice of right groups iff the condition I ∩L∩R = IRL holds for every two-sided ideal I , every left ideal L andevery right ideal R of S.

63. A Clifford semigroup is a regular semigroup S in which the idempotents arecentral i.e., in which ex = xe for every idempotent e ∈ S and every x ∈ S.

Prove that a semigroup S is a Clifford semigroup iff S is a semilattice ofgroups.

64. Prove the following:

(i) Finite groups of rotations of Euclidean plane are cyclic; any such group oforder n consists of all rotations about a fixed point through angles of 2 rπ

nfor r = 0,1,2, . . . , n− 1.

(ii) The cyclic and dihedral groups and the groups of tetrahedron, octahedronand icosahedron are all the finite subgroups of the group of rotations ofEuclidean 3-dimensional space.

The latter three groups are called the tetrahedral group of 12 rotationscarrying a regular tetrahedron to itself, the octahedral group of order 24 ofrotations of a regular octahedron and the icosahedral group of 60 rotationsof a regular icosahedron, respectively.

65. Series of Subgroups. A subnormal (or subinvariant) series of subgroups of agroup G is a finite sequence {Hi} of subgroups of G such that

{1} =H0 ⊆H1 ⊆ · · · ⊆Hn =G

and Hi is a normal subgroup of Hi+1 for each i = 0,1, . . . , n− 1.In addition, if each Hi is a normal subgroup of G, then {Hi} is called a

normal (or invariant series) series of G:Two subnormal (normal) series {Hi} and {Tj } of the same group G are

isomorphic iff ∃ a one-to-one correspondence between the factor groups{Hi+1/Hi} and {Tj+1/Tj } such that the corresponding factor groups are iso-morphic.

A subnormal series (normal series) {Tj } is a refinement of a subnormal series(normal series) {Hi} of a group G iff {Hi} ⊆ {Tj }, i.e., iff each Hi is one of theTj .

A subnormal series {Tj } of a group G is a composition series iff all thefactors groups Tj+1/Tj are simple. A normal series {Ni} of G is a principalseries iff all the factor groups Ni+1/Ni are simple.

Page 146: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.12 Exercises (Objective Type) 129

A group G is solvable iff it has a composition series {Tj } such that all factorgroups Tj+1/Tj are abelian.

Prove the following:

(a) (i) Schreier’s Theorem: Two subnormal (normal)series of a group G haveisomorphic refinements.

(ii) Z has neither a composition series nor a principal series.(iii) Jordan–Hölder’s Theorem. Any two composition (principal) series of

group G are isomorphic.(iv) If G has a composition (principal) series, and if N is a proper normal

subgroup of G, then ∃ a composition (principal) series containing N .(v) A subgroup of a solvable group and the homomorphic image of a solv-

able group are solvable.(vi) If G is a group and N is a normal subgroup of G such that both N and

G/N are solvable, then G is solvable.(b) Let G be a group and A a pseudo-ideal of G. Then G is solvable ⇔ A is

solvable.

66. An abelian group A is said to an injective group iff wherever i :G′ ⊂G (G′ isa subgroup of G), for any homomorphism f :G′ → A, of abelian groups ∃ ahomomorphism f :G→A such that f ◦ i = f and A is said to be a projectivegroup iff for any epimorphism α :G→G′′ of abelian groups, and any homo-morphism f : A→G′′, ∃ a homomorphism f : A→G such that α ◦ f = f .An abelian group A is said to be a divisible group iff for any element a ∈ A,and any non-zero integer n, ∃ an element b ∈A such that nb= a. Show that

(i) an abelian group A is injective⇔A is divisible;(ii) any abelian group is a subgroup of an injective group.

2.12 Exercises (Objective Type)

Exercises A Identify the correct alternative(s) (there may be more than one) fromthe following list:

1. Let G be a group and a, b ∈ G such that O(a) = 4, O(b) = 2 and a3b = ba.Then O(ab) is

(a) 2 (b) 3 (c) 4 (d) 8.2. Let G be a cyclic group of infinite order. Then the number of elements of finite

order in G is(a) 1 (b) 2 (c) infinitely many (d) 4.

3. Let G be an infinite cyclic group. Then the number of generators of G is(a) 1 (b) 3 (c) 2 (d) infinitely many.

4. The number of subgroups of S3 is(a) 4 (b) 5 (c) 6 (d) 3.

5. The order of the permutation (1 2 4) (3 5 6) in S6 is(a) 2 (b) 4 (c) 3 (d) 9.

Page 147: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

130 2 Groups: Introductory Concepts

6. Let G be a finite group and H,K be two finite subgroups of G such that |H | = 7and |K| = 11. Then |H ∩K| is

(a) 1 (b) 7 (c) 11 (d) 77.7. Let G be a finite group and H,K be two subgroups of G such that |H | = 7,|K| = 11. Then |HK| is

(a) 77 (b) 1 (c) 7 (d) 11.8. Let G be a finite group of order ≤400. If G has subgroups of order 45 and 75,

then |G| is(a) 400 (b) 225 (c) 300 (d) 75.

9. Let G be a finite group having two subgroups H and K and such that |H | = 45,|K| = 75. If |G| is n, where 225 < n < 500, then n is given by

(a) 230 (b) 475 (c) 450 (d) 460.10. Let G be a cyclic group of order 25. Then the number of elements of order 5 in

G is(a) 1 (b) 3 (c) 4 (d) 20.

11. Let G be a non-trivial group of order n. Then G has

(a) always an element of order 5;(b) no element of order 5;(c) an element of order 5 if 5 divides n;(d) an element of order 30 if 30 divides n.

12. The number of elements of order 5 in the group Z25 ×Z5 is(a) 1 (b) 16 (c) 24 (d) 20.

13. The number of subgroups of order 5 in the group Z5 ×Z9 is(a) 1 (b) 2 (c) 24 (d) 5.

14. Automorphism group Aut(Z5) of Z5 is isomorphic to(a) Z5 (b) Z3 (c) Z4 (d) Z2.

15. Let p be a prime integer. Then |Aut(Zp)| is(a) p (b) p− 1 (c) 1 (d) p(p− 1).

16. Let f : Z→ Z be a group homomorphism such that f (1)= 1. Then

(a) f is an isomorphism;(b) f is a monomorphism but not an isomorphism;(c) f is not a monomorphism;(d) f is not an epimorphism.

17. Let G be an arbitrary group and f :G→G be an epimorphism. Then

(a) f is always an isomorphism;(b) f is not always an isomorphism;(c) f is not always a monomorphism;(d) kerf contains more than one element.

18. The number of subgroups of 4Z/16Z is(a) 5 (b) 3 (c) 4 (d) 2.

19. The number of subgroups of (Z,+) which contains 10Z as a subgroup is(a) 4 (b) 10 (c) infinite (d) 3.

Page 148: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.12 Exercises (Objective Type) 131

20. Consider the groups G= Z2 ×Z3, and K = Z6. Then

(a) ∃ no homomorphism from G onto K ;(b) ∃ no monomorphism from G onto K ;(c) ∃ an isomorphism from G onto K ;(d) ∃ an epimorphism from G onto K .

21. Let An be the set of all even permutations of the symmetric group Sn. Then

(a) An is a subgroup of Sn but not normal;(b) An is not a subgroup of Sn;(c) An is a normal subgroup of Sn;(d) An is always a non-commutative subgroup of Sn.

22. The group Z3 ×Z3 is

(a) cyclic;(b) not isomorphic to Z9;(c) isomorphic to Z9;(d) simple.

23. The group Z2 ×Z2 is

(a) cyclic;(b) isomorphic to Klein’s 4-group;(c) not isomorphic to Klein 4-group;(d) simple.

24. The group Z8 ×Z9 is

(a) not cyclic;(b) isomorphic to Z8 ×Z3 ×Z3;(c) isomorphic to Z72;(d) simple.

25. The number of homomorphisms from the group (Q,+) into the group (Q+, ·)is

(a) one (b) two (c) infinitely many (d) zero.26. The number of generators of the group Zp×Zq , where p,q are relatively prime

to each other, is(a) pq (b) (p− 1)(q − 1) (c) p(q − 1) (d) q(p− 1).

27. Given a group G, let Z(G) be its center. For n ∈N+ (the set of positive integers)define Gn = {(g1, . . . , gn) ∈Z(G)× · · ·×Z(G) : g1 · · ·gn = 1}. As a subset ofthe direct product group G× · · · ×G (n times direct product of the group G),Gn is

(a) isomorphic to the direct product Z(G)× · · · ×Z(G) ((n− 1) times);(b) a subgroup but not necessarily a normal subgroup;(c) a normal subgroup;(d) not necessarily a subgroup.

Page 149: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

132 2 Groups: Introductory Concepts

28. Let G be a group of order 77. Then its center Z(G) is isomorphic to(a) Z7 (b) Z1 (c) Z11 (d) Z77.

29. The number of group homomorphisms from the symmetric group S3 to thegroup Z6 is

(a) 2 (b) 3 (c) 6 (d) 1.30. Let G be the group given by G = Q/Z and n be a positive integer. Then the

statement that there exists a cyclic subgroup of G of order n is

(a) never true;(b) not necessarily true;(c) true but not necessarily a unique one;(d) true but a unique one.

31. Let H = {e, (1 2)(3 4), (1 3)(2 4), (1 4)(2 3)} and K = {e, (1 2)(3 4)} be sub-groups of S4, where e denote the identity element of S4. Then

(a) H and K are both normal subgroups of S4;(b) K is normal in A4 but A4 is not normal in S4;(c) H is normal in S4, but K is not;(d) K is normal in H and H is normal in A4.

32. Let n be the orders of permutations σ of 11 symbols such that σ does not fixany symbol. Then n is

(a) 18 (b) 15 (c) 28 (d) 30.33. Which of the following groups is (are) cyclic?

(a) Z8⊕Z8 (b) Z8⊕Z9 (c) Z8⊕Z10 (d) a group of prime order.34. Let G be a finite group and H be a subgroup of G. Let O(G) = m and

O(H)= n. Which of the following statements is (are) correct?

(a) If m/n is a prime number, then H is normal in G;(b) if m= 2n, then H is normal in G;(c) if there exist normal subgroups A and B of G such that H = {ab | a ∈

A,b ∈ B}, then H is normal in G;(d) if [G :H ] = 2, then H is normal in G.

35. Let G be a finite abelian group of odd order. Which of the following mapsdefine an automorphism of G?

(a) The map x �→ x−1 for all x ∈G;(b) the map x �→ x2 for all x ∈G;(c) the map x �→ x for all x ∈G;(d) the map x �→ x−2 for all x ∈G.

36. Let GL(n,R) denote the group of all n × n matrices with real entries (withrespect to matrix multiplication) which are invertible. Which of the followingsubgroups of GL(n,R) is (are) normal?

(a) The subgroup of all real orthogonal matrices;(b) the subgroup of all matrices whose trace is zero;

Page 150: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

2.12 Exercises (Objective Type) 133

(c) the subgroup of all invertible diagonal matrices;(d) the subgroup of all matrices with determinant equal to unity.

37. Which of the following subgroups of GL(2,C) is (are) abelian?

(a) The subgroup of invertible upper triangular matrices;(b) the subgroup A defined by A= {[ a b

−b a

] : a, b ∈R and |a|2 + |b|2 = 1};

(c) the subgroup G= {M ∈GL2(C) : detM = 1};(d) the subgroup B defined by B = {[ a b

−b a

] : a, b ∈C and |a|2 + |b|2 = 1}.

38. Let f : (Q,+)→ (Q,+) be a non-zero homomorphism. Then

(a) f is always bijective;(b) f is always surjective;(c) f is always injective;(d) f is not necessarily injective or surjective.

39. Consider the element

α =(

1 2 3 4 52 1 4 5 3

)

of the symmetric group S5 on five elements. Then

(a) α is conjugate to( 4 5 2 3 1

5 4 3 1 2

);

(b) the order of α is 5;(c) α is the product of two cycles;(d) α commutes with all elements of S5.

40. Let G be a group of order 60. Then

(a) G has a subgroup of order 30;(b) G is abelian;(c) G has subgroups of order 2,3, and 5;(d) G has subgroups of order 6,10, and 15.

41. Let G be an abelian group of order n. Then(a) n= 36 (b) n= 65 (c) n= 15 (d) n= 21.

42. Which of the following subgroups are necessarily normal subgroups?

(a) The kernel of a group homomorphism;(b) the center of a group;(c) a subgroup of a commutative group;(d) the subgroup consisting of all matrices with positive determinant in the

group of all invertible n× n matrices with real entries (under matrix multi-plication).

43. Which of the given subgroup H of a group G is a normal subgroup of G?

(a) G is the group of all 2× 2 invertible upper matrices with real entries undermatrix multiplication and H is the subgroup of all such matrices (aij ) suchthat a11 = 1;

Page 151: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

134 2 Groups: Introductory Concepts

(b) G is the group of all n×n invertible matrices with real entries under matrixmultiplication and H is the subgroup of such matrices with determinant 1;

(c) G is the group of all 2× 2 invertible upper matrices with real entries undermatrix multiplication and H is the subgroup of all such matrices (aij ) suchthat a11 = a22;

(d) G is the group of all n× n invertible matrices with real entries under ma-trix multiplication and H is the subgroup of such matrices with positivedeterminant.

44. Let S7 denote the symmetric group of all permutations of the symbols{1,2,3,4,5,6,7}. Then

(a) S7 has an element of order 10;(b) S7 has an element of order 7;(c) S7 has an element of order 15;(d) the order of any element of S7 is at most 12.

Exercises B (True/False Statements) Determine which of the following state-ments are true or false. Justify your answers with a proof or give counter-examplesaccordingly.

1. The set of all Möbius transformations S : C → C, z �→ az+bcz+d

, ad − bc �= 0;a, b, c, d ∈C form a group under usual composition of maps.

2. The set SL(2,R) = {X ∈ GL(2,R) : detX = 1} is a normal subgroup of thegroup GL(2,R) of all real non-singular matrices of order 2.

3. The set G= {x ∈Q : 0 < x ≤ 1} is a group under the usual multiplication.4. If each element of a group G, except its identity element is of order 2, then the

group is abelian.5. A cyclic group can have more than one generator.6. Let G be a group of infinite order. Then all the elements of G, which are of the

form an,n ∈ Z, for a given a �= 1, are distinct.7. The octic group D4 is cyclic.8. If every proper subgroup of group G is cyclic, then G is also cyclic.9. Let G be a cyclic group of order n. Then G has φ(n) distinct generators.

10. If G is an abelian group, then the only inner automorphism of G is the identityautomorphism.

11. Let G be the internal direct product of its normal subgroups H and K . Then thegroups G/H and K are isomorphic.

12. If g and g2 are both generators of a cyclic group G of order n, then n is prime.13. Let G be a finite group of odd order. If H = {x2 : x ∈G}, then H is a subgroup

of G only if G is cyclic.14. Two permutations in Sn are conjugate to each other⇔ they have the same cycle

decomposition.15. Z(A4), the center of the alternating group A4 is {e}.16. Let H be a normal subgroup of a group G. If H and G/H are both cyclic, then

G is cyclic.17. Every group of order 4 is commutative.

Page 152: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 135

18. Every finitely generated group G can be expressed as the union of an ascendingsequence of proper subgroups of G.

19. Let G be a finite group and H be a proper subgroup of G such that x, y ∈ G

and x, y �∈H ⇒ xy ∈H . Then |G| is an even integer.20. The group (Q,+) is cyclic.21. The group (R,+) is cyclic.22. Any finitely generated subgroup of (Q,+) is cyclic.23. In the group (Q,+), there exists an ascending sequence of cyclic groups Gn

such that Q=⋃Gn.24. Let (H, ·) be a subgroup of (C∗, ·) such that [C∗ : H ] = n (finite). Then

H � C∗.25. Every finite subgroup (H, ·) of (C∗, ·) is cyclic.26. The groups (Z,+) and (R,+) are isomorphic.27. The groups (R∗, ·) and (R,+) are isomorphic.28. The groups (Z,+) and (Q,+) are isomorphic.29. Every proper subgroup of a non-cyclic abelian group is non-cyclic.30. A group G cannot be isomorphic to a proper subgroup H of G.31. A group G is commutative ⇔ (ab)n = anbn, ∀a, b ∈G and for any three con-

secutive integers n.32. Z9 is a homomorphic image of Z3 ×Z3.33. The groups Z6 ×Z8 and Z48 are isomorphic.34. Let G be a group. For a fixed a ∈ G, a mapping ψa : G→ G is defined by

ψa(x)= ax, ∀x ∈G. Then ψa is a permutation of G.

2.13 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Artin 1991;Birkoff and Mac Lane 1965; Chatterjee 1964; Herstein 1964; Howie 1976; Hunger-ford 1974; Jacobson 1974, 1980; Lang 1965; Mac Lane 1997; Malik et al. 1997;Shafarevich 1997; van der Waerden 1970) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Birkoff, G., Mac Lane, S.: A Survey of Modern Algebra. Macmillan, New York (1965)Carruth, J.H., Hildebrant, J.A., Koch, R.J.: The Theory of Topological Semigroups I. Dekker, New

York (1983)Carruth, J.H., Hildebrant, J.A., Koch, R.J.: The Theory of Topological Semigroups II. Dekker, New

York (1986)Chatterjee, B.C.: Abstract Algebra I. Dasgupta, Kolkata (1964)

Page 153: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

136 2 Groups: Introductory Concepts

Cotton, F.A.: Chemical Application to Group Theory. Wiley, New York (1971)Elliot, J.P., Dawber, P.G.: Symmetry in Physics. Macmillan, New York (1979)Farmer, D.W.: Groups and Symmetry. Mathematics World Series, vol. 5, Am. Math. Soc., Provi-

dence (1996)De Groot, J.: Groups represented by Homomorphic Groups I. Math. Ann. 138, 80–102 (1959)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Howie, I.M.: An Introduction to Semigroup Theory. Academic Press, New York (1976)Hungerford, T.W.: Algebra. Springer, New York (1974)Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)Mac Lane, S.: Category for the Working Mathematician. Springer, Berlin (1997)Magil, K.D. Jr: Some open problems and directions for further research in semigroups of contin-

uous selfmaps. In: Universal Algebra and Applications, Banach Centre Publications, pp. 439–454. PWN, Warsaw (1982)

Malik, S., Mordeson, J.N., Sen, M.K.: Abstract Algebra, Fundamentals of Abstract Algebra.McGraw Hill, New York (1997)

Massey, W.S.: A Basic Course in Algebraic Topology. Springer, New York (1991)Rodes, F.: On the fundamental group of a transformation group. Proc. Lond. Math. Soc. 16, 635–

650 (1966)Rotman, I.J.: An Introduction to Algebraic Topology. Springer, New York (1988)Shafarevich, I.R.: Basic Notions of Algebra. Springer, Berlin (1997)Spanier, E.H.: Algebraic Topology. McGraw-Hill, New York (1966)Sternberg, S.: Group Theory and Physics. Cambridge University Press, Cambridge (1994)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)Weyl, H.: Symmetry. Princeton University Press, Princeton (1952)

Page 154: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 3Actions of Groups, Topological Groupsand Semigroups

The actions of groups, topological groups and semigroups are very important con-cepts. An action of a group (semigroup) on a non-empty set assigns to each elementof the group (semigroup) a transformation of the set in such a way that it assignsto the product of the two elements of the group (semigroup) the product of the twocorresponding transformations. As a consequence, each element of a group deter-mines a permutation on the set under a group action. For a topological group actionon a topological space, this permutation is a homeomorphism and for a Lie groupaction on a differentiable manifold, it is a diffeomorphism. Group actions are ap-plied to develop the theory of finite groups. More precisely, group actions are usedto determine the number of distinct conjugate classes of a subgroup of a finite groupand also to prove Cayley’s Theorem, Cauchy’s Theorem and Sylow’s Theorems forgroups. The counting principle is applied to determine the structure of a group ofprime power order. These groups arise in the Sylow Theorems and in the descrip-tion of finite abelian groups. The Sylow Theorems give the existence of p-Sylowsubgroups of a finite group and describe the subgroups of prime power order of anarbitrary finite group. We discuss the converse of Lagrange’s theorem which is nottrue for arbitrary finite groups. We also study actions of topological groups and Liegroups and obtain some orbit spaces which are very important in topology and ge-ometry. For example, RP n, CP n are obtained as orbit spaces. On the other hand, inthis chapter, semigroup actions are applied to theoretical computer science yieldingstate machines, which unify computer science with mainstream mathematics.

3.1 Actions of Groups

In this section we introduce the concept of an action of a group G on a non-emptyset X and study such actions. We show that a group action of G on X assigns toeach element of G a permutation on the set X. This leads to a proof of Cayley’stheorem that every abstract group is isomorphic to some group of permutations and,in particular, every group of order n is isomorphic to a certain subgroup of Sn. This

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_3, © Springer India 2014

137

Page 155: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

138 3 Actions of Groups, Topological Groups and Semigroups

interesting theorem of Cayley establishes the equivalence between the historicalconcept of a group of transformations and the modern axiomatic concept of a group.

Definition 3.1.1 A group G is said to act on a non-empty set X from the left (orX is said to be a left G-set) iff there is a function σ : G × X → X, denoted by(g, x) �→ g · x (or gx) for all x ∈X, g ∈G such that

(i) for any x ∈X, 1 · x = x, where 1 is the identity of G;(ii) for any x ∈X, g1, g2 ∈G, (g1g2) · x = g1 · (g2 · x).

σ is said to be an action of G on X from the left and the ordered triple (X,G,σ) iscalled a transformation group.

Example 3.1.1 Let G be a subgroup of Sn. Then an action of G on the set X ={1,2, . . . , n} is defined by α · x = α(x) ∀α ∈G i.e., α · x is the effect of applyingthe permutation α ∈G to the element x ∈X.

Example 3.1.2 Let X denote the Euclidean 3-space and G the group of all rotationsof X which leave the origin fixed. Then an action of G on X is defined by g · x =g(x), the image of the point x ∈X under the rotation g.

There may exist different actions of a group on a given set X.

Example 3.1.3 Let H be a subgroup of a group G. Then for all h ∈H and x ∈G,each of the following is a group action:

(i) h · x = hx (left translation);(ii) h · x = xh−1;

(iii) h · x = hxh−1 (conjugation by h);

Each of the above is an action of H on G. The element hxh−1 is said to be aconjugate of x.

(iv) if H is a normal subgroup of G, then x · h = xhx−1 is an action of G on H ,where the right hand multiplication is the group multiplication.

Remark A right action of a group G on a set X is defined in an analogous manner.

Definition 3.1.2 A group G is said to act on a set X from the right (or X is said tobe a right G-set) iff there is a function σ :X ×G→X, denoted by (x, g) �→ x · g(or xg) for all x ∈X, g ∈G such that

(i)’ for any x ∈X, x · 1= x;(ii)’ for any x ∈X, g1, g2 ∈G, x · (g1g2)= (x · g1) · g2.

Remark The essential difference between the right and left G-sets is not whetherthe elements of G are written on the right or left of those of X. The main point isthe difference between respective conditions (ii) and (ii)’: If X is a left G-set, then

Page 156: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.1 Actions of Groups 139

the product g1g2 acts on x ∈X in such a way that g2 operates first and g1 operateson the result, but for the right G-sets, g1 operates first and g2 operates on the result.

If X is a left G-set, then for any x ∈X and g ∈G, x · g = g−1 · x defines a rightG-set structure. Conversely, if X is a right G-set, then g · x = x · g−1 defines aleft G-set structure. Since there is a bijective correspondence between left and rightG-set structures, we need to study only one of them.

Theorem 3.1.1 Let X be a left G-set. For any g ∈G, the map X→ X defined byx �→ g · x is a permutation on the set X.

Proof Let φg :X→X be the map defined by φg(x)= g · x. Then

φg−1(x)= g−1 · x for all g ∈G and x ∈X

⇒ (φgφg−1)(x)= φg

(g−1 · x)= g · (g−1 · x)= (gg−1) · x = 1 · x = x

∀g ∈G and ∀x ∈X ⇒ φgφg−1 = 1X.

Similarly φg−1φg = 1X . Therefore φg is a bijection on X. Consequently, φg is apermutation on X. �

Remark This theorem shows that the notion of a left G-set X is equivalent to thenotion of a representation of G by permutations on the set X.

Theorem 3.1.2 Let X be a left G-set. Then

(i) the relation ρ on X defined by xρy, iff gx = y for some g ∈G is an equivalencerelation;

(ii) for each x ∈X, Gx = {g ∈G : gx = x} is subgroup of G.

Proof (i) 1x = x ∀x ∈ X⇒ xρx ∀x ∈ X⇒ ρ is reflexive. Again xρy ⇒ gx = y

for some g ∈ G⇒ x = g−1y ⇒ yρx ⇒ ρ is symmetric. Finally, xρy and yρz⇒gx = y and g′y = z for some g, g′ ∈ G ⇒ (g′g)x = g′(gx) = g′y = z ⇒ xρz

(since g′g ∈G)⇒ ρ is transitive. Consequently, ρ is an equivalence relation on X.(ii) 1 ∈ Gx ⇒ Gx �= ∅. Let g,h ∈ Gx . Then gx = x and hx = x ∀x ∈ X. Now

(gh−1)x = g(h−1x)= gx = x⇒ gh−1 ∈Gx ⇒Gx is a subgroup of G. �

Definition 3.1.3 Let X be a left G-set. Then the equivalence classes xρ of Theo-rem 3.1.2(i) are called the orbits of G on X and each xρ is called the orbit of x ∈X,denoted by orb(x). G is said to act on X transitively iff orb(x)=X for every x ∈X.Two orbits of G on X are identical or disjoint and the set of all distinct orbits on X

is called the orbit set denoted X mod G.

Definition 3.1.4 The subgroup Gx is called the isotropy group of x or the stabilizerof x.

Clearly, the subgroup Gx fixes every x ∈X. If Gx = {1}, ∀x ∈X, then the actionof G on X is said to be free.

Page 157: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

140 3 Actions of Groups, Topological Groups and Semigroups

Lemma 3.1.1 If a group G acts on a set X, then there is a bijection between the setof cosets of the isotropy group Gx in G onto the orb(x) for each x ∈X.

Proof Let {gGx} denote the set of all left cosets of Gx in G. Consider the mapf : {gGx} → orb(x) given by f (gGx) = gx. Let g,g′ ∈ G. Then gx = g′x ⇔g−1g′x = x ⇔ g−1g′ ∈ Gx ⇔ g′Gx = gGx ⇒ f is well defined. Clearly, f is abijection. �

Theorem 3.1.3 Let a group G act on a set X. Then |orb(x)| is the index. [G :Gx]for every x ∈X. In particular, if G acts transitively on X, then |X| = [G :Gx].Proof Since [G :Gx] is the cardinal number of the set {gGx}, the theorem followsfrom Lemma 3.1.1. �

Theorem 3.1.4 Let X be a set and A(X) the group of all permutations on X. If agroup G acts on X, then this action induces a homomorphism G→A(X).

Proof For each g ∈ G, the map φg : X → X defined by φg(x) = gx is a bijec-tion by Theorem 3.1.1. Consider the map ψ : G→ A(X) defined by ψ(g) = φg .Then ∀g,g′ ∈ G, ψ(gg′) = φgg′ . But φ(gg′)(x) = (gg′)x = g(g′x) = φg(g

′x) =(φgφg′)(x) ∀x ∈ X⇒ φgg′ = φgφg′ . Thus, ψ(gg′) = ψ(g)ψ(g′)⇒ ψ is a homo-morphism. �

Lemma 3.1.2 For every group G, there is a monomorphism G→A(G).

Proof By Example 3.1.3, we find that every group G acts on itself by left trans-lation. Then by Theorem 3.1.4, this action induces a homomorphism ψ : G →A(G) given by ψ(g) = φg , where φg(g

′) = gg′ ∀g,g′ ∈ G. Now ψ(g) = 1A(G)

(identity automorphism of G)⇔ gg′ = g′ ∀g′ ∈ G⇒ g = 1⇒ ψ is a monomor-phism. �

The following theorem, essentially due to the British mathematician Arthur Cay-ley (1821–1895), is a direct consequence of Lemma 3.1.2. He observed that everygroup could be realized as a subgroup of a permutation group.

Theorem 3.1.5 (Cayley’s Theorem) Every group is isomorphic to a group of per-mutations. In particular every group of order n is isomorphic to a certain subgroupof Sn.

Proof Let G be any group. Then by Lemma 3.1.2, there is a monomorphism ψ :G→A(G). Consequently, G∼= Imψ . This implies that G is isomorphic to a groupof permutations. If G is, in particular, a finite group of order n, then A(G) becomesthe symmetric group Sn. Hence the last statement follows from the first one. �

Corollary Let G be a group. Then

(i) for each g ∈G, conjugation by g induces an automorphism of G;

Page 158: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.1 Actions of Groups 141

(ii) there is a homomorphism G→ AutG, whose kernel is C(G)= {g ∈G : gx =xg ∀x ∈G}.

Proof (i) Let G act on itself by conjugation. Then for each g ∈G, consider the mapσg :G→G defined by conjugation: σg(x) = gxg−1 ∀x ∈G. Now (σgσg−1)(x)=σg(g

−1xg)= g(g−1xg)g−1 = x ∀x ∈G⇒ σgσg−1 = 1G, where 1G is the identity

mapping on G. Similarly, σg−1σg = 1G. Therefore σg is a bijection on G. Moreover∀x, y ∈G, σg(xy)= g(xy)g−1 = gxg−1gyg−1 = σg(x)σg(y)⇒ σg is a homomor-phism. Consequently, for each g, σg is an automorphism of G.

(ii) Let G act on itself by conjugation. Then by Theorem 3.1.4, this action in-duces a homomorphism ψ :G→ A(G) given by ψ(g) = σg (defined in (i)). Nowg ∈ kerψ ⇔ σg = 1G ⇔ gxg−1 = x ∀x ∈G⇔ gx = xg⇔ g ∈ C(G)⇒ kerψ =C(G). �

Remark σg is called the inner automorphism induced by g and the normal subgroupkerψ = C(G) is the center of G. The group of symmetries of the square has fourdistinct inner automorphisms but the cyclic group of order 3 has no inner automor-phism except the identity.

Lemma 3.1.3 Let H be a subgroup of a group G and let G act on the set X of all leftcosets of H in G by left translation. Then the kernel of the induced homomorphismG→A(X) is contained in H .

Proof The induced homomorphism ψ :G→A(X) is defined by ψ(g)= σg , whereσg :X→X is given by σg(xH)= gxH . Now g ∈ kerψ ⇒ σg = 1X ⇒ gxH = xH

∀x ∈G. Then for x = 1, g1H = 1H =H ⇒ g ∈H . �

Theorem 3.1.6 Let H be a subgroup of index n of a group G and no non-trivialnormal subgroup of G is contained in H . Then G is isomorphic to a subgroup of Sn.

Proof Clearly, H is not a normal subgroup of G. Now by using the notation ofLemma 3.1.3, the kerψ is a normal subgroup of G contained in H and hence byhypothesis kerψ = {1}. This shows that ψ is a monomorphism. Consequently, G isisomorphic to a subgroup of Sn. �

Corollary Let G be a finite group and p be the smallest prime dividing |G|. If H

is a subgroup of G such [G :H ] = p, then H is normal in G.

Proof Let X be the set of all left cosets of H in G. Hence [G : H ] = p ⇒A(X)∼= Sp . Now consider the map

ψ :G→ Sp as defined in Lemma 3.1.3.

As kerψ is a normal subgroup in G and contained in H by Lemma 3.1.3 andG/kerψ is isomorphic to a subgroup of Sp , |G/kerψ | divides |Sp| = p!. But every

Page 159: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

142 3 Actions of Groups, Topological Groups and Semigroups

divisor of |G/kerψ | = [G : kerψ] must divide |G| = |kerψ |[G : kerψ]. Since nopositive integer less than p (other than 1) can divide |G|, |G/kerψ | must be p or 1.Then |G/kerψ | = [G : H ][H : kerψ] = p[H : kerψ] ≥ p⇒ |G/kerψ | = p and[H : kerψ] = 1. Consequently, H = kerψ ⇒H is normal in G. �

Definition 3.1.5 Let X and Y be two left G-sets. Then a mapping f : X → Y iscalled G-equivariant or G-homomorphism or simply a mapping of left G-sets ifff (g · x)= g · f (x) ∀x ∈X and g ∈G ·A G-equivariant map f :X→ Y is calledan isomorphism of left G-sets iff there exists another G-equivariant map h : Y →X

such that h ◦f = 1X and f ◦h= 1Y . As usual, an automorphism of a G-set is a selfisomorphism.

Definition 3.1.6 Let X be a left G-set. We say that X is a homogeneous left G-setiff for any elements x, y ∈X, ∃g ∈G such that g · x = y, i.e., iff, G acts transitivelyon X.

Example 3.1.4 Let G be group and H an arbitrary subgroup of G. Define a mapψ :G×G/H →G/H , (g, g′H) �→ gg′H . Then ψ defines an action of G on G/H

such that G/H is a homogeneous left G-set.

Theorem 3.1.7 Any homogeneous left G-set is isomorphic to some homogeneousleft G-set G/H .

Proof Let X be an arbitrary homogeneous left G-set. Choose an element x0 ∈ X.Then H = {g ∈ G : gx0 = x0} is a subgroup of G. Consider the map f : G→ X

defined by g �→ gx0. As X is a homogeneous G-set, f is onto. Now for g,h ∈G,gx0 = hx0 ⇔ h−1gx0 = x0 ⇔ h−1g ∈H ⇔ h, g ∈ same coset of H . Consequently,f induces a map f : G/H → X, which is clearly a bijection. Moreover, f is G-equivariant. Consequently, G/H and X are isomorphic left G-sets. �

Remark The isomorphism f and the subgroup H defined above depend on thechoice of the point x0 ∈ X. H is called the isotropy subgroup corresponding tox0. A different choice of x0 gives rise to a conjugate subgroup.

3.2 Group Actions to Counting and Sylow’s Theorems

The counting principle and Sylow’s Theorems play a basic role in understanding thestructure of finite groups. We apply the results of G-sets of Sect. 3.1 in counting andprescribe a method for determining the number of distinct orbits in a G-set. Whilestudying finite groups, it is a natural question: does the converse of Lagrange’s The-orem hold for arbitrary finite groups? This means that if a positive integer m di-vides the order of a finite group G, does G have a subgroup of order m? If m isa prime integer, the answer is shown to be positive by Cauchy’s Theorem. But the

Page 160: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.2 Group Actions to Counting and Sylow’s Theorems 143

alternating group A4 of order 12 has no subgroup of order 6 (see Ex. 4 of SE-I ofChap. 2). This example shows that the converse of Lagrange’s Theorem is not truefor arbitrary finite groups. Perhaps the best partial converse (not true for all cases)is the First Sylow Theorem which states that the answer is positive whenever m isa power of a prime integer. The Second and Third Sylow Theorems come as a nat-ural consequence of subgroups of maximal prime power order. In this section webegin with the counting principle and prove Cauchy’s Theorem and Sylow’s Theo-rems.

We first present some interesting group actions to counting.Define Xg = {x ∈ X : gx = x} for each g ∈ G and Gx = {g ∈ G : gx = x} for

each x ∈X, where G is a group and X is a G-set.

Theorem 3.2.1 (Burnside) Let G be a finite group and X a finite G-set. If r is thenumber of orbits of G on X, then

r|G| =∑

g∈G

|Xg|. (3.1)

Proof Consider all ordered pairs (g, x), where gx = x, and let N be the number ofsuch pairs. Now, for each g ∈G, there exist |Xg| ordered pairs having g as the firstcoordinate. Consequently,

N =∑

g∈G

|Xg|. (3.2)

Again for each x ∈X, there exist |Gx | [see Theorem 3.1.2(ii)] ordered pairs (g, x)

having x as the second coordinate. Consequently, N =∑x∈X |Gx |.Then by Theorem 3.1.3, |orb(x)| = [G :Gx]. Since [G :Gx] = |G|/|Gx |, it fol-

lows that |orb(x)| = |G|/|Gx |. So

N =∑

x∈X

|G||orb(x)| = |G|

x∈X

1

|orb(x)| .

Let Ω be any orbit. Then

x∈Ω

1

|orb(x)| = 1,

since 1/|orb(x)| has the same value for all x in the same orbit.Consequently,

N = |G| · (number of orbits of G on X)

= |G| · r ⇒ r|G| =∑

g∈G

|Xg|.�

We now find an equation that counts the number of elements of a finite G-set.

Page 161: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

144 3 Actions of Groups, Topological Groups and Semigroups

Let X be a finite G-set and r the number of orbits of G on X and {x1, x2, . . . , xr}the representative system of the orbits, i.e., the set containing one element from eachorbit of G on X. As every element of X is in exactly one orbit,

|X| =r∑

i=1

∣∣orb(xi)∣∣. (3.3)

Let XG = {x ∈X : gx = x ∀g ∈G} i.e., XG is precisely the union of the one elementorbits of G on X. If |XG| = t , then (3.3) is reduced to

|X| = |XG| +r∑

i=t+1

∣∣orb(xi)∣∣. (3.4)

We shall come back a little later to (3.4) to deduce an important equation known asclass equation. Before that we need another important notion, known as p-groups.

3.2.1 p-Groups and Cauchy’s Theorem

The class equation can be effectively utilized when the order of a finite group is apower of a prime. In the rest of the section p denotes a prime integer.

Definition 3.2.1 (p-groups) A finite group G is said to be a prime power group ora p-group iff the order of every non-identity element in G is a positive power of theprime p. A subgroup H of a group G is a p-subgroup of G iff H is itself a p-group.

Theorem 3.2.2 Let G be a group of order pn for some prime integer p and positiveinteger n. If X a finite G-set, then |X| ≡ |XG| (mod p).

Proof Since |orb(xi)| = [G :Gxi] by Theorem 3.1.3 and [G :Gxi

] divides |G|, so,p divides [G :Gxi

] and thus p divides |orb(xi)| for t + 1 ≤ i ≤ r (in the notationof equation (3.4)). This shows that |X| − |XG| is divisible by p and hence |X| ≡|XG| (mod p). �

We now prove Cauchy’s Theorem which is essentially due to A.L. Cauchy(1789–1857). This theorem and its Corollary 2 show two different situations (otherthan condition of the First Sylow Theorem) under which the converse of Lagrange’sTheorem becomes also true.

Theorem 3.2.3 (Cauchy) Let G be a finite group and a prime p divide |G|. ThenG has an element of order p and consequently a subgroup of order p.

Proof Consider the set X = {(g1, g2, . . . , gp) : gi ∈ G and g1g2 · · ·gp = 1}. Informing an element in X, we may take the elements g1, g2, . . . , gp of G suchthat gp = (g1g2 · · ·gp−1)

−1. Thus |X| = |G|p−1. Now p||G| ⇒ p||X|. Letα be the cycle (123 · · ·p) in Sp . Let α act on X by α · (g1, g2, . . . , gp) =

Page 162: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.2 Group Actions to Counting and Sylow’s Theorems 145

(gα(1), gα(2), . . . , gα(p))= (g2, g3, . . . , gp, g1) ∈X, since g1(g2 · · ·gp)= 1⇒ g1 =(g2g3 · · ·gp)−1 ⇒ (g2g3 · · ·gp)g1 = 1. We consider the subgroup 〈α〉 of Sp toact on X by iteration. Now |〈α〉| = p. Then by using Theorem 3.2.2, |X| ≡|X〈α〉| (mod p). Hence p||X| ⇒ p||X〈α〉| ⇒ there must be at least p elements inX〈α〉 ⇒ ∃ some a ∈G, a �= 1 such that (a, a, . . . , a) ∈X〈α〉 ⇒ ap = 1⇒ order of a

is p⇒〈a〉 is a subgroup of G of order p. �

Corollary 1 Let G be a finite group. Then G is a p-group iff |G| is a power of p.

Proof Let G be a finite group such that |G| = pr . Then for each a ∈G, O(〈a〉)=O(a) and O(a)|pr ⇒O(a) is a power of p for each a ∈G⇒G is a p-group.

Conversely, let G be a p-group. Then no prime t (�=p) divides |G|, otherwise G

would contain an element of order t , a prime number �=p by Theorem 3.2.3 implyinga contradiction, since every element of G has order, a power of p, implying t = p.Consequently, |G| is a power of p. �

We now apply Cauchy’s Theorem to prove a partial converse of Lagrange’s The-orem.

Corollary 2 Let G be a finite abelian group of order n and m be a positive integersuch that m divides n. Then G has a subgroup of order m.

Proof If m = 1, then {1} consisting of the identity element of G is the requiredsubgroup of G. If n = 1, then m = n = 1 and the result is trivial. So we assumethat m > 1, n > 1 and prove the corollary by induction on order n of G. If n = 2,then m = 2 and hence G is the required subgroup. We now assume that the corol-lary is true for all finite abelian groups of order r satisfying 2 ≤ r ≤ n. Let p bea prime such that p divides m. Then there exists an integer s such that m = ps.Hence G has a subgroup H of order p by Cauchy’s theorem. Then G/H is a group,as H is a normal subgroup of the abelian group G. Consequently, 1 ≤ |G/H | =|G|/|H |< |G| and |G/H | = n/p. Again n=mt for some positive integer t . Hence|G/H | =mt/p = st implies that s divides |G/H |. This shows by induction hypoth-esis that the group G/H has a subgroup K/H (say) such that |K/H | = s, whereK is a subgroup of G. This implies that |K| = |K/H ||H | = sp =m. Hence K is asubgroup of G of order m. �

3.2.2 Class Equation and Sylow’s Theorems

We are now in a position to define the class equation of a finite group. Let G be afinite group and X a finite G-set. We now consider the special case of equation (3.4)in which X = G and the action of G on itself is by conjugation, i.e., for g ∈ G,x �→ gxg−1 (cf. Example 3.1.3(iii)). Then XG = {x ∈ G : gxg−1 = x ∀g ∈ G} ={x ∈G : gx = xg ∀g ∈G} = Z(G), the center of G.

Page 163: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

146 3 Actions of Groups, Topological Groups and Semigroups

If m= |Z(G)| and ni is the number elements in the ith orbit of G under conju-gation, i.e., ni = |orb(xi)|, then (3.4) becomes

|G| =m+ nm+1 + · · · + nr . (3.5)

Remark 1 ni divides |G| for m+ 1≤ i ≤ r , since |orb(xi)| = [G :Gxi] is a divisor

of |G|.

Remark 2 Equation (3.5) is called the class equation of G. Each orbit of G underconjugation by G is a conjugate or conjugacy class in G.

The class equation is now effectively applied to study a certain class of finitegroups. Using the class equation, we are going to prove three celebrated theo-rems, essentially due to Norwegian mathematician L.M. Sylow (1832–1918), tounderstand the structure of an arbitrary finite group. There are very few theoremswhich show the existence of subgroups of prescribed order under specific condi-tions. Among them the best partial converse to Lagrange’s Theorem is the FirstSylow Theorem. This is a basic theorem and is largely used. The First Sylow Theo-rem leads to the Second and Third Sylow Theorems under specific conditions. TheFirst Sylow Theorem describes the subgroups of orders which are some powers ofprime integer. The Second Sylow Theorem gives an interesting relation among dif-ferent Sylow p-subgroups of a finite group. The Third Sylow Theorem prescribesthe number of Sylow p-subgroups.

As a first step to prove the Sylow Theorems we now apply group action to deter-mine the number of distinct conjugate classes of a subgroup of a finite group. LetG be a finite group and S the collection of all subgroups of G. We make S into aG-set by the action of G on S by conjugation i.e., if H ∈ S , then g ·H = gHg−1.Consider the normalizer N(H) = {g ∈ G : gHg−1 = H } of H in G. Then N(H)

is a subgroup of G and H is a normal subgroup of N(H) such that N(H) isthe largest subgroup of G having H as a normal subgroup. Clearly, the elementH of S is a fixed point under the above conjugation iff H is normal in G andorb(H) is precisely the set of all subgroups of G which are conjugate to H , i.e.,the conjugate class of H . The isotropy subgroup GH = N(H) ⇒ |G/N(H)| =number of distinct conjugate classes of H in G. Such results are very important inalgebraic topology.

Lemma 3.2.1 Let H be a p-subgroup of a finite group G. Then[N(H) :H ]≡ [G :H ] (mod p).

Proof Let S be the set of all left cosets of H in G and H act on S by left trans-lation: h · (xH)= (hx)H . Then S becomes an H -set and |S| = [G :H ]. ConsiderSH = {xH ∈ S : h(xH)= xH ∀h ∈H }. Thus ∀h ∈H , xH = h(xH)⇔ x−1hx =x−1h(x−1)−1 ∈ H ∀h ∈ H ⇔ x−1 ∈ N(H)⇔ x ∈ N(H)⇒ left cosets in SH arethose contained in N(H). The number of such cosets is [N(H) : H ] and hence|SH | = [N(H) :H ]. Again H is a p-group ⇒H has order a power of p by Corol-

Page 164: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.2 Group Actions to Counting and Sylow’s Theorems 147

lary 1 of Theorem 3.2.3 shows that |S| ≡ |SH | (mod p) by Theorem 3.2.2. Conse-quently, [G :H ] ≡ [N(H) :H ] (mod p) i.e., [N(H) :H ] ≡ [G :H ] (mod p). �

Corollary 3 Let H be a p-subgroup of a finite group G. If p|[G : H ], thenN(H) �=H .

Proof Clearly, p divides [N(H) :H ] by Lemma 3.2.1. So, H �=N(H). �

We are now equipped to prove the First Sylow theorem, which gives the existenceof p-subgroups of G for any prime power dividing |G|.

Theorem 3.2.4 (First Sylow Theorem) Let G be a finite group of order pnm, withm,n≥ 1, p prime and gcd(p,m)= 1. Then G contains a subgroup of order pi foreach i satisfying 1 ≤ i ≤ n and every subgroup H of G of order pi is a normalsubgroup of a subgroup of order pi+1 for 1≤ i < n.

Proof We prove the theorem by induction. p||G| ⇒G contains a subgroup of orderp by Theorem 3.2.3. We assume that H is a subgroup of order pi (1 ≤ i < n).Then p|[G :H ] ⇒ p|[N(H) :H ] by Lemma 3.2.1. Since H is a normal subgroupof N(H), we can form the factor group N(H)/H such that p||N(H)/H |. Againthe factor group N(H)/H has a subgroup of order p by Theorem 3.2.3. Then thisgroup is of the form T/H , where T is a subgroup of N(H) containing H . SinceH is normal in N(H), H is necessarily normal in T . Finally, |T | = |H ||T/H | =pip = pi+1. Thus we prove that the existence of a subgroup H of order pi fori < n implies the existence of a subgroup T , of order pi+1, in which H is normal.Thus the theorem follows by an induction argument. �

Corollary 4 Let G be a finite group and p a prime. If pi ||G|, then G has a sub-group of order pi .

Definition 3.2.2 A p-subgroup P of a finite group G of order pnm, with m,n≥ 1and gcd(p,m) = 1, is said to be a Sylow p-subgroup of G iff P is a maximal p-subgroup of G, i.e., P ⊆H � G with H a p-subgroup of G implies P =H .

Remark If G is a finite group such that |G| = pnm where m,n ≥ 1 andgcd(m,p) = 1, then Theorem 3.2.4 shows that the Sylow p-subgroups of G

are precisely those subgroups of order pn. Moreover, every conjugate of a Sy-low p-subgroup is a Sylow p-subgroup. Its converse is also true by Theo-rem 3.2.5.

Theorem 3.2.5 (Second Sylow Theorem) Let P and H be Sylow p-subgroups ofa finite group G. Then P and H are conjugate subgroups of G.

Proof Let S be the set of all left cosets of P in G and let H act on S by (left) trans-lation, i.e., h(xP ) = hxP ∀h ∈ H . So, S is a left H -set. Then by Theorem 3.2.2,|SH | ≡ |S| (mod p). Since H is a Sylow p-subgroup of G, |S| = [G : H ] is not

Page 165: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

148 3 Actions of Groups, Topological Groups and Semigroups

Table 3.1 The number of groups of order ≤32, up to isomorphisms

|G| 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Numberof groups

1 1 2 1 2 1 5 2 2 1 5 1 2 1 14 1

|G| 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Numberof groups

5 1 5 2 2 1 15 2 2 5 4 1 4 1 51

divisible by p, so |SH | �= 0. Hence ∃xP ∈ SH . Now xP ∈ SH ⇔ h(xP ) = xP

∀h ∈ H ⇔ x−1hxP = P ∀h ∈ H . Hence x−1Hx ⊆ P ⇒ H ⊆ xPx−1. Again P

and H are Sylow p-subgroups of G⇒ |H | = |P | = |xPx−1| ⇒H = xPx−1 ⇒ P

and H are conjugate subgroups of G. �

The following theorem prescribes the number of Sylow p-subgroups of a finitegroup.

Theorem 3.2.6 (Third Sylow Theorem) If G is a finite group and p divides |G|,then the number of Sylow p-subgroups is congruent to 1 modulo p and divides |G|.

Proof Let P be a Sylow p-subgroup of G and S the set of all Sylow p-subgroupsand P act on S by conjugation. Then by Theorem 3.2.2, |S| ≡ |SP | (mod p), whereSP = {Q ∈ S : xQx−1 =Q ∀x ∈ P }. Since P ∈ SP , SP �= ∅. We claim that SP ={P }. Now Q ∈ SP ⇔ xQx−1 =Q ∀x ∈ P ⇒ P ⊆N(Q). Both P and Q are Sylowp-subgroups of G and hence of N(Q). Consequently P and Q are conjugates inN(Q) by Theorem 3.2.5. But since Q is normal in N(Q), it is only conjugate inN(Q). This implies P =Q. Consequently, SP = {P }. Then

|S| ≡ 1 (mod p).

Now let G act on S by conjugation. Then the last part follows. �

Remark We now list all the groups G of order ≤7 up to isomorphisms.

If |G| = 2, then G∼= Z2.If |G| = 3, then G∼= Z3.If |G| = 4, then G∼= Z4 or Z2 ⊕Z2.If |G| = 5, then G∼= Z5.If |G| = 6, then a non-abelian group appears for the first time and G ∼= S3 orZ2 ⊕Z3.If |G| = 7, then G∼= Z7.

Table 3.1 gives the number of groups of order ≤32, up to isomorphisms.

Page 166: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.2 Group Actions to Counting and Sylow’s Theorems 149

3.2.3 Exercises

Exercises-I

1. If G is a group of order pr , r > 1, show that G has a normal subgroup of orderpr−1.

2. Suppose G is a group and H is a subgroup of the center Z(G). Show that G isabelian if G/H is cyclic.

3. Show that for a prime number p, every group of order p2 is abelian.[Hint. Let G be a group of order p2 and Z(G) its center. Then Z(G) �= {1}.

If Z(G) = G, then G is abelian. Suppose Z(G) �= G, then |G/Z(G)| = p⇒G/Z(G) is cyclic⇒G is abelian by Exercise 2.]

4. Show that a non-abelian group G of order p3 has a center of order p (p isprime).

[Hint. Z(G) �= {1}. Also Z(G) �=G, since G is non-abelian. |Z(G)| = p2 ⇒|G/Z(G)| = p⇒G/Z(G) is cyclic ⇒G is abelian (by Exercise 2) ⇒ a con-tradiction⇒ |Z(G)| = p.]

5. If P is a p-Sylow subgroup of a finite group G and x ∈G, show that xPx−1 isalso a p-Sylow subgroup of G.

[Hint. Suppose |G| = pmn, where p is prime such that p|n and if P is ap-Sylow subgroup of G, then |P | = pm. For x ∈ G, xPx−1 is a subgroupof G. Define a mapping f : P → xPx−1, y �→ xyx−1 ∀y ∈ P . Show that f isbijective. Then |P | = pm = |xPx−1| ⇒ xPx−1 is a p-Sylow subgroup of G.]

6. If a finite group G has only one p-Sylow subgroup P , show that P is normalin G. Its converse is also true.

[Hint. Using Exercise 5, xPx−1 is a p-Sylow subgroup ∀x ∈G⇒ xPx−1 =P (by hypothesis)⇒ P is normal in G.]

7. Show that a group G of order 30 is not a simple group.[Hint. |G| = 30 = 5 · 3 · 2. Prove that G has either a normal subgroup of

order 5 or a normal subgroup of order 3. Hence G is not a simple group.]8. Examine whether a group G of order 56 is simple or not.

[Hint. Show that G has at least one non-trivial normal subgroup. So, G isnot simple.]

9. Show that a group G of order 108 is not simple.[Hint. Prove that G has a non-trivial normal subgroup of order 9.]

10. Let G be a group of order pq , where p and q are prime numbers such thatp > q and q|(p− 1). Show that G is cyclic.

[Hint. |G| = pq . Let np be the number of Sylow p-subgroups of G. Thennp|pq and np = pr + 1, (r = 0,1,2, . . .)⇒ pq = snp = s(pr + 1) for somepositive integer s⇒ s = pq− spr = p(q− sr)= pt (say), where t = q− sr <

p as q < p.Hence pq = s(pr + 1) = pt(pr + 1)⇒ q = t (pr + 1)⇒ r = 0 (as q <

p) ⇒ np = 1 ⇒ G contains only one Sylow p-subgroup H (say) such that|H | = p ⇒ H is normal in G. Again let nq be the number of Sylow q-subgroups of G. Then nq |pq and nq = qr ′ + 1, (r ′ = 0,1,2, . . .) ⇒ pq =

Page 167: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

150 3 Actions of Groups, Topological Groups and Semigroups

s′nq = s′(qr ′ + 1) for some positive integer s′ ⇒ s′ = q(p − s′r ′) = qt ′(say), where t ′ = p − s′r ′. Hence pq = qt ′(qr ′ + 1)⇒ p = t ′(qr ′ + 1). Sinceq|(p − 1), p = t ′(qr ′ + 1)⇒ r ′ = 0⇒ nq = 1⇒G contains only one Sylowq-subgroup K (say) such that |K| = q ⇒ K is normal in G. Now proceed toshow that G is cyclic.]

11. Let G be a group containing an element of finite order n(> 1) and exactly twoconjugate classes. Show that |G| = 2.

12. Show that any group G of order 35 is cyclic.13. If the order of a group G is 42, prove that G contains a unique Sylow 7-

subgroup which is normal.14. Show that the center Z(G) of a non-trivial finite p-group G contains more than

one element.15. Prove that there exists no simple group of order 48.16. Prove that any group of order 15 is cyclic.17. Prove that a group of order 65 is cyclic.18. Prove that no group of order 65 is simple.19. If a non-trivial finite group G has no non-trivial subgroups, then prove that G

is a group of prime order.20. Let G be a finite group. If G has exactly one non-trivial subgroup, then prove

that the order of G is p2 for some prime p.21. Prove that every group G of order 45 has a unique Sylow 3-group of order 9,

which is normal.22. Let G be a group of order pn (p is prime and n > 1). Then prove that G is not

a simple group.23. Let G be a group of order pq , where p and q are prime numbers. Then prove

that G is not a simple group.24. Prove that any group of order 2p (p is a prime) has a normal subgroup of

order p.25. Identify the correct alternative(s) (there may be more than one) from the fol-

lowing list:

• Let p be a prime number and GL50(Fp) be the group of invertible 50× 50matrices with entries from the finite field Fp . Then the order of a p-Sylowsubgroup of the group GL50(Fp) is:

(a) p50 (b) p1250 (c) p125 (d) p1225.

• If G is the group given by G= Z10 ×Z15, then

(a) G contains exactly one element of order 2;(b) G contains exactly 24 elements of order 5;(c) G contains exactly five elements of order 3;(d) G contains exactly 24 elements of order 10.

• If G is the group given by S4 × S3, then

(a) G has a normal subgroup of order 72;(b) a 3-Sylow subgroup of G is normal;

Page 168: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.3 Actions of Topological Groups and Lie Groups 151

(c) a 2-Sylow subgroup of G is normal;(d) G has a non-trivial normal subgroup.

• Which of the following statement(s) is (are) valid?

(a) Any group of order 15 is abelian;(b) Any group of order 25 is abelian;(c) Any group of order 65 is abelian;(d) Any group of order 55 is abelian.

3.3 Actions of Topological Groups and Lie Groups

The actions of topological groups and Lie groups are very important in topologyand geometry. Many well known geometrical objects are obtained as orbit spaces.

Definition 3.3.1 A topological group G is said to act on a topological space X fromthe left iff there is a continuous function σ :G×X→X, denoted (g, x) �→ g ·x (orgx), ∀x ∈X, ∀g ∈G such that

(i) for any x ∈X, 1 · x = x, where 1 is the identity element of G;(ii) for any x ∈X, g1, g2 ∈G, (g1g2) · x = g1 · (g2 · x).

σ is said to be a topological action (or just an action) of G on X from the left.

The ordered triple (X,G,σ) is called a topological transformation group and X

is said to be a G-space. A right action of G on X is defined in a similar way. Thereis a bijective correspondence between the left and right G-space structures.

Example 3.3.1 (i) The space Rn is a left GL(n,R) space under the usual multipli-cation of matrices.

(ii) The space Rn is also a left O(n)-space [see Example 2.9.1 of Chap. 2].

Definition 3.3.2 Let X be a left G-space and X mod G be the set of all orbits Gx,∀x ∈X, with the quotient topology, i.e., the largest topology such that the projectionmap p : X→ X mod G, x �→Gx is continuous. The space X mod G is called theorbit space of the action σ of the transformation group (X,G,σ) and p is alsocalled an identification map. In particular, if X is a Hausdorff space and G is a finitetopological group acting on X in such a way that g · x = 1, for some x ∈X impliesg = 1, then the action is said to be free.

Some Important Examples

Example 3.3.2 (Real projective space) Let Sn = {x ∈ Rn+1 : ‖x‖ = 1} be then-sphere in Rn+1, for n≥ 1 and A : Sn→ Sn, x �→ −x be the antipodal map. ThenA2 = A ◦ A = I (identity map). The group G = {A,I } is a group of homeomor-phisms on Sn and acts on Sn. The orbit space Sn mod G is called the real projectiven-space, denoted RP n. This action is free.

Page 169: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

152 3 Actions of Groups, Topological Groups and Semigroups

Example 3.3.3 (Complex projective space) Let the circle group S1 act on S2n+1 ={(z0, z1, . . . , zn) ∈Cn+1 :∑n

i=0 |zi |2 = 1} continuously under the action

z · (z0, z1, . . . , zn) �→ (zz0, zz1, . . . , zzn).

The orbit space S2n+1 mod S1 is called the complex projective n-space, denotedCP n. This action is free.

Example 3.3.4 (Torus) Let f : R→ R, x �→ x + 1. Then f is a homeomorphismand for each integer n, f n : R→ R is also a homeomorphism. The infinite cyclicgroup Z= 〈f 〉 endowed with the discrete topology acts on a group of homeomor-phisms on R. This action is free and the orbit space R mod Z is homeomorphic tothe circle group S1. Again consider the action of the discrete group Z×Z on R×Rby setting (f, g)(x, y)= (x + 1, y + 1). Then (f m,gn)(x, y)= (x +m,y + n) forevery pair of integers (m,n). This action is free and the orbit space is T = S1 × S1,which is called a 2-torus (or simply torus). An n-torus is defined similarly as anorbit space of Rn, ∀n≥ 2.

Definition 3.3.3 A real Lie group G is said to act on a differentiable manifold M

from the left iff there is a C∞ function σ : G ×M →M , (g, x) �→ g · x (or gx)∀x ∈M and ∀g ∈G such that

(i) for any x ∈M , 1 · x = x, where 1 is the identity element of G;(ii) for any x ∈M , g1, g2 ∈G, (g1g2) · x = g1 · (g2 · x).

Definition 3.3.4 A complex Lie group G is said to act on a complex manifold M

from the left iff there is a holomorphic function σ :G×M →M , (g, x) �→ gx (orgx), ∀x ∈M and ∀g ∈G such that

(i) for any x ∈M , 1 · x = x, where 1 is the identity element of G;(ii) for any x ∈M , g1g2 ∈G, (g1g2) · x = g1 · (g2 · x).

Right actions of G on M are defined dually.

Definition 3.3.5 If a Lie group G acts on manifolds, then G-manifolds (homoge-neous), G-homomorphisms, G-isomorphisms, G-automorphisms etc. are defined inusual ways.

3.3.1 Exercises

Exercises-II

1. Let X be a homogeneous left G-set. Prove the following:

(a) If σ : X→ X is an automorphism of X, then the points x and σ(x) havethe same isotropy subgroup;

(b) if x and y ∈X have the same isotropy subgroup, then there exists an auto-morphism σ of X such that σ(x)= y;

Page 170: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.3 Actions of Topological Groups and Lie Groups 153

(c) if σ and ρ are automorphisms of X such that for some x ∈X, σ(x)= ρ(x),then σ = ρ;

(d) a group A of automorphisms of X is the entire group of automorphisms ifffor any two points x, y ∈X which have the same isotropy subgroup, thereexists an automorphism σ ∈A such that σ(x)= y.

2. Let X be a homogeneous left G-set and H the isotropy subgroup of G corre-sponding to the point x0 ∈X. Prove that A(X), the group of automorphisms ofX is isomorphic to N(H)/H , where N(H) is the normalizer of H .

3. A topological group G is a set G with a group structure and topologyon G such that the function G × G → G, (s, t) �→ st−1 is continuous.Show that this condition of continuity is equivalent to the statement that thefunctions G × G → G, (s, t) �→ st and G → G, s �→ s−1 are both con-tinuous, i.e., the group operations in G are continuous in the topologicalspace G.

For a topological group G, a left G-space is a topological space X togetherwith a map G× X→ X (The image of (s, x) ∈ G× X under the map is sx)such that

(a) for each x ∈X, s, t ∈G, (st)x = s(tx);(b) for each x ∈X, the relation 1x = x holds.

Similarly, a right G-space is defined.Show that there is a bijective correspondence between the left and right G-

space structures.4. Two elements x, y ∈ X in a left G-space are called G-equivalent iff ∃s ∈

G such that sx = y. Show that this relation is an equivalence relation.Suppose Gx = {all sx : s ∈ G}, the equivalence class determined by x ∈X and X mod G = {all Gx : x ∈ X}, with the quotient topology, i.e., thelargest topology such that the projection p : X → X mod G is continu-ous.

Prove that the map X→X (X is a G-space), x �→ xs is a homeomorphismand the projection p : X → X mod G is an open map (see Simmons (1963,p. 93)).

5. Let X be a G-space and X mod G be the orbit space. Show that the projectionmap p :X→X mod G is an open map.

[Hint. Let V be an open subset of X. Then p−1p(V )=⋃g∈G gV is an openset, as it is a union of open sets gV . Hence p(V ) is open in X mod G for eachopen set V of X.]

6. Let a compact topological group G act on a space X and X mod G be its orbitspace. Show that

(a) if X is Hausdorff, then X mod G is also so;(b) if X is regular, then X mod G is also so;(c) if X is normal, then X mod G is also so;(d) if X is locally compact, then X mod G is also so.

Page 171: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

154 3 Actions of Groups, Topological Groups and Semigroups

7. Let X be a G-space, where G is a compact topological group and X is a Haus-dorff space and Gx be its isotropy group at x. Show that the continuous mapf :G/Gx → orb(x), gGx �→ gx is a homeomorphism.

Hence show that the spaces U(n)/U(n− 1) and S2n−1 are homeomorphic,where U(n) is the unitary group.

[Hint. Use Lemma 3.1.1 to show that f is a bijection, which is a homeomor-phism in this case. The isotropy group at (0,0, . . . ,0,1) is U(n− 1).]

8. Show that the map f : GL(n,R) × Rn → Rn, defined by (A,X) �→ AX, theproduct of the n× n matrix A ∈GL(n,R) and n× 1 column matrix X ∈Rn isan action of GL(n,R) on Rn.

Hence show that the action of the group O(n) of all orthogonal real matricesis transitive on Sn−1 and the spaces O(n)/O(n− 1) and Sn−1 are homeomor-phic.

9. (Irrational flow). Let α be a fixed irrational number, T = S1 × S1 be the torusand R be the additive group of reals. Define an action σ :R× T → T ,

r · (e2πix, e2πiy) �→ (e2πi(x+r), e2πi(y+αr)

).

Show that σ is a free action.10. Let X be a G-space. Show that for each g ∈G, the map φg :X→X, x �→ gx

is a homeomorphism and the map ψ : G→ Homeo(X), g �→ φg is a grouphomomorphism.

[Hint. φg is a bijection by Theorem 3.1.1. Since the action is continuous, itfollows that φg is a homeomorphism.]

11. If a real Lie group G acts on a differentiable manifold M , show that for eachg ∈G, the function φg :M →M , x �→ gx is a diffeomorphism.

12. Let G be a Lie group and M be a homogeneous G-manifold. Show that

(a) M is G-isomorphic to the G-manifold G/H for some closed Lie subgroupH of G;

(b) if ψ :M →M is a G-automorphism, then x and ψ(x) determine the sameclosed Lie subgroup of G.

13. Let G be a topological group and X a topological space. Suppose the group G

acts on the set X. If this action G×X→X is continuous, then G is said to acton X.

Prove the following:Let G be a topological group acting on a topological space X. Then

(i) H = {h ∈G : hx = x ∀x ∈X} is a closed normal subgroup of G.(ii) If G is compact, H is Hausdorff and Gx is the isotropy group of x, the

continuous map f : G/Gx → Gx defined by f (gGx) = gx is a homeo-morphism.

[Hint. Use Lemma 3.1.1 to show that f is a bijection. Then use the re-sult that if X is compact and Y is Hausdorff and f :X→ Y is continuousand bijective. Hence f is a homeomorphism.]

Page 172: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.4 Actions of Semigroups and State Machines 155

3.4 Actions of Semigroups and State Machines

Actions of semigroups are important both in mathematics and computer science.The theory of machines developed so far has largely influenced the development ofcomputer science and its associated language. In this section we discuss semigroupactions and their applications to the theory of state machines to unify computerscience with the mainstream mathematics.

Definition 3.4.1 A semigroup S is said to act on a non-empty set X from the left iffthere is a function σ : S ×X→X, denoted by (a, x) �→ ax (or a · x) such that

(i) for any x ∈X, a, b ∈ S, (ab)x = a(bx);(ii) if identity 1 ∈ S, then for any x ∈X, 1x = x.

σ is said to be an action of S on X from the left.

Similarly, a right action of S on X is defined.There is a feeling that much of abstract algebra is of little practical use. However,

we apply semigroups to the theory of machines and establish some relations betweena state machine homomorphism and a homomorphism of the corresponding trans-formation semigroups. In this section we describe algebraic aspect of finite statemachines. We now proceed to unify finite state machines with semigroup actions.So we need the concept of transformation semigroups, which involves an action ofa semigroup on a finite set and another condition on the semigroup action as givenbelow.

Definition 3.4.2 A transformation semigroup is a pair (Q,S) consisting of a finiteset Q, a finite semigroup S and a semigroup action λ :Q × S →Q, (q, s) �→ qs

which means

(i) q(st)= (qs)t , ∀q ∈Q, ∀s, t ∈ S; and such that(ii) qs = qt ∀q ∈Q⇒ s = t , s, t ∈ S.

Definition 3.4.3 If X and Y are non-empty sets and R : X→ Y is a relation suchthat (x, y) ∈R and (x, z) ∈R⇒ y = z, where x ∈X and y, z ∈ Y , then R is called apartial function. A partial function R :X→ Y is said to be a function iff dom(R)={x ∈X : (x, y) ∈R for some y ∈ Y } =X.

Definition 3.4.4 A state machine or a semiautomation is an ordered triple μ =(Q,Σ,F), where Q and Σ are finite sets and F :Q×Σ →Q is a partial function.

Definition 3.4.5 A state machine μ = (Q,Σ,F) is said to complete iff F : Q ×Σ →Q is a function.

Such systems can be successfully investigated by using the algebraic techniques,an important achievement of modern algebra.

Page 173: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

156 3 Actions of Groups, Topological Groups and Semigroups

Example 3.4.1 (Cyclic state machine) Let m,n be positive integers and Q ={0,1,2, . . . ,m+ n− 1}, then the diagram of a cyclic state machine is given below:

n+ 1σ

. . .

2 · · ·σ

n− 1σ

n

σ

n+m− 1

σ

. . .σ

where F(0, σ )= 1, F(1, σ )= 2, . . . , F(n−1, σ )= n, F(n,σ )= n+1, . . . , F(n+m− 2, σ )= n+m− 1 and F(n+m− 1, σ )= n.

We now associate a semigroup with a state machine.Let μ= {Q,Σ,F } be a state machine with a symbol σ ∈Σ when it is in some

state q (say) ∈ Q. The machine then moves to the state F(q,σ ) ∈ Q. We mayequally define Fσ :Q→Q by Fσ (q)= F(q,σ ), ∀q ∈Q.

Let μ= (Q,Σ,F) be a state machine. Consider the set Σ+ of all words of length≥1 in the alphabet Σ . Define an equivalence relation ρ on Σ+ by αρβ⇔ Fα = Fβ .An equivalence relation ρ on a semigroup S is said to be a congruence relation onS iff (a, b) ∈ ρ⇒ (ca, cb) ∈ ρ and (ac, bc) ∈ ρ ∀c ∈ S.

Proposition 3.4.1 Σ+/ρ is a semigroup.

Proof Σ+ admits a semigroup structure by concatenation of words. Moreover, ρ isa congruence relation on Σ+ and hence Σ+/ρ, the set of all congruence classes (a)

becomes a semigroup under the binary operation given by

(a)(b)= (ab). �

Definition 3.4.6 The quotient semigroup Σ+/ρ is called the semigroup of the statemachine μ and is denoted by S(μ).

Let μ= (Q,Σ,F) be a state machine and PF(Q) be the semigroup of all partialfunctions from Q to Q, under the usual composition of relations on Q.

Each σ ∈ Σ defines a partial function Fσ :Q→Q⇒ ∃ a natural function F :Σ → PF(Q), σ �→ Fσ . Let 〈F(μ)〉 denote the subsemigroup of PF(Q) generatedby the set of partial functions {Fσ : σ ∈Σ}.

Corresponding to a state machine μ= (Q,Σ,F), there is a transformation semi-group (Q,S(μ)), denoted by TS(μ), called the transformation semigroup of μ. Con-versely, each transformation semigroup determines a state machine. Suppose T =(Q,S) is a transformation semigroup. We define a state machine μ = (Q,S,F ),

Page 174: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

3.5 Additional Reading 157

where F :Q× S→Q is defined by F(q, s)= qs, ∀q ∈Q and ∀s ∈ S. μ is calledthe state machine of T , denoted by SM(T ).

Definition 3.4.7 Let μ = (Q,Σ,F) and μ′ = (Q′,Σ ′,F ′) be state machines.A pair of maps (α,β) : μ→ μ′ is said to be a state machine homomorphism iffα :Q→Q′ and β :Σ →Σ ′ is a pair of maps such that α◦Fσ = F ′β(σ ) ◦α, ∀σ ∈Σ ,where Fσ :Q→Q is defined by Fσ (q)= F(q,σ ), ∀q ∈Q.

Definition 3.4.8 Let μ = (Q,Σ,F) and μ′ = (Q′,Σ ′,F ′) be state machines.A state machine homomorphism (α,β) : μ→ μ′ is said to be

(i) a monomorphism iff α and β are both injective;(ii) an epimorphism iff α and β are both surjective;

(iii) an isomorphism iff (α,β) is both a monomorphism and an epimorphism (writ-ten μ∼= μ′).

3.4.1 Exercises

Exercises-III

1. Let μ = (Q,Σ,F) be a state machine. Show that 〈F(μ)〉 ∼= S(μ), where S(μ)

is the semigroup of the state machine μ.2. Let (Q,S) be a transformation semigroup. Show that there is a natural em-

bedding θ : S → PF(Q) and conversely, given any set Q and a subsemigroupS ⊆ PF(Q), (Q,S) is a transformation semigroup.

[Hint. Define θs : Q→ Q, q �→ qs for each q ∈ Q and each s ∈ S. Thenθ : S→ PF(Q), s �→ θs is a semigroup monomorphism.]

3. Let μ = (Q,Σ,F) be a state machine. Show that there exists a state machinemonomorphism (α,β) : μ → SM(TS(μ)), where SM(TS(μ)) is the state ma-chine of the transformation semigroup TS(μ) of μ.

4. Let μ = (Q,Σ,F) and μ′ = (Q′,Σ ′,F ′) be complete state machines and(α,β) : μ→ μ′ a state machine homomorphism such that α is onto. Show that ∃a transformation semigroup homomorphism (fα, gβ) : TS(μ)→ TS(μ′).

5. Let A= (Q,S) be a transformation semigroup. Show that TS(SM(A))∼=A.[Hint. Suppose SM(A) = (Q,S,F ) is the state machine of A and B is the

semigroup generated by SM(A). Then the map θ : S→ B , s �→ θs (see Ex. 2) isa semigroup isomorphism. Hence the pair (IQ, θ) :A→ TS(SM(A)) is a trans-formation semigroup isomorphism.]

3.5 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Artin 1991; Bredon1993; Fraleigh 1982; Ginsburg 1968; Herstein 1964; Holcombe 1982; Hungerford

Page 175: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

158 3 Actions of Groups, Topological Groups and Semigroups

1974; Jacobson 1974, 1980; Lang 1965; Rotman 1988; Spanier 1966; van der Waer-den 1970) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Bredon, G.E.: Topology and Geometry. Springer, New York (1993)Fraleigh, J.B.: A First Course in Abstract Algebra. Addison-Wesley, Reading (1982)Ginsburg, A.: Algebraic Theory of Automata. Academic Press, New York (1968)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Holcombe, W.: Algebraic Automata Theory. Cambridge University Press, New York (1982)Hungerford, T.W.: Algebra. Springer, New York (1974)Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)Rotman, J.J.: An Introduction to Algebraic Topology. Springer, New York (1988)Simmons, G.F.: Topology and Modern Analysis. McGraw-Hill, New York (1963)Spanier, E.H.: Algebraic Topology. McGraw-Hill, New York (1966)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)

Page 176: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 4Rings: Introductory Concepts

In the earlier chapters we have studied groups and their applications. Another fun-damental concept in the study of modern algebra is that of a ring. Rings also serveas one of the fundamental building blocks for modern algebra. A group is endowedwith only one binary operation but a ring is endowed with two binary operationsconnected by distributive laws. Fields form a very important class of rings. Un-der usual addition and multiplication, the set of integers Z is the prototype ofthe ring structure and the sets Q, R, C (of rational numbers, real numbers, com-plex numbers) are the prototypes of the field structures. The concept of rings arosethrough the attempts to prove Fermat’s Last Theorem and was initiated by RichardDedekind (1831–1916) around 1880. David Hilbert (1862–1943) coined the term‘ring’. Emmy Noether (1882–1935) developed the theory of rings under his guid-ance. Commutative rings play an important role in algebraic number theory andalgebraic geometry, and non-commutative rings are used in non-commutative ge-ometry and quantum groups. This chapter starts with introductory concepts of ringsand their properties with illustrative examples. Some important rings such as ringsof power series, rings of polynomials, Boolean rings, rings of continuous functions,rings of endomorphisms of abelian groups are also studied in this chapter. Furtherstudy of theory of rings is given in Chaps. 5–7.

4.1 Introductory Concepts

The abstract concept of a ring has its origin in the set of integers Z. The basic dif-ference between a group and a ring is that a group is of one-operational algebraicsystem and a ring is of two-operational algebraic system. Despite this basic differ-ence, while studying ring theory, many techniques already used for groups are alsoapplied for rings. For example, we obtain in ring theory the appropriate analoguesof group homomorphisms, normal subgroups, quotient groups, homomorphism the-orems, etc. Integral domains and fields are special classes of rings.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_4, © Springer India 2014

159

Page 177: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

160 4 Rings: Introductory Concepts

Definition 4.1.1 A ring is an ordered triple (R,+, ·) consisting of a non-emptyset R and two binary operations ‘+’ (called addition) and ‘·’ (called multiplication)such that

(i) (R,+) is an abelian group;(ii) (R, ·) is semigroup, i.e., (a · b) · c= a · (b · c) for all a, b, c ∈R; and

(iii) the operation ‘·’ is distributive (on both sides) over the operation ‘+’, i.e.,a · (b + c) = a · b + a · c and (b + c) · a = b · a + c · a for all a, b, c ∈ R

(distributive laws).

We adopt the usual convention of designating a ring (R,+, ·) simply by the setsymbol R and assume that ‘+’ and ‘·’ are known. If in addition, the operation ‘·’is commutative i.e., a · b = b · a ∀a, b ∈ R, R is said to be a commutative ring.Otherwise, R is said to be non-commutative. If there exists an element 1 ∈ R suchthat 1 · a = a · 1= a, ∀a ∈ R, 1 is said to be an identity element of R. The identityelement is then unique.

Remark A ring R may or may not contain identity element. If there exists an ele-ment l(r) ∈ R such that l · a = a (a · r = a) for all a ∈ R, then l (r) is called a left(right) identity element of R. It may happen that a R may have a left (right) identitybut no right (left) identity. But if both of them exist, then they are equal and we saythat the identity element exists in R. On the other hand, if R contains more than oneleft (right) identity element, then R cannot contain the identity element.

As (R,+) is an abelian group, R has a zero element denoted by 0, and everya ∈ R has a unique (additive) inverse, −a. Following usual convention, we canwrite ab in place of a · b and a − b in place of a + (−b).

Theorem 4.1.1 If R is a ring, then for any a, b, c ∈R,

(i) 0a = a0= 0;(ii) a(−b)= (−a)b=−(ab);

(iii) (−a)(−b)= ab;(iv) a(b− c)= ab− ac, (b− c)a = ba − ca.

Proof (i) From 0= 0+ 0, it follows that 0a = (0+ 0)a = 0a+ 0a⇒ 0a = 0 by thecancellation law for the additive group (R,+). Similarly, it follows that a0= 0.

(ii) a(−b)+ ab = a(−b + b) = a0 = 0⇒ a(−b) = −(ab) and (−a)b + ab =(−a + a)b= 0b= 0⇒ (−a)b=−(ab).

(iii) (−a)(−b)=−(a(−b)) by (ii). Now a(−b)+ ab= a(−b+ b)= a0= 0⇒−(a(−b))= ab. Consequently, (−a)(−b)= ab.

(iv) follows form (ii). �

For each positive integer n, we define the nth natural multiple na recursively asfollows: 1a = a and na = (n− 1)a + a when n > 1. If it is agreed to let (−na)=−(na), then the definition of na can be extended to all integers.

Page 178: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.1 Introductory Concepts 161

Theorem 4.1.2 If R is a ring, then for any a, b ∈R and m,n ∈ Z,

(i) (m+ n)a =ma + na;(ii) (mn)a =m(na);

(iii) m(a + b)=ma +mb;(iv) m(ab)= (ma)b= a(mb), and (ma)(nb)= (mn)(ab).

Proof Trivial. �

We do not exclude the possibility: a ring R has an identity 1= 0. If so, then forany a ∈ R, a = a1 = a0 = 0⇒ R has only one element 0. This ring is called thezero ring, denoted by {0}. So we assume that any ring with identity contains morethan one element and this will exclude the possibility that 1= 0.

Example 4.1.1 (i) The triples (Z,+, ·), (Q,+, ·), (R,+, ·) and (C,+, ·) are allcommutative rings, where ‘+’ is the usual addition and ‘·’ is the usual multipli-cation, with the integer 1 as the multiplicative identity element. On the other handthe ring 2Z of even integers has no multiplicative identity.

(ii) Given a ring R, let M2(R) denote the set of all 2× 2 matrices over R. Then(M2(R),+, ·) is a non-commutative ring under usual compositions of matrices in-duced by those of R. The matrix ring Mn(R) is defined analogously.

(iii) Given a non-empty set X, let P(X) denote the power set of X. Then(P(X),+, ·) is a commutative ring, where A + B = A�B = (A \ B) ∪ (B \ A)

and A · B = A ∩ B for ∀A,B ∈ P(X). Clearly, ∅ is the zero element and X isthe identity element. This ring was introduced by George Boole (1815–1864) as aformal notation for assertions in logic (see Ex. 4 of Exercises-I).

Remark Neither (P(X),∪,∩) nor (P(X),∩,∪) forms a ring.(iv) (Zn,+, ·) (n > 1) is a commutative ring under usual addition and multipli-

cation of classes. Clearly, (0) is its zero element and (1) is its identity element.(v) Let X be a non-empty set, (R,+, ·) a ring and M the set of all mappings

from X into R. In M define the pointwise sum and product denoted by f + g andf · g, respectively, of two mappings f,g ∈M by (f + g)(x) = f (x) + g(x) and(f ·g)(x)= f (x) ·g(x) ∀x ∈X. Then (M,+, ·) is a ring having the zero element ofthe ring the constant map c defined by c(x)= 0 for all x ∈X and the additive inverse−f of f is characterized by the rule (−f )(x) = −f (x), for all x ∈ X. Moreover,if R has a multiplicative identity 1, M has an identity given by the constant map1(x)= 1 ∀x ∈X.

(vi) If R is a ring, then the opposite ring of R, denoted Rop, is the ring that hasthe same set of elements as R, the same addition as R, and multiplication ‘◦’ isgiven by a ◦ b= ba, where ba is the usual multiplication in R.

Definition 4.1.2 A non-zero element a in a ring R is said to be a left (right) zerodivisor iff ∃ a non-zero element b ∈ R such that ab = 0 (ba = 0). A zero divisor isan element of R which is both a left and a right zero divisor i.e., a zero divisor is anelement a which divides 0.

Page 179: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

162 4 Rings: Introductory Concepts

Example 4.1.2 (i) In the non-commutative ring M2(Z),(

2 00 0

)(0 00 3

)=(

0 00 0

)=(

0 00 3

)(2 00 0

)

shows that( 0 0

0 3

)is a zero divisor of

( 2 00 0

).

Remark The ring M2(Z) is an example of a ring having infinitely many zero divi-sors.

(ii) Zn is a commutative ring with zero divisors for every composite integern > 1; i.e., if n= rs in Z (1 < r, s < n), then (r)(s)= (0) in Zn.

The existence (or absence) of a zero divisor in a ring can be characterized withthe help of the cancellation laws for multiplication in the ring.

Theorem 4.1.3 A ring R has no zero divisors iff it satisfies the cancellation lawsfor multiplication in R; i.e., for a, b ∈R, ab= ac and ba = ca, where a �= 0, implyb= c.

Proof Suppose R has no zero divisors. Let ab = ac, a �= 0. Then a(b − c)= 0⇒b− c= 0⇒ b= c. Thus ab= ac⇒ b= c. Similarly, ba = ca⇒ b= c.

Conversely, let R satisfy the cancellation laws for multiplication. Suppose ab =0, a �= 0. Then ab = a0⇒ b = 0 by cancellation law. Similarly, ab = 0, b �= 0⇒a = 0. Consequently, R has no zero divisors. �

Remark According to Definition 4.1.2, 0 is not a zero divisor.If R contains 1, then 1 is not a zero divisor and even any element of R having a

multiplicative inverse is not a zero divisor.

Definition 4.1.3 A commutative ring with 1 which has no zero divisors is called anintegral domain.

Note The ring of integers Z is an example of an integral domain, hence the nameintegral domain has been chosen.

Theorem 4.1.4 A commutative ring R with 1 is an integral domain iff the cancella-tion law:

If a �= 0, then ab= ac⇒ b= c holds ∀a, b, c ∈R.

Proof It follows from Theorem 4.1.3 and Definition 4.1.3. �

Proposition 4.1.1 (Zn,+, ·) (n > 1) is an integral domain iff n is a prime integer.

Proof Clearly, Zn is a commutative ring with (0) as its zero element and (1) as itsidentity element. Let n be a prime integer, (a) and (b) be two non-zero elements

Page 180: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.1 Introductory Concepts 163

of Zn. We claim that (a)(b) �= (0). If (a) �= (0), then n cannot divide a, i.e., n|a.Similarly, (b) �= (0)⇒ n|b. Thus (a)(b)= (0)⇒ (ab)= (0)⇒ n|ab⇒ either n|aor n|b ⇒ a contradiction. Consequently, (a)(b) �= (0). This shows that Zn is anintegral domain.

Conversely, let Zn be an integral domain. Suppose n is not a prime integer. Thenthere exist integers p, q such that n = pq , 1 < p < n and 1 < q < n. So, (n) =(pq) = (p)(q) = (0)⇒ either (p) = (0) or (q) = (0), which is a contradiction.Hence n must be prime. �

Definition 4.1.4 Let R be a ring with identity 1. An element a ∈ R is said to left(right) invertible iff there exists an element b ∈R (c ∈R) such that ba = 1 (ac= 1)

and a is said to be a unit or an invertible element iff there exists an element b ∈ R

such that ab = ba = 1. The element b is then uniquely determined by a, and iswritten a−1.

Thus a unit in R is an element a which divides 1. Clearly, the units in R form a(multiplicative) group denoted by U(R).

The integral domain Q and the integral domain R enjoy an algebraic advantageover the integral domain Z: every equation ax = b (a is not zero) has a uniquesolution in them. Integral domains with this property are called fields.

Definition 4.1.5 A ring R with 1 is called a division ring or a skew field iff everynon-zero element of R is invertible.

Thus a ring R with 1 is a division ring iff its non-zero elements form a (multi-plicative) group.

Proposition 4.1.2 A division ring does not contain any zero divisor.

Proof Let R be a division ring and ab = 0, a �= 0. Then a−1 ∈ R and b = 1b =(a−1a)b= a−1(ab)= a−10= 0. This shows that R does not contain any zero divi-sor. �

Theorem 4.1.5 A ring R with 1 is a division ring iff each of the equations: ax = b

and ya = b, has a unique solution in R, where a, b ∈R, and a �= 0.

Proof Let R be a division ring. If b = 0, then x = 0 and y = 0 are solutions of thegiven equations. Since R has no zero divisor, each of the solutions is unique. Next,let b �= 0. As the non-null elements of R form a multiplicative group, the given twoequations have unique solutions by Proposition 2.3.1(v).

Conversely, let R be a ring with 1, satisfying the given conditions. Supposea, b ∈R, where ab= 0, and a �= 0. Since the equation ax = 0 has a solution x = 0,and the solution is unique, it follows that b = 0. Thus the product of two non-nullelements of R is non-null. Hence (R \ {0}, ·) is a multiplicative semigroup, which isa group by using Proposition 2.3.3. Consequently, R is a division ring. �

Page 181: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

164 4 Rings: Introductory Concepts

Example 4.1.3 (i) Quaternion rings. The quaternions of Hamilton essentially dueto Sir Wiliam R. Hamilton (1805–1865) constitute a 4-dimensional vector spaceover the field of real numbers with its basis {1, i, j, k} consisting of four vectors(see Chap. 8). Quaternion ring, discovered by Hamilton in 1843 is an importantexample of a division ring.

To introduce this ring, let H be the set consisting of all ordered 4-tuples of realnumbers, i.e.,

H = {(a, b, c, d) : a, b, c, d ∈R}.

In H we define + and · by the rules:

(a, b, c, d)+ (x, y, z, t)= (a + x, b+ y, c+ z, d + t),

(a, b, c, d) · (x, y, z, t)= (ax − by − cz− dt, ay + bx + ct − dz,

az− bt + cx + dy, at + bz− cy + dx).

Then (H,+, ·) is a ring with (0,0,0,0) as the zero element, (−a,−b,−c,−d) asthe negative element of (a, b, c, d) and (1,0,0,0) as the identity element.

We introduce the notation by taking

1= (1,0,0,0), i = (0,1,0,0), j = (0,0,1,0) and k = (0,0,0,1).

Then 1 is the multiplicative identity of H and

i2 = j2 = k2 =−1, i · j = k, j · k = i, k · i = j, j · i =−k,

k · j =−i, i · k =−j.

These relations show that the commutative law for multiplication fails to hold in H .The definitions of algebraic operations ‘+’ and ‘·’ in H show that each element(a, b, c, d) ∈H is of the form

(a, b, c, d)= (a,0,0,0)1+ (b,0,0,0)i + (c,0,0,0)j + (d,0,0,0)k

= a + bi + cj + dk,

on replacing (r,0,0,0) by r , as the map f : {(r,0,0,0) : r ∈R}→R, (r,0,0,0) �→r is an isomorphism of rings (see Definition 4.4.1). Thus H = {a + bi + cj + dk :a, b, c, d ∈ R}, where i2 = j2 = k2 =−1, i · j = k, j · k = i, k · i = j , k · j =−i,j · i =−k and i · k =−j .

An element of H is called a real quaternion and H is called a real quaternionring.

Similarly, the integral quaternion ring or rational quaternion ring can be definedby taking integral or rational coefficients, respectively. Note that any non-zero realquaternion q = a+bi+ cj +dk has a conjugate q defined by q = a−bi− cj −dk.Then qq = qq = a2 + b2 + c2 + d2 = N (say) �=0. Hence q−1 = N−1q is themultiplicative inverse of q . Consequently, (H,+, ·) is a skew field.

Page 182: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.1 Introductory Concepts 165

Remark The set of all members of H of the form (a, b,0,0) = a + bi, called thespecial quaternions forms a subring isomorphic to C (see Example 4.1.1(i)). Againthe set of all members of H of the forms (a,0, b,0) or (a,0,0, b) forms a subringisomorphic to C.

In the above sense, the real quaternions may be viewed as a suitable generaliza-tion of the complex numbers.

(ii) All square matrices of order 2, given by(

a1 + a2i a3 + a4i

−a3 + a4i a1 − a2i

),

where i2 =−1 and ar (r = 1,2,3,4) are rational numbers, form a division ring R

under usual addition and multiplication of matrices.A commutative division ring carries a special name called field. It is customary

to introduce the concept of fields abstractly.

Definition 4.1.6 A commutative division ring is called a field.

Thus a field is an additively abelian group such that its non-null elements form amultiplicatively commutative group and it satisfies distributive laws.

Remark The division rings in Example 4.1.3 are not fields.

Example 4.1.4 (i) (R,+, ·), (Q,+, ·) and (C,+, ·) (cf. Example 4.1.1(i)) are fields(called fields of real numbers, rational numbers and complex numbers, respectively).

(ii) (R× R,+, ·) is a field under ‘+’ and ‘·’ defined by (a, b)+ (c, d) = (a +c, b + d), (a, b) · (c, d) = (ac − bd, ad + bc) ∀a, b, c, d ∈ R. Clearly (0,0) is itsadditive zero, (1,0) is its multiplicative identity and the inverse of (a, b) (�=(0,0))

is (a/(a2 + b2),−b/(a2 + b2)).

Remark The field (R×R,+, ·) defined above is isomorphic to the field of complexnumbers (C,+, ·).

The concept of abstract field is relatively harder to grasp than that of a subfieldof the field of complex numbers, but an abstract field contains new classes of fieldsincluding finite fields. Finite fields form an important class of abstract fields [seeSect. 11.2 of Chap. 11]. We are now going to deduce a relation between a finiteintegral domain and a field through the following theorem.

Theorem 4.1.6 A finite integral domain is a field.

Proof Let D be an integral domain consisting of n distinct elements. Suppose0 �= a ∈D. If b and c ∈D and b �= c, then ab �= ac, otherwise ab= ac would implyb= c by Theorem 4.1.4. Thus if n distinct elements of D are multiplied by a, we ob-tain n distinct elements in D, i.e., all the elements of D. Hence for any given b ∈D,there exists a unique element u ∈D such that au = b. Consequently, the equation

Page 183: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

166 4 Rings: Introductory Concepts

ax = b has a unique solution in D, for any pair of elements a, b ∈D, provided thata �= 0. Again, since multiplication is commutative in D, the equation ya = b hasalso the very same solution. Consequently, D is a division ring by Theorem 4.1.5.Finally, as multiplication is commutative in D, D is a field. �

Example 4.1.5 The commutative ring (Zn,+, ·) (n > 1) is a field iff n is a primeinteger.

Proof It follows from Proposition 4.1.1 and Theorem 4.1.6. �

Remark For a given prime integer p (>1), there exists a field (Zp,+, ·) denoted asGF(p) having p elements, called a finite field or Galois field.

Remark Let 0 and 1 denote the property of an integer being even or odd, respec-tively. Define operations on the symbols 0 and 1 by the tables:

+ 0 1

0 0 11 1 0

× 0 1

0 0 01 0 1

Note that the operations are defined by analogue of the way in which the corre-sponding properties of integers behave under usual addition and multiplication. Forexample, since the sum (product) of an even and an odd integer is odd (even), wewrite

0+ 1= 1 (0× 1= 0).

Now ({0,1},+,×) is a field with 0 as its zero element and 1 as its identity element.We write 0 for 0 and 1 for 1 and the field by GF(2). Consider an arbitrary non-empty set S and the commutative ring R consisting of all maps from S to GF(2)

(see Example 4.1.1(v)). Since x2 = x ∀x ∈GF(2), this relation also holds in R.

4.2 Subrings

There is a natural interest to study a subset of a ring, which is also closed underaddition, subtraction and multiplication as defined in the ring. We now deal with thesituation where a subset of a ring again forms a ring.

Definition 4.2.1 Let (R,+, ·) be a ring and S a non-empty subset of R. If the or-dered triple (S,+, ·) constitutes a ring (using the induced operations) i.e., (S,+, ·)is itself a ring under the same compositions of addition and multiplication as in R,then (S,+, ·) is said to be a subring of (R,+, ·).

For example, (Z,+, ·) is a subring of (R,+, ·), (2Z,+, ·) is a subring of(Z,+, ·).

Page 184: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.2 Subrings 167

Remark To find a simpler criterion for a subring, we note that (S,+, ·) is a subringof (R,+, ·) iff (S,+) is a subgroup of (R,+) and (S, ·) is a subsemigroup of (R, ·),as the distributive, commutative and associative laws are hereditary.

Theorem 4.2.1 A subset S (�=∅) of a ring R is a subring of R iff a − b, ab ∈ S forevery pair of elements a, b ∈ S.

Proof Suppose the given conditions hold. Since a−b ∈ S for every pair of elementsa, b ∈ S, it follows by Theorem 2.4.1 that (S,+) is a subgroup of (R,+) and as +defined on R is commutative, (S,+) is abelian. Again (S, ·) is a subsemigroup of(R, ·) as by hypothesis, the closure property for multiplication holds in S. Associa-tive and distributive laws hold in S, since they hold for the whole set R. Therefore(S,+, ·) is a subring of (R,+, ·). Conversely, if (S,+, ·) is a subring, then the givenconditions hold. �

Example 4.2.1 Consider S = {( x 00 0

) : x ∈ R}. Then by Theorem 4.2.1, (S,+, ·) is

a subring of (M2(R),+, ·) of all 2× 2 real matrices under usual addition and mul-tiplication of matrices. Clearly,

( 1 00 0

)is the identity of S but this identity is not the

same as the identity( 1 0

0 1

)of M2(R).

Remark For a ring R with identity, the identity (if it exists) of a subring of M2(R)

may not be the same as the identity of M2(R).

Theorem 4.2.2 The intersection of any aggregate of subrings of a ring R is a sub-ring of R.

Proof Let M =⋂i Si be the intersection of a given family {Si} of subrings of R.M �= ∅, for 0 ∈ M . Then a, b ∈ M ⇒ a, b ∈ each Si ⇒ a − b, ab ∈ each Si ⇒a − b, ab ∈M ⇒M is a subring of R by Theorem 4.2.1. �

Remark The join of two subrings may not be a subring.

Example 4.2.2 The multiples of 2 and multiples of 3 are subrings of the ring ofintegers. The join of these two subrings contains the elements 2 and 3, but not theirsum 2+ 3= 5. Consequently, the join is not a subring.

Definition 4.2.2 The center of a ring R denoted by centR is defined by centR ={a ∈R : ar = ra, ∀r ∈R}.

Theorem 4.2.3 For any ring R, centR is a subring of R.

Proof Clearly, centR �= ∅, since 0 ∈ centR. Again a, b ∈ centR ⇒ ar = ra andbr = rb ∀r ∈R⇒ (a − b)r = ar − br = ra − rb= r(a − b) and (ab)r = a(br)=a(rb) = (ar)b = (ra)b = r(ab) ∀r ∈ R ⇒ centR is a subring of R by Theo-rem 4.2.1. �

Page 185: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

168 4 Rings: Introductory Concepts

Remark Every ring R has at least two subrings, viz. {0} and R. These two subringsare called trivial subrings of R; all other subrings (if they exist) are called non-trivial. We use the term proper subring to mean a subring which is different from R.

We now study subrings of a field.

Theorem 4.2.4 A subring with identity, of a field is an integral domain.

Proof Let D be a subring of a field F , such that 1 ∈D. Then D is a commutativering having no zero divisors, since multiplication is commutative in F and F con-tains no zero divisors. Consequently, D is an integral domain. �

Definition 4.2.3 Let (F,+, ·) be a field, A subset H (�=∅) of F is called a subfieldof (F,+, ·) iff the triple (H,+, ·) is itself a field (under the induced operations).

For example, the field of rational numbers Q is a subfield of the field of realnumbers R. In any field F , F is a subfield of F .

A formulation or a test for a subfield of a given field is given below:

Theorem 4.2.5 A non-empty subset H (�={0}) of a field F is a subfield of F iffa − b, ab ∈H for every pair of elements a, b ∈H and x−1 ∈H ∀x ∈H\{0}.

Proof Let the given conditions hold in H . Then (H,+) forms a group. Moreover(H\{0}, ·) forms a multiplicative group. Finally, the commutative properties for ad-dition and multiplication and distributive properties, being hereditary, hold in H .Consequently, H is a subfield of F . Conversely, the necessity of the conditions isobvious. �

Theorem 4.2.6 The intersection of a given aggregate {Hi} of subfields of a field F

is a subfield of F .

Proof Let M =⋂i Hi be the intersection of the aggregate {Hi}. Then M is a sub-field of F by Theorem 4.2.5. �

Definition 4.2.4 The intersection of all subfields of a field F is a subfield, calledthe prime field of F .

Thus the prime field of F is the smallest subfield of F .

4.3 Characteristic of a Ring

Characteristic of a ring is a non-negative integer (may be 0), which is very importantin the study of ring theory. The characteristic of an integral domain (hence of a field)is either 0 or a prime integer

Page 186: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.3 Characteristic of a Ring 169

Let (R,+, ·) be a ring. For a ∈ R, na already has a meaning in (R,+) for everyn ∈ Z. The order of the additive cyclic subgroup, generated by an element a ∈ R

is called the characteristic of a. Thus a has a non-zero characteristic r iff r is thesmallest positive integer such that ra = 0. Then for any integer n, na = 0⇔ n isdivisible by r . If, on the other hand, the additive cyclic subgroup generated by a

contains infinitely many distinct elements, then a is said to have the characteristicinfinity or 0; in the case, ra = na⇒ r = n, and ra �= 0 for all non-zero integers r .Different elements may have different characteristics; 0 has always the characteris-tic 1.

Definition 4.3.1 Let R be a ring. If r is the smallest positive integer for whichra = 0 ∀a ∈ R, then r is said to be the characteristic of R; if no such positiveinteger exists, then R is said to be of characteristic infinity or zero. We write charRfor the characteristic of R.

Example 4.3.1 (i) The ring (Z18,+, ·) has characteristic 18 and the characteristicsof (6), (9), (2), (4) are, respectively, 3, 2, 9, 9.

(ii) Clearly, char Z is 0.

Remark Definition 4.3.1 makes an assertion about every element of the ring butcharR of a ring R with 1 is completely determined by 1. This is given below.

Theorem 4.3.1 Let R be a ring with identity 1. Then R has characteristic n > 0 iffn is also the characteristic of 1.

Proof charR = n (>0)⇒ na = 0 ∀a ∈ R ⇒ n1 = 0. Now m1 = 0 for some m

satisfying 0 < m < n⇒ma =m(1a)= (m1)a = 0a = 0 ∀a ∈ R⇒ charR < n⇒an impossibility⇒ n is the characteristic of 1. The converse is similar. �

Theorem 4.3.2 Let R be a ring with identity 1. If R has no zero divisor, then charRis either 0 or a prime integer.

Proof Let charR = n �= 0. Assume that n is not prime. Then n has a non-trivialfactorization n = rs, with 1 < r , s < n. Now 0 = n1 = 1 + 1 + · · · (rs terms) =[1 + 1 + · · · (r terms)][1 + 1 + · · · (s terms)] = r1 · s1. But r1 �= 0, s1 �= 0, since1 < r , s < n. Then r1 and s1 are zero divisors, which is impossible by hypothesis.We, therefore, conclude that n must be prime. �

Corollary 1 Let D be an integral domain. Then charD is 0 or a prime number.

Corollary 2 Let F be a field. Then charF is 0 or a prime number.

Example 4.3.2 (i) The field of rational numbers, the field of real numbers and thefield complex numbers have each the characteristic 0 as the integer 1 has the samecharacteristic.

Page 187: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

170 4 Rings: Introductory Concepts

(ii) char GF(p) is p, as the characteristic of its identity (1) is p.(iii) Let F be a finite field. Then charF is a prime integer.[Hint. (iii) Since every field is an integral domain, charF is either 0 or a prime p.

Suppose charF = 0. Then n1 �= 0 for every positive integer n and n1 �=m1, wheren �=m. Hence {n1 : n is a positive integer} is an infinite subset of F . This contradictsthat F is a finite field. Consequently, charF is a prime integer.]

(iv) If an integral domain (D,+, ·) has a non-zero characteristic p, then p is theperiod (order) of every non-zero element in the group (D,+).

[Hint. (iv) Let a ∈ D\{0}. Then pa = a + a + · · · (p terms) = [1 +1+ · · ·1 (p terms)]a = (p1)a = 0a = 0⇒ period of a is a factor of p⇒ period ofa is 1 or p, since p is prime⇒ period of a is p as it is not 1, since a �= 0.]

(v) If an integral domain (D,+, ·) has characteristic 0, then in the group (D,+),every non-zero element has infinite period (order).

[Hint. Let a ∈D\{0}. Then for every positive integer n, na = (n1)a. But a �= 0;and, since charD = 0, n1 �= 0. Again since D is an integral domain, na �= 0 forevery positive integer n i.e., a has infinite period in the group (D,+).]

4.4 Embedding and Extension for Rings

It is sometimes convenient to study a ring as a subring of a suitable ring having ad-ditional properties. This motivates to introduce the concept of an embedding, whichis a monomorphism. A homomorphism of a ring is similar to a homomorphism ofa group. Consequently, the same terminology, such as, homomorphism, monomor-phism, epimorphism, isomorphism, automorphism, etc., is also used for rings. Thereal significance of homomorphisms, homomorphic images, kernels of homomor-phisms, and their basic properties are discussed in detail in this section.

The concept of embedding and extension can be introduced for rings in preciselythe same sense as in the case of groups.

Definition 4.4.1 Let R and S be rings. A (ring) homomorphism from R to S meansa mapping f : R→ S such that f (a + b)= f (a)+ f (b), f (ab)= f (a) · f (b) forevery pair of elements a, b ∈R.

Ring homomorphisms of special character are named like special group homo-morphisms:

(i) an injective ring homomorphism is called a monomorphism;(ii) a surjective ring homomorphism is called an epimorphism;

(iii) a bijective ring homomorphism is called an isomorphism;(iv) a ring isomorphism of a ring onto itself is called an automorphism;(v) a ring homomorphism of a ring into itself is called an endomorphism.

The existence of a ring isomorphism from R onto S asserts that R and S, in asignificant sense, are the same; i.e., R and S, have the same algebraic structures andwe say that R and S are isomorphic and write R ∼= S.

Page 188: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.4 Embedding and Extension for Rings 171

Let f : R → S be a ring homomorphism. For the time being, if we forget themultiplications defined on R and S, then f is considered a group homomorphismfrom the additive group (R,+) to the additive group (S,+). Then it follows:

Proposition 4.4.1 If f :R→ S is a ring homomorphism, then

(i) f (0)= 0′ (where 0 and 0′ are the zero elements of R and S, respectively);(ii) ∀a ∈R, f (−a)=−f (a);

(iii) f is injective, iff kerf = {0}, where kerf is the kernel of f defined by kerf ={a ∈R : f (a)= 0′}.

(iv) if f is onto and both R and S contain identity elements 1R and 1S , respectively,then f (1R)= 1S .

To obtain other information about ring homomorphisms and their kernels, wenow bring back into our discussion, the multiplications defined on the rings con-cerned.

Theorem 4.4.1 Let f :R→ S be a ring homomorphism (R,S being rings). Then

(i) for each subring A of R,f (A) is a subring of S;(ii) for each subring B of S,f−1(B) is a subring of R;

(iii) kerf is a subring of R.

Proof (i) Let A be a subring of R. Since A �= ∅, f (A) �= ∅. Let x, y ∈ f (A). Thenx = f (a) and y = f (b) for some a, b ∈ A. Hence x − y = f (a)− f (b)= f (a)+f (−b) (by Proposition 4.4.1) = f (a − b) (since f is a homomorphism) ∈ f (A),since a − b ∈A. Similarly, xy = f (a)f (b)= f (ab) ∈ f (A), since ab ∈A. Conse-quently, f (A) is a subring of S by Theorem 4.2.1.

(ii) Proof is similar to that of (i).(iii) Since 0 ∈ kerf , kerf �= ∅. Let x, y ∈ kerf . Then f (x) = f (y) = 0′ (zero

element of S) ⇒ f (x − y) = f (x) + f (−y) = f (x) − f (y) = 0′ − 0′ = 0′ andf (xy)= f (x)f (y)= 0′0′ = 0′ ⇒ both x − y and xy ∈ kerf ⇒ kerf is a subringof R by Theorem 4.2.1. �

Remark The kernel of a ring homomorphism f : R→ S describes how far f frombeing 1−1. If kerf = {0}, then f is 1−1; two elements of R are sent by f to thesame element of S⇔ their difference is in kerf .

Simple Examples of Ring Homomorphisms

Example 4.4.1 The most trivial examples are the identity homomorphisms. Let R

be a ring, and let I :R→R be the identity function. Then I is a ring homomorphismwhich is 1−1 and onto and hence is an isomorphism.

Example 4.4.2 Let S be a ring and let R be a subring of S. Then the inclusion mapi : R ↪→ S is a ring homomorphism. In particular, the inclusion map i :Q ↪→R is aring homomorphism.

Page 189: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

172 4 Rings: Introductory Concepts

Remark The only difference between the identity function I and i in Exam-ples 4.4.1 and 4.4.2 is their ranges. If R � S, the function i : R → S defined byi(x)= x in Example 4.4.2 is a homomorphism but not an epimorphism.

Example 4.4.3 Let R be a commutative ring with 1 of prime characteristic p (>1).Then the map φ :R→R defined by

φ(a)= ap, ∀a ∈R

is a homomorphism (Frobenius homomorphism).

Example 4.4.4 If F is a finite field of prime characteristic p, then the homomor-phism φ : F → F , a �→ ap is an automorphism.

[Hint. kerφ = {0} ⇒ φ is a monomorphism. Again F is finite ⇒ φ is surjectiveby counting.]

Example 4.4.5 Let F be a field of a prime characteristic p. Give an example toshow that the homomorphism φ : F → F , a �→ ap , may not be an automorphismif F is not finite.

[Hint. Consider the field F = Zp〈x〉, the field of rational functions over thefield Zp , which is the quotient field of Zp[x], where x is an indeterminate (seeDefinition 4.5.5). Then φ(F )= Zp〈xp〉 is a proper subfield of Zp〈x〉⇒ φ is not anautomorphism.]

Example 4.4.6 Let F be a field. Determine all the automorphisms of F 〈x〉.[Hint. Every homomorphism f : F 〈x〉 → F 〈x〉 mapping x onto some y =

(ax + b)/(cx + d) ∈ F 〈x〉, a, b, c, d ∈ F and ad − bc �= 0 is an automorphism andconversely, each such y ∈ F 〈x〉 gives rise to an automorphism of F 〈x〉 mapping x

into y.]

Definition 4.4.2 A ring R is said to be embedded in a ring S (or S is said to be anextension of R) iff there exists a monomorphism f : R→ S from the ring R to thering S.

Remark If f is a monomorphism, then f :R→ f (R)(⊆ S) is an isomorphism andf is called an embedding or an identification map. So we can identify R and f (R)

and consider R a subring of S.

For example, R is considered as a subfield of C under identification map f :R→C, r �→ (r,0).

Example 4.4.7 Consider the mapping f : (Z,+, ·)→ (M2(Z),+, ·) defined by

f (a)=(

a 00 a

)∀a ∈ Z.

Page 190: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.4 Embedding and Extension for Rings 173

Then f (a + b)= f (a)+ f (b) and f (ab)= f (a)f (b) ∀a, b ∈ Z⇒ f is a ring ho-momorphism. Clearly, f is a monomorphism. Consequently, (Z,+, ·) is embeddedin (M2(Z),+, ·).

Theorem 4.4.2 (Dorroh Extension Theorem) Let R be a ring without identity ele-ment. Then R can be embedded in a ring S with identity element.

Proof Let R be a given ring without the identity element and S = Z×R. Define ‘+’and ‘·’ in S by (n, a) + (m,b) = (n + m,a + b) and (n, a) · (m,b) = (nm,nb +ma + ab), where nb denotes the nth natural multiple of b and similarly for ma.Under these operations S is a ring with the identity element (1,0). Define a mappingf :R→ Z×R by f (a)= (0, a) ∀a ∈R. Then f is a homomorphism. Now kerf ={a ∈ R : f (a) = (0,0R)} = {0R} ⇒ f is a monomorphism by Proposition 4.4.1(where 0R is the zero element of R)⇒R is embedded in Z×R. �

Theorem 4.4.3 Let R be a ring such that charR = n (>0). Then R can be embed-ded in a ring S with identity element such that charS = n.

Proof Let S = Zn × R. Define ‘+’ and ‘·’ in S by ((m), a)+ ((t), b)= ((m+ t),

a + b) and ((m), a)((t), b) = ((mt),mb + ta + ab). Then S forms a ring with((1),0) as the identity element. Since n((1),0) = (n(1),0) = ((n),0) = ((0),0),and char Zn = n, it follows that charS = n.

Consider the mapping f : R → Zn × R by f (a) = ((0), a). Clearly, f is amonomorphism. �

Corollary 1 Let R be a ring without identity element. Then R can be embedded ina ring S with identity element (with preservation of characteristic of R).

Proof If charR = 0, then by Theorem 4.4.2, R is embedded in Z× R = S, wherecharS = 0, as (1,0) has infinite order in (S,+). Again if charR = n (n > 0), thenby Theorem 4.4.3, R is embedded in Zn ×R with the requisite properties. �

Corollary 2 Let R be a ring without identity. Then R can be extended to a ringwith identity (with the preservation of characteristic of R).

Remark If R is a ring with identity element, then an extension S of R may have adifferent identity element and in such cases, charS �= charR.

Example 4.4.8 (Z10,+, ·) is a ring with (1) as its identity. If S = {(0), (2), (4), (6),

(8)} ⊂ Z10, then (S,+, ·) is also a ring, having (6) as its identity. Thus Z10 is anextension of S, but they have different identities.

Remark A ring with zero divisors cannot be extended to an integral domain or afield, otherwise, we would reach a contradiction (by Theorem 4.2.4). But in caseof an integral domain an extension to a field is possible. For example, the standard

Page 191: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

174 4 Rings: Introductory Concepts

integral domain Z is extended to the field of rationals Q. The same technique is usedto prove the following theorem for an arbitrary integral domain.

Theorem 4.4.4 Let D be an integral domain. Then D can be extended to a field.

Proof Let T = D × D\{0} = {(x, y) : x, y ∈ D,y �= 0}. Define a binary rela-tion ρ on T by (x, y)ρ(a, b) iff xb = ay. For any (x, y) ∈ T , xy = yx ⇒(x, y)ρ(x, y) ⇒ ρ is reflexive. Again (x, y)ρ(a, b) ⇒ xb = ay ⇒ ay = xb ⇒(a, b)ρ(x, y)⇒ ρ is symmetric. Finally, (x, y)ρ(a, b) and (a, b)ρ(c, d)⇒ xb= ay

and ad = cb ⇒ xbd = ayd and ady = cby ⇒ xbd = cby (as multiplication iscommutative in D) ⇒ (xd)b = (cy)b ⇒ xd = cy (by cancellation law, sinceb �= 0) ⇒ (x, y)ρ(c, d)⇒ ρ is transitive. Consequently, ρ is an equivalence re-lation on T . Let Q(D) = T/ρ, the set of all ρ-equivalence classes on T . Defineaddition ‘+’ and multiplication ‘·’ in Q(D) by

(i) ((a, b))+ ((c, d))= ((ad + bc, bd)) and(ii) ((a, b))((c, d))= ((ac, bd)).

As b �= 0, d �= 0 and D is an integral domain, bd �= 0, so Q(D) is closed withrespect to both ‘+’ and ‘·’; clearly, the definitions of ‘+’ and ‘·’ in (i) and (ii) areindependent of the choice of the representatives of the classes. Then it is easy toverify that in Q(D),

(1) addition ‘+’ and multiplication ‘·’ are commutative and associative;(2) ((0, a)) ∈Q(D) is independent of the choice of a ∈D\{0}, as ((0, a))= ((0, b))

and ((0, a)) is the additive identity;(3) ((−a, b)) is the additive inverse of ((a, b));(4) distributive laws hold;(5) for any a ∈D\{0}, ((a, a)) is independent of a and is the multiplicative identity;(6) for ((a, b)) ∈Q(D) and ((a, b)) not being the zero element in Q(D) (this means

a �= 0), the multiplicative inverse of ((a, b)) is ((b, a)).

Consequently, (Q(D),+, ·) is a field. We now consider the map f : D → Q(D)

by f (x)= ((ax, a)). Note that ((ax, a)) is independent of the choice of a ∈D\{0}.Then f is a homomorphism. Now kerf = {x ∈D : f (x)= 0′} (where 0′ is the zeroelement of Q(D)) = {x ∈D : ((ax, a))= ((0, a))} = {0} (as ax = 0⇒ x = 0, sincea �= 0)⇒ f is a monomorphism. Consequently, Q(D) is an extension of D. �

Remark 1 The elements of Q(D) are denoted by ((a, b)) = ab−1 (or a/b) andQ(D) is called the quotient field of D (or field of quotients).

Remark 2 For any integral domain D, the quotient field is unique up to isomor-phism. (For proof see Corollary of Theorem 4.4.5 or Theorem 4.4.6.)

Theorem 4.4.5 The quotient fields of two isomorphic integral domains are isomor-phic.

Page 192: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.4 Embedding and Extension for Rings 175

Proof Let D and C be isomorphic integral domains and β : D → C an isomor-phism.

Consider the map f :Q(D)→Q(C) defined by

f(dd ′−1)= β(d)

(β(d ′))−1

, where(d, d ′) ∈D ×D\{0}.

Let cc′−1 ∈Q(C), where (c, c′) ∈ C ×C\{0}.Then c= β(d) and c′ = β(d ′) for some (d, d ′) ∈D×D\{0}. So, f is surjective.Let (d, d ′), (a, a′) ∈D×D\{0}.Then

dd ′−1 = aa′−1 ⇔ da′ = ad ′ ⇔ β(da′)= β

(ad ′)

⇔ β(d)β(a′)= β(a)β

(d ′)

⇔ β(d)(β(d ′))−1 = β(a)

(β(a′))−1

⇔ f(dd ′−1)= f

(aa′−1) ⇒ f is injective.

Consequently, f is bijective.Now

f(dd ′−1 + aa′−1)= f

((da′ + ad ′

)(d ′a′)−1)= β

(da′ + ad ′

)(β(d ′a′))−1

= (β(d)β(a′)+ β(a)β

(d ′))

(β(d ′)(

β(a′))−1

= β(d)(β(d ′))−1 + β(a)

(β(a′))−1

= f(dd ′−1)+ f

(aa′−1).

Similarly, f (dd ′−1 · aa′−1)= f (dd ′−1)f (aa′−1).Consequently, f is an isomorphism. �

Corollary For an integral domain D, the quotient field Q(D) is unique (up to iso-morphism).

Proof In Theorem 4.4.5 take D = C and β the identity isomorphism on D. �

Let us now study some properties of the quotient field Q(D).

Theorem 4.4.6 Q(D) is the intersection of all fields, which contain D as a subring.

Proof Let F be any field containing D as a subring. Then F contains the solutionsof the equations xb = a for all a, b ∈ F , where b �= 0. Hence the quotients ab−1

of all pairs (a, b) ∈ D × D\{0} belong to F ⇒ Q(D) ⊆ F . Also, Q(D) is itselfa field containing D as a subring. Consequently, Q(D) is the intersection of allfields, which contains D as a subring. �

Page 193: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

176 4 Rings: Introductory Concepts

Corollary Let F be any field containing an integral domain D as a subring. Then F

contains Q(D) as a subfield.

Remark (i) Q(D) is the smallest field containing D as a subring.(ii) Theorem 4.4.6 also proves the uniqueness of the quotient field of a given

integral domain.(iii) If D is a field, then Q(D)=D.

Problem 1 Find the quotient field of the ring of integers Z.

Solution Let T = Z × Z\{0}. Then the equivalence relation ρ on T (defined inTheorem 4.4.4) identifies different pairs, whose ratios are the same. For example,(5,8), (−10,−16), (40,64) etc. are ρ-equivalent and hence these pairs constitute aclass. As Z is an integral domain, the elements of the quotient field Q(Z) of Z areabstractly the same as these classes, and are called rational numbers; every rationalnumber is of the form mn−1, where m, n are integers and n �= 0. Consequently,Q(Z)=Q, the field of rational numbers.

Remark Let F be a field. Then by Corollary 1 of Theorem 4.3.2, charF = 0 or p

(a prime number). We show that in each case F has a subfield isomorphic to a well-known field.

Theorem 4.4.7 Let F be a field.

(a) If charF = 0, then F contains a subfield K such that K is isomorphic to Q.(b) If charF = p, a prime integer, then F contains a subfield K such that K is

isomorphic to Zp .

Proof Define a map f : Z→ F , n �→ n1, ∀n ∈ Z. Then f is a ring homomorphism.(a) Suppose charF = 0. Then kerf = {n ∈ Z : n1= 0} = {0}⇒ f is a monomor-

phism.Define a map f :Q→ F by

f (m/n)= f (m)(f (n))−1

, ∀m/n ∈Q.

Clearly, f is well defined and is a monomorphism.Hence the field Q is isomorphic to the subfield f (Q) of F ⇒ (a), (taking

K = f (Q)).(b) Suppose charF = p > 0. Since f is a ring homomorphism, it follows that

the rings Z/kerf and Imf = f (Z) are isomorphic (see Theorem 5.2.3 of Chap. 5).Now charF = p > 0⇒ f (Z) �= {0} ⇒ f (Z) is a non-trivial subring with 1, of thefield F ⇒ f (Z) is an integral domain ⇒ Z/kerf is an integral domain ⇒ kerf isa prime ideal of Z (see Theorem 5.3.1 of Chap. 5) ⇒ kerf = 〈q〉 for some primeinteger q > 0 (see Problem 1 of Chap. 5). Now q ∈ kerf ⇒ f (q)= 0⇒ q1= 0⇒p|q⇒ p = q⇒ Z/kerf = Z/〈p〉 ∼= Zp ⇒ f (Z)∼= Zp ⇒ (b). �

Consequently, we have the following theorem.

Page 194: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.5 Power Series Rings and Polynomial Rings 177

Theorem 4.4.8 In every field F , there is a minimal subfield P (i.e., a subfield P

contained in every subfield of F ), P being isomorphic to Q or Zp according ascharF = 0 or p.

Remark 1 A field F cannot have more than one such minimal subfield: for, if H andG are both minimal subfields of the field F , then G⊆H and H ⊆G. ConsequentlyG=H . The unique minimal subfield in a field F is the prime subfield of F .

Remark 2 It follows from Theorem 4.4.8 that the prime subfield of F is the inter-section of all subfields of F and it is the smallest subfield of F .

Remark 3 Theorem 4.4.7 shows that the prime subfield of F is the subfield of F

generated by the identity element of F .

4.5 Power Series Rings and Polynomial Rings

We are familiar with polynomials and power series in one variable with integralcoefficients. We extend these notions having coefficients from an arbitrary ring R.This motivates to define polynomial ring R[x] and power series ring R�x� in onevariable. An element of R[x] is a formal symbol a0 + a1x + · · · + anx

n, whereai ’s are in R and that of R�x� is a formal expression of the form a0 + a1x + · · · +anx

n + · · · , where ai ’s are in R. In this section we also study the influence of thestructure of R on the structure of R[x] and R�x�. The polynomial ring in n variablesis defined recursively (see Ex. 29 of Exercises-I).

Let (R,+, ·) be a ring. Consider the collection P of all infinite sequences

f = (a0, a1, a2, . . . , an, . . .)= {an}of elements an ∈ R. The elements of P are called formal power series, or simplypower series over R.

Two power series f = (a0, a1, a2, . . . , an, . . .) and g = (b0, b1, b2, . . . , bn, . . .)

are said to be equal, denoted by f = g iff an = bn ∀n≥ 0. Define ‘+’ and ‘·’ in P

as follows:

f + g = (a0 + b0, a1 + b1, . . . , an + bn, . . .),

fg = (c0, c1, c2, . . .),

where, for each n≥ 0, cn is given by

cn =∑

〈i+j=n〉aibj = a0bn + a1bn−1 + · · · + an−1b1 + anb0.

Then P is closed with respect to ‘+’ and ‘·’. Moreover, (P,+) is an abelian group.Let f,g,h ∈ P , where f = {an}, g = {bn} and h= {cn}.

Page 195: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

178 4 Rings: Introductory Concepts

Then (f · g)= {dn}, where dn =∑〈i+j=n〉 aibj .So,

(f · g) · h= {en},where

en =∑

〈r+s=n〉drcs =

〈r+s=n〉

( ∑

〈i+j=r〉aibj

)cs =

〈i+j+s=n〉(aibj )cs

=∑

〈i+j+s=n〉ai(bj cs)=

〈i+p=n〉aitp, where g · h= {tn}

= f · (g · h).

Similarly, we can show that

f (g + h)= (a0, a1, . . . , an, . . .)(b0 + c0, b1 + c1, . . .)= (e0, e1, . . .),

where

en =∑

〈i+j=n〉ai(bj + cj )=

〈i+j=n〉(aibj + aicj )=

〈i+j=n〉aibj +

〈i+j=n〉aicj

= f · g + f · h.

This shows that the left distributive property is also satisfied in (P,+, ·). Similarly,the right distributive property is satisfied in (P,+, ·). Thus (P,+, ·) is a ring with0= (0,0,0, . . .) as the zero element of this ring and the additive inverse of an arbi-trary element (a0, a1, a2, . . .) of P is (−a0,−a1,−a2, . . .).

Then we have the following.

Theorem 4.5.1 The triple (P,+, ·) forms a ring, called the ring of (formal) powerseries over R. Moreover, the ring (P,+, ·) is commutative, iff R is commutative.

Let S = {(a,0,0, . . .) : a ∈ R}. Then (S,+, ·) is a subring of (P,+, ·) suchthat S is isomorphic to the ring R (under the isomorphism S → R, given by(a,0,0, . . .) �→ a). In this sense, P contains the original ring R as a subring, andthus, an element a ∈ R is identified with the special sequence (a,0,0, . . .) ∈ P .Consequently, the elements of R regarded as power series, are hereafter called con-stant series, or just constants.

We use the symbol axn, n≥ 1, to designate the sequence (0, . . . ,0, a,0, . . .) ∈ P ,where the element a occupies the (n+ 1)th place in this sequence. For example,

ax = (0, a,0,0, . . .), ax2 = (0,0, a,0, . . .),

ax3 = (0,0,0, a,0, . . .) and so on.

Page 196: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.5 Power Series Rings and Polynomial Rings 179

Then each power series f = {an} ∈ P can be expressed uniquely in the form:

f = (a0,0, . . .)+ (0, a1,0, . . .)+ · · · + (0, . . . ,0, an, . . .)+ · · ·= a0 + a1x + a2x

2 + · · · + anxn + · · ·(with the identification of a0 ∈ R with the sequence (a0,0,0, . . .) ∈ P ). Thus P

consists of all formal expressions:

f = a0 + a1x + a2x2 + · · · + anx

n + · · · ,where the elements ai (called the coefficients of f ) ∈ R and we write f =∑∞

r=0 arxr or simply f =∑arx

r . Then the definitions of addition ‘+’ and multi-plication ‘·’ in P assume the form:

∑anx

n +∑

bnxn =∑

(an + bn)xn,

(∑anx

n)(∑

bnxn)=∑

cnxn,

where cn =∑〈i+j=n〉 aibj =∑n〈i=0〉 aibn−i .

Here x is simply a symbol (called an indeterminate), not related to the ring R

and in no sense representing an element of R. The monomials xr are consideredindependent in the sense that

∑anx

n =∑bnxn iff ai = bi for all i = 0,1,2, . . ..

Following the usual convention, we write R�x� for P and f (x) or simply f forany element of R�x�.

Remark If 1 ∈ R, then we can identify the power series (0,1,0,0, . . .) with x,(0,0,1,0, . . .) with x2, (0,0,0,1,0, . . .) with x3 and so on. Thus ax is an actualproduct of elements of R�x� defined by ax = (a,0,0, . . .)(0,1,0,0, . . .) and so on.

Following the convention we omit terms with zero coefficients and replace(−an)x

n by −anxn. A formal power series f (x) =∑aix

i ∈ R�x� is said to bea zero power series iff ai = 0 ∀i, otherwise it is said to be a non-zero power series.

Definition 4.5.1 If f (x) =∑arxr is a non-zero power series in R�x�, then the

smallest integer n, such that an �= 0 is called the order of f (x) and is denoted byordf (or simply O(f )).

Theorem 4.5.2 If R is an integral domain, then R�x� is also an integral domain.

Proof Clearly, R�x� is a commutative ring with identity. We claim that R�x� con-tains no zero divisors. Let f (x) �= 0, g(x) �= 0 in R�x�, with O(f ) = n andO(g)=m, so that

f (x)= anxn + an+1x

n+1 + · · · (an �= 0),

g(x)= bmxm + bm+1xm+1 + · · · (bm �= 0).

Page 197: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

180 4 Rings: Introductory Concepts

Then

f (x)g(x)= anbmxn+m + (an+1bm + anbm+1)xn+m+1 + · · · .

As R does not contain zero divisors, anbm �= 0. Hence the product f (x)g(x) cannotbe a zero power series. Hence R�x� is an integral domain. �

Lemma 4.5.1 Let R be a ring with 1. The element f (x) =∑anxn in R�x� is in-

vertible in R�x� iff the constant term a0 is invertible in R.

Proof Suppose f (x) is invertible in R�x�. Then there exists g(x)=∑bnxn ∈R�x�

such that f (x)g(x) = g(x)f (x) = 1. Now a0b0 = 1 = b0a0 ⇒ a0 is invertible inR⇒ b0 = a−1

0 .Conversely, suppose a0 is invertible in R. Then there exists b0 ∈ R such that

a0b0 = b0a0 = 1. We define inductively the coefficients of power series∑

bnxn in

R�x� which is the inverse of f (x). To start with, we determine the coefficient bn

so that f (x)g(x) = 1 i.e., g(x) is a right inverse of f (x). From f (x)g(x) = 1,we obtain from the definition of multiplication of power series that if the follow-ing equations are satisfied by the coefficients of g(x), then g(x) is a right inverseof f (x):

(i) a0b0 = 1(ii) a0b1 + a1b0 = 0

(iii) a0b2 + a1b1 + a2b0 = 0...

(iv) a0bn + a1bn−1 + · · · + anb0 = 0(v) anbn+1 + a1bn + · · · + anb1 + an+1b0 = 0

...

Since a0 is invertible, b0 is uniquely determined as a−10 . Then b1 is uniquely deter-

mined from equation (ii) above. Suppose b0, b1, . . . , bn have already been defined.Then bn+1 is uniquely determined by equation (v) and so on. So every br is deter-mined uniquely by induction, such that f (x)g(x)= 1. This shows that f (x) has aright inverse g(x).

Similarly, it can be proved that f (x) has a left inverse. Hence f (x) is invertiblein R�x� (since in any ring an element with a right inverse and a left inverse has aninverse). �

Theorem 4.5.3 (i) A power series f (x)=∑anxn in F �x�, where F is a division

ring, is invertible in F �x� iff its constant term a0 is non-zero.(ii) If F is a division ring, then the invertible elements of F �x� are precisely those

power series with non-zero constant term.

Proof (i) and (ii) follow from Lemma 4.5.1. �

Let R be a field. Then R�x� is an integral domain by Theorem 4.5.2. Let R〈〈x〉〉be the quotient field of R�x�.

Page 198: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.5 Power Series Rings and Polynomial Rings 181

Theorem 4.5.4 Every non-zero element of R〈〈x〉〉 can be uniquely expressed in theform:

xr(a0 + a1x + a2x

2 + · · · ), where ai ∈R and a0 �= 0.

Proof Any element f of R〈〈x〉〉 can be written as

f = b0 + b1x + b2x2 + · · ·

xs(cs + cs+1x + · · · ) ,

where s is the least integer such that cs �= 0. Since cs �= 0, cs + cs+1x + · · · has aninverse d0 + d1x + d2x

2 + · · · in R�x�.Therefore,

f = (b0 + b1x + b2x2 + · · · )(d0 + d1x + d2x

2 + · · · )xs(cs + cs+1x + · · · )(d0 + d1x + d2x2 + · · · )

= a0 + a1x + a2x2 + · · ·

xs= x−s

(a0 + a1x + a2x

2 + · · · )

= a0x−s + a1x

−s+1 + a2x−s+2 + · · · .

Thus R〈〈x〉〉 consists of formal power series with a finite number of terms withnegative exponents:

f =∞∑

n=N

anxn, where N is an integer positive, negative or zero.

If aN �= 0, N is called the order of f and is as usual denoted by ord(f ) (orby O(f )). �

Corollary If R is a field, then R〈〈x〉〉 is also a field.

Proof If follows from Theorem 4.5.4 and Lemma 4.5.1. �

Remark R〈〈x〉〉 (sometimes, simply denoted by R〈x〉) called the field of formalpower series in x over the field R.

We now consider a particular class of power series.

Definition 4.5.2 Let R be a ring and R[x] the set of all power series in R�x� whosecoefficients are 0 from some indEx. onwards (the indEx. varies from series to series).Then R[x] is called a polynomial ring (in the indeterminate x) over the ring R. Thepolynomial 0 such that ai = 0 ∀i is called zero polynomial; otherwise, a polynomialis called a non-zero polynomial.

Page 199: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

182 4 Rings: Introductory Concepts

Remark Let R be a ring and R[x] polynomial ring over R. If polynomials f (x)=∑arx

r , g(x)=∑brxr are in R[x], with ar = 0 ∀r ≥ n and br = 0 ∀r ≥m, then

ar + br = 0 ∀r ≥max(m,n) and∑

〈i+j=r〉aibj = 0 ∀r ≥m+ n.

These imply that both the sum f (x)+ g(x) and the product f (x)g(x) are in R[x].Clearly, R[x] forms a subring of R�x� and is called the ring of polynomials over R

(in x).

Definition 4.5.3 Given a non-zero polynomial

f (x)= a0 + a1x + · · · + anxn (an �= 0) in R[x],

we call an the leading coefficient of f (x); the integer n, the degree of f (x); andwrite degf = n.

Remark The degree of any non-zero polynomial is a non-negative integer; no degreeis given to the zero polynomial 0. The polynomials of degree 0 are precisely the non-zero constant polynomials.

Definition 4.5.4 If R is a ring with identity 1, a polynomial f (x) (∈R[x]) whoseleading coefficient is 1 is said to be a monic polynomial.

Proposition 4.5.1 If R is an integral domain, then R[x] is also an integral domain.

Proof It follows from Theorem 4.5.2. �

Definition 4.5.5 If R is a field, the quotient field R〈x〉 of R[x] is called the field ofrational functions over the field R.

Proposition 4.5.2 Let R be a ring and f (x), g(x) ∈R[x]. If degf = n, degg =m,(m,n > 0), then

deg(f + g)≤max(n,m) and degfg ≤m+ n.

If R is an integral domain, deg(fg)=m+ n and the converse is also true.

Proof Let

f (x)= a0 + a1x + · · · + anxn (an �= 0) and

g(x)= b0 + b1x + · · · + bmxm (bm �= 0)

}(A)

be polynomials in R[x].

Page 200: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.5 Power Series Rings and Polynomial Rings 183

If cr is the coefficient of xr in f (x)g(x), then cr =∑i+j=r aibj . The first partfollows from Remark of Definition 4.5.2. Next suppose R is an integral domain.In (A), an �= 0 and bm �= 0⇒ cm+n =∑i+j=m+n aibj = anbm �= 0 as R is an inte-gral domain⇒ deg(fg)=m+ n. �

Let R be a ring with identity, S an extension of R, and s be an arbitrary elementof S. Then for each polynomial f (x) = a0 + a1x + · · · + anx

n in R[x], definef (s)= a0 + a1s + · · · + ans

n ∈ S.Then the element f (s) is called the result of substituting s for x in f (x).Suppose f (x), g(x) ∈ R[x] and r ∈ centS. If h(x) = f (x)+ g(x) and p(x) =

f (x)g(x), then clearly h(r)= f (r)+g(r) and p(r)= f (r)g(r). Consequently, themap σr :R[x]→ S, σr(f (x))= f (r) is a homomorphism. σr is called a substitutionhomomorphism induced by r and its range, denoted by R[r], is thus

R[r] = {f (r) : f (x) ∈R[x]}

= {a0 + a1r + · · · + anrn : ai ∈R : n≥ 0

}.

Then R[r] forms a subring of S and R[r] is generated by the set R ∪ {r}, (since1 ∈R⇒ 1x = x ∈R[x] ⇒ r ∈R[r]). Evidently, R[r] =R⇒ r ∈R.

We claim that σr is unique. If ρ is a substitution homomorphism induced by r ,then ρ(ai)= ai for each coefficient ai and ρ(xi)= ri . Since ρ is a homomorphism,ρ(f (x))= ρ(a0)+ρ(a1)ρ(x)+· · ·+ρ(an)ρ(xn)= a0+a1r+· · ·+anr

n = f (r)=σr(f (x)) ∀f (x) ∈R[x] ⇒ ρ = σr . Thus the following theorem follows:

Theorem 4.5.5 Let R be a ring with identity, S an extension of R, and the ele-ment r ∈ centS. Then there is a unique homomorphism σr : R[x] → S such thatσr(x)= r , σr(a)= a ∀a ∈R.

Let R be a field and R〈x〉 the field of formal power series in x and t ∈ R〈x〉.Then by substitution x �→ t , we get a homomorphism σ :R〈x〉→R〈t〉 defined by

σ

( ∞∑

i=N

aixi

)=

∞∑

i=N

aiti (4.1)

However, if ord(t)= r , then σ is called a substitution of order r .

Theorem 4.5.6 Every substitution x �→ t of order 1 is an automorphism of R〈x〉over R.

Proof Let t = axr + · · · ∈R〈x〉, a �= 0, r ≥ 1, so that ord(t)= r ≥ 1.Let f (x)= aNxN + aN+1x

N+1 + · · · ∈R〈x〉, aN �= 0.Then f (x) �= 0, and f (t) = aN(axr + · · · )N + aN+1(axr + · · · )N+1 + · · · =

aNaNxrN + · · · and as aNaN �= 0; then by (4.1) we have σ(f (t)) �= 0. Thus σ isan isomorphism of R〈x〉 onto R〈t〉. We shall now show that if r = 1, then σ is anautomorphism. For this we have to prove that R〈t〉 = R〈x〉. This will follow, if we

Page 201: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

184 4 Rings: Introductory Concepts

can find a sequence of elements a1, a2, . . . in R such that σ maps a1x + a2x2 + · · ·

onto x. In this case, a1(ax + · · · )+ a2(ax + · · · )2 + · · · = x.Comparing the coefficients of x, x2, x3, . . . , xi from both sides, we have

a1a = 1,

a2a2 + a1(· · · )= 0,

a3a3 + a2(· · · )+ a1(· · · )= 0,

...

aiai + ai−1(· · · )+ · · · + a1(· · · )= 0.

and so on, where the omitted expressions are obtained from the coefficients ofa1x+ · · · , and hence they are known. From these relations we can solve a1, a2, . . . ,successively. This completes the proof. �

4.6 Rings of Continuous Functions

We now consider another class of important rings, such as rings of functions, inparticular, rings of continuous functions.

Definition 4.6.1 If X is a non-empty set and R is a ring, then the set S of all(set) functions f : X → R is a ring under pointwise addition ‘+’ and pointwisemultiplication ‘·’ of functions defined by

(f + g)(x)= f (x)+ g(x),

(f · g)(x)= f (x) · g(x)

}∀f,g ∈ S and ∀x ∈X.

This ring S is called a ring of functions.

Remark This ring S is commutative if and only if R is commutative. S has an iden-tity (which is a constant function if and only if R has an identity).

Proposition 4.6.1 Let S(X,R) be the ring of all mappings from a non-empty set X

to the ring R. Then given a ring T , every ring epimorphism k : R → T inducesa ring homomorphism ψ = k∗ : S(X,R) → S(X,T ) such that if R and T haveidentity elements, then ψ sends identity element of S(X,R) into the identity elementof S(X,T ).

Proof Define ψ = k∗ : S(X,R)→ S(X,T ) by ψ(f )= k ◦ f , for all f ∈ S(X,R).Clearly, ψ(f + g)= k ◦ (f + g)= k ◦ f + k ◦ g = ψ(f )+ ψ(g) and ψ(f · g)=k ◦ (f · g)= (k ◦ f ) · (k ◦ g)=ψ(f ) ·ψ(g), for all f,g ∈ S(X,R).

Page 202: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.6 Rings of Continuous Functions 185

Suppose R and T have identity elements. Let c : X → R be the constant mapdefined by c(x) = 1R (identity element of R), for all x ∈ X and d : X → T bethe constant map defined by d(x) = 1T (identity element of T ), for all x ∈ X.Then c and d are, respectively, the identity elements of S(X,R) and S(X,T ). Now(ψ(c))(x) = k(1R) = 1T (since k is an epimorphism) = d(x), for all x ∈ X. Thusψ(c)= d , proves the second part. �

We now study the particular ring when X is a topological space and R is thefield R, the field of real numbers. We now define the ring of real-valued continuousfunctions on X, denoted by C(X).

Definition 4.6.2 Let X be a topological space and C(X) be the set of all continuousreal-valued functions on X. Then C(X) is a commutative ring under point wiseoperation ‘+’ and ‘·’ defined by

(f + g)(x)= f (x)+ g(x),

(f · g)(x)= f (x) · g(x)

}∀f,g ∈ C(X) and ∀x ∈X.

This ring is called the ring of real-valued continuous functions on X.

Proposition 4.6.2 The ring C(X) contains the identity element c : C(X)→ R de-fined by c(f )= 1 for all f ∈ C(X). Further if ψ : C(X)→ R is a non-zero homo-morphism, then it is an epimorphism such that ψ(tc)= t for all t ∈R.

Proof As ψ is a non-zero homomorphism there exists an element f ∈ C(X) suchthat ψ(f ) �= 0. Then ψ(f ) = ψ(f · c) = ψ(f )ψ(c) implies that ψ(c) = 1. Pro-ceeding as in Problem 2, we prove that ψ(nc)= n for each integer n, ψ(rc)= r foreach rational number r and ψ(xc)= x for each irrational number x. Consequently,ψ is an epimorphism such that ψ(ct)= t for all t ∈R. �

Remark 1 Let X and Y be two homeomorphic spaces. Then C(X) and C(Y ) areisomorphic as rings (see Ex. 11 of the Exercises in Appendix B).

Remark 2 Let X and Y be two compact Hausdorff spaces. If C(X) and C(Y ) areisomorphic as rings, then X and Y are homeomorphic. It follows from a theorem ofGelfand–Kolmogoroff (Dugundji 1980, p. 289).

We now draw attention to the special ring C([0,1]).

Proposition 4.6.3 Let C([0,1]) be the ring of all real-valued continuous functionson [0,1]. Then C([0,1]) is a commutative ring with identity having zero divisor.

Proof Clearly C([0,1]) is a commutative ring with identity. Consider a non-zerofunction f ∈ C([0,1]) defined by

Page 203: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

186 4 Rings: Introductory Concepts

f (x)={

0, if 0≤ x ≤ 12 ,

x − 12 , if 1

2 ≤ x ≤ 1.

Let g ∈ C([0,1]) be defined by

g(x)={

12 − x, if 0≤ x ≤ 1

2 ,

0, if 12 ≤ x ≤ 1.

Then g is a non-zero function in C([0,1]) such that g is a zero divisor of f . �

The ring C([0,1]), sometimes written as C([0,1]), has the following properties.

Proposition 4.6.4 The ring C([0,1]) has neither non-trivial nilpotent elements nornon-trivial idempotent elements.

Proof If possible, there exists a non-trivial nilpotent element f ∈ C([0,1]). Then(f (x))n = 0 for some positive integer n. Thus f (x) = 0, for all x ∈ [0,1], whichimplies a contradiction.

Next suppose that g is a non-trivial idempotent element in C([0,1]). Then(g(x))2 = g(x) for all x ∈ [0,1] implies g(x)(g(x) − 1) = 0 for all x ∈ [0,1].This implies Img = {0,1}. Since the continuous image of [0,1] under g must bea connected subset of R which is necessarily an interval of R. Hence we reach acontradiction as {0,1} ⊂R is not an interval. �

In Chap. 5, we shall study ideals of the ring C([0,1]).

4.7 Endomorphism Ring

We now define another important ring with an eye to the additive group of integers.Given an additive abelian group A, there exists a ring, called the endomorphism ringof A, having some interesting properties.

Definition 4.7.1 Let A be an additive abelian group and End(A) the set of all endo-morphisms of A. Then (End(A),+, ·) is a non-commutative ring (in general) withidentity 1A :A→A under usual ‘+’ and ‘·’ defined by (f + g)(x)= f (x)+ g(x)

and (f · g)(x) = (f ◦ g)(x) = f (g(x)), ∀f,g ∈ End(A) and ∀x ∈ A. End(A) iscalled endomorphism ring of A.

We now study the special ring End(Z).

Proposition 4.7.1 The two rings Z and End(Z) are isomorphic.

Proof Define the mapping ψ : Z→ End(Z) by ψ(n) = fn, where fn : Z→ Z isdefined by fn(x)= nx, ∀x ∈ Z. We claim that ψ is a ring isomorphism.

Page 204: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.7 Endomorphism Ring 187

ψ is a ring homomorphism: ψ(m+n)= fm+n : Z→ Z is defined by fm+n(x)=(m + n)x = mx + nx = fm(x) + fn(x) = (fm + fn)(x), ∀x ∈ Z ⇒ fm+n =fm+fn⇒ψ(m+n)=ψ(m)+ψ(n), ∀m,n ∈ Z. Similarly, ψ(mn)=ψ(m)ψ(n),∀m,n ∈ Z. Hence ψ is a ring homomorphism.

ψ is injective: Let ψ(m) = ψ(n). Then fm = fn ⇒ fm(x) = fn(x) ∀x ∈ Z⇒mx = nx ∀x ∈ Z⇒m= n (by taking in particular x = 1)⇒ψ is injective.

ψ is surjective: Let f ∈ End(Z). Then f : (Z,+)→ (Z,+) is a group homomor-phism. 1 ∈ Z⇒ f (1) ∈ Z⇒ f (1) = n for some n ∈ Z⇒ fn(x) = nx = f (1)x =xf (1)= f (x · 1)= f (x), ∀x ∈ Z⇒ fn = f ⇒ ψ(n)= f ⇒ ψ is surjective. Con-sequently, ψ is a ring isomorphism. �

Remark In general End(A) is non-commutative. For example, consider the freeabelian group (A,+) = (Z ⊕ Z,+). Let f,g ∈ End(A) be defined on the gener-ators (1,0) and (0,1) of the group A as follows:

f (1,0)= (1,0) and f (0,1)= (1,0);and

g(1,0)= (0,0) and g(0,1)= (0,1).

Then

(f ◦ g)(n,m)= f(g(n,m)

)= f (0,m)= (m,0)

and

(g ◦ f )(n,m)= g(f (n,m)

)= g(n+m,0)= (0,0)

for all (n,m) ∈A⇒ f ◦ g �= g ◦ f .

Any ring with identity can be embedded in an endomorphism ring.

Theorem 4.7.1 Let R be a ring with 1. Then R is isomorphic to a subring ofEnd(R).

Proof Define the mapping ψ : R → End(R) by ψ(a) = fa for all a ∈ R, wherefa : R → R is defined by fa(x) = ax, for all x ∈ R. Clearly, fa is an endomor-phism of the abelian group R by the distributive property in R. Moreover, as before,ψ is a ring homomorphism. Now kerψ = {a ∈ R : fa = 0} = {a ∈ R : ax = 0 ∀x ∈R} = {0}. Hence ψ is a monomorphism. Consequently, R is isomorphic to a subringof End(R). �

Corollary Any ring R can be embedded in the ring End(R).

Proof It follows from Theorems 4.4.2 and 4.7.1. �

We now find the endomorphism ring of any finite cyclic group of prime order.

Page 205: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

188 4 Rings: Introductory Concepts

Proposition 4.7.2 The two rings End(Zp) and Zp are isomorphic.

Proof Define ψ : End(Zp) → Zp by ψ(f ) = f ((1)), where f : Zp → Zp is agroup homomorphism. Clearly, ψ is well defined and an isomorphism. �

4.8 Problems and Supplementary Examples

Problem 1 Let (R,+, ·) be a ring and d an element of R which is not a left zerodivisor. Show that the characteristic of R is finite iff the order of d in the additivegroup (R,+) is finite. Moreover, charR =m iff order of d in (R,+)=m.

[Hint. Let (R,+, ·) be a ring and d be not a left zero divisor. Suppose (R,+, ·)is of finite characteristic. Then ∃ a positive integer m > 1 such that mr = 0 ∀r ∈ R.Then md = 0 and hence d has a finite order in (R,+).

Conversely, let d have finite order in (R,+). Then ∃ a positive integer m > 1such that md = 0. Let x be an arbitrary element of R. Then 0= (md)x = d(mx) (bydistributive property)⇒mx = 0 (as d is not a left zero divisor) ∀x ∈R⇒ charR isfinite.

Next let charR = m. Then md = 0⇒ order of d is a divisor of m. If possible,order of d = r , 1 ≤ r < m. Now rd = 0⇒ for any x ∈ R, 0 = (rd)x = d(rx)⇒rx = 0 (as d is not a left zero divisor).⇒ charR = r < m⇒ a contradiction.

Conversely, if order of d in (R,+) is m, then md = 0 and rd �= 0 if 1≤ r < m.Now, for any x ∈ R, mx = 0 ⇒ charR ≤ m. If 1 < r < m, then rd �= 0 ⇒charR ≥m. Consequently, charR =m.]

Problem 2 Let R be the field of reals and f : R→ R a ring homomorphism suchthat f (1)= 1. Show that f (x)= x for all x ∈R and f is an automorphism.

[Hint. f (1) = 1 ⇒ f (n) = f (1 + 1 + · · · + 1) = f (1) + f (1) + · · · +f (1) (n times)= nf (1)= n ∀ integers n > 0.

If the integer n < 0, f (n)=−nf (−1)= nf (1)= n.Thus f (n)= n ∀ integers n⇒ f is the identity map on the set of integers.Let p

qbe a rational number such that gcd(p, q)= 1. Now

p = p

q+ p

q+ · · · + p

q(q times) ⇒ f (p)= qf

(p

q

)

⇒ f

(p

q

)= f (p)

q= p

q

(since f (p) = p, as p is an integer, positive or negative) ⇒ f is the identity mapon the set of rationals.

Let a and b be real numbers such that a > b. Then a − b > 0 and hence ∃ a realnumber c such that c2 = a − b. Then f (a − b) = f (c2) = (f (c))2 (as f is a ho-momorphism) > 0⇒ f (a)−f (b) > 0. Thus a > b⇒ f (a) > f (b)⇒ f is strictlymonotonic.

Page 206: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 189

Let x be any irrational number. Then ∃ rational numbers an and bn such thatan < x < bn and an − bn→ 0 as n→∞.

So, f (an) < f (x) < f (bn) (as f preserves ordering) ⇒ an < f (x) < bn (as f

is identity on the set of rationals) ⇒ |x − f (x)| < |an − bn| ⇒ x − f (x)→ 0⇒f (x)= x.]

Problem 3 Show that there is at most one isomorphism under which an arbitraryring R is isomorphic to the ring Z.

[Hint. Suppose f,g : R → Z are isomorphisms of rings. Then g−1 : Z→ R isalso an isomorphism.

Hence f ◦ g−1 : Z→ Z is necessarily a homomorphism.Then f ◦ g−1 = identity homomorphism on Z (by Problem 2)⇒ f = g.]

Problem 4 Let F be an arbitrary field. Show that F [x] is not a field.[Hint. Let f (x) ∈ F [x] be such that degf (x) > 0. Suppose ∃ a non-zero poly-

nomial g(x) ∈ F [x] such that f (x)g(x)= 1.Then deg[f (x)g(x)] = degf (x) + degg(x) > 0 ⇒ a contradiction, since

deg 1= 0⇒ F [x] is not a field.]

Remark The only invertible elements of F [x] are constant polynomials exceptingzero polynomial.

Problem 5 Let D be an integral domain and K be its quotient field. Show that thefield of rational functions D〈x〉 over D is the same as the field of rational functionsover K .

Problem 6 A finite division ring is commutative. This result is known as Wedder-burn theorem on finite division rings.

[Hint. See Sect. 7.2, Herstein (1964).]

Problems and Supplementary Examples (SE-I)

1 Let F be a finite field of characteristic p (p is prime). Let f : F → F be the mapdefined by f (x)= xp . Then f is an automorphism of F .

Solution ∀a, b ∈ F , (a + b)p = ap + pc1ap−1b+ · · · + pcr a

p−rbr + · · · + bp (seeEx. 12 of Exercises-I) and (ab)p = apbp . Since p divides the binomial coeffi-cient pcr for 1≤ r ≤ p − 1, (a + b)p = ap + bp (see Ex. 14 of Exercises-I). Con-sequently, f (ab) = f (a)f (b) and f (a + b) = f (a) + f (b) ∀a, b ∈ F ⇒ f is ahomomorphism. Now kerf = {0} ⇒ f is a monomorphism. As F is finite, f is anepimorphism. Consequently, f is an automorphism of F .

2 Let F be a field. Then the groups (F − {0}, ·) and (F,+) cannot be isomorphic.

Solution Let f : (F − {0}, ·)→ (F,+) be an isomorphism. Then we claim thatcharacteristic of F is 2. Otherwise, 0 = f (1) = f ((−1) · (−1)) = f (−1) +

Page 207: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

190 4 Rings: Introductory Concepts

f (−1) �= 0 by Theorem 4.3.1 ⇒ a contradiction. Let a ∈ F − {0}. Then f (a2) =f (a · a) = f (a)+ f (a) = 0= f (1)⇒ a2 = 1 as f is a monomorphism ⇒ a = 1(or −1) in this case⇒ |F | = 2⇒ |F − {0}| = 1. Thus f is a bijection from a set oforder 1 to a set of order 2⇒ a contradiction.

3 Let R be a ring such that |R|> 1 and for each non-zero x ∈ R there is a uniquey ∈R satisfying xyx = x. Then

(i) R has no zero divisors;(ii) yxy = y;

(iii) R has an identity;(iv) R is a division ring.

4 Let f : R→D be a ring homomorphism, where R is a ring with identity 1 andD is an integral domain with identity 1′. If kerf �=R, then f (1)= 1′.

Solution Suppose f (1) = 0. Then ∀x ∈ R, f (x) = f (x1) = f (x)f (1) = 0 ⇒kerf = R ⇒ a contradiction ⇒ f (1) �= 0. Now 1′f (1) = f (1) = f (1 · 1) =f (1)f (1)⇒ f (1)= 1′.

5 Let f :R→ S be a ring homomorphism, where R is a field and 1S = 1′ �= 0 in S.Then f is a monomorphism.

Solution Let a �= 0 be in R. We claim that f (a) �= 0. Since R is a field, a has aninverse a−1 in R. Hence 1′ = f (1)= f (aa−1)= f (a) · f (a−1). If f (a)= 0, then1′ = 0f (a−1) = 0, it is a contradiction, since 1′ �= 0 in S. Thus kerf contains noelement of R except 0 and hence f is a monomorphism.

6 If R and S are two rings, their direct sum denoted by R⊕S is the ring consistingof the pairs (x, y) with x ∈R and y ∈ S, with addition and multiplication given by

(x1, y1)+ (x2, y2)= (x1 + x2, y1 + y2),

(x1, y1) · (x2, y2)= (x1x2, y1y2).

The direct sum of any number of rings is defined in a similar way.

(a) R ⊕ S is not an integral domain, since ∀x ∈ R, ∀y ∈ S, (x,0) · (0, y)= (0,0),which is the zero element of R⊕ S.

(b) The direct sum S = R ⊕ R ⊕ · · · ⊕ R of n-copies of R can be viewed as thering of functions on a set of n elements viz. {1,2, . . . , n} with values in R; theelement (x1, x2, . . . , xn) ∈R⊕R⊕· · ·⊕R can be identified with the function f

given by f (i)= xi . Addition and multiplication of functions are given as usualby operating on their values in R. Clearly, S is a ring.

(c) If i ∈ N+, then P =∑⊕Ri can be viewed as the set of all infinite sequences(x1, x2, . . . , xn, . . .) such that xi ∈Ri for each i ∈N+. Clearly, P is a ring.

Page 208: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 191

7 Let R be a ring isomorphic to a subring A of a ring T . Then there exists anextension S of the ring R such that S is isomorphic to T .

Proof Construct S by S =R∪ (T −A). As R is isomorphic to A, ∃ an isomorphismf :R→A. Hence we can define a bijective map g : S→ T given by

g(u)= f (u), if u ∈R

= u, if u ∈ T −A= S −R.

Define addition + and multiplication · on S by

u+ v = g−1(g(u)+ g(v))

and uv = g−1(g(u)g(v)), ∀u,v ∈ S (4.2)

Hence g(u + v) = g(u) + g(v) and g(uv) = g(u)g(v) ∀u,v ∈ S ⇒ g is a homo-morphism. Consequently, g is an isomorphism. Hence S is a ring. To show that R

is a subring of S, take u,v ∈ R. Then f (u) = g(u), f (v) = g(v), f (u)+ f (v) =g(u)+ g(v) and f (u)f (v) = g(u)g(v)⇒ u+ v = f−1(f (u)+ f (v)) = the sumof u and v as originally defined in R and uv = f−1(f (u)f (v))= the product of u

and v as originally defined in R.Hence the original composition + and · defined in R are the restrictions of the

corresponding compositions defined in S by (4.2). Consequently, R is a subring ofS and so S is an extension of R. �

8 A field F is said to be perfect iff either charF is 0 or its Frobenius homomor-phism (see Example (iii) or Ex. 15 of Exercises-I) is an epimorphism. Then anyfinite field is perfect.

9 Let R be a ring and the elements a, b, c, d ∈R satisfy the condition

a + b= c+ d

a · b= c · d

}⇒ either a = c, b= d or a = d, b= c.

Then R does not contain any divisor of zero.

Solution If possible, let R contains divisor of zero. Then there exist non-zero ele-ments a, b ∈R such that a · b= 0. Now by hypothesis

a + b= (a + b)+ 0

a · b= (a + b) · 0

}⇒ either a = a + b, b= 0 or a = 0, b= a + b.

In both cases, either a = 0 or b= 0, a contradiction. Hence, R does not contain anydivisor of zero.

10 A ring R with 1 is a division ring iff for each x (�=1) ∈ R ∃y ∈ R such thatx + y = xy.

Page 209: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

192 4 Rings: Introductory Concepts

Solution Let for each x (�=1) ∈ R, ∃y ∈ R such that x + y = xy. Let a (�=0) ∈ R.Let a = 1. Then a is the inverse of itself. Next let a �= 1. Now 1 − a �= 1 (sincea �= 0). Then by hypothesis, ∃y ∈R such that (1−a)+y = (1−a)y⇒ 1−a+y =y−ay⇒ 1−a =−ay⇒ 1= a(1−y)⇒ a has a right inverse in R. Then it followsthat a has also a left inverse in R. Thus every non-zero element of R has an inverse inR⇒R is a division ring. Conversely, let R be a division ring. Let x (�=1) ∈R. Thenx − 1 �= 0⇒ its inverse (x − 1)−1 exists in R⇒ x(x − 1)−1 = y (say) ∈ R. Now,(x + y)(x − 1)= x(x − 1)+ x(x − 1)−1(x − 1)= x2 and (xy)(x − 1)= x · x(x −1)−1(x − 1)= x2 ⇒ (x + y)(x − 1)= (xy)(x − 1)⇒ (x + y)(x − 1)(x − 1)−1 =(xy)(x − 1)(x − 1)−1 ⇒ x + y = xy.

11 Find the non-trivial ring homomorphisms from (Z,+, ·) to (Q,+, ·).

Solution Let f : Z→ Q be a non-trivial ring homomorphism. Now f (1) ∈ Q⇒either f (1)= 0 or f (1) �= 0. If f (1)= 0, then f (x)= f (x · 1)= f (x) · f (1)= 0,∀x ∈ Z ⇒ f = 0 ⇒ a contradiction, since f �= 0 by hypothesis ⇒ f (1) �= 0.Let f (1) = p/q , p �= 0, q > 0. Then f (1) = f (1 · 1) = f (1)f (1) ⇒ p/q =p/q · p/q ⇒ p/q = 1 ⇒ p = q ⇒ f (1) = 1 ⇒ f (n) = n, ∀n ∈ Z by Prob-lem 2.

12 Let F be a field of characteristic p (�=0). Then ∃ only one group homomor-phism: f : (F,+)→ (F − {0}, ·).

Solution Let f,g : (F,+) → (F − {0}, ·) be two group homomorphisms. Thenf (0)= 1= g(0).

Again

∀x ∈ F, px = 0 by hypothesis

⇒ f (px)= f (0)= g(0)= g(px)

⇒ (f (x))p = (g(x)

)p

⇒ (f (x))p − (g(x)

)p = 0.

If p is an odd prime, then (f (x))p − (g(x))p = 0⇒ (f (x))p + (−1)p(g(x))p =0⇒ (f (x))p + ((−1)g(x))p = 0⇒ (f (x)+ (−1)g(x))p = 0 by Ex. 1 of SE-I ⇒(f (x)− g(x))p = 0⇒ f (x)− g(x)= 0⇒ f (x)= g(x) ∀x ∈ F ⇒ f = g.

If p = 2, then (f (x))2− (g(x))2 = 0⇒ (f (x))2+ (g(x))2 = 0, (since chF = 2,a =−a ∀a ∈ F ) ⇒ (f (x)+ g(x))2 = 0, since chF = 2⇒ f (x)+ g(x)= 0 ∀x ∈F ⇒ f (x)=−g(x)= g(x) ∀x ∈ F , since chF = 2.

Thus f (x) = g(x) ∀x ∈ F ⇒ f = g ⇒ ∃ only one group homomorphism f :(F,+)→ (F − {0}, ·).

13 Every finite subgroup of the multiplicative group G= (F − {0}, ·) of a field F

is cyclic.

Page 210: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 193

Solution Use the structure theorem of a finitely generated abelian group to show that

G∼= Zn1 ⊕Zn2 ⊕ · · · ⊕Znt ,

where n1|n2| · · · |nt .We claim that t = 1. If t > 1, let a prime p be a divisor of n1. The cyclic group

Zn1 has p elements of order p and similarly, Zn2 has p elements of order p. HenceG has at least p2 elements of order p. All the elements of order p in G are the rootsof the polynomial xp − 1 over the field F . But it cannot have more than p roots.Hence the contradiction implies that t = 1. This shows that G is cyclic.

4.8.1 Exercises

Exercises-I

1. Let Z[i] = {a+ bi : a, b are integers and i2 =−1}. Show that Z[i] forms a ringunder the compositions (a+ bi)+ (c+ di)= (a+ c)+ (b+ d)i, (a+ bi)(c+di)= (ac− bd)+ (ad + bc)i.

Z[i] is called Gaussian ring in honor of C ·F Gauss (1777–1855). For moreresult on Z[i] see Chap. 11.

2. Let G be an (additive) abelian group. Define an operation in G by ab = 0∀a, b ∈G. Show that (G,+, ·) is a ring.

3. Let F denote the set of all real-valued functions, defined on the closed intervalI = [0,1]. Show that F forms a ring under the compositions (f + g)(x) =f (x)+ g(x), (f · g)(x)= f (x)g(x), ∀f,g ∈ F and x ∈ I (F is called ring offunctions).

4. A ring B with identity in which a2 = a ∀a ∈ B (i.e., in which every element isidempotent) is called a Boolean ring. Show that

(i) in a Boolean ring B , a + a = 0 ∀a ∈ B;(ii) a Boolean ring is commutative;

(iii) the power set P(A) of a given set A forms a Boolean ring under the com-positions:

X+ Y = (X− Y)∪ (Y −X) and XY =X ∩ Y, ∀X,Y ∈P(A).

5. An element a in ring R satisfying an = 0 for some positive integer n is called anilpotent element. Show that

(i) a nilpotent element is a zero divisor (unless R = {0}) but its converse is nottrue in general;

(ii) the residue class ring Zn contains nilpotent elements iff n has a squarefactor.

6. Show that any ring (R,+, ·) in which a + b= ab ∀a, b ∈R is the zero ring.7. If the set A contains more than one element, prove that every non-empty proper

subset of A is a zero divisor in the ring P(A) [see Exercise 4(iii)].

Page 211: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

194 4 Rings: Introductory Concepts

8. Let R be a ring with identity element 1 and without zero divisors. Show that fora, b ∈R

(i) ab= 1⇔ ba = 1;(ii) a2 = 1⇒ either a = 1 or a =−1.

9. Find the number of ring homomorphisms from the ring Z12 into Z28.10. Let G= {Xi : i ∈ I } be any multiplicative group and R any commutative ring

with identity. Consider the set R(G) of all formal sums∑

i∈I aixi for ai ∈ R

and xi ∈G, where all but a finite number of ai ’s are 0. Two such expressionsare said to be equal iff they have the same coefficients. Define + and · in R(G)

by(∑

i∈I

aixi

)+(∑

i∈I

bixi

)=∑

i∈I

(ai + bi)xi and

(∑

i∈I

aixi

)·(∑

i∈I

bixi

)=∑

i∈I

cixi,

where ci =∑ajbk and summation is extended over all subscripts j and k forwhich xjxk = xi . Show that (R(G),+, ·) forms a ring (R(G) is called the groupring of G over R).

11. (a) Show that a ring R is commutative iff (a+ b)2 = a2+ 2ab+ b2 ∀a, b ∈R.(b) Let R be a ring with identity and centR the center of R. Then prove that

(i) if xn+1− xn ∈ centR ∀x ∈R and for a fixed positive integer n, then R

is commutative;(ii) if xm − xn ∈ centR ∀x ∈ centR and for fixed relatively prime positive

integers m and n, one of which is even, then R is commutative.

12. Let R be a commutative ring with 1. Prove by induction the binomial expansion:(a + b)n = an + nC1a

n−1b+ · · · + nCran−rbr + · · · + bn for a, b ∈ R and for

every positive integer n, where nCr has the usual meaning.13. Let R be a commutative ring. If the elements a and b of R are nilpotent, prove

that (a + b) is also nilpotent. Show that the result may not be true if R is notcommutative.

14. For any two elements a, b in a field of positive prime characteristic p, show that(a ± b)p = ap ± bp .

15. Let R be a field of positive characteristic p. Show that

(i) ∀a, b ∈R, (a + b)pm = apm + bpm

, where m is a positive integer;(ii) the map R→ R given by r �→ rp is a homomorphism of rings (called the

Frobenius homomorphism), which is a monomorphism but not an isomor-phism in general.

16. Let R be a commutative ring with 1. If x is a nilpotent element of R, show that1+ x is a unit in R. Deduce that the sum of a nilpotent element and a unit is aunit.

[Hint. (1+ x)−1 = 1− x + x2 + · · · + (−1)n−1xn−1, where xn = 0.]

Page 212: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 195

17. Show that the commutative property of addition is a consequence of other prop-erties of a ring if

(i) R contains an identity element 1 or(ii) R contains at least one element, which is not a divisor of zero.

18. Let D be an integral domain and a, b ∈ D. If m and n are relatively primepositive integers such that an = bn and am = bm. Show that a = b.

19. Let R be a ring. Prove that for any subset X (�=∅) of R, the set 〈X〉 =⋂{S :X ⊆ S;S is subring of R} is the smallest (in the sense of inclusion) sub-ring of R to contain X. (〈X〉 is called the subring generated by X.)

20. Let R be a ring with identity and S a subring of R. Suppose a �∈ S and 〈S,a〉 isthe subring generated by the set S ∪ {a}. If a ∈ centR, show that

〈S,a〉 ={

n∑

i=0

riai : n is a positive integer; ri ∈ S

}.

21. Show that every ring with 1 can be embedded in a ring of endomorphisms ofsome additive abelian group.

22. Let M be the ring of all real matrices of the form(

a b−b a

)and C the field of

complex numbers. Define f : C→M by f (a + ib)= ( a b−b a

). Show that f is

an isomorphism of rings and so M is a field.23. Let H be the division ring of real quaternions and R the division ring defined

in Example 4.1.3(ii). Show that R is isomorphic to H .[Hint. Define an isomorphism f :H → R given by 1 �→ ( 1 0

0 1

), i �→ ( i 0

0 −i

),

j �→ ( 0 1−1 0

), k �→ ( 0 i

i 0

).]

24. Let R be a ring. Prove that the following conditions are equivalent.

(i) R has no non-zero nilpotent elements.(ii) If a ∈R and a2 = 0, then a = 0.

25. Prove that in a finite field every element can be expressed as a sum of twosquares.

26. In this exercise a ring means a commutative ring with identity. Let A bea ring �= {0}. Show that A is a field ⇔ every homomorphism of A into a non-zero ring B is a monomorphism.

27. Let L be a lattice in which sup and inf of two elements a and b are denoted bya ∨ b and a ∧ b, respectively. L is a Boolean lattice (or Boolean algebra) iff

(i) L has a least element and a greatest element (denoted by 0 and 1, respec-tively);

(ii) each of ∨ and ∧ is distributive over the other;(iii) each a ∈ L has a unique complement a′ ∈ L such that a ∨ a′ = 1 and

a ∧ a′ = 0.

(For example, P(X), the set of all subsets of X, ordered by inclusion is aBoolean lattice.)

Page 213: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

196 4 Rings: Introductory Concepts

(a) Let L be a Boolean lattice. Define addition and multiplication in L by therules

a + b= (a ∧ b′)∨ (a′ ∧ b

)and ab= a ∧ b.

Show that L becomes a Boolean ring (Exercise 4).Conversely, let A be a Boolean ring. Define an ordering on A as follows:

a ≤ b⇒ a = ab.Show that (A,≤) is a Boolean lattice.

Remark The sup and inf are given by a ∨ b = a + b+ ab and a ∧ b = ab andthe complement a′ = 1− a.

(b) Show that there is a one-to-one correspondence between (isomorphismclasses of) Boolean rings and (isomorphism classes of) Boolean lattices.

28. We consider only rings with identity. Let B be a ring and A be a subring of B

such that 1 ∈ A. An element x ∈ B is said to be integral over A, iff x satisfiesan equation of the form:

xn + a1xn−1 + · · · + an = 0, where the ai’s are elements of A.

If every element of x ∈ B is integral over A, then B is said to be integral over A.Prove the following:Let A ⊆ B be an integral domain and B be integral over A. Then B is a

field⇔A is a field.29. Polynomials in several variables (indeterminates). Let R be a ring and R1 =

R[x1] be the polynomial ring over R in variable x1. Consider the polynomialring R1[x2] over R1, where the variable is x2. Then R[x1, x2] =R1[x2] consistsof all polynomials:

(∑c0ix

i1

)+(∑

c1ixi1

)x2 + · · · +

(∑cnix

i1

)xn

2 ,

n= 0,1,2, . . . , where summation is finite in each case. R[x1, x2] is called thepolynomial ring over R in the two variables x1 and x2. The concept can nowbe generalized. The polynomial ring R[x1, x2, . . . , xn] over R in the n variablesx1, x2, . . . , xn is defined recursively by R[x1, x2, . . . , xn] = Rn−1[xn], whereRn−1 = R[x1, x2, . . . , xn−1] for n= 2,3, . . . and R0 = R. Clearly, the polyno-mial ring remains the same by any permutation of the variables.

Thus the ring R[x1, x2, . . . , xn] is the set of all functions f : Nn → R suchthat f (u) �= 0 for almost a finite number of elements u of Nn for each positiveinteger n together with addition and multiplication defined by

(f + g)(u)= f (u)+ g(u) and (fg)(u)=∑

v+w=uv,w∈Nn

f (v)g(w),

where f,g ∈R[x1, x2, . . . , xn] and u ∈Nn.

Page 214: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 197

Prove that

(i) if R is a commutative ring with identity or a ring without zero divisor or anintegral domain, then so is R[x1, x2, . . . , xn];

(ii) the map R→R[x1, x2, . . . , xn] given by r �→ fr , where fr(0,0, . . . ,0)= r

and fr(u)= 0 for all other u ∈Nn, is a monomorphism of rings.

Remark R is identified with its isomorphic image under the map (ii) and henceR is considered as a subring of R[x1, x2, . . . , xn].

30. Topological rings. A set R is said to be a topological ring iff

(i) R is a ring;(ii) R is a topological space;

(iii) the algebraic operations defined on R are continuous.In the event that R is a division ring it is said to be a topological division

ring iff in addition the following condition is satisfied:(iv) for any a (�=0) ∈ R and for any arbitrary neighborhood W of a−1,

∃ a neighborhood U of a satisfying the condition U−1 ⊂W .A commutative topological division ring is called a topological field.

(a) Show that (i) the field of real numbers, the field of complex numbers,the field of power series over the field of residue classes Zp are topo-logical fields.

(ii) The division ring of quaternions is a topological division ring.(b) (Pontryagin 1939) Prove that a continuous algebraic division ring (i.e.,

a locally compact non-discrete topological division ring), if connectedand locally compact, is isomorphic either to the real field, or to thecomplex field or to the quaternion division ring.

(c) Using (b) prove that every connected locally compact division ring isisomorphic either to the field of real numbers or to the field of complexnumbers or to the division ring of quaternions.

Exercises A (Objective Type) Identify the correct alternative(s) (may be morethan one) from the following list:

1. Let R = {( a −bc d

) : a, b ∈ R}. Then under usual matrix addition and usual mul-

tiplication

(a) R is a non-commutative ring.(b) R is a commutative ring but not a field.(c) R is a field.(d) R is an integral domain but not a field.

2. Let R = (Zn,+, ·) be the ring of integers modulo n. If n is a composite number,then

(a) R is an integral domain.(b) R is a commutative ring but not an integral domain.

Page 215: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

198 4 Rings: Introductory Concepts

(c) R is a field.(d) R is an integral domain but not a field.

3. Let R = (M2(R),+, ·) be the ring of real matrices of order 2. If S = {( x 00 0

) :x ∈R

}, then

(a) S is a subring of R having no multiplicative identity.(b) S is a subring of R having multiplicative identity 1S such that 1S = 1R ,

where 1R is the multiplicative identity element of R.(c) S is a subring of R such that 1S �= 1R .(d) S is not a subring of R.

4. Let (Z,+, ·) be the ring of integers and f : Z→ Z be a ring homomorphismsuch that f (1)= 1. Then

(a) f is a monomorphism but not an epimorphism.(b) f is an epimorphism but not a monomorphism.(c) f is an automorphism.(d) f is neither a monomorphism nor an epimorphism.

5. Let (Q,+, ·) be the field of rational numbers and f :Q→Q be a ring homo-morphism such that f (1) �= 0. Then

(a) f is a monomorphism but not an epimorphism.(b) f is an epimorphism but not a monomorphism.(c) f is an isomorphism.(d) f is neither a monomorphism nor an epimorphism.

6. The number of automorphisms of the field of real numbers is

(a) one (b) infinitely many (c) two (d) zero.

7. Let (Z,+, ·) be the ring of integers and f : Z→ Z be defined by f (x)=−x,∀x ∈ Z. Then

(a) f is a group homomorphism but not a ring homomorphism.(b) f is a ring homomorphism.(c) f is neither a ring homomorphism nor a group homomorphism.(d) f is a ring isomorphism.

8. Let R[x] be the polynomial ring with real coefficients. Then

(a) R[x] is a field.(b) R[x] is an integral domain but not a field.(c) R[x] is a commutative ring with zero divisors.(d) R[x] is a commutative ring with no multiplicative identity.

9. Let R = C([0,1]) be the set of all real-valued continuous functions on [0,1].Define + and · on C([1,0]) by

(f + g)(x)= f (x)+ g(x)

(f · g)(x)= f (x) · g(x),

}∀f,g ∈ C

([0,1]) and ∀x ∈ [0,1].

Page 216: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

4.8 Problems and Supplementary Examples 199

Then

(a) (R,+, ·) is not a ring.(b) (R,+, ·) is a ring but not an integral domain.(c) (R,+, ·) is an integral domain.(d) (R,+, ·) is not a non-commutative ring with zero divisors.

10. Let (M,+) be an abelian group and R = End(M) be the set of all endomor-phisms on M , i.e., End(M) be the set of all group endomorphisms of M intoitself. Define + and · on R by

(f + g)(x)= f (x)+ g(x)

(f · g)(x)= f(g(x)),

}∀f,g ∈R and ∀x ∈M.

Then

(a) (R,+, ·) is not a ring.(b) (R,+, ·) is a commutative ring.(c) (R,+, ·) is a non-commutative ring with identity element.(d) (R,+, ·) is an integral domain.

11. Let (Z,+, ·) be the ring of integers and R = End(Z) be the set of all endomor-phisms of (Z,+), i.e., End(Z) be the set of all group homomorphisms of Z intoitself. Define + and · on R by

(f + g)(x)= f (x)+ g(x)

(f · g)(x)= f(g(x)),

}∀f,g ∈R and ∀x ∈ Z.

Define f : Z→ R by f (n) = fn, where fn : Z→ Z is given by fn(x) = nx,∀x ∈ Z. Then

(a) f is not a ring homomorphism.(b) f is a ring homomorphism but not a ring monomorphism.(c) f is a ring isomorphism.(d) f is a ring homomorphism but not a ring epimorphism.

12. Let R = C([0,1]) be the ring of all real-valued continuous functions on [0,1]and ψ : R→ R (where R is the set of all real numbers) be the map defined byψ(f )= f (1/5). Then

(a) ψ is a ring epimorphism.(b) ψ is a ring homomorphism but not a ring monomorphism.(c) ψ is a ring monomorphism.(d) ψ is ring homomorphism but not a ring epimorphism.

13. The ring Z and Z×Z are not isomorphic. Because

(a) one is commutative but the other is not.(b) one has zero divisor but the other has not.

Page 217: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

200 4 Rings: Introductory Concepts

(c) their cardinalities are different.(d) one is countable but the other is not.

14. Let C = {f : R → R : f is continuous on R} and D = {f ∈ C : f isdifferentiable on R} Define + and · on C by

(f + g)(x)= f (x)+ g(x)

(f · g)(x)= f (x) · g(x),

}∀f,g ∈ C and ∀x ∈R.

Then

(a) C is not a ring.(b) C is ring but D is not a subring of C.(c) C is ring and D is a subring of C.(d) both C and D are integral domains.

15. Let Q be the field of all rational numbers. Then the number of non-trivial fieldhomomorphisms of Q into itself is

(a) one (b) two (c) zero (d) infinitely many.

16. Let (Z,+, ·) be the ring of integers and (E,+, ·) be ring of even integers. Then

(a) E is an integral domain.(b) Z and E are isomorphic rings.(c) Z and E are non-isomorphic rings.(d) both Z and E are integral domains.

17. Let n be the number of non-trivial ring homomorphisms from the ring Z12 tothe ring Z28. Then n is

(a) 7 (b) 1 (c) 3 (d) 4.

18. Which of the following rings are integral domains?

(a) R[x], the ring of all polynomials in one variable with real coefficients.(b) D[0,1], the ring of continuously differentiable real-valued functions on the

interval [0,1] (with respect to pointwise addition and pointwise multiplica-tion).

(c) C[x], the ring of all polynomials in one variable with complex coefficients.(d) Mn(R), the ring of all n× n matrices with real entries.

Exercises B (True/False Statements) Determine the correct statement with jus-tification:

1. The ring Z×Z is an integral domain.2. The rings (Z(

√2),+, ·) and (Z(

√3),+, ·) are isomorphic, where Z(

√2) =

{a + b√

2 : a, b ∈ Z} and Z(√

3)= {c+ d√

3 : c, d ∈ Z}.3. There exists a commutative ring R with 1 such that the rings (R[x],+, ·) and

(Z,+, ·) are isomorphic.4. The field of quotient of (Z,+, ·) is isomorphic to (Q,+, ·).

Page 218: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 201

5. Every non-zero element of an integral domain D is a unit in the quotient fieldQ(D) of D.

6. The quotient fields of two isomorphic integral domains are isomorphic.7. Let R be a commutative ring such that a2 = a, ∀a ∈R. Then a =−a, ∀a ∈R.8. The rings (Zn,+, ·) and End(Zn,+) are isomorphic.9. The ring End(Zp,+) is a field for every prime p > 1.

10. The rings (Z2 ×Z2,+, ·) and End(Z2 ×Z2,+) are isomorphic.11. Any homomorphism of a field F onto itself is an automorphism of F .12. A non-zero element (a) ∈ Zn is invertible in the ring Zn⇔ gcd(a,n)= 1.13. A commutative ring D with 1 is an integral domain⇔D is a subring of a field.14. Every field contains a subfield F such that F is isomorphic either to the field Q

or to one of the fields Zp for some prime p.15. The invertible elements of R�x� are precisely the power series in R�x� with

non-zero constant terms.

4.9 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Artin 1991;Atiya and Macdonald 1969; Birkoff and Mac Lane 1965; Burtan 1968; Chatterjeeet al. 2003; Fraleigh 1982; Herstein 1964; Hungerford 1974; Jacobson 1974, 1980;Lang 1965; McCoy 1964; Simmons 1963; van der Waerden 1970) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Atiya, M.F., Macdonald, I.G.: Introduction to Commutative Algebra. Addison-Wesley, Reading

(1969)Birkoff, G., Mac Lane, S.: A Survey of Modern Algebra. Macmillan, New York (1965)Burtan, D.M.: A First Course in Rings and Ideals. Addison-Wesley, Reading (1968)Chatterjee, B.C., Ganguly, S., Adhikari, M.R.: A Text Book of Topology. Asian Books, New Delhi

(2003)Dugundji, J.: Topology. Universal Book Stall, New Delhi (1980) (Indian Reprint)Fraleigh, J.B.: A First Course in Abstract Algebra. Addison-Wesley, Reading (1982)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hungerford, T.W.: Algebra. Springer, New York (1974)Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)McCoy, N.: Theory of Rings. Macmillan, New York (1964)Pontryagin, L.: Topological Groups. Princeton University Press, Princeton (1939)Simmons, G.F.: Topology and Modern Analysis. McGraw-Hill Book, New York (1963)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)

Page 219: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 5Ideals of Rings: Introductory Concepts

In this chapter we continue the study of theory of rings with the help of ideals andwe show how to construct isomorphic replicas of all homomorphic images of a spec-ified abstract ring. In ring theory, an ideal is a special subring of a ring. The conceptof ideals generalizes many important properties of integers. Ideals and homomor-phisms of rings are closely related. Like normal subgroups in the theory of groups,ideals play an analogous role in the study of rings. The real significance of ideals ina ring is that they enable us to construct other rings which are associated with thefirst in a natural way. Commutative rings and their ideals are closely related. Theirrelations develop ring theory and are applied in many areas of mathematics, such asnumber theory, algebraic geometry, topology and functional analysis. In this chap-ter basic concepts of ideals are introduced with many illustrative examples. Ideals ofrings of continuous functions and the Chinese Remainder Theorem for rings with itsapplications are studied. We study ideals of various important rings and prove differ-ent isomorphism theorems. Moreover, applications of ideals to algebraic geometryand the Zariski topology are discussed in this chapter.

5.1 Ideals: Introductory concepts

The concept of ideals came through the work of Cartan, J.H. Wedderburn, E.Noether, E. Artin. Many others also made its significant applications in the theoryof rings and algebras. An ideal of a ring R is a subring of R which is closed withrespect to multiplication on both sides by every element of R. It is now important tocarry over many results of group theory related to normal subgroups to ring theory.Ideals of commutative rings are developed in the study of commutative algebra andapplied to many areas of mathematics. The theory of ideals of rings of algebraic in-tegers prescribes methods for solving many problems of number theory. Analogousto a normal subgroup, a subring that is the kernel of a ring homomorphism is whatwe call an ideal.

Unless otherwise stated, R will denote an arbitrary ring having more than oneelement.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_5, © Springer India 2014

203

Page 220: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

204 5 Ideals of Rings: Introductory Concepts

Definition 5.1.1 Let A be a non-empty subset of a ring R such that A is an additivesubgroup of R. Then

(i) A is a left ideal of R iff ra ∈A for each a ∈A and r ∈R;(ii) A is a right ideal of R iff ar ∈A for each a ∈A and r ∈R;

(iii) A is an ideal of R iff it is both a left ideal of R and a right ideal of R.

Remark Conditions (i) and (ii) assert that A swallows up multiplication from theleft and from the right by arbitrary elements of the ring respectively.

R has two obvious ideals, namely, {0} and R itself.Clearly, if the ring R is commutative, the concepts of left-, right- and two-sided

ideals coincide.

Remark Let A be a left ideal (right ideal) of R. Then a, b ∈A⇒ a−b, ab ∈A⇒A

is a subring of R (by Theorem 4.2.1).

The converse of the result is not true.

Example 5.1.1 (a) Let R be a ring. Consider the matrix ring M2(R). Then in M2(R)

(i) the subring A= {( a b0 0

) : a, b ∈R}

is a right ideal but not a left ideal;

(ii) the subring B = {( a 0b 0

) : a, b ∈R}

is a left ideal but not a right ideal;

(iii) the subring C = {( a 00 0

) : a ∈R}

is neither a left ideal nor a right ideal.(b) The ring R is not an ideal of R[x], because R does not contain af (x) ∀a ∈R

and ∀f (x) ∈R[x].Theorem 5.1.1 The intersection of any arbitrary collection of (left, right) ideals ofa ring R is a (left, right) ideal of R.

Proof Let {Ai} be an arbitrary collection of ideals of R and M = ⋂i Ai . ThenM �= ∅, since 0 ∈ each Ai ⇒ 0 ∈M . Again a, b ∈M and r ∈ R ⇒ a − b ∈ Ai ,ar, ra ∈Ai for each i⇒ a − b, ar, ra ∈M ⇒M is an ideal of R. �

Ideals generated by a finite number of elements or a single element play an impor-tant role in the study of rings. We now consider an arbitrary ring R and a non-emptysubset A of R. By the symbol 〈A〉 we mean the set

〈A〉 =⋂{I :A⊆ I ; I is an ideal of R}.

Clearly, 〈A〉 �= ∅. Thus 〈A〉 exists and satisfies A ⊆ 〈A〉. Then by Theorem 5.1.1,〈A〉 forms an ideal of R, known as the ideal generated by the set A. Moreover, forany ideal I of R with A⊆ I ⇒〈A〉 ⊆ I ⇒〈A〉 is the smallest ideal of R to containthe set A.

If in particular, A= {a1, a2, . . . , an}, then the ideal which A generates is denotedby 〈a1, a2, . . . , an〉. Such an ideal is said to be finitely generated with a1, a2, . . . , an

as its generators. An ideal 〈a〉 generated by just one element a of R is called aprincipal ideal generated by a.

Page 221: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.1 Ideals: Introductory concepts 205

Remark The forms of the ideal 〈a〉 in cases of commutative and non-commutativerings are given in Ex. 1 in Exercises-I.

Proposition 5.1.1 Every ideal of the ring of integers (Z,+, ·) is a principal ideal.

Proof Clearly, {0} is an ideal of (Z,+, ·). Let A be a non-zero ideal of (Z,+, ·).Then the positive integers in A have a least element u (say) by well ordering prin-ciple (see Chap. 1). Let v ∈ A. By division algorithm, we can express v = qu+ r ,where 0 ≤ r < u. Now r = v − qu ∈ A and u is the least positive integer in A⇒r = 0⇒ v is a multiple of u⇒ A⊆ 〈u〉 = {nu : n ∈ Z} (an ideal) ⊆ A⇒ A= 〈u〉.Thus every ideal of (Z,+, ·) is a principal ideal. �

Remark Let I be an ideal of Z. Then there exists a unique non-negative integer d

such that I = 〈d〉, i.e., I = dZ. This follows from the following fact:The case with zero ideal is trivial. For the case of a non-zero ideal, let dZ= eZ,

for some non-negative integers d and e. Then d divides e and e divides d , resultingin d =±e. As both e and d are non-negative, e= d . In particular, 〈2〉 = Ze , ring ofeven integers forms an ideal of Z. Clearly, 〈0〉 = {0} and 〈1〉 = Z.

Definition 5.1.2 A ring R is said to be a principal ideal ring iff every ideal A of R

is of the form A= 〈a〉 for some a ∈R.

Proposition 5.5.1 shows that (Z,+, ·) is a principal ideal ring.Every ring R has at least two ideals viz. {0} and R. The ideals {0} and R are

called trivial ideals. Any other ideals (if they exist) are called non-trivial ideals. Bya proper ideal of R we mean an ideal different from R.

Definition 5.1.3 A ring R is said to be simple iff it has no non-trivial ideals.

Theorem 5.1.2 A division ring has no non-trivial ideals.

Proof Let R be a division ring and A an ideal of R. If A �= {0}, then A containsan element g �= 0. Now g−1g = 1 ∈ A as g−1 ∈ R. Hence r1 = r ∈ A ∀r ∈ R ⇒R ⊆A. Consequently, R =A. �

Corollary Every division ring is a simple ring.

Remark The converse is not true (see Ex. 2 of the Worked-Out Exercises).

Remark The join of two ideals of a ring R is not necessarily an ideal, since the joinof two subrings is not necessarily a subring.

Definition 5.1.4 The sum (or hcf) of two ideals P and Q of a ring R denoted byP +Q is defined by P +Q= {p+ q : p ∈ P and q ∈Q}.

Page 222: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

206 5 Ideals of Rings: Introductory Concepts

Clearly, P + Q is an ideal of R such that it is the smallest ideal of R whichcontains both P and Q.

Note that the set {pq : p ∈ P and q ∈Q} is not an ideal of R.To avoid this difficulty, we define the product of the ideals P and Q as follows:

Definition 5.1.5 The product of two ideals P and Q of a ring R denoted by PQ isdefined by

PQ={∑

finite

piqi : pi ∈ P and qi ∈Q

}.

Clearly PQ is an ideal of R such that PQ⊆ P ∩Q.

5.2 Quotient Rings

In this section we continue the discussion of ideals. An ideal of a ring producesa new ring, called a quotient ring, which is closely related to the mother ring in anatural way. The concept of a quotient ring is similar to the concept of a quotientgroup and hence the method of construction of a quotient ring is borrowed from thecorresponding construction of a quotient group. In this section we bring over to ringsvarious results, such as homomorphism and isomorphism theorems, correspondencetheorem etc., which are counterparts of the corresponding results of groups andestablish the relation of ideals to homomorphisms.

Let (R,+, ·) be a ring and I an ideal of R. Then (I,+) is a subgroup of theabelian group (R,+) and hence the quotient group (R/I,+) is defined under usualaddition of cosets, i.e., (a + I )+ (b+ I )= a + b+ I , ∀a, b ∈R. In this group, theidentity element is the trivial coset I and the inverse of a + I is −a + I , ∀a ∈R.

Theorem 5.2.1 Given an ideal I of a ring (R,+, ·), the natural (usual) additionand multiplication of cosets, namely, (a+ I )+ (b+ I )= a+b+ I and (a+ I )(b+I )= ab+ I ∀a, b ∈R, make (R/I,+, ·) a ring.

Proof Let x + I = a + I and y + I = b + I . Then x − a ∈ I and y − b ∈ I . Nowxy−ab= xy−xb+xb−ab= x(y−b)+ (x−a)b ∈ I ⇒multiplication of cosetsis well defined. As I is a normal subgroup of R, (R/I,+) is an abelian group. It canbe verified that multiplication in R/I is associative and distributive property holdsin R/I . So, (R/I,+, ·) is a ring. �

Definition 5.2.1 Given an ideal I of a ring R, the ring R/I is called the quotientring or factor ring of R by I (or modulo I ).

Remark If R is a commutative ring with identity, then R/I is also so.This successful construction of the quotient ring by an ideal enables us to bring

over to rings the homomorphism theorems of groups.

Theorem 5.2.2 shows that ideals and homomorphisms of rings are closely related.

Page 223: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.2 Quotient Rings 207

Theorem 5.2.2 If f : R → S is a homomorphism of rings, then K = kerf is anideal of R. Conversely, if I is an ideal of R, then the mapping π : R→ R/I givenby π(r)= r + I is an epimorphism with kernel I.

Proof 0 ∈ kerf ⇒ kerf �= ∅. Let x, y ∈ K and r ∈ R. Then f (x − y) = f (x)−f (y) = 0′ (zero of S) ⇒ x − y ∈ K . Also, f (rx) = f (r)f (x) = f (r) · 0′ = 0′ ⇒rx ∈K . Similarly, xr ∈K . Consequently, K is an ideal of R.

Conversely, let I be an ideal of R. Consider the function π : R→ R/I given byπ(r)= r + I . Now π(r + t)= (r + t)+ I = (r + I )+ (t + I )= π(r)+ π(t) andπ(rt) = rt + I = (r + I )(t + I ) = π(r)π(t), ∀r, t ∈ R ⇒ π is a ring homomor-phism. Clearly, π is an epimorphism.

Now, kerπ = {r ∈ R : π(r) = I } = {r ∈ R : r + I = I } = {r ∈ R : r ∈ I } =I ⇒ I is the kernel of the homomorphism π :R→R/I . �

Corollary I is an ideal of a ring R iff it is the kernel of some homomorphism fromR onto R/I .

Note The homomorphism π : R→ R/I is called the canonical or natural epimor-phism.

Theorem 5.2.3 (Fundamental Homomorphism Theorem or First Isomorphism The-orem) Let (R,+, ·) and (S,+, ·) be rings and f :R→ S be a ring homomorphism.Then

(i) K = kerf is an ideal of R;(ii) the quotient ring (R/K,+, ·) is isomorphic to the image f (R) under the map-

ping f :R/K → S given by f (r +K)= f (r).

Proof (i) follows from Theorem 5.2.2.(ii) First we show that f is well defined and one-one. Now x +K = y +K ⇔

x − y ∈K ⇔ f (x − y)= 0′ ⇔ f (x)− f (y)= 0′ ⇔ f (x)= f (y)⇔ f (x +K)=f (y +K) ∀x, y ∈ R⇒ (forward implication) shows that f is well defined and ⇐(backward implication) shows that f is one-one.

Again,

f((x +K)+ (y +K)

) = f (x + y +K)= f (x + y)= f (x)+ f (y)

= f (x +K)+ f (y +K)

and

f((x +K)(y +K)

) = f (xy +K)= f (xy)= f (x)f (y)

= f (x +K)f (y +K) ∀x, y ∈R

⇒ f is a ring homomorphism.

Page 224: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

208 5 Ideals of Rings: Introductory Concepts

Let x ∈ f (R). Then ∃r ∈R such that f (r)= x. So

f (r +K)= f (r)= x ⇒ f :R/K → f (R) is surjective.

Consequently, f :R/K → f (R) is an isomorphism. �

Note If in particular, f is an epimorphism, then R/K is isomorphic to S.

Corollary Let f : R→ S be a homomorphism of rings with I = kerf . Then thereexists a unique monomorphism f : R/I → S such that f = f ◦ π , where π is thenatural epimorphism π : R→ R/I , also f is an isomorphism, iff f is an epimor-phism.

Proof Define a monomorphism f : R/I → S by f (r + I ) = f (r) ∀r ∈ R. Then(f ◦ π)(r) = f (r + I ) = f (r) ∀r ∈ R ⇒ f = f ◦ π . Moreover, if f is an epi-morphism, then f is an isomorphism by Note after Theorem 5.2.3. Again f isan isomorphism ⇒ f is an epimorphism ⇒ f is an epimorphism. To prove theuniqueness of f , let g : R/I → S be a monomorphism such that f ◦ π = g ◦ π .Now g(r + I )= g(π(r))= (g ◦ π)(r)= (f ◦ π)(r)= f (π(r))= f (r + I ), for allr + I ∈R/I . This implies f = g. �

Theorem 5.2.4 (Correspondence Theorem) Let (R,+, ·) and (S,+, ·) be rings andf : R→ S be an epimorphism. Then there exists a one-to-one correspondence be-tween the collection of ideals of R containing K (=kerf ) and the collection ofideals of S.

Proof Let I (R) and I (S) denote the collection of all ideals of R containing K andthe collection of all ideals of S, respectively. Define f : I (R)→ I (S) by f (T ) =f (T ) ∈ I (S) as f is a homomorphism and so, f (T ) is an ideal of S. Let A,B ∈I (R) and f (A) = f (B). Then f (A) = f (B). We claim that A = B . Let a ∈ A.Then ∃b ∈ B such that f (a)= f (b)⇒ f (a−b)=OS ⇒ a−b ∈ kerf =K ⊆ B ∈I (R)⇒ a = (a − b)+ b ∈ B ⇒ a ∈ B ∀a ∈A⇒A⊆ B . Similarly B ⊆A. HenceA= B . Let M be an element of I (S). Then f−1(M)= f−1(M) is an ideal T (say)of R containing K . So, f (T ) = M as f is an epimorphism (use f (f−1(M)) =M ∩ f (R)=M). Consequently, f is surjective. �

Corollary Let (R,+, ·) be a ring and I an ideal of R. Then the ideals of R/I arein one-to-one correspondence with the ideals of R containing I .

Proof Let π :R→R/I be the canonical epimorphism. Then kerπ = I . Now applyTheorem 5.2.4. �

Remark Any ideal in R/I is of the form π(A) for some ideal A of R containing I .

Page 225: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.3 Prime Ideals and Maximal Ideals 209

5.3 Prime Ideals and Maximal Ideals

In this section, we continue discussion of ideals and quotient rings. More precisely,we study quotient rings R/I with the help of prime and maximal ideals I of R. Soprime and maximal ideals are ideals of special interest. In this section we introducethe concepts of prime ideals and maximal ideals. These two concepts are different ingeneral but coincide for some particular classes of rings. Their characterizations arealso established in this section. We show that prime ideals of Z and prime integersare closely related.

Throughout this section we assume that R is a commutative ring with identity1(�=0).

Definition 5.3.1 A proper ideal P of R is said to be a prime ideal iff for any a, b ∈R, ab ∈ P ⇒ a ∈ P or b ∈ P .

Example 5.3.1 (i) Zero ideal {0} of an integral domain D is a prime ideal, sincefor a, b ∈D, ab= 0⇔ a = 0 or b= 0.

(ii) Consider the ring of integers (Z,+, ·). If p is a prime integer, then theprincipal ideal 〈p〉 in Z is a prime ideal, since mn ∈ 〈p〉 ⇒ p|mn ⇒ p|m orp|n⇒ m ∈ 〈p〉 or n ∈ 〈p〉. The ideal I = 〈6〉 = {6n : n ∈ Z} is not prime, since3 · 2= 6 ∈ I but neither 3 ∈ I nor 2 ∈ I .

Prime ideals of rings may be characterized in terms of their quotient rings.

Theorem 5.3.1 A proper ideal I of a commutative ring R with identity 1 is primeiff the quotient ring R/I is an integral domain.

Proof Since R is a commutative ring with 1, R/I is also a commutative ring withidentity element 1+ I and zero element 0+ I = I .

Let I be prime. Clearly, 1+ I �= I , otherwise 1+ I = I would imply 1 ∈ I andhence I =R, a contradiction, since I is a proper ideal.

We claim that R/I has no zero divisors. Let a + I and b+ I ∈ R/I . Then (a +I )(b+ I )= I ⇒ ab+ I = I ⇒ ab ∈ I ⇒ a ∈ I or b ∈ I ⇒ a + I = I or b+ I =I ⇒R/I has no zero divisors. Consequently, R/I is an integral domain.

Conversely, let R/I be an integral domain and a, b ∈ R such that ab ∈ I . Thenab+ I = I ⇒ (a+ I )(b+ I )= I ⇒ a+ I = I or b+ I = I ⇒ a ∈ I or b ∈ I ⇒ I

is a prime ideal. �

Definition 5.3.2 A proper ideal I of R is said to be a maximal ideal of R iff thereis no ideal J of R such that I � J � R.

Thus I is a maximal ideal of R, iff for every ideal N such that I ⊆ N � R ⇒I =N (or I � N ⊆R⇒N =R).

Page 226: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

210 5 Ideals of Rings: Introductory Concepts

Example 5.3.2 (i) 〈p〉 is a maximal ideal of Z for each prime integer p. To showthis, suppose there exists an ideal J of (Z,+, ·) such that 〈p〉� J . Then ∃ an integern ∈ J such that n /∈ 〈p〉⇒ n is not divisible by p⇒ 1= gcd(n,p). So we can write1= nr + pt for some r, t ∈ Z. Now n ∈ J and p ∈ 〈p〉� J show that 1 ∈ J ⇒ J =Z⇒〈p〉 is a maximal ideal of Z.

(ii) The ideal {0} is a prime ideal of Z but not a maximal ideal, since {0} �〈2〉� Z.

Problem 1 A proper ideal I = 〈n〉 in (Z,+, ·) is prime iff n = 0 or n is a primeinteger.

Solution Let I be a prime ideal of (Z,+, ·). Then by Proposition 5.1.1, I can beexpressed as I = 〈n〉 for some n ≥ 0. If n = 0, then I is prime by Example 5.3.1.Since 〈1〉 = Z, I is not proper for n = 1. Consider n > 1. If possible, let n becomposite, i.e., n= rs, where 1 < r < n, 1 < s < n. Then rs = n ∈ 〈n〉. But neitherr nor s ∈ 〈n〉, otherwise n|r or n|s, which is not possible. So, n cannot be composite.In other words n must be prime. Its converse follows from Example 5.3.1.

Problem 2 A commutative ring with identity 1 is a field iff {0} is a maximal ideal.

Solution Suppose R is a field. Then by Theorem 5.1.2, R has only two ideals {0}and R. Since {0} is the only proper ideal of R, {0} must be a maximal ideal of R.

Conversely, suppose {0} is a maximal ideal of R. Let a (�=0) ∈ R. Now {0} �Ra⇒ Ra = by maximality of {0}. Then 1 ∈ Ra⇒ ta = 1 for some t ∈ R⇒ t =a−1 ∈R. Consequently, R is a field.

In the next theorem, we shall show that maximal ideals of rings may be charac-terized in terms of their quotient rings.

Theorem 5.3.2 Let R be a commutative ring with identity 1. A proper ideal I of R

is a maximal ideal of R iff the quotient ring R/I is a field.

Proof Suppose I is a proper ideal of R such that the quotient ring R/I is a field. Weclaim that I is a maximal ideal of R. Suppose there exists an ideal J of R such thatI � J ⊆R. Then ∃ an element a ∈ J such that a /∈ I . Hence a+ I �= I ⇒ a+ I is anon-zero element of R/I ⇒∃ an element b+ I ∈ R/I such that (b+ I )(a + I )=1+ I (since R/I is a field) ⇒ ba + I = 1+ I ⇒ 1− ba ∈ I ⇒ 1− ba ∈ J (sinceI � J )⇒ 1 ∈ J (since a ∈ J ⇒ ba ∈ J )⇒ J =R⇒ I is maximal.

Conversely, assume that I is a maximal ideal of R. Since R is a commutative ringwith 1 and I is a proper ideal, R/I is a commutative ring with identity 1+ I �= I .Let a+ I be a non-zero element of R/I . Then a+ I �= I ⇒ a /∈ I . Consider the setA= {u+ ra : u ∈ I and r ∈R}. Then A is an ideal of R. Now u= u+ 0a⇒ u ∈A.Also, a = 0 + 1a ⇒ a ∈ A. Hence I � A⇒ A = R (by maximality of I ). Then∃ elements u ∈ I and r ∈ R such that 1 = u + ra. Now 1 + I = (u + ra) + I =(u+ I )+ (ra + I ) = ra + I (since u ∈ I , u+ I = I , the zero element of R/I )=

Page 227: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.3 Prime Ideals and Maximal Ideals 211

(r + I )(a + I ). This shows that the inverse of a + I exists in R/I . Consequently,R/I is a field. �

Problem 3 Let R be a commutative ring with 1 (�=0). Show that the followingstatements are equivalent:

(i) R is a field;(ii) R has no non-trivial ideals;

(iii) {0} is a maximal ideal of R.

[Hint. (i)⇒ (ii) (by Theorem 5.1.2)⇒ (iii)⇒ (i) (by Problem 2).]

Remark A commutative ring R with 1 (�=0) is a field⇔ every non-zero homomor-phism f :R→ T of rings is a monomorphism.

Theorem 5.3.3 Let R be a commutative ring with 1. Then every maximal ideal ofR is a prime ideal.

Proof

Let I be a maximal ideal of R and a, b ∈R such that ab ∈ I. (5.1)

We claim that either a ∈ I or b ∈ I . Suppose a /∈ I . Consider the set A= {u+ ra :u ∈ I and r ∈ R}. Then proceeding as in the second part of Theorem 5.3.2, wefind that A = R. Then ∃ elements u ∈ I and r ∈ R such that 1 = u + ra. Henceb= ub+ rab⇒ b ∈ I by (5.1). �

Alternative Proof In this case, I is a maximal ideal of R⇔ R/I is a field ⇒ R/I

is an integral domain⇒ I is a prime ideal of R. �

Remark The converse of Theorem 5.3.3 is not true. It follows from Example 5.3.3.

Example 5.3.3 (i) Let Z be the ring of integers. Consider the ring R = Z×Z, whereoperations are defined componentwise. Then Z× {0} is a prime ideal of R. SinceZ×〈2〉 is an ideal of R such that Z×{0}� Z×〈2〉 ⊂R, Z×{0} cannot be maximalin R.

(ii) See Example 5.3.2(ii).(iii) See Ex. 7 of the Worked-Out Exercises.In the following theorem, we shall now show that in Boolean rings and principal

ideal domains the concepts of prime ideals and maximal ideals coincide.

Theorem 5.3.4 Let R be a Boolean ring. An ideal I of R is prime iff I is a maximalideal.

Proof Let I be a prime ideal of R. We claim that I is a maximal ideal. Let J be anideal of R, such that I � J ⊆ R. Since I � J , ∃ an element a ∈ J such a /∈ I . Now

Page 228: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

212 5 Ideals of Rings: Introductory Concepts

a(1− a)= a − a2 = a − a = 0 ∈ I ⇒ either a ∈ I or 1− a ∈ I ⇒ 1− a ∈ I � J

(as a /∈ I )⇒ 1 ∈ J (as a ∈ J )⇒ J =R⇒ I is a maximal ideal of R.Conversely, if I is a maximal ideal, then I is a prime ideal by Theorem 5.3.3. �

Definition 5.3.3 A principal ideal domain (PID) R is a principal ideal ring whichis an integral domain.

Theorem 5.3.5 Let R be a principal ideal domain. Then a non-trivial ideal I of R

is a prime ideal iff I is a maximal ideal.

Proof Let I be a non-trivial prime ideal of R. Suppose J is an ideal of R such thatI � J ⊆R. Since R is a PID, we write I = 〈a〉 and J = 〈b〉 for some a, b ∈R \ {0}.Now a ∈ 〈a〉� 〈b〉 ⇒ a = rb for some r ∈ R⇒ either r ∈ 〈a〉 or b ∈ 〈a〉 as 〈a〉 isprime. But b /∈ 〈a〉, otherwise 〈b〉 ⊆ 〈a〉 leads to a contradiction. So, r ∈ 〈a〉 ⇒ r =ta for some t ∈ R⇒ a = rb= (ta)b= (tb)a⇒ tb= 1 (as R is an integral domainand a �= 0)⇒ 1 ∈ 〈b〉 = J ⇒ J =R⇒ I is a maximal ideal of R.

The converse part follows from Theorem 5.3.3. �

Corollary A non-trivial ideal of (Z,+, ·) is maximal iff it is prime.

The following theorem is an interesting application of Zorn’s Lemma.

Theorem 5.3.6 If a ring R is finitely generated, then each proper ideal of R iscontained in a maximal ideal.

Proof Let A be a proper ideal of a finitely generated ring R. Suppose R =〈x1, x2, . . . , xn〉. Let D be the set of all ideals B of R satisfying A ⊆ B � R, par-tially ordered by set inclusion. Then A ∈ D⇒ D �= ∅. Consider a chain {Bi : i ∈ I }in D. Then T =⋃i∈I Bi is an ideal of R.

We claim that T is a proper ideal of R. If possible, let T =R = 〈x1, x2, . . . , xn〉.Then each generator xk (k = 1,2, . . . , n) would belong to some ideal Bik of thechain {Bi}. As there are only finitely many Bik , one contains all others, call it Bi .Thus x1, x2, . . . , xn all lie in this one Bi . Consequently, Bi = R, which is not pos-sible. Again A ⊆⋃i Bi = T � R ⇒ T ∈ D. Hence by Zorn’s Lemma the familyD contains a maximal element M . Then M is an ideal of R with A⊆M � R. Weclaim that M is a maximal ideal of R. To show this, let J be an ideal of R such thatM � J ⊆R. Since M is a maximal element of the family D, J /∈D. Accordingly, J

cannot be a proper ideal of R. Hence J = R. This shows that M is a maximal idealof R. �

Corollary (Krull–Zorn) Let R be a ring with identity 1. Then each proper ideal ofR is contained in a maximal ideal of R.

Proof The proof is immediate, since R = 〈1〉, by Theorem 5.3.6. �

Page 229: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.4 Local Rings 213

Remark In Appendix A, we present generalizations of some concepts of rings tothe corresponding concepts for semirings.

5.4 Local Rings

The concept of local rings was introduced by W. Krull (1899–1971) in 1938. Ringswith a unique maximal ideal are of immense interest.

Definition 5.4.1 A local ring is a commutative ring with identity which has aunique maximal ideal.

Since every proper ideal of a ring R with 1 is contained in a maximal ideal of R

(see the Corollary of Theorem 5.3.6), it follows that the unique maximal ideal of alocal ring R contains every proper ideal of the ring.

All fields are local rings.

Example 5.4.1 Let R be a commutative ring with 1 in which the set of all non-unitsof R forms an ideal M . Then R is a local ring. This is so because M is a maximalideal of R and that M contains any proper ideal of R. Such a ring is a local ring.To show this, let I be an ideal of R such that M � I ⊆ R. Then ∃ a unit elementa (say) in I . Hence I = R⇒M is maximal. Next let A be any proper ideal of R.Then every element of A must be non-unit. Hence A⊆M .

We now search for another example of a local ring.

Theorem 5.4.1 For any field F , the power series ring F �x� is a principal idealdomain.

Proof Let A be any proper ideal of F �x�. If A = {0}, then A = 〈0〉. If A �= {0},then ∃ a non-zero power series f (x) ∈A of minimum order r (say), so that f (x)=arx

r+ar+1xr+1+· · · = xr(ar+ar+1x+· · · ), where ar �= 0. Then ar+ar+1x+· · ·

is invertible in F �x� by Lemma 4.5.1 of Sect. 4.5 of Chap. 4. Hence f (x)= xrg(x),where g(x) has an inverse in F �x� ⇒ xr = f (x)g(x)−1 ∈ A⇒ 〈xr 〉 ⊆ A. For thereverse inclusion, let t (x) be any non-zero power series in A of order n. Then r ≤n⇒ t (x) can be written in the form:

t (x)= xr(bnx

n−r + bn+1xn−r+1 + · · · ) ∈ ⟨xr

⟩.

Then A⊆ 〈xr 〉. Consequently, A= 〈xr 〉. �

Corollary For any field F , F �x� is a local ring with 〈x〉 as its maximal ideal.

Proof As the non-trivial ideals of F �x� are given by 〈xr 〉 for positive integers r ≥ 1,it follows that F �x� � 〈x〉� 〈x2〉� · · ·� {0}. This proves the corollary. �

Page 230: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

214 5 Ideals of Rings: Introductory Concepts

5.5 Application to Algebraic Geometry

Classical algebraic geometry arose through the study of the sets of simultaneoussolutions of systems of polynomial equations in n variables over an algebraicallyclosed field, like the field of complex numbers C. The theory of Noetherian ringsand the Hilbert Basis Theorem (to be discussed in Chap. 7), prescribe methods forsolutions of many problems of algebraic geometry. So the ideal theory imposes aconsiderable influence on algebraic geometry. For example, affine varieties play animportant role in algebraic geometry and Zariski topology. Moreover, affine vari-eties are characterized in this section with the help of prime ideals. Oscar Zariskiand André Weil redeveloped the foundation of algebraic geometry in the middle ofthe 20th century.

5.5.1 Affine Algebraic Sets

Let K be an algebraically closed field (i.e., every polynomial of one variable ofdegree ≥1 over K has a root in K). An affine n-space over K , denoted by Kn isthe set of all n-tuples (x)= (x1, x2, . . . , xn) of elements of K . We call K1 the affineline and K2 the affine plane. The n-tuple (x)= (x1, x2, . . . , xn) is called a point ofKn. The n-tuple (x) is called a zero of a polynomial f (x) = f (x1, x2, . . . , xn) ∈K[x1, x2, . . . , xn] iff f (x)= f (x1, x2, . . . , xn)= 0.

Given a subset S of polynomials in K[x1, x2, . . . , xn], the algebraic set of ze-ros of S, denoted by V (S), is the subset of Kn consisting of all common zerosof polynomials in S i.e., V (S) = {(x) ∈ Kn : f (x) = 0 ∀f ∈ S}. A subset A ofKn is called an affine algebraic set, iff ∃ a subset S of K[x1, x2, . . . , xn] such thatA = V (S). An affine algebraic set is sometimes called (simply) an algebraic set.The set of all zeros of a single polynomial f (x1, x2) i.e., the set of points of K2 sat-isfying the polynomial equation f (x1, x2)= 0 over K is called an affine algebraiccurve in the affine plane K2. Similarly, the set of all zeros of a single polynomialequation f (x1, x2, x3) = 0 is called an affine algebraic surface in K3. The affinealgebraic set in K3 determined by two polynomial equations f (x1, x2, x3)= 0 andg(x1, x2, x3)= 0 is called a space curve. If f (x1, x2, . . . , xn) is not a constant, thenthe set of zeros of f is called the hypersurface defined by f and is denoted by V (f ).

We now present some elementary properties of algebraic sets in affine n-space Kn.

Proposition 5.5.1 Let Kn be an affine n-space. Then

(i) P ⊆Q in K[x1, x2, . . . , xn] implies V (P )⊇ V (Q) in Kn.(ii) V (0)=Kn,V (a)= ∅, where a �= 0 and a ∈K .

(iii) If {Pα} is a family of ideals in K[x1, x2, . . . , xn], then V (⋃

α Pα)=⋂α V (Pα).(iv) If P and Q are ideals in K[x1, x2, . . . , xn] and A = V (P ) and B = V (Q),

then A∪B = V (P ∩Q)= V (PQ).(v) Any finite subset of Kn is an algebraic set.

Page 231: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.5 Application to Algebraic Geometry 215

Proof (i) (x) ∈ V (Q)⇔ (x) is a common zero of polynomials of Q⇒ (x) is alsoa common zero of polynomials of P ⇒ (x) ∈ V (P )⇒ V (Q)⊆ V (P ).

(ii) As every point of Kn satisfies the zero polynomial, V (0)=Kn. As the con-stant non-null polynomial ‘a’ has no zero, V (a)= ∅.

(iii) (x) ∈ V (⋃

α Pα)⇔ f (x)= 0 ∀f ∈⋃α Pα ⇔ f (x)= 0 ∀f ∈ Pα , where Pα

is any member of the collection {Pα} ⇔ (x) ∈ V (Pα) ∀α⇔ (x) ∈⋂V (Pα).(iv) (x) ∈A∪B = V (P )∪ V (Q)⇒ (x) is a zero of all polynomials in P or (x)

is a zero of all polynomials in Q⇒ (x) is a zero of all polynomials in P ∩Q⇒ (x)

is a zero of all polynomials in PQ (since PQ⊆ P ∩Q) ⇒A ∪ B ⊆ V (P ∩Q)⊆V (PQ).

Again (x) /∈ A ∪ B ⇒ ∃f ∈ P and g ∈Q such that f (x) �= 0 and g(x) �= 0⇒fg ∈ P ∩ Q (also to PQ) does not vanish at (x) ⇒ (x) /∈ V (P ∩ Q) and also(x) /∈ V (PQ)⇒ the zeros of P ∩Q (as well as PQ) are the points A∪B and onlythese.

(v) Any point (x1, x2, . . . , xn) ∈Kn is an algebraic set, because V (X1−x1,X2−x2, . . . ,Xn − xn)= {(x1, x2, . . . , xn)}. Hence any finite subset A of Kn is an alge-braic set by (iv). �

Using the fact that any algebraic set is of the form V (Pα) it follows from Propo-sition 5.5.1 that

Corollary Let Kn be an affine n-space. Then

(i) the intersection of any collection of algebraic sets in Kn is an algebraic set;(ii) the union of any two algebraic sets in Kn is an algebraic set.

We now determine all the algebraic sets of the affine line K1.

Proposition 5.5.2 A subset A of K is algebraic iff either A=K1 =K or a finitesubset of K1.

Proof We have seen that the condition is sufficient. To prove the necessity of thecondition, note that as K[x] is a PID and a non-zero polynomial f ∈ K[x] has afinite number of zeros ≤degf , it cannot vanish on an infinite set. �

Remark Proposition 5.5.2 shows that an infinite union of algebraic sets may not bean algebraic set.

5.5.2 Ideal of a Set of Points in Kn

Given a subset A in Kn, define the subset I (A) in K[x1, x2, . . . , xn] to be the set ofall polynomials which vanish on A i.e.,

I (A)= {f ∈K[x1, x2, . . . , xn] : f (x)= 0 ∀(x) ∈A}.

Page 232: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

216 5 Ideals of Rings: Introductory Concepts

Then I (A) is an ideal of K[x1, x2, . . . , xn]. To show this, let f,g ∈ I (A). Thenf (x) = 0 and g(x) = 0 ∀(x) ∈ A. Consequently, (f + g)(x) = f (x) + g(x) = 0∀(x) ∈A and (hf )(x)= h(x)f (x)= 0 ∀(x) ∈A and ∀h ∈K[x1, x2, . . . , xn].

Remark I (A) is called the ideal of A.

Proposition 5.5.3 Let Kn be an affine n-space. Then

(i) A⊆ B in Kn⇒ I (A)⊇ I (B) in K[x1, . . . , xn];(ii) S ⊆ I (V (S)) for any set of polynomials S in K[x1, . . . , xn];

(iii) A⊆ V (I (A)) for any set of points A in Kn;(iv) V (S)= V (I (V (S))) for any set of polynomials S in K[x1, x2, . . . , xn];(v) I (A)= I (V (I (A))) for any set of points A in Kn;

(vi) I (∅)=K[x1, x2, . . . , xn];(vii) I (Kn)= {0}, if K is an infinite field.

Proof (i) f ∈ I (B)⇔ f vanishes on B ⇒ f vanishes on A (since A⊆ B) ⇔ f ∈I (A)⇒ I (B)⊆ I (A).

(ii) This follows from the fact that S is a set of some polynomials which vanishon V (S), while I (V (S)) is the set of all polynomials which vanish on V (S).

(iii) This follows from the fact that A is a set of some common zeros of poly-nomials in I (A), while V (I (A)) is the set of all common zeros of polynomials inI (A).

(iv) V (S)⊆ V (I (V (S))) by (ii) (take V (S) for A in (iii)).Conversely, V (I (V (S)))⊆ V (S). Because (x) ∈ V (I (V (S)))⇔ f (x)= 0 ∀f ∈

I (V (S))⇒ f (x)= 0 ∀f ∈ S by (ii)⇔ x ∈ V (S).(v) I (A)⊆ I (V (I (A))) by (iii) (take I (A) for S in (iii)).Conversely, I (V (I (A)))⊆ I (A) by (iii). This is so because f ∈ I (V (I (A)))⇔

f (x)= 0 ∀(x) ∈ V (I (A))⇒ f (x)= 0 ∀(x) ∈A by (iii)⇒ f ∈ I (A).(vi) V (1) = ∅ ⇒ I (V (1)) = I (∅). Now by (ii), 1 ∈ I (V (1)) ⇒ I (∅) =

K[x1, x2, . . . , xn].(vii) This part says that if K an infinite field and f ∈K[x1, x2, . . . , xn], then f

vanishes on Kn implies f = 0. We shall prove this by induction on n. If n = 1,a non-zero f ∈ K[x1] has a finite number of zeros ≤degf , by the fundamen-tal theorem of algebra (see Chap. 11), and hence f cannot vanish on the infi-nite set K , unless f = 0. Next, suppose that the result is true for (n − 1) vari-ables. Let f ∈ K[x1, x2, . . . , xn] vanish on Kn. We write f (x1, x2, . . . , xn) =∑

ifi(x1, x2, . . . , xn−1)xin as a polynomial in xn with coefficients in K[x1, . . . ,

xn−1]. If ∃ a point (a1, a2, . . . , an−1) ∈ Kn−1 such that for some j , fj (a1,

. . . , an−1) �= 0, then the non-zero polynomial f (a1, a2, . . . , an−1, xn) ∈K[xn] van-ishes on K , since f (x1, . . . , xn) vanishes on Kn. This implies, by the fundamentaltheorem of algebra, that f (a1, a2, . . . , an−1, xn) = 0, which is impossible, sincefj (a1, . . . , an−1) �= 0. Therefore fj must vanish on Kn−1 ∀j , and hence fj = 0 ∀j ,by induction hypothesis. Consequently, f = 0. �

Page 233: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.5 Application to Algebraic Geometry 217

Remark If A is an algebraic set and A= V (S), then A= V (I (A)); and if P is anideal of an algebraic set A and P = I (A), then P = I (V (P )).

5.5.3 Affine Variety

An algebraic set A in Kn is called irreducible or an affine variety iff A �= B ∪ C,where B and C are algebraic sets in Kn and A �= B , A �= C i.e., iff A is not the unionof two algebraic sets B and C distinct from A. Otherwise A is called reducible.

Theorem 5.5.1 An algebraic set A is an affine variety iff I (A) is a prime ideal.

Proof Suppose A is an algebraic set and P is its ideal, i.e., P = I (A). ThenA = V (P ) by Proposition 5.5.3(iv). If P is not prime, we can find f,g ∈K[x1, x2, . . . , xn] such that f /∈ P , g /∈ P but fg ∈ P . Now by Proposition 5.5.1(i)and (iii), we get

f /∈ P ⇒ P ∪ {f }� P ⇒ V (P )∩ V (f )= V(P ∪ {f })� V (P );

g /∈ P ⇒ P ∪ {g}� P ⇒ V (P )∩ V (g)= V(P ∪ {g})� V (P ).

Also[V (P )∩ V (f )

]∪ [V (P )∩ V (g)]= V (P )∩ [V (f )∪ V (g)

]

(by distributive laws of sets) = V (P ) ∩ V (fg) (by Proposition 5.5.1(iv)) = V (P ∪(fg))= V (P ), since fg ∈ P . Thus the algebraic set A= V (P ) is the union of twoalgebraic sets V (P )∩V (f ) and V (P )∩V (g), which are distinct from A, and henceA is reducible.

Conversely, if A is reducible, then A = B ∪ C, where B and C are algebraicsets different from A. Then A � B ⇒ I (A) � I (B) and A � C ⇒ I (A) � I (C).Therefore, if f ∈ I (B), g ∈ I (C) and f,g /∈ I (A), then fg ∈ I (A). This is so be-cause A= B∪C = V (I (B))∪V (I (C)) (by Proposition 5.5.3)= V (I (B)I (C)) (byProposition 5.5.1(iv) and hence I (A) = I (V (I (B)I (C))) ⊇ I (B)I (C) (by Propo-sition 5.5.3 (ii))⇒ I (A) is not prime (see Ex. 11(c) of Exercises-I). We have provedthat an algebraic set A is reducible ⇔ I (A) is not a prime ideal. Equivalently, A isan affine variety⇔ I (A) is a prime ideal. �

Corollary An affine algebraic set A in Kn is an affine variety iff the coordinatering K[x1, x2, . . . , xn]/I (A) is an integral domain.

5.5.4 The Zariski Topology in Kn

Zariski topology is a particular topology introduced by Oscar Zariski (1899–1986)around 1950 to study algebraic varieties. This topology in Cn has an advantageover the metric topology, because Zariski topology has many fewer open sets than

Page 234: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

218 5 Ideals of Rings: Introductory Concepts

the metric topology. A refinement of Zariski topology was made by AlexanderGrothendieck in 1960.

Let κ be a subfield of K . If A is an affine algebraic set in Kn such that I (A)

admits a set of generators in κ[x1, x2, . . . , xn] ⊆K[x1, x2, . . . , xn], then A is calledan affine (K,κ) algebraic set and κ is called the field of definition of A. Thus anaffine (K,κ) algebraic set A is a subset in Kn consisting of all common zeros ofa subset of polynomials (or an ideal) in κ[x1, x2, . . . , xn]. If κ = K , we call A anabsolute affine algebraic set (or simply an affine algebraic set) in Kn. Define atopology in Kn, called the Zariski topology or κ-topology in the following way:

A subset U of Kn is an open set iff Kn−U is an affine κ-algebraic set. Thus theaffine κ-algebraic sets in Kn are the closed sets in Kn. As the results of Propositions5.5.1(ii–iv) for affine algebraic sets are also true for affine (K,κ) algebraic sets, itfollows that the empty set and the whole set are closed sets; the intersection of anyarbitrary family of closed sets is a closed set; and the union of two closed sets is aclosed set. From all this the Zariski topology in Kn follows.

Any subset A of Kn is given the induced topology from Zariski topology in Kn.Thus if A is an affine κ-variety in Kn, then a subset of A is closed in A iff it is anaffine κ-algebraic set.

Proposition 5.5.4 (i) The Zariski topology in Kn is not Hausdorff.(ii) The Zariski topology in Kn may not be T1 unless K = κ .

Proof (i) Let A be a κ-variety in Kn. Then for any two non-empty open sets U1and U2 in A, we have U1 ∩ U2 �= ∅. This is so because if U1 ∩ U2 = ∅, then A =(A−U1)∪ (A−U2)∪ (U1 ∩U2)= (A−U1)∪ (A−U2), and hence A is the unionof two affine κ-algebraic sets: A−U1 and A−U2, which are different from A. Inother words, A is not a κ-variety in Kn, which implies a contradiction. Therefore,if x and y are distinct points of A, it is not possible to find disjoint neighborhoodsU1 and U2 of x and y respectively. This means that A is not a Hausdorff space.Therefore, Kn cannot be a Hausdorff space, because every subspace of a Hausdorffspace is Hausdorff space.

(ii) If κ =K , then by Proposition 5.5.1(v), any point of K is an algebraic set andhence closed in the Zariski topology. If κ �=K , and if (α1, α2, . . . , αn) ∈Kn is nota zero of any polynomial in k[x1, x2, . . . , xn], then the point (α1, α2, . . . , αn) is nota κ-algebraic set and hence not closed. �

Remark The above Proposition 5.5.4 shows that any open set U of a κ-variety A isdense in A, i.e., U =A. Also, any open set of a κ-variety is connected, because it isnot the union of two disjoint non-empty open sets.

Problem 4 (a) Let s(I ) be the set of all ideals of K[x1, x2, . . . , xn] and s(A) bethe set of all algebraic sets in Kn. Then the mapping V : s(I )→ s(A), I �→ V (I)

satisfies the following properties:

(i) V (0)=Kn.(ii) V (K[x1, x2, . . . , xn])= ∅.

Page 235: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.5 Application to Algebraic Geometry 219

(iii) V (∑

α Iα)=⋂V (Iα).(iv) V (I ∩ J )= V (IJ )= V (I)∪ V (J ).

(b) By using (a), define the Zariski topology on Kn.(c) Hence deduce that if K is an infinite field, then K1 endowed with the Zariski

topology is not a Hausdorff space.

Solution (a) follows from Proposition 5.5.1.(b) As the properties (i)–(iv) satisfy the axioms for closed sets of a topology, the

Zariski topology is defined on Kn, with algebraic sets as the only closed sets.(c) If M is a maximal ideal of K[x1, x2, . . . , xn] of the form (x1 − t1, x2 −

t2, . . . , xn− tn), t = (t1, t2, . . . , tn) ∈Kn, then V (M)= {t}. Thus finite sets of pointsare closed sets in the Zariski topology in Kn. They are the only closed sets in K1

except K1 and empty set ∅. If the field K is infinite, K1 endowed with the Zariskitopology is not Hausdorff.

Problem 5 If K is not algebraically closed, for a proper ideal I of K[x1− t1, x2−t2, . . . , xn − tn], can V (I) be empty?

Solution V (I) may be empty. For example, if K = R (which is not algebraicallyclosed), 〈x2+ 1〉 is an ideal of K[x] such that 〈x2+ 1〉 is proper but V (x2+ 1)= ∅.

Problem 6 Let s(A) denote the set of all algebraic sets in Kn and s(I ) denote theset of all ideals of K[x1, x2, . . . , xn] and sR(I ) denote the set of all radical ideals ofK[x1, . . . , xn].(a) Then the mapping I : s(A)→ s(I ), A �→ I (A) is injective.(b) Then the mapping I ◦V : sR(I )→ sR(I ), J �→ I (V (J )) is the identity function,

where K is algebraically closed.(c) If K is an algebraically closed field and J is an ideal of the ring K[x1, x2, . . . ,

xn], then I (V (J ))= rad(J ), i.e., if a polynomial vanishes at all common zerosof polynomials in J , then some power of f belongs to J .

(d) If K is an algebraically closed field, then there exists a bijective correspondencebetween the algebraic sets contained in Kn and the radical ideals of the ringK[x1, x2, . . . , xn] (i.e., ideals J such that rad(J )= J ).

Solution (a) It follows from Proposition 5.5.3(iv) that

A= V(I (A))= (V ◦ I )(A), ∀A ∈ s(A)

⇒ V ◦ I is the identity function on s(A)⇒ I is injective.(b) Take in particular, I (A) = J . Then J is a radical ideal in K[x1, x2, . . . , xn]

and hence by Ex. 7 of Exercises-I, sR(I ) = {J : J = I (A) for some A ∈ s(A)}.Then Proposition 5.5.3 (v)⇒ J = I (V (J ))= (I ◦ V )(J ), ∀J ∈ sR(I )⇒ I ◦ V isthe identity function on sR(I )⇒ I is a surjection.

Page 236: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

220 5 Ideals of Rings: Introductory Concepts

(c) Since I (A)= J is a radical ideal (see Ex. 7 of Exercises-I), (c) follows fromProposition 5.5.3(v).

(d) follows from (a) and (b).

We summarize the above discussion in the basic and important result.

Theorem 5.5.2 (Hilbert’s Nullstellensatz) Let K be an algebrically closed field.Then I (V (J )) = rad (J ) for every ideal J in K[x1, x2, . . . , xn]. Moreover, thereexists a bijective correspondence between the set of affine algebraic sets in Kn andthe set of radical ideals in K[x1, x2, . . . , xn].

Remark 1 Hilbert’s Nullstellensatz theorem is the first result in representing state-ments about geometry in the language of algebra.

Remark 2 Hilbert’s Nullstellensatz theorem identifies the set of maximal ideals ofthe polynomial rings C[x1, x2, . . . , xn] with the points in the affine space Cn.

Remark 3 Hilbert’s Nullstellensatz theorem may be considered as a multidimen-sional version of the fundamental theorem algebra.

Remark 4 Hilbert’s Nullstellensatz theorem fails to be true over the field R (whichis not algebraically closed) [see Smith et al. 2000.]

5.6 Chinese Remainder Theorem

It is so named for the reason that it generalizes the result in part (c) of Theorem 5.6.1,which is a classical result of number theory, proved by Chinese mathematiciansduring the first century AD. It provides a representation of Zn and many interestingapplications (see Chaps. 10 and 12). This theorem has several forms according tothe context. Throughout this section we assume R is a commutative ring with 1.This theorem is used to prove structure theorems for a class of modules.

Definition 5.6.1 Two ideals A and B of R are said to be coprime (comaximal) iffA+B =R.

Proposition 5.6.1 If ideals A and B are coprime in R, then A∩B =AB .

Proof Clearly, AB ⊆A∩B . Since A+B =R, ∃a ∈A, b ∈ B such that a+ b= 1.Let c ∈A∩B . Then c= c1= c(a+ b)= ca+ cb⇒A∩B ⊆AB . Hence A∩B =AB . �

Example 5.6.1 Let A and B be two distinct maximal ideals of R. Then A+B =R.[Hint. A+B � A, since A and B are distinct. Hence A+B =R.]

Page 237: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.6 Chinese Remainder Theorem 221

Theorem 5.6.1 (Chinese Remainder Theorem for rings) Let R be a commutativering with 1.

(a) Let A and B be coprime ideals in R. Then the map f : R → R/A × R/B ,defined by r �→ (r+A, r+B) is a ring epimorphism with kerf =A∩B =AB

and the rings R/AB and R/A×R/B are isomorphic.(b) (General form) Let A1,A2, . . . ,An be pairwise coprime ideals in R. Then the

map f : R → R/A1 × R/A2 × · · · × R/An, defined by r �→ (r + A1, r +A2, . . . , r + An) is a ring epimorphism with kerf = A1 ∩ A2 ∩ · · · ∩ An =A1A2 · · ·An and the rings R/(A1A2 · · ·An) and R/A1 ×R/A2 × · · · ×R/An

are isomorphic.(c) Let n1, n2, . . . , nt be positive integers such that every pair of integers ni , nj

are relatively prime for i �= j . If a1, a2, . . . , at are t integers, then the systemof congruences x ≡ a1 (modn1), x ≡ a2 (modn2), . . . , x ≡ at (modnt ) has asimultaneous solution, which is unique up to modulo n= n1n2 · · ·nt .

Proof (a) A and B are coprime ideals in R⇒∃a ∈A and b ∈ B such that 1= a+b.Clearly, f is a ring homomorphism.

To show that f is surjective, let (x +A,y +B) ∈R/A×R/B . Then

f (xb+ ya) = (xb+ ya +A,xb+ ya +B)

= (x +A,y +B), since 1= a + b.

Clearly, kerf =A∩B .Hence f is an epimorphism with kerf = A ∩ B = AB ⇒ the rings R/AB and

R/A×R/B are isomorphic.(b) Consider the map f : R→ R/A1 ×R/A2 × · · · ×R/An, r �→ (r +A1, r +

A2, . . . , r +An). Then f is a ring epimorphism.Hence the first part of (b) follows from (a) by induction.The last part of (b) follows from the first part.(c) It follows from the last part of (b) by taking R = Z, Ai = 〈ni〉. �

Corollary 1 Let n1, n2, . . . , nt be integers >1 such that every pair of integers ni ,nj are relatively prime for i �= j , i, j ∈ {1,2, . . . , t}. If n= n1n2 · · ·nt , then ring Zn

is isomorphic to the ring Zn1 ×Zn2 × · · · ×Znt .

Corollary 2 If n is a positive integer and pn11 p

n22 · · ·pnt

t is its factorization intopowers of distinct primes (ni ≥ 1), then

Zn∼= Z

pn11×Z

pn22× · · · ×Zp

ntt

.

Corollary 3 If n is a positive integer and pn11 p

n22 · · ·pnt

t is its factorization intopowers of distinct primes (ni ≥ 1), then Z∗n ∼= Z∗

pn11× Z∗

pn22× · · · × Z∗

pntt

, where Z∗ndenotes the multiplicative group of all units of the ring Zn (see Chap. 10).

Page 238: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

222 5 Ideals of Rings: Introductory Concepts

5.7 Ideals of C(X)

Let C(X) be the ring of real valued continuous functions on a compact topologicalspace X having the identity element c defined by the constant function c(x) = 1for all x ∈X. Then the maximal ideals in C(X) correspond to the points of X in anatural way. It follows from the Theorem 5.7.4.

Theorem 5.7.1 Let C(X) be the ring of real valued continuous functions on acompact topological space X.1

(a) If M is a proper ideal of C(X), then there exists a point x0 ∈ X such thatf (x0)= 0 for all f ∈A.

(b) If M is a maximal ideal of C(X), then there exists a point x0 ∈ X such thatMx0 = {f ∈ C(X) : f (x0)= 0} =M .

Proof (a) Let f ∈ A. Since f is continuous, f−1(0) is a closed set in X. Thenf−1(0) �= ∅ for each f ∈ A. Otherwise, if possible, there is some f ∈ A such thatf−1(0)= ∅. Then f (x) �= 0 for all x ∈X. So, 1/f ∈ C(X) and hence the unit ele-ment c= f · 1/f ∈A⊆ C(X) implies that A= C(X). This contradicts the fact thatA is a proper ideal of C(X). We now consider the family F = {f−1(0) : f ∈A} ofclosed sets in X. We shall show that it has the finite intersection property, i.e., ev-ery finite sub-family of F has a non-empty intersection. If f1, f2, . . . , fn ∈A, theneach f 2

i = fi · fi ∈A and hence f =∑ni=1 f 2

i ∈A. We claim that⋂n

i=1 f−1i (0)=

f−1(0). Let x ∈⋂ni=1 f−1

i (0). Then each fi(x)= 0 implies each f 2i (x)= 0, result-

ing in f (x)= 0. Thus x ∈ f−1(0). Hence⋂n

i=1 f−1i (0)⊆ f−1(0). Conversely, let

y ∈ f−1(0). Then f (y)= 0 implies that each of f 2i (y)= 0, i.e., each fi(y) ·fi(y)=

0, resulting in each fi(y)= 0, as R is an integral domain. This implies y ∈ f−1i (0)

for each i, resulting in y ∈⋂ni=1 f−1

i (0), which implies f−1(0) ⊆⋂ni=1 f−1

i (0).Thus

⋂ni=1 f−1

i (0) = f−1(0) �= ∅. Since X is compact,⋂{f−1(0) : f ∈ A} �= ∅.

Hence there exists a point x0 ∈X such that f (x0)= 0 for all f ∈A.(b) Let M be a maximal ideal of C(X). Then M is a proper ideal of C(X) and

hence by (a) there exists a point x0 ∈ X such that f (x0) = 0 for all f ∈M . LetMx0 = {f ∈ C(X) : f (x0) = 0}. Since the identity element which is the constantfunction c /∈Mx0 , Mx0 is a proper ideal of C(X) such that M ⊆Mx0 . As M is amaximal ideal, it follows that M =Mx0 . �

We now study the particular case when X = [0,1].

Theorem 5.7.2 Let R be the ring of all real valued continuous functions on [0,1]and Mx = {f ∈R : f (x)= 0}, where x ∈ [0,1]. Then Mx is a maximal ideal of R.

1A topological space X is compact if and only if every collection of closed sets in X possessing thefinite intersection property, the intersection of the entire collection is non-empty (see [Chatterjeeet al. (2003)]).

Page 239: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.7 Ideals of C(X) 223

Proof Let f,g ∈Mx and h ∈R. Then f (x)= 0= g(x). Now (f +g)(x)= f (x)+g(x) = 0 and (f · h)(x) = f (x) · h(x) = 0 = (h · f )(x). Hence Mx is an ideal ofR. Let N be an ideal of R such that Mx � N ⊆ R. Then ∃ a function g ∈ N suchthat g /∈Mx . Hence g(x) = r �= 0. Consider a function h ∈ R defined by h(y) =g(y)− r . Then h is a continuous function such that h(x)= g(x)− r = r − r = 0⇒h ∈Mx � N . Thus g,h ∈N ⇒ g−h ∈N , since N is an ideal of R⇒ r ∈N . Againr �= 0⇒ r−1 exists ⇒ rr−1 ∈ N ⇒ the constant function c(x)= 1 ∈ N ⇒ N = R

(this is so because 1 ∈ N ⇒ f · 1 ∈ N ∀f ∈ R ⇒ R ⊆ N . Again N ⊆ R. HenceN =R). Consequently, Mx is a maximal ideal of R. �

Corollary For every x ∈ [0,1], the ideal Mx is also prime.

We now show that the maximal ideals in the ring R = C([0,1]) correspond tothe points in [0,1].

Theorem 5.7.3 Let M be the set of all maximal ideals of the ring R = C([0,1]).Then there exists a bijective correspondence between the elements of M and thepoints of [0,1].

Proof To prove the theorem, it is sufficient to show that the mapping ψ : [0,1] →M defined by ψ(x)=Mx = {f ∈ R : f (x)= 0} is a bijection, where M is the setof all maximal ideals of the ring R. By Theorem 5.7.1, ψ is well defined. We claimthat ψ is injective. As [0,1] is compact and Hausdorff, by the Urysohn Lemma2 foreach y (�=x) in [0,1], there is a function f in R such that f (x)= 0 but f (y) �= 0.This shows that the mapping is injective. To show that the mapping is onto, let M bea maximal ideal in R. We claim that for this M , there is a point y in [0,1] at whichevery function in M vanishes. If possible, for each point x in [0,1] there exists afunction f in M such that f (x) �= 0. Since f is continuous, x has a neighborhoodsuch that at no point f vanishes. Varying x, we obtain an open cover of [0,1]. As[0,1] is compact, this open cover has a finite subcover and hence we obtain corre-sponding functions f1, f2, . . . , fn in M . Again as fi is in M , each fifi = fi

2 ∈M .Then the function g =∑n

i=1 f 2i ∈M is such that g(x) > 0 for all x ∈ [0,1]. Hence

g can not lie in a proper ideal of R. It contradicts the fact that g lies in the properideal M . This contradiction implies that there exists a point x ∈ [0,1] such that everyfunction in M vanishes at x. Hence M =Mx shows that ψ is onto. Consequently,ψ is a bijection. �

Corollary 1 The maximal ideals in the ring R of all real valued continuous func-tions on [0,1] correspond to the points in [0,1].

2Urysohn Lemma Let X be a normal space, and A and B be disjoint closed subspaces of X.

Then there exists a continuous real function f defined on X, all of whose values lie in [0,1], suchthat f (A)= 0 and f (B)= 1. [Simmons 1963]

Page 240: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

224 5 Ideals of Rings: Introductory Concepts

Corollary 2 Given a maximal ideal M in R, there exists a real number x ∈ [0,1]such that M =Mx .

Proof It follows from Theorems 5.7.3 (also from Theorem 5.7.1 when X =[0,1]). �

Proceeding as above, we can generalize Theorem 5.7.3 for an arbitrary compacttopological space X.

Theorem 5.7.4 Let X be a compact topological space and R = C(X) be the ringof all real valued continuous function on X. Then there exists a bijective correspon-dence between the maximal ideals of R and the points of X.

Proof Let X be a compact topological space. Then for each x ∈X, there is a max-imal ideal Mx ∈ C(X) defined by Mx = {f ∈ C(X) : f (x)= 0}. Conversely, givena maximal ideal M ∈ C(X) there exists a point x ∈X at which every function in M

vanishes, i.e., M =Mx . Hence there is a bijective correspondence between the setof maximal ideals of C(X) and the points of X. �

Corollary The maximal ideals in C(X) correspond to the points of X. Moreover,given a maximal ideal M in C(X) there exists a point x ∈X such that M =Mx .

Problems and Supplementary Examples (SE-I)

1 (i) Let R be a ring and

I1 ⊆ I2 ⊆ I3 ⊆ · · · ⊆ In · · · (5.2)

be an ascending chain of ideals of R. If I =⋃ In, then I is an ideal of R.(ii) Deduce that in a principal ideal domain there cannot exist an infinite sequence

of ideals:

I1 � I2 � · · · with In � In+1 for all n ∈N+. (5.3)

For part (i), suppose I =⋃n In. Then I �= ∅. Let a, b ∈ I . Then ∃ integers s, t suchthat a ∈ Is , b ∈ It . Hence either s ≤ t or t < s. For definiteness, let s ≤ t . Thena − b ∈ It and ar, ra ∈ It ∀r ∈R⇒ a − b ∈ I, ar, ra ∈ I ⇒ I is an ideal of R.

For part (ii), suppose there exists an infinite sequence of ideals of type (5.3) ina principal ideal domain R. Then I =⋃ In is an ideal of R and hence I = 〈x〉 forsome x ∈ I . Consequently, x ∈ Im for some m ∈N+. This shows that I ⊆ Im. ThusIm+1 � I ⊆ Im⇒ a contradiction.

2 If A and B are non-null ideals of an integral domain R, then A∩B �= {0}.Solution Let a ∈ A and b ∈ B be two non-zero elements. Then R is an integraldomain ⇒ ab �= 0 and A,B are ideals of R⇒ ab ∈ A and ab ∈ B ⇒ ab ∈ A ∩ B .Consequently, A∩B �= {0}.

Page 241: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.7 Ideals of C(X) 225

3 Let A be an ideal of a ring R. Then the ring R/A is commutative⇔ xy−yx ∈A

∀x, y ∈ R. Deduce that if B and C are ideals of R and both R/B and R/C arecommutative rings, then R/(B ∩C) is also commutative.

Solution The quotient ring R/A is commutative⇔ (x+A)(y+A)= (y+A)(x+A) ∀x, y ∈R ⇔ (xy +A)= yx +A⇔ xy − yx ∈A ∀x, y ∈R.

For the second part, the hypothesis implies by the first part that ∀x, y ∈ R,xy − yx ∈ B and also xy − yx ∈ C and hence xy − yx ∈ B ∩ C ⇒ R/(B ∩ C)

is commutative by the first part.

4 Let A and B be prime ideals in a commutative ring R. If A ∩ B is prime in R,then A⊆ B or B ⊆A.

Solution If A � B , we claim that B ⊆ A. A �⊆ B ⇒ ∃a ∈ A such that a /∈ B . Letb ∈ B . Then ab ∈ A ∩ B ⇒ a ∈ A ∩ B or b ∈ A ∩ B , since A ∩ B is prime. Sincea /∈ B , b ∈A∩B ⊂A⇒ B ⊆A.

5 (a) Let D be an integral domain and a (�=0) ∈D be not invertible. Then 〈an+1〉�〈an〉, for all n ∈N+.

Solution Clearly, 〈an+1〉 ⊆ 〈an〉. If possible 〈an+1〉 = 〈an〉, then an ∈ 〈an+1〉 ⇒an = an+1r for some r ∈D⇒ 1= ar by Theorem 4.1.4 ⇒ a is invertible in D⇒a contradiction.

(b) Deduce from (a) that

(i) there are infinitely many different ideals in an integral domain D which is not afield;

(ii) every finite integral domain is a field (cf. Theorem 4.1.6).

Solution (i) As D is not a field, there is a non-zero non-invertible element a in D.Using (a), 〈a〉, 〈a2〉, 〈a3〉, . . . are all different ideals of D.

(ii) follows from (i).

6 Let A, B and C be ideals in a ring R. Then

(i) A+B +C and ABC are ideals;(ii) (A+B)+C =A+ (B +C);

(iii) (AB)C =ABC =A(BC);(iv) A(B +C)=AB +AC and (A+B)C =AC +BC.

[Hint. Use Definitions 5.1.4 and 5.1.5.]

7 Let A = {f (x) ∈ Z[x] : f (0) ≡ 0 (mod 2)}. Then A is an ideal of Z[x] andA= 〈2, x〉.Worked-Out Exercises

1. Let R be a ring with 1 such that R has no non-trivial left (right) ideals. Then R

is a division ring.

Page 242: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

226 5 Ideals of Rings: Introductory Concepts

Solution Let x (�=0) ∈ R. Then I = Rx = {rx : r ∈ R} is a left ideal of R. Nowx = 1 · x⇒ I �= {0}⇒ I = R by hypothesis⇒ 1= yx for some y ∈R⇒ x hasa left inverse in R ⇒ every non-zero element of R has a left inverse in R ⇒non-zero elements of R form a multiplicative group (see Proposition 2.3.2 ofChap. 2)⇒ R is a division ring.

A similar result holds if R has no non-trivial right ideals.2. Let R =M2(Q) be the ring of 2× 2 matrices over Q under usual addition and

multiplication. Then R is a simple ring but not a division ring.

Solution Since R contains divisors of zero, R cannot be a division ring. On theother hand, let I �= {0} be an ideal of R. Then there exists a non-zero matrix M =(

a bc d

) ∈ I . As M �= ( 0 00 0

), without loss of generality, suppose a �= 0. Consider the

matrices in R:

E11 =(

1 00 0

), E12 =

(0 10 0

), E21 =

(0 01 0

), E22 =

(0 00 1

).

Now, M ∈ I ⇒ E11ME11 =(

a 00 0

) ∈ I ⇒ E11 =( 1 0

0 0

) = (a−1I2)(

a 00 0

) ∈ I ,where I2 is the identity matrix in R. Similarly, E12,E21,E22 ∈ I . Thus any ele-ment A= ( x y

z t

) ∈R, can be expressed as A= xE11 + yE12 + zE21 + tE22.Hence A ∈ I ⇒R ⊆ I . But I ⊆R.Thus I =R⇒R has no non-trivial ideals⇒R is a simple ring.

3. The ring Z× Z is not an integral domain but it has a quotient ring which is anintegral domain.

Solution R = Z×Z is a ring under component-wise addition and multiplication:(a, b)+ (c, d)= (a + c, b + d), (a, b) · (c, d)= (ac, bd), ∀a, b, c, d ∈ Z. Then(0,1) and (1,0) are non-null elements of R such that (0,1)(1,0)= (0,0)⇒ R

contains divisors of zero ⇒ R is not an integral domain. Consider I = {(0, n) :n ∈ Z}. Then I is an ideal of R⇒R/I is a quotient ring. Then the map f : Z→R/I defined by f (n)= (n,0)+ I , ∀n ∈ Z is a ring isomorphism. Hence Z is anintegral domain⇒ f (Z)=R/I is an integral domain.

4. The rings (Zn,+, ·) and (Z/〈n〉,+, ·) are isomorphic.

Solution Define a map ψ : Zn→ Z/〈n〉 by ψ((m))=m+〈n〉 =m+nZ. Then ψ

is well defined and a bijective mapping such that ψ((m+ r))=ψ((m))+ψ((r))

and ψ((mr))=ψ((m))ψ((r)), ∀(m), (r) ∈ Zn. Hence ψ is a ring isomorphism.5. Let R be the ring R = {(m n

0 p

) : m,n,p ∈ Z}

and I be an ideal given by I ={( 0 n

0 p

) : n,p ∈ Z}. Then the quotient ring R/I is isomorphic to Z.

Solution I is an ideal of R⇒ R/I is a ring. Consider the mapping f : R→ Zdefined by f

((m n0 p

))=m. Then f is a ring epimorphism.

kerf ={(

m n

0 p

)∈R : f

((m n

0 p

))=m= 0

}

={(

0 n

0 p

)∈R

}= I �= {0}.

Page 243: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.8 Exercises 227

Thus f is not a monomorphism ⇒ f is not an isomorphism. But by the FirstIsomorphism Theorem for rings, ∃ an isomorphism f : R/I → Z defined byf (r + I )= f (r).

6. Let R be a commutative ring with 1 and I be an ideal of R. If 〈I, x〉 = I [x]denotes the ideal of R[x] generated by I and x, then show that rings R[x]/I [x]and (R/I)[x] are isomorphic.

Solution Consider the natural map ψ :R[x]→ (R/I)[x] given by reducing eachcoefficient r of a polynomial in R[x] to the corresponding coefficient r+I of thepolynomial in (R/I)[x]. Clearly this map ψ is a ring epimorphism. The resultfollows from the First Ring Isomorphism Theorem.

7. In the ring Z[x], 〈x〉 is a prime ideal but not a maximal ideal.

Solution Consider the mapping f : Z[x] → Z defined by f (a0 + a1x + · · · +anx

n)= a0. Then f is a ring epimorphism such that kerf = {a0 + a1x + · · · +anx

n ∈ Z[x] : a0 = 0} = {a1x + · · · + anxn ∈ Z[x]} = 〈x〉. Hence by the Epi-

morphism Theorem (First Isomorphism Theorem), the rings Z[x]/〈x〉 and Z areisomorphic. So, Z is an integral domain⇒ Z[x]/〈x〉 is an integral domain⇒〈x〉is a prime ideal in Z[x] by Theorem 5.3.1.

To the contrary, Z is not a field ⇒ Z[x]/〈x〉 is not a field ⇒ 〈x〉 is not amaximal ideal in Z[x] by Theorem 5.3.2.

8. Any integral domain D with only a finite number of ideals is a field.

Solution If possible, let D be not a field. Then ∃ a non-zero non-invertible el-ement a in D. Then 〈a〉, 〈a2〉, 〈a3〉, . . . , 〈an〉, . . . are infinitely many differentideals in D (see Ex. 5(a), (b) of SE-I)⇒ a contradiction of hypothesis. Hence D

is a field.9. Let D be an integral domain and a, b ∈ D∗ = (D − {0}). Then 〈a〉 = 〈b〉 iff

ab−1 ∈U(D)= {x : x is a unit in D}.Solution Suppose 〈a〉 = 〈b〉. Then a = bc for some c ∈D and b = ad for somed ∈D. Hence b �= 0 and b= bcd ⇒ 1= cd ⇒ c ∈U(D)⇒ ab−1 ∈U(D).

Conversely, let ab−1 ∈ U(D). Then a = bc for some c ∈ U(D). Let x ∈ 〈a〉.Then x = ad for some d ∈D⇒ x = bcd ⇒ x ∈ 〈b〉 ⇒ 〈a〉 ⊆ 〈b〉. Again U(D)

is a group and ab−1 ∈ U(D)⇒ ba−1 = (ab−1)−1 ∈ U(D)⇒ 〈b〉 ⊆ 〈a〉. Hence〈a〉 = 〈b〉.

5.8 Exercises

Exercises-I

1. Show that the ideal 〈a〉 generated by a single element a of an arbitrary ring R

is given by

〈a〉 ={na + ra + as +

finite

riasi : ri , si , r, s ∈R; n ∈ Z}.

Page 244: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

228 5 Ideals of Rings: Introductory Concepts

If R has an identity, show that

〈a〉 ={∑

finite

riasi : ri , si ∈R

}.

If R is a commutative ring with 1, show that 〈1〉 =R.2. For any element a belonging to ring (R,+, ·), show that

(i) (aR,+, ·) is a right ideal of (R,+, ·);(ii) (Ra,+, ·) is a left ideal of (R,+, ·).

3. Let R be a ring, A �= ∅ a subset of R. An element c ∈ R is said to be a left(right) annihilator of A, iff ca = 0 (ac= 0) ∀a ∈A.

Show that both annihilators of R form an ideal of R.4. Prove that

(a) A ring R with identity is a division ring iff R has no non-trivial left ideals;(b) If D is a division ring, then R =Mnn(D) has no non-trivial left ideals.

[Hint. (a) For any a (�=0) ∈R, Ra is a left ideal of R. Now use the Corollaryof Proposition 2.3.2 of Chap. 2.]

5. (a) Let R be an integral domain in which every proper ideal is prime. Showthat R is a field.

(b) If J and K are non-null ideals of an integral domain, prove that J ∩K �={0}.

6. (a) Let I be an ideal of a commutative ring R. Then the radical of I , denotedrad(I ), is defined by rad(I ) = {a ∈ R : an ∈ I for some integer n > 0}.Show that rad(I ) is an ideal of R such that I ⊆ rad(I ).

(b) Prove that the ideal I (A) of any subset A of an affine n-space Kn (A isnot necessarily an algebraic set) is a radical ideal (see Chap. 5 or Ex. 7 ofExercises-I).

[Hint. (a) Since the binomial theorem holds in a commutative ring, use thistheorem.

(b) f ∈ I (A) ⇔ f (x) = 0 ∀(x) ∈ A ⇔ (f (x))n = 0 ∀(x) ∈ A ⇔ f n ∈I (A)⇒ f ∈ rad(I (A)).]

7. An ideal I of a commutative ring is called a radical ideal iff I = rad(I ).Let K be an algebraically closed field and Kn the cartesian product

of K with itself n times and A ⊆ Kn. Define I (A) by I (A) = {f ∈K[x1, x2, . . . , xn] : f (x)= 0 ∀(x) ∈A}. Then I (A) is an ideal of K[x1, x2, . . . ,

xn] called the ideal of A. Show that I (A) is a radical ideal.8. If f : R→ S is a ring homomorphism, I is an ideal of R and J is an ideal of

S such that f (I)⊆ J , show that f induces a ring homomorphism f : R/I →S/J , given by a+ I �→ f (a)+ J . Prove that f is an isomorphism iff f (R)+J = S and f−1(J )⊆ I . In particular, if f is an epimorphism such that f (I)=J and kerf ⊆ J , then show that f is an isomorphism.

[Hint. See Proposition 2.6.1 of Chap. 2.]9. Let I and J be ideals in a ring R. Prove that

Page 245: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.8 Exercises 229

(i) (Second Isomorphism Theorem). There is an isomorphism of rings I/(I ∩J )∼= (I + J )/J ;

(ii) (Third Isomorphism Theorem). If I ⊂ J , then J/I is an ideal of R/I andthere is an isomorphism of rings (R/I)/(J/I)∼=R/J .

[Hint. See Theorems 2.6.7 and 2.6.8 of Chap. 2.]

10. If I is an ideal of a ring R, prove that there is a one-to-one correspondencebetween the set of all ideals of R containing I and the set of all ideals of R/I .Hence show that every ideal of R/I is of the form T/I , where T is an ideal ofR containing I .

[Hint. Take S =R/I and f = π :R→R/I in Theorem 5.2.4 or see Corol-lary or Remark of Theorem 5.2.4.]

11. (a) Let R be a commutative ring with identity and I be a prime ideal of R

with the property that R/I is finite. Prove that I is a maximal ideal of R.[Hint. I is prime ⇒ R/I is an integral domain ⇒ R/I is a field (as

R/I is finite)⇒ I is maximal.](b) Let R be a commutative ring with identity and I be a proper ideal of R.

Show that I is a maximal ideal⇔〈I ∪ {a}〉 =R for every element a /∈ I .(c) Show that an ideal I in a commutative ring R is prime iff for every pair of

ideals A and B of R such that AB ⊆ I ⇒ either A⊆ I or B ⊆ I .12. Let R and S be commutative rings with identity. If f : R → S is a ring ho-

momorphism such that f (R) is a field, show that kerf is a maximal idealof R.

[Hint. Clearly, kerf is an ideal of R. Let I be an ideal of R such that kerf �I ⊆R.

Then ∃ an element a ∈ I but a /∈ kerf . Then f (a) �= 0 and f (a) ∈ f (R)

which is a field and hence ∃x ∈ R such that f (a)f (x) = f (1)⇒ ax − 1 ∈kerf ⊂ I . Now ax ∈ I ⇒ 1 ∈ I ⇒ I =R.]

13. Prove that a proper ideal M of a commutative ring with 1 is maximal iff forevery element r /∈M , there exists some a ∈R such that 1+ ra ∈M .

[Hint. Let M be a maximal ideal of R and r /∈M . Then M⊂∓〈M,r〉 =R⇒1=m+ rx for some m ∈M and x ∈R.]

14. Let R be the ring of all real valued continuous functions defined on the closedinterval [0,1]. Let I = {f ∈ R : f ( 1

2 ) = 0}. Show that I is a maximal idealof R.

15. Let Z[x] be the ring of polynomials over the ring of integers Z and I be theprincipal ideal of Z[x] generated by x i.e., I = 〈x〉. Show that 〈x〉 is a primeideal but not maximal.

16. Let R be a commutative ring with 1. Show that there is a one-to-one corre-spondence between the maximal ideals M of R and the maximal ideals M ′ ofR�x� in such a way that M ′ corresponds to M iff M ′ is generated by M andx, i.e., M ′ = 〈M,x〉.

[Hint. Let M be a maximal ideal of R. By using Ex. 13 of Exercises-I, showthat M ′ = 〈M,x〉 is a maximal ideal of R�x�. Next, let M ′ be a maximal idealof R�x�. Define the set M = {a0 ∈ R :∑aix

i ∈M} i.e., M consists of theconstant terms of power series ∈M ′. Show that M is a maximal ideal of R. To

Page 246: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

230 5 Ideals of Rings: Introductory Concepts

verify that the given correspondence is one-to-one, show that 〈M,x〉 = 〈M,x〉for maximal ideals M and M of R⇒M =M .]

17. If p is a prime and n is an integer≥1, show that Zpn is a local ring with uniquemaximal ideal 〈p〉.

18. Let R be a commutative ring with 1. Show that the following statements areequivalent:

(i) R is a local ring;(ii) all non-units of R are contained in some ideal M �=R;

(iii) the non-units of R form an ideal of R.

19. Let R and S be two commutative rings with identity. If f : R → S is a ringepimorphism, show that

(i) S is a field⇔ kerf is a maximal ideal of R;(ii) S is an integral domain⇔ kerf is a prime ideal of R.

[Hint. By the Note of Theorem 5.2.3, R/kerf ∼= S. Now for I = kerf ,R/I is a field⇔ kerf is maximal and R/I is an integral domain⇔ kerfis prime.]

20. (a) Let R be a commutative ring with identity 1. Then the nil radicalof an ideal I of R, denoted by

√I , is the set

√I = {r ∈ R : rn ∈

I for some positive integer n (depending on r)}. Show that√

I is an idealof R and I ⊆√I (see Ex. 6(a) of Exercises-I).

(b) A proper ideal I of R is said to be a semiprime ideal iff I = √I . Provethat a proper ideal I of R is a semiprime ideal iff any one of the followingconditions holds:

(i) for any a ∈R, a2 ∈ I implies a ∈ I ;(ii) the quotient ring R/I has no non-zero nilpotent element.

(c) Let R be a commutative ring with 1. A proper ideal I of R is said to bea primary ideal iff for a, b ∈ R, ab ∈ I and b /∈ I ⇒ an ∈ I for somepositive integer n. Clearly every prime ideal is a primary ideal. Show that〈4〉 is a primary ideal of (Z,+, ·); determine all its primary ideals. Provethat a proper ideal I of R is a primary ideal, iff in the quotient ring R/I

every non-zero divisor of zero is a nilpotent element.Further prove that if I is a primary ideal of R, then

√I is a prime ideal

of R.[Hint. Let I be a primary ideal of R and a, b ∈R be such that ab ∈√I .

Then (ab)n = anbn ∈ I for some integer n ≥ 1. Then either an ∈ I or(bn)m ∈ I for some integer m≥ 1. Hence either a ∈√I or b ∈√I .]

21. Let R be a commutative ring with 1. Show that

(i) every prime ideal of R is a semiprime ideal but its converse is not true;(ii) every prime ideal of R is a primary ideal but its converse is not true;

[Hint. Consider the ring (Z,+, ·). 〈6〉 is a semiprime ideal but not aprime ideal and 〈4〉 is a primary ideal but not a prime ideal.]

Page 247: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.8 Exercises 231

22. Let R be a commutative ring with 1. Then the Jacobson radical of a ring R,denoted by radR, is defined by radR =⋂{M :M is a maximal ideal of R}.Clearly, radR �= ∅, since R contains at least one maximal ideal by the Corol-lary of Theorem 5.3.6 (Krull–Zorn).

If radR = {0}, then R is called a semisimple ring.Show that (Z,+, ·) is a semisimple ring.Show that radR�x� = 〈radR,x〉. Hence show that if F is a field, then

radF �x� = 〈x〉.[Hint. For R = Z, the maximal ideals of Z are precisely 〈p〉, where p is

a prime number. Then radR = rad Z =⋂{〈p〉 : p is a prime number} = {0},since no non-zero integer is divisible by every prime. For the next part,radR�x� =⋂{M ′ :M ′ is maximal ideal of R�x�} =⋂〈M,x〉 (by Ex. 16 ofExercises-I) = 〈radR,x〉. In particular, if R is a field F , then radF �x� = 〈x〉(by the Corollary of Theorem 5.4.1).]

23. Let R be a commutative ring with 1. Prove the following:

(i) Let A be an ideal of R. Then A ⊆ radR ⇔ each element of the coset1+A has an inverse in R;

(ii) An element a ∈ radR⇔ 1− ra is invertible for each r ∈R;(iii) An element a is invertible in R⇔ the coset a + radR is invertible in the

quotient ring R/ radR;(iv) 0 is the only idempotent in radR.

24. Let I be a primary ideal in a commutative ring R with 1. Show that every zerodivisor in R/I is nilpotent in R/I .

[Hint. Let (a) ∈ R/I be a zero divisor. Then ∃(b) �= (0) ∈ R/I such that(a)(b)= (0). Hence ab ∈ I ⇒ an ∈ I for some positive integer n, since b /∈ I .Hence (a)n = (0).]

25. Let I , J and K be ideals of a ring R satisfying (i) J ⊆K (ii) I ∩ J = I ∩K

and (iii) J/I =K/I . Show that J =K .[Hint. To show K ⊆ J , take an arbitrary element k ∈K . Then ∃ an element

j ∈ J such that k + I = j + I (by (iii)) ⇒ k − j = i for some i ∈ I . Againk − j ∈ K by (i). Consequently, i = k − j ∈ I ∩ K = I ∩ J ⇒ k = i + j ∈J ⇒K ⊆ J ⇒ J =K by (i).]

26. Let I and J be two ideals of a ring R. Show that the sets

(i) I : rJ = {a ∈R : aJ ⊆ I } (right quotient of I by J ) and(ii) I : lJ = {a ∈R : Ja ⊆ I } (left quotient of I by J ) are ideals of R.

If R is a commutative ring, then we simply write I : J [see Theorem 7.1.7(Cohen) of Chap. 7].

Exercises A (True/False Statements) Determine the correct statements with jus-tification:

1. Let R be a commutative ring with 1. If R has no non-trivial ideals, then R is afield.

Page 248: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

232 5 Ideals of Rings: Introductory Concepts

2. Let R be a commutative ring with 1. Then every prime ideal of R is a maximalideal.

3. Let f : R→ S be a ring homomorphism. Then A is maximal in R⇒ f (A) ismaximal in S.

4. Let f : R→ S be a ring epimorphism. Then B is maximal in S ⇒ f−1(B) ismaximal in R.

5. Let R and S be commutative rings with identity elements and f : R→ S be aring epimorphism. Then S is an integral domain⇔ kerf is a prime ideal in R.

6. Let A be a two-sided maximal ideal of a ring R. Then R/A is a simple ring.7. R is a simple ring with 1⇒R is a division ring.8. The rings Zn and Z/nZ ∀n ∈N+(n > 1) are isomorphic.9. Z/〈n〉 is a quotient ring of Z/〈mn〉, ∀m,n ∈N+.

10. Let R = C([0,1]) be the ring of real valued continuous functions on [0,1] andA= {f ∈R : f ( 1

13 )= 0}. Then A is a maximal ideal in R.11. There exist only a finite number of proper ideals in an integral domain which is

not a field.12. Any integral domain having only a finite number of proper ideals is a field.13. (Z,+, ·) is an ideal of (Q,+, ·).14. A ring R has zero divisors⇒ every quotient ring of R has zero divisors.15. Let R be a commutative ring with 1. Then R is a simple ring⇒R is a field.16. Let R be a commutative ring with 1. An element a (�=0) ∈ R is invertible in

R⇔ a /∈M for any maximal ideal M of R.

Exercises B Identify the correct alternative(s) (there may be more than one) fromthe following list:

1. Let R = (C([0,1]),+, ·) be the ring of all real valued continuous functions on[0,1] and M = {f ∈M : f (1/2)= 0}. Then

(a) M is not an ideal of R.(b) M is an ideal of R but not a maximal ideal or R.(c) M is a maximal ideal or R.(d) M is an ideal of R but not a prime ideal or R.

2. Let (Z,+, ·) be the ring of integers. Then Z has

(a) Only one proper ideal.(b) Finitely many proper ideals.(c) Countably infinite many proper ideals.(d) Uncountably many proper ideals.

3. Let R be a commutative ring with identity and F be a field. If f : R→ F be a(ring) epimorphism, then K = kerf = {x ∈R : f (x)= 0F } is

(a) A maximal ideal of R but not a prime ideal of R.(b) A prime ideal of R but not a maximal ideal of R.(c) A both maximal and prime ideal of R.(d) Not a maximal ideal of R.

Page 249: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

5.8 Exercises 233

4. Let (Z[x],+, ·) be the ring of polynomials over Z and I = 〈x〉. Then

(a) I is a prime ideal of Z[x] but not a maximal ideal.(b) I is a maximal ideal of Z[x] but not a prime ideal.(c) I is a both maximal and prime ideal of Z[x].(d) I is not a prime ideal of Z[x].

5. Let R be an arbitrary commutative ring with identity and I be a prime ideal of R

such that R/I is finite. Then

(a) I is a maximal ideal of R.(b) I =R.(c) R/I is an integral domain but not a field.(d) R/I is not an integral domain.

6. Let f : (Z,+, ·)→ (Z/〈n〉,+, ·) be the ring homomorphism defined by f ((m))=m + 〈n〉. Then

(a) f is a monomorphism but not an epimorphism.(b) f is an epimorphism but not a monomorphism.(c) f is an isomorphism.(d) f is neither a monomorphism nor an epimorphism.

7. Let

R ={(

m n

0 p

):m,n,p ∈ Z

}and A=

{(0 n

0 p

): n,p ∈ Z

}.

Then the ring R and its subring A are such that

(a) A is an ideal of R such that the ring Z is isomorphic to the quotient ringR/A.

(b) A is not an ideal of R.(c) A is an ideal of R such that the ring Z is not isomorphic to the quotient ring

R/A.(d) The quotient ring R/A is a field.

8. Let

M ={(

a b

0 c

): a, b, c ∈ Z

}

be the ring of upper triangular matrices of order two over Z and

A={(

0 b

0 c

): b, c ∈ Z

}.

Then

(a) A is not an ideal of M .

Page 250: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

234 5 Ideals of Rings: Introductory Concepts

(b) A is an ideal of M such

M/A={(

a 00 0

)+A : a ∈ Z

}.

(c) A is an ideal of M such M/A is isomorphic to Z.(d) A is an ideal of M such M/A is not an integral domain.

9. Let Z[x] be the polynomial ring over Z. Then

(a) Z is a subring of Z[x] but not an ideal of Z[x].(b) Z is a left ideal of Z[x] but not a right ideal of Z[x].(c) Z is a right ideal of Z[x] but not a left ideal of Z[x].(d) Z is an ideal of Z[x].

10. Let 〈I (x)〉 be the ideal generated by the polynomial I (x) in Q[x] and f (x)=x3+ x2+ x+ 1 and g(x)= x3− x2+ x− 1 be two polynomials in Q[x]. Then

(a) 〈f (x)〉 + 〈g(x)〉 = 〈x3 + x〉.(b) 〈f (x)〉 + 〈g(x)〉 = 〈x4 − 1〉.(c) 〈f (x)〉 + 〈g(x)〉 = 〈x2 + 1〉.(d) 〈f (x)〉 + 〈g(x)〉 = 〈f (x).g(x)〉.

11. Which of the following statement(s) is (are) true?

(a) The set of all 2×2 matrices with rational entries (with the usual operations ofmatrix addition and matrix multiplication) is a ring which has no non-trivialideals.

(b) Let R = C([0,1]) be considered as a ring with the usual operations ofpointwise addition and pointwise multiplication. Let I = {f : [0,1] → R |f (1/2)= 0}. Then I is a maximal ideal.

(c) R[x] is a field.(d) Let R be a commutative ring and let P be prime ideal of R. Then R/P is an

integral domain.

12. Consider the ring Zn for n≥ 2. If

(a) Zn is a field, then n is a composite integer.(b) Zn is a field iff n is a prime integer.(c) Zn is an integral domain, then n is prime integer.(d) There is an injective ring homomorphism of Z5 to Zn, then n is prime.

13. Let C([0,1]) be the ring of continuous real-valued functions on [0,1], withaddition and multiplication defined pointwise. For any subset S of C([0,1]) letK(S)= {f ∈ C([0,1])|f (x)= 0 for all x ∈ S}. If

(a) K(S) is an ideal in C([0,1]), then S is closed in [0,1].(b) S has only one point, then K(S) is a prime ideal but not a maximal ideal.(c) K(S) is a maximal ideal, then S has only one point.(d) S has only one point, then K(S) is a maximal ideal.

Page 251: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 235

14. Let C([0,1]) denote the ring of all continuous real-valued functions on [0,1]with respect to pointwise addition and pointwise multiplication. Then

(a) C([0,1]) contains divisors of zero.(b) For an element a ∈ [0,1], the set K = {f ∈ C([0,1])|f (a)= 0} is an ideal

in C([0,1]).(c) C([0,1]) is an integral domain.(d) For any proper ideal M in C([0,1]), there exists at least one point a ∈ [0,1]

such that f (a)= 0 for all f ∈M .

15. Let R be a (commutative) ring (with identity). Let A and B be ideals in R.Then

(a) A∪B is an ideal in R.(b) A∩B is an ideal in R.(c) AB = {xy : x ∈A,y ∈ B} is an ideal in R.(d) A+B = {x + y : x ∈A,y ∈ B} is an ideal in R.

5.9 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Artin 1991;Atiya and Macdonald 1969; Birkoff and Mac Lane 1965; Burtan 1968; Chatterjeeet al. 2003; Dugundji 1989; Fraleigh 1982; Fulton 1969; Herstein 1964; Hunger-ford 1974; Jacobson 1974, 1980; Lang 1965; McCoy 1964; Simmons 1963; van derWaerden 1970; Zariski and Samuel 1958, 1960) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Atiya, M.F., Macdonald, I.G.: Introduction to Commutative Algebra. Addison-Wesley, Reading

(1969)Birkoff, G., Mac Lane, S.: A survey of Modern Algebra. Macmillan, New York (1965)Burtan, D.M.: A First Course in Rings and Ideals. Addison-Wesley, Reading (1968)Chatterjee, B.C., Ganguly, S., Adhikari, M.R.: A Text Book of Topology. Asian Books, New Delhi

(2003)Dugundji, J.: Topology. Brown, Dufauque (1989)Fraleigh, J.B.: A First Course in Abstract Algebra. Addison-Wesley, Reading (1982)Fulton, W.: Algebraic Curves. Benjamin, New York (1969)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hungerford, T.W.: Algebra. Springer, New York (1974)Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)

Page 252: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

236 5 Ideals of Rings: Introductory Concepts

Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)McCoy, N.: Theory of Rings. Macmillan, New York (1964)Simmons, G.F.: Introduction to Topology and Modern Analysis. McGraw-Hill, New York (1963)Smith, K.E., Kahanpaaää, L., Kekäläinen, P., Traves, W.: An Invitation to Algebraic Geometry.

Springer-Verlag, New York (2000)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)Zariski, O., Samuel, P.: Commutative Algebra I. Van Nostrand, Princeton (1958)Zariski, O., Samuel, P.: Commutative Algebra II. Van Nostrand, Princeton (1960)

Page 253: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 6Factorization in Integral Domainsand in Polynomial Rings

In Chap. 1 we have already discussed divisibility and factorization of integers. It isnatural to ask whether an abstract ring can have such factorization. Relatively fewsuch rings exist. In this chapter we are able to extend the concepts of divisibility,gcd, lcm, division algorithm, and Fundamental Theorem of Arithmetic for integersto different classes of integral domains. The main aim of this chapter is to studythe problem of factoring the elements of an integral domain as products of irre-ducible elements. We also generalize the concept of division algorithm for integersto arbitrary integral domains by introducing the concept of Euclidean domains. Wealso study the polynomial rings over a certain class of important rings and proveEisenstein’s irreducibility criterion, the Gauss Lemma and related topics. Our studyculminates in proving the Gauss Theorem, which provides an extensive class ofuniquely factorizable domains.

6.1 Divisibility

Ideals of integral domains play an important role in the study of factorization theory.

Throughout this chapter R denotes an integral domain unless otherwise statedand R′ denotes R \ {0}.

The concept of divisibility has been developed with an eye on generalizing a similarconcept already discussed for integers. This concept introduces the notions of divi-sors, prime and irreducible elements, associated elements, lcm and gcd properties,and unique factorization domains (UFD). They are studied in this section with thehelp of the theory of ideals. For example, prime and irreducible elements in an inte-gral domain are characterized by prime and maximal ideals, respectively. Moreover,the Fundamental Theorem of Arithmetic is generalized for a PID (Theorems 6.1.5and 6.1.6).

Definition 6.1.1 Let R be an integral domain and let R′ = R \ {0}. A non-zeroelement a ∈ R is said to divide an element b ∈ R (denoted by a|b) in R iff there

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_6, © Springer India 2014

237

Page 254: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

238 6 Factorization in Integral Domains and in Polynomial Rings

exists an element c ∈ R such that b = ac. The elements a and b ∈ R′ are said to beassociates (or associated elements) iff a|b and b|a. If a|b, we sometimes say that b

is divisible by a in R or a is a divisor of b in R.

Example 6.1.1 In (Z,+, ·),3| − 3 and −3|3⇒ 3 and −3 are associates.

Theorem 6.1.1 Let R be an integral domain and a, b,u ∈R′. Then

(i) a|a;(ii) a|b and b|c⇒ a|c (c ∈R);

(iii) a|b and a|c⇒ a|(bx + cy) for every x, y ∈R;(iv) u is an invertible element in R⇒ u|d for every d ∈R;(v) u is an invertible element in R⇔ u|1;

(vi) a|c (c ∈R)⇔〈c〉 ⊆ 〈a〉 (i.e., Rc⊆Ra);(vii) a and b are associates⇔ a = bν for some invertible element ν ∈R.

Proof (i) a = a1⇒ a|a (since 1 ∈R).(ii) a|b and b|c ⇒ ∃x, y ∈ R such that b = ax and c = by ⇒ c = axy ⇒ a|c

(since xy ∈R).(iii) Trivial.(iv) d = d1 = d(u−1u) (as u is invertible in R) =u(du−1) = uc (where c =

du−1 ∈R)⇒ u|d for every d ∈R.(v) 1= uu−1 = uc (where c = u−1 ∈ R) ⇒ u|1. Again u|1⇒ 1= uc for some

c ∈R⇒ inverse of u is c ∈R. So, u is invertible in R.(vi) a|c ⇒ c = ra (for some r ∈ R) ∈ Ra ⇒ Rc ⊆ Ra ⇒ 〈c〉 ⊆ 〈a〉. Again,

〈c〉 ⊆ 〈a〉⇒ c ∈ 〈a〉⇒ c ∈Ra⇒ c= ra for some r ∈R⇒ a|c.(vii) a and b are associates⇒ a|b and b|a⇒ b= ac and a = bd for some c, d ∈

R⇒ a = acd⇒ 1= cd (by the cancellation law in R)⇒ c and d are both invertible⇒ a = bν, where ν = d . Again a = bν (where ν is invertible in R)⇒ b|a. Again ν

is invertible in R⇒ ν−1 ∈R⇒ aν−1 = bνν−1 ⇒ b= aν−1 ⇒ a|b. �

Remark 1 a and b are associates in R⇔〈a〉 = 〈b〉.

Remark 2 u is a unit in R⇔〈u〉 =R.

Remark 3 For arbitrary commutative ring with 1, the above results (i)–(vi) are alsovalid but the result (vii) is not so.

Problem 1 Find the invertible elements of the Gaussian ring Z[i].

Solution Clearly, Z[i] is a commutative ring with identity having no zero divisor.So, Z[i] is an integral domain. Again u= a + bi is an invertible element of Z[i] ⇒(a+bi)|1⇒ 1= (a+bi)(c+di) for some c+di ∈ Z[i] ⇒ 1= (a−bi)(c−di)⇒1 = (a2 + b2)(c2 + d2)⇒ a2 + b2 = 1⇒ either a⇒±1 and b = 0 or a = 0 andb=±1⇒ 1,−1, i, and −i are the only invertible elements of Z[i].

Page 255: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.1 Divisibility 239

Definition 6.1.2 Let R be a commutative ring with 1. An element q ∈ R is said tobe irreducible in R iff

(i) q is a non-zero non-unit;(ii) whenever q = bc for b, c ∈R, then b or c is a unit.

An element p ∈R is said to be prime in R iff

(i) p is a non-zero non-unit;(ii) whenever p|ab for a, b ∈R, then p|a or p|b.

Example 6.1.2 (i) In the integral domain (Z,+, ·), 6 is not an irreducible element,but 7 is an irreducible element. If p is a prime integer, then both p and −p areirreducible elements and prime (according to Definition 6.1.2).

(ii) In (Z6,+, ·) (which is not an integral domain), (2) is prime but not irre-ducible, since (2)= (2) · (4) and neither (2) nor (4) are units in Z6.

In a principal ideal domain R, prime elements and irreducible elements are char-acterized by the corresponding prime ideals and maximal ideals of R, respectively.

Theorem 6.1.2 Let p be a non-zero non-unit element in an integral domain R.Then

(i) p is prime iff 〈p〉 is a non-zero prime ideal of R;(ii) p is irreducible iff 〈p〉 is maximal in the set S of all proper principal ideals

of R;(iii) every prime element of R is irreducible;(iv) if R is a PID, then p is prime iff p is irreducible;(v) every associate of an irreducible (prime) element of R is irreducible (prime);

(vi) the only divisors of an irreducible element of R are its associates and the unitsof R.

Proof (i) As p is a non-zero non-unit element of R, 〈p〉 is non-zero and not R. Letp be prime in R. Then for b, c ∈ R, if bc ∈ 〈p〉, then ∃ an element r ∈ R such thatbc = rp⇒ p|bc⇒ p|b or p|c⇒ b ∈ 〈p〉 or c ∈ 〈p〉 ⇒ 〈p〉 is a prime ideal of R,such that 〈p〉 is non-zero.

Conversely, let 〈p〉 be a non-zero prime ideal of R. Then p|bc (where b, c ∈ R)⇒ bc ∈ 〈p〉⇒ b ∈ 〈p〉 or c ∈ 〈p〉⇒ p|b or p|c⇒ p is prime in R.

(ii) Let p be irreducible in R and 〈a〉 be a principal ideal of R such that〈p〉� 〈a〉 ⊆R. Now p ∈ 〈a〉⇒ p = ra for some r ∈R⇒ either r or a is invertible,since p is irreducible. Suppose r is invertible, then p = ra ⇒ a = r−1p ∈ 〈p〉 ⇒〈a〉 ⊆ 〈p〉 ⇒ a contradiction ⇒ a is an invertible ⇒ 〈a〉 = R⇒ 〈p〉 is a maximalprincipal ideal of R. Conversely, let 〈p〉 be a maximal principal ideal of R. If p isnot irreducible, then p = bc for some b, c ∈ R, where neither b nor c is invertible(the possibility that p is a unit ⇒ 〈p〉 = R is not tenable). Now b ∈ 〈p〉 ⇒ b = rp

for some r ∈ R ⇒ p = bc = (rp)c = (rc)p ⇒ 1 = rc ⇒ c is invertible in R ⇒

Page 256: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

240 6 Factorization in Integral Domains and in Polynomial Rings

a contradiction ⇒ b /∈ 〈p〉 ⇒ 〈p〉 � 〈b〉. Again 〈b〉 = R ⇒ b is a unit ⇒ a con-tradiction ⇒ 〈b〉 �= R. Thus 〈p〉� 〈b〉� R⇒ a contradiction as 〈p〉 is a maximalprincipal ideal of R. So, p must be an irreducible element of R.

(iii) Let p be a prime element of R. Then p = ab for some a, b ∈ R⇒ p|a orp|b. Suppose p|a. Then px = a (for some x ∈ R) ⇒ p = p(xb)⇒ 1= xb⇒ b isa unit⇒ p is irreducible.

(iv)⇒ (implication part) follows from (iii).To prove⇐ part, suppose p is an irreducible element such p|ab (a, b ∈R). Then

ab = pc for some c ∈ R. As R is a PID, 〈p,a〉 = 〈d〉 for some d ∈ R ⇒ p = rd

for some r ∈ R ⇒ either r or d is an invertible element. Now d is invertible ⇒〈p,a〉 =R⇒ 1= tp+ua for some t, u ∈R⇒ b= b1= btp+bua = btp+puc=p(tb + uc)⇒ p|b. For the other possibility, r is invertible in R ⇒ d = r−1p ∈〈p〉⇒ 〈d〉 ⊆ 〈p〉⇒ a ∈ 〈p〉⇒ p|a. Thus p|ab⇒ p|a or p|b⇒ p is prime.

(v) If p is irreducible and d is an associate of p, then p = du, where u is aninvertible element in R (by Theorem 6.1.1 (vii)). Now d = ab⇒ p = abu⇒ a is aunit or bu is a unit. But bu is a unit⇒ b is a unit. Consequently, d is irreducible.

(vi) p is irreducible and a|p⇒〈p〉 ⊆ 〈a〉⇒ 〈p〉 = 〈a〉 or 〈a〉 =R by (ii)⇒ a iseither an associate of p or a unit. �

Remark The converse of (iii) is not true in an arbitrary integral domain (see Ex. 15of Exercises-I).

We now introduce the concept of a greatest common divisor (gcd).

Definition 6.1.3 Let a1, a2, . . . , an be elements (not all zero) of an integral domainR. An element d ∈R is said to be a greatest common divisor of a1, a2, . . . , an iff

(i) d|ai for i = 1,2, . . . , n (d is a common divisor);(ii) c|ai (for i = 1,2, . . . , n)⇒ c|d .

Suppose d and x ∈ R satisfy conditions (i) and (ii). Then d|x and x|d ⇒ d andx are associates ⇒ d is unique (if it exists) up to arbitrary invertible factors. So wewrite any greatest common divisor of a1, a2, . . . , an by gcd(a1, a2, . . . , an).

Remark Given a1, a2, . . . , an ∈ R′, their gcd may not exist. For example, in R =Z[√5i], the elements 2(1+√5i) and 6 have no gcd.

Theorem 6.1.3 Let a1, a2, . . . , an be non-zero elements of an integral domain R.Then a1, a2, . . . , an have a greatest common divisor d , expressible in the form:

d = r1a1 + r2a2 + · · · + rnan(ri ∈R) iff 〈a1, a2, . . . , an〉 is a principal ideal.

Proof Suppose d = gcd(a1, a2, . . . , an) exists and is written in the form

d =n∑

i=1

riai (ri ∈R).

Page 257: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.1 Divisibility 241

Then d ∈ 〈a1, a2, . . . , an〉 =A (say) ⇒〈d〉 ⊆A. Now d|ai (for each i) ⇒ ai = xid

(xi ∈R)⇒ each element of A ∈ 〈d〉⇒A⊆ 〈d〉. Consequently, A= 〈d〉.Conversely, let 〈a1, a2, . . . , an〉 =A (say) be a principal ideal of R. Then A= 〈d〉

for some d ∈ R. So each ai ∈ 〈d〉 ⇒ d|ai for each i. We now show that for anycommon divisor c of ai ’s, c|d . Now ai = tic, for suitable ti ∈R and d =∑n

i=1 riai ,ri ∈ R ⇒ d =∑n

i=1(ri ti )c ⇒ c|d ⇒ d is a gcd(a1, a2, . . . , an), expressed in thedesired form. �

Corollary Any finite set of non-zero elements a1, a2, . . . , an of a principal ideal do-main R, has a greatest common divisor in the form: gcd(a1, a2, . . . , an)=∑n

i=1 riai

for suitable choices of ri ∈R.

Definition 6.1.4 If gcd(a1, a2, . . . , an)= 1 (ai ∈R), we say that a1, a2, . . . , an arerelatively prime.

Corollary (Bezout’s Identity) If a1, a2, . . . , an are non-zero elements of a principalideal domain R, then a1, a2, . . . , an are relatively prime iff

∑ni=1 riai = 1, for some

ri ∈R.

We now study the concept of a least common multiple (lcm) which is the dual tothat of gcd.

Definition 6.1.5 Let a1, a2, . . . , an be non-zero elements of an integral domain R.An element d ∈R is said to be a least common multiple (lcm) of a1, a2, . . . , an iff

(i) ai |d for i = 1,2, . . . , n (d is a common multiple);(ii) ai |c (for i = 1,2, . . . , n) implies d|c.

Remark An lcm (if it exists) is unique up to associates but lcm may not exist. Forexample, lcm of 2(i +√5i) and 6 does not exist in Z[√5i].

We write lcm(a1, a2, . . . , an) to denote their any lcm (if it exists).

Theorem 6.1.4 Let a1, a2, . . . , an be non-zero elements of an integral domain R.Then a1, a2, . . . , an have a least common multiple iff the ideal

⋂〈ai〉 is a principalideal in R.

Proof Suppose d = lcm(a1, a2, . . . , an) exists. Then d ∈ 〈ai〉 for each i ⇒ 〈d〉 ⊆⋂〈ai〉. Again r ∈⋂〈ai〉 ⇒ ai |r for each i ⇒ d|r ⇒ r ∈ 〈d〉 ⇒⋂〈ai〉 ⊆ 〈d〉. So,⋂〈ai〉 = 〈d〉.Conversely,

⋂〈ai〉 is a principal ideal of R⇒⋂〈ai〉 = 〈d〉 (for some d ∈ R) ⇒〈d〉 ⊆ 〈ai〉 for each i⇒ ai |d for each i. Again for any other common multiple c ofa1, a2, . . . , an in R, ai |c for each i⇒〈c〉 ⊆ 〈ai〉 for each i⇒〈c〉 ⊆⋂〈ai〉 = 〈d〉⇒d|c⇒ d = lcm(a1, a2, . . . , an). �

Definition 6.1.6 A ring R is said to have the gcd property (lcm property), iff anyfinite number of non-zero elements of R admits a gcd (lcm).

Page 258: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

242 6 Factorization in Integral Domains and in Polynomial Rings

Remark Every principal ideal domain satisfies both gcd property and lcm property.This follows from Theorems 6.1.3 and 6.1.4.

Definition 6.1.7 Let R be an integral domain and a be a non-zero non-invertibleelement of R. Then a is said to have a factorization in R iff a can be expressed as afinite product of irreducible elements of R. If every non-zero non-invertible elementof R has a factorization in R then R is said to be a factorization domain.

Definition 6.1.8 An integral domain R is a unique factorization domain iff thefollowing two conditions hold:

(i) Every non-zero non-invertible element of R can be factored into a finite productof irreducible elements;

(ii) if a = p1p2 · · ·pn and a = q1q2 · · ·qm (pi , qi are irreducible), then n=m andfor some permutation σ of {1,2, . . . , n}; pi and qσ(i) are associates for each i,in R.

Example 6.1.3 Consider (Z,+, ·). By Fundamental Theorem of Arithmetic (Theo-rem 1.4.8 of Chap. 1), every non-zero non-unit element in Z is a product of a finitenumber of irreducible elements (prime integers or their negatives) and this factor-ization is unique (except for the order of the irreducible factors). Consequently,(Z,+, ·) is a unique factorization domain.

Theorem 6.1.5 Let R be a PID. Then every non-zero non-invertible element has afactorization into a finite product of primes.

Proof Let a be a non-zero non-invertible element of R. Then ∃ a prime p1 ∈ R

such that p1|a (see Ex. 4 of Exercises-I) ⇒ a = p1a1 for some non-zero a1 ∈ R⇒〈a〉 ⊆ 〈a1〉. Suppose 〈a〉 = 〈a1〉. Now 〈a〉 = 〈a1〉 ⇒ a1 = ra for some r ∈ R⇒ a =p1a1 = p1ra ⇒ 1 = p1r ⇒ p1 is invertible ⇒ a contradiction ⇒ 〈a〉 �= 〈a1〉 ⇒〈a〉� 〈a1〉. Thus we obtain an increasing chain of principal ideals:

〈a〉� 〈a1〉� 〈a2〉� · · ·� 〈an〉� · · · (6.1)

with an−1 = pnan for some prime pn ∈R. This process is continued as long as an isnot an invertible element of R. But this chain terminates (see Ex. 2 of Exercises-I)and for some n, an must have an inverse and then 〈an〉 = R. Thus (6.1) gives a =p1p2 · · ·pn−1p

′n, where p′n = pnan is prime (as it is an associate of a prime). �

Theorem 6.1.6 Every principal ideal domain R is a unique factorization domain.

Proof Let a be a non-zero non-invertible element of R. Then a has a primefactorization by Theorem 6.1.5. To prove the unique factorization, suppose a =p1p2 · · ·pn = q1q2 · · ·qm (n �= m), where pi and qi are primes in R. Then pi |(q1q2 · · ·qm). Hence pi divides some qj (j = 1,2, . . . ,m). Without loss of general-ity, suppose p1|q1 and n < m. Then q1 = p1u1 for some unit u1 ∈R. Canceling p1,

Page 259: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.2 Euclidean Domains 243

we find that p2 · · ·pn = u1q2 · · ·qm. Continuing this process we find (after n steps)that

1= u1u2 · · ·unqn+1 · · ·qm.

As qi are not invertible, we get a contradiction, resulting in m = n. Thus every pi

has some qj as an associate and conversely. Hence the two prime factorizations areidentical (up to order and associates of factors). �

Remark The converse of Theorem 6.1.6 is not true. Consider Z[x]. It is a uniquelyfactorizable domain but not a principal ideal domain (see Ex. 3 of SE-I).

6.2 Euclidean Domains

We now generalize Division Algorithm for integers to arbitrary integral domains bydefining Euclidean domains. The ring of integers, Gaussian rings and polynomialrings are the main sources for the study of Euclidean domains with the help of normfunctions.

Definition 6.2.1 An integral domain R is said to be a Euclidean domain iff thereexists a function δ :R \ {0}→N (non-negative integers) such that

(i) δ(ab)≥ δ(a) (and also ≥δ(b)) for any a, b ∈R with a �= 0 and b �= 0;(ii) (Division algorithm) for any a, b ∈ R with b �= 0, there exist q, r ∈ R (quo-

tient and remainder) such that a = qb + r , where either r = 0 or δ(r) < δ(b).δ is called the Euclidean valuation or Euclidean norm function or simply normfunction. We also call the pair (R, δ) a Euclidean domain.

We do not assign a value to δ(0).

Example 6.2.1 (i) Every field F is a Euclidean domain with Euclidean norm func-tion defined by

δ(a)= 1 ∀a (�=0) ∈ F

and division algorithm is defined by a = (ab−1)b+ 0 ∀a ∈ F and ∀b (�=0) ∈ F .(ii) (Z,+, ·) is a Euclidean domain with Euclidean norm function δ defined by

δ(a)= |a|, a (�=0) ∈ Z. Now δ(ab)= |ab| = |a||b| = δ(a)δ(b).Let a, b ∈ Z and b �= 0. Then ∃ integers q and r (by Theorem 1.4.3 of Chap. 1)

such that a = bq+r , where either r = 0 or δ(r) < δ(b). So division algorithm holds.(iii) The ring D = Z[i] of Gaussian integers is a Euclidean domain with Eu-

clidean norm function δ defined by δ(m+ in)=m2+n2 ∀m,n (not both zero) ∈ Z.To define division algorithm let α,β ∈ D and β �= 0. Then α/β = a + ib, wherea, b are rational numbers. Thus there exist integers m0, n0 such that |m0 − a| ≤ 1

2and |n0 − b| ≤ 1

2 .

Page 260: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

244 6 Factorization in Integral Domains and in Polynomial Rings

Hence a+ ib= (m0+ in0)+ε1+ iε2, where |ε1| ≤ 12 and |ε2| ≤ 1

2 ⇒ α = (m0+in0)β + (ε1+ iε2)β . Now α,β ∈D and m0+ in0 ∈D⇒ α− (m0+ in0)β ∈D⇒(ε1 + iε2)β ∈D⇒ α = qβ + r , where r = (ε1 + iε2)β and q = (m0 + in0). Nowδ(r)= δ((ε1+ iε2)β)= |ε2

1+ ε22||β|2 ≤ ( 1

4 + 14 )|β|2 = 1

2δ(β) < δ(β)⇒ δ :D→Nis a Euclidean function.

Problem 2 Let (R, δ) be a Euclidean domain. Prove that

(i) for each non-zero a ∈R, δ(a)≥ δ(1);(ii) if two non-zero elements a, b ∈R are associates, then δ(a)= δ(b);

(iii) an element a (�=0) ∈R is invertible iff δ(a)= 1.

Solution (i) a = a1⇒ δ(a)≥ δ(1);(ii) a and b are associates ⇒ a = bu, for some invertible element u ∈ R⇒ b =

au−1 ⇒ δ(a)= δ(bu)≥ δ(b) and δ(b)= δ(au−1)≥ δ(a)⇒ δ(a)= δ(b);(iii) a (�=0) has an inverse in R ⇒ ab = 1, for some b ∈ R ⇒ δ(a) ≤ δ(ab) =

δ(1) ≤ δ(a)⇒ δ(a)= 1. Conversely, for the element a (�=0) ∈ R, δ(a)= 1⇒∃q ,r ∈ R such that 1 = qa + r , where r = 0 or δ(r) < δ(a)⇒ r = 0 or δ(r) < 1⇒r = 0 (since the alternative is not possible)⇒ 1= qa⇒ a is invertible in R.

Problem 3 Prove that the quotient and remainder in condition (ii) of Defini-tion 6.2.1 are unique iff δ(a + b)≤max{δ(a), δ(b)} for any a, b ∈R.

Solution Suppose there exist non-zero elements a, b ∈ R such that δ(a + b) >

max{δ(a), δ(b)}. Then b = 0(a + b) + b = 1(a + b) − a with both possibilitiesδ(−a) = δ(a) < δ(a + b) and δ(b) < δ(a + b) shows non uniqueness of quotientand remainder in condition (ii) of Definition 6.2.1. Conversely, if the given conditionholds and a ∈R and the element a ∈R has two representations,

a = qb+ r(r = 0 or δ(r) < δ(b)

),

a = q ′b+ r ′(r ′ = 0 or δ

(r ′)< δ(b)

).

}(A)

If r �= r ′ and q �= q ′, then δ(b) ≤ δ((q ′ − q)b) = δ(r − r ′) ≤ max{δ(r), δ(−r ′)} <δ(b), a contradiction. This shows that r = r ′ and q = q ′ by (A), as each of theserelations implies the other⇒ uniqueness of the representation.

Remark Division algorithm for Z holds by defining δ(x)= |x|, for all x ∈ Z \ {0}.

Theorem 6.2.1 Every Euclidean domain is a principal ideal domain.

Proof Let (R, δ) be a Euclidean domain and A an ideal of R such that A �= {0}.Consider the set S defined by S = {δ(a) : a ∈ A;a �= 0} ⊆ N+. Then S �= ∅ and Shas a least element by the well-ordering principle. Then ∃ an element b ∈ A suchthat δ(b) is least in S. We claim that A = 〈b〉. For any a ∈ A, ∃q, r ∈ R such thata = qb+ r , where r = 0 or δ(r) < δ(b)⇒ 0= a − qb ∈A (since A is an ideal) or

Page 261: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.2 Euclidean Domains 245

δ(r) < δ(b)⇒ a = qb ∈ 〈b〉 (since the other alternative contradicts the minimalityof δ(b))⇒A⊆ 〈b〉. Again b ∈A⇒〈b〉 ⊆A. Consequently, A= 〈b〉. �

Remark 1 Every ideal of a Euclidean ring R is of the form bR, where b ∈R.

Remark 2 The converse of Theorem 6.2.1 is not true. For example, R = {a +b√

23 : a, b ∈ Z} forms a principal ideal domain under usual addition and multi-plication. But R is not a Euclidean domain.

Corollary Every Euclidean domain is a unique factorization domain.

Proof It follows from Theorems 6.2.1 and 6.1.6. �

Theorem 6.2.2 If F is a field, then F [x] is a Euclidean domain.

Proof If F is a field, then F [x] is an integral domain by Proposition 4.5.1. For anyf (x) ∈ F [x], define δ : F [x] \ {0}→N (non-negative integers) by

δ(f )= degree of f.

Then δ(f ) is a non-negative integer such that deg(fg)= degf + degg by Proposi-tion 4.5.2 and hence

δ(fg)≥ δ(f )(and also ≥ δ(g)

), ∀f (x), g(x) ∈ F [x] \ {0}.

To verify the division algorithm, let f (x), g(x) ∈ F [x] with g(x) �= 0. If degf <

degg, then f = 0g + f , with δ(f ) < degg. Next assume that degf ≥ degg. Weapply induction on degf = n. If n = 0, then m = degg = 0 and hence there isnothing to prove. We assume that the division algorithm holds ∀f,g ∈ F [x] withdegf < n and degf ≥ degg. Let

f (x)= a0 + a1x + a2x2 + · · · + anx

n, an �= 0 and

g(x)= b0 + b1x + b2x2 + · · · + bmxm, bm �= 0

be polynomials in F [x] such that degf = n≥m= degg.Then h(x) = f (x) − anb

−1m xn−mg(x) is a polynomial in F [x] with the coeffi-

cient of xn is an − anb−1m bm = 0. Hence degh≤ n− 1⇒ h(x)= q(x)g(x)+ r(x),

with r = 0 or δ(r) < δ(g) by induction hypothesis ⇒ f (x) = anb−1m xn−mg(x) +

q(x)g(x) + r(x) = q1(x)g(x) + r(x), where q1(x) = anb−1m xn−m + q(x) ∈ F [x]

with r = 0 or δ(r) < δ(g).Hence F [x] is a Euclidean domain. �

Corollary 1 If F is a field, then F [x] is a principal ideal domain.

Proof It follows from Theorems 6.2.1 and 6.2.2. �

Page 262: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

246 6 Factorization in Integral Domains and in Polynomial Rings

Corollary 2 If F is a field, then F [x] is a unique factorization domain.

Proof It follows from Theorem 6.2.2 and Corollary of Theorem 6.2.1. �

6.3 Factorization of Polynomials over a UFD

As the polynomial ring over an integral domain is also an integral domain, we canextend the factorization theory to such polynomial rings. In this section we studypolynomials over unique factorization domains (UFD). We first give sufficient con-ditions for irreducibility of polynomials over a UFD, called the Eisenstein criterion.One of the most important applications of Eisenstein criterion is in the proof of theirreducibility of the cyclotomic polynomial φp(x) in Q[x] (see Ex. 4, SE-I). Theproperty that Z[x] is a UFD is generalized for R[x], where R[x] is an arbitraryUFD (see Theorem 6.3.2). This theorem is essentially due to Gauss and provides anextensive class of UFD’s.

We start with the concept of primitive polynomials.

Definition 6.3.1 Let R be a UFD and f (x)= a0+ a1x + · · · + anxn ∈R[x]. Then

the content of f (x), denoted C(f ) is defined by C(f )= gcd(a0, a1, . . . , an).

For example, for f (x)= 4x3 + 2x2 + 3x + 7 ∈ Z[x],C(f )= 1.

Definition 6.3.2 Let R be a UFD. Then f (x) is said to be a primitive polynomialin R[x] iff C(f )= 1.

Proposition 6.3.1 Let R be a UFD. The product of two primitive polynomials inR[x] is also a primitive polynomial.

Proof Left as an exercise. �

The concepts of irreducibility and units in any commutative ring R with 1 areclosely related. In particular, it is necessary to look into the units of a polynomialring R[x] for the study of irreducibility of polynomials in R[x]. The units in R[x]are precisely the non-zero constant polynomials which are units in R. We now studythe irreducibility of polynomials over UFD.

Proposition 6.3.2

(i) If c is an irreducible element of a UFD R, then the constant polynomial c isalso irreducible in R[x].

(ii) Every one degree polynomial over a UFD R whose leading coefficient is a unitin R is irreducible in R[x]. In particular, every one degree polynomial over afield is irreducible.

(iii) Let f (x) be a polynomial of degree 2 or 3 over a field F . Then f (x) is irre-ducible over F iff f (x) has no root in F .

Page 263: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.3 Factorization of Polynomials over a UFD 247

Proof Left as an exercise. �

Lemma 6.3.1 (Gauss Lemma) Let R be a UFD and F =Q(R), the quotient fieldof R. If f (x) ∈R[x] is a non-constant irreducible polynomial in R[x], then f (x) isalso irreducible in F [x].

Proof Let f (x) be a non-constant irreducible polynomial in R[x]. If possible, letf (x) be reducible in F [x]. Then ∃u(x), v(x) ∈ F [x] such that f (x) = u(x)v(x),where 0 < degu < degf and 0 < degv < degf . We may take u(x)= (a/b)u1(x)

and v(x) = (c/d)v1(x), where a, b (�=0), c, d (�=0) ∈ R and u1(x), v1(x) ∈ R[x]and are both primitive polynomials. Hence f (x) = (ac/bd)u1(x)v1(x), whereu1(x)v1(x) is a primitive polynomial by Proposition 6.3.1. Now f (x) ∈ R[x] isirreducible and C(f ) divides f ⇒ C(f ) = 1 ⇒ f is primitive. Consequently,(bd)f (x) = (ac)u1(x)v1(x)⇒ bd = ac (comparing the content). Hence f (x) =u1(x)v1(x) in R[x], where degu1 = degu < degf and degv1 = degv < degf . Butthis contradicts the assumption that f (x) is irreducible in R[x]. This leads to theconclusion that f (x) is also irreducible in F [x]. �

Theorem 6.3.1 (The Eisenstein criterion) Let R be a UFD with quotient field Q(R)

and f (x)= a0+a1x+· · ·+anxn ∈R[x], an �= 0 i.e., f (x) be a non-constant poly-

nomial in R[x] of degree n. If there exists an irreducible element p ∈R such that

(i) p|ai , i = 0,1,2, . . . , n− 1;(ii) p|an and

(iii) p2|a0,

then f (x) is irreducible in Q(R)[x].Moreover, if f (x) is a primitive polynomial in R[x], then f (x) is also irreducible

in R[x].

Proof First suppose that f (x) is a primitive polynomial in R[x] satisfying theabove divisibility conditions with respect to p. If possible, let f (x) be reduciblein R[x]. Then ∃g(x),h(x) ∈R[x] such that f (x)= g(x)h(x), where degg < n anddegh < n.

Let

g(x)= g0 + g1x + · · · + grxr , where gr �= 0, and 0 < r < n

and

h(x)= h0 + h1x + · · · + htxt , where ht �= 0, and 0 < t < n.

Hence

f (x)= g(x)h(x) ⇒ ai = gih0 + gi−1h1 + · · · + g0hi.

Now p|a0 ⇒ p|g0 or p|h0, but not both, otherwise, p2|a0, which is a contradic-tion. Suppose p|g0 but p|h0. Clearly, p does not divide C(g), otherwise all the

Page 264: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

248 6 Factorization in Integral Domains and in Polynomial Rings

coefficients of f (x) would be divisible by p, which is not true, since f (x) is aprimitive polynomial in R[x]. Let gs be the first of the gi ’s such that gs is not di-visible by p, where s ≤ r < n. Then p divides all the coefficients g0, g1, . . . , gs−1.But as = gsh0 + gs−1h1 + · · · + g0hs and p|as,p|gs−1, . . . , p|g0 ⇒ either p|gs orp|h0 ⇒ a contradiction in either case. Hence f (x) is irreducible in R[x].

Next we suppose f (x)= C(f )f1(x) with f1(x) primitive in R[x]; (in particularf1 = f if f is primitive in R[x]). If f1(x)= b0 + b1x + · · · + bnx

n and C(f )= d ,then ai = dbi for i = 0,1,2, . . . , n. Since p does not divide an, p cannot divide d .Thus p divides bi , i = 0,1,2, . . . , n − 1, p does not divide bn and p2 does notdivide b0. Hence by the above argument, f1(x) is irreducible in R[x] and thus itis irreducible in Q(R)[x] by Lemma 6.3.1. As d is non-zero element in the fieldQ(R), d is a unit in Q(R)[x], showing that f (x) is irreducible in Q(R)[x]. �

Corollary 1 If p is a prime integer and n (>1) is an integer, then xn−p ∈ Z[x] isirreducible in Z[x].

Remark The Eisenstein criterion gives only a sufficient condition for irreducibilitybut not necessary (see Ex. 4 of SE-I).

Corollary 2 (The Eisenstein criterion for Z[x]) Let f (x)= a0+a1x+· · ·+anxn ∈

Z[x], an �= 0 be a primitive polynomial in Z[x]. If there is a prime integer p suchthat

(i) p|ai , i = 0,1,2, . . . , n− 1;(ii) p|an and

(iii) p2|a0,

then f (x) is irreducible in Z[x].

Proof It follows from Theorem 6.3.1 by taking R = Z. �

Theorem 6.3.2 (Gauss Theorem) If R is a UFD, then R[x] is also a UFD.

Proof Let f (x) ∈ R[x] and F = Q(R), the quotient field of R. Then F [x] isa UFD by Corollary 2 of Theorem 6.2.2. Suppose f (x) = af1(x), where a =C(f ) and f1 ∈ R[x] is a primitive polynomial. Now F [x] is a UFD ⇒ f1(x) =g1(x)g2(x) · · ·gn(x), where gi(x) ∈ F [x] are irreducible. We may take gi(x) =(ai/bi)hi(x), where ai, bi (�=0) ∈R and hi(x) ∈R[x] are primitive.

Hence

f1(x)= (a1a2 · · ·an)/(b1b2 · · ·bn)h1(x)h2(x) · · ·hn(x)

⇒ (b1b2 · · ·bn)f1(x)= (a1a2 · · ·an)h1(x)h2(x) · · ·hn(x)

⇒ f1(x)= h1(x)h2(x) · · ·hn(x),

since b1b2 · · ·bn = a1a2 · · ·an (comparing the contents), where hi(x) ∈ R[x] areprimitive and irreducible in F [x] and hence irreducible in R[x] also.

Page 265: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.4 Supplementary Examples (SE-I) 249

Let C(f )= a = a1a2 · · ·at , where ai ∈R are irreducible. Then f (x)= af1(x)=(a1a2 · · ·at )h1(x)h2(x) · · ·hn(x) is a factorization of f (x) as a product of irre-ducible elements of R[x].

Let

f (x)= (a1a2 · · ·at )h1(x)h2(x) · · ·hn(x)

= (b1b2 · · ·bs)k1(x)k2(x) · · ·km(x)

be two factorizations of f (x) as a product of irreducible elements of R[x]. Com-paring the contents and using the Gaussian Lemma, the uniqueness of the abovefactorizations follows. �

Corollary 1 Z[x] is a UFD.

Corollary 2 If R is a UFD, then R[x1, x2, . . . xn] is also a UFD.

Proof It follows from Gauss Theorem 6.3.2 by inductive argument using the resultthat R[x1, x2, . . . , xn] =R[x1, x2, . . . , xn−1][xn]. �

We now present an important application of irreducibility of polynomials over aUFD in construction of finite fields.

Theorem 6.3.3 Given a prime integer p and a positive integer n, there exists a finitefield of order pn.

Proof Consider the polynomial ring Zp[x] and an irreducible polynomial f (x) ofdegree n over Zp . As Zp is a field, Zp is PID and 〈f (x)〉 is a maximal ideal ofZp[x]. Thus, Zp[x]/〈f (x)〉 is a field. As degf (x)= n, an element of Zp[x]/〈f (x)〉is of the form

a0 + a1x + a2x2 + · · · + an−1x

n−1,

where ai ∈ Zp , i = 0,1, . . . , n− 1.Thus, |Zp[x]/〈f (x)〉| = pn. �

6.4 Supplementary Examples (SE-I)

1 If p is a prime integer, then n√

p is an irrational number for every positive inte-ger n > 1.

[Hint. xn−p ∈ Z[x] is irreducible in Z[x] by Corollary 1 of Theorem 6.3.1. Thenby the Gauss Lemma it is also irreducible in Q[x]. Hence it has no rational root.]

2 Let f (x)= a0 + a1x + · · · + anxn ∈ Z[x], an �= 0. If there is a prime integer p

such that

Page 266: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

250 6 Factorization in Integral Domains and in Polynomial Rings

(i) p|ai , i = 0,1,2, . . . , n− 1;(ii) p|an, and

(iii) p2|a0,

then f (x) is irreducible in Q[x].[Hint. Use Theorem 6.3.1.]

3 Z[x] is a UFD but not a PID.[Hint. Z[x] is a UFD by the Corollary to Theorem 6.3.2. To show that Z[x] is

not a PID, let I = {f = a0 + a1x + · · · + anxn ∈ Z[x] : a0 = even}. Then I is not a

principal ideal, otherwise I = 〈h(x)〉 for some h(x) ∈ Z[x]. As 2 ∈ I , h must divide2 and hence h=±2. But x+ 2 ∈ I and h does not divide x+ 2. Hence Z[x] cannotbe a PID.]

4 For any prime integer p > 1, the cyclotomic polynomial φp(x)= 1+ x + x2 +· · · + xp−1 is irreducible in Q[x].

[Hint. φp(x) is irreducible in Z[x] but there does not exist any prime integersatisfying the Eisenstein criterion for irreducibility of φp(x), though it is irreducible.If φp is not irreducible in Z[x], then ∃ non-trivial polynomials f (x), g(x) ∈ Z[x]such that φp(x)= f (x)g(x). Hence φp(x + 1)= f (x + 1)g(x + 1) is a non-trivialfactorization of φp(x + 1) in Z[x]. On the other hand,

φp(x)= xp − 1

x − 1⇒ φp(x + 1)= p+ · · · +

(p

r

)xr−1 + · · · + pxp−2 + xp−1

is irreducible in Z[x] by Theorem 6.3.1. Hence φp(x) is irreducible in Z[x] ⇒φp(x) is also irreducible in Q[x] by Gauss Lemma.]

5 If R is a PID, then R[x] is not necessarily so. If R[x] is a PID, then R is a field.[Hint. Z is a PID but Z[x] is not so by Ex. 3. Suppose R[x] is a PID. Consider the

map f : R[x] → R defined by f (∑n

i=0 aixi) = a0. Then f is a ring epimorphismwith kerf = 〈x〉 (see W.O. Ex. 7 of Chap. 5).

Hence R[x]/〈x〉 ∼=R⇒〈x〉 is a prime ideal in R[x] ⇒ 〈x〉 is a maximal ideal inR[x] by Theorem 5.3.5 of Chap. 5.⇒R is a field by Theorem 5.3.2.]

6 The ideal 〈x2 + 1〉 is a maximal ideal in R[x].[Hint. If possible, let ∃ an ideal I in R[x] such that 〈x2 + 1〉� I ⊆ R[x]. Then

∃f (x) ∈ I such that f (x) /∈ 〈x2+1〉. By division algorithm, f (x)= (x2+1)q(x)+r(x), where r(x) �= 0 and deg(r(x)) < 2. Let r(x)= ax + b, a, b ∈ R and they arenot both 0. Hence ax + b = f (x)− (x2 + 1)q(x) ∈ I ⇒ (ax + b)(ax − b) ∈ I ⇒a2x2 − b2 ∈ I . Moreover, a2(x2 + 1) ∈ I .

Hence a2 + b2 ∈ I ⇒ I contains a non-zero real number⇒ I =R[x].]

Page 267: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.5 Exercises 251

6.5 Exercises

Exercises-I R denotes an integral domain and R′ = R \ {0} (unless specifiedotherwise).

1. Show that the binary relation ρ on R defined by aρb⇔ a is an associate of b,is an equivalence relation with equivalence classes which are sets of associatedelements, and the associates of the identity are precisely the invertible elementsof R. Find the associates of an integer n in (Z,+, ·).

2. Let R be a PID. If {An} is an infinite sequence of ideals satisfying:

A1 ⊆A2 ⊆ · · · ⊆An ⊆An+1 ⊆ · · · .Show that there exists an integer m such that An =Am ∀n > m.

[Hint. Consider A =⋃An. Then A is a principal ideal. Now A = 〈a〉 ⇒a ∈Am (for some m)⇒∀n > m, A= 〈a〉 ⊆Am ⊆An ⊆A⇒An =Am.]

3. Let R be a PID. Show that the non-trivial ideal 〈p〉 is a maximal (prime) idealof R⇔ p is an irreducible (prime) element of R.

[Hint. Use Theorem 6.1.2(ii) for the first assertion. For the second assertion,let p be a prime element of R and ab ∈ 〈p〉. Then ab = rp for some r ∈ R⇒p|ab ⇒ p|a or p|b ⇒ a ∈ 〈p〉 or b ∈ 〈p〉 ⇒ 〈p〉 is a prime ideal of R. Theconverse is similar.]

4. Let R be a PID and a (�=0) be non-unit (i.e., non-invertible) in R. Show thatthere exists a prime p ∈R such that p|a.

[Hint. a (�=0) is a non-unit in R⇒〈a〉 is a proper ideal of R (see Remark 2after Theorem 6.1.1) ⇒∃ a maximal ideal M of R such that 〈a〉 ⊆M (by theCorollary of Theorem 5.3.6 of Chap. 5) ⇒ 〈a〉 ⊆ M = 〈p〉 for some primeelement p ∈R⇒ p|a.]

5. Let a, b, c be non-zero elements of a principal ideal domain R. If c|ab andgcd(a, c)= 1, then show that c|b.

[Hint. gcd(a, c)= 1⇒ 1= ra + tc (for some r, t ∈ R) ⇒ b = 1b = rab +tcb. Now c|ab and c|c⇒ c|(rab+ tcb)⇒ c|b].

6. Let a1, a2, . . . , an and r be non-zero elements of an integral domain R. Provethat

(a) if lcm(a1, a2, . . . , an) exists, then lcm(ra1, ra2, . . . , ran) also exists andlcm(ra1, ra2, . . . , ran)= r lcm(a1, a2, . . . , an);

(b) if gcd(ra1, ra2, . . . , ran) exists, then gcd(a1, a2, . . . , an) also exists andgcd(ra1, ra2, . . . , ran)= r gcd(a1, a2, . . . , an).

7. Let a1, a2, . . . , an and b1, b2, . . . , bn be non-zero elements of an integral domainR such that a1b1 = a2b2 = · · · = anbn = x; show that

(a) if lcm(a1, a2, . . . , an) exists, then gcd(b1, b2, . . . , bn) also exists and satis-fies: lcm(a1, a2, . . . , an)gcd(b1, b2, . . . , bn)= x;

(b) if gcd(ra1, ra2, . . . , rai, . . . , ran) exists ∀r (�=0) ∈R, then lcm(b1, b2, . . . ,

bn) also exists and satisfies: gcd(a1, a2, . . . , an) lcm(b1, b2, . . . , bn)= x.

Page 268: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

252 6 Factorization in Integral Domains and in Polynomial Rings

8. Prove that an integral domain R has the gcd property⇔R has the lcm property.9. In a principal ideal domain R, prove that every non-trivial ideal is the product

of a finite number of prime (maximal) ideals.[Hint. a ∈ R′ is non-invertible⇒ a = p1p2 · · ·pn, where each pi is a prime

element of R⇒ 〈a〉 = 〈p1p2 · · ·pn〉 = 〈p1〉〈p2〉 · · · 〈pn〉, where each 〈pi〉 is aprime ideal of R.]

10. Prove the Euclid Theorem: There are an infinite number of primes in Z.[Hint. Suppose there are only a finite number of primes, p1,p2, . . . , pn (say).

Then x = (p1p2 · · ·pn)+1 is an integer >1 such that x is not divisible by any ofthese primes. But Theorem 6.1.5⇒ x must have a prime factor⇒ x is divisibleby a prime different from the above primes ⇒ ∃ an infinite number of primesin Z.]

11. Let F be a field and F [x] the polynomial extension of F and f,g ∈ F [x] suchthat g �= 0. Show that there exist unique polynomials q, r ∈ F [x] such thatf = gq + r , where either r = 0 or deg r < degg.

12. Let F be a field. Show that F [x] is a Euclidean domain with a Euclidean normfunction δ such that δ satisfies the additional condition:

δ(f + g)≤max(δ(f ), δ(g)

).

[Hint. Define δ : F [x] \ {0}→N by

δ(f )= 2degf .

Then

δ(f + g)= 2deg(f+g) ≤ 2max(degf,degg) (by Proposition 4.5.2)

=max(2degf ,2degg

)=max(δ(f ), δ(g)

).]

13. Let F be a Euclidean domain with norm function δ satisfying the additionalcondition δ(a + b)≤max(δ(a), δ(b)). Prove that either F is a field K or F ⊆K[x] for some field K .

[Hint. Use the fact a Euclidean domain contains an identity e.Then 0 �= δ(e) = δ(e2) = δ(e)δ(e) ⇒ δ(e) = 1. Define K = {a ∈ F :

δ(a) ≤ 1}. Now a, b ∈ K ⇒ δ(a − b) ≤ max(δ(a), δ(b)) ≤ 1 and δ(ab) =δ(a)δ(b)≤ 1⇒K is a subring of F .]

14. Let (R, δ) be a Euclidean domain and A any ideal of R. Show that there existsan element a0 ∈A such that A= 〈a0〉.

[Hint. Let A �= {0} and B = {δ(x) : x ∈ A\{0}} ⊆ N+ ⇒ B has least ele-ment m0 > 0 and let a0 ∈A\{0} be such that δ(a0)=m0. For v ∈A, ∃q, r ∈ R

such that v = a0q + r , where 0 ≤ δ(r) < δ(a0)⇒ r = 0 (proceed as in Theo-rem 6.2.1)⇒A⊆ 〈a0〉.]

15. Show that the quadratic domain Z[√−5] = {a + b√−5 : a, b ∈ Z} with usual

addition and multiplication of complex numbers does not admit unique factor-ization. Also show that 3 is irreducible but not prime in Z[√−5].

Page 269: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

6.5 Exercises 253

[Hint. 2,1 + √−5,1 − √−5 are irreducible elements in Z[√−5]. Now3|6 ⇒ 3|(1 + √−5)(1 − √−5) in Z[√−5]. But 3|(1 + √−5) or 3|(1 −√−5)⇒ 3 is not prime.]

16. (The division algorithm in polynomial ring.) Let R be a commutative ring withidentity and f,g ∈R[x] non-zero polynomials such that the leading coefficientof g is an invertible element. Show that there exist unique polynomials q, r ∈R[x] such that f = qg + r , where either r = 0 or deg r < degg.

17. (Remainder Theorem.) Let R be a commutative ring with identity. If f (x) ∈R[x] and a ∈ R, show that there exists a unique polynomial q(x) in R[x] suchthat f (x)= (x − a)q(x)+ f (a).

18. An element a ∈R is said to be a root of a polynomial f (x) ∈R[x] iff f (a)= 0.Show that f (x) is divisible by x − a⇔ a is a root of f (x).

19. Let R be an integral domain and f (x) ∈ R[x] a non-zero polynomial of de-gree n. Show that f (x) can have at most n distinct roots.

20. Let R be an integral domain and f (x), g(x) ∈ R[x] be two non-zero poly-nomials of degree n. If there exist n + 1 distinct elements ai ∈ R such thatf (ai)= g(ai) for i = 1,2, . . . , n+ 1, show that f (x)= g(x).

21. Let R be an integral domain and A be any infinite subset of R. If f (a) = 0∀a ∈A, show that f ≡ 0.

22. (a) Let R be a commutative ring with 1. Show that the following statements areequivalent:

(i) R is a field;(ii) R[x] is a Euclidean domain;

(iii) R[x] is a principal ideal domain.

(b) Using (a) show that Z[x] is not a principal ideal domain.23. Show that Z[√n] is a Euclidean domain for n=−1,−2,2,3, where Z[√n] =

{a + b√

n : a, b ∈ Z}.24. (a) Let D be the integral domain given by D = Z[i√3] = {a+bi

√3 : a, b ∈ Z}

and v : D → N be the map defined by v(a + bi√

3) = a2 + 3b2. Showthat v is not a Euclidean valuation on D.

(b) If a2+3b2 is a prime integer, show that a+bi√

3 is an irreducible elementin Z[i√3].

25. Let R be a UFD with quotient field F . Show that

(a) two primitive polynomials in R[x] are associates in R[x] iff they are asso-ciates in F [x];

(b) a primitive polynomial of positive degree in R[x] is irreducible in R[x] iffit is irreducible in F [x].

26. Identify the correct alternative(s) (there may be more than one) from the fol-lowing list:

(a) Let I be the ideal generated by x2 + 1 and J be the ideal generated byx3 − x2 + x − 1 in Q[x]. If R =Q[x]/I and S =Q[x]/J , then

(i) R and S are both fields;(ii) R is an integral domain, but S is not so;

Page 270: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

254 6 Factorization in Integral Domains and in Polynomial Rings

(iii) R is a field but S is not so;(iv) R and S are not integral domains.

(b) Which of the following integral domains are Euclidean domains?

(i) R[x2, x3] = {f =∑ni=0 aix

i ∈R[x] : a1 = 0};(ii) Z[√−3] = {a + b

√−3 : a, b ∈ Z};(iii) Z[x];(iv) ( Z[x]

〈2,x〉 [y]), where x, y are independent variables and 〈2, x〉 is the idealgenerated by 2 and x.

(c) Let I be the ideal generated by 1+ x2 in Q[x] and R be the ring given byR =Q[x]/I . If y is the coset of x in R, then

(i) y2 + 1 is irreducible over R;(ii) y2 − y + 1 is irreducible over R;

(iii) y3 + y2 + y + 1 is irreducible over R;(iv) y2 + y + 1 is irreducible over R.

(d) Let fn(x)= xn−1 + xn−2 + · · · + x + 1 be a polynomial over Q of degreen > 1. Then

(i) fn(x) is an irreducible polynomial in Q[x] for every positive integer n;(ii) fpe(x) is an irreducible polynomial in Q[x] for every prime integer p

and every positive integer e;(iii) fp(x) is an irreducible polynomial in Q[x] for every prime integer p;

(iv) fp(xpe−1) is an irreducible polynomial in Q[x] for every prime inte-

ger p and every prime integer e.

(e) Consider the element α = 3 + √−5 in the ring R = Z[√−5] = {a +b√−5 : a, b ∈ Z}. Then

(i) R is an integral domain;(ii) α is irreducible;

(iii) α is prime;(iv) R is not a unique factorization domain.

(f) Let Fp be the field Zp , where p is a prime. Let Fp[x] be the associatedpolynomial ring. Then

(i) F5[x]/< x2 + x + 1 > is a field;(ii) F2[x]/< x3 + x + 1 > is a field;

(iii) F3[x]/< x3 + x + 1 > is a field;(iv) F7[x]/< x2 + 1 > is a field.

(g) Which of the following statement(s) is (are) false?

(i) A homomorphic image of a UFD (unique factorization domain) isagain a UFD;

(ii) units of the ring Z[√−5] are the units of Z;(iii) the element 2 ∈ Z[√−5] is irreducible in Z[√−5];(iv) the element 2 is a prime element in Z[√−5].

Page 271: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 255

(h) Let R be the polynomial ring Z2[x] and write the elements of Z2 as {0,1}.If f (x)= x2 + x + 1, then the quotient ring R/〈f (x)〉 is

(i) a ring but not an integral domain;(ii) a finite field of order 4;

(iii) an integral domain but not a field;(iv) an infinite field.

(i) Which of the following ideal(s) is(are) maximal?

(i) The ideal 17Z in Z;(ii) the ideal I = {f : f (0)= 0} in the ring C([0,1]) of all continuous real

valued functions on the interval [0,1];(iii) the ideal 25Z in Z;(iv) the ideal generated by x3 − x + 1 in the ring of polynomials F3[x],

where F3 is the field of three elements.

6.6 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Artin 1991;Atiya and Macdonald 1969; Birkoff and Mac Lane 1965; Burtan 1968; Fraleigh1982; Herstein 1964; Hungerford 1974; Jacobson 1974, 1980; Lang 1965; McCoy1964; van der Waerden 1970; Zariski and Samuel 1958, 1960) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Atiya, M.F., Macdonald, I.G.: Introduction to Commutative Algebra. Addison-Wesley, Reading

(1969)Birkoff, G., Mac Lane, S.: A Survey of Modern Algebra. Macmillan, New York (1965)Burtan, D.M.: A First Course in Rings and Ideals. Addison-Wesley, Reading (1968)Fraleigh, J.B.: A First Course in Abstract Algebra. Addison-Wesley, Reading (1982)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hungerford, T.W.: Algebra. Springer, New York (1974)Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)McCoy, N.: Theory of Rings. Macmillan, New York (1964)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)Zariski, O., Samuel, P.: Commutative Algebra I. Van Nostrand, Princeton (1958)Zariski, O., Samuel, P.: Commutative Algebra II. Van Nostrand, Princeton (1960)

Page 272: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 7Rings with Chain Conditions

In this chapter we continue to study theory of rings by finiteness conditions (chainconditions) on ideals. The motivation of chain conditions for ideals of a ring camefrom an interesting property of Z. In the ring of integers Z, let I1 be a non-zeroideal and I be an ideal such that I1 ⊆ I . Then ∃ non-zero integers m and n suchthat I1 = 〈m〉, I = 〈n〉 and n|m, as Z is a PID. Since m contains only a finitelymany divisors n in Z such that I1 ⊆ I , there cannot exist infinitely many ideals It

(t = 2,3, . . .) such that I1 � I2 � I3 � · · ·� It � · · · . This interesting property of Zwas first recognized by the German mathematician Emmy Noether (1882–1935). Onthe other hand, Z has an infinite descending chain of ideals 〈3〉� 〈6〉� 〈12〉� · · · .This property of Z leads to the concept of Artinian rings, the name is in honorof Emil Artin (1898–1962). In this chapter we study special classes of rings andobtain deeper results on ideal theory. For this we need to impose some finitenessconditions and introduce Noetherian rings which are versatile. The most conve-nient equivalent formulation of the Noetherian requirement is that the ideals of thering satisfy the ascending chain condition. We establish a connection between aNoetherian domain and a factorization domain. We prove the Hilbert Basis Theo-rem which gives an extensive class of Noetherian rings. Its application to algebraicgeometry is discussed. We also prove Cohen’s theorem. Our study culminates inrings with descending chain condition for ideals, which determines their ideal struc-ture.

In this chapter a ring R means a commutative ring with identity, unless otherwisestated.

7.1 Noetherian and Artinian Rings

The basic concepts of modern theory of rings arose through the work of EnmyNoether and Emil Artin during 1920s.

Noetherian and Artinian rings form a special class of rings. In this section westudy such rings with the help of their ideals and determine their ideal structures.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_7, © Springer India 2014

257

Page 273: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

258 7 Rings with Chain Conditions

This study develops ring theory. In this section we prove Hilbert Basis Theoremwhich has made a revolution in modern algebra and algebraic geometry. We furthershow that any Noetherian domain is a factorization domain and any Artinian domainis a field.

Definition 7.1.1 A ring R is said to satisfy the ascending (descending) chain condi-tion denoted by acc (dcc) for ideals iff given any sequence of ideals I1, I2, . . . of R

with I1 ⊆ I2 ⊆ · · · ⊆ In ⊆ · · · , (I1 ⊇ I2 ⊇ · · · ⊇ In ⊇ · · · ), there exists an integer n

(depending on the sequence) such that Im = In ∀m≥ n.

For non-commutative rings, the definitions of acc (dcc) for left ideals or for rightideals are similar.

Definition 7.1.2 A ring R is said to be a Noetherian ring iff it satisfies the ascendingchain condition for ideals of R. (This name is in honor of Emmy Noether.)

For non-commutative rings the definition of a left (right) Noetherian ring is sim-ilar.

Definition 7.1.3 A ring R is said to satisfy the maximal condition (for ideals) iffevery non-empty set of ideals of R, partially ordered by inclusion, has a maximalelement (i.e., an ideal which is not properly contained in any other ideal of the set).

Theorem 7.1.1 Let R be a ring. Then the following statements are equivalent:

(i) R is Noetherian.(ii) The maximal condition (for ideals) holds in R.

(iii) Every ideal of R is finitely generated.

Proof (i) ⇒ (ii) Let F be any non-empty collection of ideals of R and I1 ∈ F. IfI1 is not a maximal element, ∃ an element I2 ∈ F such that I1 � I2. Again, if I2 isnot a maximal element, then I2 � I3 for some I3 ∈ F. If F has no maximal element,then continuing the above process, we obtain the infinite strictly ascending chain ofideals of R:

I1 � I2 � I3 � · · · .But this contradicts the assumption that R is Noetherian.

(ii) ⇒ (iii) Let I be an ideal of R and F= {A : A is an ideal of R; A is finitelygenerated and A⊆ I }.{0} ⊆ I ⇒ {0} ∈ F ⇒ F �= ∅. Then (ii) ⇒ F has a maximal element, say M .

We show that M = I . Suppose M �= I . Then ∃ an element a ∈ I such thata /∈ M . Now M is finitely generated. Suppose M = 〈a1, a2, . . . , at 〉. Then A =〈a1, a2, . . . , at , a〉 ∈ F⇒M � A⇒ a contradiction (since M is a maximal elementin F)⇒M = I ⇒ I is finitely generated.

(iii) ⇒ (i) Let I1 ⊆ I2 ⊆ I3 ⊆ · · · be an ascending chain of ideals of R.Then I = ⋃∞n=1 In is an ideal of R, hence is finitely generated; suppose that

Page 274: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.1 Noetherian and Artinian Rings 259

I = 〈a1, a2, . . . , ar 〉. Now each generator at ∈ some ideal Iit of the given chain.Let n be the maximum of the indices it .

Then each at ∈ In. Consequently, for m≥ n,

I = 〈a1, a2, . . . , ar〉 ⊆ In ⊆ Im ⊆ I ⇒ Im = In

⇒ the given chain of ideals is stationary at some point⇒R is Noetherian. �

Definition 7.1.4 An integral domain (ring) that satisfies any one of the equivalentconditions of Theorem 7.1.1 is called a Noetherian domain (ring).

We now show that a Noetherian domain is a natural generalization of a PID.

Proposition 7.1.1 Every principal ideal domain is a Noetherian domain.

Proof Let D be a principal ideal domain and I1 ⊆ I2 ⊆ · · · ⊆ In ⊆ · · · be an as-cending chain of ideals of D. Let I =⋃r Ir . Then I is an ideal of D. Now I = 〈a〉for some a ∈ I ⇒ a ∈ It of the given chain for some t ⇒ I = 〈a〉 ⊆ It ⇒ I ⊆ It ⊆Im ⊆ I ∀m≥ t ⇒ Im = It ∀m≥ t . �

Most of the rings which we have been studying are Noetherian.

Example 7.1.1 (i) (Z,+, ·) is a Noetherian ring by Proposition 7.1.1.(ii) Every field is a Noetherian ring.(iii) Every finite ring is a Noetherian ring.(iv) If F is a field, then the integral domain F [x1, x2, . . .] (in infinite indeter-

minates x1, x2, . . .) is not Noetherian as it contains the infinite ascending chain ofideals 〈x1〉 � 〈x1, x2〉 � 〈x1, x2, x3〉 � · · · . But F [x1, x2, . . . , xn] (in finite numberof indeterminates x1, x2, . . . , xn) is Noetherian by Corollary 3 of Theorem 7.1.2.

We now study Hilbert Basis Theorem which provides an extensive class ofNoetherian rings. David Hilbert (1863–1941) asserted the Theorem in 1890. Thistheorem revolutioned algebraic geometry. The word ‘basis’ is used in the sense offinite generation.

Theorem 7.1.2 (Hilbert Basis Theorem) If R is a Noetherian ring with identity,then R[x] is also a Noetherian ring.

Proof Let I be an arbitrary ideal of R[x]. To prove this theorem it is sufficient toshow that I is finitely generated. For each integer t ≥ 0, define the set It = {r ∈ R :a0 + a1x + · · · + rxt ∈ I } ∪ {0} (i.e., consisting of zero and those r ∈ R such thatr appear as the leading non-zero coefficient of some polynomial in I of degree t).Then It is an ideal of R such that It ⊆ It+1 ∀t ≥ 0⇒ I0 ⊆ I1 ⊆ I2 ⊆ · · · . Since R isa Noetherian ring, ∃ an integer n such that Ik = In ∀k ≥ n. Also each ideal Ii of R

is finitely generated and suppose Ii = 〈ai1, ai2, . . . , aimi〉 ∀i = 0,1,2, . . . , n, where

aij is the leading coefficient of a polynomial fij ∈ I , of degree i.

Page 275: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

260 7 Rings with Chain Conditions

We claim that I is generated by the m0+· · ·+mn polynomials f01, . . . , f0m0 . . . ,

fn1, . . . , fnmn . Let J = 〈f01, . . . , f0m0, . . . , fn1, fn2, . . . , fnmn〉. Now each fij ∈ I

(by our choice) implies

J ⊆ I. (7.1)

Let f (�=0) ∈ R[x] be such that f ∈ I and of degree t (say): f = b0 + b1x + · · · +bt−1x

t−1 + bxt . We now apply induction on t . For t = 0, f = b0 ∈ I0 ⊆ J . Nextassume that any polynomial ∈ I of degree less than or equal to t − 1 also belongsto J .

Case 1. t > n⇒ the leading coefficient b (of f ) ∈ It = In (as It = In ∀t ≥ n)⇒b= an1c1+an2c2+· · ·+anmncmn for suitable ci ∈R⇒ g = f − (fn1c1+fn2c2+· · · + fnmncmn)x

t−n ∈ I having degree <t (since the coefficient of xt in g is b −∑mn

i=1 anici = 0)⇒ g ∈ J by induction hypothesis⇒ f ∈ J .Case 2. t ≤ n⇒ b ∈ It ⇒ b = at1d1 + at2d2 + · · · + atmt dmt for some d1, d2,

. . . , dmt ∈R⇒ h= f −(ft1d1+ft2d2+· · ·+ftmt dmt ) ∈ I having degree <t (sincethe coefficient of xt in h is b −∑mt

i=1 atidi = 0) ⇒ h ∈ J by induction hypothesis⇒ f ∈ J .

Consequently, in either case I ⊆ J and hence I = J by (7.1). Thus I is finitelygenerated and hence R[x] is Noetherian. �

By induction, Hilbert Basis Theorem can be extended to polynomials in severalindeterminates:

Corollary 1 If R is a Noetherian ring with identity, then the polynomial ringR[x1, x2, . . . , xn] in a finite number of indeterminates x1, x2, . . . , xn is also aNoetherian ring.

Corollary 2 Z[x1, x2, . . . , xn] is a Noetherian ring.

Corollary 3 F [x1, x2, . . . , xn] is a Noetherian ring for every field F .

A Noetherian ring need not satisfy dcc on ideals. We now consider rings whichsatisfy dcc on ideals.

Definition 7.1.5 A ring R is said to be an Artinian ring iff it satisfies the descendingchain condition for ideals of R. (This ring is named after Emil Artin (1898–1962).)

Definition 7.1.6 A ring R is said to satisfy the minimal condition (for ideals) iffevery non-empty set of ideals of R, partially ordered by inclusion, has a minimalelement.

Theorem 7.1.3 Let R be a ring. Then R is Artinian iff R satisfies the minimal con-dition (for ideals).

Page 276: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.1 Noetherian and Artinian Rings 261

Proof Let R be Artinian and F a non-empty set of ideals of R. Let I1 ∈ F. If I1is not a minimal element, we can find another ideal I2 ∈ F such that I1 � I2. If Fhas no minimal element, the repetition of this process indefinitely yields the infinitestrictly descending chain: I1 � I2 � I3 � · · · of ideals of R ⇒ a contradiction tothe fact that R is Artinian⇒ F satisfies the minimal condition. Conversely, supposeR satisfies the minimal condition. Let I1 ⊇ I2 ⊇ I3 ⊇ · · · be a descending chainof ideals of R. Consider F = {It : t = 1,2,3, . . .}. Then I1 ∈ F ⇒ F �= ∅. Againby hypothesis, F has a minimal element In for some positive integer n⇒ Im ⊆ In

∀m ≥ n. Now Im �= In ⇒ Im /∈ F (by the minimality of In) ⇒ an impossibility⇒ Im = In ∀m≥ n⇒R is Artinian. �

Remark For non-commutative rings, the definitions of left (right) Artinian rings areobvious.

Theorem 7.1.4 A homomorphic image of a Noetherian (Artinian) ring is alsoNoetherian (Artinian).

Proof Let f be a homomorphism of the Noetherian ring R onto the ring S. Considerthe ascending chain of ideals of S:

J1 ⊆ J2 ⊆ · · · ⊆ Jn · · · . (7.2)

Suppose Ir = f−1(Jr), for r = 1,2, . . . . Then

I1 ⊆ I2 ⊆ · · · ⊆ In ⊆ · · · . (7.3)

Relation (7.3) becomes an ascending chain of ideals of R. Then by hypothesis,∃ some index n such that Im = In ∀m≥ n. This shows that Jm = Jn ∀m≥ n. Hencethe chain (7.2) becomes stationary at some point. Thus S is Noetherian.

For the Artinian ring, the proof is similar. �

Corollary If I is an ideal of a Noetherian (Artinian) ring R, then the quotient ringR/I is Noetherian (Artinian).

Proof The corollary follows from Theorem 7.1.4 by taking in particular, S = R/I

and f :R→R/I the natural homomorphism. �

Theorem 7.1.5 Let I be an ideal of a ring R. If I and R/I are both Noetherian(Artinian) rings, then R is also Noetherian (Artinian).

Proof Let I1 ⊆ I2 ⊆ · · · ⊆ In ⊆ · · · be an ascending chain of ideals of R. Let p :R → R/I be the natural homomorphism of R onto R/I . Then p(I1) ⊆ p(I2) ⊆· · · ⊆ p(In)⊆ · · · is an ascending chain of ideals in R/I . Since R/I is Noetherian,there exists a positive integer n such that p(In)= p(In+i ) for all i ≥ 1. Also, I1 ∩I ⊆ I2 ∩ I ⊆ · · · ⊆ In ∩ I ⊆ · · · is an ascending chain of ideals in I . Since I isNoetherian, there exists a positive integer m such that Im∩I = Im+i∩I for all i ≥ 1.

Page 277: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

262 7 Rings with Chain Conditions

Let r =max(m,n). Then p(Ir)= p(Ir+i ) and Ir ∩I = Ir+i∩I for all i ≥ 1. Let a ∈Ir+i . Then there exists an element x ∈ Ir such that p(a)= p(x), i.e., a+ I = x+ I .Hence a − x ∈ I and also a − x ∈ Ir+i . This shows that a − x ∈ Ir+i ∩ I = Ir ∩ I .Hence a − x ∈ Ir . Again as x ∈ Ir , then a ∈ Ir . Consequently, Ir = Ir+i for allr ≥ 1. This proves that R is Noetherian. �

Definition 7.1.7 An Artinian domain R is an integral domain which is also an Ar-tinian ring.

We now prove some interesting properties of Noetherian and Artinian rings.

Theorem 7.1.6 (a) Any Noetherian domain is a factorization domain.(b) Any Artinian domain is a field.

Proof (a) Let R be a Noetherian domain. Suppose R is not a factorization domain.Then there exists at least one non-zero, non-invertible element a in R such that a

is not a finite product of irreducible elements of R. Let X be the set of all suchelements x ∈ R. As a ∈X, X �= ∅. Consider the set S = {〈x〉 : x ∈X}. Then S is anon-empty collection of ideals of R. As R is Noetherian, S has a maximal element,say 〈y〉. Clearly, y ∈X and y is not irreducible. This implies that y = cd for somenon-zero non-invertible elements c and d in R. Hence 〈y〉� 〈c〉 and 〈y〉� 〈d〉. Thenby maximality of 〈y〉 in S, it follows that 〈c〉 and 〈d〉 are not elements of S. Thisshows that c and d are finite products of irreducible elements of R. Hence y = cd

is also a finite product of irreducible elements of R, a contradiction as y ∈X.(b) Let R be an Artinian domain and a (�=0) ∈ R. Then for descending chain

of ideals: 〈a〉 ⊇ 〈a2〉 ⊇ 〈a3〉 · · · ⊇ · · · , there exists an index n such that, 〈an〉 =〈an+1〉 = 〈an+2〉 = · · · . Hence 〈an〉 = 〈an+1〉⇒ an = ran+1 for some r ∈R⇒ 1=ra (by the cancellation law in R as an �= 0)⇒ a is invertible in R⇒R is a field. �

Corollary 1 Every principal ideal domain is a factorization domain.

Proof It follows from Proposition 7.1.1 and Theorem 7.1.6(a). �

Corollary 2 An integral domain with only a finite number of ideals is a field.

Proof It follows from Theorem 7.1.6(b). �

We recall that a ring R is Noetherian iff every ideal of R is finitely generated. Toshow that R is Noetherian it is sufficient to consider just the prime ideals of R (thisresult is due to I.S. Cohen (1917–1955)).

Theorem 7.1.7 (Cohen) A ring R is Noetherian iff every prime ideal of R is finitelygenerated.

Proof ⇒ follows from Theorem 7.1.1.

Page 278: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.1 Noetherian and Artinian Rings 263

Next assume that every prime ideal of R is finitely generated, but R fails to beNoetherian. This shows that the collection F of ideals of R which are not finitelygenerated is non-empty.

Order F by inclusion. Now consider an arbitrary chain {Bi} in F. Then B =⋃i Bi is an ideal of R such that B cannot be finitely generated. Hence B ∈ F is an

upper bound in F. Then by Zorn’s Lemma F has a maximal element I (say). So, byhypothesis, I cannot be a prime ideal of R. Then ∃a, b ∈R such that a /∈ I, b /∈ I butab ∈ I . Clearly, both the ideals 〈I, b〉 and I : 〈b〉 (see Ex. 26 of Exercise-I, Chap. 5)properly contain I and a ∈ I : 〈b〉. So maximality of I in F⇒ 〈I, b〉 /∈ F and so,I : 〈b〉 /∈ F ⇒ 〈I, b〉 = 〈c1, c2, . . . , cn〉 and I : 〈b〉 = 〈d1, d2, . . . , dm〉 for suitableci, dj ∈ R(i = 1,2, . . . , n; j = 1,2, . . . ,m)⇒ ci = ai + bri , for some ai ∈ I andri ∈R⇒〈I, b〉 = 〈a1, a2, . . . , an, b〉.

Now consider the ideal J = 〈a1, a2, . . . , an, bd1, . . . , bdm〉. Now bdj ∈ I ∀j ⇒J ⊆ I . To show the reverse inclusion, let x ∈ I .

Then

x ∈ 〈I, b〉 ⇒ x =n∑

i=1

aixi + by (xi, y ∈R) ⇒ by ∈ I (as each ai ∈ I )

⇒ y ∈ I : 〈b〉 ⇒ y =m∑

i=1

dj tj (tj ∈R)

⇒ x =n∑

i=1

aixi +m∑

j=1

(bdj )tj ∈ J ⇒ I ⊆ J.

Consequently, I = J ⇒ I is itself finitely generated ⇒ an impossibility as I ∈ F.This contradiction proves the theorem. �

The “finiteness condition” for Noetherian (Artinian) rings has an advantage overarbitrary rings which makes the study of Noetherian (Artinian) rings more attractiveand interesting. We prove the following theorems for commutative cases and non-commutative cases are left as an exercise.

Theorem 7.1.8 Let R be a commutative Artinian ring with 1. Then every primeideal of R is a maximal ideal.

Proof Let A be a prime ideal of R. Then the quotient ring R/A forms an integraldomain. Again as R is an Artinian ring, then R/A is also an Artinian ring. Henceby Theorem 7.1.6, R/A is a field. Consequently, A is a maximal ideal of R. �

We can determine more ideal structure of an Artinian ring R.

Theorem 7.1.9 Every Artinian commutative ring R with 1 has only a finite numberof prime ideals, each of which is maximal.

Page 279: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

264 7 Rings with Chain Conditions

Proof If possible, there exists an infinite sequence {Ai} of distinct prime ideals of R.Then we can form a descending chain of ideals:

A1 ⊇A1A2 ⊇A1A2A3 ⊇ · · · .Since R is Artinian, ∃ a positive integer n for which

A1A2 · · ·An =A1A2 · · ·AnAn+1.

This shows that A1A2 · · ·An ⊆An+1. Then At ⊆An+1 for some t ≤ n. But At is amaximal ideal of R by Theorem 7.1.8. So we have At = An+1, which contradictsthe fact that each Ai is distinct.

Consequently, R has only a finite number of prime ideals and each of them ismaximal by Theorem 7.1.8. �

We recall that the Jacobson radical of a ring R denoted by J (R) (or radR) is theintersection of all maximal ideals of R. We now study the Jacobson radical of anArtinian ring.

Theorem 7.1.10 The Jacobson radical of a commutative Artinian ring is the inter-section of finitely many maximal ideals of the ring.

Proof Let R be an Artinian ring and S be the set of all maximal ideals of R. Let J =J (R) be the Jacobson radical of R. Then J is the intersection of all maximal idealsof R. Let F be the set of all ideals of R such that each of which is an intersectionof finitely many maximal ideals of R. Then F is non-empty, since S ⊆ F. As R isArtinian, F has a minimal element M0 (say). Suppose M0 =M1 ∩M2∩ · · · ∩Mn,where Mi are in S. Then J ⊆M0. Again if M is in S, then M0 ∩M is in F. Henceby minimality of M0, it follows that M0 ∩M =M0. Thus M0 ⊆M for all M in S.Hence J ⊆M0 ⊆∩M∈SM = J shows that J =M0. �

Theorem 7.1.11 The Jacobson radical of a commutative Artinian ring with 1 isnilpotent.

Proof Let R be a commutative Artinian ring with 1 and J = J (R) be its Jacobsonradical. We claim that Jn = {0} for some positive integer n. Consider the descendingchain of ideals of R: J ⊇ J 2 ⊇ · · · ⊇ Jn · · · . As R is Artinian, there exists somepositive integer n such that Jn = Jm for all m≥ n. Suppose I = Jn. Hence I = I 2

and IJ = I . If possible, suppose I �= {0}. Let F be the set of all ideals A of R

such that A ⊆ I and IA �= {0}. Then {0} �= I = I 2 shows that I ∈ F. Hence F isnon-empty. Since R is Artinian and {0} is not in F, it follows that F has a minimalelement, say M �= {0}, such that IM �= {0} and M ⊆ I . Consequently, there existsa non-zero element y ∈M such that Iy �= {0}. Then Iy is a non-zero ideal of R.Moreover, I (Iy) = I 2y = Iy �= {0} and Iy ⊆M ⊆ I show that Iy ∈ F. Then byminimality of M , it follows that Iy =M . Hence there exists an element x ∈ I suchthat y = xy. Then y(1− x)= 0. Now x ∈ I = Jn ⊆ J implies that 1− rx is a unit

Page 280: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.1 Noetherian and Artinian Rings 265

for all r ∈R (see Ex. 23 of Exercises-I of Chap. 5). In particular, 1−x is a unit in R.Hence y(1− x)= 0 implies y = 0. This is a contradiction. Hence I = Jn = {0}. �

We recall that if every element of an ideal I of a ring is nilpotent, then the ideal I

is called a nil ideal.

Corollary Every nil ideal of a commutative Artinian ring R with 1 is nilpotent.

Proof Let A be a nil ideal of R. Then every element of A is nilpotent and hence∀a ∈A, r ∈ R, ra is nilpotent. This implies that 1+ ra is a unit in R ∀r ∈ R. Thisshows that a ∈ radR (by Ex. 23, Exercises-I of Chap. 5). Hence A⊆ radR = J (R).

Since a nil ideal of a ring is contained in its Jacobson radical, the corollary fol-lows from Theorem 7.1.11. �

The following theorem is the same as Theorem 7.1.9. We now give an alternativeproof.

Theorem 7.1.12 Every commutative Artinian ring with 1 contains only finitelymany maximal ideals.

Proof Let R be a commutative Artinian ring 1. Then its Jacobson radical J = J (R)

is an intersection of finitely many maximal ideals of R by Theorem 7.1.10. Let J =M1∩M2∩· · ·∩Mn ⊇M1M2 · · ·Mn. Again by Theorem 7.1.11, J is nilpotent. ThenJ t = {0} for some positive integer t . Consequently, {0} = J t ⊇ (M1M2 · · · ·Mn)

t =M1

tM2t · · ·Mn

t . Let M be a maximal ideal of R. Then M ⊇ {0} =M1tM2

t · · ·Mnt

implies that M ⊇Mit , for some i such that 1 ≤ i ≤ n. This implies that Mi ⊆M ,

since M is a maximal ideal and hence it is prime. Again since both M and Mi aremaximal ideals of R, it follows that M =Mi . This concludes that the only maximalideals of R are M1,M2, . . . ,Mn. �

Remark (i) Ex. 4 of Exercises-I shows that there are rings which are right Noethe-rian but not left Noetherian;

(ii) Ex. 5 of Exercises-I shows that there are rings which are right Artinian butnot left Artinian;

(iii) Ex. 7 of Exercises-I shows that a subring of a Noetherian (or Artinian) ringmay not be Noetherian (or Artinian);

(iv) Z is Noetherian but not Artinian.

So the concepts of left Noetherian and right Noetherian rings are different butthese two concepts coincide if the ring is commutative. Again Z is Noetherian butnot Artinian. Hence these two classes of rings are different in general.

We now search for suitable situations under which a Noetherian ring is Artinianand conversely.

Theorem 7.1.13 Let R be a commutative local ring with 1 such that its maximalideal in R is nilpotent. Then R is Artinian if and only if R is Noetherian.

Page 281: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

266 7 Rings with Chain Conditions

Proof Let M be the maximal ideal of R. Then, by hypothesis, Mt = {0} for somepositive integer t . Hence F = R/M is a field (by Theorem 5.3.2). Clearly, R isArtinian (or Noetherian) iff M is Artinian (or Noetherian). Again M is Artinian(Noetherian) ⇔M/M2 and M2 are Artinian (or Noetherian) ⇔ ·· · ⇔Mi/Mi+1

and Mi+1 are Artinian (or Noetherian). But Mi/Mi+1 is Artinian (or Noetherian)⇔Mi/Mi+1 is a finite dimensional vector space over F for all i = 1,2, . . . , t − 1(see Chaps. 8 and 9). If R is Artinian (or Noetherian), then each Mi/Mi+1 is Ar-tinian (or Noetherian). Hence each is a finite dimensional vector space over the fieldF . Now each is Noetherian or Artinian. Thus Mt−1 =Mt−1/Mt and Mt−2/Mt−1

are both Noetherian (or Artinian) show that Mt−2 is Noetherian (or Artinian). Pro-ceeding in this way we prove that M is Noetherian (or Artinian). This proves thetheorem. �

Theorem 7.1.14 Every ideal in a commutative Noetherian ring with 1 contains aproduct of prime ideals.

Proof Let R be a commutative Noetherian ring with 1 and F be the set of all idealsA of R such that A does not contain any product of prime ideals. If F is not empty,then F has a maximal element, say M . This M cannot be prime. Hence there existelements x, y ∈ R such that xy ∈ M but x, y /∈ M . Consider A = M + Rx andB =M +Ry. Then M ⊆ A ∩ B and M �= A and M �= B . Hence by maximality ofM in F , A,B /∈ F . This shows that both A and B contain some product of primeideals of R. Again AB = (M +Rx)(M +Ry)⊆M +Rxy =M , as xy ∈M . Thisimplies that AB contains a product of prime ideals of R and hence M containsa product of prime ideals of R. This is a contradiction. Consequently, F must beempty. This proves the theorem. �

Corollary Let R be a commutative Noetherian ring with 1. Then {0} = Pt11 P2

t2

· · ·Pntn , where Pi ’s are distinct prime ideals of R and t1, t2, . . . , tn are some positive

integers.

Theorem 7.1.15 A commutative Artinian ring R with 1 is Noetherian. Conversely,if R is a Noetherian ring with 1 in which every prime ideal is maximal, then R isalso Artinian.

Proof Suppose R is a commutative ring with 1 which is Artinian. Then by Theo-rem 7.1.12, R contains only finitely many maximal ideals: M1,M2, . . . ,Mn (say)such that its Jacobson radical J satisfies the relation {0} = J t =M1

tM2t · · ·Mn

t ,where t is the rank of nilpotency of J . Maximal ideals M1,M2, . . . ,Mn are pairwiseco-prime and hence by Chinese Remainder Theorem 5.6.1 of Chap. 5 it follows that

R ∼=R/M1t ×R/M2

t × · · · ×R/Mnt . (7.4)

Again each R/Mit is an Artinian local ring whose maximal ideal Mi/Mi

t is nilpo-tent. Hence each R/Mi

t is Noetherian by Theorem 7.1.13. Consequently, R isNoetherian by (7.4).

Page 282: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.2 An Application of Hilbert Basis Theorem to Algebraic Geometry 267

Next suppose R is a Noetherian ring with 1 in which every prime ideal is maxi-mal. Then each maximal ideal of R is also a prime ideal. Hence it follows by Corol-lary to Theorem 7.1.14 that {0} =M1

t1M2t2 · · ·Mn

tn for some maximal ideals Mi

and some positive integers ti . Consequently, R ∼=R/M1t1×R/M2

t2×· · ·×R/Mntn .

Proceeding as before, the converse part follows. �

Problem Let R be a Noetherian ring and f :R→R is an epimorphism. Then f isan isomorphism.

[Hint. For each n ∈N+, f n is an epimorphism and kerf ⊆ kerf 2 ⊆ kerf 3 ⊆ · · ·is an ascending chain of ideals in R. Now R is Noetherian ⇒ ∃m ∈ N+ such thatkerf m = kerf m+t ∀t ∈N+ ⇒ f is a monomorphism.]

7.2 An Application of Hilbert Basis Theorem to AlgebraicGeometry

The Hilbert Basis Theorem plays a very important role in algebraic geometry. Wepresent in this section an application of this theorem to algebraic geometry.

We follow the notation of Sect. 5.5 of Chap. 5.

Theorem 7.2.1 If Kn is an affine n-space, then every algebraic set in Kn is deter-mined by a finite set of polynomials in K[x1, x2, . . . , xn].

Proof Let A⊆Kn be an affine algebraic set. Then ∃ a subset S of K[x1, x2, . . . , xn]such that, A = V (S). If P is the ideal generated by S, then V (P ) = V (S). NowP being an ideal of the Noetherian ring K[x1, x2, . . . , xn] (as every field K is aNoetherian ring), P is generated by a finite set of polynomials in K[x1, x2, . . . , xn].Then A = V (S) = V (P ) is determined by a finite set of polynomials in K[x1,

x2, . . . , xn]. �

Remark Every ascending sequence of ideals P1 ⊆ P2 ⊆ · · · in K[x1, x2, . . . , xn]is stationary i.e., ∃n such that Pn = Pn+1 = · · · . This theorem implies in view ofProposition 5.5.1(i) Chap. 5 the following descending chain condition for algebraicsets.

Every decreasing sequence of algebraic sets in Kn : V (P1)⊇ V (P2)⊇ · · · in Kn

must terminate, i.e., ∃n such that V (Pn)= V (Pn+1)= · · · .Then it follows that every non-empty collection Σ of algebraic sets in Kn has

a member M such that no member of Σ is properly contained in M , otherwise wecan construct inductively a non-terminating decreasing sequence of algebraic setsin Kn. Such a member M of Σ is called a minimal member.

Theorem 7.2.2 Any algebraic set A can be expressed uniquely as a finite union ofaffine varieties: A=A1∪A2∪· · ·∪Ar , so that there is no inclusion relation amongthe Ai ’s i.e., Ai �⊂Aj ∀i �= j .

Page 283: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

268 7 Rings with Chain Conditions

Proof (Existence) Let Σ be the collection of all those algebraic sets in Kn whichcannot be expressed as a finite union of affine varieties. We claim that Σ = ∅. IfΣ �= ∅, Σ has a minimal member M by the descending chain condition for algebraicsets. This M cannot be an affine variety, otherwise M would be a finite union ofirreducible algebraic sets: M =A1∪A2 and hence M would not be a member of Σ .Then ∃ two algebraic sets A1 �=M and A2 �=M such that M = A1 ∪A2. Since M

is a minimal member of Σ,A1 /∈Σ and A2 /∈Σ . Consequently, each of A1 and A2

can be expressed as a finite union of affine varieties, so M is a finite union of affinevarieties. This means M /∈Σ implies a contradiction. Therefore Σ must be empty.In other words, any algebraic set A can be expressed as a finite union of affinevarieties: A=A1 ∪A2 ∪ · · · ∪Ar . Moreover, if there is an inclusion relation amongthe Ai ’s, we can omit the superfluous terms so that Ai �⊂Aj ∀i �= j .

(Uniqueness) Let A=⋃ri=1 Ai =⋃s

j=1 Bj , where each Ai,Bj is irreducible and

Ai ⊆Ak ⇔ i = k,Bj ⊆ Bk ⇔ j = k. Each Bj can be expressed as Bj = Bj ∩A=Bj ∩ (A1 ∪A2 ∪ · · · ∪Ar)= (Bj ∩A1)∪ (Bj ∩A2)∪ · · · ∪ (Bj ∩Ar). Since eachBj ∩Ai is an algebraic set and Bj is irreducible, we must have Bj = Bj ∩Am ⊆Am

for some m, 1 ≤ m ≤ r . By similar arguments, Am ⊆ Bk for some k, 1 ≤ k ≤ s.Therefore Bj ⊆ Bk which implies j = k. Consequently, each Bj =Am for some m,1≤m≤ r .

Similarly, each Am = Bj for some j , 1≤ j ≤ s. This proves that the representa-tion is unique.

The representation A= A1 ∪A1 ∪ · · · ∪Ar is called a decomposition of A, andthe Ai ’s are called the irreducible components of A. �

7.3 An Application of Cohen’s Theorem

In this section we show that Cohen’s Theorem (proved in the earlier section) offersa sufficient condition for a ring to be Noetherian.

Theorem 7.3.1 If R is a ring in which every maximal ideal is generated by anidempotent element, then R is Noetherian.

Proof Let I be a primary ideal of R (see Ex. 20 of Exercise-I, Chap. 5). We claimthat I is a maximal ideal. Otherwise, there exists a maximal ideal M such thatI � M . Then, by hypothesis, M = 〈e〉 where e is an idempotent element in R

such that e �= 0 or e �= 1, since e = 0⇒ R is a field and the proof is trivial. Thene(1− e) = 0 ∈ I and I is a primary ideal ⇒ (1− e)n ∈ I � M for some positiveinteger n⇒ 1− e ∈M = 〈e〉 ⇒ 1 ∈M ⇒ a contradiction ⇒ I is a maximal ideal.Since every primary ideal of R is maximal, the concepts of maximal, prime and pri-mary ideals coincide. Hence by our hypothesis, every maximal (hence, every prime)ideal is finitely generated⇒R is necessarily Noetherian by Cohen’s Theorem. �

Page 284: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

7.5 Exercises 269

7.4 Supplementary Examples (SE-I)

1 Every Euclidean domain is always a Noetherian domain.[Hint. D is a Euclidean domain ⇒ D is a PID by Theorem 6.2.1 ⇒ D is a

Noetherian domain by Proposition 7.1.1.]

2 Let D be an integral domain which is not a field but D is Noetherian. Then D

contains elements which are irreducible.[Hint. D is not a field⇒∃ a non-zero non unit element a ∈D⇒ a is irreducible.

Otherwise, if a is reducible in D, then ∃ a non-zero non unit element a1 ∈D suchthat a1|a and a1 is not an associate of a. Hence 〈a〉� 〈a1〉. If a1 is not irreducible,repeat the process to obtain an ascending chain of principal ideals:

〈a〉� 〈a1〉� 〈a2〉� · · ·which contradicts the fact that D is Noetherian.]

3 Every Noetherian domain is a factorization domain.[Hint. Let D be a Noetherian domain which is not a factorization domain. Then

∃ at least one non-zero, non unit element a (say) in D such that a is not a productof irreducible elements. Let A be the set of all such elements a of D. Hence A �= ∅.Consider the set S= {〈a〉 : a ∈A}. Then S �= ∅. Now D is a Noetherian domain⇒ Shas a maximal element 〈b〉 (say)⇒ b is not irreducible in D⇒∃ non-zero non unitelements c, d ∈D such that b= cd and c, d are not associates of b⇒〈b〉 = 〈cd〉�〈c〉 and 〈b〉� 〈d〉⇒ 〈c〉 /∈ S and 〈d〉 /∈ S (by maximality of 〈b〉)⇒ c and d are bothproducts of irreducible elements of D⇒ a contradiction.]

4 Let R be a commutative Artinian ring with 1 such that |R|> 1 and R does notcontain zero divisors. Then R is a field.

[Hint. Let a (�=0) ∈R. Consider the chain 〈a〉 ⊇ 〈a2〉 ⊇ 〈a3〉 ⊇ · · · .R is Artinian⇒∃ a positive integer m such that 〈am〉 = 〈am+1〉. Then am (�=0) ∈

〈am+1〉⇒ ∃ some r ∈R such that am = ram+1 ⇒ ra = 1.]

7.5 Exercises

Exercises-I

1. Show that the ring of integers (Z,+, ·) is Noetherian but not Artinian.[Hint. For any positive integer n, the strictly descending chain 〈n〉� 〈2n〉�

〈4n〉� · · · of ideals of Z does not terminate.]2. Let p be a fixed prime integer. Consider the group Z(p∞)= {m/pn : 0≤m <

pn; m ∈ Z, n = 0,1,2, . . .} under the operation of addition modulo 1. ThenZ(p∞) is a ring (without identity) by defining the product ab to be zero ∀a, b ∈Z(p∞). Show that (Z(p∞),+, ·) is an Artinian ring but not Noetherian.

3. Let F be the ring of all real valued functions on R. For any positive real numberr define Ir = {f ∈ F : f (x)= 0 for − r ≤ x ≤ r}. Then show that Ir is an ideal

Page 285: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

270 7 Rings with Chain Conditions

of F such that

· · · I3 � I2 � I1 � I1/2 � I1/3 � · · · .Also, show that F is neither Noetherian nor Artinian.

4. Consider the ring R = {( a b0 c

), a ∈ Z, b, c ∈Q

}under usual addition and multi-

plication. Show that R is right Noetherian but not left Noetherian.

[Hint. For any non-negative integer n, the set In ={( 0 m/2n

0 0

);m ∈ Z}

is aleft ideal of R such that I1 � I2 � · · · .

To show that R is right Noetherian, prove that every non-zero right ideal ofR is finitely generated.]

5. Consider the ring R = {( a b0 c

) : a ∈Q; b, c ∈R}

under usual addition and mul-

tiplication. Show that R is right Artinian but not left Artinian.6. (a) Let R be a commutative Noetherian ring with 1. Show that every ideal of R

contains a finite product of prime ideals.(b) Show that a commutative Artinian ring R with 1 is a field⇔R is an integral

domain.7. Show by examples that a subring of a Noetherian (Artinian) ring may not be

Noetherian (Artinian).[Hint. Q[x] is Noetherian by Theorem 7.1.2 but its subring R = {f ∈Q[x] :

constant term of f belong to Z} is not Noetherian, since the strictly ascendingchain 〈x〉� 〈x/2〉� 〈x/22〉� · · · of ideals of R does not stabilize at any point.Again Z is a subring of the field Q, but Z is not Artinian by Exercise 1.]

8. Is the statement of the Hilbert Basis Theorem true on replacement of Noetherianrings by Artinian rings? Justify your answer.

[Hint. For a field F , the strictly descending chain of principal ideals of F [x] :〈x〉� 〈x2〉� 〈x3〉� · · · will never terminate.]

9. An ideal I of a ring R is said to be a nil ideal iff each element x in I is nilpotent;I is said to be nilpotent iff In = {0} for some positive integer n. Let R be anArtinian ring. Examine the validity of the following statements:

(i) radR is a nilpotent ideal of R;(ii) every nil ideal of R is nilpotent.

10. Let R be a left Artinian ring with identity 1 and G the group of units of R. Anelement a ∈R is said to be left quasi-regular iff ∃r ∈R such that r+a+ra = 0.In this case, the element r is called a left quasi-inverse of a. Let J denote theJacobson radical of R.

Prove the following:

(a) Let G∗ be the group of units of R/J . Then g ∈G⇔ g + J ∈G∗;(b) G is a finite group⇒R is finite;(c) G is an abelian group and a, b are quasi-regular elements of R⇒ ab= ba

(in particular, J is commutative).

11. Examine the validity of the statement that every Artinian ring is Noetherian butits converse is not true.

Page 286: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 271

12. Examine the validity of the statement that a ring R is Artinian iff R is Noethe-rian and every prime ideal of R is maximal.

13. For any commutative ring R, the Krull dimension of R is the maximum possiblelength of the chain I1 ⊆ I2 ⊆ · · · ⊆ In (I1 ⊇ I2 ⊇ · · · ⊇ In) of distinct primeideals of R. For example, a field has dimension zero and a PID (which is not afield) has dimension 1. The Krull dimension of R is said to be infinite iff R hasan arbitrary chain of distinct prime ideals.

Show that a ring R is Artinian iff R is Noetherian and it has the Krull di-mension zero.

14. Show that any ring which is a quotient of a polynomial ring over the integers orover a field is Noetherian.

[Hint. Use Corollary of Theorem 7.1.4 and Hilbert Basis Theorem.]

7.6 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Artin 1991;Atiya and Macdonald 1969; Birkoff and Mac Lane 1965; Burtan 1968; Fraleigh1982; Fulton 1969; Herstein 1964; Hungerford 1974; Jacobson 1974, 1980; Lang1965; McCoy 1964; Musuli 1992; van der Waerden 1970; Zariski and Samuel 1958,1960) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Atiya, M.F., Macdonald, I.G.: Introduction to Commutative Algebra. Addison-Wesley, Reading

(1969)Birkoff, G., Mac Lane, S.: A survey of Modern Algebra. Macmillan, New York (1965)Burtan, D.M.: A First Course in Rings and Ideals. Addison-Wesley, Reading (1968)Fraleigh, J.B.: A First Course in Abstract Algebra. Addison-Wesley, Reading (1982)Fulton, W.: Algebraic Curves. Benjamin, New York (1969)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hungerford, T.W.: Algebra. Springer, New York (1974).Jacobson, N.: Basic Algebra I. Freeman, San Francisco (1974)Jacobson, N.: Basic Algebra II. Freeman, San Francisco (1980)Lang, S.: Algebra, 2nd edn. Addison-Wesley, Reading (1965)McCoy, N.: Theory of Rings. Macmillan, New York (1964)Musuli, C.: Introduction to Rings and Modules. Narosa Publishing House, New Delhi (1992)van der Waerden, B.L.: Modern Algebra. Ungar, New York (1970)Zariski, O., Samuel, P.: Commutative Algebra I. Van Nostrand, Princeton (1958)Zariski, O., Samuel, P.: Commutative Algebra II. Van Nostrand, Princeton (1960)

Page 287: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 8Vector Spaces

In the earlier chapters we introduced mainly two algebraic systems, such as groupsand rings, which involve only internal operations. In this chapter, we introduce an-other algebraic system which involves both internal and external operations con-nected by some relations. A vector space is a combination of both an additive abeliangroup and a field interlinked by an external law of operation. In this chapter, westudy vector spaces and their closely related fundamental concepts, such as linearindependence, basis, dimension, linear transformation & its matrix representation,eigenvalue, inner product space, etc. Such concepts form an integral part of linearalgebra. Vector spaces have multifaceted applications. Such spaces over finite fieldsplay an important role in computer science, coding theory, design of experiments,combinatorics. Vector spaces over the infinite field Q of the rationals are importantin number theory and design of experiments and vector spaces over C are essentialfor the study of eigenvalues. In this chapter, we also show how to construct isomor-phic replicas of all homomorphic images of a specified abstract vector space. Asthe concept of a vector provides a geometric motivation, vector spaces facilitate thestudy of many areas of mathematics and integrate the abstract algebraic conceptswith geometric ideas.

8.1 Introductory Concepts

A vector space is just an algebraic system whose elements combine, under vectoraddition and multiplication by scalars from a suitable field satisfying certain condi-tions.

The concept of vector spaces arose through the study of geometry and physics.R2 endowed with the usual distance function is called ‘Euclidean plane’. It is alsoknown as ‘Cartesian plane’ (or coordinate plane) in honor of René Descartes (1596–1650). He first identified the ordered pairs of real numbers with the points in the co-ordinate plane. We identify the point X = (x1, x2) ∈R2 with the arrow

−→OX starting

from the origin O = (0,0) and ending at the point X. The length of the line segment

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_8, © Springer India 2014

273

Page 288: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

274 8 Vector Spaces

OX is denoted by |−→OX|. We define addition ‘+’ and scalar multiplication ‘·’ on R2

as follows.Addition on R2 is defined by the usual parallelogram law. If

−→OX is the arrow cor-

responding to the point X = (x1, x2) ∈ R2, then for every non-zero real number r ,the arrow r · −→OX has length |r| times of the length |−→OX| and whose direction is thesame or opposite according to r > 0 or r < 0. If r = 0, then r ·−→OX is identified with(0,0) and no direction is assigned. For simplicity, we use the symbol r ·X (or rX)for r · −→OX. Similarly, the ordered triples (x1, x2, x3) ∈R3 are identified with pointsin the 3-dimensional Euclidean space R3.

In physics, there are quantities, such as forces acting at a point in a plane, ve-locities, and accelerations etc., called vectors. They are also added by parallelogramlaw and multiplied by real numbers (called scalars) in a similar way.

Using this fact, the operations of pointwise addition and scalar multiplication aredefined on R2 as follows:

(x1, x2)+ (y1, y2)= (x1 + y1, x2 + y2);r · (x1, x2)= (rx1, rx2)

for all (x1, x2), (y1, y2) ∈R2 and r ∈R. Then (R2,+) is an abelian group.We consider the above scalar multiplication as a mapping μ : R × R2 → R2,

(r,X) �→ r ·X, satisfying the following properties:

1. 1 ·X =X;2. r · (s ·X)= (rs) ·X;3. (r + s) ·X = r ·X+ s ·X;4. r · (X+ Y)= r ·X+ r · Y ,

for all X, Y ∈R2 and r, s ∈R.These properties are called vector properties of R2. Similar properties hold in

the Euclidean n-space Rn and n-dimensional unitary space Cn for n ≥ 1 (seeSect. 8.10). Each point x = (x1, x2, . . . , xn) of Rn (or Cn) can be thought to rep-resent a vector.

The above vector properties set up an algebra called algebra of vectors. There aremany mathematical systems having such vector properties. These systems introducethe concept of vector spaces over fields. Vector spaces generalize the algebra ofvectors.

The vector space structure is one of the most important algebraic structures. Theconcept of a vector is essential to the study of functions of several variables. Vectorspaces play an important role in the solution of specified problems. We now definevector spaces over an arbitrary field with an eye to the model of vector spaces overthe field R of real numbers.

Definition 8.1.1 A vector space or a linear space over a field F is an additiveabelian group V together with an external law of composition (called scalar multi-plication).

μ : F × V → V , the image of (α, v) under μ is denoted by αv, satisfying thefollowing conditions:

Page 289: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.1 Introductory Concepts 275

V (1) 1v = v, where 1 is the multiplicative identity in F ;V (2) (αβ)v = α(βv);V (3) (α + β)v = αv+ βv;V (4) α(u+ v)= αu+ αv, ∀α,β ∈ F and u,v ∈ V .

Unless otherwise stated, by a vector space V we mean a vector space over afield F . In particular, if F = R, V is called a real vector space and if F = C, V iscalled a complex vector space. A vector space over a division ring is defined in asimilar way. However, in this chapter, we consider vector spaces over a field. Thealgebraic properties of an arbitrary vector space are similar to the vector propertiesof R2, R3 or Rn. Consequently, an element of a vector space V is called a vectorand an element of F is called a scalar.

Example 8.1.1 (i) Let V =Mm,n(F ) be the set of all m×n matrices over a field F .Then V forms a vector space over F under usual addition of matrices and multipli-cation of a matrix by a scalar.

(ii) Let F be a field. Then F 1 = F is itself a vector space over F under usualaddition and multiplication in the field F . If n > 1, then Fn is also a vector spaceover F under pointwise addition and scalar multiplication defined by

(x1, x2, . . . , xn)+ (y1, y2, . . . , yn)= (x1 + y1, x2 + y2, . . . , xn + yn) and

α(x1, x2, . . . , xn)= (αx1, αx2, . . . , αxn), ∀α ∈ F and (x1, x2, . . . , xn) ∈ Fn.

In particular, Rn is a vector space over R and Cn is a vector space over C.

Remark An element (x1, x2, . . . , xn) of Rn (or Cn) may be considered as the real(or complex) 1× n matrix, called a row vector or an n× 1 matrix

⎜⎜⎜⎝

x1x2...

xn

⎟⎟⎟⎠ ,

called a column vector.

(iii) Let K be a subfield of a field F . Then F is a vector space over K , underusual addition and multiplication in F .

(iv) Let V = F [x] be the polynomial ring in x over a field F . Then F [x] is avector space over F . In particular, if Vn[x] denotes the set of all polynomials inF [x], of degree less than a fixed integer n, along with the zero polynomial, thenVn[x] is also a vector space over F .

(v) (a) Let V = C([a, b]) denote the set of all real valued continuous functionson [a, b]. Then V is a vector space over R under the usual pointwise addition andscalar multiplication. In particular, R[x] is a vector space over R.

(b) The set V =D([a, b]) of all real valued differentiable functions on [a, b] is avector space over R under the same compositions defined in (a).

Page 290: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

276 8 Vector Spaces

(vi) Let V be the set of all sequences of real numbers (or complex numbers).Then V is a vector space over R (or C).

(vii) Let V be the set of all solutions of a system of m linear homogeneousequations in n variables with real (or complex) coefficients. Then V is a real (orcomplex) vector space, called the solution space of the system.

(viii) The power set P(S) of a non-empty set S is a vector space over Z2 underthe group addition:

x + y = (x − y)∪ (y − x) (symmetric difference), where x − y = x \ y;and scalar multiplication:

αx = x, if α = (1) ∈ Z2,

= ∅, if α = (0) ∈ Z2.

Remark The vector spaces Rn, Cn, Mm,n(R) and Mm,n(C) are representatives ofmany vector spaces. They have some additional properties, such as Rn and Cn admitinner product, Mm,n(R) admits matrix multiplication and transpose.

We use the following notations unless otherwise stated.

Notation

0 represents additive zero in V ;−v represents additive inverse of v in V ; and0 represent the zero element in F .

Proposition 8.1.1 Let V be a vector space over F . Then

(i) α0= 0 for all α in F ;(ii) 0v = 0 for all v in V ;

(iii) (−α)v = α(−v)=−(αv) for all α in F and v in V ;(iv) αv = 0 implies that either α = 0 or v = 0.

Proof (i) and (ii) follow by using the cancellation law of addition in V .(iii) follows by uniqueness of inverse in V .(iv) If α �= 0 then α−1 exists in F and hence (iv) follows. �

Remark Proposition 8.1.1 says that the multiplication by zero element of V or of F

always gives the zero element of V . So we can use the same symbol 0 for both ofthem.

8.2 Subspaces

In the Euclidean 3-space R3, the vectors which lie in a fixed plane through theorigin form by themselves a 2-dimensional vector space which is a proper subset ofthe whole space.

Page 291: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.2 Subspaces 277

We now consider similar subsets of a vector space V which inherit vector spacestructure from V . Such subsets introduce the concept of subspaces and play an im-portant role in the study of vector spaces. We are interested to show how to con-struct isomorphic replicas of all homomorphic images of a specified abstract vectorspace. Subspaces play an important role in determining both the structure of a vectorspace V and nature of homomorphisms with domain V .

Definition 8.2.1 Let V be a vector space over a field F . A non-empty subset U ofV is called a subspace of V iff

(i) (U,+) is a subgroup of (V ,+);(ii) for α ∈ F and u ∈U , αu ∈U .

Clearly, for any vector space V , {0} and V are subspaces of V , called trivial sub-spaces. Any other subspace of V (if it exists) is called a proper subspace of V .

An equivalent definition of a subspace can be obtained from the following theo-rem.

Theorem 8.2.1 Let V be a vector space over F . Then a non-empty subset U ofV is a subspace of V iff for every pair of elements u,v ∈ U , αu+ βv ∈ U for allα,β ∈ F .

Proof Let U be a subspace of V . Then for all α,β ∈ F and u,v ∈ U , αu, βv ∈ U

imply αu+ βv ∈ U . Converse part follows by taking α = 1= β and β = 0 succes-sively in αu+ βv to show that u+ v ∈U and αu ∈U , respectively. �

Example 8.2.1 (i) The set V1 = {(x,0) ∈ R2}, i.e., the x-axis is a proper subspaceof V =R2 over R. Similarly, V2 = {(0, y) ∈R2}, i.e., the y-axis is a proper subspaceof V over R.

(ii) All straight lines in the Euclidean plane R2 passing through the origin (0,0)

are proper subspaces of R2. Other subspaces of R2 are {0} and R2 itself.(iii) All straight lines and planes in the Euclidean space R3 and passing through

the origin (0,0,0) are proper subspaces of R3. Other subspaces of R3 are {0} andR3 itself. On the other hand, R2 is not a subspace of R3, because R2 is not a subsetof R3.

(iv) Vn[x] is a subspace of F [x] (see Example 8.1.1(iv)).(v) D([a, b]) is a subspace of C([a, b]) (see Example 8.1.1(v)).

Proposition 8.2.1 Let V be a vector space over F and {Vi}i∈I be a family of sub-spaces of V . Then their intersection M =⋂i∈I Vi is also a subspace of V .

Proof Clearly, 0 ∈M implies that M �= ∅. Moreover, for x, y ∈M and α,β ∈ F ,αx + βy is in each Vi and hence αx + βy ∈M shows that M is a subspace of V . �

Remark The union of two subspaces of V may not be a subspace of V . For example,the x-axis X and the y-axis Y are subspaces of R2 over R, but their union X ∪ Y

Page 292: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

278 8 Vector Spaces

is not a subspace of R2. Because u = (1,0) ∈ X and v = (0,1) ∈ Y but u + v =(1,1) /∈X ∪ Y .

We now want to define the smallest subspace of R2 containing X∪Y . This leadsto the concept of sum of subspaces of a vector space.

Proposition 8.2.2 Let V be a vector space over F and V1, V2 be subspaces of V .Then U = V1 + V2 = {v1 + v2 : v1 ∈ V1, v2 ∈ V2} is the smallest subspace of V

containing both V1 and V2.

Proof Left as an exercise. �

Definition 8.2.2 Let V be a vector space over F and V1, V2 be subspaces of V .Then the subspace U = V1 + V2 is called the sum of subspaces of V1 and V2. Ingeneral, if V1,V2, . . . , Vn are subspaces of V , then

∑ni=1 Vi = {(v1 + v2 + · · · +

vn) : vi ∈ Vi} is a subspace of V , called the sum of the subspaces V1,V2, . . . , Vn,denoted by V1 + V2 + · · · + Vn. In particular, if V = V1 + V2 and V1 ∩ V2 = {0},then V is said to be a direct sum of V1 and V2 and denoted by V = V1 ⊕ V2. Thesubspace V1 (or V2) is said to be a complement of V2 (or V1) in V . Similarly, V =V1⊕V2⊕· · ·⊕Vn iff V = V1+V2+· · ·+Vn and (V1+V2+· · ·+Vi)∩Vi+1 = {0},for i = 1,2, . . . , n− 1.

Remark A complement of a subspace of V (if it exists) may not be unique. For itsexistence in a finite dimensional vector space see Corollary 2 to Theorem 8.4.6.

Example 8.2.2 (i) If V1 is a line through the origin in R2, then any line through theorigin, other than V1, in R2 is a complement of V1 in R2.

(ii) Let V1 = {(x,0) ∈ R2}, V2 = {(0, y) ∈ R2} and V3 = {(x, x) ∈ R2}. ThenR2 = V1 ⊕ V2 = V2 ⊕ V3 but V1 �= V3.

An equivalent definition of direct sum of subspaces of a vector space is obtainedfrom the following theorem.

Theorem 8.2.2 A vector space V is a direct sum of its subspaces V1 and V2 iff everyvector v in V can be expressed uniquely as v = v1+ v2, where v1 ∈ V1 and v2 ∈ V2.In general, V = V1 ⊕ V2 ⊕ · · · ⊕ Vn iff every element v of V can be expresseduniquely as v = v1 + v2 + · · · + vn, vi ∈ Vi , i = 1,2, . . . , n.

Proof Let V = V1 ⊕ V2. Then V = V1 + V2 and V1 ∩ V2 = {0}. Let v = v1 + v2 =v3 + v4, where v1, v3 ∈ V1 and v2, v4 ∈ V2. Then v1 − v3 = v4 − v2 ∈ V1 ∩ V2 ={0} ⇒ v1 = v3 and v2 = v4. Conversely, let v ∈ V be expressed uniquely as v =v1 + v2, where vi ∈ Vi , i = 1,2. Then V = V1 + V2. If w ∈ V1 ∩ V2, then w =w + 0 = 0 + w show that w = 0 by unique expression of w. The proof for thegeneral case is left as an exercise. �

Page 293: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.3 Quotient Spaces 279

Example 8.2.3 (i) R4 = V1 ⊕ V2, where V1 = {(x, y,0,0) ∈ R4} and V2 ={(0,0, z, t) ∈R4}.

(ii) Let Vn[x] be the vector space over R defined in Example 8.1.1(iv) forF = R and Ui = {rxi : r ∈ R}. Then each Ui is a subspace of Vn[x], for i =0,1,2, . . . , n− 1. Moreover, each f (x) ∈ Vn[x] can be expressed uniquely as

f (x)= a0 + a1x + · · · + an−1xn−1, ai ∈R.

Consequently, Vn[x] =U0 ⊕U1 ⊕ · · · ⊕Un−1.

8.3 Quotient Spaces

We continue the study of subspaces of vector spaces.We are interested to show how to construct isomorphic replicas of all homomor-

phic images of a specified abstract vector space. For this purpose we introduce theconcept of quotient spaces which plays an important role in determining both thestructure of a vector space V and nature of homomorphisms with domain V . A sub-space of a vector space plays an essential role to construct a quotient space which isassociated with the mother vector space in a natural way. Like quotient groups andquotient rings, the concept of quotient spaces is introduced in the following way: LetV be a vector space over F and U a subspace of V . Then (U,+) is a subgroup ofthe abelian group (V ,+) and hence (V/U,+) is also an abelian group. The scalarmultiplication

μ : F × V/U → V/U, (α, v +U) �→ αv +U

makes V/U a vector space over F .

Definition 8.3.1 The vector space V/U is called the quotient space of V by U andthe map p : V → V/U,v �→ v+U is called a canonical homomorphism.

8.3.1 Geometrical Interpretation of Quotient Spaces

We now present geometrical interpretation of some quotient spaces through Exam-ple 8.3.1.

Example 8.3.1 (i) Let V = R2 be the Euclidean plane and U be the x-axis. ThenV/U is the set of all lines in R2 which are parallel to x-axis. This is so because forv = (r, t) ∈R2, v +U = (r, t)+U = {(r + x, t) : x ∈R} is the line y = t , which isparallel to x-axis. This line is above or below the x-axis according to t > 0 or t < 0.If t = 0, this line coincides with x-axis.

(ii) If V = R3 is the Euclidean 3-space and U = {(x, y,0) ∈ R3}, then U is thexy-plane and for any v = (r, t, s) ∈ R3, the coset v + U represents geometrically

Page 294: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

280 8 Vector Spaces

the plane parallel to xy-plane through the point v = (r, t, s) at a distance s from thexy-plane (above or below the xy-plane according to s > 0 or s < 0).

(iii) Let V = R3 and U = {(x, y, z) ∈ R3 : 5x − 4y + 3z = 0 and 2x − 3y +4z = 0}. Then for any v = (a, b, c) ∈ R3, the coset v + U ∈ V/U represents ge-ometrically the line parallel to the line determined by the intersection of the twoplanes:

5(x − a)− 4(y − b)+ 3(z− c)= 0 and 2(x − a)− 3(y − b)+ 4(z− c)= 0.

(iv) Let V = R2 be the Euclidean plane and W = {(x, y) ∈ R2 : ax + by = 0} for afixed non-zero (a, b) in R2. The cosets of W in R2 are given by the lines ax+by = c

for c ∈ R. This is so because if v ∈ R2, then the coset v +W is the line parallel tothe line ax + by = 0 and hence the cosets of W in R2 are given by the system ofparallel lines ax + by = c, c ∈R.

8.4 Linear Independence and Bases

We recall that Rn is a vector space over R and the n vectors e1 = (1,0, . . . ,0), e2 =(0,1, . . . ,0), . . . , en = (0,0, . . . ,1) of Rn determine every vector of Rn uniquely.Again if we consider the vector spaces V = R[x] and Vn[x] (taking F = R in Ex-ample 8.2.1(iv)), we find a finite number of elements, such as 1, x, x2, . . . , xn−1,which determine every element f (x) of Vn[x] uniquely as f (x)= α0+α1x+· · ·+αn−1x

n−1. On the other hand, there is no finite set of elements in R[x], which deter-mines every element f (x) of R[x] uniquely. Such situations lead to the concept oflinear independence and bases in vector spaces. For this purpose we first introducethe concepts of linear combinations and generators in a vector space.

Definition 8.4.1 Let V be a vector space over a field F and S be a non-emptysubset (finite or infinite) of V . An element v ∈ V is said to be a linear combinationof elements of S over F iff there exists a finite number of elements v1, v2, . . . , vn inS and α1, α2, . . . , αn in F such that

v = α1v1 + α2v2 + · · · + αnvn =n∑

i=1

αivi .

Example 8.4.1 R2 is a vector space over R. If S = {(3,4), (1,2)}, then the ele-ment (9,14) is a linear combination of elements of S. This is so because (9,14)=2(3,4)+ 3(1,2).

Proposition 8.4.1 Let V be a vector space over F and S be a non-empty subsetof V . Then the set L(S) of all linear combinations of S is a subspace of V .

Proof As S ⊆ L(S), L(S) �= ∅. Let u,v ∈ L(S). Suppose u =∑ni=1 αiui and v =∑m

j=1 βjvj , αi,βj ∈ F and ui, vj ∈ S. Then for α,β ∈ F , αu+ βv ∈ L(S) impliesthat L(S) is a subspace of V . �

Page 295: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.4 Linear Independence and Bases 281

Definition 8.4.2 L(S) is called the linear space spanned by S in V .L(S) is the smallest subspace of V containing all the vectors of the given set S.

We now proceed to introduce the concept of “generators” in a vector space V .Let S (may be empty) be a subset of V . Clearly, S is contained in at least one sub-space of V , namely, V . Then the intersection of all subspaces of V containing S isa subspace of V by Proposition 8.2.1. It is the smallest subspace of V containing S.This subspace is denoted by 〈S〉.

Definition 8.4.3 〈S〉 is called the subspace generated by S. In particular, if〈S〉 = V , then V is said to be generated by S and S is called a set of generatorsfor V .

The elements of 〈S〉 can be obtained from the following theorem.

Theorem 8.4.1 Let V be a vector space over F and S be an arbitrary subset of V .Then

〈S〉 = {0}, if S = ∅,= L(S), if S �= ∅.

Proof If S = ∅, the smallest subspace of V containing S is {0}. Hence 〈S〉 = {0},if S = ∅. If S �= ∅, we claim that L(S) is the smallest subspace of V containing S.Let W be any subspace of V such that S ⊆W . Let v =∑n

i=1 αivi ∈ L(S), αi ∈ F ,vi ∈ S, i = 1,2, . . . , n. Then each αivi ∈W ⇒ v ∈W ⇒ L(S)⊆W ⇒ L(S) is thesmallest subspace of V containing S⇒ L(S)= 〈S〉. �

Definition 8.4.4 A vector space V is said to be finitely generated iff there existsa finite subset S of V such that V = 〈S〉 and S is called a set of generators of V .Otherwise, V is said to be not finitely generated; sometimes it is called infinitelygenerated.

Example 8.4.2 (i) R2,R3, . . . ,Rn are finitely generated vector spaces over R.This is so because if S = {(1,0), (0,1)}, then 〈S〉 = R2; if S = {(1,0,0), (0,1,0),

(0,0,1)}, then 〈S〉 = R3, if S = {e1 = (1,0, . . . ,0), e2 = (0,1, . . . ,0), . . . , en =(0,0, . . . ,1)}(⊂Rn), then 〈S〉 =Rn.

(ii) Set of generators of V may not be unique. For example, S = {(1,0), (0,1)}and T = {(1,0), (0,1), (1,1)} are both generators of R2.

(iii) If S = {1, i}, then 〈S〉 =C implies that C is a finitely generated vector spaceover R.

(iv) R[x] is not finitely generated. This is so because any linear combination of afinite number of polynomials f1(x), f2(x), . . . , fn(x) is a polynomial whose degreedoes not exceed the maximum degree m (say) of the above polynomials. But R[x]contains polynomials of degree greater than m.

Remark Let V be a vector space over F and S be a non-empty subset of V .

Page 296: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

282 8 Vector Spaces

(a) If S = {v}, then L(S)= {αv : α ∈ F } = 〈v〉.(b) If S = {u,v}, then L(S)= {αu+ βv : α,β ∈ F } = 〈u,v〉.(c) For any non-empty subsets A,B of a vector space V ,

(i) A is a subspace of V iff A= 〈A〉;(ii) A⊆ B implies L(A)⊆ L(B);

(iii) 〈L(A)〉 = L(A);(iv) L(A∪B)= L(A)+L(B).

8.4.1 Geometrical Interpretation

Consider the Euclidean space R3. It v �= 0 is a vector in R3, then L(v) = {αv :α ∈ R} represents geometrically the line in R3 through the origin and the point v.Again if u,v are two non-zero vectors in R3 such that v �= ru for any non-zero realnumber r (or equivalently, u �= tv for any non-zero real number t), then for S ={u,v}, L(S)= {αu+ βv : α,β ∈R} represents geometrically the plane through theorigin and the points u,v in R3. Such examples motivate to introduce the conceptsof linear independence, basis and dimension of a vector space.

Definition 8.4.5 Let V be a vector space over F .

1. The empty set ∅ is considered as linearly independent over F .2. A non-empty finite subset S = {v1, v2, . . . , vn} of V is said to be linearly inde-

pendent over F iff for α1, α2, . . . , αn ∈ F , α1v1+α2v2+· · ·+αnvn = 0 impliesα1 = α2 = · · · = αn = 0.

3. An infinite subset S of V is said to be linearly independent over F iff every finitesubset of S is linearly independent.

Definition 8.4.6 A subset S of a vector space over F is said to linearly dependentover F iff it is not linearly independent over F .

Remark If a subset S = {v1, v2, . . . , vn} is a linearly dependent set in a vector spaceV over F , this implies that there exist α1, α2, . . . , αn in F , not all 0, such that α1v1+α2v2 + · · · + αnvn = 0. For example, S = {(1,0), (0,1)} is a linearly independentsubset of R2 over R, while T = {(1,0), (0,1), (1,1)} is a linearly dependent subsetof R2 over R. A linearly independent set cannot contain the vector 0.

Remark Linear independence (or dependence) in a vector space is not a property ofan individual vector but a property of a set of vectors.

Example 8.4.3 Consider the vector space R2 over R.

1. If v �= 0, {v} is linearly independent. Because αv = 0⇒ α = 0.2. If S = {(1,0), (2,0)}, then 1(2,0) − 2(1,0) = (0,0) implies that S is linearly

dependent.3. A subset S containing the zero vector 0 is linearly dependent.

Page 297: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.4 Linear Independence and Bases 283

Proposition 8.4.2 If the subset S = {v1, v2, . . . , vn} of a vector space V is linearlyindependent over F , then every element v is L(S) has a unique expression of theform

v = α1v1 + α2v2 + · · · + αnvn, αi ∈ F.

Proof Every element v ∈ L(S) is of the above form by definition. To show its uniqueexpression, let

v = α1v1 + α2v2 + · · · + αnvn

= β1v1 + β2v2 + · · · + βnvn.

Then

(α1 − β1)v1 + (α2 − β2)v2 + · · · + (αn − βn)vn = 0

⇒ αi = βi, i = 1,2, . . . , n. �

Theorem 8.4.2 Let S = {v1, v2, . . . , vn} be a finite non-empty ordered set of vec-tors in a vector space V over F . If n= 1, then S is linearly independent iff v1 �= 0. Ifn > 1 and v1 �= 0, then either S is linearly independent or some vector vm (m > 1)is a linear combination of its preceding ones, v1, v2, . . . , vm−1.

Proof If S is linearly independent, there is nothing to prove. So we assume that S islinearly dependent. Then there exist α1, α2, . . . , αn (not all 0) in F such that

α1v1 + α2v2 + · · · + αnvn = 0.

Let m be the largest integer such that αm �= 0. Then αi = 0 for all i > m. Hence

α1v1 + α2v2 + · · · + αm−1vm−1 + αmvm = 0

implies that

vm = α−1m (−α1v1 − α2v2 − · · · − αm−1vm−1)

= (−α−1m α1)v1 +(−α−1

m α2)v2 + · · · +

(−α−1m αm−1

)vm−1.

This proves the theorem. �

This theorem gives a series of interesting corollaries.

Corollary 1 Let V be a vector space over F and S = {v1, v2, . . . , vn} a linearlyindependent subset of V . If v ∈ V , then S ∪ {v} is linearly independent iff v is notan element of L(S).

Proof If S ∪ {v} is linearly independent, then v �= 0. Suppose v ∈ L(S). Then∃αi ∈ F such that v = α1v1+α2v2+· · ·+αnvn. Since v �= 0, α1, α2, . . . , αn are notall 0. Hence α1v1+α2v2+· · ·+αnvn+ (−1)v = 0⇒ S ∪{v} is linearly dependentover F which is a contradiction. Hence v /∈ L(S).

Page 298: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

284 8 Vector Spaces

Conversely, suppose v /∈ L(S). If possible, suppose S∪{v} is linearly dependent.Then by Theorem 8.4.2, v ∈ L(S), which is a contradiction. Hence S∪{v} is linearlyindependent. �

Corollary 2 Let the subset S = {v1, v2, . . . , vn} of the vector space V be suchthat U = L(S). If {v1, v2, . . . , vm} (m≤ n) is a linearly independent set, then thereexists a linearly independent subset T of S of the form T = {v1, v2, . . . , vm, vt1,

vt2, . . . , vtr} such that U = L(T ).

Proof If S is linearly independent, then we take T = S. If not, we take out fromS the first vm which is not a linear combination of its preceding ones. Thenv1, v2, . . . , vt are linearly independent for t < m. Clearly, B = {v1, v2, . . . , vm−1,

vm+1, . . . , vn} has n− 1 elements and L(B)⊆ U . To show the equality, let u ∈ U .Then it can be expressed as a linear combination of elements of S. But in this linearcombination, we can replace vm by a linear combination of v1, v2, . . . , vm−1. Thusu is a linear combination of v1, v2, . . . , vm−1, vm+1, . . . , vn.

Continuing this taking out process we obtain a subset T = {v1, . . . , vm, vt1,

vt2, . . . , vtn} (say) of S such that L(T ) = U and in which no element is a lin-ear combination of the preceding ones. T is clearly linearly independent by The-orem 8.4.2. �

Corollary 3 Let V be a finitely generated vector space. Then V contains a linearlyindependent finite subset T of V such that L(T )= V .

Proof Since V is finitely generated, there exists a subset S = {v1, v2, . . . , vn} of V

such that V = L(S). By using Corollary 2, we can find a linearly independent subsetT of S such that L(T )= V . �

Definition 8.4.7 Let V be a non-zero vector space over F . A non-empty subset B

of V is said to be a basis of V over F iff

(i) B is linearly independent over F ; and(ii) V = L(B).

If V = {0}, the empty set ∅ is considered to be a basis of V .

Proposition 8.4.3 If a vector space V is finitely generated and S = {v1, v2, . . . , vn}is a subset of V such that V = L(S), then a subset B of S forms a basis of V .

Proof It follows from Corollary 3. �

The following theorem proves the existence of a basis of an arbitrary vectorspace.

Theorem 8.4.3 (Existence Theorem) Every vector space V over F has a basis.

Page 299: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.4 Linear Independence and Bases 285

Proof If V = {0}, then ∅ is considered to be a basis of V . Next suppose V �= {0}.Let S be the family of all linearly independent subsets of V i.e., S = {X ⊆ V :X is linearly independent over F }. Since every non-zero element of V forms a lin-early independent subset, it is in S and hence V is non-empty. We order S partiallyunder set inclusion. By Zorn’s Lemma, S has a maximal element, say B . Then B

is linearly independent. We claim that L(B) = V . Otherwise, ∃ an element v ∈ V

such that v /∈ L(B). Then B ∪ {v} is linearly independent by Corollary 1 to Theo-rem 8.4.2. This contradicts the maximality of B . Hence B is a basis of V . �

We now present an alternative criterion for a basis.

Theorem 8.4.4 A non-empty subset B of a vector space V is a basis of V iff everyelement of V can be expressed uniquely as a linear combination of elements of B .

Proof First suppose that B forms a basis of V . Then B is linearly independent andV = L(B). Hence every element v ∈ V has a unique expression in the desired formby Proposition 8.4.2.

Conversely, let every element of V be expressed uniquely as a linear combinationof elements of B . Then V ⊆ L(B)⊆ V ⇒ V = L(B). From the unique expressionof 0, it follows that B is linearly independent. Hence B is a basis of V . �

Theorem 8.4.5 Let V be a non-zero vector space over F .

(a) Let S be an arbitrary linearly independent subset of V . If S is not a basis of V ,then S can be extended to a basis of V . In particular, every singleton set of anon-zero vector of V can be extended to a basis of V .

(b) If S is a subset of V such that V = L(S), then S contains a basis of V .(c) If V has a finite basis B consisting of n elements, then any other basis of V is

also finite consisting of n elements.(d) Cardinality of every basis of V is the same.

Proof Let V be a non-zero vector space over F .(a) Let F be the family of all linearly independent subsets S of V containing any

linearly independent subset A of V i.e., F = {S ⊆ V : S is linearly independent andA ⊆ S, where A is any linearly independent subset of V }. Then F is non-empty.This is so because all singleton sets of non-zero elements of V are in F . We orderF partially by set inclusion. By Zorn’s Lemma, F has a maximal element B (say).B is clearly linearly independent. Moreover, L(B) = V . Otherwise, we contradictthe maximality of B . Hence B is a basis of V . The last part follows immediately asevery non-zero vector is linearly independent.

(b) Let S be any subset of V such that V = L(S) and FS = {B ⊆ S :B is linearly independent}. Proceeding as in (a), the maximal element of FS formsa basis of V .

(c) Let B = {v1, v2, . . . , vn} = {vi} be a finite basis of V with n elements andC = {uj : j ∈ J } be any other basis of V , where J is an indexing set. We claim

Page 300: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

286 8 Vector Spaces

that C is finite and if C has m elements, then m = n. If C is not finite, we reacha contradiction, because each vi is a linear combination of certain uj ’s and all theuj ’s occurring in this way form a finite subset S of C. If we assume that C is notfinite, then there exists an element uj0 (say) in C which is not in S. But uj0 isa linear combination of the vi ’s and hence uj0 is also a linear combination of thevectors in S. This implies by Corollary 1 to Theorem 8.4.2 that S∪{uj0} is a linearlydependent subset of C. But this is not possible, since C is a basis of V . Thus oneconcludes that C is finite.

Suppose C = {u1, u2, . . . , um} for some positive integer m. Then we prove thatm = n. Since B is a basis of V , u1 can be expressed as a linear combination ofv1, v2, . . . , vn and hence the set S1 = {u1, v1, v2, . . . , vn} is linearly dependent. Thenby Theorem 8.4.2, there is some vt �= u1 in B such that vt is a linear combination ofthe vectors in S1 preceding it. If we delete vt from S1 then the remaining set S2 ={u1, v1, . . . , vt−1, vt+1, . . . , vn} is such that L(S2) = V . Again u2 ∈ C is a linearcombination of vectors in S2 and the set S3 = {u1, u2, v1, . . . , vt−1, vt , vt+1, . . . , vn}is linearly dependent and such that L(S3) = V , where vt denotes vt deleted. Inthis process, we include one vector uj from C and delete one vector vi from B .Continuing this process, we cannot delete all the vi ’s before the uj ’s are exhausted.This is so because in that case, the remaining uj ’s would be linear combinations ofvectors of C already used. This contradicts the linear independence of uj ’s. Thisimplies that n cannot be less than m. Similarly, m cannot be less than n. So weconclude that m= n.

(d) Let B = {vi : i ∈ I } and C = {uj : j ∈ J } be two bases of V (finite or infinite).If any one of B or C is finite, then the other is also finite and they have the samenumber of vectors by (c). We now consider the possibility when both B and C

are infinite. Since C is a basis, each vi ∈ B can be expressed uniquely as a linearcombination with non-zero coefficients of some uj ’s (finite in number), say, vi =α1uj1 + · · · + αnujn. Moreover, every uj appears in at least one such expression,because, if some uj0 does not appear in any such expression, then the basis B showsthat uj0 is a linear combination of some vi ’s and hence of some uj ’s each of whichis different from uj0. This is not possible, as the uj ’s are linearly independent.Consequently, corresponding to each vi ∈ B , there exists a finite non-empty set Svi

of uj ’s such that C =⋃vi∈B Svi. By the property of cardinality (see Chap. 1), it

follows that cardC ≤ cardB . Again interchanging the roles of vectors of B and C,it follows that cardB ≤ cardC. Hence cardB = cardC. �

The above theorem leads to the definition of the dimension of a vector space.

Definition 8.4.8 Let V be a non-zero vector space over F . The cardinality of everybasis of V is the same and this common value is called the dimension of V , denotedby dimF V or simply dimV . The vector space V is said to be finite dimensional orinfinite dimensional according to V having a finite basis or not. If B has a basis ofn elements, then dimV = n. On the other hand, if V = {0}, then V is said to be0-dimensional or said to have dimension 0.

Theorem 8.4.5 gives the following series of corollaries.

Page 301: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.4 Linear Independence and Bases 287

Corollary 1 Let V be a vector space over F . If B = {v1, v2, . . . , vn} is a maximalset of linearly independent vectors of V , then B forms a basis of V .

Corollary 2 Let V be a finite dimensional vector space over F . If dimV = n andB = {v1, v2, . . . , vn} is linearly independent, then B forms a basis of V .

Corollary 3 Let V be a finite dimensional vector space over F and U be a sub-space of V such that dimV = dimU . Then U = V .

Corollary 4 Let V be a vector space of dimension n. If S = {v1, v2, . . . , vm} is alinearly independent subset of V and n > m, then there are vectors vm+1, . . . , vm+t

in V such that B = {v1, v2, . . . , vm, vm+1, . . . , vm+t } forms a basis of V , wheret = n−m.

Remark Any linearly independent subset of a finite dimensional vector space V canbe extended to a basis of V .

Corollary 5 Let U be a subspace of a finite dimensional vector space V anddimV = n (n ≥ 1). Then U is also finite dimensional and dimU ≤ n. Equalityholds iff U = V .

Theorem 8.4.6 Let A and B be subspaces of a finite dimensional vector space V .Then A + B is also finite dimensional and dim(A + B) = dimA + dimB −dim(A∩B).

Proof Clearly, A ∩ B is finite dimensional. If A ∩ B �= {0}, then it has abasis S = {v1, v2, . . . , vn}, say. This basis can be extended to a basis SA ={v1, v2, . . . , vn, vn+1, . . . , vn+t } of A and to a basis SB = {v1, v2, . . . , vn,wn+1, . . . ,

wn+q} of B . Then dimA = n + t , dimB = n + q and dimA ∩ B = n. Let U =L({vn+1, . . . , vn+t }). Then U ∩ B = {0} and C = {v1, v2, . . . , vn, vn+1, . . . , vn+t ,

wn+1, . . . ,wn+q} is linearly independent and L(C) = A + B . Consequently,C forms a basis of A+B . Hence dim(A+B)= n+ t+q = (n+ t)+ (n+q)−n=dimA+ dimB − dim(A∩B). �

Corollary 1 For any two subspaces A and B of a finite dimensional vectorspace V , dim(A+B)≤ dimA+ dimB . Equality holds iff A∩B = {0}.

Corollary 2 Let V be a finite dimensional vector space and A be a subspace of V .Then there exists a subspace B of V such that V = A⊕ B and dimV = dimA+dimB .

Proof Let BA = {v1, v2, . . . , vn} be a basis of A. Then BA can be extended to a basisBV = {v1, v2, . . . , vn, u1, u2, . . . , up} of V . Let B = L({u1, u2, . . . , up}). Then V =A+B and A∩B = {0}. Hence V =A⊕B . Then dimV = dimA+ dimB . �

Page 302: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

288 8 Vector Spaces

If V is a finite dimensional vector space and W is a subspace of V , what is thedimension of V/W ? The following theorem gives its answer.

Theorem 8.4.7 Let W be a subspace of a finite dimensional vector space V . Thendim(V/W)= dimV − dimW .

Proof Let dimV = n, dimW = m and BW = {w1,w2, . . . ,wm} be a basis of W .We now extend BW to a basis B = {w1,w2, . . . ,wm,v1, v2, . . . , vt } of V such thatdimV =m+ t = n. Then A= {v1+W,v2+W, . . . , vt+W } forms a basis of V/W .Clearly, dim(V/W)= t = n−m. �

Corollary Let W be a subspace of a finite dimensional vector space V . Then {v1+W,v2+W, . . . , vm+W } constitutes a basis of V/W iff {v1, v2, . . . , vm} constitutesa basis of W .

8.4.2 Coordinate System

Proposition 8.4.2 leads to extend the concept of usual coordinate system in the Eu-clidean plane R2 or Euclidean space R3 to any finite dimensional vector space.

Definition 8.4.9 Let V be an n-dimensional vector space over F and B ={v1, v2, . . . , vn} be a basis of V . Then the unique representation of v in V as

v = α1v1 + α2v2 + · · · + αnvn, with αi ∈ F,

determines the unique n-tuple (α1, α2, . . . , αn) ∈ Fn, called the coordinate of v re-ferred to the basis B i.e., referred to axes OX1,OX2, . . . ,OXn (each extended in-finitely on both sides) as coordinate axes, where X1,X2, . . . ,Xn are the points cor-responding to the vectors v1, v2, . . . , vn respectively, called reference points alongthese axes.

Remark The ith coordinate αi of a point v is determined only from the entire coor-dinate system and not from vi alone. The coordinates of v in V depend on the choiceof the basis of V like the choice of coordinate axes in R2 or R3. Corresponding todifferent bases of V , we get different coordinates of the same vector in V .

8.4.3 Affine Set

In R3 all non-trivial subspaces are the lines through the origin and the planes throughthe origin. But in geometry we also study the planes and lines not necessarily pass-ing through the origin. We now introduce a concept called affine set which is closelyrelated to the concept of a subspace.

Page 303: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.4 Linear Independence and Bases 289

Definition 8.4.10 Let V be a vector space over F . A subset A of V is said to bean affine set iff either A = ∅ or A = v +W (a coset) for some subspace W of V

and some v ∈ V and an affine combination of vectors v1, v2, . . . , vn of V is a linearcombination of the form α1v1+α2v2+· · ·+αnvn such that α1+α2+· · ·+αn = 1.

Example 8.4.4 A convex combination of x and y in R2 has the form tx + (1− t)y

for all real t ≥ 0. An affine combination of points v1, v2, . . . , vm in Rn is a point v =α1v1 + α2v2 + · · · + αnvm, where αi ∈ R and

∑mi=1 αi = 1. A convex combination

is an affine combination for which αi ≥ 0 for all i.

Remark A subset A of Euclidean space is called an affine set iff for every pair ofdistinct elements x, y in A, the line determined by x and y lies entirely in A. Bydefault, ∅ and one-point subsets are affine.

Definition 8.4.11 An affine set A⊂Rn is said to be spanned by {v0, v1, . . . , vn} ⊂Rn iff A consists of all affine combinations of these vectors.

Definition 8.4.12 An ordered set of vectors {v0, v1, . . . , vm} ⊂ Rn is said to beaffinely independent iff {v1 − v0, v2 − v0, . . . , vm − v0} is a linearly independentsubset of Rn.

Definition 8.4.13 Let S = {v0, v1, . . . , vm} be an affinely independent subset of Rn.Then the convex set spanned by this set S, denoted by 〈S〉, is the set of all affinecombinations of the vectors in S i.e., a point v is in 〈S〉 iff v can be expresseduniquely as

v = α0v0 + α1v1 + · · · + αmvm, (8.1)

where αi ’s are all non-negative real numbers such that α0 + α1 + α2 + · · · +αm = 1. This gives a unique (m + 1)-tuple (α0, α1, . . . , αm) with

∑αi = 1 and

v =∑mi=0 αivi . This (m+ 1)-tuple is called the barycentric coordinate of v relative

to the ordered set S.

Definition 8.4.14 Let S = {v0, v1, . . . , vm} be an affinely independent subset of Rn.The convex set 〈S〉 is called the (affine) m-simplex with vertices v0, v1, . . . vm, de-noted by 〈v0, v1, . . . , vm〉.Example 8.4.5 A 0-simplex is a point, 1-simplex is a closed line segment, 2-simplex is a triangle (with its interior points), 3-simplex is a tetrahedron (solid).

8.4.4 Exercises

Exercises-I

1. Let V be a non-zero vector in R2. Then the subspace W = {rv : r ∈ R} is thestraight line passing through the origin.

Page 304: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

290 8 Vector Spaces

[Hint. Let (α,β) represent a vector v is R2. Then the line passing through theorigin (0,0) and (α,β) is x−0

0−α= y−0

0−β. Hence any point on the line is given by

(rα, rβ) for r ∈R.]2. Let U be a subspace of a vector space V and v ∈ V be a fixed vector. Then the

set S defined by S = v+U is an affine set.3. Let W = {(x, y) : ax + by = 0} for a fixed non-zero (a, b) in R2. Then W is a

one-dimensional subspace of R2 and the cosets of W in R2 are given by the linesax + by = c, for c ∈R.

4. Let W = {(x, y, z) ∈ R3 : y = z}. Then W is a subspace of R3 such thatdimW = 2.

5. Let M2(R) be the vector space of all 2× 2 matrices over R and S be the set ofall symmetric matrices in M2(R). Then dimS = 3.

6. Let V be an n-dimensional vector space. Then the following statements areequivalent:

(a) B = {v1, v2, . . . , vn} is a basis of V ;(b) B = {v1, v2, . . . , vn} is a maximal linearly independent set;(c) B = {v1, v2, . . . , vn} is a minimal generating set.

8.5 Linear Transformations and Associated Algebra

The central problem of linear algebra is to study the algebraic structure of lineartransformations.

Like homomorphisms of groups and rings, a linear transformation is a map pre-serving the algebraic structures of vector spaces. This concept is at the heart of linearalgebra. Many problems of mathematics are solved with the help of linear transfor-mations. The importance of vector spaces is based on mainly the linear transfor-mations they carry, because many problems of algebra and analysis, when properlyposed, may be reduced to the study of linear transformations of vector spaces. Forexample, linear transformations play an important role in the study of matrices, dif-ferential and integral equations and integration theory etc. The aim of this section isto extend the study of vector spaces with the help of linear transformations.

Definition 8.5.1 Let V and W be vector spaces over the same field F . A transfor-mation T from V to W is a mapping T : V →W such that

L(i) T (x + y)= T (x)+ T (y), for all x, y in V (additivity law);L(ii) T (αx)= αT (x), for all x in V , and for all α in F (homogeneity law).

Conditions L(i) and L(ii) can be combined together to obtain an equivalent con-dition:

L(iii) T (αx + βy)= αT (x)+ βT (y), for all α,β in F and for all x, y ∈ V .

In particular, if V = W , a linear transformation T : V → V is called a linearoperator.

Page 305: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 291

A linear transformation T : V →W is called a monomorphism, epimorphism orisomorphism according to T being injective, surjective or bijective.

Remark Every linear transformation is a homomorphism of the corresponding ad-ditive groups.

Example 8.5.1 (a) Each of the following examples is a linear transformation (LT):

(i) The identity map Id : V → V,x �→ x, for every vector space V is an LT .(ii) For α ∈R, Tα :R2 →R2, (x, y) �→ (αx,αy) is an LT .

(iii) T1 : R2 → R2, (x, y) �→ (y, x), i.e., T1 reflects R2 about the line y = x is anLT .

(iv) T2 :R2 →R2, (x, y) �→ (x,0), i.e., T2 projects R2 onto the x-axis is an LT .(v) Let C([0,1]) be the vector space of all real valued continuous functions de-

fined on [0,1]. Then the map

I : C([0,1])→R, f �→∫ 1

0f (x)dx

is an LT .(vi) For any matrix M ∈Mm,n(R), the map TM :Rn→Rm, X �→MX,X viewed

as a column matrix, is an LT .The usual dot product may be viewed as a special case of TM , where TM :

Rn→R, X �→MX for every row matrix M i.e., if

M = (a1, a2, . . . , an) and X =

⎜⎜⎜⎝

x1x2...

xn

⎟⎟⎟⎠ ,

then TM(X)= a1x1 + a2x2 + · · · + anxn is an LT .(vii) Let V be the vector space of all real valued functions in x having derivatives

of all orders. Then

d

dx=D : V → V, f �→ f ′(x)= df

dxis an LT.

(viii) Let V be the vector space of all real valued functions f in n-variablesx1, x2, . . . , xn admitting ∂f

∂xifor all i. Then the gradient of f defined by

gradf (X)=(

∂f

∂x1, . . . ,

∂f

∂xn

)is an LT.

(b) The map T :R2 →R1, (x, y) �→ sin(x + y) is not an LT .This is so because 0= T (π,0)= T ((π

2 ,0)+ (π2 ,0))= 2T (π

2 ,0)= 2.

Like groups, we define kernel and image of a linear transformation of vectorspaces.

Page 306: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

292 8 Vector Spaces

Definition 8.5.2 If T : V →W is a linear transformation, then kerT = {v ∈ V :T (v)= 0} ⊆ V is called the kernel of T and ImT = {T (v) : v ∈ V } ⊆W is calledthe range or image of T .

Clearly, kerT is a subspace of V , called the null space of T and ImT is a sub-space of W , called the range space of T .

Interpretation If T is a left multiplication by a matrix M (see Example 8.5.1(vi)),then kerT is the set of solutions (in Rn) of the homogeneous linear equation MX =0 and ImT is the set of all vectors C (in Rm) such that MX = C has a solution.

Example 8.5.2 (i) If T : R3 → R2, (x, y, z) �→ (x, y), then kerT = {(x, y, z) ∈R3 : T (x, y, z)= (0,0)} = {(0,0, z) ∈R3} is the z-axis in R3 and ImT is the wholeEuclidean plane R2.

(ii) If T :M2(R)→ R4,(

a bc d

) �→ (a, b, c, d), then T is a linear map such that

kerT = {( 0 00 0

)}and ImT =R4.

We now establish that an n-dimensional vector space over F and Fn are isomor-phic as vector spaces.

Theorem 8.5.1 Let V be an n-dimensional vector space over F (n ≥ 1). Then V

is isomorphic to the vector space Fn.

Proof Let W = Fn and B = {v1, v2, . . . , vn} be a basis of V . Then every vector v inV can be expressed uniquely as v = α1v1+· · ·+αnvn, αi ∈ F . Using this coordinateof v referred to B , we define the map T : V → Fn, v �→ (α1, α2, . . . , αn). Then T

is an isomorphism of vector spaces. �

Remark The isomorphism T depends on the basis B and also on the order of theelements of B .

Corollary Any non-zero n-dimensional vector space V over R (or C) is isomorphicto Rn (or Cn) as vector spaces.

For example, the vector space Vn[x] (see Example 8.1.1(iv)) over R and thevector space Rn have the same algebraic structure as vector spaces.

For a given subset X of a vector space V over F , the set M(X) of all F -valuedfunctions on X which vanish outside any finite set is a vector space over F un-der usual addition and scalar multiplication. Using this fact we generalize Theo-rem 8.5.1.

Theorem 8.5.2 Let V be a non-zero vector space over F . If B is a basis of V , thenV is isomorphic to the vector space M(B).

Proof Let B = {vi : i ∈ I } be a basis of V . We now construct an isomorphism of V

onto M(B) by assigning to each vector v in V an F -valued function fv defined on

Page 307: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 293

B as follows: If v �= 0, then v can be expressed uniquely as

v = α1vi1 + α2vi2 + · · · + αnvin, where α1, α2, . . . , αn

are non-zero elements in F , S = {vi1, vi2, . . . , vin} is a finite subset of B and fv isdefined by

fv(vij ) = 0, if vij lies outside the set S;= αij , if vij lies inside the set S.

Then the map ψ : V →M(B), v �→ fv is an isomorphism of vector spaces. �

We now give another extension of Theorem 8.5.1.

Theorem 8.5.3 Let V be a non-zero vector space over F . Then V is isomorphic tothe direct sum of copies of F .

Proof Let B = {vi : i ∈ I } be a basis of V . It is sufficient to prove that V =⊕i∈I Fvi , where

Fvi = {αvi : α ∈ F } and Fvi∼= F for every i ∈ I.

Clearly, Fvi is a non-empty subset of V , since vi = 1 · vi ∈ Fvi . Again Fvi is asubspace of V for each vi ∈ B . Let v ∈ V . Then v can be expressed uniquely as

v =∑

i∈J

αivi, where J is a finite subset of I.

Since αivi ∈ Fvi, ∀i ∈ I (hence ∀i ∈ J ), v can be expressed uniquely as v =∑i∈J ui , where ui ∈ Fvi . Thus

v =∑

i∈J

ui, for all i ∈ J

= 0, for all i outside J.

Hence V =⊕i∈I Fvi where each Ti : F → Fvi , α �→ αvi is an isomorphism. �

Remark Theorems 8.5.1–8.5.3 show that an abstract vector space V seems to havea nice representation for study. For example, an n-dimensional vector space overR may be studied through Rn, which is easier to visualize. But such representa-tion loses much of its importance, because it depends on the choice of a basis B

of V . Moreover, almost all the vector spaces of greatest importance carry additionalstructure (algebraic or topological), which need not be related to the above isomor-phisms. For example, the product of two polynomials in the vector space Vn[x] isdefined in a natural way but there is no similar concept in Rn, although Vn[x] andRn are isomorphic as vector spaces. We now give some interesting properties oflinear transformations.

Page 308: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

294 8 Vector Spaces

Proposition 8.5.1 Let T :U → V be a linear transformation. Then

(i) T (0)= 0;(ii) T (−u)=−T (u) for all u in U ;

(iii) T is injective iff kerT = {0}.

Proof Left as an exercise. �

Theorem 8.5.4 Let U and V be finite dimensional vector spaces over F and B ={u1, u2, . . . , un} be a basis of U .

(i) If T :U → V is a linear transformation, then

T (B)= {T (u1), T (u2), . . . , T (un)}

generates ImT .

Moreover, if kerT = {0}, then T (B) constitutes a basis of ImT .(ii) For arbitrary non-zero elements v1, v2, . . . , vn in V , there exists a unique linear

transformation T :U → V such that T (ui)= vi, i = 1,2, . . . , n.(iii) T defined in (ii) is injective iff the vectors v1, v2, . . . , vn are linearly indepen-

dent.

Proof (i) If v ∈ ImT , ∃ some u ∈ U such that T (u) = v. As B is a basis of U ,∃α1, α2, . . . , αn ∈ F such that u =∑n

i=1 αiui . This shows by linearity of T thatImT is generated by T (B). If kerT = {0}, then T is a monomorphism and henceT (B) is linearly independent and forms a basis of ImT .

(ii) Left as an exercise.(iii) Let v1, v2, . . . , vn be linearly independent and u ∈ kerT . Then u =∑ni=1 αiui for some αi ∈ F shows that T (u)=

∑ni=1 αiT (ui) = 0. Hence∑n

i=1 αivi = 0 ⇒ αi = 0, ∀i ⇒ kerT = {0} ⇒ T is injective. Its converse partfollows from (i). �

Remark Let U be a finite dimensional vector space. Then any linear transformationT :U → V is completely determined by the action of T on a basis of U .

Like groups and rings, the homomorphism theorems are obtained for vectorspaces.

Theorem 8.5.5 (First Isomorphism Theorem) Let T :U → V be a linear transfor-mation. Then the vector spaces U/kerT and ImT are isomorphic. Conversely, if U

is a vector space and W is a subspace of U , then there is a linear transformationfrom U onto U/W .

Proof Proceed as in groups. �

Corollary 1 If a linear transformation T : U → V is onto, then the vector spacesU/kerT and V are isomorphic.

Page 309: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 295

Corollary 2 Let V be a finite dimensional vector space and T : V → V a linearoperator. Then T is injective iff T is surjective.

Proof By the First Isomorphism Theorem, V/kerT ∼= ImT = U (say). ThendimU = dimV −dim(kerT ). Clearly, T is surjective⇔ V = ImT =U ⇔ kerT ={0}⇔ T is injective. �

Definition 8.5.3 Let T : U → V be a linear transformation. Then dim(ImT ) iscalled the rank of T and dim(kerT ) is called the nullity of T .

If U is finite dimensional, then kerT and ImT are both finite dimensional andtheir dimensions satisfy the following relation.

Theorem 8.5.6 (Sylvester’s Law of Nullity) Let U be a finite dimensional vectorspace and T : U → V be a linear transformation. Then dimU = dim(kerT ) +dim(ImT ), i.e., dimU = nullity of T + rank of T .

Proof Let dimU = n and dim(kerT ) = k ≤ n. We claim that dim(ImT ) = n− k.Clearly, dim(kerT ) = k implies that there exists a basis B = {u1, u2, . . . , uk} ofkerT . We now extend the basis B to a basis BU ={u1, u2, . . . , uk,w1,w2, . . . ,wn−k}of U . Let B1 = {T (w1), . . . , T (wn−k)}. Then B1 is linearly independent and gener-ates ImT . Consequently, B1 is a basis of ImT and hence dim(ImT )= n− k. �

This theorem gives a series of corollaries.

Corollary 1 Let U be an n-dimensional vector space and T : U → V a lineartransformation. Then the following statements are equivalent:

(i) T is injective;(ii) rank of T = n;

(iii) B={u1, u2, . . . , un} is a basis of U implies T (B)={T (u1), T (u2), . . . , T (un)}is a basis of ImT i.e., dimU = rank of T .

Proof Left as an exercise. �

Corollary 2 Let V be a finite dimensional vector space and T : V → V a linearoperator. Then T is injective iff T is surjective. In particular, a linear transformationT :Rn→Rn is injective iff T is surjective.

Proof Using the First Isomorphism Theorem it follows that dim(T (V ))= dimV −dim(kerT ). Hence T is injective iff T is surjective, because V is finite dimensional.For V =Rn, the last part follows. �

Corollary 3 Let U and V be finite dimensional vector spaces and T : U → V alinear transformation. Then T is an isomorphism iff dimU = dimV .

Page 310: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

296 8 Vector Spaces

Proof Left as an exercise. �

Let U and V be two vector spaces over the same field F . We are yet to define anyalgebraic structure on the set L(U,V ) of all linear transformations from the vectorspace U to the vector space V . The map 0 :U → V,u �→ 0 ∈ V (i.e., it carries everyelement u ∈U to the zero element of V ) and the negative of a linear transformationT : U → V , denoted by (−T ) defined by (−T ) : U → V , u �→ −T (u) are lineartransformations.

Proposition 8.5.2 L(U,V ) forms a vector space under the compositions: (T +S)(u)= T (u)+ S(u) and (αT )(u)= αT (u), where u ∈U and T ,S ∈ L(U,V ).

Proof Left as an exercise. �

Proposition 8.5.3 The composite of two linear transformations is a linear trans-formation.

Proof Let U,V and W be vector spaces over F ; S : U → V and T : V →W belinear transformations. It is sufficient to prove that their composite T ◦ S : U →W

defined by (T ◦S)(x)= T (S(x)) for all x in U is also a linear transformation. Since(T ◦ S)(αx+βy)= αT (S(x))+βT (S(y)) ∀x, y ∈U , T ◦ S is a linear transforma-tion. �

We now give an alternative definition of a linear isomorphism.

Definition 8.5.4 Let U and V be vector spaces over F . A linear transformationT : U → V is said to a (linear) isomorphism iff there exists a linear transformationS : V →U such that S ◦T = IU (identity map) and T ◦S = IV . In particular, a linearoperator T : V → V is said to be non-singular or invertible iff T is an isomorphism.

We now characterize non-singular transformations.

Proposition 8.5.4 Let T : V → V be a linear operator. Then the following state-ments are equivalent:

(a) T is non-singular;(b) nullity of T = 0;(c) rank of T = dimV .

Proof Left as an exercise. �

Theorem 8.5.7 Let U and V be finite dimensional vector spaces over the samefield F . If dimU =m and dimV = n, then dim(L(U,V ))=mn.

Proof Let W be the vector space L(U,V ) over F . Suppose BU = {u1, u2, . . . , um}is a basis of U and BV = {v1, v2, . . . , vn} is a basis of V . Define a family of linear

Page 311: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 297

transformations ψij :U → V by

ψij (ui)= vj , for i = 1,2, . . . ,m; j = 1,2, . . . , n

and

ψij (uk)= 0, for k �= i.

Then ψij maps ui into vj and other u’s into 0.Clearly, {ψij } consisting of mn elements constitutes a basis of W . Consequently,

dimW =mn. �

Corollary 1 If V is a finite dimensional vector space over F of dimension n, thenL(V,V ) is also a finite dimensional vector space over F of dimension n2.

Corollary 2 If V is an n-dimensional vector space over F , then L(V,F ) is an alsoan n-dimensional vector space over F .

Let V be a vector space over F . Then linear transformations T : V → F lead tosome extremely important concepts and yield results which are not true in generalsetting.

Definition 8.5.5 For any vector space V over F , the vector space L(V,F ) is calledis dual space denoted by V d and an element of V d is called a linear functional of V

into F .

Remark A linear functional transforms a vector to a scalar. If V is an n-dimensionalvector space, then dim(V d)= n.

Example 8.5.3 (i) Let V = C([0,1]) be the vector space of all real valued con-tinuous functions in x on [0,1]. Then ψ : V → R, f (x) �→ ∫ 1

0 f (x)dx is a linearfunctional and hence ψ ∈ V d .

(ii) Let V =R[x] be the vector space (infinite dimensional) of all real polynomi-als in x. Then for a ∈R, Da : V →R, f �→ f ′(a) is a linear functional.

We now consider only finite dimensional vector spaces V , because if V is notfinite dimensional, then V d is too large to invite attention unless an additional struc-ture, such as topology is endowed.

Theorem 8.5.8 Let V be a finite dimensional vector space over F and B ={v1, v2, . . . , vn} a basis of V . Then the linear functionals f1, f2, . . . , fn defined by

fi(vj )= δij ={

1, if i = j

0, if i �= j

constitute a basis Bd of the dual space V d , called a dual basis of B .

Page 312: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

298 8 Vector Spaces

Proof Clearly, for α1f1 + α2f2 + · · · + αnfn = 0,

n∑

i=1

αifi(vi)= 0, since fi(α1v1 + α2v2 + · · · + αnvn)= αi.

Hencen∑

i=1

αiδij = 0 ⇒ αi = 0, ∀i = 1,2, . . . , n.

Consequently, Bd is linearly independent. Again

dimV = dim(V d)= n.

Hence Bd consisting of n linearly independent elements of V d constitutes a basisof V d . �

Remark δij is called Kronecker delta.

Proposition 8.5.5 If V is a finite dimensional vector space over F and v ( �=0)in V , then there exists a linear functional f ∈ V d such that f (v) �= 0.

Proof Suppose v �= 0. Then it shows that {v} is linearly independent in V . Let dimV

be n. We can construct a basis B = {v = v1, v2, . . . , vn} for V . Then for the ele-ments 1,0,0, . . . ,0 in F , there exists a unique linear transformation f : V → F

such that f (v)= 1, f (vi)= 0, i = 2,3, . . . , n. This implies that f ∈ V d such thatf (v) �= 0. �

Example 8.5.4 Let V = R3, v1 = (1,−1,3), v2 = (0,1,−1) and v3 = (0,3,−2).Then B = {v1, v2, v3} is a basis of V . Its dual basis Bd = {f1, f2, f3} given by

f1(x, y, z)= α1x + β1y + γ1z

f2(x, y, z)= α2x + β2y + γ2z

f3(x, y, z)= α3x + β3y + γ3z

⎫⎪⎪⎬

⎪⎪⎭(8.2)

is such that f1(v1)= 1, f1(v2)= 0 and f1(v3)= 0;

f2(v1)= 0, f2(v2)= 1 and f2(v3)= 0;f3(v1)= 0, f3(v2)= 0 and f3(v3)= 1.

Consequently, f1(x, y, z)= x, f2(x, y, z)= 7x− 2y− 3z and f3(x, y, z)=−2x+y + z. Hence V d = L(Bd).

We now introduce the concept of annihilators in vector spaces V which is closelyrelated to dual spaces V d .

Page 313: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 299

Definition 8.5.6 Let X be a non-empty subset of a vector space V . Then the anni-hilator A(X) of X is defined by

A(X) = {f ∈ V d : f (x)= 0 for all x ∈X},

= {f ∈ V d : f (X)= 0}.

A(X) has the following properties.

Proposition 8.5.6 Let X be any subspace of a finite dimensional vector space V

over F . Then A(X) is a subspace of V d such that dim(A(X))= dimV − dimX.

Proof Clearly, A(X) is a subspace of V d . Let dimV = n, dimX = m, m ≤ n and{u1, u2, . . . , um} be a basis of X. Then this basis can be extended to a basis B ={u1, u2, . . . , um, v1, v2, . . . , vn−m} for V . Let Bd = {f1, f2, . . . , fm,g1, g2, . . . ,

gn−m} be the dual basis for B . If C = {g1, g2, . . . , gn−m}, then C is a basis of A(X).Hence dim(A(X))= n−m= dimV − dimX. �

Corollary Let V be a finite dimensional vector space over F and U be a subspaceof V . Then the dual space Ud is isomorphic to the quotient space V d/A(U).

Proof Clearly, A(U) is a subspace of V d and dim(V d/A(U)) = dim(V d) −dim(A(U))= dimU = dimUd . Hence the corollary follows. �

An Application of Dual Spaces We now apply the results of dual spaces to obtainthe number of linearly independent solutions of a system of linear homogeneousequations over a field F :

α11x1 + α12x2 + · · · + α1nxn = 0α21x1 + α22x2 + · · · + α2nxn = 0. . .

αm1x1 + αm2x2 + · · · + αmnxn = 0

⎫⎪⎪⎬

⎪⎪⎭(A)

Let S = {αi = (αi1, αi2, . . . , αin) ∈ Fn : i = 1,2, . . . ,m} and U = L(S). Then U isa subspace of Fn.

If dimU = r ≤m, we say that the system of (A) is of rank r . Let V = Fn, B ={e1, e2, . . . , en} be the natural (standard basis) of V and Bd = {f1, f2, . . . , fn} be itsdual basis. Then any f ∈ V d can be expressed uniquely as

f = x1f1 + x2f2 + · · · + xnfn, xi ∈ F.

If f ∈A(U), then f (u)= 0 for all u ∈U and hence 0= f (α11, α12, . . . , α1n), since(α11, α12, . . . , α1n) ∈U . Consequently,

0 = f (α11e1 + α12e2 + · · · + α1nen)

= x1α11 + · · · + xnα1n, since fi(ej )= δij .

Page 314: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

300 8 Vector Spaces

Similar results hold for other equations in (A). Conversely, for every solution(x1, x2, . . . , xn) of equations in (A), there exists an element x1f1+x2f2+· · ·+xnfn

in A(U). Then the number of independent solutions of the system (A) is dim(A(U))

i.e., n− r .This proves the following theorem.

Theorem 8.5.9 If the system of equations in (A), where αij ∈ F , is of rank r , thenthe number of linearly independent solutions in Fn of the system is n− r .

Corollary If the number of unknowns exceeds the number of equations in (A), thenthere exists a non-trivial solution of the system (A).

8.5.1 Algebra over a Field

For any two vector spaces U and V over the same field F , the set L(U,V ) admits avector space structure over F (see Proposition 8.5.2). If V =U , we can introduce amultiplication on L(V,V ) making it a ring. We can combine in a natural way thesetwo twin structures of L(V,V ) to provide a very rich structure called an ‘algebra’over F .

We now give the formal definition of an algebra with an eye to L(V,V ).

Definition 8.5.7 An algebra A is a vector space over a field F , whose elements canbe multiplied in such a way that A is also a ring in which the scalar multiplicationand ring multiplication are interlined by the rule

A(1) : For all x, y ∈A and α ∈ F,α(xy)= (αx)y = x(αy).

A commutative algebra A is an algebra such that

A(2) : xy = yx holds for all x, y in A.

An identity element in an algebra A is a non-zero element 1 in A such that 1x =x1= x for every x in A.

Remark If the identity element exists in an algebra, then it is unique.We call an algebra A over F real or complex according to F =R or C.

Definition 8.5.8 A non-empty subset B of an algebra A is called a subalgebra ofA iff B is itself an algebra under the operations defined in A (i.e., B is a subspaceof A such that for all x, y in B, xy ∈ B).

Remark A subalgebra of an algebra is an algebra in its own right. One of the mostimportant examples of an algebra is L(V,V ). In general, it is a non-commutativealgebra having zero divisors.

Page 315: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.5 Linear Transformations and Associated Algebra 301

We give some other examples.

Example 8.5.5 (i) R is a commutative real algebra under usual compositions in R.(ii) The real vector space C([0,1]) is a commutative real algebra with identity.(iii) The vector space B(X,C) of all bounded complex valued functions on a

topological space X is a commutative complex algebra.(iv) Let A be an algebra over F and B = {x ∈A : xy = yx for all y ∈A}. Then

B is a subalgebra of A, called the center of A.

Definition 8.5.9 Let A be an algebra over F . An algebra ideal (or an ideal) I of Ais a non-empty subset of A such that I is a subspace of A (when A is considered asa vector space) and also a ring ideal of A (when A is considered as a ring). For anyideal I of A, A/I is an algebra, called the quotient algebra of A modulo I .

Like ring homomorphisms, homomorphisms are defined in algebra.

Definition 8.5.10 Let A and B be algebras over the same field F . A homomor-phism ψ :A→ B is a mapping such that

ψ(x + y)=ψ(x)+ψ(y);ψ(xy)=ψ(x)ψ(y);ψ(αx)= αψ(x),

for all x, y in A and α ∈ F .Moreover, if the homomorphism ψ is a bijection, then ψ is said to be an isomor-

phism and A is said to be isomorphic to B.

Remark An algebra homomorphism f is a ring homomorphism such that f pre-serves the vectors space structure.

Proposition 8.5.7 Let ψ :A→ B be a homomorphism of algebras. Then kerψ isa subalgebra of A and Imψ is a subalgebra of B.

Proof Left as an exercise. �

We now prove a theorem for an algebra which is the analog of Cayley’s Theoremfor a group.

Theorem 8.5.10 Let A be an algebra with 1, over F . Then A is isomorphic to asubalgebra of L(V,V ) for some vector space V over F .

Proof A being an algebra over F , it is a vector space over F . We take V = A toprove the theorem. For x ∈ A, we define the map Tx : A→ A by Tx(v) = xv,∀v ∈ A. Then Tx is a linear transformation on V = A and the map ψ : A→L(V,V ), x �→ Tx is well defined. Moreover, ψ is both a linear transformation of

Page 316: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

302 8 Vector Spaces

vector spaces and a homomorphism of rings. Hence ψ is a homomorphism of al-gebras and kerψ = {x ∈ A : ψ(x) = 0} = {x ∈ A : Tx = 0} = {x ∈ A : Tx(v) =0, ∀v ∈ V }. Since V = A has identity 1, Tx(1) = 0 ⇒ x = 0. This shows thatkerψ = {0} and hence ψ is a monomorphism of algebras. Consequently, A is iso-morphic to the subalgebra Imψ of L(V,V ) over F . �

Remark The algebra L(V,V ) plays a universal role to obtain isomorphic copies ofany algebra.

We now study the algebra L(V,V ), where V is restricted to finite dimensionalvector spaces over F .

Definition 8.5.11 A non-zero element T in L(V,V ) is said to be invertible iff thereis an element S in L(V,V ) such that T ◦ S = S ◦ T = I . Otherwise, T is said to besingular.

Clearly, if T is invertible, S is unique and it is denoted by T −1.

Theorem 8.5.11 Let A be an algebra over F , with 1, such that dimA= n. Thenevery element in A is a root of some non-trivial polynomial f (x) in F [x] such thatdegf ≤ n.

Proof For v ∈A, the (n+ 1) elements 1, v, v2, . . . , vn are in A. Since dimA= n,these (n+1) elements must be linearly dependent over F . Hence there exist (n+1)

elements α0, α1, . . . , αn in F (not all 0) such that α01+ α1v+ · · · + αnvn = 0. This

shows that v is a root of the non-trivial polynomial f (x)= α0 + α1x + · · · + αnxn

in F [x] such that degf ≤ n. �

Corollary Let V be an n-dimensional vector space over F . Then given a non-zeroelement T in L(V,V ), there exists a non-trivial polynomial f (x) in F [x] such thatdegf ≤ n2 and f (T )= 0.

Proof For the algebra A = L(V,V ) over F , dimA = n2. Clearly, A contains theidentity, which is the identity operator on V . The corollary follows from Theo-rem 8.5.11. �

The corollary leads to the following definition.

Definition 8.5.12 Let V be an n-dimensional vector space over F and T be a non-zero element in L(V,V ). Then there exists a non-trivial polynomial m(x) of lowestdegree with leading coefficient 1 in F [x] such that m(T )= 0. We call m(x) minimalpolynomial for T over F .

Remark If T satisfies a minimal polynomial g(x) in F [x], then this m(x) dividesg(x) in F [x]. Since g(x) is monic and g(T ) = 0, m(x) = g(x). This shows the

Page 317: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.6 Correspondence Between Linear Transformations and Matrices 303

uniqueness of a monic polynomial for T over F and we use the term the minimalpolynomial for T over F .

We now characterize invertible elements in L(V,V ).

Theorem 8.5.12 Let V be an n-dimensional vector space over F and T a non-zero element in L(V,V ). Then T is invertible iff the constant term of the minimalpolynomial for T over F is not zero.

Proof Let f (x)= α0 + α1x + · · · + αm−1xm−1 + xm ∈ F [x] be the minimal poly-

nomial for T . Then 0= f (T )= α0I + α1T + · · · + αm−1Tm−1 + T m.

If α0 �= 0, then α0I = −(T m−1 + αm−1Tm−2 + · · · + α1I )T . Hence I =

[−α−10 (T m−1 + αm−1T

m−2 + · · · + α1I )]T . If we take S = −α−10 (T m−1 +

αm−1Tm−2 + · · · + α1I ), then S ◦ T = I . Similarly, T ◦ S = I . Consequently, T

is invertible. Conversely, let T be invertible in L(V,V ). If possible, α0 = 0, then0 = (α1I + α2T + · · · + αm−1T

m−2 + T m−1)T . Multiplying by T −1, we haveα1I + α2T + · · · + αm−1T

m−2 + T m−1 = 0. Hence T satisfies the polynomialq(x) = α1 + α2x + · · · + αm−1x

m−2 + xm−1 of degree (m − 1) in F [x]. But thisis not possible as the minimal polynomial f (x) is of degree m. This leads us toconclude that α0 �= 0. �

Corollary Let V be a finite dimensional vector space over F and T ∈ L(V,V ) bean invertible element. Then its inverse T −1 is also a polynomial in T over F .

8.6 Correspondence Between Linear Transformationsand Matrices

In this section linear algebra starts to encompass the isomorphic theory of matrices.Linear transformations and matrices are closely related. In this section we es-

tablish their relations and study matrices with the help of linear transformationsand vice versa. Let T : R2 → R2 be the rotation of the plane through an an-gle θ about the origin defined by T (x, y)= (x cos θ − y sin θ, x sin θ + y cos θ) andB = {e1 = (1,0), e2 = (0,1)} be the natural basis or standard basis of R2. Then theactions of T on e1, e2 are given by

T((1,0))= (cos θ, sin θ)= cos θ(1,0)+ sin θ(0,1)

and

T((0,1))= (− sin θ, cos θ)=− sin θ(1,0)+ cos θ(0,1).

Then the 2× 2 matrix

A=(

cos θ sin θ

− sin θ cos θ

)

Page 318: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

304 8 Vector Spaces

is called the matrix of coefficients associated with T and its transpose

At =(

cos θ − sin θ

sin θ cos θ

)

is called the matrix representation of T with respect to the given basis B . We nowextend this concept to an arbitrary finite dimensional vector space.

Remark We also use the notation of the same matrix A as

A=[

cos θ sin θ

− sin θ cos θ

].

Definition 8.6.1 Let V and W be finite dimensional vector spaces over F

and T : V → W a linear transformation. Let B1 = {v1, v2, . . . , vm} and B2 ={w1,w2, . . . ,wn} be their respective ordered bases. For each i, 1 ≤ i ≤ m, T (vi)

in W can be expressed uniquely as T (vi) =∑nj=1 aijwj , aij ∈ F . The matrix

A = (aij ) is called the matrix of coefficients associated with T and its transposeAt is called the matrix representation of T with respect to given bases B1 and B2.

The matrix At is denoted by m(T )B2B1

or simply by m(T ). In particular, for V =W

and T = I (identity), the matrix m(I)B2B1

is called the transition matrix from B1

to B2. Again if V =W and B1 = B2 = B , then m(T )B2B1

is simply written by m(T )B .

Remark Some authors call A the matrix representation of T . The matrix m(T ) de-pends not only on T but also depends on the ordered bases B1 and B2.

Definition 8.6.2 Let σ : {1,2, . . . , n}→ {1,2, . . . , n} be a permutation and {ei} bethe natural basis B of Rn. Let fσ :Rn→Rn defined by fσ (ei)= eσ(i) be extendedlinearly over Rn. The matrix m(fσ )B is called the permutation matrix correspondingto σ .

Example 8.6.1 (i) If I :Rn→Rn is the identity transformation and B = {ei} is thenatural basis of Rn, then m(I)B = I (identity matrix).

(ii) Let V = V3[x] be the vector space of polynomials in x over R, of degreeless than 3 and D : V → V , f �→ f ′ be the differential operator. For the basis B ={1, x, x2},

m(D)B =⎛

⎝0 1 00 0 20 0 0

⎠ .

(iii) Let T : R2 → R2 be the linear transformation defined by T (x, y) = (2x +y, x − y). If B = {(1,0), (0,1)} and C = {(1,1), (1,−1)}, then

m(T )B =(

2 11 −1

)and m(T )C =

(32

32

32 − 1

2

).

Page 319: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.6 Correspondence Between Linear Transformations and Matrices 305

(iv) The permutation matrix corresponding to

σ =(

1 2 33 1 2

)is

⎝0 1 00 0 11 0 0

⎠ .

This is so because by Definition 8.6.2, fσ (e1)= eσ(1) = e3 = 0 · e1 + 0 · e2 + 1 · e3.Similarly, fσ (e2)= eσ(2) = e1 = 1 · e1+0 · e2+0 · e3 and fσ (e3)= eσ(3) = e2 =

0 · e1 + 1 · e2 + 0 · e3.

Given an m × n matrix M over a field F , we can find a linear transformationT : Fn→ Fm such that m(T )=M .

Example 8.6.2 Suppose

M =⎛

⎝1 2−1 40 5

⎠ .

Then the column vectors u= (1,−1,0) and v = (2,4,5) define a linear transforma-tion T :R2 →R3 by

T (x, y) = xu+ yv = x(1,−1,0)+ y(2,4,5)

= (x + 2y,−x + 4y,5y) for all (x, y) in R2.

If B is the natural basis of R2, then T (e1) = T ((1,0)) = (1,−1,0) and T (e2) =T ((0,1))= (2,4,5). Hence m(T )B =M .

The following proposition is a generalization of Example 8.6.2.

Proposition 8.6.1 Given an m × n matrix M over R, the map TM : Rn →Rm, X �→MX, is a linear transformation where X is viewed as a column vectorof Rn.

Conversely, if B = {E1,E2, . . . ,En} is a set of unit column vectors of Rn, givena linear transformer T : Rn → Rm such that T (Ej )=Mj , where Mj is a columnvector in Rm, then M is the matrix where column vectors are M1,M2, . . . ,Mn.

Proof Clearly, TM is a linear transformation. Conversely, we suppose

T (Ej )=

⎜⎜⎜⎝

a1j

a2j

...

amj

⎟⎟⎟⎠=Mj.

Page 320: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

306 8 Vector Spaces

Then we can write every X in Rn as

X = x1E1 + · · · + xnEn =

⎜⎜⎜⎝

x1x2...

xn

⎟⎟⎟⎠ .

Hence T (X)= x1M1 + x2M2 + · · · + xnMn =MX, where M is the matrix wherecolumn vectors are M1,M2, . . . ,Mn. Consequently, T (X) =MX = TM(X) ∀X ∈Rn⇒ T = TM . �

Proposition 8.6.2 Let V and W be finite dimensional vector spaces over F . Sup-pose dimV = n and dimW =m. If B1 = {e1, e2, . . . , en} and B2 = {f1, f2, . . . , fm}are ordered bases of V and W respectively, then the mapping ψ : L(V,W) →Mmn(F ), T �→m(T ) is a bijection and also an isomorphism of vector spaces.

Proof Let M ∈ Mmn(F ). Then there exists a matrix A = (aij )n×m such thatM = At . Suppose yi = ∑m

j=1 aij fj , 1 ≤ i ≤ n. Then yi ∈ W and there existsa unique linear transformation T : V → W such that T (ei) = yi =∑m

j=1 aij fj .Hence m(T ) = At = M . This shows ψ is onto. Let T ,S be in L(V,W) suchthat m(T ) = m(S) = At , where A = (aij ). If

∑mj=1 aijfj = yi , 1 ≤ i ≤ n, then

T (ei) = ∑mj=1 aijfj = yi = S(ei) for all i = 1,2, . . . , n. Hence it follows that

S = T . This shows that ψ is injective. Consequently, ψ is a bijection which is clearlyan isomorphism of vector spaces. �

Corollary 1 Let U,V,W be finite dimensional vector spaces over F . Given or-dered bases B1,B2 and B3 of U,V , and W respectively and linear transformationsT1 :U → V , T2 : V →W , m(T2 ◦ T1)=m(T2) ·m(T1).

Corollary 2 Let V be a finite dimensional vector space and B be a fixed orderedbasis of V . A non-zero linear operator T : V → V is non-singular (i.e., invertible)iff its corresponding matrix m(T ) is non-singular.

Given two bases B1 and B2 of a finite dimensional vector space V and a lin-ear operator T : V → V , the corresponding twin matrices m(T )B1 and m(T )B2 areclosely related. This introduces the concept of similar matrices.

Definition 8.6.3 Let A,B be two matrices in Mnn(F ). Then A is said to be similarto B , denoted by A ≈ B iff there exists a non-singular matrix P in Mnn(F ) suchthat B = PAP−1.

Remark Similarity relation on the set Mnn(F ) is an equivalence relation. We nowcharacterize similar matrices with the help of linear operators.

Theorem 8.6.1 Two n× n matrices over a field are similar iff they represent thesame linear operator (each relative to a single basis).

Page 321: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.6 Correspondence Between Linear Transformations and Matrices 307

Proof Let V be an n-dimensional vector space over a field F and B1,B2 be twobases of V . Suppose A and B are two n × n matrices represented by the samelinear transformation T : V → V with respect to bases B1 and B2, respectively.We claim that A ≈ B . Let B1 = {v1, v2, . . . , vn} and B2 = {u1, u2, . . . , un} be twobases of V . If T (vi) =∑n

j=1 ajivj and T (ui) =∑nj=1 bjiuj , where aji, bji ∈ F

and 1 ≤ i, j ≤ n, then A = (aij ) and B = (bij ). Again since B1 and B2 are bothbases of V , we can represent ui as ui =∑n

j=1 cjivj and vi as vi =∑nj=1 djiuj ,

1≤ i ≤ n. If C = (cij ) and D = (dij ), then

vi =n∑

j=1

dji

(n∑

k=1

ckj vk

)=

n∑

k=1

(n∑

j=1

ckj dji

)vk ⇒

n∑

j=1

ckj dji = 1, if i = k

= 0, if i �= k.

This shows that CD = I . Similarly, DC = I . Hence C is a non-singular matrix withits inverse D, i.e., C−1 =D. Clearly, BC = CA and hence B = CAC−1 ⇒A≈ B .

Conversely, let A and B be two n× n similar matrices over F and T : V → V

be a linear operator of a finite-dimensional vector space V such that A = m(T )B1

for some ordered basis B1 = {v1, v2, . . . , vn} of V . We now show that there existsan ordered basis B2 of V such that B = m(T )B2 . As B is similar to A, there ex-ists a non-singular matrix P such that B = PAP−1. If A = (aij ), then T (vi) =∑n

j=1 ajivj , 1 ≤ i ≤ n. Let B = (bij ) and P = (pij ). We define a linear trans-formation S : V → V , vi �→∑n

j=1 pjivj , 1 ≤ i ≤ n. Then P = m(S)B1 . As P isnon-singular, the set B2 = {S(v1), S(v2), . . . , S(vn)} is linearly independent. Hencefor di ∈ F , the relation

∑ni=1 diS(vi) = 0⇒ S(

∑ni=1 divi) = 0⇒∑n

i=1 divi = 0,since S is injective. This shows that each di = 0. Hence B2 also forms a basis of V .Let m(T )B2 =M . Then by the first part, M = PAP−1 = B . �

Remark The matrix P is not unique (see Example 8.6.3).

We now define another relation on Mnn(F ).

Definition 8.6.4 Let A,B be in Mnn(F ). Then A is said to be equivalent to B ,denoted A∼ B iff there exist non-singular matrices P,Q in Mnn(F ) such that B =PAQ.

Remark Similar matrices are equivalent but its converse is not true (see Exam-ple 8.6.3).

Example 8.6.3 (a) Let T : R2 → R2 be defined by T (x, y) = (x − y, y − x) and

B1 = {(1,0), (0,1)} and B2 = {(1,2), (−1,1)}. Then m(T )B1 = A = ( 1 −1−1 1

)and

m(T )B2 = B = ( 0 01 2

)imply that A≈ B . If P = ( 1 1

−2 1

)and Q= ( 1 1

2 −3

), then B =

PAP−1 =QAQ−1 implies that P is not unique.

(b) The matrices A= ( 1 00 0

)and B = ( 0 1

0 0

)are equivalent matrices but not similar.

Page 322: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

308 8 Vector Spaces

Remark An important application of equivalent matrices is in their Smith normalform (see Ex. 21 of Exercises-II).

We now establish a natural correspondence between linear transformations andmatrices which assigns to the sum and composite of two linear transformations thesum and product of two matrices, respectively.

Theorem 8.6.2 Let V be an n-dimensional vector space over F . Then the twoalgebras LF (V,V ) of all linear operators on V over F and Mnn(F ) of all n× n

matrices over F are isomorphic.

Proof Let B = {v1, v2, . . . , vn} be a basis of V over F and T ∈ LF (V,V ). If m(T )

is the matrix representation of T with respect to the basis B , then the mappingψ : LF (V,V )→Mnn(F ), T �→m(T ) is an isomorphism of algebras. �

Corollary 1 A non-zero element in LF (V,V ) is invertible iff m(T ) has an inversein Mnn(F ) i.e., iff m(T ) is non-singular.

Corollary 2 The group Ln(F ) of all non-singular linear operators (i.e., the groupof all invertible elements) in LF (V,V ) is isomorphic to the group GL(n,F ) of allnon-singular matrices in Mnn(F ).

Definition 8.6.5 The group Ln(F ) is called a full linear group and the groupGL(n,F ) is called a general linear group.

Similar matrices are closely related to their ranks and determinants.

Definition 8.6.6 Let A be an m× n matrix over F and V =R(A) be the subspaceof Fn generated by the row vectors of A. The dimension of V is called the row rankof A. If U = C(A) is the subspace of Fm generated by the column vectors of A,then dimU is called the column rank of A.

Proposition 8.6.3 Let A be an m× n matrix over F . Then

(i) row rank of A≤min{m,n};(ii) column rank of A≤min{m,n};

(iii) row rank of A= column rank of A.

Proof (i) Let B = {R1,R2, . . . ,Rm} be the set of all m rows of A. Then B generatesthe row space R(A) of A. Hence dim(R(A))≤m. Again R(A) is a subspace of Fn.Hence dim(R(A))≤ n. This proves (i).

(ii) Similar to (i).(iii) Let row rank of A = r and the following r row vectors of A form a basis

of R(A):

B1 = (b11, b12, . . . , b1n),

Page 323: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.6 Correspondence Between Linear Transformations and Matrices 309

B2 = (b21, b22, . . . , b2n),

. . .

Br = (br1, br2, . . . , brn).

Then each row vector of A can be expressed uniquely as

R1 = c11B1 + c12B2 + · · · + c1rBr ,

R2 = c21B1 + c22B2 + · · · + c2rBr ,

. . .

Rm = cm1B1 + cm2B2 + · · · + cmrBr, where cij ∈ F.

Equating the j th components from the above relations, we get

a1j = c11b1j + c12b2j + · · · + c1rbrj ,

a2j = c21b1j + c22b2j + · · · + c2rbrj ,

. . .

amj = cm1b1j + cm2b2j + · · · + cmrbrj .

The above relations show that⎛

⎜⎜⎜⎝

a1j

a2j

...

amj

⎟⎟⎟⎠= b1j

⎜⎜⎜⎝

c11c21...

cm1

⎟⎟⎟⎠+ b2j

⎜⎜⎜⎝

c12c22...

cm2

⎟⎟⎟⎠+ · · · + brj

⎜⎜⎜⎝

c1r

c2r

...

cmr

⎟⎟⎟⎠ .

Thus the column space of the matrix A has dimension at most r i.e., column rankof A ≤ r = row rank of A. Similarly, row rank of A ≤ column rank of A. Thisproves (iii). �

Definition 8.6.7 Let A be an m× n matrix over F . Then row rank of A= columnrank of A= r . This common value is called the rank of A, denoted by rankA.

Proposition 8.6.4 Let A and B be two similar matrices of order n over F . Then

(i) rankA= rankB;(ii) detA= detB .

Proof A≈ B shows that there exists a non-singular matrix P in Mnn(F ) such thatB = PAP−1. Then

(i) rankB = rank(PAP−1)= rankA and(ii) detB = det(PAP−1)= detA. �

Page 324: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

310 8 Vector Spaces

8.7 Eigenvalues and Eigenvectors

The algebra of matrices can be applied smoothly to diagonal matrices. The reasonis that for the addition and multiplication of any two diagonal matrices, one simplyadds (or multiplies) the corresponding diagonal entries. So it has become importantto know which matrices are similar to diagonal matrices and which pairs of diago-nal matrices are similar to each other. To obtain the answer to these questions, theconcepts of eigenvalue and eigenvector are introduced.

Let V be an n-dimensional vector space over F and T : V → V a linear operator.If B1 is a basis of V and m(T )B1 = A, then by Theorem 8.6.1, A is similar to adiagonal matrix iff there exists a basis B2 = {v1, v2, . . . , vn} of V such that m(T )B2

is a diagonal matrix, i.e., iff T (vi)= λivi for some λi ∈ F, i = 1,2, . . . , n. Henceany non-zero vector v ∈ V for which T (v)= λv for some λ ∈ F plays an importantrole in our study and leads to the following concepts.

Definition 8.7.1 Let V be an n-dimensional vector space over F and T : V → V

a linear operator. An element λ in F is called an eigenvalue of T (or characteristicroot of T ) iff there exists a non-zero vector v ∈ V such that T (v)= λv. This vectorv (if it exists) is called an eigenvector of T corresponding to the eigenvalue λ. For asquare matrix we have an analogue of this definition.

Definition 8.7.2 Let A be a square matrix of order n over F . An element λ in F

is called an eigenvalue of A iff there exists a non-zero vector X = (x1, x2, . . . , xn)

in Fn such that AX = λX (or XA = λX). The vector X (if it exists) is called aneigenvector of A corresponding to the eigenvalue λ.

Remark 1 If A is an n× n matrix over R, then AX = λX shows that AX dilates(lengthens) X if |λ|> 1 and contracts (shortens) X if |λ|< 1, in Rn.

Remark 2 Let T : Rn → Rn be a linear operator and m(T )B = A, where B is thenatural basis of Rn. Then for X = (x1, x2, . . . , xn) ∈ Rn, T (X)= XA. This showsthat λ is an eigenvalue of A iff λ is an eigenvalue of T and X is the correspondingeigenvector of both T and A.

Remark 3 If v is an eigenvector of T corresponding to an eigenvalue λ ∈ F , thenfor any non-zero scalar α in F, αv is also an eigenvector of T corresponding to thesame eigenvalue λ. Hence there exist many eigenvectors of T (or A) correspondingto an eigenvalue.

The eigenvectors have many interesting properties.

Proposition 8.7.1 Let A be an n × n matrix over F and E(λ) be the set of alleigenvectors of A corresponding to an eigenvalue λ, together with the zero vector.Then E(λ) forms a subspace of the vector space Fn over F .

Page 325: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.7 Eigenvalues and Eigenvectors 311

Proof Clearly, E(λ) = {X ∈ Fn : AX = λX} �= ∅. Then for X,Y ∈ E(λ) andα,β ∈ F , A(αX + βY) = λ(αX + βY) ∈ E(λ) ⇒ E(λ) is a subspace of Fn

over F . �

Definition 8.7.3 The vector space E(λ) is called the eigenspace of A correspond-ing to the eigenvalue λ. For a linear operator T : V → V and an eigenvalue λ,E(λ)= {v ∈ V : T (v)= λv} is a subspace of V , called the null space of T −λI andthe number of linearly independent eigenvectors in E(λ) is called the dimensionof E(λ).

Remark If λ1 and λ2 are two distinct eigenvalues of T , then E(λ1) ∩E(λ2)= {0}i.e., zero vector is the only vector common in the corresponding eigenspaces.

Theorem 8.7.1 Let A be an n×n matrix over F and λ ∈ F . Then λ is an eigenvalueof A iff the matrix (A− λI) is singular.

Proof Let B = A− λI . Then λ is an eigenvalue of A⇔ AX = λX for some non-zero X ∈ Fn ⇔ (A− λI)X = 0 ⇔ the homogeneous system of equations BX = 0has a non-trivial solution ⇔ the solution space of the system BX = 0 is non-zeroand hence has dimension >0. If rankB = r , then n− r > 0⇒ n > r . This situationoccurs iff B is singular. �

Corollary λ is an eigenvalue of A iff det(A− λI)= 0.

Proof λ is an eigenvalue of A ⇔ the matrix (A − λI) is singular ⇔ det(A −λI)= 0. �

We now consider the polynomial det(A− xI) in x of degree n over F .

Definition 8.7.4 Let A be an n× n matrix over F . Then the matrix (A − xI) iscalled the characteristic matrix of A and det(A − xI) is called the characteristicpolynomial of A denoted by κA(x). The equation κA(x)= 0 is called the character-istic equation of A.

Remark The eigenvalues of A are the roots of its characteristics polynomial.

Example 8.7.1 For the matrix A= ( 1 12 4

)

(i) the characteristic matrix is A− xI = ( 1−x 12 4−x

);

(ii) the characteristic polynomial is κA(x)= x2 − 5x + 2;(iii) the characteristic equation is x2 − 5x + 2= 0.

Proposition 8.7.2 Similar matrices have the same eigenvalues.

Page 326: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

312 8 Vector Spaces

Proof Suppose A ≈ B . Then there exists a non-singular matrix C such that B =CAC−1 ⇒ B−xI = CAC−1−xCIC−1 = C(A−xI)C−1 ⇒A−xI ≈ B−xI ⇒det(A− xI)= det(B − xI)⇒A and B have the same eigenvalues. �

Remark A matrix over R may not have an eigenvalue but a matrix over C has alwaysan eigenvalue. This is so because a polynomial over R may not have a root in Rbut a polynomial over C has always a root in C [see the Fundamental Theorem ofAlgebra, Chap. 11 of the book or Theorem 11, Herstein (1964, p. 337)].

Proposition 8.7.3 Let V be an n-dimensional vector space over a field F andT : V → V be a linear operator. Then the eigenvalues of T are the eigenvalues ofany one of its matrix representation (relative to a single basis B).

Proof Let m(T )B = A, where B is the natural basis of Fn. Then for X =(x1, x2, . . . , xn) ∈ Fn, T (X) = XA. Hence it follows that λ is an eigenvector ofA⇔ λ is an eigenvalue of T . The proof is completed by using Proposition 8.7.2. �

Example 8.7.2 (i) Let T :R2 →R2, (x, y) �→ (x,−y). Then T is a reflection aboutthe x-axis and every multiple of e1 = (1,0) is mapped onto itself by T . HenceT (X) = 1 ·X for every X = αe1, α ∈ R implies that λ = 1 is an eigenvalue of T

and the corresponding eigenspace E(1) is the x-axis. Similarly, for every multipleY = βe2 of e2 = (0,1), β ∈R, T (Y )=−1 ·Y implies that−1 is another eigenvalueof T and the corresponding eigenspace E(−1) is the y-axis. Thus geometrically itfollows that 1 and −1 are the only eigenvalues of T .

(ii) Let T :R2 →R2 be the rotation of the plane through an angle θ, 0 < θ < π .Then T has no eigenvalue. This is so because λX (λ ∈ R) is a scalar multiple ofX and no vector X except (0,0) is mapped into a scalar multiple of itself. HenceT (X) �= λX unless X = (0,0) shows that there is no eigenvalue of T and thus thereis no eigenvector of T .

(iii) Let V =D[x] be the vector space of real valued functions on R with deriva-tives of all orders. If λ (�=0) ∈ R, f (x) = eλx and D : V → V is the differentialoperator, then D(f (x)) = λeλx ⇒ D(f ) = λf ⇒ λ is an eigenvalue of D. Sincethe solutions of the differential equation y′ = λy are of the form y = αeλx , α ∈ R,the eigenspace E(λ) is 1-dimensional with basis {f }.

(iv) Let

A=⎛

⎝5 0 00 2 20 7 1

⎠ and X = (1 0 0).

Then XA= 5X⇒ 5 is an eigenvalue of A and X is the corresponding eigenvector.

We now prove some other interesting properties of eigenvalues and eigenvectors.

Proposition 8.7.4 If A is a non-singular matrix of order n over F and λ �= 0 is aneigenvalue of A, then λ−1 is an eigenvalue of A−1.

Page 327: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.7 Eigenvalues and Eigenvectors 313

Proof A is non-singular (by hypothesis)⇒ detA �= 0. Then

det(A−1 − λ−1I

) = λ−n det(λA−1 − I

)= λ−n · detA · det(λA−1 − I )

detA

= λ−n det(A(λA−1 − I ))

detA= λ−n det(λI −A)

detA= 0,

since λ is an eigenvalue of A. This implies that λ−1 is an eigenvalue of A−1. �

Proposition 8.7.5 (Uniqueness of eigenvalue) Given an eigenvector of a squarematrix A, the corresponding eigenvalue of A is unique.

Proof Let X be an eigenvector of A and λ1, λ2 be its corresponding eigenvalues.Then AX = λ1X = λ2X⇒ (λ1 − λ2)X = 0⇒ λ1 = λ2, since X �= 0. �

Theorem 8.7.2 Let A be an n × n matrix over F and λ1, λ2, . . . , λr be distincteigenvalues of A in F , with corresponding eigenvectors X1,X2, . . . ,Xr , respec-tively. Then the set S = {X1,X2, . . . ,Xr} is linearly independent.

Proof Let V = Fn. Then Xi ∈ Fn and AXi = λiXi for i = 1,2, . . . , r . We provethe theorem by induction on r . If r = 1, then X1 �= {0} and hence it is linearlyindependent. We assume that the statement is true for m < r .

Then

α1X1 + α2X2 + · · · + αmXm + αm+1Xm+1 = 0

⇒ A(α1X1 + α2X2 + · · · + αmXm + αm+1Xm+1)= 0

⇒ α1λ1X1 + α2λ2X2 + · · · + αmλmXm + αm+1λm+1Xm+1 = 0

⇒ α1(λ1 − λm+1)X1 + α2(λ2 − λm+1)X2 + · · · + αm(λm − λm+1)Xm = 0

⇒ αm+1 = 0 by induction hypothesis, since Xm+1 �= 0.

Consequently, the set S is linearly independent. �

Corollary An n× n matrix over F has at most n distinct eigenvalues.

Proof Since dimFn over F is n, the corollary follows from Theorem 8.7.2. �

Theorem 8.7.3 Let V be an n-dimensional vector space over F and T : V → V

be a linear operator with r distinct eigenvalues λ1, λ2, . . . , λr and X1,X2, . . . ,Xr

the corresponding eigen vectors. Then the set S = {X1,X2, . . . ,Xr} is linearly in-dependent.

Proof Similar to Theorem 8.7.2. �

Proposition 8.7.6 Let A be an n×n matrix over F . If A has n distinct eigenvalues,then A is similar to an n× n diagonal matrix.

Page 328: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

314 8 Vector Spaces

Proof Let T : Fn → Fn be the linear operator such that m(T )B = A, where B isthe natural basis of Fn and λ1, λ2, . . . , λn be n distinct eigenvalues of A with thecorresponding eigenvectors X1,X2, . . . ,Xn. Then the set S = {X1,X2, . . . ,Xn} islinearly independent and hence S forms a basis of Fn.

Consequently,

T (X1)= λ1X1 = λ1X1 + 0 ·X2 + · · · + 0 ·Xn

T (X2)= λ2X2 = 0 ·X1 + λ2X2 + · · · + 0 ·Xn

. . .

T (Xn)= λnXn = 0 ·X1 + 0 ·X2 + · · · + λn ·Xn.

Hence

m(T )S =D =

⎜⎜⎜⎝

λ1 0 · · · 00 λ2 · · · 0

. . .

0 0 · · · λn

⎟⎟⎟⎠ ⇒ A≈D

by Theorem 8.6.1. �

Remark Converse of Proposition 8.7.6 is not true. The matrix

A=⎛

⎝2 0 00 2 00 0 3

has only two distinct eigenvalues 2 and 3 but A is similar to itself, which is a diag-onal matrix.

We recall that an n× n matrix A over C can be expressed as A=X+ iY , whereX and Y are matrices over R. Then the matrix A=X − iY is called the conjugatematrix of A and the elements of A are the conjugates of the corresponding elementsof A. We use the symbol A∗ to denote the conjugate transpose At of A.

An n × n matrix A over C is said to be Hermitian, skew-Hermitian or unitaryaccording to A∗ =A or A∗ = −A or AA∗ =A∗A= I .

Proposition 8.7.7 The eigenvalues of a Hermitian matrix are all real.

Proof Let A be an n× n Hermitian matrix and X be an eigenvector correspondingto an eigenvalue λ of A.

Then AX = λX ⇒ AX = λX ⇒ (AX)t = (λX)t ⇒ XtAt = λX

t ⇒ XtA =

λXt ⇒ X

tAX = λX

tX ⇒ X

tλX = λX

tX ⇒ X

tX(λ − λ) = 0 ⇒ λ = λ, since

X �= 0⇒ λ is real. �

Corollary The eigenvalues of a real symmetric matrix are all real.

Page 329: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.7 Eigenvalues and Eigenvectors 315

Proposition 8.7.8 The eigenvalues of a skew-Hermitian matrix are 0 or purelyimaginary.

Proof Proceeding as in Proposition 8.7.7, we have λ+ λ= 0. This shows that λ is0 or purely imaginary. �

Corollary The eigenvalues of a real skew-symmetric matrix A are 0 or purely imag-inary (0 is the only possible real eigenvalue of A).

Proposition 8.7.9 Each eigenvalue of a unitary matrix has unit modulus.

Proof Proceeding as in Proposition 8.7.7 we have XtX = λλ(X

tX) and hence

λλ= 1, since XtX �= 0. This implies that |λ| = 1. �

Corollary Each eigenvalue of a real orthogonal matrix A has unit modulus (1 and−1 are the only possible real eigenvalues of A).

We now introduce the concepts of algebraic multiplicity and geometric multi-plicity of an eigenvalue. These concepts are important for our further study.

Definition 8.7.5 Let A be an n × n matrix over F . The algebraic multiplicity ofan eigenvalue λ of A is the multiplicity of λ as a root of the characteristic equationκA(x)= 0. The geometric multiplicity of λ is the dimension of the eigenspace E(λ).

Definition 8.7.6 An n× n matrix A over F is said to be diagonalizable over F iffA is similar to a diagonal matrix D over F .

Definition 8.7.7 A linear operator T : V → V on a finite-dimensional vector spaceover F is said to be diagonalizable over F iff there exists a basis B of V such thatthe matrix m(T )B is diagonalizable.

Remark 1 An n× n matrix A over C is diagonalizable over C iff for each eigen-value λ of A, the geometric and algebraic multiplicities of λ are the same.

Remark 2 An n×n matrix A over R is diagonalizable over R iff all the eigenvaluesof A are real and for each eigenvalue of A, the geometric and algebraic multiplicitiesare the same.

Remark 3 An n × n matrix A over F is diagonalizable iff there exists an n × n

non-singular matrix P over F such that D = PAP−1 is a diagonal matrix.

Example 8.7.3 (i) The matrix

A=⎛

⎝2 0 00 0 −10 1 0

Page 330: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

316 8 Vector Spaces

is diagonalizable over C but not over R. This is so because A has three distincteigenvalues in C but its eigenvalue 2 is only in R.

(ii) The linear operator T : R2 → R2, (a, b) �→ (b, a) has its matrix represen-tation m(T )B with respect to the natural basis B = {(1,0), (0,1)} of R2 given byA=m(T )B =

( 0 11 0

). As 1 and −1 are two distinct eigenvalues of A, A is diagonal-

izable of R and hence T is diagonizable.(iii) Let V be a vector space over F and T : V → V a linear operator with

an eigenvalue λ. Then for any polynomial f (x) in F [x], f (λ) is an eigenvalueof f (T ).

To show this, let v ( �=0) be an eigenvector of T corresponding to the eigen-value λ. Then T (v) = λv⇒ T (T (v)) = T (λv)⇒ T 2(v) = λ2v⇒ λ2 is an eigen-value of T 2. In general, T n(v)= λnv for every positive integer n.

Let

f (x)= a0 + a1x + · · · + anxn ∈ F [x].

Then

f (T )= a0I + a1T + · · · + anTn

⇒ f (T )(v)= (a0 + a1λ+ · · · + anλn)v = f (λ)v.

Hence

f (T )(v)= f (λ)v ⇒ f (λ)

is an eigenvalue of f (T ). For simplicity, sometimes we write f (T )v in place off (T )(v), unless there is any confusion.

We now apply the concepts of eigenvalues and eigenvectors to find conditionsfor diagonalization of a given square matrix.

Theorem 8.7.4 Let V be an n-dimensional vector space over F and T : V → V bea linear operator. Then T is represented by a diagonal matrix with respect to somebasis iff V has a basis consisting of eigenvectors of T .

Proof Let T be represented by a diagonal matrix

D =

⎜⎜⎜⎝

d1 0 · · · 00 d2 · · · 0

. . .

0 0 · · · dn

⎟⎟⎟⎠

with respect to a basis B = {v1, v2, . . . , vn} of V .Then T (v1) = d1v1, T (v2) = d2v2, . . . , T (vn) = dnvn. Consequently, vi is an

eigenvector of T corresponding to the eigenvalue di , i = 1,2, . . . , n. Thus the basisB consists of eigenvectors of T .

Page 331: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.8 The Cayley–Hamilton Theorem 317

Conversely, if the eigenvectors v1, v2, . . . , vn of T form a basis B = {v1, v2, . . . ,

vn} of V , then m(T )B is a diagonal matrix D of the above form, because T (vi)=divi, di ∈ F, i = 1,2, . . . , n. �

We now establish the following equivalent conditions for diagonalization of asquare matrix over F .

Theorem 8.7.5 Let V be an n-dimensional vector space over F and T : V → V

be a linear operator with m(T )B = A with respect to some basis B of V . Then thefollowing statements are equivalent:

(i) A can be diagonalized;(ii) A is similar to a diagonal matrix;

(iii) Fn has a basis consisting of eigenvectors of A;(iv) V has a basis consisting of eigenvectors of T .

Proof (i)⇒ (ii) It follows from Definition 8.7.6.(ii) ⇒ (iii) If A is similar to a diagonal matrix, then there exists a non-singular

matrix P such that D = PAP−1 is a diagonal matrix. If Vj is the j th column ofP−1, then the j th column of AP−1 is AVj . Looking at the j th column of eachside of P−1D =AP−1, we have AVj = djVj , for some dj ∈ F . Since P−1 is non-singular, each Vj is non-zero and hence each Vj is an eigenvector of A. As {Vj } islinearly independent, {Vj } constitutes a basis of Fn.

(iii) ⇒ (iv) Let m(T )B = A for some basis of V . We assume that Fn has abasis consisting of eigenvectors of A and v1, v2, . . . , vn are the elements of V

whose coordinate vectors relative to B are the above eigenvectors of A. ThenB1 = {v1, v2, . . . , vn} is a basis of V and each vj is an eigenvector of T .

(iv) ⇒ (i) Let B = {v1, v2, . . . , vn} be a basis of V consisting of eigenvectorsof T . Then T (vj )= djvj , dj ∈ F, j = 1,2, . . . , n. Consequently, T has a diagonalrepresentation and hence A is diagonalizable. �

8.8 The Cayley–Hamilton Theorem

Cayley–Hamilton Theorem is a famous theorem in linear algebra and gives a re-lation between a square matrix and its characteristic equation. More precisely, thistheorem proves that every square matrix A satisfies its characteristic equation andthe minimal polynomial of A divides its characteristic polynomial. This theorem isused to evaluate large powers of the matrix A.

Let A be a square matrix over F and f (x)= a0 + a1x + · · · + anxn be a poly-

nomial in F [x]. We use the symbol a0I + a1A+ · · · + anAn to represent the ma-

trix f (A). The following theorem is important in the study of matrices.

Theorem 8.8.1 (Cayley–Hamilton Theorem) Every square matrix satisfies its owncharacteristic equation.

Page 332: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

318 8 Vector Spaces

Proof Let A be an n× n matrix over F and κA(x) be its characteristic polynomialin F [x]. We claim that κA(A) = 0. Let κA(x) = det(A − xI) = c0x

n + c1xn−1 +

· · · + cn and B(x) = B0xn−1 + B1x

n−2 + · · · + Bn−1, be the adjoint of the matrix(A− xI), where Bi is a matrix over F . Then

(A− xI)B(x)= det(A− xI)I

⇒ (A−xI)(B0x

n−1+B1xn−2 + · · · +Bn−1

)= (c0xn+ c1x

n−1 + · · · + cn

)I.

Hence

A(B0x

n−1 +B1xn−2 + · · · +Bn−1

)− (B0xn +B1x

n−1 + · · · +Bn−1x)

= c0Ixn + c1Ixn−1 + · · · + cnI.

Equating the coefficients of like powers of x, we have

−B0 = c0I

AB0 −B1 = c1I

AB1 −B2 = c2I

. . .

ABn−2 −Bn−1 = cn−1I

ABn−1 = cnI.

Multiplying the above equations by An,An−1, . . . ,A, I , respectively, and thenadding we have

c0An + c1A

n−1 + · · · + cn−1A+ cnI = 0.

This shows that κA(A)= 0. �

Remark The definition of a minimal polynomial of a matrix is similar to that of alinear transformation (see Definition 8.5.12).

Definition 8.8.1 Let A be an n×n non-zero matrix over F . A polynomial m(x) inF [x] of least degree with leading coefficient 1 is said to be a minimal polynomialof A iff m(A)= 0.

Proposition 8.8.1 Let A be a square matrix over F with m(x) its minimal polyno-mial. Then A is a root of a polynomial f (x) in F [x] iff f (x) is divisible by m(x)

in F [x].

Proof As F is a field, F [x] is a Euclidean domain. Hence ∃q(x) and r(x) in F [x]such that f (x) = m(x)q(x)+ r(x), where r(x) = 0 or deg r < degm (by divisionalgorithm). If f (A)= 0, the r(A)= 0, since m(A)= 0. If r(x) �= 0, then r(x) is apolynomial of degree less than the degree of m(x), which has A as a root. Then wereach a contradiction as m(x) is a minimal polynomial of A. Thus r(x)= 0 shows

Page 333: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.8 The Cayley–Hamilton Theorem 319

that f (x) is divisible by m(x). On the other hand if f (x) is divisible by m(x) inF [x], then r(x)= 0. Hence r(A)= 0⇒ f (A)= 0⇒A is a root of f (x). �

Remark A minimal polynomial m(x) of A over F may not be irreducible in F [x].For example, the matrix A= ( 2 1

0 1

)over R has its minimal polynomial m(x)= x2−

3x + 2, but it is not irreducible in R[x].

Corollary 1 Let A be a square matrix over F . Then its characteristic polynomialis divisible by its minimal polynomial.

Proof A is a root of its characteristic polynomial κA(x) by Cayley–Hamilton The-orem. Then the corollary follows by Proposition 8.8.1. �

Corollary 2 The minimal polynomial of a square matrix over F is unique.

Proof Let A be a square matrix over F and m1(x), m2(x) be its minimal poly-nomials. Then A is a root of m1(x) and by Proposition 8.8.1, m1(x)= g(x)m2(x)

for some polynomial g(x) ∈ F [x]. Hence degm1 = degg + degm2. Again by min-imality of degrees, degm1 ≤ degm2 and degm2 ≤ degm1. Hence degm1 = degm2shows that degg = 0. Thus g(x) is a non-zero constant c ∈ F . Let m2(x) =xm + · · · + a1x + a0. Then m1(x)= cxm + · · · + ca1x + ca0. But the leading coef-ficient of m1 is 1. Hence c= 1 proves that m1(x)=m2(x). �

Theorem 8.8.2 Let A be a non-zero n× n matrix over F . Then A is non-singulariff the constant term of the minimal polynomial of A is not zero.

Proof Proceed as in Theorem 8.5.12. �

Corollary If A is a non-singular square matrix over F , then its inverse is alsopolynomial in A over F .

Remark Let V be a finite-dimensional vector space over F and T : V → V a linearoperator. If B is any basis of V , then the minimal polynomial of T is the same as theminimal polynomial of m(T )B . This is so because similar matrices have the sameminimal polynomial (see Ex. 20 of Exercises-II).

Theorem 8.8.3 Let V be an n-dimensional vector space over F and T : V → V

be a linear operator with its minimal polynomial m(x). Then

(i) an element λ in F is an eigenvalue of T iff m(λ)= 0;(ii) the characteristic polynomial κ(x) of T and its minimal polynomial m(x) have

the same roots.

Proof (i) If m(x) divides κ(x), then κ(x)= q(x)m(x) for some q(x) ∈ F [x]. Henceκ(λ)= q(λ)m(λ). If λ is a root of m(x), then λ is also a root of κ(x) and thus λ isan eigenvalue of T .

Page 334: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

320 8 Vector Spaces

Conversely, let λ be an eigenvalue of T and x ∈ V be an eigenvector corre-sponding to λ. Then m(T )x = m(λ)x by Example 8.7.3(iii) and m(T ) = 0. Sincex �= 0, m(λ)= 0. Hence λ is a root of m(x).

(ii) It follows from (i). �

Remark The multiplicities of the roots of κ(x) and m(x) may be different. Forexample, for the matrix

A=⎛

⎝2 1 0−4 −2 02 1 0

⎠ , κ(x)=−x3 and m(x)= x2,

the multiplicities of roots of κ(x) and m(x) are different.

Corollary Let V be an n-dimensional vector space over F and T : V → V a lin-ear operator with minimal polynomial m(x) and characteristic polynomial κ(x). Ifκ(x) = (λ1 − x)n1(λ2 − x)n2 · · · (λt − x)nt , then there exist integers mi such that1≤mi ≤ ni, i = 1,2, . . . , t and m(x)= (x − λ1)

m1(x − λ2)m2 · · · (x − λt )

mt .

8.9 Jordan Canonical Form

Every square matrix is not similar to a diagonal matrix but every square matrix issimilar to an upper triangular matrix over the complex field C (see Ex. 9 and Ex. 24of Exercises-II). A linear transformation on a vector space represents matrices whichdiffer depending on different bases.

Given a finite-dimensional vector space V over a field F , there exist linear trans-formations on V such that each associated matrix in a similarity class of square ma-trices over F , takes a simple form in some basis, called canonical form. There aremany canonical forms of matrices, namely, the triangular form, Jordan normal form,rational canonical form etc. But in this section we study only the Jordan canonicalform. Since the Jordan canonical form is determined by the set of elementary di-visors, we need basic ideas of determinant divisors, invariant factors, elementarydivisors etc., of a square matrix. We first introduce these concepts as backgroundmaterial. For other canonical forms see Exs. 21–23 of Exercises-II.

Definition 8.9.1 Let A be a square matrix of order n over a field F and dt (A)

denote the highest common factor of the set of all minors of order t of A, for t =1,2, . . . , r , where r is the rank of A. Then dt (A) is called the t th determinant divisorof A.

Definition 8.9.2 If we take d0(A)= 1 and ei = di(A)/di−1(A), for i = 1,2, . . . , r ,where rankA= r , then e1, e2, . . . , er are called the invariant factors of A.

Remark di(A)= e1e2 · · · ei , for i = 1,2, . . . , r and hence the invariant factors of A

determine uniquely its determinant divisors and conversely.

Page 335: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.9 Jordan Canonical Form 321

Definition 8.9.3 Let x1, x2, . . . , xm be irreducible elements in F , each of which isa divisor of at least one of the invariant factors e1, e2, . . . , er of a square matrix A

over F . Then the prime powers xp111 , . . . , x

p1mm , . . . , x

pr11 , . . . , x

prmm for which the

indices are positive, are called the elementary divisors of A over F .

Example 8.9.1 For the matrix

A=⎛

⎝x2 − x x 0x − 2 x x + 4

x 0 3x

⎠ ,

the determinant divisors di , invariant factors ei and elementary divisors are respec-tively:

d1 = hcf of {x2 − x, x, x − 2, x, x + 4, x,3x} = 1;d2 = hcf of {x(x2 − 2x + 2), x(x − 1)(x + 4),−x2,3x2,3x(x2 − x), x(x + 4),

−x2,2x(x − 5), 3x2} = x;d3 = x2(3x2 − 5x + 10);e1 = d1 = 1, e2 = d2/d1 = x, e3 = d3/d2 = x(3x2 − 5x + 10).

The elementary divisors of A in R[x] are x, x;3x2− 5x + 10 and these in C[x] arex, x; x − α; x − β , where α,β = (5±√95i)/6.

We recall that if V is a finite-dimensional vector space over an algebraicallyclosed field F , such as complex field C, then the characteristic polynomial of everylinear operator T : V → V decomposes into linear factors in F [x]. If λ1, λ2, . . . , λn

(not necessarily distinct) are all eigenvalues of T , then T is diagonalizable iff thereis an ordered basis of V consisting of eigenvectors of T . If B = {v1, v2, . . . , vn} issuch a basis in which vj is an eigenvector corresponding to the eigenvalue λj , then

m(T )B =

⎜⎜⎜⎝

λ1 0 · · · 00 λ2 · · · 0

. . .

0 0 · · · λn

⎟⎟⎟⎠= (λj ).

We take F =C, unless otherwise stated.

Definition 8.9.4 Corresponding to an element λ in C, an elementary Jordan matrixor a Jordan block J (λ) of order r is a square matrix of order r over C that has λ

in each diagonal position, 1’s in each position just above the main diagonal and 0’selsewhere.

Thus

J (λ)=

⎜⎜⎜⎜⎜⎝

λ 1 0 · · · 00 λ 1 · · · 00 0 λ · · · 0

. . .

0 0 0 · · · λ

⎟⎟⎟⎟⎟⎠

Page 336: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

322 8 Vector Spaces

is a Jordan block corresponding to λ. A Jordan block is an upper triangular ma-trix.

For example,

(5),

(3 10 3

),

⎝7 1 00 7 10 0 7

are Jordan blocks of order 1,2 and 3 corresponding to the eigenvalues 5, 3, and 7respectively.

Definition 8.9.5 The matrix⎛

⎜⎜⎜⎜⎜⎝

J1(λ1) 0 0 · · · 00 J2(λ2) 0 · · · 00 0 J3(λ3) · · · 0

. . .

0 0 0 · · · Jr(λr)

⎟⎟⎟⎟⎟⎠(8.3)

where each Ji(λi) is a Jordan block corresponding to the eigenvalue λi of a squarematrix A is said to be a Jordan canonical form of A, where λ1, λ2, . . . , λr may notbe distinct and orders of the Jordan blocks may be different.

Jordan canonical form is one of the most generally used canonical forms connect-ing linear transformation and matrices. But its serious inconvenience is the condi-tion that all eigen values must lie in the ground field. We study some other canonicalform which needs nothing about the location of eigenvalues. Such a canonical formis the rational canonical form which is described in Ex. 23 of Exercises-II.

Theorem 8.9.1 (Jordan Form Theorem) A square matrix M , over a field F suchthat the eigenvalues of M lie in F , is similar to a Jordan matrix of the form (8.3),which is uniquely determined, except for rearrangements of its diagonal blocks.

Proof Since the eigenvalues of M are in F , its characteristic polynomial κM(x)

decomposes into linear factors in F [x]:κM(x)= (λ1 − x)n1(λ2 − x)n2 · · · (λm − x)nt ,

where n1 + n2 + · · · + nt = n and λi ’s are distinct eigenvalues of M .Again κM(x) is the product of invariant factors, and also of the elementary di-

visors of the characteristic matrix M − xI . As the prime factors of κM(x) in F [x]are linear polynomials λi − x, it follows that the elementary divisors of M − xI

are of the form (λi − x)ri . We suppose that {(λ1 − x1)r1, . . . , (λm − x)rm} is the

complete set of elementary divisors of M − xI , where λ1, λ2, . . . , λm may not bedistinct. Let Ji(λi) be the Jordan block of order ri corresponding to the eigenvalueλi, i = 1,2, . . . ,m. Then (λi − x)ri is both the characteristic polynomial and the

Page 337: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.9 Jordan Canonical Form 323

minimal polynomial of the matrix Ji(λi). As the minimal polynomial of Ji(λi) isthe last invariant factor of the matrix Ji(λi)− xI and the characteristic polynomialof Ji(λi) is the product of all invariant factors of Ji(λi)− xI , it follows that all theinvariant factors of Ji(λi)− xI , excepting the last one, is 1. Hence (λi − x)ri is theonly elementary divisor of Ji(λi)− xI .

Let J = diag(J1(λ1), . . . , Jm(λm)) be the Jordan matrix. Then the set of theelementary divisors of J − xI is given by the union of the elementary divisorsof J1(λ1) − xI, . . . , Jm(λm) − xI . Thus the elementary divisors of J − xI aregiven by (λ1 − x)r1 , . . . , (λm − x)rm . Again, as the product of the elementary di-visors of M − xI is equal to the characteristic polynomial κM(x), it follows thatr1 + r2 + · · · + rm = n1 + n2 + · · · + nt = n. This shows that J − xI is a matrix oforder n. Again M − xI and J − xI are both non-singular. Hence rankM = rankJ .Consequently, M − xI and J − xI are both square matrices of order n over F suchthat they have the same rank and the same set of elementary divisors. This impliesthat M is similar to the Jordan matrix J .

Again the set of elementary divisors of M − xI consists of the elementary divi-sors of Ji(λi)− xI , for i = 1,2, . . . ,m, there is one elementary divisor correspond-ing to each block Ji(λi). Moreover, the block diagonal matrices which differ onlyin the arrangement of diagonal blocks are similar. Consequently, the Jordan matrixJ is determined uniquely, except for rearrangement of the diagonal blocks, by thegiven matrix M . �

Remark The Jordan matrix J similar to M is called the Jordan normal form (or theclassical canonical form) of the matrix M .

Corollary Any square matrix M over C is similar to a Jordan matrix, which isdetermined uniquely, except for rearrangements of its diagonal blocks.

Proof As all the eigenvalues of M over C lie in C, the corollary follows from The-orem 8.9.1. �

Example 8.9.2 (i) The matrix

M =⎛

⎝4 −1 14 0 22 −1 3

is similar to the Jordan matrix⎛

⎝2 0 00 2 00 0 3

⎠ .

For this purpose we prescribe a method by computing as follows:

Step I: κM(x)= det(M − xI)=−(x − 2)2(x − 3).Step II: d1(x)= 1, d2(x)= x − 2, d3(x)= (x − 2)2(x − 3).

Page 338: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

324 8 Vector Spaces

Fig. 8.1 Jordan normal formof M

J =⎛

⎝2 1 00 2 00 0 2

Step III: e1(x)= d1(x)= 1, e2(x)= d2(x)/d1(x)= x − 2= p1(x). (say) e3(x)=(x − 2)(x − 3)= p1(x)p2(x) (say).

The multiplicities of the eigenvalues 2 and 3 as roots of the invariant factors aretabulated:

λ e3(x) e2(x) e1(x)

2 1 1 03 1 0 0

The symbol [(1,1), (1)] denoting the multiplicities of the eigenvalues as rootsof the invariant factors, collected together in the first brackets for each one of theeigenvalues, is called the Segre characteristic of M and it represents the Jordannormal form

J =⎛

⎜⎝2 0 00 2 00 0 3

⎟⎠ .

(ii) The matrix

M =⎛

⎝−6 6 1−1 1 1−8 5 8

has no Jordan normal form over the field R.κM(x)=−(x+5)(x2−3x+3) shows that all the three roots are not in R. Hence

there does not exist any Jordan normal form of M over R.(iii) The Jordan normal form of the matrix

M =⎛

⎝0 4 2−3 8 34 −8 −2

is shown in Fig. 8.1.Here κM(x)=−(x − 2)3, d1(x)= 1, d2(x)= (x − 2), d3(x)=−(x − 2)3 and

e1(x)= 1, e2(x)= x − 2, e3(x)=−(x − 2)2.The Segre characteristic of M is [(2,1)] and it represents J .(iv) Let M be a 3× 3 matrix over C. Then all the eigenvalues of M lie in C. Find

the different forms of Jordan matrices similar to M .To find the different forms of Jordan matrices similar to M , we consider all pos-

sible cases. If e1, e2, e3 are invariant factors of characteristic matrix M − xI , then

(a) e1 is a divisor of e2 and e2 is a divisor e3; and(b) the product e1 e2 e3 = κM(x).

Page 339: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.9 Jordan Canonical Form 325

Fig. 8.2 Jordan normal formfor the Case II(ii)

J3 =⎛

⎜⎝λ1 1 00 λ1 00 0 λ2

⎟⎠

Fig. 8.3 Jordan normal formfor the Case III(ii)

J5 =⎛

⎝λ 1 00 λ 00 0 λ

These properties offer different possible cases:Let λ1, λ2, λ3 be the rots of κM(x).Case I: Let λ1, λ2, λ3 be three distinct roots of κM(x).Then κM(x) = (λ1 − x)(λ2 − x)(λ3 − x) and hence by (a) & (b), e1(x) = 1,

e2(x)= 1 and e3(x)= (λ1 − x)(λ2 − x)(λ3 − x).Consequently, the Serge characteristic is [(1), (1), (1)] and hence the Jordan nor-

mal form J1 of M is

J1 =⎛

⎝λ1 0 00 λ2 00 0 λ3

⎠ .

Case II: Let λ1 = λ3 and λ2 �= λ1. Then κM(x)= (λ1 − x)2(λ2 − x). There aretwo possibilities:

(i) e1(x)= 1, e2(x)= λ1 − x, e3(x)= (λ1 − x)(λ2 − x) or(ii) e1(x)= 1, e2(x)= 1, e3(x)= (λ1 − x)2(λ2 − x).

The Segre characteristic for (i) is [(1,1), (1)] and for (ii) is [(2), (1)].Consequently, the Jordan normal form is

J2 =⎛

⎝λ1 0 00 λ1 00 0 λ2

for (i) and for (ii) it is J3 as shown in Fig. 8.2.Case III: λ1 = λ2 = λ3 = λ (say). Then there are three possibilities.(i) e1(x)= λ− x, e2(x)= λ− x, e3(x)= λ− x.This shows that the Serge characteristic is [(1,1,1)] and hence the Jordan normal

form

J4 =⎛

⎝λ 0 00 λ 00 0 λ

⎠ .

(ii) e1(x)= 1, e2(x)= λ− x, e3(x)= (λ− x)2.This shows that the Segre characteristic is [(2,1)] and hence the Jordan normal

form J5 is shown in Fig. 8.3.(iii) e1(x)= 1, e2(x)= 1, e3(x)= (λ− x)3.

Page 340: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

326 8 Vector Spaces

This shows that the Segre characteristic is [(3)] and hence the Jordan normalform

J6 =⎛

⎝λ 1 00 λ 10 0 λ

⎠ .

8.10 Inner Product Spaces

In our discussion, so far, the concepts of length, angle, and distance have not ap-peared. In this section we study special vector spaces over R and C which admit theabove missing concepts. Such vector spaces introduce the concept of Inner ProductSpaces. For its motivation, we recall the geometry in Rn and Cn.

8.10.1 Geometry in Rn and Cn

Given two vectors x = (x1, x2, . . . , xn) and y = (y1, y2, . . . , yn) in Rn, the real num-ber x1y1 + x2y2 + · · · + xnyn is called dot product (or standard inner product) of x

and y and is denoted by x · y = 〈x, y〉. Thus x · y = 〈x, y〉 =∑ni=1 xiyi ∈ R. The

set Rn endowed with this dot product is called the Euclidean n-space. The lengthof x, denoted by |x|, is defined by |x| = +√x · x. This definition of inner prod-uct is not adequate for defining the length in Cn. For example, for the non-zerox = (1 − i,1 + i) ∈ C2, the above definition of length shows that |x| = 0. Sim-ilarly, for x = (1,4i) ∈ C2, |x| = √−15. So it needs modification of the defini-tion of inner product in Cn as 〈x, y〉 =∑n

i=1 xi yi , where yi represents the com-plex conjugate of yi . The set Cn endowed with this inner product is called the n-dimensional unitary space. The distance between x and y in Rn (or Cn) is definedby d(x, y)= ‖x − y‖, where ‖ ‖ is the norm function (see Example 8.11.3).

Remark The inner product defined in Rn (or Cn) is a function of x for every fixed y.

8.10.2 Inner Product Spaces: Introductory Concepts

In analytical geometry and vector analysis we study real vector spaces. We nowcarry over the concept of a dot product in Rn to a more abstract setting. So themodel of the inner product spaces is the Euclidean n-space Rn.

Definition 8.10.1 Let F =R or C and V be a vector space over F . An inner prod-uct on V is a mapping 〈 , 〉 : V × V → F such that

(i) 〈x, x〉 ≥ 0 and 〈x, x〉 = 0 iff x = 0 (positive definiteness);(ii) for F =R, 〈x, y〉 = 〈y, x〉 (symmetry);

for F =C, 〈x, y〉 = 〈y, x〉 (conjugate symmetry);

Page 341: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.10 Inner Product Spaces 327

(iii) for F =R, 〈αx + βy, z〉 = α〈x, z〉 + β〈y, z〉 (bilinearity);for F =C, 〈z,αx + βy〉 = α〈z, x〉 + β〈z, y〉 (conjugate bilinearity),for all α,β ∈ F and x, y, z ∈ V .

The pair (V , 〈 , 〉) is called an inner product space over F .

Remark 1 If there is no ambiguity, we write (V , 〈 , 〉) by simply V .

Remark 2 There may exist different inner products on V .For example, for x = (x1, x2) and y = (y1, y2) in R2, 〈x, y〉1 = x1y1 + x2y2 and

〈x, y〉 = (2x1 + x2)y1 + (x1 + x2)y2 are both inner products on R2 over R.

Example 8.10.1 (i) Let V = C([a, b]) be the vector space of all real valued contin-uous functions defined on [a, b]. Then 〈 , 〉 defined by 〈f,g〉 = ∫ b

af (x)g(x) dx is

an inner product and V is an inner product space.(ii) Let V be the vector space of all continuous complex valued functions defined

on [0,1]. Then 〈 , 〉 defined by 〈f,g〉 = ∫ 10 f (x)g(x) dx is an inner product and V

is an inner product space.(iii) Cn is an inner product space under the inner product defined by 〈x, y〉 =∑ni=1 xi yi .(iv) Let V be the vector space of all m× n matrices over R. Then 〈 , 〉 defined by

〈A,B〉 = trace(BtA) is an inner product.

We now extend the concept of length or norm defined in R2 or R3 to an arbitraryinner product space.

Definition 8.10.2 Let V be an inner product space and x is in V . The norm of x

denoted by ‖x‖ is defined by ‖x‖ =+√〈x, x〉 and the distance between x and y inV is defined by d(x, y)= ‖x − y‖ for all x, y in V .

Remark For x = (x1, x2, . . . , xn) in Rn, ‖x‖ = +√

x21 + x2

2 + · · · + x2n is just the

distance of x from the origin.

We now study some properties of norm functions.

Proposition 8.10.1 Let V be an inner product space over R. Then the norm func-tion ‖ ‖ : V →R satisfies the following properties:

(i) ‖x‖ ≥ 0 and ‖x‖ = 0 iff x = 0;(ii) ‖αx‖ = |α|‖x‖, ∀x ∈ V and α ∈R;

(iii) ‖〈x, y〉‖ ≤ ‖x‖‖y‖, ∀x, y ∈ V (Cauchy–Schwarz Inequality);(iv) Corresponding to a non-zero vector x in V , there is a vector u in V such that

‖u‖ = 1 and x = ‖x‖u. (This u is called the unit vector along x.)

Proof Left as an exercise. �

Page 342: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

328 8 Vector Spaces

Remark The Cauchy–Schwarz inequality in Rn is (x1y1 + x2y2 + · · · + xnyn)2 ≤

(x21 +x2

2 +· · ·+x2n)(y2

1 +y22 +· · ·+y2

n), which was stated in 1821 by A.L. Cauchy.The corresponding inequality in Cn is

(x1y1 + x2y2 + · · · + xnyn)2 ≤ (|x1|2 + · · · + |xn|2

)(|y1|2 + · · · + |yn|2).

We recall that two non-zero vectors x and y in Rn are orthogonal iff their dotproduct x · y = 0. This leads to the following definition.

Definition 8.10.3 Two non-zero vectors x, y in an inner product space V are saidto be orthogonal iff their inner product 〈x, y〉 = 0 and said to be orthonormal iff〈x, y〉 = 0 and ‖x‖ = 1= ‖y‖.Definition 8.10.4 A basis B = {v1, v2, . . . , vn} of an inner product space V issaid to be an orthogonal basis (or an orthonormal basis) iff 〈vi, vj 〉 = 0 for i �= j

(or 〈vi, vj 〉 = 0 for i �= j and ‖vi‖ = 1 for all i).

Example 8.10.2 (i) The unit vectors e1 = (1,0, . . . ,0), e2 = (0,1,0, . . . ,0), . . . ,

en = (0,0, . . . ,0,1) in Rn are pairwise both orthogonal and orthonormal. The setB = {e1, e2, . . . , en} is an orthonormal basis of Rn.

(ii) Let V be an inner product space. Then any orthonormal generating set S ={v1, v2, . . . , vm} forms a basis of V .

This is so because if∑m

i=1 αivi = 0 for some αi ∈ F , then 0=∑mi=1 αi〈vi, vk〉 =

αk (by taking inner product with a fixed vk in S). This is true for all k = 1,2, . . . ,m.Hence S is linearly independent such that L(S)= V . Consequently, S forms a basisof V .

We now prescribe a process of orthogonalization to find an orthogonal basis forcertain inner product spaces.

Theorem 8.10.1 (Gram–Schmidt Orthogonalization Process) Every non-zerofinite-dimensional inner product space V over F has an orthogonal basis.

Proof Let dimV = n and B = {v1, v2, . . . , vn} be a basis of V . We now constructan orthogonal basis S = {u1, u2, . . . , un}. We take u1 = v1. If n= 1, the theorem isproved. If n > 1, we take u2 by defining u2 = v2−α1v1, where α1 = 〈v2,u1〉

‖u1‖2 , (α1 ∈ F

is called the Fourier coefficient of v2 with respect to v1). Then 〈u2, u1〉 = 0. Sinceu2 �= 0 and 〈u2, u1〉 = 0, the set {u1, u2} is linearly independent. Hence for n= 2,the theorem is proved. We assume that the set A= {u1, u2, . . . , um−1} is orthogonaland such that L(A) = L({v1, v2, . . . , vm−1}), 1 < m < n. Let um be the non-zerovector in V defined by um = vm + α1v1 + · · · + αm−1vm−1 for which 〈um,ui〉 = 0for each i = 1,2, . . . ,m− 1.

In general,

um = vm −m−1∑

i=1

〈vm,ui〉‖ui‖2

ui, m= 2,3, . . . , n.

Page 343: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.10 Inner Product Spaces 329

In this way, for given m linearly independent vectors in V , we can construct anorthogonal set of m vectors. As dimV = n, in particular, from the given basis B , wecan construct the orthogonal set S of n vectors. This S gives the required orthogonalbasis of V . �

Corollary 1 Every non-zero finite-dimensional inner product space V has an or-thonormal basis.

Proof Let S = {u1, u2, . . . , un} be an orthogonal basis of V . Then B = { u1‖u1‖ ,u2‖u2‖ ,

. . . , un‖un‖ } forms an orthonormal basis of V . �

Corollary 2 Any set of non-zero mutually orthogonal vectors of a non-zero finite-dimensional inner product space V is either an orthogonal basis of V or can beextended to an orthogonal basis of V .

Proof Let dimV = n and S = {u1, u2, . . . , um} be the given set of non-zero mutu-ally orthogonal vectors of V . If m= n, there is nothing to prove. So we assume thatm < n. We now extend the set S to a basis B = {u1, u2, . . . , um,um+1, . . . , un}. Ifwe take vi = ui for i = 1,2, . . . ,m and then construct vm+i from um+i as above,for i = 1,2, . . . , n−m, then the set A= {v1, v2, . . . , vn} forms an orthogonal basisof V , where the first m vectors of A are the original vectors u1, u2, . . . , um. �

Corollary 3 Any set of orthonormal vectors of V of a non-zero finite-dimensionalinner product space V can be extended to an orthonormal basis of V .

We now introduce the concept of an orthogonal complement in an inner productspace.

Proposition 8.10.2 Let V be a non-zero finite-dimensional inner product spaceand U be a subspace of V . Then there exists a subspace W of V such that V =U ⊕W , where each vector of W is orthogonal to every vector of U .

Proof Clearly, U is also an inner product space under inner product induced from V .Then U has an orthonormal basis B = {e1, e2, . . . , en}, say. We construct W as de-fined by W = {w ∈ V : 〈w,ej 〉 = 0,1≤ j ≤ n}. Then W is a subspace of V and forany element u ∈U , ∃ an element w ∈W such that 〈u,w〉 = 0. Again if v ∈ V , thenthe element

v−n∑

i=1

〈v, ei〉ei ∈W, since

⟨v−

n∑

i=1

〈v, ei〉ei, ek

⟩= 〈v, ek〉 − 〈v, ek〉‖ek‖2 = 0, ∀k such that 1≤ k ≤ n.

Page 344: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

330 8 Vector Spaces

Hence

v =n∑

i=1

〈v, ei〉ei +(

v −n∑

i=1

〈v, ei〉ei

)

= u+w for some u ∈U and some w ∈W.

This shows that V = U +W . Clearly, for x ∈ U ∩W, 〈x, x〉 = 0 implies x = 0.Hence V =U ⊕W . �

Definition 8.10.5 The subspace W defined above is called the orthogonal comple-ment of U in V and is denoted by U⊥.

Remark If V is an inner product space and U is a subspace of V , then V =U ⊕U⊥and hence any vector v in an inner product space V has the unique representation as

v = u+w, for some u ∈U and some w ∈W =U⊥.

Definition 8.10.6 The decomposition V = U ⊕ U⊥ is called the orthogonal de-composition of V with respect to the subspace U and V is called an orthogonaldirect sum of U and U⊥.

Example 8.10.3 (i) Let U = {(x, y) ∈R2 : 3x − y = 0}. Then U⊥ = {(x, y) ∈R2 :x+3y = 0}. Thus the orthogonal complement of the line U in R2 is the line passingthrough the origin and perpendicular to the line U in R2.

(ii) The orthogonal complement of the subspace U generated by the vector v =(2,3,4) in R3 is the plane 2x + 3y + 4z = 0 in R3 passing through the origin andperpendicular to the vector v.

8.11 Hilbert Spaces

The concept of Hilbert spaces is not an actual subject of this book but we feel thatthe readers should have some knowledge of such spaces. So we need the basic ideasof normed linear spaces, Banach spaces etc., as a background.

Definition 8.11.1 Let X be a non-empty set. A metric on X is a real valued functiond :X×X→R satisfying the conditions:

M(1) d(x, y)≥ 0 and d(x, y)= 0 iff x = y;M(2) d(x, y)= d(y, x) (symmetry);M(3) d(x, y)≤ d(x, z)+ d(z, y) (triangle inequality)

for all x, y, z in X.

d(x, y) is called the distance between x and y. The pair (X,d) is called a metricspace.

Page 345: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.11 Hilbert Spaces 331

Example 8.11.1 (i) Let X be an arbitrary non-empty set. Then d : X × X → Rdefined by

d(x, y)={

0 if x = y

1 if x �= y

is a metric on X and (X,d) is a metric space.(ii) Let R be the real line. Then |x| defined by

|x| =⎧⎨

x if x > 0−x if x < 00 if x = 0

is called the absolute value function. Then d(x, y)= |x − y| is a metric on R.

Definition 8.11.2 Let (X,d) be a metric space. A Cauchy sequence in X is a func-tion f : N+ → X such that for every positive real number ε, there exists a positiveinteger m such that d(f (i), f (j)) < ε for all integers i > m and j > m.

Definition 8.11.3 A complete metric space is a metric space in which every Cauchysequence is convergent.

Example 8.11.2 [0,1] is a complete metric space but (0,1] is not so.

In this section we consider vector spaces over F =R or C.

Definition 8.11.4 A normed linear space is a vector space X on which a real valuedfunction ‖ ‖ :X→R called a norm function is defined satisfying the conditions:

N(1) ‖x‖ ≥ 0 and ‖x‖ = 0 iff x = 0;N(2) ‖x + y‖ ≤ ‖x‖ + ‖y‖;N(3) ‖αx‖ = |α|‖x‖,

for x, y ∈X and α ∈R or C.

Remark 1 The non-negative real number ‖x‖ is considered the length of the vectorx and hence the notion of the distance in X from an arbitrary point to the origin isavailable.

Remark 2 From N(3), it follows that ‖ − x‖ = ‖(−1)x‖ = ‖x‖.

Remark 3 A normed linear space is a metric space with respect to the metric in-duced by the metric defined by d(x, y)= ‖x − y‖.

Definition 8.11.5 A Banach space X is a normed linear space which is completeas a metric space i.e. every Cauchy sequence in X is convergent.

Page 346: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

332 8 Vector Spaces

Example 8.11.3 (i) Rn is a real Banach space under the norm ‖x‖ defined by

‖x‖ =(

n∑

i=1

|xi |2) 1

2

.

(ii) Cn is a complex Banach space under the norm ‖z‖ defined by

‖z‖ =(

n∑

i=1

|zn|2) 1

2

.

(iii) Let R∞ be the set of all sequences x = (x1, x2, . . . , xn, . . .) of real numberssuch that

∑∞n=1 |xn|2 converges. Under the norm function defined by

‖x‖ =( ∞∑

n=1

|xn|2) 1

2

,

the vector space R∞ becomes a real Banach space, called infinite-dimensional Eu-clidean space. Similarly, C∞ is a complex Banach space, called infinite-dimensionalunitary space. The real and complex spaces l2 are respectively R∞ and C∞.

(iv) For any real number p such that 1 ≤ p <∞, the normed linear space lnp ofall n-tuples x = (x1, x2, . . . , xn) of scalars in R or C, with the norm function definedby

‖x‖p =(

n∑

i=1

|xi |p) 1

p

,

is a Banach space.(v) For any real number p such that 1 ≤ p <∞, the normed linear space lp of

all sequences x = {x1, x2, . . . , xn, . . .} of scalars in R or C such that∑∞

n=1 |xn|p isconvergent is a Banach space under the norm function defined by

‖x‖p =( ∞∑

n=1

|xn|p) 1

p

.

Clearly, the real l2 space is the infinite-dimensional Euclidean space R∞ and thecomplex l2 space is the infinite-dimensional unitary space as defined in (iii).

Banach spaces are vector spaces providing with the idea of the length of a vector.But it fails to provide the concept of the angle between two vectors in an abstractBanach space. A Hilbert space is a special Banach space having an additional struc-ture providing with the concept of orthogonality of two vectors. This type of spacesalso fails to provide the main geometric concept of the angle between two vectors in

Page 347: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.11 Hilbert Spaces 333

general. But the dot product in Rn yields both the concepts of the angle and orthog-onality of two non-zero vectors. We now proceed to give the definition of a Hilbertspace.

Definition 8.11.6 A Hilbert space is a complex Banach space X in which a func-tion 〈 , 〉 :X×X→C is defined satisfying the following conditions:

H(1): 〈αx + βy, z〉 = α〈x, z〉 + β〈y, z〉;H(2): 〈x, y〉 = 〈y, x〉;H(3): 〈x, x〉 = ‖x‖2.

Then 〈x,αy + βz〉 = α〈x, y〉 + β〈x, z〉, for all x, y, z in X and α,β in C.

Remark A Hilbert space is a complex Banach space whose norm is defined by aninner product.

Example 8.11.4 The spaces ln2 and l2 are the main examples of Hilbert spaces,where 〈x, y〉 is defined by

〈x, y〉 =n∑

i=1

xi yi for x, y ∈ ln2 ,

=∞∑

n=1

xnyn for x, y ∈ l2.

We recall the parallelogram law from elementary geometry that the sum ofsquares of the sides of a parallelogram equals the sum of squares of its diagonals.An analogue of this law holds in a Hilbert space.

Proposition 8.11.1 (Parallelogram law) Let X be a Hilbert space. For any twovectors x and y in X, ‖x + y‖2 + ‖x − y‖2 = 2‖x‖2 + 2‖y‖2.

Proof ‖x+y‖2+‖x−y‖2 = 〈x+y, x+y〉+〈x−y, x−y〉 = 2〈x, x〉+2〈y, y〉 =2‖x‖2 + 2‖y‖2. �

Corollary 1 Let X be a Hilbert space. Then for any x, y in X, the following identity

4〈x, y〉 = ‖x + y‖2 − ‖x − y‖2 + i‖x + iy‖2 − i‖x − iy‖2 holds.

Proof By converting the right hand expression into inner products, the identity isverified. �

Corollary 2 Let X be a complex Banach space whose norm satisfies the parallel-ogram law. If an inner product is defined on X by the identity of Corollary 1, thenX is a Hilbert space.

Page 348: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

334 8 Vector Spaces

Proof Left as an exercise. �

Remark Hilbert spaces are precisely the complex Banach spaces in which the par-allelogram law is valid.

Definition 8.11.7 Let X be a Hilbert space and x, y be two vectors in X. Then x issaid to be orthogonal to y denoted by x ⊥ y iff 〈x, y〉 = 0.

Remark Let X be a Hilbert space.

(i) x ⊥ y⇔ y ⊥ x, since 〈x, y〉 = 〈y, x〉.(ii) 〈x, x〉 = ‖x‖2 and x ⊥ 0 = 0 for every x in X. Clearly, 0 is the only vector

orthogonal to itself.(iii) x ⊥ y ⇒ ‖x + y‖2 = ‖x − y‖2 = ‖x‖2 + ‖y‖2 (it represents geometrically

Pythagorean Theorem).

Definition 8.11.8 In an inner product space X, for any non-empty set Y of X

its orthogonal complement, denoted by Y⊥, is defined by Y⊥ = {x ∈ X : x ⊥y for every y in Y }.

Clearly, {0}⊥ =X, X⊥ = {0} and X ∩X⊥ = {0}.

Proposition 8.11.2 (Cauchy–Schwarz inequality) Let X be a Hilbert space andx, y be any two vectors in X. Then |〈x, y〉| ≤ ‖x‖‖y‖.

Proof Let x be a non-zero vector in X. If y = 0, then the result is trivial. If y �= 0, itis sufficient to prove that |〈x, y〉/‖y‖| ≤ ‖x‖. If ‖y‖ = 1, then 0≤ ‖x−〈x, y〉y‖2 =〈x, x〉−〈x, y〉〈x, y〉 = ‖x‖2−|〈x, y〉|2 ⇒ |〈x, y〉| ≤ ‖x‖. If ‖y‖ �= 1, then the result|〈x, y〉| ≤ ‖x‖‖y‖ follows immediately. �

8.12 Quadratic Forms

The theory of quadratic forms arose through the study of central conics in the Eu-clidean plane R2 and central conicoids in the Euclidean space R3. We now carrythis study over to quadratic surfaces in the Euclidean n-space Rn. To classify a cen-tral conic ax2 + 2hxy + by2 = 1 in R2, we reduce it in the form a1X

2 + b1Y2 = 1

by a non-zero non-singular linear transformation from (x, y) to (X,Y ) defined byx =X cos θ − Y sin θ and y =X sin θ + Y cos θ , which geometrically means a rota-tion of axes. The rotation of axes implies a change by an orthogonal transformation.

An expression of the form

q(x1, x2, . . . , xn)=n∑

i=1

aix2i + 2

i<j

aij xixj , ai, aij ∈R

is called a quadratic form in Rn.

Page 349: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.12 Quadratic Forms 335

In general, given a field F , by a quadratic form on a vector space Fn over F ,we mean a map q : Fn → F , which is a homogeneous polynomial function ofdegree 2 of the coordinates. For example, the function f : Rn → R defined byf (x1, x2, . . . , xn)= x2

1 + x22 + · · · + x2

n is a quadratic form in Rn.Let

q(x1, x2, . . . , xn)=∑

i,j

bij xixj , i, j = 1,2, . . . , n

be a quadratic form over F of characteristic different from 2. By taking aij =bij+bji

2 , the given quadratic form is transformed into∑

i,j aij xixj , where aij = aji .It can be expressed as a product XAXt , where X is the row matrix (x1x2 . . . xn) andA is the symmetric matrix A= (aij ).

For example, the symmetric matrix A associated with the quadratic form 3x2 +4y2 + 5z2 + 4xz is

A=⎛

⎝3 0 20 4 02 0 5

⎠ .

8.12.1 Quadratic Forms: Introductory Concepts

Definition 8.12.1 Let V be a real inner product space of finite dimension and T :V → V be a symmetric linear operator (i.e., T (x, y) = T (y, x) for all x, y in V ).Then the mapping q : V → R defined by q(x) = 〈T (x), x〉 is called a quadraticform on V .

We now establish a relation between a quadratic form and a symmetric matrix.

Theorem 8.12.1 Every real symmetric matrix of order n corresponds to aquadratic form on Rn and conversely, every quadratic form on Rn correspondsto a real symmetric matrix of order n.

Proof Let V = Rn and A = (aij ) be a symmetric matrix of order n over R. Wetake B the usual orthonormal basis of V i.e., B = {e1 = (1,0, . . . ,0), . . . , en =(0,0, . . . ,1)}. Let T : V → V be the linear operator corresponding to A with re-spect to the basis B . Then q : V →R, defined by q(x)= 〈T (x), x〉 is the quadraticform corresponding to T : V → V . For x = (x1, x2, . . . , xn) =∑i xiei , T (x) =∑

i xiT (ei) =∑i,k xiaikek ⇒ q(x) =∑i,j aij xixj =∑i aiix2i + 2

∑i<j aij xixj .

This proves the first part.Conversely, let q be the quadratic form q : V → R corresponding to a sym-

metric linear operator T : V → V , where V = Rn. Then q(x) =〈T (x), x〉 =〈∑i xiT (ei),

∑j xj ej 〉 = ∑i,j (〈T (ei), ej 〉)xixj = ∑i,j aij xixj , where aij =

〈T (ei), ej 〉. Since T is symmetric, A= (aij ) is also symmetric. �

Page 350: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

336 8 Vector Spaces

This matrix A is called the matrix corresponding to the quadratic form q on Rn

with respect to the basis B . We now study the effect of change of basis of B of V

on A.

Theorem 8.12.2 Let q be a quadratic form on Rn and B1 = {e1, e2, . . . , en},B2 = {f1, f2, . . . , fn} be two orthonormal bases of Rn. If A,B are the matricescorresponding to q with respect to bases B1,B2 respectively and C is the matrix cor-responding to the linear transformation T : V → V mapping the basis B1 onto B2,then B = CACt .

Proof If A = (aij ), then by the given condition, aij = 〈T (ei), ej 〉. Hence q(x) =〈T (x), x〉 =∑i,j aij xixj , where x =∑i xiei . Hence

q(x)=XtAX, where X =

⎜⎜⎜⎝

x1x2...

xn

⎟⎟⎟⎠ .

As T sends a basis B1 onto another basis B2, T is non-singular and henceits corresponding matrix C = (cij ) is also non-singular. Then fi =∑j cij ej . If(y1, y2, . . . , yn) are the coordinates of x with respect to B2, then x=

∑i yifi . Con-

sequently,

x =∑

i

yifi =∑

i,j

yicij ej ⇒∑

i

xiei =∑

i,j

yicij ej

⇒ xj =∑

cij yi ⇒ Xt = Y tC,

where Y is the column vector⎛

⎜⎝y1...

yn

⎟⎠ .

Hence q(x)=XtAX = Y tCACT Y ⇒ the matrix of q with respect to the basis B2is B = CACT . �

Theorem 8.12.2 introduces the concept of congruent matrices.

Definition 8.12.2 Let A and B be two n × n symmetric matrices over R. ThenB is said to be congruent to A iff there exists a non-singular matrix P such thatB = P tAP .

The relation of being congruent on the set of all real n×n symmetric matrices isan equivalence relation, it partitions the set into congruence classes.

Page 351: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.12 Quadratic Forms 337

Definition 8.12.3 Two quadratic forms on Rn are said to be congruent iff theircorresponding associated symmetric matrices are congruent.

We now look for a suitable basis for Rn to obtain a canonical or normal form fora congruence class.

Theorem 8.12.3 (Sylvester’s Theorem) Any real symmetric matrix A of order n iscongruent to a matrix of the form

B =⎛

⎝Ip

−Iq

0

⎠ ,

where Ip, Iq represent unit p × p and q × q real matrices and 0 is the matrix ofzeros. Moreover, p and q are uniquely determined by A.

Proof As A is a real symmetric matrix, all the characteristic roots (eigenvalues) of A

are real. We arrange them in such a way that the first p of them λ1, λ2, . . . , λp (say),are positive, the next q of them, −λp+1,−λp+2, . . . ,−λp+q (say), are negative andthe last n− p − q of them are all zero. Then there exists an orthogonal matrix C

such that

C−1AC =

⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎜⎝

λ1λ2

. . .

λp

−λp+1. . .

−λp+q

0. . .

0

⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎟⎠

.

Let D be the diagonal matrix, where

D = diag

(1√λ1

, . . . ,1√λp

,1√

λp+1, . . . ,

1√λp+1

,1, . . . ,1

).

Then

D(C−1AC

)D =⎛

⎝Ip

−Iq

0

⎠ and P = CD

Page 352: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

338 8 Vector Spaces

is a non-singular matrix such that P t =DtCt =DC−1. Hence

P tAP =⎛

⎝Ip

−Ip

0

⎠= B

shows that A is congruent to B . Uniqueness p and q is proved after the corollary.

Corollary Any quadratic form q(x) =∑i,j aij xixj is congruent to a quadraticform

x21 + x2

2 + · · · + x2p − x2

p+1 − x2p+2 − · · · − x2

p+q,

known as the normal (or diagonal) form of q(x), where p and q are determineduniquely by q(x).

Uniqueness of p and q Let

q(x)=p∑

i=1

x2i −

p+q∑

i=p+1

x2i and

q(x)=t∑

i=1

y2i −

t+s∑

i=t+1

y2i

⎫⎪⎪⎪⎪⎪⎪⎬

⎪⎪⎪⎪⎪⎪⎭

(A)

be two canonical expressions of the same quadratic form q(x) with respect to basesB = {u1, u2, . . . , un} and S = {v1, v2, . . . , vn}, respectively. We claim that p = t

and q = s. If possible, p �= t . Without loss of generality, we assume that p > t .Let U = span{u1, u2, . . . , up} and W = span{vt+1, . . . , vn}. Then dimU = p anddimW = n− t . Hence dimU + dimW = p+n− t > n, as p > t by assumption⇒the subspaces U and W have non-zero common vectors⇒∃ a non-zero vector x inU ∩W .

This non-zero vector x can be expressed as

x = x1u1 + · · · + xpup = yt+1vt+1 + · · · + ynvn.

As for this particular x, xp+1 = · · · = xn = 0 and y1 = · · · = yt = 0, we havefrom (A)

x21 + x2

2 + · · · + x2p ≥ 0 and − y2

t+1 − · · · − y2n ≤ 0.

Hence x1 = · · · = xp = 0 and yt+1 = · · · = yn = 0⇒ x = 0.This contradiction shows that p ≤ t . Similarly, t ≤ p. Hence p = t . Again p +

q = t + s ⇒ q = s, since p = t .Thus any quadratic form q(x) =∑i,j aij xixj is congruent to a quadratic form

of the type

x21 + x2

2 + · · · + x2p − x2

p+1 − · · · − x2p+q, (B)

where p and q are uniquely determined by q(x). �

Page 353: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.12 Quadratic Forms 339

Definition 8.12.4 The integer p is called the index of q(x), which is the numberof positive terms in the expression (B). If r is the rank of the matrix A associatedwith the quadratic form q(x), then the rank of q(x) is defined to be the rank of A

and signature of q(x) is defined to be the integer p − (r − p) = 2p − r , which isalso called the signature of the matrix A.

Remark If a real symmetric matrix A of rank r is congruent to the matrix

B =⎛

⎝Ip

−Iq

0

⎠ ,

then r = p+ q is the rank of A and p− q is the signature of A.

A quadratic form is of several types given in the following definition.

Definition 8.12.5 A quadratic form q : V →R is said to be

(i) positive definite provided q(x) > 0 for all non-zero vectors x in V ;(ii) negative definite provided q(x) < 0 for all non-zero vectors x in V ;

(iii) positive semidefinite provided q(x) ≥ 0 for all x in V and q(x) = 0 for somenon-zero vectors x in V ;

(iv) negative semidefinite provided q(x)≤ 0 for all x in V and q(x)= 0 for somenon-zero vector x in V ;

(v) indefinite provided there exist vectors u and v in V such that q(u) > 0 andq(v) < 0.

The associated real symmetric matrix A is said to be positive definite, negative def-inite, positive semidefinite etc., according to q(x) being so.

We now characterize quadratic forms with the help of their associated matrices.

Theorem 8.12.4 Let q : Rn → R be a quadratic form and A be its associatedmatrix. Then q(x) is positive definite iff the eigenvalues of A are all positive.

Proof Let the quadratic form q(x) be positive definite and

D =⎛

⎝Ip

−Ip

0

be a canonical form of A. Then D is the matrix corresponding to q(x) with respect tosome basis B of Rn. If (x1, x2, . . . , xn) is the coordinate of x with respect to B , then

q(x)= x21 + x2

2 + · · · + x2p − x2

p+1 − · · · − x2p+q .

If p < n, then for x = (

p︷ ︸︸ ︷0, . . . ,0,

n−p︷ ︸︸ ︷1,1, . . . ,1), q(x) < 0. As q is positive definite, this

contradiction shows that p = n.

Page 354: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

340 8 Vector Spaces

Conversely, let all the eigenvalues of A be positive. Then A is congruent to theidentity matrix and hence q(x) = x2

1 + x22 + · · · + x2

n with respect to some basisof Rn. This implies that q is positive definite. �

Corollary A quadratic form q :Rn→R is positive definite if rank of q = signatureof q = n.

Theorem 8.12.5 A quadratic form q :Rn→R is negative definite if all the eigen-values of the matrix A corresponding to q(x) are negative and is indefinite if A hasboth positive and negative eigenvalues.

Proof Left as an exercise. �

Definition 8.12.6 let V be an n-dimensional inner product space over R and T :V → V be a symmetric linear operator. Then T is said to be positive definite iff〈T (x), x〉> 0 for all non-zero vectors x in V .

Proposition 8.12.1 Let V be an n-dimensional inner product space over R. If T :V → V is positive definite, then all eigenvalues of T are positive.

Proof Let v �= 0 be an eigenvector of T corresponding to an eigenvalue λ. Then〈T (v), v〉 = 〈λv, v〉 = λ〈v, v〉. Since 〈v, v〉 > 0 and 〈T (v), v〉 > 0, it follows thatλ > 0. �

8.13 Exercises

Exercises-II

1. Find a linear operator T :R2 →R4 corresponding to the matrix

A=

⎜⎜⎝

3 −1−2 40 21 0

⎟⎟⎠ .

[Hint. See Example 8.6.2.]2. Let V be an n-dimensional vector space over R and B be any basis of V . If

I : V → V is the identity map, show that m(I)B = In (identity matrix).3. Let V be the vector space generated by three functions f (x) = 1, g(x) =

x, h(x) = x2. If D : V → V is the differential operator, find m(D)B , whereB = {f (x), g(x), h(x)}.

Ans.:⎛

⎝0 1 00 0 20 0 0

⎠ .

Page 355: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 341

4. Let V be a vector space and A,B be subspaces of V . Show that

(a) the vector spaces (A+B)/B and A/(A∩B) are isomorphic;(b) the vector spaces (A+B)/A and B/(A∩B) are isomorphic

(Second Isomorphism Theorem or Quotient of a Sum Theorem).[Hint. Define the map T : A→ (A+ B)/B by T (x)= x + B . Then T is a

linear transformation and onto. Clearly, kerT =A∩B . Apply the First Isomor-phism Theorem.]

5. Let A and B be subspaces of a vector space V such that B ⊆A⊆ V . Show thatthe vector spaces (V/B)/(A/B) and V/A are isomorphic (Third IsomorphismTheorem or Quotient of a Quotient Theorem for Vector Spaces).

[Hint. Define the map T : V/B → V/A by T (x + B) = x + A. Then T isonto and a linear transformation. Clearly, kerT = A/B . Apply the First Iso-morphism Theorem.]

6. Let V be the vector space of 2 × 2 real matrices and M = ( 1 20 3

) ∈ V . If T :V → V is the linear operator defined by T (A) = AM −MA, find a basis ofkerT .

[Hint.

kerT ={(

x y

u v

)∈ V : T

((x y

u v

))=(

0 00 0

)}

={(

x y

u v

)∈ V :

(−2u 2x + 2y − 2v

−2u 2u

)=(

0 00 0

)}.

Hence u= 0 and 2x + 2y − 2v = 0⇒ u= 0 and x + y = v⇒ dim kerT = 2.If we take x = 1, y = −1, then v = 0 and if x = 1, y = 0, then v = 1. Hence

the matrices B = ( 1 −10 0

)and C = ( 1 0

0 1

)form a basis of kerT .]

7. Show that there do not exist n×n real matrices A and B such that AB−BA= I

(identity matrix).[Hint. If AB − BA= I , then tr(AB)− tr(BA)= n. Hence 0= n, which is

a contradiction.]8. Let V be the vector space of 2× 2 real matrices and T : V → R4 be the linear

map defined by T(( x y

s t

))= (x, y, s, t). Verify the Sylvester Law of Nullity.

[Hint. kerT = {( 0 00 0

)}and ImT =R4.]

9. Show that the matrix A= ( 1 10 1

)cannot be similar to a diagonal matrix.

[Hint. Suppose D = ( d1 00 d2

)is such that A is similar to D. Then there exists

a non-singular matrix P = ( a bc d

)such that PAP−1 =D. Then it can be shown

that a = 0= c. Hence ad − bc= 0⇒ a contradiction.]10. Let V be the inner product space R[x] of all polynomials over R, with inner

product defined by 〈f (x), g(x)〉 = ∫ 1−1 f (x)g(x) dx. Given the sequence S =

{1, x, x2, x3, . . .} of linearly independent vectors, find an orthogonal sequenceof linearly independent vectors.

Page 356: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

342 8 Vector Spaces

[Hint. Let B = {u1(x), u2(x), u3(x), . . .} be the required orthogonal se-

quence. Then u1(x)= 1, u2(x)= x−∫ 1−1 x dx∫ 1−1 dx

· 1= x, u3(x)= x2− 13 , u4(x)=

x3 − 35x, . . . by the Gram–Schmidt Orthogonalization Process.]

11. Find an orthonormal basis for the space of solutions of the linear equation 3x−2y + z= 0.

[Hint. For z = 1, the equation 3x − 2y + 1 = 0 has values x = 1, y = 2 orx = 3, y = 5. Clearly, u = (1,2,1) and v = (3,5,1) are linearly independent.If V is the space of solutions of the equation, then dimV = 2; u and v form abasis of V . Using the Gram–Schmidt orthogonalization process 1√

6(1,2,1) and

1√21

(2,1,−4) form an orthonormal basis of V .]

12. Show that any orthogonal set of non-zero vectors in an inner product space V

is linearly independent.[Hint. Let B = {ui} be an orthogonal set of any non-zero vectors. Suppose

α1u1+α2u2+ · · · +αnun = 0. Then for any uj ,0= 〈0, uj 〉 = 〈α1u1+α2u2+· · · + αjuj + · · · + αnun,uj 〉 = αj 〈uj ,uj 〉 for j = 1,2, . . . , n.]

Remark A maximal orthonormal set in an inner product space V is called aHilbert Basis for V .

13. Let V be the vector space of real valued differentiable functions over R andn �= 0 be an integer. If D : V → V is the differential operator on V , show thatthe functions sinnx and cosnx are eigenvectors of D2.

[Hint. D2(sinnx) = −n2 sinnx ⇒ sinnx is an eigenvector of D2 corre-sponding to the eigenvalue −n2.]

14. Find the Jordan canonical form of the matrix

A=⎛

⎝0 1 0−4 4 0−2 1 2

⎠ .

Ans.:⎛

⎝2 0 00 2 10 0 2

⎠ .

15. If a quadratic surface is represented by q(x, y, z) = x2 + 2y2 + 2z2 + 2xy +2zx = 1, find its matrix.

[Hint. Consider the matrix

A=⎛

⎝1 1 11 2 01 0 2

associated with q . The eigenvalues of A are 0, 2, 3. Then q is reduced to 2u2+3v2 = 1. It represents an elliptic cylinder in R3.]

Page 357: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 343

16. Find all quadratic forms q(x, y) of rank 2 which are in canonical forms. Deter-mine the conic representing the equation q(x, y)= 1.

[Hint. rankq = 2 shows that the possible canonical forms of q are x2 +y2, x2 − y2 or −x2 − y2.]

17. Find the minimal polynomial of A= ( 2 22 −2

)over R.

[Hint. A2 = ( 8 00 8

) = 8I ⇒ A2 − 8I = 0 ⇒ A satisfies the polynomial

f (x) = x2 − 8. Let g(x) be a polynomial of degree 1 such that g(A) = 0.Then g(x) = a0 + a1x, a1 �= 0 and g(A) = a0I + a1A= 0⇒ A = bI , whereb=−a−1

1 a0 ⇒ a contradiction, since A is not in the form bI .]18. Let U,V and W be finite-dimensional vector spaces over F . If T : U →

V and S : V → W are linear transformations, show that rank(S ◦ T ) ≤min{rankT , rankS}.

[Hint. The dimension of a subspace ≤ dimension of the whole space ⇒dim Im(S ◦ T )≤ dim ImS. Hence rank(S ◦ T )≤ rankS.]

19. Show that a square matrix A is orthogonally diagonalizable iff A is symmetric.[Hint. A is orthogonally diagonalizable ⇒ ∃ an orthogonal matrix P such

that P−1AP = D (diagonal matrix). Again P tP = I = PP t ⇒ P−1 = P t .This implies A= PDP t . Hence At =A. The converse part is similar.]

20. Show that two similar matrices have the same minimal polynomial but its con-verse is not true.

[Hint. Let A and B be two similar matrices over F . Then there exists anon-singular matrix P of order n over F such that B = PAP−1. Let m(x)

and q(x) be the minimal polynomials of A and B , respectively. Hence B2 =BB = PA2P−1. By induction it follows that Bn = PAnP−1 for all positiveintegers n. Suppose m(x) = a0 + a1x + · · · + xt . Then m(A) = 0 and hencem(B) = a0I + a1B + · · · + Bt = Pm(A)P−1 = 0. Again by the property ofminimal polynomials, m(x)|q(x) and q(x)|m(x); and their leading coefficientsare both 1. Hence m(x)= q(x).

The converse is not true. The matrices A = ( 1 10 0

)and B = ( 0 1

1 1

)have the

same minimal polynomial x(x− 1). But rankA= 1 and rankB = 2⇒A is notsimilar to B by Proposition 8.6.4.]

21. Prove that any square matrix A, of order n, over a Euclidean domain F , isequivalent to a diagonal matrix of the form

S =

⎜⎜⎜⎜⎜⎜⎜⎜⎝

e1. . .

er

0. . .

0

⎟⎟⎟⎟⎟⎟⎟⎟⎠

,

called the Smith normal form of A in honor of H.J.S. Smith (1826–1883), whereeach ei is a divisor of ei+1, for i = 1,2, . . . , r − 1, where r = rankA.

[Hint. See Hazewinkel et al. (2011).]

Page 358: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

344 8 Vector Spaces

22. Let Mn(F) be the set of all n× n matrices over a field F . Then a matrix A inMn(F) is said to be triangular iff aij = 0 whenever i > j or aij = 0 wheneveri < j (i.e., iff all the entries below or above the main diagonal are 0). A matrixof this form is called triangular.

Let A ∈Mn(F) be a triangular matrix. Show that

(a) detA is the product of its diagonal entries;(b) if no entry on the main diagonal is 0, then A is invertible, otherwise A is

singular;(c) if A has all its characteristic roots in F , then there is a non-singular matrix

P in Mn(F) such that PAP−1 is a triangular matrix.

[Hint. See Theorem 6.4.1, Herstein (1964, p. 287).]23. Let V be a finite-dimensional vector space over F and T : V → V a linear

operator. A subspace U of V is said to be a T -invariant subspace of U iffT (U) ⊆ U and V is said to be a direct sum of (non-zero) T -invariant spacesV1,V2, . . . , Vr iff V = V1 ⊕ V2 ⊕ · · · ⊕ Vr and T (Vi)⊆ Vi , i = 1,2, . . . , r . LetTi be the restriction of T to the invariant subspace Vi of V for each i. Then T issaid to be decomposable into the operators Ti or T is said to be the direct sumof Ti ’s, denoted T = T1 ⊕ T2 ⊕ · · · ⊕ Tr .

Let V be a finite-dimensional vector space over F and T : V → V be linearoperator such that V = V1 ⊕ V2 ⊕ · · · ⊕ Vr , where each Vi is a T -invariantsubspace of V and T is the direct sum of T ′i s, where Ti is the restriction of T tothe invariant subspace Vi . Clearly, the eigenspace of T corresponding to eacheigenvalue is a T -invariant subspace of V .

Then the following statements are true:

(a) If χ(x) is the characteristic polynomial of T : V → V and χi(x) is the char-acteristic polynomial of Ti : Vi → Vi , then χ(x)= χ1(x)χ2(x) · · ·χr(x).

(b) If Ai is the matrix of Ti : Vi → Vi relative to some ordered basis Bi of Vi ,then V =A1 ⊕A2 ⊕ · · · ⊕Ar iff the matrix M of T relative to the orderedbasis B which is the union of Bi ’s arranged in the order B1,B2, . . . ,Br , isgiven by

M =

⎜⎜⎜⎝

A1 0 · · · 00 A2 · · · 0

. . .

0 0 · · · Ar

⎟⎟⎟⎠ (8.4)

(c) If m(x)= a0 + a1x + · · · + at−1xt−1 + xt is in F [x], then t × t matrix

⎜⎜⎜⎜⎜⎝

0 1 0 · · · 00 0 1 · · · 0

. . .

0 0 0 · · · 1−a0 −a1 −a2 · · · −at−1

⎟⎟⎟⎟⎟⎠

Page 359: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 345

is called the companion matrix of m(x), denoted by C(m(x)). If T :V → V has minimal polynomial m(x)= q1(x)t1 · · ·qr(x)tr over F , whereq1(x), q2(x), . . . , qr (x) are irreducible distinct polynomials in F [x], thenthere exists a basis B of V such that m(T )B is of the form

⎜⎜⎜⎝

M1M2

. . .

Mr

⎟⎟⎟⎠ , (8.5)

where each matrix Mi is of the form

Mi =⎛

⎜⎝C(q1(x))ti1

. . .

C(qi(x))tiri

⎟⎠ ,

where ti = ti1 ≥ ti2 ≥ · · · ≥ tiri . The matrix (8.5) of T is called the rationalcanonical form of T .

[Hint. See Corollary, Herstein (1964, p. 308).]

24. Show that every square matrix is similar to an upper triangular matrix over C.25. Let V be an n-dimensional vector space over F . V is said to be Noetherian (Ar-

tinian) iff it satisfies acc (bcc) for its subspaces. Show that V is both Noetherianand Artinian.

[Hint. Let U be a proper subspace of V , then dimU < dimV = n. Henceany proper ascending (descending) chain of subspaces of V can not containmore than n+ 1 terms.]

Exercises A (Objective Type) Identify the correct alternative(s) (there may bemore than one) from the following list:

1. Let V be the vector space of all real polynomials of degree at most 3. Define D :V → V be the differential operator defined by (D)(f (x))= f ′(x), where f ′ isthe derivative of f . Then matrix of D for the basis {1, x, x2, x3}, considered ascolumn vectors, is given by

(a)

⎜⎜⎝

0 1 0 00 0 2 00 0 0 30 0 0 0

⎟⎟⎠ ; (b)

⎜⎜⎝

0 0 0 01 0 0 00 2 0 00 0 3 0

⎟⎟⎠ ;

(c)

⎜⎜⎝

0 0 0 00 1 0 00 0 2 00 0 0 3

⎟⎟⎠ ; (d)

⎜⎜⎝

0 1 2 30 0 0 00 0 0 00 0 0 0

⎟⎟⎠ .

Page 360: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

346 8 Vector Spaces

2. Let V be the vector space of all symmetric matrices of order n×n (n≥ 2) withreal entries and trace equal to zero. If d is the dimension of V , then d is

(a)(n2 + n)

2− 1; (b)

(n2 − 2n)

2− 1;

(c)(n2 + 2n)

2− 1; (d)

(n2 − n)

2− 1.

3. For the quadratic form q = x2 − 6xy + y2,

(a) Rank of q is 3; (b) Signature of q is 1;(c) Rank of q is 2; (d) Signature of q is 0.

4. For a positive integer n, let Vn denote the space of all polynomials f (x) withcoefficients in R such that degf (x)≤ n, and let Bn denote the standard basis ofVn given by Bn = {1, x, x2, . . . , xn}. If T : V3 → V4 is the linear transformationdefined by T (f (x))= x2f ′(x)+ ∫ x

0 f (t) dt and A= (aij ) is the 5× 4 matrixof T with respect to standard bases B3 and B4, then

(a) a32 = 0 and a33 = 7

3; (b) a32 = 3

2and a33 = 0;

(c) a32 = 3

2and a33 = 7

3; (d) a32 = 0 and a33 = 0.

5. Let M be a 3× 3 matrix with real entries such that det(M)= 6 and the trace ofM is 0. If det(M + I )= 0, where I denotes the 3× 3 identity matrix, then theeigenvalues of M are

(a) 1,2,−3 (b) − 1,2,−3 (c) − 1,2,3 (d) − 1,−2,3.

6. If

M =⎛

⎝1 1 11 1 11 1 1

⎠ ,

then

(a) 0 and 3 are the only eigenvalues of M ;(b) M is positive semi definite;(c) M is not diagonalizable;(d) M is not positive definite.

7. Let the matrix

M =⎛

⎝40 −29 −11−18 30 −1226 24 −50

Page 361: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 347

have a non-zero complex eigenvalue λ. Which of the following numbers mustbe an eigenvalue of M?

(a) 20− λ (b) λ− 20 (c) λ+ 20 (d) − 20− λ.

8. A Jordan canonical form of the matrix

M =

⎜⎜⎝

0 0 0 −41 0 0 00 1 0 50 0 1 0

⎟⎟⎠

is

(a)

⎜⎜⎝

−1 0 0 00 1 0 00 0 2 00 0 0 −2

⎟⎟⎠ ; (b)

⎜⎜⎝

−1 1 0 00 −1 0 00 0 2 00 0 0 −2

⎟⎟⎠ ;

(c)

⎜⎜⎝

1 1 0 00 1 0 00 0 2 00 0 0 −2

⎟⎟⎠ ; (d)

⎜⎜⎝

−1 1 0 00 1 0 00 0 2 00 0 0 −2

⎟⎟⎠ .

9. For a given positive integer n, let Mn be the vector space of all n×n real matri-ces A= (aij ) such that aij = ars whenever i + j = r + s (i, j, r, s = 1, . . . , n).Then the dimension of Mn, as a vector space over R, is

(a) 2n+ 1 (b) n2 − n+ 1 (c) n2 (d) 2n− 1.

10. Let V the vector space of all symmetric matrices A = (aij ) of order n × n

(n≥ 2) with real entries, a11 = 0 and trace zero. Then dimension of V is

(a)(n2 + n− 4

)/2; (b)

(n2 − n+ 3

)/2;

(c)(n2 + n− 3

)/2; (d)

(n2 − n+ 4

)/2.

11. For a positive integer n, let Mn(R) be the vector space of all n× n real matri-ces and T :Mn(R)→Mn(R) be a linear transformation such that T (A) = 0,whenever A ∈Mn(R) is symmetric or skew-symmetric. Then the rank of T is

(a)n(n+ 1)

2(b) 0 (c) n (d)

n(n− 1)

2.

12. If S :R3 →R4 and T :R4 →R3 are two linear transformations such that T ◦S

is the identity transformation of R3, then

(a) S ◦ T is surjective but not injective;(b) S ◦ T is injective but not surjective;

Page 362: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

348 8 Vector Spaces

(c) S ◦ T is the identity map of R4;(d) S ◦ T is neither injective nor surjective.

13. If V is a 3-dimensional vector space over the field F3 = Z3 of three elements,then the number of distinct 1-dimensional subspaces of V is

(a) 13 (b) 15 (c) 9 (d) 26.

14. Which of the following statements is (are) correct?

(a) The eigenvalues of a unitary matrix are all equal to 1;(b) The eigenvalues of a unitary matrix are all equal to ±1;(c) The determinant of real orthogonal matrix is always ±1;(d) The determinant of real orthogonal matrix is always −1.

15. Let V be a vector space of dimension d <∞, over R. Let U be a vector sub-space of V . Let S be a non-empty subset of V . Which of the following state-ments is (are) correct?

(a) If S is a basis of V , then U ∩ S is a basis of U ;(b) If U ∩ S is a basis of U and {s +U ∈ V/U : s ∈ S} is a basis of V/U , then

S is a basis of V ;(c) If dimU = n, then dimV/U is d − n;(d) If S is a basis of U as well as V , then the dimension of U is d .

16. Let V be the inner product space consisting of linear polynomials, f : [0,1]→R (i.e., V consists of polynomials of the form f (x)= ax+b, a, b ∈R), with theinner product defined by 〈f,g〉 = ∫ 1

0 f (x)g(x) dx for f,g ∈ V . An orthogonalbasis of V is then

(a) {1, x}; (b)

{1, x − 1

2

};

(c){1, (2x − 1)

√3}; (d) {1, x

√3}.

17. If f (x) is the minimal polynomial of the 4× 4 matrix

M =

⎜⎜⎝

0 0 0 11 0 0 00 1 0 00 0 1 0

⎟⎟⎠ ,

then the rank of the 4× 4 matrix f (M) is

(a) 0 (b) 4 (c) 2 (d) 1.

18. Let a, b, c be positive real numbers such that b2 + c2 < a < 1 and M be thematrix given by

M =⎛

⎝1 b c

b a 0c 0 1

⎠ .

Page 363: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 349

Then

(a) M can have a positive as well as a negative eigenvalue;(b) all the eigenvalues of M are positive numbers;(c) all the eigenvalues of M are negative numbers;(d) eigenvalues of M can be non-real complex number.

19. If f : Rn → R is a linear map such that f (0, . . . ,0) = 0, then the set{f (x1, x2, . . . , xn) :∑n

j=1 x2j ≤ 1} is

(a) [0, a] for some a ∈R, a ≥ 0;(b) [0,1];(c) [−a, a] for some a ∈R, a ≥ 0;(d) [a, b] for some a, b ∈R,0≤ a < b.

20. Let the system of equations

x + y + z= 1

2x + 3y − z= 5

x + 2y − kz= 4

where k ∈R, have an infinite number of solutions. Then the value of k is

(a) 2 (b) 1 (c) 0 (d) 3.

21. Let A = (aij ) be an n × n complex matrix and let A∗ denote the conjugatetranspose of A. Which of the following statements are necessarily true?

(a) If tr(A∗A) �= 0, then A is invertible;(b) If A is invertible, then tr(A∗A) �= 0 i.e., the trace of A∗A is non-zero;(c) If tr(A∗A)= 0, then A is the zero matrix;(d) If | tr(A∗A)|< n2, then |aij |< 1 for some i, j .

22. For a given positive integer n, let V be an (n+1)-dimensional vector space overR with a basis B = {e1, e2, . . . , en+1}. If T : V → V is the linear transformationsuch that T (ei)= ei+1 for i = 1,2, . . . , n and T (en+1)= 0, then

(a) nullity of T is 1;(b) rank of T is n;(c) trace of T is non-zero;(d) T n = T ◦ T ◦ · · · ◦ T is the zero map.

23. Let M be a 3 × 3 non-zero matrix with the property M3 = 0. Which of thefollowing statements is (are) false?

(a) M has one non-zero eigenvector;(b) M is similar to a diagonal matrix;(c) M is not similar to a diagonal matrix;(d) M has three linearly independent eigenvectors.

24. If T is a linear transformation on the vector space Rn over R such that T 2 = λT

for some λ ∈R, then

Page 364: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

350 8 Vector Spaces

(a) T = λI where I is the identity transformation on Rn;(b) if ‖T x‖ = ‖x‖ for some non-zero vector x ∈Rn, then λ=±1;(c) ‖T x‖ = |λ‖|x‖ for all x ∈Rn;(d) if ‖T x‖ > ‖x‖ for some non-zero vector x ∈ Rn, then T is necessarily

singular.

25. Let M be the 3× 3 real matrix all of whose entries are 1. Then:

(a) M is positive semidefinite, i.e., 〈Mx,x〉 ≥ 0 for all x ∈R3;(b) M is diagonalizable;(c) 0 and 3 are the only eigenvalues of A;(d) M is positive definite, i.e., 〈Mx,x〉> 0 for all x ∈R3 with x �= 0.

26. Let T :R7→R7 be the linear transformation defined by T (x1, x2, . . . , x6, x7)=(x7, x6, . . . , x2, x1). Which of the following statements is (are) correct?

(a) There is a basis of R7 with respect to which T is a diagonal matrix;(b) T 7 = I ;(c) The determinant of T is 1;(d) The smallest n such that T n = I is even.

27. Let A be an orthogonal 3× 3 matrix with real entries. Which of the followingstatements is (are) false?

(a) The determinant of A is a rational number;(b) All the entries of A are positive;(c) d(Ax,Ay)= d(x, y) for any two vectors x and y ∈ R3, where d(u, v) de-

notes the usual Euclidean distance between vectors u and v ∈R3;(d) All the eigenvalues of A are real.

28. Which of the following matrices is (are) non-singular?

(a) Every symmetric non-zero real 3× 3 matrix;(b) I +A where A �= 0 is a skew-symmetric real n× n matrix for n≥ 2;(c) Every skew-symmetric non-zero real 5× 5 matrix;(d) Every skew-symmetric non-zero real 2× 2 matrix.

29. Let A be a real symmetric n× n matrix whose only eigenvalues are 0 and 1.Let the dimension of the null space of A − I be m. Which of the followingstatements is (are) false?

(a) The characteristic polynomial of A is (λ− 1)mλm−n;(b) The rank of A is n−m;(c) Ak =Ak+1 for all positive integers k;(d) The rank of A is m.

30. Let ω be a complex number such that ω3 = 1, but ω �= 1. Suppose

M =⎛

⎝1 ω ω2

ω ω2 1ω2 ω 1

⎠ .

Page 365: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

8.13 Exercises 351

Which of the following statements is (are) correct?

(a) 0 is an eigenvalue of M ;(b) rank(M)= 2;(c) M is invertible;(d) There exist linearly independent vectors v,w ∈ C3 such that Mv =

Mw = 0.

31. M = (aij )n×n is a square matrix with integer entries such that aij = 0 for i > j

and aij = 1 for i = 1, . . . , n. Which of the following statements is (are) correct?

(a) M−1 exists and it has some entries that are not integers;(b) M−1 exists and it has integer entries;(c) M−1 is a polynomial function of M with integer coefficients;(d) M−1 is not a power of M unless M is the identity matrix.

32. Let M be a 4×4 real matrix such that−1,1,2,−2 are its eigenvalues. SupposeB =M4 − 5M2 + 5I , where I denotes the 4× 4 identity matrix. Which of thefollowing statements is (are) correct?

(a) trace of (M −B) is 0;(b) det(B)= 1;(c) det(M +B)= 0;(d) trace of (M +B) is 4.

33. Let M be a 2 × 2 non-zero complex matrix such that M2 = 0. Which of thefollowing statements is (are) correct?

(a) PMP−1 is a diagonal matrix for some invertible 2× 2 matrix P with en-tries in R;

(b) M has only one eigenvalue in C with multiplicity 2;(c) M has two distinct eigenvalues in C;(d) Mv = v for some v ∈C2, v �= 0.

34. Let M2(R) denote the set of 2× 2 real matrices. Let A ∈M2(R) be of trace 2and determinant −3. Identifying M2(R) with R4, consider the linear transfor-mation T :M2(R)→M2(R) defined by T (M)=AM . Which of the followingstatements is (are) correct?

(a) T is invertible;(b) 2 is an eigenvalue of T ;(c) T is diagonalizable;(d) T (B)= B for some 0 �= B in M2(R).

35. Let λ,μ be two distinct eigenvalues of a 2×2 matrix M . Which of the followingstatements is (are) correct?

(a) M3 = λ3−μ3

λ−μM − λμ(λ+μ)I ;

(b) M2 has distinct eigenvalues;(c) trace of Mn is λn +μn for every positive integer n;(d) Mn is not a scalar multiple of identity for any positive integer n.

Page 366: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

352 8 Vector Spaces

36. Let T be a non-zero linear transformation on a real vector space V of dimen-sion n. Let the subspace V0 ⊂ V be the image of V under T . Let k = dimV0 < n

and suppose that for some λ ∈R, T 2 = λT . Then

(a) λ= 1;(b) λ is the only eigenvalue of T ;(c) detM = |λ|, where M is a matrix representation of T ;(d) there is a non-trivial subspace V1 ⊂ V such that T x = 0 for all x ∈ V1.

37. Let M be a n × n real matrix and V be the vector space spanned by {I,M,

M2, . . . ,M2n}. Then the dimension of the vector space V is

(a) at most n (b) n2 (c) 2n (d) at most 2n.

38. Let A and B be two real square matrices of order n. Then

(a) trace(A+B) < trace(A)+ trace(B);(b) trace(A+B) > trace(A)+ trace(B);(c) trace(A+B)= trace(A)+ trace(B);(d) trace(A+B) �= trace(At )+ trace(Bt ).

39. Let A and B be two real square matrices of order n. Then

(a) trace(AAt)= sum of all entries of A;(b) trace(AAt)= sum of all diagonal entries of A;(c) trace(AB)= trace(BA);(d) trace(AAt)= 0 does not imply that A is a null matrix.

Exercises B (True/False Statements) Determine the correct statement from thefollowing list:

1. Cardinalities of all bases of a vector space are the same.2. If V is a finite-dimensional vector space and U is a subspace of V with dimV =

dimU , then U may not be same as V .3. If V is a non-zero vector in R2, then the subspace V = {rv : r ∈ R} represents

geometrically a straight line passing through the origin in R2.4. Let M2(R) be the vector space of all 2× 2 matrices over R and S be the set of

all symmetric matrices in M2(R). Then dimS = 4.5. The map T : R2 → R1 defined by T (x, y)= sin(x + y) is a linear transforma-

tion.6. Let V be an n-dimensional vector space and T : V → U be linear transforma-

tion. Then T is injective iff rank of T = n.7. The real vector space C([0,1]) is a commutative real algebra with identity.8. Let A be an algebra with identity 1 over a field F . Then A is isomorphic to a

subalgebra of the algebra L(V,V ) of all linear transformations from V to V .9. Let A be an n× n matrix over the field F . Then the row rank of A is equal to

the column rank of A.10. Let T : R2 → R2 be the rotation of the plane through an angle θ , 0 < θ < π .

Then T has no eigenvector.

Page 367: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 353

11. The matrix

A=⎛

⎝2 0 00 0 −10 1 0

is diagonalizable over C but not over R.12. The matrix

M =⎛

⎝4 −1 14 0 22 −1 3

is similar to the Jordan matrix⎛

⎝2 0 00 2 00 0 3

⎠ .

13. The orthogonal complement of the subspace V generated by the vector v =(2,3,4) in R3 is the plane 2x + 3y + 4z = 0 in R3 passing through the originand perpendicular to the vector v.

14. If U = {(x, y,0) ∈ R3}, then for any v = (r, t, s) ∈ R3, the coset v + U in R3

represents geometrically the plane parallel to xy-plane passing through the point(r, t, s) and at a distance |s| from the xy-plane.

15. For the quadratic form q(x)= x21 − 6x1x2 + x2

2 , rank is 2 and signature is 1.16. The matrix A= ( 1 2

2 1

)is positive definite but the matrix B = ( 2 1

1 2

)is not positive

definite.17. A symmetric matrix M is positive definite iff there exists a nonsingular ma-

trix P such that M = P tP .18. Let V be an n-dimensional inner product space over R. If T : V → V is positive

definite, then all eigenvalues of T are not necessarily positive.

8.14 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004, 2007; Artin1991; Birkhoff and Mac Lane 2003; Chatterjee 1966; Hazewinkel et al. 2011; Her-stein 1964; Hoffman and Kunze 1971; Hungerford 1974; Janich 1994; Lang 1986;Simmons 1963), for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Page 368: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

354 8 Vector Spaces

Adhikari, M.R., Adhikari, A.: Introduction to Linear Algebra with Applications to Basic Cryptog-raphy. Asian Books, New Delhi (2007)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Birkhoff, G., Mac Lane, S.: A Survey of Modern Algebra. Universities Press, Hyderabad (2003)Chatterjee, B.C.: Linear Algebra. Das Gupta and Company, Calcutta (1966)Hazewinkel, M., Gubareni, N., Kirichenko, V.V.: Algebras, Rings and Modules vol. 1. Springer,

New Delhi (2011)Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hoffman, K., Kunze, R.: Linear Algebra. Prentice-Hall, Englewood Cliffs (1971)Hungerford, T.W.: Algebra. Springer, New York (1974)Janich, K.: Linear Algebra. Springer, New York (1994)Lang, S.: Introduction to Linear Algebra. Springer, New York (1986)Simmons, G.F.: Introduction to Topology and Modern Analysis. McGraw-Hill, New York (1963)

Page 369: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 9Modules

The concept of a module arose through the study of algebraic number theory. Itbecame an important tool in algebra in the late 1920s essentially due to insight ofE. Noether, who was the first mathematician to realize its importance. A module isan additive abelian group whose elements are suitably multiplied by the elementsfrom some ring. Modules exist in any ring. One of the most important topics inmodern algebra is module theory. A module over a ring is a generalization of anabelian group (which is a module over Z) and also a natural generalization of a vec-tor space (which is a module over a division ring (field)). Many results of vectorspaces are generalized in some special classes of modules, such as free modules andfinitely generated modules over PID. Modules are closely related to the representa-tion theory of groups. One of the basic concepts which accelerates the developmentof the commutative algebra is the module theory, as modules play a central role incommutative algebra. Modules are also widely used in structure theory of finitelygenerated abelian groups, finite abelian groups and PID, homological algebra, andalgebraic topology. In this chapter we study the basic properties of modules. We alsoconsider modules of special classes, such as free modules, modules over PID alongwith structure theorems, exact sequences of modules and their homomorphisms,Noetherian and Artinian modules, homology and cohomology modules. Our studyculminates in a discussion of the topology of the spectrum of modules and rings withspecial reference to Zariski topology and schemes. In this chapter we also show howto construct isomorphic replicas of all homomorphic images of a specified abstractmodule.

9.1 Introductory Concepts

The notion of a module is a generalization of the concept of a vector space; wherethe scalars are restricted to lie in an arbitrary ring (instead of a field for a vectorspace). So, naturally, modules and vector spaces have some common properties butthey differ in many properties.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_9, © Springer India 2014

355

Page 370: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

356 9 Modules

Definition 9.1.1 Let R be a ring. A (left) R-module is an additive abelian group M

together with an action (called scalar multiplication) μ : R ×M →M (the imageμ(r, x) being denoted by rx) such that ∀r, s ∈R and x, y ∈M :

(i) r(x + y)= rx + ry;(ii) (r + s)x = rx + sx;

(iii) r(sx)= (rs)x.

Moreover, if R has an identity element 1,

(iv) if 1x = x ∀x ∈M , then M is said to be a unitary (left) R-module.

If R is a division ring, then a unitary (left) R-module is called a (left) vectorspace over R.

If R = Z, then an R module is merely an additive abelian group.A ring R itself can be considered as an R-module by taking scalar multiplication

to be the usual multiplication of R.

Remark If we write μ(r, x) as fr(x), then fr :M →M , x �→ rx is a group homo-morphism by (i) for each r ∈R.

If End(M) is the endomorphism ring of the additive abelian group M , then themap ψ :R→ End(M), r �→ fr is a ring homomorphism by (ii) and (iii).

Analogously, a (right) R-module or a unitary (right) R-module or a (right) vectorspace is defined by an action M ×R→M denoted by (x, r) �→ xr .

Proposition 9.1.1 Let M be a (left) R-module with additive identity OM . Then

(i) ORx = rOM =OM ∀r ∈R and x ∈M ;(ii) (−r)x =−(rx)= r(−x) ∀r ∈R and x ∈M ,

where OR is the additive identity of the ring R.

Proof Trivial. �

Remark A given additive abelian group M may have different R-module structures(both left and right). If R is commutative, then every left R-module M can be giventhe structure of a right R-module by defining

xr = rx ∀r ∈R, x ∈M.

From now on, unless specified otherwise, the ring R will mean a commutative ringwith identity 1 and R-module will mean a unitary (left) R-module.

Example 9.1.1 (i) Every additive abelian group G is a unitary Z-module with nx

(n ∈ Z, x ∈G) defined by

nx =⎧⎨

x + x + · · · + x (n times if n > 0)

0 (if n= 0)

−x − x − · · · − x (|n| times if n < 0).

Page 371: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.1 Introductory Concepts 357

(ii) An ideal I of a ring R is an R-module with ra (r ∈R, a ∈ I ) being the usualproduct in R. In particular, R is itself an R-module.

(iii) If R is a division ring F , then an R-module is called an F -vector space.(iv) If M is a ring and R is a subring of M , then M is an R-module with rx

(r ∈ R, x ∈M) being the usual multiplication in M . In particular R�x� and R[x]are R-modules.

(v) If I is an ideal of R, then I is an additive subgroup of R and R/I is an abeliangroup.

Clearly, R/I is an R-module with r(t + I )= rt + I ∀r, t ∈R.(vi) Let (M,+) be an abelian group and End(M) be the ring of all endomor-

phisms of (M,+). Taking R = End(M), M becomes an R-module under the exter-nal law of composition μ :R×M →M , defined by

μ(f,x)= f · x = f (x), ∀f ∈R and ∀x ∈M.

(vii) If R is a unitary ring and n is a positive integer, then the abelian group(Rn,+) (under componentwise addition) is a unitary R-module under the externallaw of composition μ :R×Rn→Rn, defined by

μ(r, x)= r · x = (rx1, rx2, . . . , rxn), ∀r ∈R and ∀x = (x1, x2, . . . , xn) ∈Rn.

In particular, if R = F is a field, then Fn is an F -vector space.(viii) Let R be a ring and (RN+ ,+) denote the abelian group of all mappings

f : N+ → R (i.e., of all sequences of elements of R) under addition defined by(f + g)(n)= f (n)+ g(n), ∀n ∈N+. Then RN+ is an R-module under the externallaw of composition μ :R×RN+ →RN+ , defined by

(μ(r,f )

)(n)= (r · f )(n)= rf (n), ∀n ∈N+.

(ix) Let Pn(x) denote the set of all polynomials of degrees ≤n with real coeffi-cients, then Pn(x) becomes a real vector space.

(x) Let M be a smooth manifold. Then C∞(M) = {f :M → R such that f isa smooth function} forms a ring. Then the set S of all smooth vector fields on M

forms a module over the ring C∞(M).(xi) Let V be an n-dimensional vector space over F and T : V → V be a fixed

linear operator. Then V is an F [x]-module under the external law of composition

F [x] × V → V, (f, v) �→ f (T )v.

We recall the definition of an algebra.

Definition 9.1.2 An algebra consists of a vector space V over a field F togetherwith a binary operation of multiplication on the set V of vectors, such that ∀r ∈ F

and x, y, z ∈ V the following conditions are satisfied:

(i) (rx)y = r(xy)= x(ry);(ii) (x + y)z= xz+ yz;

(iii) x(y + z)= xy + xz.

Page 372: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

358 9 Modules

If, moreover, (iv) (xy)z = x(yz), ∀x, y, z ∈ V , then V is said to be an associativealgebra over F .

If dimF (V ) = n as a vector space over F , then the algebra V is said to be n-dimensional.

Example 9.1.2 (i) Let G be a field extension of a field F . Then F is a subfieldof G and V =G is an associative algebra over F , where addition and multiplicationof elements of V are the usual field addition and multiplication in G, and scalarmultiplication by elements of F is again the usual field multiplication in G.

(ii) Let V be a vector space over a field F . Then the set L(V,V ) of all lineartransformations of V into itself is an algebra over F .

Definition 9.1.3 For a commutative ring R with identity, an R-algebra (or algebraover R) is a ring K such that

(i) (K,+) is a unitary (left) R-module;(ii) r(xy)= (rx)y = x(ry), ∀r ∈R, x, y ∈K .

Example 9.1.3 (i) Every ring R is a Z-algebra.(ii) Let R be a commutative ring with 1, then

(a) the group ring R(G) is an R-algebra with R-module structure r(∑

aixi) =∑(rai)xi , ∀r, ai ∈R and xi ∈G (see Ex. 10 of Exercises-I, Chap. 4).

(b) Mn(R), the ring of all square matrices of order n over R, is an R-algebra.

9.2 Submodules

We are interested to show how to construct isomorphic replicas of all homomorphicimages of a specified abstract module. For this purpose we introduce the conceptsubmodules which plays an important role in determining both the structure of amodule M and nature of homomorphisms with domain M .

Let M be an R-module. Then (M,+) is an abelian group. We now consider itssubgroups (N,+) which are stable under the external law of composition definedon the R-module M .

Definition 9.2.1 Let M be an R-module. A non-empty subset N of M is called anR-submodule or (simply) a submodule of M iff

(i) for x, y ∈N,x − y ∈N (i.e., (N,+) is a subgroup of (M,+));(ii) for x ∈N,r ∈R, rx ∈N (i.e., N is stable under the external law of composition

on M).

Thus a submodule N of M is closed under both restricted compositions of ad-dition and scalar multiplication (defined on M) on N . Clearly, {OM} and M aresubmodules of M in their own right, which are called trivial submodules of M .

Page 373: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.2 Submodules 359

Remark {OM } is the smallest submodule of M and M is the largest submoduleof M . If there exist any other submodules of M , then they are called non-trivialsubmodules of M . Any submodule of M other than M is called a proper submoduleof M .

Theorem 9.2.1 Let M be a unitary R-module. Then a non-empty subset N of M isa submodule of M iff for all a, b ∈R and x, y ∈N , ax + by ∈N .

Proof Let N be a submodule of the unitary R-module M . Then for a, b ∈ R andx, y ∈N , ax ∈N and (−by) ∈N and hence ax + by = ax − (−(by)) ∈N .

Conversely, let N be a non-empty subset of M such that for all a, b ∈ R and x,y ∈N , ax+by ∈N . Then 1R and−1R ∈R⇒ 1Rx+(−1R)y ∈N ⇒ x−y ∈N ⇒(N,+) is a subgroup of (M,+). Again OR ∈ R ⇒ ax +ORy = ax ∈ N ⇒ N isstable under external law of composition. Consequently, N is a submodule of M . �

Corollary Let M be a unitary R-module. Then a non-empty subset N of M is asubmodule of M iff

(i) x, y ∈N ⇒ x + y ∈N and(ii) a ∈R, x ∈N ⇒ ax ∈N .

Example 9.2.1 (i) If (G,+) is an abelian group, then G is a Z-module by Exam-ple 9.1.1(i). The submodules of the Z-module G are precisely the subgroups of G.In particular, E = {0,±2,±4, . . .} is a submodule of the Z-module Z.

(ii) Every ring R may be considered as a left R-module by Example 9.1.1(ii).Let I be a submodule of R. Then I ⊆R is such that x−y ∈ I and rx ∈ I , ∀x, y ∈ I

and ∀r ∈ R by Definition 9.2.1. Consequently, I is a left ideal of R. Conversely,let I be a left ideal of R. Then I ⊆ R is such that x − y ∈ I and rx ∈ I , ∀x, y ∈ I

and ∀r ∈ R. Thus I is a submodule of the left R-module R. Hence the submodulesof the left R-module R are just the left ideals of R. Consequently, the submodulesof the left R-module R are precisely the left ideals of R.

Likewise, considering R as a right R-module, the submodules of R are preciselythe right ideals of R.

(iii) Submodules of a commutative ring are precisely its ideals.

Most of the operations considered for groups have their counterparts for modules.

Theorem 9.2.2 Let M be an R-module and {Mi}i∈I be a family of submodulesof M . Then their intersection

⋂i∈I Mi is again a submodule of M .

Proof Let A=⋂i∈I Mi . Now OM ∈Mi for each i ∈ I , since every submodule Mi

is a subgroup of M ⇒OM ∈A⇒A �= ∅.Again x − y ∈Mi and rx ∈Mi for each i ∈ I and ∀x, y ∈Mi , ∀r ∈ R⇒ x − y,

rx ∈A⇒A is a submodule of M . �

Page 374: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

360 9 Modules

Remark The union of two submodules of an R-module M is not in general a sub-module of M . The reason is that union of two subgroups of a group is not in generala group. We now cite the following examples.

Example 9.2.2 (i) Let M1 = {0,±2,±4,±6, . . .} and M2 = {0,±3,±6,±9, . . .}.Then M1 and M2 are both submodules of the Z-module Z. Now 3 ∈M1 ∪M2 and2 ∈M1 ∪M2 but 3+ 2= 5 /∈M1 ∪M2. Hence M1 ∪M2 cannot be a submodule ofthe Z-module Z.

(ii) Let M1 = {(x,0) ∈ R2} and M2 = {(0, y) ∈ R2}. Then (1,0) ∈ M1 and(0,1) ∈M2 but (1,0)+ (0,1)= (1,1) /∈M1 ∪M2 ⇒M1 ∪M2 is not a subgroup ofR2 ⇒M1 ∪M2 cannot be a submodule of the Z-module R2.

Let M be an R-module. If M1 and M2 are submodules of M , then M1 ∩M2 isthe largest submodule of M contained in both M1 and M2.

The Theorem 9.2.3 leads to determine the smallest submodule containing a givensubset S (including the possibility of S = ∅) of an R-module M .

Definition 9.2.2 Let M be an R-module and S be a subset of M . Then the submod-ule generated or spanned by S denoted by 〈S〉 is defined to be the smallest submod-ule of M containing S, i.e., 〈S〉 is the submodule of M obtained by the intersectionof all submodules Mi of M containing S.

To determine the elements of 〈S〉, we introduce the concept of linear combina-tions of elements of S as defined in vector spaces.

Definition 9.2.3 Let M be an R-module and S �= ∅ be a subset of M . Then anelement x ∈M is said to be a linear combination of elements of S iff ∃x1, x2, . . . ,

xn ∈ S and r1, r2, . . . , rn ∈R such that

x =n∑

i=1

rixi, (9.1)

Let C(S) denote the set of all linear combinations of elements of S in the form (9.1).

Theorem 9.2.3 Let M be a unitary R-module and S be a subset of M . Then thesubmodule 〈S〉 generated by S is given by

〈S〉 ={ {OM} if S = ∅;

C(S) if S �= ∅,where

C(S)={ ∑

finite sum

rixi : ri ∈R, xi ∈ S

}.

Proof If S = ∅, then the smallest submodule of M containing S is the zero submod-ule {OM}. Hence 〈S〉 = {OM} if S = ∅. Next suppose that S �= ∅. Then C(S) �= ∅,

Page 375: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.2 Submodules 361

since 1R ∈R and for x ∈ S, x = 1Rx ∈ C(S). Hence S ⊆ C(S). We claim that C(S)

is a submodule of M . Let x, y ∈ C(S). Then x =∑ni=1 rixi and y =∑m

i=1 tiyi forsome ri , ti ∈ R and xi, yi ∈ S. Hence x + y =∑n

i=1 rixi +∑mi=1 tiyi ∈ C(S) and

rx = r(r1x1 + r2x2 + · · · + rnxn) = (rr1)x1 + (rr2)x2 + · · · + (rrn)xn ∈ C(S)⇒C(S) is a submodule of M containing S. Finally, let N be a submodule of M suchthat S ⊆N . If x ∈ C(S), then x can be represented as x =∑n

i=1 rixi , ri ∈R, xi ∈ S.Now xi ∈ S ⇒ xi ∈ N ⇒ rixi ∈ N , ∀i ⇒∑n

i=1 rixi ∈ N , since N is a submoduleof M ⇒ x ∈ N ∀x ∈ C(S)⇒ C(S) ⊆ N ⇒ C(S) is the smallest submodule of M

containing S. Again 〈S〉 is also the smallest submodule of M containing S. Conse-quently, 〈S〉 = C(S), if S �= ∅. �

Remark If the ring R does not contain the identity element, then

〈S〉 ={ ∑

finite sum

(ni + ri)xi if S �= ∅, where ni ∈ Z, ri ∈R and xi ∈ S

}.

Definition 9.2.4 An R-module M is said to be generated by a subset S iff M = 〈S〉and S is said to be set of generators of M .

In particular, if S = {x1, x2, . . . , xn} is a finite subset of M such that M = 〈S〉,then M is said to be finitely generated by S and hence if M is a unitary R-module,then

M ={

n∑

i=1

rixi : ri ∈R

}.

If S = {x}, then 〈{x}〉 = 〈x〉, the submodule generated by {x} is given by

〈x〉 ={{rx : r ∈R} if M is a unitary R-module

{rx + nx : r ∈R, n ∈ Z}, otherwise.

〈x〉 is called the cyclic submodule of M generated by x ∈M .Thus a unitary R-module M is finitely generated iff M =M1 +M2 + · · · +Mn,

where each Mi is cyclic i.e., Mi =Rxi, i = 1,2, . . . , n and M1 +M2 + · · · +Mn isthe sum of submodules of M (see Definition 9.2.10). Then {x1, x2, . . . , xn} is a setof generators for M .

Definition 9.2.5 Let M be an R-module. A subset S of M is said to be linearlydependent over R iff there exist distinct elements x1, x2, . . . , xn ∈ S and elementsr1, r2, . . . , rn (not all zero) in R such that r1x1+r2x2+· · ·+rnxn =OM . Otherwise,S is said to be linearly independent over R.

Remark (i) {OM} and any subset S (of M) containing OM are linearly dependentover R.

(ii) If S is linearly dependent over R and T is any subset of M such that S ⊆ T ,then T is also linearly dependent over R, i.e., any subset containing a linearly de-pendent set is also linearly dependent.

Page 376: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

362 9 Modules

(iii) If S is linearly independent over R and T is any subset of M such that T ⊆ S,then T is also linearly independent over R, i.e., any subset contained in a linearlyindependent set is also linearly independent.

Definition 9.2.6 Let M be an R-module. A submodule N (�=M) of M is said tobe maximal iff for a submodule P of M such that N ⊆ P ⊆M , either P = N orP =M , i.e., there is no submodule P of M satisfying N � P � M .

Definition 9.2.7 A submodule N (�={OM}) of M is said to be minimal iff for asubmodule P of M such that P ⊆ N , either P = {OM} or P = N , i.e., the onlysubmodules of M contained in N are {OM} and N .

Definition 9.2.8 A module M (�={OM}) is said to be simple iff the only submodulesof M are {OM} and M .

Theorem 9.2.4 Let M be a unitary R-module. Then M is simple iff for every non-zero element x ∈M , M =Rx = {rx : r ∈R}, i.e., iff M is generated by {x} for everyx �=OM in M .

Proof Let M be a simple unitary R-module. Then for x (�=OM) in M , x = 1Rx ∈Rx ⇒ Rx �= ∅. Next let rx, tx ∈ Rx, where r, t ∈ R. Then (rx + tx)= (r + t)x ∈Rx and r(tx)= (rt)x ∈Rx. Consequently, Rx is a submodule of M . Since for x �=OM , x = 1Rx ∈ Rx, Rx �= {OM}. Again, M being a simple R-module, Rx =M .Conversely, let Rx =M for every non-zero x ∈M . Suppose A �= {OM} is a sub-module of M . Then ∃ a non-zero element x in A such that Rx ⊆ A i.e., M ⊆ A.Since A⊆M , it follows that A=M . Consequently, M is a simple R-module. �

Corollary 1 If R is a unitary ring, then R is a simple R-module iff R is a divisionring.

Proof Let R be a unitary ring. Then R is a unitary module over itself. Hence byTheorem 9.2.4, R is a simple R-module iff R = Rx for every non-zero x ∈ R.Again 1R ∈ R = Rx⇒ 1R = yx for some y ∈ R⇒ x has a left inverse in R. Thusit follows that every non-zero x in R has an inverse in R (see Proposition 2.3.2 ofChap. 2). Consequently, R is a division ring. Conversely, let R be a division ring.Then {OM} and R are only ideals of R and these are the only submodules of theR-module R. Hence R is simple. �

Corollary 2 Let V be a vector space over a field F . Then for every non-zero x ∈ V ,the subspace Ux = {rx : r ∈ F } is simple. In particular, every F -vector space F issimple.

Theorem 9.2.5 Let M �= {OM} be a finitely generated R-module. Then each propersubmodule of M is contained in a maximal submodule of M .

Page 377: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.2 Submodules 363

Proof Similar to the proof of Theorem 5.3.6. �

Definition 9.2.9 Let M , N be (left) R-modules. Then their cartesian product M ×N is a (left) R-module under addition and scalar multiplication defined in the usualway:

(x, y)+ (s, t)= (x + s, y + t) and

r(x, y)= (rx, ry) ∀(x, y), (s, t) ∈M ×N and ∀r ∈R.

The R-module M ×N is called the direct product of R-modules M and N .

More generally, if {Mi}i∈I is any family of (left) R-modules, then M =∏i∈I Mi

is a (left) R-module in the usual way:

R×M →M,(r, (xi)i∈I

) �→ (rxi)i∈I .

The R-module M =∏i∈I Mi is called the direct product of {Mi}i∈I .In particular, R2 =R×R, . . . ,Rn =R×R×· · ·×R (n factors), R∞ =∏∞1 Ri .

Definition 9.2.10 Let M be an R-module and N1,N2 be submodules of M . ThenN1 + N2 = {n1 + n2 : n1 ∈ N1, n2 ∈ N2} is called the sum of the submodules N1and N2.

Proposition 9.2.1 Let M be an R-module and N1,N2 submodules of M . Then N1+N2 is the submodule generated by N1 ∪N2.

Proof OM ∈ N1 + N2 ⇒ N1 + N2 �= ∅. Let x, y ∈ N1 + N2. Then there ex-ist n1, n3 ∈ N1 and n2, n4 ∈ N2 such that x = n1 + n2 and y = n3 + n4. Nowx + y = (n1 + n2)+ (n3 + n4)= (n1 + n3)+ (n2 + n4) (by commutativity of + inM) and rx = rn1+rn2 ∈N1+N2 ∀x, y ∈N1+N2 and ∀r ∈R. Hence N1+N2 is asubmodule of M . We claim that N1∪N2 ⊆N1+N2 and N1+N2 is the smallest sub-module of M containing N1 ∪N2. Again n1 ∈N1 ⇒ n1 = n1 +ON2 ∈N1 +N2 ⇒N1 ⊆ N1 + N2. Similarly, N2 ⊆ N1 + N2. Consequently, N1 ∪ N2 ⊆ N1 + N2.Let N be the submodule of M generated by N1 ∪ N2 and let n1 + n2 ∈ N1 + N2,where n1 ∈N1 and n2 ∈N2. Hence N1 ∪N2 ⊆N ⇒ n1, n2 ∈N ⇒ n1+ n2 ∈N ⇒N1 + N2 ⊆ N ⇒ N1 + N2 is the smallest submodule of M containing N1 ∪ N2.Consequently, 〈N1 ∪N2〉 =N1 +N2. �

Corollary If N1 and N2 are submodules of M , then N1 +N2 is the smallest sub-module of M containing both N1 and N2.

The concept of sum N1 + N2 of two submodules of M can be generalized forany family {Ni}i∈I of submodules of M :

i∈I

Ni ={∑

i∈I

xi : xi ∈Ni, xi =OM except for finitely many i’s

}.

This is a submodule of M containing each Ni, i ∈ I .

Page 378: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

364 9 Modules

The submodule∑

i∈I Ni is called the sum of the family of submodules {Ni}i∈I .In particular, if I = {1,2, . . . , n}, then the submodule

∑ni=1 Ni = N1 + N2 +

· · · +Nn is called the sum of n submodules N1,N2, . . . ,Nn of M .We now proceed to define direct sum of two submodules of an R module in two

different equivalent ways.

Definition 9.2.11 Let M and N be (left) R-modules. Then P =M ×N is again a(left) R-module. The direct sum of the modules M and N denoted by M ⊕ N isdefined by

M ⊕N = {(x,ON)+ (OM,y) : x ∈M,y ∈N}= {(x, y) ∈ P : x ∈M,y ∈N

}.

Definition 9.2.12 Let M be an R-module and A, B be two submodules of M . ThenM is said to be the direct sum of A and B denoted by M =A⊕B iff M =A+B andA∩B = {OM}. If M =A⊕B , then A and B are called the direct summands of M .

Definition 9.2.12 leads to the following proposition.

Proposition 9.2.2 Let M be an R-module and A, B be its two submodules. ThenM =A⊕B iff every element x ∈M can be expressed uniquely as x = a+ b, a ∈A,b ∈ B .

Proof M =A⊕B⇔M =A+B and A∩B = {OM}. Then x ∈M can be expressedas x = a+ b, a ∈A, b ∈ B . If x = a+ b= c+ d , where a, c ∈A and b, d ∈ B , thena − c = d − b⇒ a − c ∈A and d − b ∈ B are such that a − c = d − b ∈ A ∩ B ={OM}⇒ a = c and d = b. The converse part is similar. �

Corollary Let M be an R-module and A, B be two submodules of M . Then A ∩B = {OM} iff every element x ∈ A + B can be expressed uniquely as x = a + b,where a ∈A and b ∈ B .

Definition 9.2.13 An R-module M is called the direct sum of a family of submod-ules {Mi}i∈I denoted by M =⊕i∈I Mi , iff M =∑i∈I Mi and every element x ∈M

can be expressed uniquely as x =∑i∈I xi , xi ∈Mi , xi = OM except for finitelymany i’s. A non-zero module M is said to be semisimple iff it can be decomposedinto a direct sum of a family of minimal submodules of M .

Clearly, a local ring is semisimple iff it is a division ring.

Remark 1 In general,⊕

i∈I Mi ⊆∏i∈I Mi . Equality holds iff I is a finite set.

Remark 2 Remark 1 shows that Definition 9.2.11 and Definition 9.2.12 are equiv-alent.

Definition 9.2.14 A submodule A of an R-module M is said to be a direct summandof M iff there exists a submodule B of M such that M =A⊕B . Such a submoduleB of M is called a supplement or complement of A in M .

Page 379: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.2 Submodules 365

Remark (i) Every subspace of an inner product space is a direct summand.(ii) Every submodule of a module is not in general a direct summand.(iii) If a submodule of a module M is a direct summand, its supplement in M

may not be unique.(iv) Consider the Z-module Z. A non-zero subgroup 〈n〉 of Z is not a direct

summand, because a supplement which is infinite cyclic should be isomorphic tothe quotient group Z/〈n〉 (#Zn), which is not possible.

(v) Consider the vector space R2 over R. Let l, m, n be three distinct lines in R2

through its origin (0,0). Then l, m, n are subspaces of R2 such that both m and n

are supplements of l in R2. Hence m �= n⇒ supplement of l is not unique.

Theorem 9.2.6 Let M be an R-module and s(M) be the set of all submodules ofM . Then s(M) is a modular lattice under set inclusion.

Proof Let M be an R-module and P , Q be submodules of M . Then P +Q is thesmallest submodule of M containing both P and Q, i.e., P ⊆ P + Q and Q ⊆P +Q. Again P ∩Q is the largest submodule of M contained in both P and Q,i.e., P ∩Q ⊆ P and P ∩Q ⊆Q. Thus in the set s(M) of all submodules of M ,partially ordered by set inclusion, every pair of elements P and Q has P +Q as lub(or supremum) and P ∩Q as glb (or infimum), i.e. their join P ∨Q= P +Q andmeet P ∧Q= P ∩Q. Hence s(M) is a lattice under set inclusion. Next we claimthat this lattice is modular. Let P , Q, N be submodules of M such that N ⊆ P .Then we prove that P ∩ (Q + N) = (P ∩Q) + N . Now N ⊆ P ⇒ P + N = P .Again, (P ∩Q)+N ⊆ P +N and (P ∩Q)+N ⊆Q+N ⇒ (P ∩Q)+N ⊆ (P +N)∩ (Q+N)= P ∩ (Q+N). To prove the reverse inclusion, let x ∈ P ∩ (Q+N).Then x ∈ P and x ∈Q+N . Hence ∃q ∈Q and n ∈N such that x = q + n. SinceN ⊆ P , we have n ∈ P and hence q = x− n ∈ P . Consequently, q ∈ P ∩Q. Hencex = q + n ∈ (P ∩Q)+N . Thus P ∩ (Q+N) ⊆ (P ∩Q)+N . Hence it followsthat P ∩ (Q+N)= (P ∩Q)+N . �

Definition 9.2.15 Let M be a (left) R-module and S be a non-empty subset of M .Then the annihilator of S in R denoted by Ann(S) is defined by

Ann(S)= {r ∈R : rx =OM, ∀x ∈ S}.

Proposition 9.2.3 Let M be a (left) R-module and S be a non-empty subset of M .Then

(a) Ann(S) is a left ideal of R;(b) if S is a submodule of M , then Ann(S) is a two-sided ideal of R.

Proof (a) ORx =OM , ∀x ∈ S⇒OR ∈Ann(S)⇒Ann(S) �= ∅. Let a, b ∈Ann(S).Then a, b ∈R and ax =OM = bx ∀x ∈ S. Hence (a−b)x =OM ∀x ∈ S⇒ a−b ∈Ann(S). Again (ra)x = r(ax) = rOM = OM , ∀x ∈ S, ∀r ∈ R ⇒ ra ∈ Ann(S),∀r ∈R. Consequently, Ann(S) is a left ideal of R.

Page 380: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

366 9 Modules

(b) Let S be a submodule of M . Then rx ∈ S, ∀r ∈ R and ∀x ∈ S. Hence fora ∈ Ann(S), a(rx) = OM ⇒ (ar)x = OM ∀x ∈ S ⇒ ar ∈ Ann(S)⇒ Ann(S) isalso a right ideal of R. Thus Ann(S) is a two-sided ideal of R by (a). �

Corollary 1 If M is an R- module, then I =Ann(M) (i.e., IM = 0) is a two-sidedideal of R.

Corollary 2 If R is a commutative ring with 1 and I =Ann(M) is a maximal idealof R, then M is a vector space over the field R/I .

Remark Let I = Ann(M). Then R/I is a ring, since I is a two-sided ideal of R

by (b). Define scalar multiplication R/I ×M →M , given by (r + I ) · x = rx.

Then M is both an R-module as well as an R/I module, but their scalar mul-tiplications on M coincide. Thus an R-module M is also an R/I -module and viceversa.

Exercise The intersection of all annihilators of all non-zero elements of a simpleR-module M is a two-sided ideal of R.

[Hint. Ann(M) is a two-sided ideal of R and⋂

OM �=x∈M Ann(x)=Ann(M).]

9.3 Module Homomorphisms

We continue in this section the study of submodules.Structure preserving mappings, called homomorphisms, play an important role

in group theory as well as in ring theory. It is an essential and basic task to extendthis concept to module theory.

Definition 9.3.1 Let M and N be (left) R-modules. A mapping f : M → N iscalled an R-homomorphism (or R-morphism) iff

(i) f (x + y)= f (x)+ f (y);(ii) f (rx)= rf (x) ∀x, y ∈M and ∀r ∈R.

In particular, if R is a field, then an R-homomorphism is as usual called a lineartransformation of vector spaces. Module homomorphisms of special character, carryspecial names, like special group homomorphisms.

Definition 9.3.2 Let f :M →N be an R-homomorphism for R-modules. Then f

is called an

(1) R-monomorphism iff f is injective;(2) R-epimorphism iff f is surjective;(3) R-isomorphism iff f is bijective;(4) R-endomorphism iff M =N , i.e., iff f is an R-homomorphism of M into itself;(5) R-automorphism iff M =N and f is an R-isomorphism of M onto itself.

Page 381: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.3 Module Homomorphisms 367

The existence of an R-isomorphism between R-modules M and N asserts thatM and N are, in a significant sense, the same, i.e., M and N have the same modulestructures. In that case we say that the R-modules M and N are R-isomorphic andwrite M ∼=N .

For the time being, if we forget the scalar multiplication on M , then f is con-sidered a group homomorphism f : (M,+)→ (N,+). Hence it preserves additivezero and additive inverse. More precisely:

Proposition 9.3.1 If f :M →N is an R-homomorphism, then f (OM)=ON andf (−x)=−f (x), ∀x ∈M .

Proof f (OM) = f (OM + OM) = f (OM) + f (OM) ⇒ f (OM) = ON . Againf (x)+ f (−x)= f (x + (−x))= f (OM)=ON ⇒ f (−x)=−f (x), ∀x ∈M . �

Definition 9.3.3 Let f :M → N be an R-homomorphism. Then kernel of f de-noted by kerf is defined to be the kernel of f as a group homomorphism f :(M,+)→ (N,+), i.e., kerf = {x ∈M : f (x)=ON } and the image of f denotedby Imf is the set Imf = f (M)= {f (x) : x ∈M}.

It follows from the definitions that

Proposition 9.3.2 Let f :M →N be an R-homomorphism. Then

(a) kerf is a submodule of M ;(b) f is an R-monomorphism iff kerf = {OM};(c) for a submodule A of M , f (A) is a submodule of N ;(d) Imf = f (M) is a submodule of N .

Remark (i) A necessary and sufficient condition for an R-homomorphism f :M →N to be an R-monomorphism is that kerf is as small as possible as a submodule ofM , namely, kerf = {OM}.

(ii) On the other hand, a necessary and sufficient condition for an R-homo-morphism f : M → N is an R-epimorphism is that Imf is as large as possibleas a submodule of N , namely, Imf =N .

Example 9.3.1 (i) Every homomorphism of abelian groups is a Z-module homo-morphism.

To show this let M and N be abelian groups. Then M and N are regarded asZ-modules. Let f :M → N be a group homomorphism. Then f (nx) = nf (x) byinduction on n ∈ N+. Clearly, f (nx) = nf (x), ∀n ∈ Z. Hence f is a Z-modulehomomorphism.

(ii) Let M be an R-module. Then the identity mapping 1M :M →M is an R-automorphism.

(iii) Let M be an R-module and n be a positive integer. Then the mapping pt :Mn →M , defined by pt(x1, x2, . . . , xt , . . . , xn) = xt is an R-epimorphism, calledthe t th projection mapping of Mn onto M ; on the other hand, the mapping it :M →

Page 382: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

368 9 Modules

Mn, defined by it (x) = (0,0, . . . , x, . . . ,0) is an R-monomorphism, called the t thinjection mapping, for t = 1,2, . . . , n, where x is at the t th position.

(iv) The mapping f :Mn(R)→ R, defined by f (A)= trace A, the trace of thesquare matrix A of order n over R, is an R-homomorphism.

(v) Let Sn(R)= {A ∈Mn(R) :A is symmetric}. Then the mapping f :Mn(R)→Sn(R), defined by f (A)=A+At is an R-epimorphism.

Like group homomorphisms, we can define the composite of R-homomorphismshaving the following properties:

Proposition 9.3.3 If f :M →N and g :N → P are R-homomorphisms, then theircomposite mapping g ◦ f :M → P , defined by (g ◦ f )(x) = g(f (x)), ∀x ∈M isalso an R-homomorphism satisfying the following properties:

(a) f and g are R-epimorphisms imply g ◦ f is also so;(b) f and g are R-monomorphisms imply g ◦ f is also so;(c) g ◦ f is an R-epimorphism implies g is also so;(d) g ◦ f is an R-monomorphism implies f is also so.

Proof For x, y ∈M and r ∈R, (g ◦ f )(x+ y)= g(f (x+ y))= g(f (x)+ f (y))=g(f (x)) + g(f (y)) = (g ◦ f )(x) + (g ◦ f )(y) and (g ◦ f )(rx) = g(f (rx)) =g(rf (x))= rg(f (x))= r(g◦f )(x). Hence g◦f :M → P is an R-homomorphism.

(a)–(d): Left as exercises. �

Proposition 9.3.4 Let M and N be R-modules and f : M → N be an R-homomorphism. Then for any submodule B of N , the set f−1(B) defined by

f−1(B)= {x ∈M : f (x) ∈ B}

is a submodule of M.

Proof f (OM)=ON ∈ B⇒OM ∈ f−1(B)⇒ f−1(B) �= ∅.Now x, y ∈ f−1(B)⇒ f (x), f (y) ∈ B ⇒ f (x − y)= f (x)− f (y) ∈ B , since

B is a submodule of N ⇒ x − y ∈ f−1(B). Similarly, for r ∈ R and x ∈ f−1(B),rx ∈ f−1(B). Consequently, f−1(B) is a submodule of M . �

Proposition 9.3.5 Let f :M →N be an R-homomorphism.

(a) If A is a submodule of M , then f−1(f (A))=A+ kerf ;(b) If B is a submodule of N , then f (f−1(B))= B ∩ Imf .

Proof (a) x ∈A⇒ f (x) ∈ f (A)⇒ x ∈ f−1(f (A))⇒A⊆ f−1(f (A)). Again y ∈kerf ⇒ f (y)=ON = f (OM) ∈ f (A)⇒ y ∈ f−1(f (A))⇒ kerf ⊆ f−1(f (A)).Since f−1(f (A)) is a submodule of M , it follows that A+ kerf ⊆ f−1(f (A)). Toobtain the reverse inclusion, let x ∈ f−1(f (A)). Then f (x) ∈ f (A) ⇒ f (x) =f (a) for some a ∈ A ⇒ f (x − a) = f (x) − f (a) = ON ⇒ x − a ∈ kerf ⇒x ∈ a + kerf ⊆ A + kerf ⇒ f−1(f (A)) ⊆ A + kerf . Hence it follows thatf−1(f (A))=A+ kerf .

Page 383: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.3 Module Homomorphisms 369

(b) a ∈ f (f−1(B))⇒ a = f (x) for some x ∈ f−1(B)⇒ f (x) ∈ B⇒ a ∈ B⇒f (f−1(B))⊆ B . Moreover, f (f−1(B))⊆ f (M)⇒ f (f−1(B))⊆ Imf . Hence itfollows that f (f−1(B)) ⊆ B ∩ Imf . For the reverse inclusion, let y ∈ B ∩ Imf .Then y ∈ B and y ∈ Imf . Now y ∈ Imf ⇒ y = f (m) for some m ∈M ⇒ f (m)=y ∈ B ⇒ m ∈ f−1(B)⇒ f (m) ∈ f (f−1(B))⇒ y ∈ f (f−1(B))⇒ B ∩ Imf ⊆f (f−1(B)). Hence it follows that f (f−1(B))= B ∩ Imf . �

Corollary (a) If f :M →N is an R-monomorphism and A is a submodule of M ,then f−1(f (A))=A;

(b) If f : M → N is an R-epimorphism and B is a submodule of N , thenf (f−1(B))= B .

Theorem 9.3.1 (Schur’s Lemma) Let M , N be R-modules. Then

(a) M is a simple R-module implies any non-zero R-homomorphism f :M → N

is an R-monomorphism;(b) N is a simple R-module implies any non-zero R-homomorphism f :M →N is

an R-epimorphism;(c) M is a simple R-module implies End(M) is a division ring.

Proof (a) kerf is a submodule of the R-module M . Hence M is simple⇒ kerf ={OM} or kerf =M . Since f is non-zero, kerf �=M . Hence kerf = {OM }⇒ f isan R-monomorphism.

(b) Imf is a submodule of N . Hence N is simple⇒ Imf =N or Imf = {ON }.Since f is non-zero, Imf �= {ON }. Hence Imf =N ⇒ f is an R-epimorphism.

(c) In particular, let f : M → M be a non-zero R-homomorphism. Hence M

is simple ⇒ f is an automorphism by (a) and (b) ⇒ f is invertible in the ringEnd(M)⇒ End(M) is a division ring. �

Definition 9.3.4 Let R be a commutative ring and M be an R-module. Then foreach a ∈R, ∃ an R-endomorphism fa :M →M , defined by fa(x)= ax, called thehomothecy defined by a.

Proposition 9.3.6 The set H = {fa : a ∈ R and fa is the homothecy defined by a}is a subring of the ring End(M).

Proof Consider the mapping ψ : R→ End(M), defined by ψ(a)= fa , where fa :M →M is defined by fa(x)= ax.

Then ψ(a+b)=ψ(a)+ψ(b) and ψ(ab)=ψ(a)ψ(b), ∀a, b ∈R⇒ψ is a ringhomomorphism⇒H =ψ(R) is a subring of End(M). �

Given an R-module M and an R-endomorphism f :M →M , can we express M

as the direct sum of Imf and kerf ? The solution of the following problem gives itsanswer.

Page 384: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

370 9 Modules

Problem Let f :M →M be an R-endomorphism such that f ◦ f = f . Is M =Imf ⊕ kerf true?

Solution kerf and Imf are both submodules of M ⇒ Imf + kerf ⊆M . We nowshow that Imf ⊕ kerf =M . For m ∈M , m= f (m)+ (m− f (m)). Again f (m−f (m))= f (m)− (f ◦ f )(m)= f (m)− f (m)=OM ⇒m− f (m) ∈ kerf ⇒m ∈Imf + kerf ⇒M ⊆ Imf + kerf . Hence M = Imf + kerf . Again x ∈ Imf ∩kerf ⇒ f (x) = OM and ∃y ∈ M such that x = f (y). Now f (f (y)) = f (x) =OM ⇒ (f ◦ f )(y) = OM ⇒ f (y) = OM ⇒ x = OM ⇒ Imf ∩ kerf = {OM}.Hence M = Imf ⊕ kerf .

9.4 Quotient Modules and Isomorphism Theorems

In this section we continue discussion of submodules and homomorphisms. Theconstruction of quotient modules is analogous to that of quotient groups.

We now prescribe a method of construction for new modules from the old ones.The most significant role played by submodules of a module is to yield other mod-ules known as quotient modules which are associated with the parent module in anatural way. Moreover, we prove isomorphism theorems for modules.

Let M be an R-module and N be a submodule of M . Then (N,+) is a normalsubgroup of the abelian group (M,+) and hence the quotient group (M/N,+) isalso an abelian group under the composition +, defined by

(x +N)+ (y +N)= (x + y)+N ∀x, y ∈M.

Definition 9.4.1 Given an R-module M and a submodule N of M , the abeliangroup (M/N,+) inherits an R-module structure from M :

R×M/N →M/N , defined by

(r, x +N) �→ rx +N, i.e., r · (x +N)= rx +N.

The R-module M/N is called the quotient module of M by N . The natural map π :M →M/N , defined by π(x)= x +N ∀x ∈M is an R-epimorphism with kerπ =N and is called the canonical R-epimorphism or natural R-homomorphism.

Theorem 9.4.1 (Correspondence Theorem) Let M be an R-module and N be asubmodule of M . Then there exists an inclusion preserving bijection from the sets(M) of all submodules of M containing N to the set s(M/N) of all submodulesof M/N .

Proof Let A ∈ s(M). Then A is a submodule of M such that N ⊆ A ⊆M . AgainA/N = {a + N : a ∈ A} is a submodule of M/N . We now define a mapping f :s(M)→ s(M/N) by

f (A)=A/N ∀A ∈ s(M).

Page 385: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.4 Quotient Modules and Isomorphism Theorems 371

Fig. 9.1 Commutativity ofthe triangular diagram

Fig. 9.2 Commutativity ofthe rectangular diagram

f is injective: Let A,B ∈ s(M) be such that f (A) = f (B). Then A/N =B/N ⇒ given a ∈ A, ∃b ∈ B such that a + N = b + N . Hence a − b ∈ N ⇒a − b = n for some n ∈ N . Thus a = b + n ∈ B , since B is a submodule of M

such that N ⊆ B . Hence A⊆ B . Similarly B ⊆A. Thus A= B⇒ f is injective.f is surjective: Let P ∈ s(M/N). Then P is a submodule of M/N . Consider

P ∗ = {x ∈M : x + N ∈ P }. Since P �= ∅,P ∗ �= ∅. Again ∀x ∈ N , x + N = 0 +N ∈ P ⇒∀x ∈ N , x ∈ P ∗ ⇒ N ⊆ P ∗. Clearly, P ∗ is a submodule of M such thatN ⊆ P ∗ ⇒ P ∗ ∈ s(M). We claim that f (P ∗) = P . Now x + N ∈ P ∗/N ⇔ x ∈P ∗ ⇔ x +N ∈ P ⇔ P ∗/N = P ⇒ f (P ∗)= P ⇒ f is surjective.

Consequently, f is a bijection. Finally, let A,B ∈ s(M) be such that A⊆ B . Nowa +N ∈ A/N ⇒ a ∈ A ⊆ B ⇒ a +N ∈ B/N ⇒ A/N ⊆ B/N ⇒ f (A) ⊆ f (B).Thus A⊆ B⇒ f (A)⊆ f (B). �

Corollary Any submodule of M/N is of the form A/N for some submodule A ofM such that N ⊆A.

Theorem 9.4.2 (Fundamental Homomorphism Theorem or First Isomorphism The-orem) Let M and N be R-modules and f : M → N be an R-homomorphismwith K = kerf . Then there exists a unique R-isomorphism f : M/K → Imf

such that f = f ◦ π , i.e., such that the diagram in Fig. 9.1 is commutative, whereπ :M �→M/K , x �→ x +K is the natural R-epimorphism.

Proof Similar to that of groups. �

Corollary (Epimorphism Theorem) Let f :M → N be an R-epimorphism of R-modules with kerf = K . Then there exists an R-isomorphism f :M/K → N ofR-modules.

Proof f is an R-epimorphism ⇒ f (M) = N ⇒ Imf = N ⇒ f is an R-iso-morphism by Theorem 9.4.2. �

Theorem 9.4.3 (Second Isomorphism Theorem or Isomorphism Theorem of Quo-tient of Quotient) Let M be an R-module and P , N be submodules of M suchthat P ⊆ N . Then N/P is a submodule of M/P and there exists a unique natu-ral R-isomorphism π :M/N →M/P/N/P such that the diagram in Fig. 9.2 is

Page 386: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

372 9 Modules

commutative, i.e., πN/P ◦ πP = π ◦ πN , where

πP :M →M/P, x �→ x + P ∀x ∈M,

πN :M →M/N, x �→ x +N ∀x ∈M, and

πN/P :M/P →M/P/N/P, y �→ y +N/P, ∀y ∈M/P.

Proof N is a submodule of M ⇒N �= ∅⇒N/P �= ∅. Now x+P,y+P ∈N/P ⇒x, y ∈ N ⇒ x + y ∈ N and rx ∈ N ∀r ∈ R⇒ (x + y)+ P ∈ N/P and rx + P ∈N/P ∀r ∈ R ⇒ N/P is a submodule of M/P . Define the natural mapping π :M/N →M/P/N/P by the rule

π(x +N)= (x + P)+N/P.

Now

x +N = y +N(x,y ∈M) ⇔ x − y ∈N

⇔ (x − y)+ P ∈N/P ⇔ (x + P)− (y + P) ∈N/P

⇔ (x + P)+N/P = (y + P)+N/P ⇔ π(x +N)= π(y +N).

Thus π is well defined and injective.Again for (x + P)+N/P ∈M/P/N/P , ∃ an element x +N ∈M/N such that

π(x +N)= (x + P)+N/P . Thus π is surjective. Hence π is a bijection. Finally,it is easy to show that π is an R-homomorphism. Consequently, π is a natural R-isomorphism.

Uniqueness of π : Let π :M/N →M/P/N/P be an R-isomorphism (by takingπ in place of π ) with commutating diagram in Fig. 9.2 i.e., π ◦ πN = πN/P ◦ πP .Then

π(x +N)= π(πN(x)

)= (π ◦ πN)(x)= (πN/P ◦ πP )(x)

= πN/P

(πP (x)

)= πN/P (x + P)= (x + P)+N/P

= π(x +N), ∀x +N ∈M/N

⇒ π = π ⇒ uniqueness of π. �

Theorem 9.4.4 (Third Isomorphism Theorem or Theorem of Quotient of Quotientof a sum) Let M be an R-module. If A and B are submodules of M , then

(i) the quotient modules A/A∩B and (A+B)/B are R-isomorphic and(ii) the quotient modules B/A∩B and (A+B)/A are R-isomorphic.

Proof (i) Define a mapping f :A/A∩B→ (A+B)/B by f (a+A∩B)= a+B .f is well defined: For a, x ∈ A, a + A ∩ B = x + A ∩ B ⇒ a − x ∈ A ∩ B ⊆

B⇒ a − x ∈ B⇒ a +B = x +B⇒ f is independent of the representative a.

Page 387: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.5 Modules of Homomorphisms 373

f is injective: f (a +A ∩B)= f (x +A ∩B)⇒ a +B = x + B ⇒ a − x ∈ B .Again a, x ∈A⇒ a − x ∈A. Hence a − x ∈A∩B⇒ a +A∩B = x +A∩B .

f is surjective: From the definition of f , it follows that f is surjective.Clearly, f is an R-homomorphism. Consequently, f is an R-isomorphism.(ii) Define a mapping g : B/A∩B→ (A+B)/A by g(b+A∩B)= b+A.Then as in (i), g is well defined and an R-isomorphism. �

9.5 Modules of Homomorphisms

In this section R denotes a commutative ring with 1R and HomR(M,N) denotesthe set of all R-homomorphisms from the R-module M to the R-module N . Wenow continue discussion of module homomorphisms and study the structure ofHomR(M,N).

Proposition 9.5.1 Let R be a commutative ring. Then for R-modules M and N ,HomR(M,N) is an R-module.

Proof For f,g ∈HomR(M,N), define f +g by the rule (f +g)(x)= f (x)+g(x),∀x ∈M . Then f +g :M →N is an R-homomorphism such that (HomR(M,N),+)is an abelian group. Define an external law of composition μ :R×HomR(M,N)→HomR(M,N) by μ(r,f )= rf , where rf :M →N is defined by (rf )(x)= rf (x)

∀x ∈M . The composition μ is well defined, because

(rf )(x + y)= r(f (x + y)

)= r(f (x)+ f (y)

)= rf (x)+ rf (y)

= (rf )(x)+ (rf )(y) ∀x, y ∈M and

(rf )(sx)= r(f (sx)

)= r(sf (x)

)= (rs)f (x)= (sr)f (x),

since R is commutative by hypothesis

= s(rf (x))= s(rf )(x) ∀x ∈M and ∀r, s ∈R.

Moreover, r(f + g) = rf + rg; (r + s)f = rf + sf and r(sf ) = (rs)f ∀r, s ∈ R

and ∀f,g ∈HomR(M,N). Consequently, HomR(M,N) is an R-module. �

Remark In absence of commutativity of R, HomR(M,N) fails to be an R-module.Thus the abelian group HomR(M,N) is not in general an R-module.

We now examine the particular case when N = R. We can endow HomR(M,R)

the structure of a right R-module as follows: (f + g)(x) = f (x) + g(x) ∀f,g ∈HomR(M,R) and ∀x ∈M ; μ : HomR(M,R) × R → HomR(M,R) is defined byμ(f, r)(x) = (f r)(x) = f (x)r ∀f ∈ HomR(M,R) and ∀r ∈ R. Then (f r)(x +y) = f (x + y)r = (f (x)+ f (y))r = f (x)r + f (y)r = (f r)(x) + f (r)y ∀x, y ∈M and (f r)(sx) = f (sx)r = sf (x)r = s(f r)(x) ∀x ∈ M and ∀r, s ∈ R. Hence

Page 388: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

374 9 Modules

the group homomorphism f r is indeed an R-homomorphism, and so belongs toHomR(M,R).

Definition 9.5.1 If M is a left R-module, then the dual module of M is the rightR-module Md = HomR(M,R). The elements of Md are called linear functionals(or linear forms) on M . Again we can obtain the dual of the right R-module Md ,which is the left R-module (Md)d . We call it the bidual of M and denote it by Mdd .

Proposition 9.5.2 Given a commutative ring R and a fixed R-module M , the R-homomorphism f :N → P induces

(a) an R-homomorphism f∗ : HomR(M,N)→ HomR(M,P ) defined by f∗(α) =f ◦ α ∀α ∈HomR(M,N);

(b) an R-homomorphism f ∗ :HomR(P,M)→HomR(N,M) defined by f ∗(β)=β ◦ f ∀β ∈HomR(P,M).

Proof (a) f∗(α + γ )= f ◦ (α + γ ) by definition.Now

(f ◦ (α + γ )

)(x)= f

((α + γ )(x)

)= f(α(x)+ γ (x)

)

= f(α(x))+ f

(γ (x))= (f ◦ α)(x)+ (f ◦ γ )(x)

= (f ◦ α + f ◦ γ )(x) ∀x ∈M

⇒ f ◦ (α + γ )= f ◦ α + f ◦ γ

⇒ f∗(α + γ )= f∗(α)+ f∗(γ ) ∀α,γ ∈HomR(M,N).

Similarly, f∗(rα) = rf∗(α) ∀r ∈ R, ∀α ∈ HomR(M,N). Hence f∗ is an R-homomorphism.

(b) Proceed as in (a). �

Corollary For the identity R-automorphism IN :N →N ,

(a) 1N∗ :HomR(M,N)→HomR(M,N) is the identity R-automorphism.(b) 1∗N :HomR(N,M)→HomR(N,M) is also the identity R-automorphism.

Proposition 9.5.3 Let R be a commutative ring and M , N , P be R-modules. Iff :M →N and g :N → P are R-homomorphisms, then for any R-module A,

(i) (g ◦f )∗ :HomR(A,M)→HomR(A,P ) is an R-homomorphism such that (g ◦f )∗ = g∗ ◦ f∗;

(ii) (g ◦f )∗ :HomR(P,A)→HomR(M,A) is an R-homomorphism such that (g ◦f )∗ = f ∗ ◦ g∗.

Proof (i) g ◦ f :M → P is an R-homomorphism ⇒ (g ◦ f )∗ : HomR(A,M)→HomR(A,P ) defined by (g ◦ f )∗(α) = (g ◦ f ) ◦ α is an R-homomorphism by

Page 389: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.6 Free Modules, Modules over PID and Structure Theorems 375

Proposition 9.5.2. Clearly for every a ∈ A, ((g ◦ f )∗(α))(a) = (g∗ ◦ f∗)(α)(a)⇒(g ◦ f )∗ = g∗ ◦ f∗.

(ii) Proceed as in (i). �

Corollary If f :M → N is an R-isomorphism, then for any R-module A, the in-duced R-homomorphisms

f∗ :HomR(A,M)→HomR(A,N) and f ∗ :HomR(N,A)→HomR(M,A)

are R-isomorphisms.

Proof f is an R-isomorphism ⇒ ∃ an R-homomorphism g : N → M such thatg ◦ f = 1M and f ◦ g = 1N . Hence (g ◦ f )∗ = 1M∗ ⇒ g∗ ◦ f∗ = 1M∗ by Corollaryto Proposition 9.5.2 and Proposition 9.5.3. Similarly, f∗ ◦ g∗ = 1N∗ , f ∗ ◦ g∗ = 1M∗and g∗ ◦ f ∗ = 1∗N . Hence f∗ and f ∗ are both R-isomorphisms. �

9.6 Free Modules, Modules over PID and Structure Theorems

In this section we consider a special class of modules which is the most naturalgeneralization of vector space and is also very important in the study of moduletheory.

Every vector space has a basis, which may be finite or not. But it fails for mod-ules over arbitrary rings. This leads to the concept of free modules, which may beconsidered as the most natural generalization of the concept of vector spaces. Freemodules play an important role in the theory of modules and widely used in al-gebraic topology. To extend many results of vector spaces, we also study in thissection finitely generated modules over principal ideal domains and finally provethe structure theorems.

From now we use the same symbol 0 to represent the zero element of R, zeroelement of M as well as zero module (unless there is confusion).

9.6.1 Free Modules

We now proceed to study free modules which are very important in the theory ofmodules and algebraic topology.

Definition 9.6.1 Let R be a ring with 1 and M be an R-module. A subset S of M

is said to be a basis of M iff S generates M and S is linearly independent over R. Inparticular, M is called cyclic iff M =Rx for some x ∈M .

Remark For a cyclic R-module M , there exists an R-epimorphism f :R→M suchthat R/kerf ∼=M . Because, M = Rx for some x ∈M and R-homomorphism f :

Page 390: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

376 9 Modules

R→M , r �→ rx is an R-epimorphism. In particular, if R is a PID, then kerf = 〈a〉for some a ∈ R and the cyclic R-module M is of the form R/〈a〉, where 〈a〉 =Ann (M).

Proposition 9.6.1 Let R be a ring with 1. A (left) R-module M is cyclic iff M isisomorphic to R/I for some left ideal I of R.

Proof M is cyclic⇒∃ some x ∈M such that M =Rx. Then the map f :R→M ,r �→ rx, is an R-epimorphism with kerf = I (say), which is a left ideal of R. HenceM ∼= R/I . Conversely, let M ∼= R/I for some left ideal I of R. Then M is cyclic,because R/I = 〈1+ I 〉. �

Proposition 9.6.2 An R-module M is the direct sum of submodules M1,M2, . . . ,Mn,denoted M =M1 ⊕M2 ⊕ · · · ⊕Mn iff

(a) M =M1 +M2 + · · · +Mn; and(b) Mi+1 ∩ (M1 +M2 + · · · +Mi)= 0, ∀i, 1≤ i ≤ n− 1.

Proof Left as an exercise. �

Definition 9.6.2 A cyclic R-module M =Rx is called free with a basis {x} iff everyelement y ∈M can be expressed uniquely as y = rx for some r ∈R.

Remark A cyclic R-module M =Rx is free with a basis {x} iff Ann(x)= 0.

Definition 9.6.3 An R-module M is said to be free on a finite basis iff

(a) M =M1 ⊕M2 ⊕ · · · ⊕Mn; and(b) each Mi is a free cyclic R-module.

If Mi =Rxi , then B = {x1, x2, . . . , xn} is called a basis of the free R-module M .

Remark Every element y of a free R-module M with a finite basis B = {x1, x2, . . . ,

xn} can be expressed uniquely as

y =n∑

i=1

rixi, ri ∈R.

This definition can be extended.

Definition 9.6.4 An R-module M is said to be free iff M has a basis.More precisely, M is said to be a free R-module with a basis B iff every element

x ∈M can be expressed uniquely as x =∑b∈B rbb, rb ∈ R and rb = 0 except forfinitely many b’s.

Proposition 9.6.3 If M and N are free R-modules, then M ⊕N is also a free R-module. In general, if {Mi} is any family of free R-modules Mi with basis Bi , then⊕

Mi is a free R-module with a basis B =⋃i∈I Bi .

Page 391: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.6 Free Modules, Modules over PID and Structure Theorems 377

Proof Let A be a basis of M and B be a basis of N . Then M ⊕ N has a basisA× {0} ∪ {0} ×B and hence M ⊕N is a free R-module.

The proof of the last part is left as an exercise. �

Example 9.6.1 (i) The zero module is a free module with empty basis.(ii) If R is a unitary ring, then as a module over itself R admits a basis B = {1}.(iii) If R is a unitary ring, then for any positive integer n, Rn is a free R-module

with a basis B = {ei}, where ei = (0,0, . . . ,1,0, . . . ,0),1 is at the ith place, i =1,2, . . . , n.

(iv) Every vector space V is a free module (over a field), since V has a basis.(v) M = Zn is not a free over Z, because Ann(x) �= {0} for every x (�=0) ∈ Zn.(vi) Any finite abelian group G (�=0) is not a free Z-module.

Remark The basis of a free module is not unique. For example, for a unitary ringR, R3 is a free R-module with different bases A= {(1,0,0), (0,1,0), (0,0,1)} andB = {(−1,0,0), (0,−1,0), (0,0,−1)}.

Theorem 9.6.1 Let R be a commutative ring with 1. Any two finite bases of a freeR-module M have the same number of elements.

Proof Let M be a free module with a basis {x1, x2, . . . , xn} and I be a maximalideal of R. Then R/I = F is field. Since V =M/IM is annihilated by I , V is avector space over F . If [xi] = xi + IM (1≤ i ≤ n), then B = {[x1], [x2], . . . , [xn]}is a basis of V over F . Since any two finite bases of a vector space have the samenumber of elements, the theorem follows. �

Definition 9.6.5 Let R be a commutative ring with 1. If a free R-module F has abasis with n elements, then n is called the rank of F , denoted rankF = n. In general,if F is free module with a basis B , then rankF = cardB .

Example 9.6.2 The R-module Rn in Example 9.6.1(iii) is a free module of rankn.

Remark Theorem 9.6.1 fails for modules over arbitrary rings i.e., for an arbitraryring R, a free R-module may have bases of different cardinalities.

For example, let V be a vector space of countably infinite dimension over a di-vision ring F and R = EndF (V ) = {f : V → V : f is a linear transformation}.Then R is a free module over itself with a basis {1

R}. Moreover, ∃ a basis Bn =

{f1, f2, . . . , fn} for R having |Bn| = n, for any given positive integer n, where thefi ’s are defined as follows:

Let B = {b1, b2, . . . , bn, . . .} be a countably infinite basis of V over F . Definef1, f2, . . . , fn by assigning their values on bi ’s is presented in Table 9.1.

Clearly, Bn is a basis of R over itself with cardBn = n �= 1.

Proposition 9.6.4 Let R be an integral domain and M be a free R-module of finiterankn. Then any (n+ 1) elements of M are linearly dependent over R.

Page 392: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

378 9 Modules

Table 9.1 Table defining the functions f1, f2, . . . , fn

f1 f2 f3 f4 · · · fn

b1 b1 0 0 0 · · · 0

b2 0 b1 0 0 · · · 0...

.

.

....

.

.

....

.

.

.

bn 0 0 0 0 · · · b1

bn+1 b2 0 0 0 · · · 0

bn+2 0 b2 0 0 · · · 0...

.

.

....

.

.

....

.

.

.

b2n 0 0 0 0 · · · b2

.

.

.

bmn+1 bm+1 0 0 0 · · · 0

bmn+2 0 bm+1 0 0 · · · 0...

.

.

....

.

.

....

.

.

.

b(m+1)n 0 0 0 0 · · · bm+1

.

.

....

.

.

....

.

.

....

Proof By hypothesis, M ∼= R⊕R⊕ · · · ⊕R (n-summands). Let Q(R)= F be thequotient field of R. Then M is embedded in F ⊕F ⊕· · ·⊕F (n-summands), whichis an n-dimensional vector space over F . Hence any (n + 1) elements of M arelinearly dependent over F . �

Remark Vector spaces over a field F are unitary F -modules. Free modules andvector spaces are closely related. They have many common properties but they differin some properties. Some of them are given now.

Like vector spaces it is not true that a linearly independent subset of a free modulecan always be extended to a basis.

For example, Z is a Z-module having {1} (also {−1}) as a basis. {3} is linearlyindependent over Z but Z �= 〈{3}〉.

Remark Like vector spaces it is not true that every subset S of a free module M

which spans M contains a basis for M .

For example, consider the Z-module Z. Let S = {p,q}, where p, q are inte-gers such that gcd(p, q) = 1 and they are not units. Then 1 = ap + bq , for somea, b ∈ Z ⇒ x = (xa)p + (xb)q ∀x ∈ Z ⇒ Z = 〈S〉. But S is linearly dependentover Z⇒ S is not a basis for Z.

Page 393: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.6 Free Modules, Modules over PID and Structure Theorems 379

Remark A finitely generated free module M may have a submodule which is neitherfree nor finitely generated.

For example, let F be a field and R = F [x1, x2, . . . , xn, . . .] which is a commu-tative ring with 1 (in infinite variables). Then M =R is a free module over R with abasis {1}. The submodules of M are precisely the ideals of R. Consider the ideal N

of all polynomials with constant term zero, i.e., N = 〈x1, x2, . . . , xn, . . .〉. Then N

is not finitely generated ⇒ N is not a principal ideal ⇒ N is not free, because theonly ideals of R which are free as R-modules are non-zero principal ideals.

Theorem 9.6.2 (a) {xi}i∈I is a basis of an R-module M iff M =⊕i∈I Rxi , whereRxi

∼=R for every i ∈ I .(b) An R-module M is free iff M is isomorphic to a direct sum of copies of R.

Proof (a) Let M = ⊕i∈I Rxi . Then every element x ∈ M can be expresseduniquely as x =∑i∈I Rxi , where Rxi = OM except for a finite number of Rxi ’s.Hence {xi} forms a basis of M ⇒M is a free R-module.

Conversely, let M be a free R-module with a basis {xi}. Then the mapping f :R→Rxi , defined by f (r)= rxi is an R-isomorphism.

Moreover, Rxi ∩ Rxj = {OM } if i �= j . Again Rxi ⊆ M ∀i ∈ I ⇒⊕Rxi ⊆M . Now x ∈M ⇒ x = r1xi1 + · · · + rnxin , where xit ∈ {xi}i∈I ⇒M ⊆⊕i∈I Rxi .Hence M =⊕i∈I Rxi , where Rxi

∼=R for each i ∈ I .(b) It follows from (a). �

Remark In view of Theorem 9.6.2, Definition 9.6.4 can be restated as follows:

Definition 9.6.6 A free R-module is one which is isomorphic to an R-module ofthe form

⊕i∈I Mi , where each Mi

∼=R (as an R-module).A finitely generated free R-module is therefore isomorphic to R ⊕ · · · ⊕ R

(n summands), which is denoted by Rn (R0 is taken to be the zero module denotedby 0).

Theorem 9.6.3 Let R be a ring with 1. Then M is a finitely generated R-moduleiff M is isomorphic to a quotient of Rn for some integer n > 0.

Proof Let x1, x2, . . . , xn generate M . Define f :Rn→M by

f (a1, a2, . . . , an)=n∑

〈i=1〉aixi .

Then f is an R-module homomorphism onto M . Hence M ∼= Rn/kerf by Theo-rem 9.4.2.

Conversely, let us have an R-module homomorphism f of Rn onto M . If ej = (0,

0, . . . ,1,0, . . . ,0) (1 ∈ R being in the j th place), then {ej } (1 ≤ j ≤ n) gener-ates Rn. Hence {f (ej )} (1≤ j ≤ n) generates M . �

Page 394: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

380 9 Modules

9.6.2 Modules over PID

Many results of modules are aimed to extend desirable results of vector spaces.For this purpose, we now consider finitely generated modules over principal idealdomains (PID). We now show that every submodule of a free module of finite rankis also a free module and it is possible to choose bases for the two modules whichare closely related in a simple way.

Theorem 9.6.4 Let R be a PID and M be a free module of finite rank r over R

and N be a non-zero submodule of M . Then there exists a basis {x1, x2, . . . , xr}of M and an integer t (1 ≤ t ≤ r) and non-zero elements a1, a2, . . . , at in R suchthat {a1x1, a2x2, . . . , atxt } is a basis of N and ai |ai+1, 1≤ i ≤ t − 1.

Proof Let f :M → R be an R-homomorphism. Then f (N) is an ideal of R⇒ ∃some element af (say) in R such that f (N)= 〈af 〉, since R is a PID. Consider theset S = {f (N) = 〈af 〉 such that f :M → R is an R-homomorphism}. If f = 0,then 〈af 〉 = 〈0〉 ∈ S ⇒ S �= ∅. Again R is Noetherian. Then the non-empty set S

of ideals of R, partially ordered by inclusion, has a maximal element. Hence ∃ amaximal element in S, i.e., ∃ an R-homomorphism g :M → R such that the idealg(N)= 〈ag〉 is not properly contained in any other element of S. Let for this g, a1 =ag and g(x)= a1 for some x ∈N . Then 〈a1〉 is a maximal element in S⇒ a1 �= 0.Let {y1, y2, . . . , yr} be a basis of M and if x =∑r

i=1 diyi , then πi :M →R, x �→ di

is the natural R-epimorphism. Hence it follows that a1|πi(x) ∀i. Then πi(x)= a1sifor some si ∈ R. Define x1 =∑r

i=1 siyi . Then a1x1 =∑ri=1 a1siyi = x ⇒ a1 =

g(x)= g(a1x1)= a1g(x1)⇒ g(x1)= 1, since a1 �= 0. Taking this element x1 as anelement in a basis for M and the element a1x1 as an element in a basis for N , weshow that

(i) M =Rx1 ⊕ kerg and (ii) N =Ra1x1 ⊕ (N ∩ kerg).To prove (i), let y ∈M . Then y = g(y)x1 + (y − g(y)x1).Now g(y − g(y)x1) = g(y)− g(y)g(x1) = g(y)− g(y)1 = 0⇒ y − g(y)x1 ∈

kerg⇒ y ∈Rx1 + kerg⇒M ⊆Rx1 + kerg.Again, rx1 ∈ kerg ⇒ 0 = g(rx1) = rg(x1) = r1 = r ⇒ Rx1 ∩ kerg = {0}.

Hence M =Rx1 ⊕ kerg.(ii) is proved similarly.We now prove the theorem by induction on t > 0, the rank of N .(ii)⇒ t = rankN = rank(Ra1x1)+ rank(N ∩kerg)⇒N ∩kerg is an R-module

of rank t − 1⇒N ∩ kerg is free by induction hypothesis ⇒N is a free R-moduleof rank t having the basis {a1x1} ∪ Bt−1, where Bt−1 is any basis of N ∩ kerg (byusing (ii)).

To prove the last part we use induction on r , the rank of M . Now (i) ⇒ rankkerg = r − 1⇒∃ a basis {x2, x3, . . . , xr} of kerg such that {a2x2, a3x3, . . . , atxt }is a basis of N ∩ kerg by induction hypothesis, for some elements a2, a3, . . . , at inR such that a2|a3| · · · |at . Consequently, (i) and (ii) show that {x1, x2, . . . , xr} is abasis of M and {a1x1, a2x2, . . . , atxt } is a basis of N .

Finally, maximality of 〈a1〉 in S⇒〈a2〉 ⊆ 〈a1〉⇒ a1|a2. �

Page 395: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.6 Free Modules, Modules over PID and Structure Theorems 381

9.6.3 Structure Theorems

We are now in a position to proceed to determine the structure of a finitely generatedmodule over a PID, in general and in particular, structure of a finitely generatedabelian group and finite abelian group. We show in the next theorem that everyfinitely generated module over a PID is isomorphic to the direct sum of finitelymany cyclic modules. This theorem is the main objective of this section. It is oftencalled fundamental theorem or structure theorem for finitely generated modules overprincipal ideal domains.

Theorem 9.6.5 (Structure Theorem) Let R be a PID and M be a finitely generatedR-module. Then

M ∼=r copies︷ ︸︸ ︷

R⊕R⊕ · · · ⊕R⊕R/〈q1〉 ⊕R/〈q2〉 ⊕ · · · ⊕R/〈qt 〉,for some integer r ≥ 0 and the non-zero non-unit elements q1, q2, . . . , qt of R suchthat q1|q2| · · · |qt , where qi ’s are unique up to units.

Proof Let B = {y1, y2, . . . , ym} be a minimal generating set of M . Then Rm is afree R-module of rankm. Define

f :Rm→M, (a1, a2, . . . , am) �→m∑

i=1

aiyi .

Then f is an R-epimorphism⇒M ∼=Rm/kerf (see Theorem 9.4.2).Again by Theorem 9.6.4 applied to Rm and its submodule kerf , ∃ a basis

{x1, x2, . . . , xm} of Rm such that {q1x1, q2x2, . . . , qtxt }, t ≤ m, is a basis of kerffor some non-zero non-units qi of R satisfying the divisibility relation q1|q2| · · · |qt .

Hence M ∼= Rm/kerf ⇒M ∼= (Rx1 ⊕ Rx2 ⊕ · · · ⊕ Rxm)/(Rq1x1 ⊕ Rq2x2 ⊕· · · ⊕Rqtxt ).

Consider the natural R-epimorphism

h :Rx1 ⊕Rx2 ⊕ · · · ⊕Rxm→R/〈q1〉 ⊕R/〈q2〉 ⊕ · · · ⊕R/〈qt 〉 ⊕Rm−t ,

(r1x1 + r2x2 + · · · + rmxm) �→ (r1 + 〈q1〉)+ (r2 + 〈q2〉

)+ · · · + (rt + 〈qt 〉)

+ (rt+1xt+1 + · · · + rmxm),

where qi divides ri, i = 1,2, . . . , t .

Then

kerh=Rq1x1 ⊕Rq2x2 ⊕ · · · ⊕Rqtxt ,

shows that

M ∼=Rm−t ⊕R/〈q1〉 ⊕ · · · ⊕R/〈qt 〉.If q is a unit, then R/〈q〉 = 0 and hence any such term will not appear in the aboveexpression.

Page 396: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

382 9 Modules

Taking m− t = r , we have M ∼=Rr ⊕R/〈q1〉 ⊕ · · · ⊕R/〈qt 〉. �

Remark We show a little later the invariance of r . If r = 0, M is said to be a torsionR-module.

Theorem 9.6.6 Let R be a PID and M be a torsion R-module, then M ∼=R/〈q1〉⊕R/〈q2〉 ⊕ · · · ⊕ R/〈qt 〉, where 〈q1〉, 〈q2〉, . . . , 〈qt 〉 are uniquely determined up tounits.

Proof Taking r = 0 in Theorem 9.6.5, let

M ∼=R/〈q1〉 ⊕R/〈q2〉 ⊕ · · · ⊕R/〈qt 〉∼=R/〈a1〉 ⊕R/〈a2〉 ⊕ · · · ⊕R/〈ak〉

where q1|q2| · · · |qt and a1|a2| · · · |ak .If x ∈ M , then x = x1 + x2 + · · · + xt , for some xi ∈ R/〈ai〉. For a prime p

in R, let M(p) = {x ∈M : px = 0}. Then M(p) is a vector space over the fieldF =R/〈p〉.

Now x ∈M(p)⇔ px = 0⇔ pxi = 0, ∀i⇔M(p) is the direct sum of the ker-nels of the multiplication by p in each component. Hence dimM(p) over F is thenumber of terms R/〈qi〉 for which p|qi .

If p|q1, then p|qi , ∀i. Again for the second decomposition of M , p must divideat least t of ai ’s. Hence t ≤ k. Similarly, k ≤ t . Hence t = k. Let qi = pbi , bi ∈ R

and 1≤ i ≤ t . Then

pM ∼= pR/〈pb1〉 ⊕ pR/〈pb2〉 ⊕ · ⊕ pR/〈pbt 〉∼=R/〈b1〉 ⊕R/〈b2〉 ⊕ · · · ⊕R/〈bt 〉, where b1|b2| · · · |bt .

By induction on the number of irreducible factors of q1, it follows that 〈b1〉, . . . , 〈bt 〉are determined uniquely up to units. Hence 〈q1〉, 〈q2〉, . . . , 〈qt 〉 are uniquely deter-mined up to units. �

Corollary 1 If M ∼= F(M)⊕ T (M), then T (M) is uniquely determined.

Remark The torsion part T (M) of M over a PID is unique but F(M) is not unique.Because different bases B and B ′ for M/T (M) give different free parts F and F ′(say). Then

M ∼= F(M)⊕ T (M) and M ∼= F ′(M)⊕ T (M)

⇒ F(M)∼=M/T (M)∼= F ′(M).

The Structure Theorem 9.6.5 can also be stated as follows:

Theorem 9.6.7 (Structure Theorem) Let R be a PID and M be a finitely generatedmodule over R. Then M can be expressed uniquely as

M ∼= F ⊕R/〈q1〉 ⊕R/〈q2〉 ⊕ · · · ⊕R/〈qt 〉,

Page 397: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.6 Free Modules, Modules over PID and Structure Theorems 383

where F is uniquely determined up to isomorphism called free part of module M

and q1, q2, . . . , qt are determined uniquely up to multiplication by units such thatq1|q2| · · · |qt .

Proof It follows from Theorem 9.6.6 and Corollary 1. �

In particular, for R = Z, the following structure theorem for finitely generatedabelian groups is obtained.

Corollary (Structure Theorem) Let G be a finitely generated abelian group. ThenG∼= F ⊕Zq1 ⊕Zq2 ⊕ · · · ⊕Zqt , q1|q2| · · · |qt , where F is a free abelian group andZqn is the cyclic group of order qn, 1≤ n≤ t . In particular, if G is a finite abeliangroup, then G is isomorphic to the direct sum of the qi -Sylow subgroups of G.

Definition 9.6.7 The rank of F is called the free rank or Betti number of M and theelements q1, q2, . . . , qt are called the invariant factors of M .

Remark Torsion modules M are precisely the modules of rank zero and Ann(M)=〈qt 〉. A torsion free module may not be free as a module. For example, the abeliangroup Q of rationals is torsion free over Z but not free over Z (see Ex. 12 of theWorked-Out Exercises).

Definition 9.6.8 Let R be a PID and M be a finitely generated R-module such thatAnn(M)= 〈e〉. Then e is called the exponent of M . It is unique up to units.

Existence of e: Let M = 〈x1, x2, . . . , xt 〉. Choose ri (�=0) ∈R such that rixi = 0.Then r =∏ ri �= 0. Hence rM = 0⇒Ann(M) �= 0⇒Ann(M)= 〈e〉, e (�=0) ∈R.

Proposition 9.6.5 Let R be a PID and M be a finitely generated torsion mod-ule over R with exponent e = ab, where a, b ∈ R and gcd(a, b) = 1. Then M =M1 ⊕M2, where M1 = {x ∈M : ax = 0} and M2 = {x ∈M : bx = 0}.

Proof gcd(a, b) = 1 ⇒ ∃m,n ∈ R such that ma + nb = 1 ⇒ x = max + nbx,∀x ∈M .

Again, b(max)= ab(mx)= emx = 0⇒max ∈M2.Similarly, nbx ∈M1. Consequently, M =M1 +M2.Again x ∈M1 ∩M2 ⇒ ax = 0= bx⇒max+ nbx = 0⇒ x = 0⇒M1 ∩M2 =

{0}. Hence M =M1 ⊕M2. �

Using the Chinese remainder theorem we now proceed to decompose further thecyclic modules in Theorem 9.6.5.

Theorem 9.6.8 Let R be a PID and M be a finitely generated R-module. Let M be anon-zero R-module with exponent e. If e= p

n11 p

n22 · · ·pnt

t is the unique factorization

Page 398: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

384 9 Modules

of e in R, then

M ∼=Rr ⊕R/⟨p

n11

⟩⊕R/⟨p

n22

⟩⊕ · · · ⊕R/⟨p

ntt

⟩,

where r ≥ 0 is an integer and pn11 ,p

n22 , . . . , p

ntt are positive powers of distinct

primes in R.

Proof For i �= j , 〈pni

i 〉 + 〈pnj

j 〉 = 〈1〉 = R, since gcd(pi,pj ) = 1 ⇒ the ideals

〈pni

i 〉 are pairwise co-prime, i = 1,2, . . . , t ⇒⋂i〈pni

i 〉 = 〈e〉, since e is the lcm ofp

n11 ,p

n22 , . . . , p

ntt ⇒R/〈e〉 ∼=R/〈pn1

1 〉 ⊕R/〈pn22 〉 ⊕ · · · ⊕R/〈pnt

t 〉, by the ChineseRemainder Theorem.

Hence the theorem follows from Theorem 9.6.5. �

Remark This isomorphism is also an isomorphism both as rings and R-modules.

Definition 9.6.9 Let R be a PID and M be a finitely generated R-module. Theprime powers p

n11 ,p

n22 , . . . , p

ntt are called the elementary divisors of M .

Theorem 9.6.9 (Primary Decomposition Theorem) Let R be a PID and M be anon-zero torsion R-module with exponent e.

If e= pn11 p

n22 · · ·pnt

t be the unique factorization in R and Mi = {x ∈M : pni

i x =0}, 1≤ i ≤ t , then M =M1 ⊕M2 ⊕ · · · ⊕Mt .

Proof Each Mi is a submodule of M such that the ideals 〈pni

i 〉 and 〈pnj

j 〉 are pair-wise co-prime for i �= j . Hence the theorem follows by applying Chinese RemainderTheorem for rings (see Ex. 34 of Exercises-I of Chap. 9). �

Definition 9.6.10 The submodule M(pi)= {x ∈M : pni

i x = 0} of M is called thepi -primary component of M , where pi is an elementary divisor of M .

Remark The concepts of elementary divisors of a finitely generated module M andthe invariant factors of the primary components M(pi) of T (M) coincide.

Theorem 9.6.10 Let R be a PID and p be a prime element in R and F be thefield R/〈p〉.(a) If M =Rn, then M/pM ∼= Fn.(b) If M =R/〈q〉 for a non-zero element q in R, then

M/pM ∼={

F, if p|q in R

0, otherwise.

(c) If M ∼=R/〈q1〉 ⊕R/〈q2〉 ⊕ · · · ⊕R/〈qt 〉, where p|qi , ∀i, then M/pM ∼= F t .

Proof (a) Consider the natural R-epimorphism

π :Rn→ (R/〈p〉)n, (a1, a2, . . . an) �→(a1 + 〈p〉, a2 + 〈p〉, . . . , an + 〈p〉

).

Page 399: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.7 Exact Sequences 385

Then kerπ = pRn. Hence Rn/pRn ∼= (R/〈p〉)n⇒M/pM ∼= Fn.(b) Left as an exercise.(c) Left as an exercise. �

Theorem 9.6.11 Let R be a PID. Then two finitely generated R-modules M1and M2 are

(a) isomorphic iff they have the same free rank and the same set of invariant factors;(b) isomorphic iff they have the same free rank and the same set of elementary

divisors.

Proof (a) If M1 and M2 have the same free rank and the same set of invariant factors,they are isomorphic. Conversely let M1 and M2 be isomorphic. Let rankM1 = n1and rankM2 = n2. Then M1 ∼=M2 ⇒ T (M1) ∼= T (M2)⇒M1/T (M1) ∼= Rn1 andM2/T (M2)∼=Rn2 . Hence Rn1 ∼=Rn2 . Let p (�=0) be prime in R. Then M/pRn1 ∼=M/pRn2 ⇒ Fn1 ∼= Fn2 as vector spaces over the field F =R/pR⇒ n1 = n2.

(b) If M1 and M2 have the same free rank and the same set of elementary divisors,then they are isomorphic. We now show that M1 and M2 have the same lists ofelementary divisors and invariant factors. To do so it is sufficient to consider theisomorphic torsion modules T (M1) and T (M2). So we assume that both M1 andM2 are torsion R-modules. By using (c) of Theorem 9.6.10, it is proved that the setof elementary divisors of M1 is the same as the set of elementary divisors of M2.Let q1, q2, . . . , qt be a set of invariant factors of M1 and a1, a2, . . . , ak be a set ofinvariant factors of M2. We can find a set of elementary divisors of M1 by taking theprime powers of q1, q2, . . . , qt . Then q1|q2| · · · |qt ⇒ qt is the product of the largestof the prime powers among the elementary divisors, qt−1 is the product of the primepowers among these elementary divisors when the factors of qt have been removed,and so on. Similarly, for a1|a2| · · · |at . Since the elementary divisors for M1 and M2are the same, it follows that their invariant factors are also the same. If M1 ∼=M2,then it follows that M1 and M2 have the same set of invariant factors and the sameset of elementary divisors. �

Corollary 1 Two finitely generated abelian groups are isomorphic iff they have thesame free rank (Betti number) and the same set of invariant factors.

Corollary 2 Two finitely generated abelian groups are isomorphic iff they have thesame free rank (Betti number) and the same set of elementary divisors.

9.7 Exact Sequences

Definition 9.7.1 A sequence of R-modules and their homomorphisms

· · · →Mn−1fn−→Mn

fn+1−→Mm+1 → ·· · (9.2)

is said to be exact at Mn iff Imfn = kerfn+1.

Page 400: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

386 9 Modules

The sequence (9.2) is exact iff it is exact at each Mn. In particular, an exactsequence of the form given in sequence (9.3),

0→M ′ f−→Mg−→M ′′ → 0 (9.3)

is called a short exact sequence.

Remark 1 Any long exact sequence (9.2) can be split into short exact sequences.

Remark 2 If f :M →N is a module homomorphism, then M/kerf is called co-image of f and is denoted by Coimf and to the contrary, N/ Imf called co-kernelof f is denoted by Cokerf .

Note that 0→Mf−→ N is an exact sequence of modules and their homomor-

phisms ⇔ f is a module monomorphisms and Ng−→ P → 0 is an exact sequence

of modules and their homomorphisms⇔ g is a module epimorphism.

If Mf−→ N

g−→ P is exact sequence of modules and their homomorphisms,then g ◦ f = 0.

Finally, if Mf−→ N

g−→ P → 0 is an exact sequence of modules and their ho-momorphisms, then Cokerf =N/ Imf =N/kerg = Coimg ∼= P .

Proposition 9.7.1 For any sequence of R-modules and their homomorphisms of theform (9.2) (not necessarily exact), fn+1 ◦ fn = 0 iff Imfn ⊆ kerfn+1 ∀ index n.

Proof Imfn ⊆ kerfn+1 ⇒ (fn+1 ◦ fn)(x)= fn+1(fn(x))=OMn+1 ∀x ∈Mn−1 ⇒fn+1 ◦ fn = 0.

Conversely, let fn+1 ◦ fn = 0. Now, for y ∈ Imfn, ∃ some x ∈Mn−1 such thaty = fn(x). Hence (fn+1 ◦fn)(x)= fn+1(fn(x))= fn+1(y). Thus fn+1 ◦fn = 0⇒fn+1(y)=OMn+1 ⇒ y ∈ kerfn+1 ⇒ Imfn ⊆ kerfn+1. �

Corollary If the sequence (9.2) is exact, then fn+1 ◦ fn = 0 for each index n.

Proof Exactness of (9.2)⇒ Imfn = kerfn+1 ⇒ Imfn ⊆ kerfn+1 ⇒ fn+1 ◦fn = 0by Proposition 9.7.1 for each index n. �

Remark The converse of the corollary is not true is general. Consider the three termsequence:

Zf−→ Z

g−→ Z3,

where Z and Z3 are Z-modules and f , g are defined by f (n)= 6n, g(n)= (n)mod 3,respectively.

Now for x ∈ Imf , ∃n ∈ Z such that x = f (n) = 6n. Hence g(x) = g(6n) =(6n)mod 3 = (0)mod 3 ⇒ x ∈ kerg⇒ Imf ⊆ kerg⇒ g ◦ f = 0. Now 3 ∈ kerg but3 /∈ Imf ⇒ kerg �= Imf ⇒ the sequence is not exact.

Page 401: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.7 Exact Sequences 387

Theorem 9.7.1 If f :M →N is an R-homomorphism, O→M denotes the inclu-sion map and N →O denotes zero R-homomorphism, then

(i) O→Mf−→N is exact⇔ f is an R-monomorphism;

(ii) Mf−→N →O is exact⇔ f is an R-epimorphism;

(iii) O→Mf−→N →O is exact⇔ f is an R-isomorphism.

Proof (i) O →Mf−→ N →O is exact ⇔ kerf = {O

M} ⇔ f is an R-monomor-

phism.

(ii) Mf−→N →O is exact⇔ Imf =N ⇔ f is an R-epimorphism.

(iii) follows from (i) and (ii). �

Corollary If the sequence O →Mf−→ N

g−→ P → O is exact, then f is an R-monomorphism g is an R-epimorphism and g induces an R-isomorphism.

g :N/f (M)→ P.

Proof The proof follows from Theorem 9.7.1 and the Epimorphism Theorem formodules. �

Example 9.7.1 (a) Let f : A→ B be a homomorphism of abelian groups. Theneach of the following sequences is a short exact sequence.

(i) O → kerfi−→ A

π−→ A/kerf → O , where i : kerf ↪→ A is the inclusionmap and π : A→ A/kerf is the canonical epimorphism defined by π(a) =a + kerf .

(ii) O → Imfi−→ B

π−→ B/ Imf −→ 0 , where i : Imf ↪→ B is the inclusionmap and π : B → B/ Imf is the canonical epimorphism defined by π(b) =b+ Imf .

(b) Let A be an R-module and B be a submodule of A. Then the sequence O→B

i−→ Aπ−→ A/B → O is exact, where i : B ↪→ A is the inclusion map and π :

A→A/B is the canonical R-epimorphism defined by π(a)= a +B .(c) Let A and B be R-modules and f : A → B be an R-homomorphism.

Then the sequence O → kerfi−→ A

f−→ Bπ−→ B/f (A)→ O is exact, where

i : kerf ↪→ A is the inclusion map and π : B → B/f (A) is the canonical R-epimorphism defined by π(b)= b+ f (A).

(d) Given R-modules A and B , there always exists at least one extension of B

by A.Is the extension of B by A unique for arbitrary modules A and B?[Hint. Consider the short exact sequence

0−−−→Af−−−−→A⊕B

g−−−−→ B −→ 0,

where f (a)= (a,0) and g(a, b)= b. Then A⊕B is an extension of B by A.

Page 402: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

388 9 Modules

For the second part, consider the short exact sequence by taking A= Z and B =Zn in first part and other by taking

0−→ Zfn−−−−−→ Z

g−−−−→ Zn −→ 0,

where fn : Z→ Z, x �→ nx and g is the natural projection.]

Definition 9.7.2 An exact sequence of R-modules and their homomorphisms of theform:

(a) Mf−→N →O is said to split iff ∃ an R-homomorphism g :N →M such that

f ◦ g = 1N ;

(b) O→Mf−→N is said to split iff ∃ an R-homomorphism h :N →M such that

h ◦ f = 1M .

Such R-homomorphisms g and h are called splitting R-homomorphisms.

Definition 9.7.3 A short exact sequence of R-modules and their homomorphisms

O→Nf−→M

g−→ P →O is said to split

(a) on the right iff Mg−→ P →O splits;

(b) on the left iff O→Nf−→M splits.

Theorem 9.7.2 Let O → Mf−→ N

g−→ P → O be an exact sequence of R-modules and their homomorphisms. Then the following statements are equivalent:

(a) the sequence splits on the right;(b) the sequence splits on the left;(c) Imf = kerg is a direct summand of N .

Proof (a) ⇒ (c). Let π : P → N be a right splitting R-homomorphism. Then g ◦π = 1P . We now consider kerg ∩ Imπ = A (say). If x ∈ A, then g(x) = Op andx = π(p) for some p ∈ P . Hence OP = g(x)= g(π(p))= (g ◦ π)(p)= 1P (p)=p⇒ x = π(p)= π(OP )=ON ⇒ A= {ON }. Again, for every y ∈N , g(y − (π ◦g)(y))= g(y)− (g ◦ π ◦ g)(y)= g(y)− (1P ◦ g)(y)= g(y)− g(y)=OP ⇒ y −(π ◦ g)(y) ∈ kerg, ∀y ∈N .

Now, y = (π ◦ g)(y)+ (y − (π ◦ g)(y)) ∈ Imπ + kerg ∀y ∈N ⇒N ⊆ Imπ +kerg. Again Imπ+kerg being a submodule of N , Imπ+kerg ⊆N . Consequently,N = Imπ ⊕ kerg⇒ Imf = kerg is a direct summand of N ⇒ (c).

(c) ⇒ (a). Let Imf = kerg be a direct summand of N . Then N = kerg⊕A forsome submodule A of N . Hence every n ∈ N has a unique representation as n =y+ a for some y ∈ kerg and some a ∈A. Consider the mapping ψ = g|A :A→ P .Then ψ is an R-isomorphism with inverse ψ−1 : P →A⇒ψ ◦ψ−1 = 1P ⇒ψ−1

is a right splitting R-homomorphism⇒ (a).Thus (a)⇔ (c).Similarly (b)⇔ (c). �

Page 403: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.7 Exact Sequences 389

Fig. 9.3 The Three Lemmadiagram

Fig. 9.4 The Four Lemmadiagram

Theorem 9.7.3 (The Three Lemma) Let the diagram in Fig. 9.3 of R-modules andtheir homomorphisms be commutative with two exact rows. Then

(i) α, γ , and h are R-monomorphisms⇒ β is an R-monomorphism;(ii) α, γ , and g are R-epimorphisms⇒ β is an R-epimorphism;

(iii) α, γ are R-isomorphisms, h is an R-monomorphism and g is an R-epimor-phism⇒ β is an R-isomorphism.

Proof Commutativity of the given diagram ⇒ h ◦ α = β ◦ f and k ◦ β = γ ◦ g.Again the exactness of the given rows⇒ Imf = kerg and Imh= kerk.

(i) b ∈ kerβ ⇒ β(b) = ON ⇒ k(β(b)) = k(ON)⇒ (k ◦ β)(b) = OP ⇒ (γ ◦g)(b)=OP ⇒ γ (g(b))=γ (OC)⇒ g(b)=OC , since γ is an R-monomorphism⇒b ∈ kerg = Imf ⇒ b = f (a) for some a ∈ A ⇒ β(b) = β(f (a)) ⇒ ON =(β ◦ f )(a) = (h ◦ α)(a) = h(α(a))⇒ h(OM) = h(α(a))⇒ OM = α(a), since h

is an R-monomorphism ⇒ α(OA) = α(a)⇒ OA = a, since α is an R-monomor-phism ⇒ f (OA) = f (a) ⇒ OB = b ⇒ kerβ = {OB} ⇒ β is an R-mono-morphism.

(ii) n ∈ N ⇒ k(n) ∈ P ⇒ k(n) = γ (c) for some c ∈ C, since γ is an R-epi-morphism ⇒ k(n) = γ (g(b)) for some b ∈ B , since g is an R-epimorphism ⇒k(n) = (γ ◦ g)(b) = (k ◦ β)(b) = k(β(b)) ⇒ k(n − β(b)) = OP ⇒ n − β(b) ∈kerk ⇒ n − β(b) ∈ Imh ⇒ n − β(b) = h(m) for some m ∈ M ⇒ n − β(b) =h(α(a)) for some a ∈A, since α is an R-epimorphism ⇒ n− β(b)= (h ◦ α)(a)=(β ◦f )(a)= β(f (a))⇒ n= β(b)+β(f (a))= β(b+f (a)). Thus for each n ∈N ,∃ an element b+ f (a) ∈ B such that n= β(b+ f (a))⇒ β is an R-epimorphism.

(iii) follows from (i) and (ii). �

Theorem 9.7.4 (The Four Lemma) Let the diagram in Fig. 9.4 of R-modules andR-homomorphisms be commutative with two rows of exact sequences.

Then

(i) α, γ are R-epimorphisms and δ is an R-monomorphism ⇒ β is an R-epi-morphism;

(ii) α is an R-epimorphism and β , δ are R-monomorphisms ⇒ γ is an R-mono-morphism.

Page 404: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

390 9 Modules

Fig. 9.5 The Five Lemmadiagram

Proof Commutativity of the given diagram ⇒ β ◦ f = f ′ ◦ α; γ ◦ g = g′ ◦ β andδ ◦ h = h′ ◦ γ . Again exactness of the given rows ⇒ Imf = kerg, Img = kerh,Imf ′ = kerg′, and Img′ = kerh′.

(i) b′ ∈ B ′ ⇒ g′(b′) ∈ C′ ⇒ g′(b′) = γ (c) for some c ∈ C, since γ is an R-epimorphism ⇒ h′(g′(b′))= h′(γ (c))⇒ (h′ ◦ g′)(b′)= (h′ ◦ γ )(c)⇒OD′ = (δ ◦h)(c)= δ(h(c)), since h′ ◦g′ = 0 by the corollary to Proposition 9.7.1.⇒ δ(OD)=δ(h(c))⇒OD = h(c). since δ is an R-monomorphism ⇒ c ∈ kerh= Img⇒ c =g(b) for some b ∈ B ⇒ γ (c) = γ (g(b)) = (γ ◦ g)(b)⇒ g′(b′) = (g′ ◦ β)(b)⇒g′(b′) = g′(β(b)) ⇒ g′(b′ − β(b)) = OC′ ⇒ b′ − β(b) ∈ kerg′ = Imf ′ ⇒ b′ −β(b) = f ′(a′) for some a′ ∈ A′ ⇒ b′ − β(b) = f ′(α(a)) for some a ∈ A, sinceα is an R-epimorphism ⇒ (f ′ ◦ α)(a) = (β ◦ f )(a) = β(f (a)) ⇒ b′ = β(b) +β(f (a))= β(b+ f (a)). Thus given b′ ∈ B ′, ∃ an element b+ f (a) ∈ B such thatβ(b+ f (a))= b′ ⇒ β is an R-epimorphism.

(ii) c ∈ kerγ ⇒ γ (c) = OC′ ⇒ h′(γ (c)) = (h′ ◦ γ )(c) = OD′ ⇒ (h′ ◦ γ )(c) =δ(OD) ⇒ (δ ◦ h)(c) = δ(OD) ⇒ δ(h(c)) = δ(OD) ⇒ h(c) = OD , since δ is anR-monomorphism ⇒ c ∈ kerh = Img ⇒ c = g(b) for some b ∈ B ⇒ γ (c) =γ (g(b))⇒ γ (c) = (γ ◦ g)(b)⇒ γ (c) = (g′ ◦ β)(b)⇒ OC′ = g′(β(b))⇒ β(b) ∈kerg′ = Imf ′ ⇒ β(b) = f ′(a′) for some a′ ∈ A′ ⇒ β(b) = f ′(α(a)) for somea ∈A, since α is an R-epimorphism⇒ β(b)= (f ′ ◦ α)(a)⇒ β(b)= (β ◦ f )(a)=β(f (a))⇒ b = f (a), since β is an R-monomorphism ⇒ g(b) = g(f (a)) = (g ◦f )(a) = OC , since g ◦ f = 0 ⇒ c = g(b) = OC ⇒ kerγ = {OC} ⇒ γ is an R-monomorphism. �

A more frequently used consequence is

Theorem 9.7.5 (The Five Lemma) Let the diagram in Fig. 9.5 of R-modules andtheir R-homomorphisms be commutative with two exact rows. If α, β , δ, λ are R-isomorphisms, then γ is also an R-isomorphism.

Proof Apply the Four Lemma to the right hand squares of the given diagram to showthat γ is an R-epimorphism. Again apply the same lemma to the left hand squaresof the given diagram to show that γ is an R-monomorphism. Hence it follows thatunder the given conditions, γ is an R-isomorphism. �

Remark 1 The Short Five Lemma follows from Theorem 9.7.5 as a particular case.However, an independent proof is given in Lemma 9.7.1.

Remark 2 The weaker hypothesis of Theorem 9.7.5 (The Five Lemma) shows inmore detail that

Page 405: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.7 Exact Sequences 391

Fig. 9.6 Commutativity ofdiagram of two short exactsequences

Fig. 9.7 Commutativity ofdiagram

(a) α is an R-epimorphism and β , δ are R-monomorphisms ⇒ γ is an R-mono-morphism.

(b) λ is an R-monomorphism and β , δ are R-epimorphisms ⇒ γ is an R-epi-morphism.

Two short exact sequences O →M → N → P → 0 and O →M1 → N1 →P1 → 0 of R-modules and their homomorphisms are said to be isomorphic iff ∃isomorphisms f :M →M1, g :N →N1 and h : P → P1 such that the diagram inFig. 9.6 is commutative.

Note that

(i) isomorphism of short exact sequences of R-modules and their homomorphismsis an equivalence relation;

(ii) short exact sequences of R-modules and their homomorphisms form a category(see Example B.1.1 of Appendix B).

Lemma 9.7.1 (The Short Five Lemma) Let R be a ring and Fig. 9.7 shows a com-mutative diagram with rows of short exact sequences of R-modules and their homo-morphisms, and if

(i) α and γ are monomorphisms, then so is β;(ii) α and γ are epimorphisms, then so is β;

(iii) α and γ are isomorphisms, then so is β .

Proof (i) Suppose β(b) = 0 for some b ∈ B . We shall show that b = 0. Nowγg(b) = g′β(b) = 0 ⇒ g(b) = 0, since γ is a monomorphism ⇒ b ∈ kerg =Imf ⇒ b = f (a) for some a ∈ A ⇒ f ′α(a) = βf (a) = β(b) = 0 ⇒ α(a) = 0(since kerf ′ = 0 ⇒ f ′ is a monomorphism) ⇒ a = 0 (since α is a monomor-phism)⇒ β is a monomorphism (since b= f (a)= f (0)= 0).

(ii) Take b′ ∈ B ′. Then g′(b′) ∈ C′ ⇒ g′(b′)= γ (c) for some c ∈ C⇒ c = g(b)

for some b ∈ B (since Img = C by exactness of the top row at C) ⇒ g′β(b) =γg(b) = γ (c) = g′(b′) ⇒ g′(β(b) − b′) = 0 ⇒ β(b) − b′ ∈ kerg′ = Imf ′ ⇒β(b) − b′ = f ′(a′) for some a′ ∈ A′. Clearly, α is an epimorphism ⇒ a′ = α(a)

for some a ∈A.Now b− f (a) ∈ B . Then β(b− f (a))= β(b)− βf (a).

Page 406: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

392 9 Modules

By commutatively of the diagram, βf (a) = f ′α(a) = f ′(a′) = β(b) − b′ ⇒β(b− f (a))= b′ ⇒ β is an epimorphism.

(iii) follows from (i) and (ii). �

9.8 Modules with Chain Conditions

Let M be an R-module and S(M) the set of all submodules of M . Then analogousto rings, S(M), ordered by the inclusion relation ⊆ is said to satisfy

(i) the ascending chain condition iff every increasing chain of submodules M1 ⊆M2 ⊆ · · · in S(M) is stationary (i.e., there exists an integer n such that Mn =Mn+1 = · · · );

(ii) the maximal condition iff every non-empty subset of S(M) has a maximal ele-ment.

Remark The conditions (i) and (ii) are equivalent.

If S(M) is ordered by ⊇, then (i) becomes the descending chain condition and(ii) becomes the minimal condition and they become equivalent.

Definition 9.8.1 A module M satisfying either of the equivalent conditions (i) or(ii) for submodules is said to be Noetherian (named after Emmy Noether).

Definition 9.8.2 A module M satisfying either the descending chain condition orthe minimal condition for submodules is said to be Artinian (named after EmilArtin).

Theorem 9.8.1 The following three statements for an R-module M are equivalent:

(i) M satisfies ascending chain condition for submodules.(ii) Maximal conditions (for submodules) holds in M .

(iii) Every submodule of M is finitely generated.

Proof Proceed as in Theorem 7.1.1. �

A Noetherian module is now redefined.

Definition 9.8.3 An R-module M satisfying any one of the three equivalent condi-tions of Theorem 9.8.1 is said to be Noetherian.

Remark If R is a PID, then every non-empty set of ideals of R has maximal elementand hence R is Noetheiran.

Theorem 9.8.2 A homomorphic image of a Noetherian module is also Noetherian.

Page 407: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.8 Modules with Chain Conditions 393

Proof Proceed as in Theorem 7.1.4. �

Corollary If A is a submodule of a Noetherian module M , then the quotient moduleM/A and A are also Noetherian.

Proof A is Noetherian by Theorem 9.8.1. Again M/A being the homomorphicimage of the natural R-epimorphism π :M →M/A is also Noetherian by Theo-rem 9.8.2. �

Theorem 9.8.3 Let M be a module and N a submodule of M . If N and M/N areboth Noetherian, then M is also Noetherian.

Proof Proceed as in Theorem 7.1.5. �

Corollary 1 In an exact sequence O →M1 →M →M2 →O of R-modules andtheir homomorphisms, M is Noetherian iff M1 and M2 are both Noetherian.

Proof It follows from Theorems 9.8.2 and 9.8.3. �

Corollary 2 Let M be an R-module and A, B be submodules of M . If M = A⊕B and if both A, B are Noetherian, then M is Noetherian. A finite direct sum ofNoetherian modules is Noetherian.

Proof A× B contains A as a submodule whose factor module is isomorphic to B

(see Worked-Out Exercises 1). Hence by Theorem 9.8.2, A × B is a Noetherianmodule.

Consider the mapping f :A×B→M , defied by f (a, b)= a + b.Since M = A⊕ B , it follows that f is well defined and is an R-epimorphism.

Then M being the homomorphic image of the Noetherian module A × B,M isNoetherian by Theorem 9.8.2.

The last part follows by induction. �

Proposition 9.8.1 Let R be a Noetherian ring and let M be a finitely generatedR-module. Then M is Noetherian.

Proof Let M = 〈x1, x2, . . . , xn〉. There exists a homomorphism f : R × R × · · · ×R =Rn→M , defined by f (r1, r2, . . . , rn)= r1x1 + r2x2 + · · · + rnxn.

Then f is an epimorphism. The product Rn being Noetherian, M is Noetherianby Theorem 9.8.2. �

Theorem 9.8.4 Let M be an R-module. Then the following two statements areequivalent:

(i) M satisfies descending chain condition for submodules.(ii) Minimal condition (for submodules) holds in M .

Page 408: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

394 9 Modules

Proof Proceed as in Theorem 7.1.3. �

An Artinian module is now redefined.

Definition 9.8.4 An R-module M satisfying any one of the equivalent conditionsof Theorem 9.8.4 is called Artinian.

Remark Analogues of Theorems 9.8.2 and 9.8.3 hold for Artinian modules.

Theorem 9.8.5 (Fitting’s Lemma) For any endomorphism f of an Artinian andNoetherian module M , there exists an integer n such that M = Imf n ⊕ kerf n.

This lemma was proved by H. Fitting in 1933.

Proof Left as an exercise. �

9.9 Representations

A basic tool of ring theory is the representation of a ring R, in the ring End(M) ofendomorphisms of an abelian group M . Representations of R and R-modules areclosely related.

If M is an abelian group and R = End(M), then M can be made into a left R-module by defining an action: R×M →M , (f, x) �→ f (x) ∀f ∈R, x ∈M . On theother hand, if M is a left R-module, then for each r ∈R, the mapping Ir :M →M ,x �→ rx is an endomorphism of M . Then the mapping ρ : R→ End(M), r �→ Ir isa ring homomorphism (called a representation of R).

Definition 9.9.1 A homomorphism of a ring R into the ring End(M) of all endo-morphisms of an abelian group M is called a representation of R.

In particular, if M is a left R-module, the mapping ρ : R→ End(M), ρ→ Ir isthe representation of R associated with M .

Definition 9.9.2 A left R-module M is said to be faithful iff the representation ofR associated with M is injective.

Theorem 9.9.1 Let R be a ring and I a minimal left ideal of R. If M is a faithfulsimple left R-module, then M is isomorphic to the left R-module I .

Proof Let a0 be a non-zero element of I . Since M is faithful, a0x �= 0 for somex ∈M . Hence the map ρx : I →M defined by ρx(a) = ax(a ∈ I ) is a non-zerohomomorphism. Hence by Schur’s Lemma, ρx is a monomorphism and also anepimorphism (since the R-module M is simple). Consequently, ρx is an isomor-phism. �

Page 409: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 395

Fig. 9.8 Commutativity ofthe rectangular diagram

9.10 Worked-Out Exercises

1. Let M be an R-module and A, B be submodules of M such that M = A⊕ B .Then

(a) the R-modules M/A and B are R-isomorphic;(b) the R-modules M/B and A are R-isomorphic.

Solution (i) Let x ∈M = A⊕ B . Then x has the unique representation as x =a + b, a ∈A and b ∈ B . Consider the mapping

f :M → B, defined by f (x)= b.

Then f is an R-epimorphism such that kerf = A. Hence by EpimorphismTheorem for modules, M/kerf ∼= B⇒M/A∼= B .

(ii) It follows similarly.2. Let M , N be R-modules and f :M → N be an R-homomorphism. Let A be

a submodule of M and B be a submodule of N such that f (A) ⊆ B . Thenthere exists a unique R-homomorphism f∗ :M/A→N/B making the diagramin Fig. 9.8 commutative, i.e., πB ◦ f = f∗ ◦ πA, where πA and πB are therespective natural epimorphisms.

Solution Define f∗ :M/A→N/B by f∗(m+A)= f (m)+B .Then f∗ is well defined and an R-homomorphism, making the given diagram

commutative.Uniqueness of f∗: Let g :M/A→ N/B be an R-homomorphism, making

the given diagram commutative. Then g ◦ πA = πB ◦ f . Now g(m + A) =g(πA(m))= (g ◦ πA)(m)= (πB ◦ f )(m)= πB(f (m))= f (m)+B = f∗(m+A) ∀m+A ∈M/A⇒ g = f∗ ⇒ uniqueness of f∗.

3. Consider f∗ defined in Worked-Out Exercise 2. Then

(a) f∗ is an R-monomorphism⇔ f−1(B)=A;(b) f∗ is a R-epimorphism⇔ Imf +B =N .

Solution (a)

kerf∗ ={x +A ∈M/A : f∗(x +A)=ON +B

}

= {x +A ∈M/A : f (x) ∈ B}

= {x +A ∈M/A : x ∈ f−1(B)}

= f−1(B)/A.

Hence f∗ is a R-homomorphism⇔ f−1(B)=A.

Page 410: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

396 9 Modules

(b) Let f∗ be an R-epimorphism. Then for every n+ B ∈ N/B , ∃m+A ∈M/A such that f∗(m+A)= n+B . Hence f (m)+B = n+B⇒ f (m)− n ∈B ⇒ f (m) − n = b for some b ∈ B ⇒ f (m) − b = n ⇒ n ∈ Imf + B ⇒N ⊆ Imf + B ⊆ N by hypothesis ⇒ Imf + B = N . For the converse, taken+B ∈N/B . Then ∃m ∈M such that n= f (m)+b⇒ f (m)= n−b for someb ∈ B⇒ f∗(m+A)= f (m)+B = n−b+B = n+B⇒ f∗ is surjective⇒ f∗is an R-epimorphism.

4. Let M , N be R-modules and A, B be submodules of M and N , respectively,and f :M → N be an R-homomorphism. Then the following statements areequivalent:

(a) f (A)⊆ B;(b) There exists a unique R-homomorphism f∗ : M/A → N/B making the

diagram of W.O. Ex. 2 commutative.

Solution Proceed as in Worked-Out Exercise 2.5. Let M be a unitary R-module. Then M is simple⇔M and R/K are isomorphic

for some left ideal K of R.

Solution M is simple⇒M =Rx for some x (�=OM) ∈M by Theorem 9.2.4.Consider the mapping f :R→M defined by f (r)= rx, ∀r ∈R. Then f is

an R-epimorphism such that K = kerf = {r ∈ R : f (r) =OM} is a left idealof R. Hence by Epimorphism Theorem M and R/K are isomorphic.

6. Let M be a unitary R-module. If M is simple, then M and R/K are isomorphicfor some maximal left ideal K of R.

Solution By Worked-Out Exercise 5, M and R/K are isomorphic. Since M

is simple, R/K is also a simple unitary R-module. Hence by Corollary 1 toTheorem 9.2.4, R/K is division ring⇒K is a maximal left ideal of R.

7. Let R be a commutative ring and M , N be R-modules. Then

(a) HomR(M,N) is a left module over the ring End(N,+);(b) HomR(M,N) is a right module over the ring End(M,+).

Solution (i) Define a mapping μ : End(N,+)×HomR(M,N)→HomR(M,N)

by μ(f,g)= f ◦ g. Then μ is a scalar multiplication.(ii) Define a mapping μ : HomR(M,N)× End(M,+)→ HomR(M,N) by

μ(g,f )= g ◦ f . Then μ is a scalar multiplication.8. The Z-module HomZ(Q,Z)= {0}.

Solution Let f ∈ HomZ(Q,Z). Then f :Q→ Z is a Z-homomorphism. Now1 ∈ Q ⇒ f (1) ∈ Z. For any integer q (�=0), 1/q ∈ Q ⇒ f (1) = f (q · 1

q) =

qf ( 1q)⇒ f ( 1

q)= 1

qf (1) ∈ Z⇒ f (1) is a multiple of q ⇒ q|f (1) ∀q (�=0) ∈

Z⇒ f (1) = 0. For any rational number p/q ∈ Q, f (p/q) = pf (1/q) = p ·1qf (1)= 0⇒ f is a zero Z-homomorphism⇒HomZ(Q,Z)= {0}.

9. (a) Homz(Z2,Z)= {0}.(b) Homz(Z2,Q)= {0}.

Page 411: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 397

Solution (a) Z2 = {(0), (1)}. Then for f ∈ HomZ(Z2,Z), f : Z2 → Z is a Z-homomorphism. Now f ((1)) ∈ Z⇒ f ((1))= n for some n ∈ Z⇒ 0= f ((0))=f ((1) + (1)) = f ((1)) + f ((1)) = n + n = 2n ⇒ n = 0 ⇒ f ((1)) = 0. Thusf = 0. Hence Homz(Z2,Z)= {0}.

(b) Proceed as in (a).10. Let R be a commutative ring.

(a) If O→Aα−→B

β−→C is an exact sequence of R-modules and R-homomor-

phisms, then for any R-module M , the sequence O → HomR(M,A)α∗−→

HomR(M,B)β∗−→HomR(M,C) is exact.

(b) If Aα−→B

β−→C→O is an exact sequence of R-modules and R-homomor-

phisms, then for any R-module M , the sequence O → HomR(C,M)β∗−→

HomR(B,M)α∗−→HomR(A,M) is exact (α∗ and α∗ are defined in Propo-

sition 9.5.2).(c) Show by examples that the exactness of the sequence of R-modules and

their homomorphisms O→ Bf−→ C

g−→D→O does not in general im-ply the exactness of any of the following sequences:

(i) For a given R-module M , the sequence O → HomR(M,B)f∗−→

HomR(M,C)g∗−→HomR(M,D)→O is not in general exact.

(ii) For a given R-module M , the sequence O → HomR(D,M)g∗−→

HomR(C,M)f ∗−→HomR(B,M)→O is not in general exact.

Solution (a) Use the definition of α∗ and β∗ to show that under the given con-ditions α∗ is an R-monomorphism and Imα∗ = kerβ∗.

(b) It is sufficient to prove that β∗ is an R-monomorphism and Imβ∗ =kerα∗.

(c) (i) Consider the exact sequence

O→ Zi−→Q

q−→Q/Z→O,

where i : Z ↪→Q is the inclusion map and q is the canonical Z-homomorphismdefined by q(x)= x+Z and take M = Z2. Then the sequence O→HomZ(Z2,

Z)i∗−→HomZ(Z2,Q)

q∗−→HomZ(Z2,Q/Z)→O is not exact. This is becauseq∗ is not surjective, since HomZ(Z2,Q)=O but Homz(Z,Q/Z) �=O .

(ii) Consider the exact sequence (i) and take M = Z. Then the sequence

O → HomZ(Q/Z,Z)q∗−→ HomZ(Q,Z)

i∗−→ Homz(Z,Z)→ O is not exact.This is because HomZ(Q,Z) = O and HomZ(Z,Z) = Z and hence i∗ is notsurjective.

11. A finite abelian group G �= {0} is not a free Z-module.

Solution By Lagrange’s Theorem if n (>0) is the number of elements of G,and if x ∈G, then nx = 0, so that {x} is not linearly independent over Z for any

Page 412: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

398 9 Modules

x ∈ G. Hence no non-empty subset of G is linearly independent. Thus G hasno basis over Z⇒G is not a free Z-module.

12. The module Q over Z is not free i.e., Q is not a free Z-module.

Solution Let p/q (�=0) ∈Q. Then np/q = 0⇒ n= 0⇒ {p/q} is linearly in-dependent over Z. Again, if p/q and a/b are two different rational numbers,then (aq)(p/q)− (pb)(a/b) = 0, where aq,pb ∈ Z. Hence p/q and a/b arelinearly dependent over Z. We now show that no singleton set can generate Q.To show this, let {1/p}, where p is prime, generate Q. As 1/2p ∈ Q, ∃n ∈ Zsuch that n · 1/p = 1/2p. Then n= (1/2) /∈ Z⇒ a contradiction. In this waywe find that Q admits no basis over Z. In other words Q is not a free Z-module.

13. Let M be an R-module.

(a) If a, b ∈R, then a − b ∈Ann(M) in R⇒ ax = bx ∀x ∈M .(b) If M is endowed with the R/Ann(M)-module structure,then find the anni-

hilator of M in R/Ann(M).

Solution (i) Let a, b ∈R be such that a− b ∈Ann(M) (in R). Then (a− b)x =OM ∀x ∈M ⇒ ax = bx ∀x ∈M .

(ii) Ann(M) (in R) is a two-sided ideal in R⇒ R/Ann(M) is ring. M canbe endowed R/Ann(M)-module structure (see Remark of Proposition 9.2.3)under the external law of composition:

R/Ann(M)×M →M, (r).m �→ rm ∀(r) ∈R/ann(M).

This composition is well defined. This is because t ∈ (r) ⇒ (t) = (r) inR/Ann(M) = S (say) ⇒ t + Ann(M) = r + Ann(M)⇒ r − t ∈ Ann(M)⇒rm= tm ∀m ∈M by (i).

Then annihilation of M in

S = {(r) ∈ S : (r) ·m=OM ∀m ∈M}

= {(r) ∈ S : rm=OM ∀m ∈M}

= {(r) ∈ S : r belongs to the annihilator of M in R}

= {OS}.14. (a) Let R be a commutative unitary ring and M be an R-module. Given r ∈R,

rM and Mr are defined by

rM = {rm :m ∈M} and

Mr = {m ∈M : rm=OM}.Then rM and Mr are both submodules of M .

(b) In particular, if R = Z and M = Zn, where n= rs and gcd(r, s)= 1, thenrM =Ms .

Solution (a) OM ∈ rM ⇒ rM �= ∅. Let rx, ry ∈ rM , where x, y ∈M . Thenrx + ry = r(x + y) ∈ rM , since x + y ∈M . Again, ∀a ∈ R, a(rx)= (ar)x =

Page 413: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 399

(ra)x (since R is commutative) ⇒ r(ax) ∈ rM , since ax ∈M . Consequently,rM is a submodule of M .

Similarly, Mr is a submodule of M .(b) Suppose R = Z and M = Zn, where n= rs and gcd(r, s)= 1.Now gcd(r, s)= 1⇒∃a, b ∈ Z such that ra + sb= 1.Let m ∈M = Zn. Then rm ∈ nM . Hence s(rm)= (sr)m= nm= 0 in Zn⇒

rm ∈Ms ⇒ rM ⊆Ms .On the other hand, let m ∈Ms . Then sm=OM .Again ra + sb = 1⇒ m = 1 · m = (ra + sb)m = ram + sbm = r(am) +

s(bm)= r(am)+ b(sm)= r(am) ∈ rM , since am ∈M and sm=OM .Thus m ∈ rM ⇒Ms ⊆ rM . Consequently, rM =Ms .

15. Let M be an R-module and A, B , C be submodules of M such that A ⊆ B ,A+C = B +C, A∩C = B ∩C, then A= B .

Solution (S(M),⊆) forms a modular lattice (see Theorem 9.2.6). Since A⊆ B

by modular law, (A + C) ∩ B = A + (B ∩ C). Hence A = A + (A ∩ C) =A+ (B ∩C)= (B ∩C)+A= B ∩ (A+C)= B ∩ (B +C)= B .

9.10.1 Exercises

Exercises-I

1. For an additive abelian group M , let End(M) be the ring of endomorphisms ofM . If R is any ring show that M is an R-module iff there exists a homomor-phism θ :R→ End(M).

[Hint. Let M be an R-module with an action R × M → M , denoted by(r, x) �→ rx. Define θ : R → End(M) by r �→ θ(r), where θ(r) :M →M isgiven by x �→ rx ∀x ∈ M and r ∈ R. Then θ is a homomorphism of rings.Conversely, suppose θ : R→ End(M) is a ring homomorphism. Define the ac-tion R ×M → M , (r, x) �→ rx = (θ(r))(x) ∀r ∈ R, x ∈ M . Then M is anR-module.]

2. Show that a subring S of a ring R is a module over the whole ring R only if S

is an ideal of R.3. (a) Let f :M →N be an R-homomorphism of modules with P = kerf . Show

that there exists a unique module monomorphism f :M/P →N such thatf = f ◦ π , where π :M →M/P is the natural module homomorphism.

(a) Let R be a ring and N a submodule of an R-module M . Show that thereis a one-to-one correspondence between the set of all submodules of M

containing N and the set of all submodules of M/N , given by P �→ P/N .Hence prove that every submodule of M/N is of the form P/N , where P

is a submodule of M which contains N .4. Let M be an R-module. Show that the submodules of M form a complete lattice

with respect to inclusion.

Page 414: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

400 9 Modules

5. Let L, M , N be R-modules such that N ⊆M ⊆ L. Show that (L/N)/(M/N)∼=L/M .

[Hint. Define f : L/N → L/M by f (x +N)= x +M ∀x ∈ L. Check thatf is a well-defined R-module homomorphism of L/N onto L/M and kerf =M/N . Then apply Theorem 9.4.2.]

6. Let M be an R-module and P , Q submodules of M . Prove that (P +Q/P ∼=Q/(P ∩Q).

[Hint. The composite homomorphism Q→ P +Q→ (P +Q)/P is surjec-tive and its kernel is P ∩Q. Then apply Theorem 9.4.2.]

7. Let R be a ring, I an ideal of R, M an R-module and A (�=∅) is a subset of M .Show that

(a) IA= {∑n〈i=1〉 riai : ri ∈ I and ai ∈A} is a submodule of M .

(b) M/IA is an R/I -module under the action: R/I ×M/IA→M/IA, (r +I )(x + IA) �→ rx + IA.

(c) IM = {∑finite sum aixi : ai ∈ I and xi ∈M} is a submodule of M .

8. Let A, B be submodules of an R-module M . Define (A : B) = {r ∈ R :rB ⊆ A}. Show that (A : B) is an ideal of R. In particular, define the anni-hilator of M denoted by Ann(M) by Ann(M) = (0 :M) = {r ∈ R : rM = 0}.Show that Ann(M) is an ideal of R. If I is an ideal of R such that I ⊆Ann(M),show that M can be made into an R/I module.

[Hint. Define R/I × M → M , ((x),m) �→ xm ∀(x) ∈ R/I and m ∈ M ,where (x) is represented by x ∈R, i.e., (x)= x + I .]

9. Let A, B be submodules of an R-module M . Show that

(i) Ann(A+B)=Ann(A)∩Ann(B);(ii) (A : B)=Ann((A+B)/A).

10. Let M be a finitely generated R-module and I be an ideal of R and let f be anR-module endomorphism of M such that f (M) ⊆ IM . Show that f satisfiesan equation of the form

f n + a1fn−1 + · · · + an = 0 (ai ∈ I ).

[Hint. Let x1, x2, . . . , xn be a set of generators of M . Then for eachf (xi) ∈ IM ,

f (xi)=n∑

j=1

aij xj (1≤ i ≤ n; aij ∈ I ) ⇒n∑

j=1

(δij f − aij )xj = 0,

where δij is the Kronecker delta. Multiply on the left by the adjoint of the matrix(δij f − aij ). Then it follows that det(δij f − aij ) annihilates each xi , hence itis the zero endomorphism of M . An equation of the required form is obtainedon expansion of the determinant.]

11. Let M be a finitely generated R-module and I an ideal of R such that IM =M .Show that there exists x ≡ 1 (mod I ) such that xM = 0.

Page 415: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 401

Fig. 9.9 Commutativediagram for Five Lemma

[Hint. Take f = identity in Exercise 10. Then x = 1+ a1 + · · · + an givesthe required solution.]

12. (Nakayama’s Lemma) Let M be a finitely generated R-module and I an idealof R contained in the Jacobson radical J of R. Then IM =M implies M = 0.

[Hint. Using Exercise 11, xM = 0 for some x ≡ 1 (modJ )⇒ x is invertiblein R (cf. Exercise 23(ii), Chap. 5)⇒M = x−1xM = 0.]

13. Let M be a finitely generated R-module, N a submodule of M and I an ideal ofR contained in the Jacobson radical J of R. Then show that M = IM +N ⇒M =N .

[Hint. Note that I (M/N) = (IM + N)/N . Apply Nakayama’s Lemmato M/N .]

14. (The Five Lemma). Let the diagram of R-modules and their homomorphisms inFig. 9.9 be a commutative, with exact rows. Prove the following:

(a) f1 is an epimorphism and f2, f4 are monomorphisms⇒ f3 is a monomor-phism.

(b) f5 is a monomorphism and f2, f4 are epimorphisms ⇒ f3 is an epimor-phism.

[The lemma in Exercise 17, which is also called the Five Lemma, followsfrom this exercise.]

15. (a) Let A, B , C, D be R-modules and f : C → A and g : B → D be R-module homomorphisms. Then show that the map ψ : HomR(A,B) →HomR(C,D) defined by ψ(α) = gαf is a homomorphism of abeliangroups.

(b) Let

Af−→ B

g−→ C→O (9.4)

be an exact sequence of R-modules and their homomorphisms. Show thatthe sequence (9.4) is exact ⇔ ∀R-modules N , the sequence of abeliangroups

O→Hom(C,N)g∗−→Hom(B,N)

f ∗−→Hom(A,N) (9.5)

is exact.(c) Let

O→Af−→ B

g−→ C→ (9.6)

Page 416: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

402 9 Modules

Fig. 9.10 The Five Lemmadiagram

be a sequence of R-modules and their homomorphisms. Show that the se-quence (9.6) is exact⇔ ∀R-modules M , the sequence of abelian groups

O→Hom(M,A)f∗−→Hom(M,B)

g∗−→Hom(M,C)→ (9.7)

is exact.16. If N is any submodule of an R-module M , show that the sequence O→N

i−→M

π−→M/N → O is exact, where i is the inclusion map and π is the natu-ral homomorphism. Conversely, if the sequence of R modules and homomor-

phisms O → Af−→M

g−→ C →O is exact, then N = Imf = kerg is a sub-module of M and N ∼=A and M/N ∼= C.

17. (The Five Lemma) If R is a ring and the diagram in Fig. 9.10 is commutativewith exact rows of R-modules and their homomorphisms such that each βi

(i = 1,2,4,5) is an isomorphism, then show that β3 is also an isomorphism.18. Show that M is a Noetherian R-module iff every submodule of M is finitely

generated.

19. Let O →M ′ f−→Mg−→M ′′ → O be an exact sequence of R-modules and

their homomorphisms. Show that

(a) M is Noetherian⇔M ′ and M ′′ are Noetherian;(b) M is Artinian⇔M ′ and M ′′ are Artinian.

20. If Mi (1 ≤ i ≤ n) are Noetherian (Artinian) R-modules, show that⊕n〈i=1〉Mi

is also.21. Let R be a Noetherian (Artinian) ring and M a finitely generated R-module.

Show that M is a Noetherian (Artinian) R-module.22. Prove the following:

(a) Let M be a Noetherian (Artinian) R-module and I a submodule of M . ThenM/I is a Noetherian (Artinian) R-module;

(b) if an R module M has a submodule I such that both I and M/I are Noethe-rian (Artinian), then M is Noetherian (Artinian).

23. If M (�=0) is a finitely generated R-module, show that M has a maximal sub-module.

24. (a) Let M be an R-module and N a submodule of M Show that N is maximalin M ⇔R-module M/N is simple.

(b) Show that an R-module M is simple ⇔ M ∼= R/I for some maximalideal I of R.

Page 417: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 403

25. Let M be an R-module and {Mi}, 〈i ∈ J 〉 be a family of simple submodules ofM such that M =∑〈i∈J 〉Mi . Show that for each submodule N of M there is asubset I of J such that M =⊕〈i∈I 〉Mi ⊕N .

26. Let M1f1−→ M2

f2−→ M3f3−→ M4

f4−→ M5f5−→ M6 be an exact sequence of

R-modules. Show that the following statements are equivalent:

(a) f3 is an isomorphism;(b) f2 and f4 are trivial homomorphisms;(c) f1 is an epimorphism and f5 is a monomorphism.

27. (a) Let the sequence O →Mf−→ N →O of R-modules be exact. Show that

f is an isomorphism.

(b) Let the sequence O → A1f−→ B

g−→ A2 → O of R-modules be exact.Show that the following statements are equivalent:

(i) There is an R-module homomorphism h :A2 → B with gh= 1A2 ;(ii) there is an R-module homomorphism k : B→A1 such that kf = 1A1 ;

(iii) the given sequence is isomorphic (with identity maps on A1 and A2)

to the short exact sequence O → A1i−→ A1 ⊕ A2

π−→ A2 → O; inparticular, B ∼=A1 ⊕A2.

28. An exact sequence

· · · →Mnfn−→Mn+1

fn+1−→Mn+2 → ·· · (9.8)

is said to split at the R-module Mn+1 iff the R-submodule M = Imfn =kerfn+1 of Mn+1 is a direct summand of Mn+1 i.e., iff Mn+1 is decompos-able into the direct sum of M and another R-submodule of Mn+1. If the exactsequence (9.8) splits at Mn+1 ∀n, the sequence (9.8) is said to split.

(a) Prove that the sequence (9.8) splits if either (i) or (ii) holds.

(i) There exists an R-homomorphism h : Mn+1 → Mn such that hfn :Mn→Mn is an automorphism.

(ii) There exists an R-homomorphism k :Mn+2 →Mn+1 such that fn+1k :Mn+2 →Mn+2 is an automorphism.

(b) Prove that if the sequence (9.8) splits, then

(i) Mn+1 ∼= Imfn ⊕ Imfn+1 ∼=Mn ⊕ Imfn+1[Hint. Use (a(i)).]

(ii) Mn+1 ∼= Imfn ⊕ Imfn+1 ∼= Imfn ⊕Mn+2[Hint. Use a(ii).]

29. Let M , N , and P be given R-modules and M ×N be the product of the sets M

and N . A function f :M ×N → P is said to be bilinear iff

f (r1m1 + r2m2, n)= r1f (m1, n)+ r2f (m2, n)

Page 418: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

404 9 Modules

and f (m, r3n1 + r4n2) = r3f (m,n1) + r4f (m,n2) hold ∀ri ∈ R, m,mi ∈M

and n,ni ∈N .By a tensor product of M and N , we mean a pair (T ,f ), where T is an R-

module and f :M ×N → T is a bilinear function such that for every bilinearfunction g :M ×N → P there exists a unique homomorphism

h : T → P satisfying hf = g.

Prove the following:

(a) If (T ,f ) is a tensor product of R-modules M and N , then f (M × N)

generates T .(b) If (T ,f ) and (P,g) are tensor products of M and N , then there exists a

unique isomorphism h : T → P of R-modules and that hf = g.(c) Every pair of R-modules M and N determines a unique tensor product

(T ,f ) (up to isomorphism).The product is denoted by M ⊗R N or by simply M ⊗N .

(d) For any given R-module M , M ⊗R ∼=M ∼=R⊗M .

30. (a) For any R-modules M , N and P , prove the following isomorphisms.

(i) M ⊕N ∼=N ⊕M ;(ii) (M ⊕N)⊕ P ∼=M ⊕ (N ⊕ P);

(iii) M ⊗N ∼=N ⊗M ;(iv) (M ⊗N)⊗ P ∼=M ⊗ (N ⊗ P);(v) (M ⊕N)⊗ P ∼=M ⊗ P ⊕N ⊗ P ;

(vi) P ⊗ (M ⊕N)∼= P ⊗M ⊕ P ⊗N .

(b) Let S be the set of all R-modules. Then show that (S,⊕,⊗) forms a com-mutative semiring.

[Hint. See Appendix A and use (a).]31. Let G be a free Z-module of rankn and H be a subgroup of G of rankm≤ n.

Then the index [G : H ] is finite iff m = n. For m = n, let {x1, x2, . . . xn} be abasis of G and {y1, y2, . . . yn} be a basis of H . Write

⎜⎜⎜⎝

y1y2...

yn

⎟⎟⎟⎠=A

⎜⎜⎜⎝

x1x2...

xn

⎟⎟⎟⎠ with A ∈Mn(Z).

Then show that [G :H ] = |detA|.32. Let R and A be integral domains such that R ⊆A. If R is a Noetherian domain

and A is a finitely generated R-module, show that A is a Noetherian domain.[Hint. Let I1 ⊆ I2 ⊆ · · · be an ascending chain of ideals in A. Then by Propo-

sition 9.8.1, A is a Noetherian R-module. Since each I1 is an R-submodule ofA, then the above chain must terminate.]

Page 419: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.10 Worked-Out Exercises 405

33. Let R be a ring with identity, M be an R-module and N be a submodule of M .Show that M is Noetherian iff both N and M/N are Noetherian.

[Hint. Use the Corollary to Theorem 9.8.2 and Theorem 9.8.3.]34. (Chinese Remainder Theorem for Modules) Let R be a commutative ring with 1

and I1, I2, . . . , It be ideals in R and M be an R-module.

(a) The map M →M/I1M ⊕ · · · ⊕M/ItM , x �→ (x + I1M, . . . , x + ItM) isan R-module homomorphism with kernel I1M ∩ I2M ∩ · · · ∩ ItM ;

(b) if the ideals I1, I2, . . . , It in (a) are pairwise co-prime (i.e., Ii + Ij =R forall i �= j ), then

M/(I1I2 · · · It )M ∼=M/I1M ⊕ · · · ⊕M/ItM.

[Hint. The proof is similar to the proof of Chinese Remainder Theorem forrings.]

35. The concept of Lie algebra can be extended for modules over commutative ringswith identity element.

Let M be a module over a commutative ring with identity element. Then abilinear map M ×M →M , (a, b) �→ [a, b] is said to make M a Lie algebra iffit satisfies the condition [a, a] = 0, ∀a ∈M and the Jacobi identity.

(a) Let Mn(R) be the ring of square matrices of order n over a commutativering R with 1. If x, y ∈Mn(R), then the bilinear map Mn(R)×Mn(R)→Mn(R), (x, y) �→ [x, y] = xy − yx makes Mn(R) into a Lie algebra.

(b) Let H = {X ∈Mn(R): trace X = 0} is also a Lie algebra and a (Lie) subal-gebra of Mn(R).

36. A nonzero ring R is said to be right (left) semisimple iff it is semisimple as aright (left) module over itself. Prove that the following statements are equivalentfor a ring R with 1.

(a) R is right semisimple;(b) R is isomorphic to a direct sum of a finite number of matrix rings of square

matrices over division rings;(c) R is left semisimple.

The result is known as Wedderburn-Artin Theorem.37. Show that the following statements are equivalent for a semisimple module M :

(a) M is Artinian;(b) M is Noetherian;(c) M is a direct sum of a finite number of minimum modules M .

38. Show that a semisimple module is finitely generated iff it is a sum of finitelymany minimal submodules.

39. (a) Show that a simple R-module M is free iff R is a division ring and M is ofdimension 1 over R;

(b) Show that

Page 420: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

406 9 Modules

(i) a matrix ring R =Mn(D) of square matrices of order n over a divisionring D is semisimple;

(ii) the matrix ring R =Mn(Z) is not semisimple;(iii) a commutative ring is semisimple iff it is a finite direct product of

fields.

9.11 Homology and Cohomology Modules

In this section we continue discussion of exact sequences.The concept of homological algebra arose through the study of algebraic topol-

ogy during the middle of the 20th century. Homological algebra borrows the lan-guage of algebraic topology, such as homology groups, homology modules, chains,boundaries, chain complex etc. The concept of cohomology modules is dual to thatof homology modules. They are widely used in commutative algebra, algebraic ge-ometry and algebraic topology.

Definition 9.11.1 A sequence M = {Mn,∂n}, n ∈ Z, of R-modules Mn togetherwith a sequence of R-homomorphisms ∂n :Mn →Mn−1, such that ∂n ◦ ∂n+1 = 0,∀n ∈ Z, is called a chain complex and ∂n is called a boundary homomorphism.

More precisely,

M : · · ·→Mn+1∂n+1−→Mn

∂n−→Mn−1 → ·· · (9.9)

is called a chain complex iff ∂n ◦ ∂n+1 = 0, ∀n ∈ Z.

Definition 9.11.2 The elements of Zn = ker ∂n are called n-cycles, the elements ofBn = Im ∂n+1 are called n-boundaries and the elements of Mn are called n-chainsof the complex (9.9).

Proposition 9.11.1 Bn is a submodule of Zn, ∀n ∈ Z.

Proof It follows from the condition of a chain complex M that ∂n ◦ ∂n+1 = 0,∀n ∈ Z. �

Definition 9.11.3 The quotient module Zn/Bn for any chain complex M denotedHn(M) (or simply Hn) is called the n-dimensional homology module of the chaincomplex M . For R = Z, we get the homology groups Hn(M). The complex M saidto be a cyclic iff Hn(M) = 0 for ∀n ∈ Z. The elements of Hn = Zn/Bn are calledhomology classes, denoted [z] for every z ∈Zn.

Remark If the homology module Hn(C)= 0, then the sequence (9.9) is exact at Mn.This shows that the homology module of a chain complex measures its deviationfrom the exactness of the sequence (9.9).

Page 421: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.11 Homology and Cohomology Modules 407

Fig. 9.11 Commutativediagram of two chaincomplexes

Definition 9.11.4 Let M = {Mn,∂n}, n ∈ Z and M ′ = {M ′n, ∂

′n}, n ∈ Z be two

chain complexes of R-modules. Then a sequence {fn :Mn →M ′n}, n ∈ Z of R-

homomorphisms is called a chain map from M to M ′ iff these R-homomorphismscommute with the boundary homomorphisms i.e., iff each square in the diagram ofFig. 9.11 is commutative, i.e., fn−1 ◦ ∂n = ∂ ′n ◦ fn, ∀n ∈ Z.

We abbreviate the entire collection to f :M →M ′ and call f a chain map.

Proposition 9.11.2 Let M = {Mn,∂n} and M ′ = {M ′n, ∂

′n} be two chain complexes

of R-modules and {fn :Mn →M ′n} be a chain map. Then fn maps n-cycles of M

into n-cycles of M ′ and n-boundaries of M into n-boundaries of M ′, for all n ∈ Z.

Proof Left as an exercise. �

Proposition 9.11.3 Let M = {Mn,∂n} and M ′ = {M ′n, ∂

′n} be two chain complexes

of R-modules and {fn : Mn → M ′n} be a chain map. Then each fn : Mn → M ′

n

determines an R-homomorphism

Hn(fn)= fn∗ :Hn(M)→Hn

(M ′), [z] �→ [fn(z)

].

Proof Left as an exercise. �

Definition 9.11.5 Hn(f ) = fn∗ : Hn(M)→ Hn(M′) is called the module homo-

morphism (or homomorphism) in homology induced by fn for each n ∈ Z.

We simply write f and f∗ is places of fn and fn∗, respectively, unless there isno confusion.

Proposition 9.11.4 (a) If f :M →M ′ and g :M ′ →M ′′ are two chain maps, thentheir composite g ◦ f : M → M ′′ is a chain map such that (g ◦ f )∗ = g∗ ◦ f∗ :Hn(M)→Hn(M

′′);(b) if IM :M →M is the identity chain map, then (IM)∗ :Hn(M)→Hn(M) is

also the identity homomorphism.

Proof Left as an exercise. �

Definition 9.11.6 Let M = {Mn,∂n} and N = {Nn, ∂′n} be two chain complexes

and f,g :M → N be two chain maps. Then f is said to be chain homotopic to g,denoted f # g, iff ∃ a sequence {Fn :Mn→Nn+1} of R-homomorphisms such that

∂ ′n+1Fn + Fn−1∂n = fn − gn :Mn→Nn, ∀n ∈ Z.

Page 422: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

408 9 Modules

A chain map f :M → N is called a chain homotopy equivalence iff ∃ a chainmap g :N →M such that g ◦ f # IM an f ◦ g # IN .

Proposition 9.11.5 The relation of chain homotopy on the set C(M,N) of all chainmaps from M to N is an equivalence relation.

Proof Left as an exercise. �

Proposition 9.11.6 Two homotopic chain maps f,g :M →N induce the same ho-momorphism in the homology, i.e., f # g :M →N ⇒ f∗ = g∗ :Hn(M)→Hn(N)

∀n ∈ Z.

Proof Let f # g : M → N . Then ∃ a chain homotopy {Fn : Mn → Nn+1}. Let[z] ∈ Hn(M). Then ∂n([z]) = 0 ⇒ fn([z]) − gn([z]) = ∂n+1Fn([z]) is a bound-ary ⇒ [fn[z]] = [gn[z]] ⇒ fn ∗ ([z]) = gn ∗ [z], ∀[z] ∈ Hn(M)⇒ fn∗ = gn∗ ⇒f∗ = g∗. �

A cohomology module is the dual to homology module. A cochain complex,cocycles, coboundaries, cochains, cohomology classes and a cohomology moduleare defined dually as follows:

Definition 9.11.7 A sequence M∗ = {Mn, δn}, n ∈ Z, of R-modules Mn togetherwith a sequence of R-homomorphisms δn :Mn →Mn+1, such that δn ◦ δn−1 = 0,∀n ∈ Z is called a cochain complex and δn is called a coboundary homomorphism.

More precisely,

M∗ : · · ·→Mn−1 δn−1−→Mn δn−→Mn+1 → ·· · (9.10)

is called a cochain complex iff δn ◦ δn−1 = 0, ∀n ∈ Z.

Definition 9.11.8 The elements of Zn = ker δn are called n-cocycles, the elementsof Bn = Im δn−1 are called n-coboundaries and the elements of Mn are called n-cochains of the cochain complex (9.10).

Proposition 9.11.7 Bn is a submodule of Zn, ∀n ∈ Z.

Proof It follows from the condition of a cochain complex M∗ such that δn ◦δn−1 = 0, ∀n ∈ Z. �

Definition 9.11.9 The quotient module Zn/Bn for any cochain complex M∗, de-noted Hn(M∗) (or simply Hn) is called the n-dimensional cohomology moduleof the cochain complex M∗. For R = Z, we get the cohomology group Hn(M∗).The elements of Hn = Zn/Bn are called cohomology classes, denote [z] for ev-ery [z] ∈ Zn.

Page 423: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

9.12 Topology on Spectrum of Modules and Rings 409

Fig. 9.12 Commutativediagram of two cochaincomplexes

Definition 9.11.10 Let M∗ = {Mn, δn} and M ′∗ = {M ′n, δ′n} be two cochaincomplexes of R-modules. Then a sequence {f n : Mn → M ′n}, n ∈ Z of R-homomorphisms is called a cochain map from M∗ to M ′∗ iff these R-homomor-phisms commute with the coboundary homomorphisms i.e., iff each square in thediagram of Fig. 9.12 is commutative, i.e., f n+1 ◦ δn = δ′n ◦ f n, ∀n ∈ Z.

We can define a cochain homotopy between two cochain maps in a similar wayas this definition.

9.11.1 Exercises

Exercises-II

1. Show that a chain complex M = {Mn,∂n} of R-modules and their R-homomor-phisms is exact iff Hn(M)= 0, ∀n ∈ Z.

[Hint. Zn = Bn⇔ ker ∂n = Im ∂n+1.]2. Let M and N be two chain complexes of R-modules and R-homomorphisms

and f : M → N is a chain homotopy equivalence. Show that Hn(f ) = f∗ :Hn(M)→Hn(N) is an R-isomorphism for all n ∈ Z.

[Hint. Let f : M → N be a chain homotopy equivalence. Then ∃ a chainhomotopy equivalence g :N →M such that g ◦ f # 1M and f ◦ g # IN .

Then (g ◦ f )∗ = g∗ ◦ f∗ = 1d and (f ◦ g)∗ = f∗ ◦ g∗ = 1d ⇒ f∗ is an iso-morphism of R-modules.]

3. Let f,g :M → N and h, k : N → P be chain maps. Show that f # g and h#k⇒ h ◦ f # k ◦ g :M → P , i.e., the composites of chain homotopic maps arechain homotopic.

9.12 Topology on Spectrum of Modules and Rings

In this section we topologize the set of all prime ideals of rings and prime submod-ules of modules by defining closed sets. Moreover we study the properties of suchspaces, with special reference to Zariski topology and schemes.

9.12.1 Spectrum of Modules

Let R be a ring and M an R-module. Define SpecM as the set of all prime sub-modules of M and call it as the spectrum of M . For any prime submodule K of M ,

Page 424: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

410 9 Modules

put

V (K)= {N ∈ SpecM : (N :M)⊃ (K :M)}

(A proper submodule N of M is said to be prime iff re ∈ N , for r ∈ R, e ∈M ⇒either e ∈N or r ∈ (N :M).)

(a) Show that X = SpecM satisfies the following properties:

(i) V (0)= SpecM and V (M)= ∅;(ii)⋂

t∈I V (Kt )= V (∑〈t∈I 〉(Kt :M)M);

(iii) V (K1)∪ V (K2)= V (K1 ∩K2), where Kt ’s are submodules of M .

These results show that the sets V (K) satisfy axioms for closed sets in atopological space. Then SpecM becomes a topological space.

(b) Prove the following:

(i) Let Y be a closed subset of SpecM . Then Y is irreducible (i.e., every pairof non-empty closed sets in Y intersect) ⇔ Y = V (N) for some primesubmodule N of M (this N is unique in the sense that any other submoduleN ′ of M with Y = V (N ′)⇒ (N :M)= (N ′ :M)).

(ii) Let M be a finitely generated R-module. Then X = SpecM is irre-ducible⇔⋂〈N∈X〉N is a prime submodule of M .

(iii) M is a Noetherian R-module⇒ SpecM is a Noetherian space.

[Hint. X1 ⊇ X2 ⊇ · · · be any decreasing sequence of closed subsets ofspecM . Then we can write Xi = V (Ki) for every i. Define K ′

i =⋂〈N∈Xi 〉N .

Then V (Ki)= V (K ′i ) and {K ′

i} is an increasing sequence of submodules of M .Since M is a Noetherian R-module, this sequence becomes stationary and henceSpecM is a Noetherian space.]

9.12.2 Spectrum of Rings and Associated Schemes

The prime spectrum or simply spectrum of a ring R is the set SpecR of all primeideals of R, i.e., SpecR = {P : P is a prime ideal of R}. Let Max(R)= {M :M isa maximal ideal of R}. We now consider commutative rings with identity element.Then by Theorem 5.3.3, Max(R)⊆ SpecR. Max(R) is called the maximal spectrumof R.

Let R and T be two commutative rings with identity elements and f : R → T

be a ring homomorphism. Then f induces a function Specf : SpecT → SpecR,defined by

(Specf )(Q)= f−1(Q), ∀Q ∈ SpecT . (9.11)

Q is a prime ideal of T ⇒ T/Q is an integral domain by Theorem 5.3.1. Nowthe ring R/f−1(Q) is isomorphic to a subring of T/Q⇒ R/f−1(Q) in an integraldomain⇒ f−1(Q) is a prime ideal of R⇒ Specf is well defined.

For any set X ⊆R, define V (X)= {P ∈ SpecR :X ⊆ P }.If I is the ideal generated by X, then V (X)= V (I)= V (rad I ).

Page 425: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 411

SpecR satisfies the following properties:

(i) V (O)= SpecR and V (R)= ∅;(ii)⋂

α∈A V (Xα)= V (⋃

α∈A Xα), where {Xα}α∈A is any family of subsets of R.(iii) V (I1)∪ V (I2)= V (I1 ∩ I2), where I1 and I2 are prime ideals of R.

Thus the family of subsets of SpecR which are of the form V (X) is closed withrespect to any intersection and finite unions, contains the empty set ∅ and the entireset SpecR. Hence there exists a unique topology on the set SpecR in which closedsets are of the form V (X) for X ⊆R.

The set SpecR of all prime ideals of R, together with the family {V (X)X⊆R} asthe class of closed sets, forms a topological space. This topology of SpecR is calledthe Zariski topology.

Problem 1 The topological space SpecR endowed with Zariski topology is aHausdorff space iff SpecR =Max(R).

Problem 2 The induced function Specf : SpecT → SpecR, defined by (9.11) isa continuous function with respect to Zariski topology.

Solution Given a set X ⊆ R, (Specf )−1(V (X)) = {Q ∈ SpecT : Specf (Q) ∈V (X)} = {Q ∈ SpecT : f−1(Q) ∈ V (X)} = {Q ∈ SpecT : X ⊆ f−1(Q)} = {Q ∈SpecT : f (X)⊆Q} = V (f (X))⇒ Specf is continuous.

Definition 9.12.1 The spectrum of a ring, endowed with Zariski topology is calleda scheme.

The name ‘scheme’ was given by Alexander Grothendieck. He developed thetheory of schemes which made a revolution in algebraic geometry. He was awarded‘Fields Medal’ in 1966 in recognition of his contribution to the theorey of schemes.An affine scheme comes with a ‘sheaf of rings’.

For further results of this section see Ex. 12 of Appendix B.

9.13 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Atiyah and MacDon-ald 1969; Blyth 1977; Herstein 1964; Hilton and Stammbach 1971; Lambek 1966;Lang 1986; Musili 1992) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Atiyah, M.F., MacDonald, I.G.: Introduction to Commutative Algebra. Addison-Wesley, Reading(1969)

Page 426: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

412 9 Modules

Blyth, T.S.: Module Theory: An Approach to Linear Algebra. Oxford University Press, London(1977)

Herstein, I.: Topics in Algebra. Blaisdell, New York (1964)Hilton, P.J., Stammbach, U.: A Course in Homological Algebra. Springer, Berlin (1971)Lambek, J.: Lectures on Rings and Modules. Blaisdell, Waltham (1966)Lang, S.: Introduction to Linear Algebra. Springer, New York (1986).Musili, C.: Introduction to Rings and Modules. Narosa, New Delhi (1992)

Page 427: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 10Algebraic Aspects of Number Theory

There is no doubt, number theory has long been one of the favorite subjects not onlyfor the students but also for the teachers of mathematics. It is a classical subject andhas a reputation for being the “purest” part of mathematics, yet recent developmentsin cryptology, coding theory and computer science are based on elementary numbertheory. Number theory, in a general sense, is the study of numbers and their prop-erties. In Chap. 1, we have already seen some of the basic but important conceptsof integers, such as, Peano’s Axiom, well ordering principle, division algorithm,greatest common divisors, prime numbers, fundamental theorem of arithmetic etc.In this chapter, we discuss some more interesting properties of integers, in partic-ular properties of prime numbers, and primality testing. In addition, we study theapplications of number theory, particularly those directed towards theoretical com-puter science. Number theory has been used in many ways to devise algorithms forefficient computer and for computer operations with large integers. Both algebraand number theory play an increasingly significant role in computing and commu-nication, as evidenced by the striking applications of these subjects to the fields ofcoding theory and cryptology. The motivation of this chapter is to provide an intro-duction to the algebraic aspects of number theory, mainly the study of developmentof the theory of prime numbers with an emphasis on algorithms and applications,which would be necessary for studying cryptology to be discussed in Chap. 12. Inthis chapter, we start with the introduction to prime numbers with a brief history.We provide several different proofs of the celebrated theorem by Euclid stating thatthere exist infinitely many primes. We further discuss Fermat number, Mersennenumbers, Carmichael numbers, quadratic reciprocity, multiplicative functions, suchas, Euler φ-function, number of divisor functions, sum of divisor functions. Thischapter ends with the discussions on primality testing both deterministic and prob-abilistic, such as, Solovay–Strassen and Miller–Rabin probabilistic primality tests.

10.1 A Brief History of Prime Numbers

Prime numbers belong to an exclusive world of intellectual conceptions. Around2500 years ago, the ancient Greeks in the school of Pythagoras were interested in

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_10, © Springer India 2014

413

Page 428: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

414 10 Algebraic Aspects of Number Theory

numbers for their mystical and numerological properties. They made the distinc-tion between composite numbers and prime numbers. They understood the ideaof primality and were interested in perfect numbers (a number whose sum of theproper divisors is the number itself, e.g., 6, 28 etc.) and pairs of amicable numbers(i.e., a pair of numbers such that the proper divisors of one number is the sum to theother and vice versa, e.g., 220 and 284).

The book Elements written by Euclid, an ancient Greek mathematician, appearedin about 300 BC. In the Book IX of the Elements, Euclid included a proof that thereare infinitely many primes. This is considered to be one of the first proofs knownwhich uses the method of contradiction to establish a result. Euclid also came upwith a proof of the Fundamental Theorem of Arithmetic which states that “Everyinteger can be written as a product of primes in an essentially unique way”. Thisfactorization can be found by trial division of the integer by primes less than itssquare-root. Euclid also proved that a number 2n−1(2n − 1) is a perfect number ifthe number 2n − 1 is prime. Euler showed that all even perfect numbers are exactlyof this form. Till date, it is not known whether there are any odd perfect numbers.

In 17th century, Pierre de Fermat (1601–1665) took a leading role for the ad-vancement of the theory of prime numbers. He proved a speculation of Albert Girardthat every prime number of the form 4n+ 1 can be written in a unique way as thesum of two squares. He further proved a theorem which is now known as Fermat’sLittle theorem. The theorem states that if p is prime and a be an integer such thatgcd(a,p) = 1, that is a and p are relatively prime, then, p divides ap−1 − 1. Fer-mat’s Little theorem is the basis for many results in number theory and is one of thebasis for checking primality testing techniques which are still in use on today’s elec-tronic computers. He discovered a technique for factorizing large numbers, which heillustrated by factorizing the number 2027651281= 44021× 46061. Although Fer-mat claimed that he proved all of his theorems, a very few records of his proofs havesurvived. Many mathematicians, including Gauss, cast doubts on his several claims,because of the difficulty of some of the problems and the limited mathematical toolsavailable to Fermat. Out of his claims, Fermat’s Last theorem is the most celebratedone. The theorem was first proposed by Fermat in the form of a note scribbled inthe margin of his copy of the ancient Greek text Arithmetica by Diophantus. Thetheorem states that the Diophantine equation xn + yn = zn has no integer solutionsfor n > 2 and x, y, z �= 0. Fermat left no proof of the conjecture for all n, exceptfor the special case n = 4. In the note, Fermat claimed that he discovered a proofof the whole theorem, but due to the small space of the margin he could not writethe proof. It was called a “theorem” on the strength of Fermat’s statement, despitethe fact that mathematicians failed to prove it for hundreds of years. No successfulproof was published until 1995, when Andrew Wiles came up with a correct suc-cessful proof the theorem. This single theorem simulates many new development ofalgebraic number theory in the 19th century and the proof of the modularity theoremin the 20th century.

Factorization is considered to be another interesting research area in the field ofnumber theory. Though Euclid came up with a proof of the Fundamental Theoremof Arithmetic, the factorization are found by trial division of the integer by primes

Page 429: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.1 A Brief History of Prime Numbers 415

less than its square-root. For large enough numbers, clearly this method is ineffi-cient. Fermat, Euler, and many other mathematicians have produced imaginativefactorization techniques. However, using the most efficient technique and moderncomputer facility yet devised, billions of years of computer time may be required tofactor a suitably chosen integer even with 300 decimal digits.

From the very early development of prime numbers, mathematicians were verymuch interested in finding formulas that can generate primes. Fermat conjecturedthat the numbers 2n + 1 are always prime if n is a power of 2. He verified this forn= 1,2,4,8, and 16. Numbers of this form are called Fermat numbers. But a cen-tury after, his claim was shown to be wrong by the renowned Swiss mathematicianLeonard Euler, who discovered that 641 is a factor of 225 + 1= 4294967297.

The German mathematician Carl Friedrich Gauss, considered to be one of thegreatest mathematicians of all time, developed the language of congruences in theearly 19th century. When doing certain computations, integers may be replaced bytheir remainders when divided by a specific integer, using the language of congru-ences. Many questions can be phrased using the notion of a congruence that can onlybe awkwardly stated without this terminology. Congruences have diverse applica-tions to computer science, including applications to computer file storage, arithmeticwith large integers, and the generation of pseudo-random numbers.

The problem of distinguishing primes from composites, known as primality test-ing, has been extensively studied. The ancient Greek scholar Eratosthenes discov-ered a method, now called the sieve of Eratosthenes. This method finds all primesless than a specified limit. Ancient Chinese mathematicians believed that the primeswere precisely those positive integers n such that n divides 2n − 2. Fermat provedone part of the belief by showing that if n is prime, then n divides 2n− 2. The otherpart of the belief was proven to be wrong, in the early 19th century, by showingthe existence of composite integers n such that n divides 2n − 2, such as n= 341.However, it is possible to develop probabilistic primality tests based on the originalChinese belief. In current days, it is now very well possible to efficiently find primes;in fact, primes with as many as 400 decimal digits can be found in a few minutesof computer time. For example, 11521639599440358017825919582159366050229133173385690566201793635642 860209511722327 7570860721023506604439098144500755041680003586821792652531770745659087273762673860 82846933890552946646764738540931231769626871804922231181205228833608035170680964347 44236870870147935681564806349558357259649661509935439644221493 is a prime number having 309 digits. It is generated by using computersthrough the SAGE software. These large primes numbers are very useful in the con-text of cryptology. The problem of efficiently determining whether a given integer isprime or not was a longstanding and challenging problem. However, some efficientprobabilistic algorithms for primality testing are available, such as Miller–Rabintest, Solovay–Strassen test etc. The breakthrough came in 2002 as Agrawal, Kayal,and Saxena came up with a deterministic efficient algorithm for primality testing.

Page 430: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

416 10 Algebraic Aspects of Number Theory

10.2 Some Properties of Prime Numbers

Theorem 10.2.1 Every positive integer greater than 1 has a prime divisor.

Proof If possible, let there be a positive integer greater than 1 having no prime di-visors. Let S = {x : x is a positive integer greater than 1 having no prime divisors}.Then S (�=∅) ⊆ N+. Thus by the well ordering principle, S must have a least ele-ment, say l. Since l has no prime divisors and l divides l, l cannot be a prime integer.Thus l = ab, where 1 < a < l and 1 < b < l. As a < l, a must have a prime divisor,say x. As, a divides l, x must divide l, contradicting the fact that l does not havea prime divisor. Thus we conclude that every positive integer greater than 1 has aprime divisor. �

A natural question that comes to our mind: Is the set of all primes finite? Theanswer to this question was given long back by Euclid by proving the followingcelebrated theorem in his Book IX of Elements.

Theorem 10.2.2 There are infinitely many primes.

Proof If possible, let there exist only k primes: say p1 < p2 < · · · < pk . Let N =p1p2 · · ·pk + 1. Then N > 1 and hence by Theorem 10.2.1, N has a prime factor,say p. Then p must be one of p1,p2, . . . , pk . Thus p divides p1p2 · · ·pk =N − 1.Hence p divides N− (N−1)= 1, a contradiction, proving that there exist infinitelymany primes. �

Corollary 1 Let pn denote the nth prime. Then pn ≤ 22n−1, for n≥ 1.

Proof We shall prove the result by strong mathematical induction. Clearly, the resultis true for n= 1. We assume that the result is true for n= 2,3, . . . , k. We shall provethe result for n= k+1. From Theorem 10.2.2, we have seen that N = p1p2 · · ·pk+1 is divisible by a prime p and that prime p is not equal to any of the pi ’s, i ∈{1,2, . . . , k}. So, the prime p must be greater than equal to pk+1. Thus pk+1 ≤ p ≤p1p2 · · ·pk + 1 ≤ 220

221 · · ·22k−1 + 1= 22k−1 + 1= 12 22k + 1 ≤ 22k

. So the resultis true for k + 1. Hence by the strong mathematical induction, the result is true forall n≥ 1. �

Remark The estimation given above is very weak as pn is much smaller than 22n−1.

For example, for n= 5, p5 = 11 while 225−1 = 65536.

Corollary 2 For x > 0, let π(x) denote the number of primes less than or equalto x. Then π(x)≥ ,log2(log2 x)- + 1.

Proof Note that ,log2(log2 x)-+1 is the largest integer n such that 22n−1 ≤ x. Thenby the above Corollary 1, there are at least n primes, say p1,p2, . . . , pn such that

Page 431: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.2 Some Properties of Prime Numbers 417

pi ≤ 22n−1, for i = 1,2, . . . , n. All these primes are less than or equal to x and so

π(x)≥ n= ,log2(log2 x)- + 1. �

Remark As before, this bound is also very weak. For example, let x = 224. Then

,log2(log2 x)- + 1= 5, while π(x)= 6542.

In the literature of number theory, there have been many proofs of Theo-rem 10.2.2. In this chapter, we shall provide several such proof techniques.

In 1878, Kummer came up with a very simple proof.

Alternative Proof of Theorem 10.2.2 Suppose that there exist only finitely manyprimes, p1 < p2 < · · · < pr . Let N = p1p2 · · ·pr > 2. Let us consider the integerN − 1 > 1. Then by Theorem 10.2.1, N − 1 must have a prime divisor, say pi ,common with N . So, pi divides both N and N − 1, resulting in: pi divides N −(N − 1)= 1, a contradiction. Hence the number of primes is infinite. �

In 1915, H. Brocard gave another simple proof that was published in the Inter-médiaire des Mathématiciens 22, page 253, attributed to Hermite.

Alternative Proof of Theorem 10.2.2 Let us consider an integer sn = n! + 1, n≥ 1.Then by Theorem 10.2.1, sn must have a prime divisor, say pn. We claim thatpn > n. If not, i.e., if pn ≤ n, then pn divides n! = sn − 1, leads to the fact thatpn divides 1. Thus we find a prime larger than n, for every positive integer n. Thisimplies that there exist infinitely many primes. �

Alternative Proof of Theorem 10.2.2 If possible, let there exist finitely many primes.Let P be the product of all these primes. Let P = ab be any factorization of P withpositive integers a and b. Now for any prime p, either a or b is divisible by p, butnot both. This implies that the positive integer a + b cannot have any prime factor,contradicting Theorem 10.2.1. �

In 1917, Métro gave another simple proof.

Alternative Proof of Theorem 10.2.2 If possible let there exist only k primes: sayp1 < p2 < · · ·< pk . Let P be the product of all these primes, i.e., P = p1p2 · · ·pk .For each i = 1,2, . . . , k, let Qi = P/pi . Then pi does not divide Qi for each i, whilepi divides Qj for i �= j . Let S =Q1+Q2+· · ·+Qk . As S > 1, by Theorem 10.2.1,S must have a prime divisor, say q . Then clearly, q �= pi , for all i = 1,2, . . . , k,contradicting the fact that there exist only k primes, p1,p2, . . . , pk . Thus there existinfinitely many primes. �

Euler gave an indirect proof of Theorem 10.2.2.

Page 432: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

418 10 Algebraic Aspects of Number Theory

Alternative Proof of Theorem 10.2.2 If possible, let there exist finitely many primes,say p1,p2, . . . , pn. For each i = 1,2, . . . , n consider,

∞∑

k=0

1

pki

= 1

(1− 1pi

).

Multiplying these n equalities, we obtain

n∏

i=1

∞∑

k=0

1

pki

=n∏

i=1

1

(1− 1pi

),

where the left hand side is the sum of the inverses of all the natural numbers, eachcounted once—this follows from the fundamental theorem of arithmetic that everynatural number, greater than 1, can be represented as the product of the primes ina unique way. But the series

∑∞n=1

1n

is divergent. Being a series of positive terms,the order of the summation is irrelevant. So, the left hand side is infinite, while theright hand side is clearly finite. This is absurd. �

Another famous result of number theory deals with the existence of infinitelymany primes in arithmetic progressions. The result is known as Dirichlet’s Theoremon primes in arithmetic progressions.

Statement of the Theorem Let a and b be relatively prime positive integers. Thenthe arithmetic progression an+ b, n= 1,2,3, . . . contains infinitely many primes.

G. Lejenue Dirichlet proved the theorem in 1837. But the proof technique isout of the scope of this book. However, a special case of Dirichlet’s Theorem isillustrated as follows.

Theorem 10.2.3 There are infinitely many primes of the form 4k + 3 where k =0,1,2, . . . .

Proof If possible, let there exist only finitely many primes, say p1,p2, . . . , pr ofthe form 4k + 3, k = 0,1,2, . . . . Let N = 4p1p2 · · ·pr − 1. Then N is of the form4k + 3 where k is a non-negative integer. Let p be a prime divisor of N . As N

is odd, the form of p is either 4k + 1 or 4k + 3 for some integer k. Note that ifeach of the prime divisors p of N is of the form 4k + 1, then N must also have thesame form, contradicting the fact that N is of the form 4k + 3. Thus N is divisibleby at least one prime p of the form 4k + 3. So by hypothesis, p = pi for somei = 1,2, . . . , r . This implies that p divides 4p1p2 · · ·pr − N = 1, a contradiction,proving the fact that there are infinitely many primes of the form 4k + 3 wherek = 0,1,2, . . . . �

Page 433: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.2 Some Properties of Prime Numbers 419

10.2.1 Prime Number Theorem

Euclid’s Theorem on the infinitude of the primes is considered to be the first resulton the distribution of primes. In 1737 Euler went a step further and proved that,in fact, the series 1

2 + 13 + 1

5 + 17 + 1

11 + · · · , i.e., the series of the reciprocals ofthe primes, diverges. On the other hand, Euler further observed that the rate of di-vergence of this series is much slower than the rate of divergence of the harmonicseries 1

1 + 12 + 1

3 + 14 + 1

5 + · · · . This statement appears to be the earliest attempt toquantify the frequency of the primes among the positive integers.

In 1793, Gauss conjectured that

limn→∞

π(n)

n/ logn= 1,

where π(n) denotes the number of primes not exceeding a given positive integer n.This result is called the Prime Number Theorem (PNT) which describes the asymp-totic distribution of the prime numbers. Gauss further observed that the logarithmicintegral li(x)= ∫ x

2dt

log tseemed to provide a very good approximation for π(x). In

1986, Jacques Hadamard and Charles Jean de la Vallée-Poussin independently camewith a proof of the prime number theorem.

Remark Already we have shown that there are infinitely many primes. Now thefollowing theorem will show that there are arbitrary long runs of integers containingno primes.

Theorem 10.2.4 Given any positive integer n, there exist n consecutive compositeintegers.

Proof Consider the integers, (n+ 1)! + 2, (n+ 1)! + 3, . . . , (n+ 1)! +n, (n+ 1)! +n+ 1. Every one of the above integers is composite, since j divides (n+ 1)! + j if2≤ j ≤ n+ 1. �

Example 10.2.1 Note that 8! + 2,8! + 3, . . . ,8! + 8 are 7 consecutive compositeintegers. However, these are much larger than the smallest seven consecutive com-posites: 90,91,92, . . . ,96.

10.2.2 Twin Primes

Theorem 10.2.4 shows that there are arbitrary long runs of integers containing noprimes. On the other hand, primes may often close together. Note that the onlyconsecutive primes are 2 and 3. However, there may exist pairs of primes whichdiffer by 2. These pairs of primes are known as twin primes. The pairs (3,5),(5,7), (11,13), (17,19), (29,31), (41,43), (59,61), (71,73), (101,103), (107,109),

Page 434: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

420 10 Algebraic Aspects of Number Theory

(137,139), (149,151), (179,181), (191,193), (197,199), (227,229) are some of theexamples of twin prime pairs.

The twin primes are used to define a very special type of constant, known asBrun’s constant. In 1919, Viggo Brun proved that the sum of the reciprocals of allthe twin primes, i.e., ( 1

3 + 15 )+ ( 1

5 + 17 )+ ( 1

11 + 113 )+· · · , converges to a finite value,

known as Brun’s constant. In contrast, the series of all prime reciprocals diverges toinfinity.

Despite this proof by Viggo Brun regarding Brun’s constant, the question ofwhether there exist infinitely many twin primes has been one of the great open ques-tions in number theory for many years. The famous twin prime conjecture statesthat there are infinitely many primes p such that p + 2 is also prime. In 1849 dePolognac made the more general conjecture that for every natural number k, thereare infinitely many prime pairs p and p′ such that p′ −p = 2k. When k = 1, we getthe twin prime conjecture.

10.3 Multiplicative Functions

In number theory, multiplicative functions play an important role. In this section,we first study some general properties of this multiplicative function. Then we shalldiscuss some special multiplicative functions, such as, Euler phi-function, the num-ber of positive divisor function and the sum of divisor function. Let us start withsome definitions.

Definition 10.3.1 A function that is defined for all positive integers is called anarithmetic function.

We are interested in a particular type of arithmetic function which leads to thefollowing definition.

Definition 10.3.2 An arithmetic function f is said to be a multiplicative functioniff ∀a, b ∈N+ with gcd(a, b)= 1 we have f (ab)= f (a)f (b).

Example 10.3.1 The functions f,g :N+ →N+ defined by f (n)= 1 and g(n)= n,∀n ∈N+ are examples of multiplicative functions.

Given the prime factorization of a positive integer, a simple formulation for amultiplicative function can be found through the following theorem.

Theorem 10.3.1 Let f be a multiplicative function and for the natural number n,let n= p

α11 p

α22 · · ·pαr

r be the prime factorization of n, where pi ’s are distinct primesand αi ≥ 1, for i = 1,2, . . . , r . Then f (p

α11 p

α22 · · ·pαr

r )= f (pα11 )f (p

α22 ) · · ·f (p

αrr ).

Proof We shall prove the result by using the principle of mathematical induc-tion on r . For r = 1, the result is obvious. So, we assume that the result is

Page 435: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.3 Multiplicative Functions 421

true for some k > 1, i.e., f (pα11 p

α22 · · ·pαk

k ) = f (pα11 )f (p

α22 ) · · ·f (p

αk

k ). Now,as gcd(p

α11 p

α22 · · ·pαk

k ,pαk+1k+1 ) = 1, f (p

α11 p

α22 · · ·pαk

k pαk+1k+1 ) = f (p

α11 p

α22 · · ·pαk

k )

f (pαk+1k+1 )= f (p

α11 )f (p

α22 ) · · ·f (p

αk

k )f (pαk+1k+1 ), proving the result for k + 1. Hence

by the principle of mathematical induction, we have the required result. �

Next we shall prove another important result that will be very useful in provingother results on multiplicative functions of a special type.

Theorem 10.3.2 Let f be a multiplicative function. Then the arithmetic function F

defined by F(n)=∑d|n f (d) is also a multiplicative function.

Proof Let gcd(a, b) = 1. Note that for each pair of divisors d1 of a and d2 of b,there corresponds a divisor d = d1d2 of ab. On the other hand each positive divisorof ab can be written uniquely as the product of relatively prime divisors d1 of a andd2 of b. Thus

F(ab) =∑

d|ab

f (d)=∑

d1|ad2|b

f (d1d2)=∑

d1|ad2|b

f (d1)f (d2)

=∑

d1|af (d1)

d2|bf (d2)= F(a)F (b),

proving that F is a multiplicative function. �

Next we discuss a special type of multiplicative function, known as Euler phi-function, which is not only very useful in number theory but also plays an importantrole in constructing many important cryptographic schemes.

10.3.1 Euler phi-Function

Among all the multiplicative functions, Euler phi-function is the most importantfunction in number theory. This function, named after the great Swiss mathemati-cian Leonhard Euler (1707–1783), is defined as follows.

Definition 10.3.3 For a positive integer n, the Euler phi-function, denoted by φ(n),is defined to be the number of positive integers not exceeding n and relatively primeto n.

Euler phi-function and the ring Zn, for n > 1, have a nice connection. To deducethe relation, let us first prove the following lemma.

Lemma 10.3.1 An equivalence class (a) in Zn is a unit in Zn if and only ifgcd(a,n)= 1.

Page 436: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

422 10 Algebraic Aspects of Number Theory

Proof Let (a) in Zn be a unit in Zn. Then there exists an equivalence class (b) in Zn

such that (a)(b)= (1). Thus ab ≡ 1 (modn), i.e., ab = 1+ kn for some integer k.This implies ab+n(−k)= 1, with the result that gcd(a,n)= 1, by the Corollary ofTheorem 1.4.5.

Conversely, let gcd(a,n) = 1. Then there exist integers u and v such that au+nv = 1 which implies au≡ 1 (modn), with the result (a)(u)= (1). So, (a) is a unitin Zn. �

The immediate consequence of the above lemma is the following theorem, whichprovides a nice connection between number theory and ring theory.

Theorem 10.3.3 For n > 1, the number of units of the ring Zn is precisely φ(n).

Proof The proof follows directly from Lemma 10.3.1. �

Now we shall study some of the basic properties of the Euler phi-function. Westart by showing that the Euler phi-function is a multiplicative function. To provethis we need the following lemmas.

Lemma 10.3.2 Let n and m be two positive integers such that gcd(n,m)= 1. Then((a), (b)) is a generator of Zn × Zm if and only if (a) is a generator of Zn and (b)

is a generator of Zm.

Proof Let ((a), (b)) ∈ Zn × Zm be a generator of Zn × Zm. Let (f ) ∈ Zn and(g) ∈ Zm. Then ((f ), (g)) ∈ Zn × Zm. Hence there exists an integer x such that((f ), (g)) = x((a), (b)). This implies that (f ) = x(a) and (g) = x(b), implyingthat Zn = 〈(a)〉 and Zm = 〈(b)〉, proving that (a) is a generator of Zn and (b) is agenerator of Zm.

Conversely, let (a) be a generator of Zn and (b) be a generator of Zm. The or-der of (a) and (b) are, respectively, n and m. Now nm((a), (b))= ((0)Zn

, (0)Zm)=

0Zn×Zm. Further let λ((a), (b))= ((0)Zn

, (0)Zm). This implies n divides λ and m di-

vides λ. As m and n are co-prime, nm divides λ, implying that the order of ((a), (b))

is mn, proving that ((a), (b)) is a generator of Zn ×Zm. �

The following lemma again provides a nice connection between number theoryand cyclic group.

Lemma 10.3.3 The number of generators of a finite cyclic group of order n, n≥ 2,is φ(n).

Proof Let G be a finite cyclic group of order n. Then G# Zn. Let (g) be a generatorof Zn. As (1) ∈ Zn, (1)= (m)(g), for some integer m ∈ Z. Thus there exists someinteger k such that 1−mg = kn, i.e., kn+mg = 1. Hence by the Corollary of The-orem 1.4.5, we have gcd(n, g)= 1. Thus the number of generators of Zn is φ(n). �

Now we are in a position to prove the following theorem.

Page 437: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.3 Multiplicative Functions 423

Theorem 10.3.4 Euler phi-function is a multiplicative function.

Proof Let n and m be two positive integers such that gcd(n,m)= 1. Let us considerthe four groups Zn, Zm, Znm and Zn × Zm. As (n,m) = 1, Zn × Zm is a cyclicgroup which is isomorphic to Znm. By Lemma 10.3.3, it follows that the number ofgenerators of Zn, Zm and Znm are, respectively, φ(n), φ(m) and φ(nm). Now byLemma 10.3.2, it follows that the number of generators of Zn ×Zm is φ(n) · φ(m).As Znm and Zn × Zm are isomorphic groups, they must have the same numberof generators, proving the fact that φ(nm) = φ(n) · φ(m). Consequently, φ is amultiplicative function. �

Now we shall show through the following theorems how to evaluate φ(n) for agiven positive integer n, provided the factorization of n is known.

Theorem 10.3.5 Let p be any prime integer. Then for any positive integer n,φ(pn)= pn − pn−1.

Proof The only positive integers not exceeding pn and not relatively prime to pn

are λp, where λ is an integer such that 1≤ λ ≤ pn−1. Thus the number of positiveintegers not exceeding pn and relatively prime to pn is pn − pn−1. �

The next theorem is for general n whose prime factorization is known.

Theorem 10.3.6 Let n= pα11 p

α22 · · ·pαr

r be the prime factorization of n, where pi ’sare distinct primes. Then φ(n)= n(1− 1

p1)(1− 1

p2) · · · (1− 1

pr).

Proof The result follows from Theorems 10.3.4, 10.3.1, and 10.3.5. �

10.3.2 Sum of Divisor Functions and Number of DivisorFunctions

Beside the Euler phi-function, there are two more important multiplicative functionsin number theory, namely the sum of divisor function and number of divisor functionas defined below.

Definition 10.3.4 For a positive integer n, the sum of divisor function, denoted byσ , is defined by setting σ(n) to be equal to the sum of all positive divisors of n.

Example 10.3.2 For n= 6, σ(6)= 1+ 2+ 3+ 6= 12.

Definition 10.3.5 For a positive integer n, the number of divisor function, denotedby τ , is defined by setting τ(n) to be equal to the number of all positive divisorsof n.

Page 438: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

424 10 Algebraic Aspects of Number Theory

Example 10.3.3 For n= 6, τ(6)= 4.

We now show that both σ and τ are multiplicative functions.

Theorem 10.3.7 σ and τ are multiplicative functions.

Proof Note that f (n) = n and g(n) = 1 are multiplicative functions. The rest ofthe theorem follows from Theorem 10.3.2 and the fact that σ(n)=∑d|n f (d) andτ(n)=∑d|n g(d). �

Theorem 10.3.8 Let p be a prime integer and n be a positive integer. Then

σ(pn)= pn+1−1p−1 and τ(pn)= n+ 1.

Proof The divisors of pn are 1,p,p2,p3, . . . , pn. Thus pn has exactly n+ 1 pos-itive divisors, with the result τ(pn)= n+ 1 and σ(n)= 1+ p + p2 + · · · + pn =pn+1−1

p−1 . �

The above result may be further generalized for any positive integer n.

Theorem 10.3.9 Let n = pα11 p

α22 · · ·pαr

r be the prime factorization of n, where

pi ’s are distinct primes. Then σ(n) = pα1+11 −1p1−1

pα2+12 −1p2−1 · · · p

αr+1r −1pr−1 and τ(n) =

(α1 + 1)(α2 + 1) · · · (αr + 1).

Proof The result follows from Theorems 10.3.7, 10.3.1, and 10.3.8. �

10.4 Group of Units

The group of units play an important role in number theory and it has tremendousapplications in the field of cryptology and coding theory. While studying ring the-ory, we have seen that the ring (Zn,+, ·) contains zero divisors if and only if n iscomposite. For example, Z6 contains (2) and (3) such that (2)(3) = (3)(2) = (0).This fact implies that Zn is not a field under usual addition and multiplication mod-ulo n if n is composite. Therefore, (Zn \ {(0)}, ·) may not be a group in general.However, (Zn,+, ·) forms a commutative ring. Now we may look at the units of Zn

and may try to give some algebraic structures on the set of all units of Zn.

Definition 10.4.1 An equivalence class (a) in Zn, n≥ 2, is called a unit in Zn, iffthere exists an equivalence class (b) in Zn such that (a)(b)= (b)(a)= (1).

Definition 10.4.2 The collection of all units in Zn, n≥ 2, is called the set of unitsof Zn, and is denoted by Z∗n.

Page 439: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.4 Group of Units 425

We are now trying to provide some algebraic structures on Z∗n. The subsequentdiscussions will reveal that Z∗n has indeed some rich algebraic structures. The fol-lowing theorem shows that Z∗n forms a group, known as group of units, under theusual multiplication modulo n.

Theorem 10.4.1 For each integer n≥ 2, the set Z∗n forms a commutative group.

Proof As (1) ∈ Z∗n, Z∗n �= ∅. So, the set Z∗n is a not empty subset of the commu-tative ring (Zn,+, ·). Let (a), (b) ∈ Z∗n. Then by definition of Z∗n, there exist (u),(v) ∈ Z∗n such that (a)(u) = (1) and (b)(v) = (1), with the result (ab)(uv) = (1).Associativity and the commutativity of Z∗n follows from the hereditary property of(Zn,+, ·). Finally, for each (a) ∈ Z∗n, there exists (b) ∈ Z∗n such that (a)(b) = (1)

follows from the definition of Z∗n. Combining all the arguments, it follows that Z∗nforms a commutative group. �

The following proposition provides the order of the group Z∗n.

Proposition 10.4.1 |Z∗n| = φ(n), where |Z∗n| denotes the order of the group Z∗n.

Proof Follows from Lemma 10.3.1. �

Using the properties of the group (Z∗n, ·), we deduce the following importanttheorems of number theory.

Theorem 10.4.2 (Fermat’s Little Theorem) Let p be a prime and a be an integersuch that gcd(a,p)= 1. Then ap−1 ≡ 1 (modp).

Proof Consider the group Z∗p with |Z∗p| = p − 1. Let (a) ∈ Z∗p . Then by the def-inition of Z∗p , gcd(a,p) = 1. Let the order of (a) in Z∗p be n. Then, (a)n = (1)

and the order of the subgroup generated by (a) is n. Thus by Lagrange’s The-orem, n|(p − 1). Then there exists some integer k such that p − 1 = kn. Thus(a)p−1 = (a)kn = ((a)n)k = (1), with the result ap−1 ≡ 1 (modp). �

Corollary Let p be a prime and a be any integer. Then ap ≡ a (modp).

Proof We divide the proof into two cases. In the first case, let us assume thatgcd(a,p)= 1. Then the result, follows from Theorem 10.4.2. For the second case,let us assume that gcd(a,p) �= 1. In that case, p must divide a. Thus a ≡ 0 (modp),with the result ap ≡ 0≡ a (modp). �

Theorem 10.4.3 (Euler’s Theorem) Let n be a positive integer and a be an integersuch that gcd(a,n)= 1. Then aφ(n) ≡ 1 (modn).

Proof Let us consider the group Z∗n. Then by Proposition 10.4.1, the order of thegroup is φ(n). As gcd(a,n) = 1, (a) ∈ Z∗n. Let the order of the element (a) in

Page 440: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

426 10 Algebraic Aspects of Number Theory

Z∗n be k. Then (a)k = (1) and the order of the subgroup generated by (a) is also k.Thus by Lagrange’s Theorem, k divides φ(n). Let φ(n) = kt for some integer t .Then (a)φ(n) = (a)kt = ((a)k)t = (1) implies that aφ(n) ≡ 1 (modn). �

Theorem 10.4.4 (Wilson’s Theorem) For any prime integer p, (p − 1)! ≡−1 (modp).

Proof The non-zero elements of Zp i.e., the elements of Z∗p form a multiplicativegroup of order p − 1 and the self inverse elements of Z∗p are only (1) and (−1)=(p−1). The other non-null elements of Z∗p can be paired by inverse elements so thatthe product of each pair is the identity (1). Consequently, the product of all the non-zero elements is (1)(2) . . . (p− 1)= (−1) in Z∗p . This shows that ([p− 1]!)= (−1)

and hence (p− 1)! ≡ −1 (modp). �

Definition 10.4.3 If Z∗n is cyclic, then any generator (g) of Z∗n is called a primitiveroot for Z∗n.

Example 10.4.1 (2) is a primitive root for Z∗5, whereas there are no primitive rootsfor Z∗8 as Z∗8 is not cyclic.

From the above example, it is clear that primitive root may or may not exist. Evenif it exits, finding primitive roots in Z∗n is a non-trivial problem. Till date, no efficientalgorithm is known which can efficiently find primitive roots. One of the obviousbut tedious methods is to try each of the φ(n) units (u) ∈ Z∗n and check the order of(u) in Z∗n. If we find some element of order φ(n), we say that the element must be aprimitive root. But a slightly better result for a more efficient test for primitive rootsis as follows:

Proposition 10.4.2 An element (g) is a primitive root for Z∗n if and only if(g)φ(n)/p �= (1) in Z∗n for each prime p dividing φ(n).

Proof Let (g) be a primitive root for Z∗n. Then the order of (g) is φ(n). The prooffollows from the definition of the order of (g), i.e., (g)i �= (1) for all i such that1≤ i < φ(n).

Conversely, let (g)φ(n)/p �= (1) in Z∗n for each prime p dividing φ(n). If possible,let (g) not be a primitive root for Z∗n. Then its order, say, m must be a proper factor ofφ(n), with the result φ(n)/m > 1. If p is any prime factor of φ(n)/m, then m mustdivide φ(n)/p, with the result (g)φ(n)/p = (1) in Z∗n, contradicting the hypothesis.Thus (g) must be a primitive root for Z∗n. �

Next we shall prove a very important theorem, which plays an important role incryptography. We know that (Zp,+, ·) forms a field, if p is a prime number. As aresult, (Zp \ {(0)}, ·)= Z∗p is a commutative group. We now prove that (Z∗p, ·) is notonly a commutative group, but a cyclic group of order p− 1. In fact, we shall provea much general result for finite fields. To prove that first prove the following lemma.

Page 441: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.4 Group of Units 427

Lemma 10.4.1 Let G be a commutative group and a, b ∈G be such that o(a)=m,o(b)= n and gcd(m,n)= 1. Then o(ab)=mn.

Proof Let o(ab)= k. As (ab)mn = eG, the identity element of G, k divides mn. Onthe other hand, as G is a commutative group (ab)k = eG implies akn = b−kn, withthe result akn = eG. Thus m divides kn. As gcd(m,n) = 1, m divides kn impliesm divides k. Similarly, it can be shown that n divides k, with the result that mn

divides k. Hence we have mn= k, with the result o(ab)=mn. �

Now we shall prove the following lemma for finite fields.

Lemma 10.4.2 For any finite field Fq having q elements, the multiplicative group(Fq \ {0} = F ∗q , ·) is a cyclic group of order q − 1.

Proof If q = 2, the result is trivial. So we assume that q ≥ 3. Then |F ∗q | = q−1= h,say. Let h= p

α11 p

α22 · · ·pαm

m be the prime factorization of h. Now every polynomialxh/pi − 1 ∈ Fq [x] has at most h/pi roots in Fq . Since h/pi < h, there are non-zeroelements in Fq which are not roots of xh/pi − 1. Let ai be such an element. So,

ah/pi

i �= 1, the identity element of the field Fq . Further, let bi = ah/p

αii

i . Then bp

αii

i =ahi = 1 and b

pαi−1i

i = ah/pi

i �= 1. Hence by Lemma 10.10.10 (used in the settingof multiplicative group), o(bi)= p

αi

i . Now by applying the result of Lemma 10.4.1inductively, we get o(b1b2 · · ·bm)= o(b1)o(b2) · · ·o(bm)= p

α11 p

α22 · · ·pαm

m = q−1.Thus F ∗q contains an element b1b2 · · ·bm of order q − 1 which is same as the orderof the group F ∗q , with the result that F ∗q is a cyclic group. �

Theorem 10.4.5 Z∗p is cyclic if p is a prime integer.

Proof The theorem follows directly from Lemma 10.4.2. �

Remark For any positive integer n≥ 2, the group Z∗n may not always be cyclic. Thecyclic property of the group Z∗n is characterized in Theorem 10.4.8.

We now deal with the case for Z∗n in which n is an odd prime power. We shallprove that if p is an odd prime, Z∗pe is a cyclic group. Before proving the main result,we shall prove the following lemmas.

Lemma 10.4.3 Let (g) be a primitive root for Z∗p , where p is an odd prime integer.Then (g) or (g + p) is a primitive root for Z∗

p2 .

Proof Theorem 10.4.5 ensures the existence of a primitive root, say (g), for Z∗p .

Thus gp−1 ≡ 1 (modp), but gi �≡ 1 mod(p), for 1 ≤ i < p − 1. Note that(g) ∈ Z∗

p2 as gcd(g,p2) = 1. Let the order of (g) in Z∗p2 be d . Then d divides

φ(p2) = p(p − 1). Again, from the definition of the order of (g), it follows that

Page 442: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

428 10 Algebraic Aspects of Number Theory

gd ≡ 1 (modp2). So gd ≡ 1 (modp). Also, (g) has order p − 1 in Z∗p . Thusp − 1 divides d . These two facts imply that either d = p(p − 1) or d = p − 1.If d = p(p − 1), then (g) is a primitive root for Z∗

p2 and hence we are done in thatcase. So assume that d = p − 1. Let h= g + p. Since h≡ g (modp), (h) is also aprimitive root for Z∗p . Thus arguing as before we see that (h) has order p(p− 1) or

p − 1 in Z∗p2 . Since gd = gp−1 ≡ 1 mod(p2) and Z∗

p2 is a commutative group, itfollows that

hp−1 = (g+p)p−1 = gp−1+ (p− 1)gp−2p+ · · ·+pp−1 ≡ 1−pgp−2 (modp2),

where the dots represent terms divisible by p2. Since g is relatively prime to p, wehave pgp−2 �≡ 0 mod(p2) and hence hp−1 �≡ 1 mod(p2). Thus (h) is not of orderp − 1 in Z∗

p2 , so it must be of order p(p − 1) and is therefore a primitive root for

Z∗p2 . Thus there exists a primitive root modulo p2. �

Lemma 10.4.4 Let (h) be a primitive root for Z∗p2 for an odd prime p. Then (h) is

also a primitive root for Z∗pe , for all integers e ≥ 2.

Proof We shall prove the result by the principle of mathematical induction on e.The result is trivially true for e = 2. Let (h) be a primitive root modulo pe forsome e > 2 and d be the order of (h) modulo pe+1. An argument similar to thatas described in Lemma 10.4.3 shows that d divides φ(pe+1) = pe(p − 1) and isdivisible by φ(pe)= pe−1(p− 1). Thus either d = pe(p− 1) or d = pe−1(p− 1).In the first case, (h) is a primitive root modulo pe+1, as required. Thus it is suf-ficient to eliminate the second case by showing that hpe−1(p−1) �≡ 1 (modpe+1).Since (h) is a primitive root modulo pe, it has order φ(pe) = pe−1(p − 1)

in Z∗pe . Thus hpe−2(p−1) �≡ 1 (modpe). However, pe−2(p − 1) = φ(pe−1), so,

hpe−2(p−1) ≡ 1 (modpe−1) by Euler’s Theorem. Combining these two results, wesee that hpe−2(p−1) = 1+ kpe−1, where k is relatively prime to p. Again as before,

hpe−1(p−1) = (1+ kpe−1)p

= 1+(

p

1

)kpe−1 +

(p

2

)(kpe−1)2 + · · · + (kpe−1)p

= 1+ kpe + 1

2k2p2e−1(p− 1)+ · · · + (kpe−1)p,

where the dots represent terms divisible by (pe−1)3 and hence by pe+1, since 3(e−1)≥ (e+ 1) for e ≥ 2. Thus

hpe−1(p−1) ≡ 1+ kpe + 1

2k2p2e−1(p− 1)

(modpe+1).

Now as p is odd, the third term k2p2e−1(p − 1)/2 is also divisible by pe+1, since2e− 1≥ e+ 1 for e ≥ 2. Thus hpe−1(p−1) ≡ 1+ kpe (modpe+1).

Page 443: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.4 Group of Units 429

Since p does not divide k, we must have hpe−1(p−1) �≡ 1 (modpe+1), as required.Thus the lemma follows from the principle of mathematical induction. �

Theorem 10.4.6 For all e > 0, Z∗pe is cyclic if p is an odd prime integer.

Proof The case with e = 1 follows from Theorem 10.4.5. The rest of the theoremfollows from Lemmas 10.4.3 and 10.4.4. �

Remark Note that we need p to be odd, because if p = 2, then the third termk2p2e−1(p − 1)/2 = k222e−2 is not divisible by 2e+1 when e = 2, so the first stepof the induction argument fails.

Theorem 10.4.7 The group Z∗2e is cyclic if and only if e= 1 or e= 2.

Proof The groups Z∗2 = {(1)} and Z∗4 = {(1), (3)} are cyclic, generated by (1) andby (3), respectively. So it is sufficient to prove that Z∗2e is not cyclic for e ≥ 3. Weshall prove that Z∗2e contains no element of order φ(2e) = 2e−1 by showing that

a2e−2 ≡ 1 (mod 2e) for all odd a. We shall prove this by the method of principleof mathematical induction on e. Let us first show that the relation holds for thebase value when e = 3, that is, we need to show a2 ≡ 1 (mod 8) for all odd a.This is true, since if a = 2b + 1 then a2 = 4b(b + 1) + 1 ≡ 1 (mod 8). Now weassume that for some exponent k ≥ 3, a2k−2 ≡ 1 (mod 2k) for all odd a. Then foreach odd a we have a2k−2 = 1+ 2kt for some integer t . Squaring both sides we geta2(k+1)−2 = (1+2kt)2 = 1+2(k+1)t+22kt2 = 1+2k+1(t+2k−1t2)≡ 1 (mod 2k+1),proving that the result is true for k + 1. Hence by the principle of mathematicalinduction, the result is true for all integers e ≥ 3. This completes the proof. �

We are going to prove the following lemma that will be useful in characterizingall cyclic groups of the form Z∗n.

Lemma 10.4.5 If n= ab where a and b are relatively prime and are both greaterthan 2, then Z∗n is not cyclic.

Proof Since gcd(a, b)= 1, we have φ(n) = φ(a)φ(b). Moreover, as both a and b

are greater than 2, both φ(a) and φ(b) are even, with the result that φ(n) to be aninteger divisible by 4. Further, the integer e= φ(n)/2 is divisible by both φ(a) andφ(b). Note that if (x) is a unit in Zn, then (x) is also a unit in Za as well as in Zb .Thus xφ(a) ≡ 1 (moda) and xφ(b) ≡ 1 (modb). Since both φ(a) and φ(b) divide e,we therefore have xe ≡ 1 mod(a) and xe ≡ 1 mod(b). Since a and b are co-prime,this implies that xe ≡ 1 mod(ab), that is, xe ≡ 1 mod(n). Thus every elements ofZ∗n has order dividing e, and since e < φ(n), this means that there is no primitiveroot Z∗n. �

Now we are in a position to provide a necessary and sufficient condition for Z∗nto be cyclic.

Page 444: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

430 10 Algebraic Aspects of Number Theory

Theorem 10.4.8 The group Z∗n is cyclic if and only if

n= 2,4,pe or 2pe, where p is an odd prime integer.

Proof (⇐) Clearly Z∗2 and Z∗4 are cyclic groups generated by (1) and (3), respec-tively. Further, Theorem 10.4.6 ensures the case with odd prime powers. So, we mayassume that n= 2pe, where p is an odd prime integer. Now by Theorem 10.3.4, wehave φ(n) = φ(2)φ(pe) = φ(pe). Also Theorem 10.4.6 ensures the existence of aprimitive root (g) in Z∗pe . Then (g + pe) is also a primitive root modulo pe andone of the g or g + pe must be odd, resulting in the existence of an odd primitiveroot, say (h) modulo pe. We will show that (h) is also a primitive root modulo 2pe.By its construction, h is co-prime to both 2 and pe, so (h) is a unit in Z2pe i.e.,(h) ∈ Z∗2pe . If hi ≡ 1 (mod 2pe), then certainly hi ≡ 1 (modpe). Again, since (h) isa primitive root modulo pe, φ(pe) divides i. Since φ(pe)= φ(2pe), it follows thatφ(2pe) divides i, so (h) has order φ(2pe) in Z∗2pe and is therefore a primitive root,with the result that Z∗2pe is a cyclic group.

(⇒) Let us now prove the converse part. If n �= 2,4, pe or 2pe, where p is anodd prime integer, then we have either

(a) n= 2e where e ≥ 3, or(b) n= 2epf where e ≥ 2, f ≥ 1 and p is odd prime, or(c) n is divisible by at least two odd primes.

We shall show that in all the cases, Z∗n is not cyclic. The case (a) follows fromTheorem 10.4.7. For the case (b), we can take a = 2e and b = pf , while for case(c) we can take a to be of the form pe for some odd prime p dividing n such thatpe divides n but pe+1 does not divide n, and b= n/a. In either case, n= ab wherea and b are co-prime and greater than 2. Thus Lemma 10.4.5 ensures that Z∗n is notcyclic. This completes the proof of the theorem. �

10.5 Quadratic Residues and Quadratic Reciprocity

Let p be an odd prime and a an integer such that gcd(a,p) = 1, i.e., a and p arerelatively prime. In this section, we shall deal with the question: whether a is aperfect square modulo p? Towards finding the answer, let us start with the followingdefinition.

Definition 10.5.1 If n is a positive integer, we say that the integer a is a quadraticresidue modulo n iff gcd(a,n)= 1 and the congruence x2 ≡ a (modn) has a solu-tion in the set of integers. If the congruence x2 ≡ a (modn) has no solution in theset of integers, we say that a is a quadratic non-residue of n.

Remark 1 While defining an integer a to be a quadratic residue modulo a positiveinteger n, instead of considering a to be an integer, we may very well consider itto be an equivalence class (a) ∈ Z∗n. Thus the Definition 10.5.1 my be restated asfollows:

Page 445: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 431

If n is a positive integer, we say that the integer a is a quadratic residue modulo n

iff gcd(a,n)= 1 and there exists an equivalence class (x) ∈ Z∗n such that (a)= (x)2.

Remark 2 The above definition can be extended for any group. Given a group G, anelement a ∈ G is a quadratic residue if there exists an element x ∈ G such thatx2 = a. In this case, we call x as a square-root of a. An element that is not aquadratic residue is called a quadratic non-residue.

Now we are going to explore some algebraic properties of the set of quadraticresidues.

Proposition 10.5.1 In an abelian group G, the set of all quadratic residues, de-noted by QR, forms a subgroup of G.

Proof The identity element of G is always a quadratic residue. Thus QR �= ∅. Letx, y ∈ QR. Then there exist some z,w ∈ G such that x = z2 and y = w2. Thisimplies, xy−1 = (zw−1)2, with the result xy−1 ∈QR. As, QR⊆G, it follows thatQR is a subgroup of G. �

Example 10.5.1 Let us consider n= 11. We are going to find all integers a modulo11 such that x2 ≡ a (mod 11) has a solution in Z. To find all such a’s let us startfrom other direction by calculating the following: 12 ≡ 102 ≡ 1 (mod 11), 22 ≡ 92 ≡4 (mod 11), 32 ≡ 82 ≡ 9 (mod 11), 42 ≡ 72 ≡ 5 (mod 11), 52 ≡ 62 ≡ 3 (mod 11).These calculations imply that in the group Z∗11, the conjugacy classes (1), (4), (9),(5), (3) modulo 11 are the only elements which are the quadratic residues modulo11 while (2), (6), (7), (8), (10) are the only elements in Z∗11 which are the quadraticnon-residues modulo 11. Also note that the set of all quadratic residues modulo 11,denoted by QR11, forms a subgroup of Z∗11.

The above example demonstrates that not all elements of Z∗11 are quadraticresidues modulo 11. Also, the congruence x2 ≡ a (mod 11) has either no solutionor exactly two incongruent solutions modulo 11. This observation leads to the fol-lowing theorem.

Theorem 10.5.1 Let p be an odd prime and a be an integer such that gcd(a,p)= 1.Then the congruence x2 ≡ a (modp) has either no solution or exactly two incon-gruent solutions modulo p.

Proof Let the congruence x2 ≡ a (modp) have a solution in Z, say y1. Theny2

1 ≡ a (modp). This implies (−y1)2 ≡ a (modp) which implies (−y1) is also

a solution of the congruence x2 ≡ a (modp). Now we shall show that y1 and −y1are incongruent modulo p. If not, then y1 ≡ (−y1) (modp), i.e., p divides 2y1.As p is an odd prime, p does not divide 2. Thus p|y1. So, y2

1 ≡ 0 (modp). Also,y2

1 ≡ a (modp) implies that a ≡ 0 (modp), i.e., p|a, contradicting the fact that

Page 446: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

432 10 Algebraic Aspects of Number Theory

gcd(a,p) = 1. Hence, y1 �≡ −y1 (modp). Now we shall prove that there exist ex-actly two incongruent solutions modulo p. Let z be any solution of x2 ≡ a (modp).Then z2 ≡ a (modp). As y2

1 ≡ a (modp), y21 ≡ z2 (modp) which implies that

p|(y1+ z)(y1− z) which implies either p|(y1+ z) or p|(y1− z), with the result thateither z≡ y1 (modp) or z≡−y1 (modp). Hence the congruence x2 ≡ a (modp)

has either no solution or exactly two incongruent solutions modulo p. �

Corollary If p is an odd prime integer, then the equation x2 ≡ 1 (modp) has ex-actly two incongruent solutions, namely 1 and −1.

Proof For p = 2, the result is trivial as 1 ≡ −1 (mod 2). The rest of the corollaryfollows from the above Theorem 10.5.1. �

The following result demonstrates that if p is an odd prime, then there are exactlyas many quadratic residues as quadratic non-residues in Z∗p .

Proposition 10.5.2 Let p be an odd prime integer. Then exactly half the elementsof Z∗p are quadratic residues.

Proof Define a map sqp : Z∗p → Z∗p , defined by sqp(x) = x2, for all x ∈ Z∗p . Itfollows from Theorem 10.5.1 that sqp is a two-to-one function for any odd prime p.This immediately implies that exactly half the elements of Z∗p are quadratic residues.We denote the set of quadratic residues modulo p by QRp , and the set of quadraticnon-residues by QNRp . Then

|QRp| = |QNRp| =|Z∗p|

2= p− 1

2. �

A special notation, known as Legendre symbol, associated with quadraticresidues is defined as follows.

Definition 10.5.2 Let p be an odd prime and a an integer such that gcd(a,p)= 1.Then the Legendre symbol

( ap

)is defined by

(a

p

)={

1, if a is a quadratic residue modulo p,

−1, if a is not a quadratic residue modulo p.

Example 10.5.2 From Example 10.5.1, we find that

(a

11

)={

1, for a = 1,3,4,5,9,

−1, for a = 2,6,7,8,10.

We now characterize the quadratic residues in Z∗p for odd prime p. We may re-call the fact that Z∗p is a cyclic group of order p − 1 (see Theorem 10.4.5). Letg be a generator of Z∗p . As p is an odd prime, Z∗p may be written as, Z∗p =

Page 447: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 433

{g0, g1, g2, . . . , gp−1

2 −1, gp−1

2 , gp−1

2 +1, . . . , gp−2}. As in Z∗p , gi = gi (modp−1), forall i ∈ Z, squaring each element in this list and reducing modulo p− 1 in the expo-nent yields a multi-set {g0, g2, g4, . . . , gp−3, g0, g2, g4, . . . , gp−3}, containing thelist of all the quadratic residues in Z∗p . Note that in the multi-set, each quadratic

residue appears exactly twice. Thus QRp = {g0, g2, g4, . . . , gp−3}. We see that thequadratic residues in Z∗p are exactly those elements that can be written as gi withi ∈ {0, . . . , p− 3} an even integer. This leads to the following proposition.

Proposition 10.5.3 If g is a generator of Z∗p , then

gn is a

{quadratic residue, if n is even,

quadratic non-residue, if n is odd.

The above characterization leads to a simple way to compute the Legendre sym-bol and this tells us whether a given element x ∈ Z∗p is a quadratic residue or not byusing the following proposition.

Proposition 10.5.4 Let p be an odd prime and a be an integer such thatgcd(a,p)= 1. Then

(a

p

)≡ a

p−12 (modp).

Proof Let a be a quadratic residue modulo p. Then( a

p

) = 1. Also, let (g) be a

generator of Z∗p . Then by Proposition 10.5.3, (a)= (g)2i , for some integer i. Thus

ap−1

2 = (g2i )p−1

2 = (gp−1)i ≡ 1 (modp), by Fermat’s Little Theorem 10.4.2. So,

(ap)≡ 1 (modp) ≡ ap−1

2 (modp), as claimed.On the other hand, if a is not a quadratic residue, then by Proposition 10.5.3,

(a) = (g)2i+1, for some integer i. Thus ap−1

2 = (g2i+1)p−1

2 = (g2i )p−1

2 gp−1

2 =(gp−1)ig

p−12 ≡ g

p−12 (modp). Now, (g

p−12 )2 = (g)p−1 ≡ 1 (modp). Thus (g)

p−12

is either +(1) or −(1) by the Corollary of Theorem 10.5.1. As, (g) is a gener-

ator of Z∗p , the order of (g) is p − 1, and hence (g)p−1

2 cannot be +(1). Thus

ap−1

2 ≡−1 (modp)≡ ( ap). �

Using the above Proposition 10.5.4, we state the following proposition.

Proposition 10.5.5 Let p be an odd prime and a, b be two integers such thatgcd(a,p)= 1 and gcd(b,p)= 1. Then

(i)( ab

p

)= ( ap)( b

p

);

(ii) a ≡ b (modp) implies( a

p

)= ( bp

);

(iii)(

a2

p

)= 1,( 1

p

)= 1,(−1

p

)= (−1)p−1

2 .

The following proposition is an immediate consequence of Proposition 10.5.5.

Page 448: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

434 10 Algebraic Aspects of Number Theory

Proposition 10.5.6 Let QRp and QNRp denote, respectively, the set of allquadratic residues and the set of all quadratic non-residues modulo an odd primep. Let a, a′ ∈QRp and b, b′ ∈QNRp . Then

(i) aa′ ∈QRp;(ii) bb′ ∈QRp;

(iii) ab ∈QNRp .

The following proposition leads an alternative proof of Proposition 10.5.2.

Proposition 10.5.7 Let p be an odd prime and a be an integer such that 1 ≤ a ≤p− 1. Then

p−1∑

a=1

(a

p

)= 0.

Proof Let (g) be a generator of Z∗p . As (a) ∈ Z∗p , there exists unique i, 1 ≤ i ≤p − 1, such that (a) = (g)i . Now, we claim that

( gp

) = −1. If not, then( g

p

) = 1.

This implies that gp−1

2 ≡ 1 (modp), contradicting the fact that order of g is p− 1.Thus

( gp

)=−1. Now,

(a

p

)=(

gi

p

)=(

g

p

)(g

p

)· · ·(

g

p

)= (−1)i .

So,

p−1∑

a=1

(a

p

)=

p−1∑

i=1

(−1)i = 0. �

The following remark is an immediate consequence of the above proposition andprovides an alternative proof of Proposition 10.5.2.

Remark Let p be an odd prime integer. Then there are precisely p−12 quadratic

residues and p−12 quadratic non-residues modulo p.

Gauss provided another elegant criterion to determine whether an integer a rela-tively prime to p is a quadratic residue modulo an odd prime p.

Theorem 10.5.2 (Gauss Lemma) Let p be an odd prime and a be an integersuch that gcd(a,p) = 1. Consider the integers a,2a,3a, . . . ,

p−12 a and their least

non-negative residues modulo p that exceeds p2 . Let μ denote the number of these

residues modulo p that exceeds p2 . Then

(a

p

)= (−1)μ.

Page 449: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 435

Proof Let R= {a,2a,3a, . . . ,p−1

2 a}. As gcd(a,p)= 1, none of these p−12 integers

in R is congruent to 0 modulo p and no two of them are congruent to each othermodulo p. Let r1, r2, . . . , rμ denote the least positive residues of these elements ofR that exceed p

2 and let s1, s2, . . . , st denote the remaining least positive residues

of the elements of R. Note that μ + t = p−12 and 0 < p − ri <

p2 for 1 ≤ i ≤ μ.

So the integers p − r1,p − r2, . . . , p − rμ, s1, s2, . . . , st are all positive integersand less than p

2 . We shall prove that these p−12 integers are all distinct. To prove

that it is sufficient to prove that no p − ri is equal to any sj . If possible, let forsome i and j , p − ri = sj , i.e., ri + sj = p. Then there exist integers x and y

such that ri ≡ ax (modp) and sj ≡ ay (modp) such that 1 ≤ x, y ≤ p−12 . Thus

(x+y)a ≡ ri + sj = p ≡ 0 (modp). As gcd(a,p)= 1, p|(x+y), contradicting thefact that 1 ≤ x, y ≤ p−1

2 . Hence p − r1,p − r2, . . . , p − rμ, s1, s2, . . . , st are just

all the integers 1,2, . . . ,p−1

2 , in some order. Hence their product is simply (p−1

2 )!.Thus we have

(p− 1

2

)! = (p− r1) · (p− r2) · · · (p− rμ) · s1 · s2 · · · st≡ (−1)μr1 · r2 · · · rμ · s1 · s2 · st (modp).

As r1, r2, . . . , rμ, s1, s2, . . . , st are least positive residues modulo p of a,2a, . . . ,p−1

2 , in some order, we have

(p− 1

2

)! ≡ (−1)μa · 2a · · ·

(p− 1

2

)a (modp)

≡ (−1)μap−1

2

(p− 1

2

)! (modp).

As gcd((p−1

2 )!,p)= 1, (p−1

2 )! is canceled out from both sides, resulting in

1≡ (−1)μap−1

2 (modp).

Multiplying both sides by (−1)μ, we have

ap−1

2 ≡ (−1)μ modp.

Now, from Proposition 10.5.4, it follows that( a

p

)≡ (−1)μ modp and hence( a

p

)=(−1)μ. �

Example 10.5.3 To check whether the congruence x2 ≡ 5 (mod 13) has solutionsin the set of integers, we may use the Gauss Lemma. Here a = 5, p = 13 and theset R= {5,10,15,20,25,30}. Now the least positive residues modulo 13 of theseelements of R are 5, 10, 2, 7, 12, 4, respectively. Out of these elements, only 10, 7,and 12 exceed p/2 = 6.5. Thus here μ = 3. Hence by the Gauss Lemma,

( 513

) =

Page 450: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

436 10 Algebraic Aspects of Number Theory

(−1)μ = (−1)3 =−1, with the result that the congruence x2 ≡ 5 (mod 13) has nosolution in the set of integers.

Using the Gauss Lemma, we now characterize all primes that have 2 as aquadratic residue modulo an odd prime p.

Theorem 10.5.3 Let p be an odd prime integer. Then

(2p

)= (−1)

p2−18 .

Proof To prove the theorem, it is sufficient to prove that 2 is a quadratic residuemodulo p if and only if p ≡ 1 (mod 8) or p ≡ 7 (mod 8). Let us consider the setS = {2,4, . . . , p − 1}. Then the number μ of integers from the set S that exceedsp/2 is same as the number of integers that exceeds p/4 in the set {1,2, . . . ,

p−12 }.

Thus μ= p−12 − ,p

4 -.Now as p is an odd prime, depending on the remainder modulo 8, there are the

following four cases:

Case 1: If p = 8k+ 1, for some k ≥ 1, then μ= 4k − 2k = 2k, an even integer.Case 2: If p = 8k + 3, for some k ≥ 0, then μ = 4k + 1 − 2k = 2k + 1, an odd

integer.Case 3: If p = 8k+ 5, for some k ≥ 0, then μ= 4k+ 2− 2k− 1= 2k+ 1, an odd

integer.Case 4: If p = 8k+ 7, for some k ≥ 0, then μ= 4k+ 3− 2k− 1= 2k+ 2, an even

integer.

The theorem now follows from Theorem 10.5.2 (Gauss Lemma). �

Remark The integer 2 is a quadratic residue of all primes p ≡ ±1 (mod 8) and aquadratic non-residue of all primes p ≡±3 (mod 8).

We are now going to prove the following lemma that facilitates a passage fromthe Gauss Lemma to the proof of one of the celebrated theorems in number theory,known as, Law of Quadratic Reciprocity.

Lemma 10.5.1 Let p be an odd prime and a be an odd integer with gcd(a,p)= 1.Then

(a

p

)= (−1)

∑(p−1)/2i=1 [ia/p],

where [ia/p] denotes the greatest integer not exceeding ia/p.

Proof Let us consider the integers a,2a, . . . , [p−12 ]a. For i = 1,2, . . . , [p−1

2 ], eachia can be uniquely represented by ia = qip + ui where 1 ≤ ui < p. Thus ia/p =

Page 451: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 437

qi + ui/p. So [ia/p] = qi . Hence, for i = 1,2, . . . , [p−12 ],

ia =[ia

p

]p+ ui. (10.1)

As in the Gauss Lemma (Theorem 10.5.2), let us use the notations for ri and sj ,i.e., if the remainder ui > p/2, then it is one of the integers r1, r2, . . . , rμ, while ifui < p/2, then it is one of the integers s1, s2, . . . , st . Now from (10.1), we have

(p−1)/2∑

i=1

ia =(p−1)/2∑

i=1

[ia

p

]p+

μ∑

i=1

ri +t∑

i=1

si . (10.2)

As it was argued while proving the Gauss Lemma that the p−12 integers p− r1,p−

r2, . . . , p − rμ, s1, s2, . . . , st are just all the integers 1,2, . . . ,p−1

2 , in some order,we have

(p−1)/2∑

i=1

i =μ∑

i=1

(p− ri)+t∑

i=1

si = pμ−μ∑

i=1

ri +t∑

i=1

si . (10.3)

Subtracting (10.3) from (10.2), we get

(a − 1)

(p−1)/2∑

i=1

i = p

((p−1)/2∑

i=1

[ia

p

]−μ

)+ 2

μ∑

i=1

ri . (10.4)

As a and p are both odd, a ≡ p ≡ 1 (mod 2). Thus equation (10.4) becomes

0 ·(p−1)/2∑

i=1

i ≡ 1 ·(

(p−1)/2∑

i=1

[ia

p

]−μ

)(mod 2),

resulting in

μ=(p−1)/2∑

i=1

[ia

p

](mod 2).

Thus from the Gauss Lemma, we have(

a

p

)= (−1)μ = (−1)

∑(p−1)/2i=1 [ ia

p] (mod 2) = (−1)

∑(p−1)/2i=1 [ ia

p],

as required. �

We are now in a position to prove the Law of Quadratic Reciprocity, a celebratedtheorem in number theory. Suppose p and q are distinct odd primes and we knowwhether q is a quadratic residue of p. Then the question is: whether p is a quadraticresidue modulo q? In mid-1700s, Euler found the answer of the question throughexamining numerical evidence, but failed to prove the result. Later, in 1785, Legen-

Page 452: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

438 10 Algebraic Aspects of Number Theory

Fig. 10.1 Lattice pointswithin the rectangle

dre re-formulated Euler’s answer, in its modern form. Though Legendre proposedseveral proofs of the theorem, each of his proofs contained a serious gap. The firstcorrect proof was proposed by Gauss, who claimed to have rediscovered this resultwhen he was 18 years old. Gauss devised seven more proofs, each based on a differ-ent approach. The proof presented below, a variant of one of Gauss’ own arguments,is due to his student Ferdinand Eisenstein.

Theorem 10.5.4 (Law of Quadratic Reciprocity) Let p and q be two distinct oddprimes. Then

(p

q

)(q

p

)= (−1)

p−12

q−12 .

Proof Let us consider a rectangle in the xy coordinate plane, whose vertices are(0,0), (p/2,0), (p/2, q/2) and (0, q/2) as shown in Fig. 10.1.

We consider the points, whose coordinates are integers, within this rectangle i.e.,not including any points on the bounding lines i.e., the points on the x axis, y axis,and the lines x = p/2 and y = q/2 are excluded. The points within the rectangleare called lattice points within the rectangle. We are now going to count the numberof these lattice points in two different ways. As p and q are both odd integers, thelattice points within the rectangle consists of all points (x, y) such that 1≤ x ≤ p−1

2

and 1≤ y ≤ q−12 . Thus the number of such points is p−1

2 · q−12 .

Now we are going to count the number of these points in a different way. Let usconsider the diagonal D passing through the points (0,0) and (p/2, q/2). Then theequation of the diagonal D is given by y = (q/p)x. As gcd(p, q) = 1, we claimthat none of the lattice points within the rectangle lies on the diagonal D. If possiblelet there exist some lattice point on the diagonal, say (a, b), within the rectangle.Then, we have b= (q/p)a. That implies p divides a and q divides b, contradictingthe fact that 1≤ a ≤ p−1

2 and 1≤ b ≤ q−12 . Hence, none of the lattice points within

the rectangle lie on the diagonal D. As, the diagonal D divides the rectangle intotwo parts, let B denote the portion of the rectangle below the diagonal D and let U

denote the portion above. To count the total number of points within the rectangle, itis sufficient to count the total number of points inside each of the portions B and U .

Page 453: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 439

First let us count the number of lattice points within B . Let us fix any point (x,0)

on the x-axis such that x is an integer with 1≤ x ≤ p/2. Now if we draw a verticalline through the point (x,0), then it cuts the diagonal at (x, qx/p). As, the latticepoints within the rectangle neither lie on the x-axis nor on the diagonal, there areprecisely [ xq

p] lattice points in B just above the point (x,0) and below D. Now, if

we range x from 1 to (p − 1)/2, the total number of lattice points contained in B

is∑(p−1)/2

x=1 [ xqp]. By similar argument, with the roles of p and q interchanged, it

can also be shown that the total number of lattice points within U is∑(q−1)/2

y=1 [ ypq].

Thus equating the two different types of counting, we have

p− 1

2· q − 1

2=

(p−1)/2∑

x=1

[xq

p

]+

(q−1)/2∑

y=1

[yp

q

].

Now by Lemma 10.5.1, we have(

p

q

)(q

p

)= (−1)

∑(q−1)/2y=1 [ yp

q] · (−1)

∑(p−1)/2x=1 [ xq

p]

= (−1)∑(p−1)/2

x=1 [ xqp]+∑(q−1)/2

y=1 [ ypq]

= (−1)p−1

2q−1

2 .

This completes the proof of the law of quadratic reciprocity. �

As a consequence, the following corollary is immediate.

Corollary Let p and q be two distinct odd primes. Then

(p

q

)={( q

p

)if p ≡ 1 (mod 4) or q ≡ 1 (mod 4)

−( qp)

if p ≡ q ≡ 3 (mod 4).

Remark The law of quadratic reciprocity is some times very useful in calculating( ap

)with large prime p and comparatively small a, where the factorization of a

is known. For example, if a = pα11 p

α22 · · ·pαk

k is the prime factorization of a, then( ap

) =∏ki=1

( pi

p

)αi . Now each of( pi

p

)may be calculated as

( pi

p

) = ( p (mod pi)pi

),

if p ≡ 1 (mod 4) or pi ≡ 1 (mod 4) and( pi

p

) = −( p (mod pi)pi

), if p ≡ pi ≡ 3

(mod 4). So instead of calculating in modulo p, we can calculate in modulo thesmaller prime pi .

We are now going to define Jacobi Symbol, named after the German mathemati-cian Carl Jacobi (1804–1851) who introduced the symbol which is a generalizationof the Legendre symbol. Jacobi symbol plays an important role in primality testingto be discussed latter.

Definition 10.5.3 Let n be an odd positive integer with prime factorization n =p

α11 p

α22 · · ·pαk

k and let a be an integer such that gcd(a,n) = 1. Then, the Jacobi

Page 454: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

440 10 Algebraic Aspects of Number Theory

symbol( a

n

)is defined by

(a

n

)=(

a

p1

)α1(

a

p2

)α2

· · ·(

a

pk

)αk

,

where the symbols on the right hand side of the equality are the Legendre symbols.

Proposition 10.5.8 Let n be an odd positive integer and a be an integer such thatgcd(a,n)= 1. If the congruence x2 ≡ a (modn) has a solution in Z, then

( an

)= 1.

Proof Let p be any prime factor of n. As the congruence x2 ≡ a (modn) has a so-lution in Z, the congruence x2 ≡ a (modp) has also a solution in Z. Thus

( ap

)= 1.Consequently,

(a

n

)=

k∏

i=1

(a

pi

)αi

= 1, where n= pα11 p

α22 · · ·pαk

k .�

Remark The converse of the above proposition may not be true. For example,( 215

)= ( 25

) · ( 23

)= (−1) · (−1)= 1. However, there are no solutions to the congru-

ence x2 ≡ 2 (mod 15) in Z as the congruences x2 ≡ 2 (mod 3) and x2 ≡ 2 (mod 5)

have no solutions in Z.Now we shall show that the Jacobi symbol enjoys some of the properties similar

to those of Legendre symbol.

Proposition 10.5.9 Let n be an odd positive integer and let a and b be integerssuch that gcd(a,n)= 1 and gcd(b,n)= 1. Then

(i) if, a ≡ b (modn) then( a

n

)= ( bn

);

(ii)(

abn

)= ( an) · ( b

n

);

(iii)(−1

n

)= (−1)(n−1)/2;

(iv)( 2

n

)= (−1)(n2−1)/8.

Proof Let n = pα11 p

α22 · · ·pαk

k be the prime factorization of n. Now we prove thefour parts one by one.

Proof of (i). Let p be any prime factor of n. As a ≡ b (modn), a ≡ b (modp).Thus by Proposition 10.5.5(ii), it follows that

( ap

)= ( bp

). Now

(a

n

)=(

a

p1

)α1

·(

a

p2

)α2

· · ·(

a

pk

)αk

=(

b

p1

)α1

·(

b

p2

)α2

· · ·(

b

pk

)αk

=(

b

n

).

Page 455: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.5 Quadratic Residues and Quadratic Reciprocity 441

Proof of (ii). The result follows directly from Proposition 10.5.5(i).Proof of (iii). Proposition 10.5.5(iii) asserts that for a prime factor p of n,

(−1p

)=(−1)(p−1)/2. Consequently,

(−1n

)=(−1

p1

)α1

·(−1

p2

)α2

· · ·(−1

pk

)αk

= (−1)α1(p1−1)/2+α2(p2−1)/2+···+αk(pk−1)/2. (10.5)

Now from the prime factorization of n, we have

n= (1+ (p1 − 1))α1 · (1+ (p2 − 1)

)α2 · · · (1+ (pk − 1))αk .

As each pi is odd, we have

(1+ (pi − 1)

)αi ≡ (1+ αi(pi − 1))(mod 4)

and

(1+ αi(pi − 1)

) · (1+ αj (pj − 1))

≡ (1+ αi(pi − 1)+ αj (pj − 1))(mod 4), for i �= j.

Therefore,

n≡ 1+ α1(p1 − 1)+ α2(p2 − 1)+ · · · + αk(pk − 1) (mod 4).

Consequently,

n− 1

2≡ (α1(p1 − 1)/2+ α2(p2 − 1)/2+ · · · + αk(pk − 1)/2

)(mod 2). (10.6)

Thus combining (10.5) and (10.6), we get(−1

n

)= (−1)(n−1)/2, as required.

Proof of (iv). From Theorem 10.5.3, we have( 2

p

) = (−1)(p2−1)/8, for any odd

prime p. Hence,

(2n

)=(

2p1

)α1

·(

2p2

)α2

· · ·(

2pk

)αk

= (−1)α1(p21−1)/8+α2(p

22−1)/8+···+αk(p

2k−1)/8. (10.7)

Now from the prime factorization of n, we have

n2 = (1+ (p21 − 1))α1 · (1+ (p2

2 − 1))α2 · · · (1+ (p2

k − 1))αk .

As p2i − 1≡ 0 (mod 8), we have

(1+ (p2

i − 1))αi ≡ 1+ αi

(p2

i − 1)(mod 64)

Page 456: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

442 10 Algebraic Aspects of Number Theory

and(1+ αi

(p2

i − 1)) · (1+ αj

(p2

j − 1))

≡ 1+ αi

(p2

i − 1)+ αj

(p2

j − 1)(mod 64), for i �= j.

Therefore,

n2 ≡ 1+ α1(p2

1 − 1)+ α2

(p2

2 − 1)+ · · · + αk

(p2

k − 1)(mod 64).

Consequently,

n2 − 1

8≡ α1(p2

1 − 1)/8+ α2

(p2

2 − 1)/8+ · · · + αk

(p2

k − 1)/8 (mod 8). (10.8)

Thus combining (10.7) and (10.8), we have( 2

n

)= (−1)(n2−1)/8, as required. �

Theorem 10.5.5 Let n and m be two odd positive integers such that gcd(n,m)= 1.Then

(n

m

)(m

n

)= (−1)

m−12

n−12 .

Proof Let n= pα11 p

α22 · · ·pαk

k and m= qβ11 q

β22 · · ·qβt

t be the prime factorizations ofn and m, respectively. Now

(n

m

)=

t∏

j=1

(n

qj

)βj

=t∏

j=1

k∏

i=1

(pi

qj

)βj αi

and(

m

n

)=

k∏

i=1

(m

pi

)αi

=k∏

i=1

t∏

j=1

(qj

pi

)αiβj

.

Hence,(

n

m

)(m

n

)=

k∏

i=1

t∏

j=1

((pi

qj

)(qj

pi

))αiβj

.

Using the law of quadratic reciprocity for the primes pi and qj , we have

(n

m

)(m

n

)=

k∏

i=1

t∏

j=1

(−1)αi(pi−1

2 )βj (qj−1

2 )

= (−1)∑k

i=1∑t

j=1 αi(pi−1

2 )βj (qj−1

2 )

= (−1)∑k

i=1 αi(pi−1

2 )∑t

j=1 βj (qj−1

2 ) (10.9)

Page 457: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.6 Fermat Numbers 443

By using the similar argument as in the Proof of (iii) in Proposition 10.5.9, we have

k∑

i=1

αi

(pi − 1

2

)≡ n− 1

2(mod 2)

andt∑

j=1

βj

(qj − 1

2

)≡ m− 1

2(mod 2).

Thus from (10.9), we have(

n

m

)(m

n

)= (−1)

n−12

m−12 ,

as required. �

10.6 Fermat Numbers

In this section, we shall look at a special class of numbers, known as Fermat number.In number theory, this special class of numbers plays an important role.

Definition 10.6.1 A Fermat number is an integer Fn of the form Fn = 22n + 1,n≥ 0. If Fn is prime, then it is called Fermat prime.

Fermat, having great mathematical intuition, observed that F0 = 3, F1 = 5,F2 = 17, F3 = 257, F4 = 65537 are all primes. He had a belief that Fn is primefor each value of n and expressed his confidence while communicating his idea toanother great mathematician Mersenne. In 1732, the belief of Fermat was proven tobe wrong by Euler showing that 641 divides F5 = 4294967297. G. Bennett gave thefollowing alternative elementary proof that 641 divides F5.

Proposition 10.6.1 641 divides F5.

Proof Observe that 641 = 27 · 5 + 1. Let a = 27 and b = 5. Now 1 + ab − b4 =1+ b(a − b3) = 1+ b(27 − 53) = 1+ 3b = 24. But this implies, F5 = 225 + 1 =24(27)4 + 1= (1+ ab− b4)a4 + 1= (1+ ab)a4 − a4b4 + 1= (1+ ab)a4 + (1+a2b2)(1− a2b2)= (1+ ab)a4+ (1+ ab)(1− ab)(1+ a2b2)= (1+ ab)(a4+ (1−ab)(1+ a2b2)). This implies that 641= ab+ 1 divides F5. �

The following proposition gives a nice form of the prime factors of Fn.

Proposition 10.6.2 Every prime factor of Fn (n≥ 2) must be of the form 2n+2k+1,for some positive integer k.

Page 458: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

444 10 Algebraic Aspects of Number Theory

Proof Let p be a prime factor of Fn = 22n + 1, where n ≥ 2. Then 22n ≡−1 (modp). This implies that 22n · 22n ≡ 1 (modp), with the result 22n+1 ≡1 (modp). We claim that the order of 2 (modp) in Z∗p is 2n+1. If possible, let

the order of 2 (modp) in Z∗p be t < 2n+1. Then t divides 2n+1. Thus t must be

of the form 2k , k = 1,2, . . . , n. Thus 22k ≡ 1 (modp), contradicting the fact that22n ≡−1 (modp). Hence the order of 2 (modp) in Z∗p is 2n+1. Thus by Lagrange’s

Theorem, 2n+1 divides p − 1. In particular, as n = 2, 8 = 23 divides p − 1. Sop must be of the form 8k + 1. Hence by Theorem 10.5.3 and Proposition 10.5.4,( 2

p

)= 1≡ 2p−1

2 (modp). Thus 2n+1 divides p−12 which implies p = k2n+2+ 1, for

some positive integer k. �

Remark Proposition 10.6.2 may be used to provide a simple alternative proof of thefact that 641= 25+2 · 5+ 1 divides F5 (Proposition 10.6.1).

Since the number Fn increases very rapidly with n, it is not very easy to checkthe primality for Fn (i.e., to check whether Fn is prime or not). But in 1877, Pepinfirst introduced the following primality test for Fn.

Proposition 10.6.3 Let Fn denote the nth Fermat number with n≥ 2. For the inte-ger k ≥ 2, the following conditions are equivalent.

1. Fn is prime and the Legendre symbol( k

Fn

)=−1.

2. kFn−1

2 ≡−1 (modFn).

Proof (1)⇒ (2) Let Fn be prime and( k

Fn

)=−1. Then by the definition of Legen-

dre symbol, kFn−1

2 ≡−1 (modFn).

(2) ⇒ (1) Let 1 ≤ a < Fn be such that a ≡ k (modFn). Then aFn−1

2 ≡−1 (modFn). Thus aFn−1 ≡ 1 (modFn). As a

Fn−12 ≡ −1 (modFn) and 2 is the

only prime factor of Fn − 1, by Proposition 10.9.3, Fn is a prime integer. Finally,the rest of the proposition follows from Proposition 10.5.4. �

Remark Till date it is not known whether there exist infinitely many Fermat primes.Researches are going on in that direction. The Fermat number have been studiedintensively, often with the aid of computers. Fermat primes play an important rolein geometry as showed by Gauss in 1801 that a regular polygon with k sides can beconstructed by ruler and compass methods if and only if k = 2ep1p2 · · ·pr , wherep1,p2, . . . , pr are distinct Fermat primes.

We now study some more properties of Fermat numbers.

Proposition 10.6.4 Let Fn denote the nth Fermat number. Then for all positiveintegers n, F0F1F2 · · ·Fn−1 = Fn − 2.

Page 459: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.7 Perfect Numbers and Mersenne Numbers 445

Proof We prove the result by the principle of mathematical induction on n. Forn = 1, F0 = 3 and F1 = 5. So the condition F0 = F1 − 2 holds for n = 1.Let us assume that the condition holds for some k > 1, i.e., F0F1F2 · · ·Fk−1 =Fk − 2. Now, F0F1F2 · · ·Fk−1Fk = (F0F1F2 · · ·Fk−1)Fk = (Fk − 2)Fk = (22k +1− 2)(22k + 1) = 22k+1 − 1 = Fk+1 − 2, showing that the result is true for k + 1.Hence the result follows from the principle of mathematical induction. �

We are going to show another interesting property of Fermat numbers whichleads to an alternative proof of Theorem 10.2.2.

Proposition 10.6.5 Distinct Fermat numbers are co-prime.

Proof Let d be the gcd of Fn and Fn+m, where m ∈ N+, i.e., d = gcd(Fn,Fn+m).Note that x =−1 is a root of the polynomial x2m − 1. Thus x + 1 divides x2m − 1.Now substituting x = 22n

, Fn = 22n + 1 divides 22n+m − 1 = Fn+m − 2, with theresult that d divides 2. As both Fn and Fn+m are odd, d must be 1. �

Alternative Proof of Theorem 10.2.2 From the above theorem, it follows that forany given positive integer n, each of the Fermat numbers Fi is divisible by an oddprime which does not divide any of the other Fermat number Fj , for i �= j , i, j ∈{1,2, . . . , n}. So for any given positive integer n, there are at least n distinct oddprimes not exceeding Fn, proving that the number of primes is infinite. �

Remark Note that the n+1th prime pn+1 ≤ Fn = 22n+1. This inequality is slightlystronger than the inequality as mentioned in Corollary 1 of Theorem 10.2.2.

10.7 Perfect Numbers and Mersenne Numbers

Due to some mystical beliefs, the ancient Greeks were interested on a special typeof integers, known as perfect numbers that are equal to the sum of all their properpositive divisors. Surprisingly, the ancient Greeks knew how to find even perfectnumbers.

Definition 10.7.1 A positive integer n is said to be a perfect number if σ(n)= 2n,i.e., the sum of all the proper positive divisors of n is equal to n itself.

Example 10.7.1 Since σ(6) = 1+ 2+ 3+ 6 = 12 and σ(28) = 1+ 2+ 4+ 7+14+ 28= 56, 6 and 28 are examples of perfect numbers. The next perfect numberis 496.

Next we shall characterize the even perfect numbers through the following theo-rem.

Page 460: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

446 10 Algebraic Aspects of Number Theory

Theorem 10.7.1 An even integer n > 0 is a perfect number if and only if n =2k−1(2k − 1), where k ≥ 2 and 2k − 1 is a prime integer.

Proof First let n be an even perfect number. Let n = 2tm, where t,m ≥ 1 and m

is odd. As σ is a multiplicative function, σ(n) = σ(2tm) = σ(2t )σ (m) = (2t+1 −1)σ (m). Again as n is a perfect number, σ(n)= 2n= 2t+1m. Thus we have

2t+1m= (2t+1 − 1)σ(m). (10.10)

Since 2t+1 and 2t+1 − 1 are relatively prime, 2t+1 divides σ(m). Thus there existssome integer q such that

σ(m)= 2t+1q. (10.11)

Consequently, from (10.10), we have

m= (2t+1 − 1)q. (10.12)

From (10.12), q divides m. We claim that q �=m. If q =m, then from (10.12), wehave 1 = 2t+1 − 1, implying t = 0, a contradiction as t ≥ 1, with the result thatq �=m. Now from (10.11) and (10.12), we see that

m+ q = (2t+1 − 1)q + q = 2t+1q = σ(m). (10.13)

Now we claim that q = 1. If possible, let q �= 1. As q �=m, there are at least threepositive divisors of m, namely 1, q , and m, implying σ(m)≥ 1+ q +m > q +m=σ(m), by (10.13), a contradiction. Hence q = 1. Thus from (10.12) we have

m= 2t+1 − 1. (10.14)

Also from (10.13), we have σ(m)=m+1, which implies m must be a prime integer.Hence from (10.14), we can conclude that n= 2tm= 2t (2t+1−1), where t ≥ 1 and2t+1 − 1 is a prime integer.

Conversely, we assume that n= 2k−1(2k − 1), where k ≥ 2 and 2k − 1 is a primeinteger. We have to show that σ(n)= 2n. Since 2k − 1 is odd, 2k−1 and 2k − 1 arerelatively prime. Thus σ(n)= σ(2k−1)σ (2k − 1)= (1+ 2+ 22 + · · · + 2k−1)(1+2k−1), as 2k−1 is a prime integer. This implies that σ(n)= 2(2k−1(2k−1))= 2n,proving that n is a perfect number. �

Theorem 10.7.1 asserts that to get an even perfect number we need to have aprime number of the form 2k − 1, where k ≥ 2. Then the following theorem willhelp us in finding such primes.

Theorem 10.7.2 For some positive integers a and n > 1, if an−1 is a prime integerthen a = 2 and n is a prime integer.

Page 461: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.7 Perfect Numbers and Mersenne Numbers 447

Proof First we prove that a = 2. As an − 1 = (a − 1)(an−1 + an−2 + · · · + 1) isprime and a is a positive integer great than 1, a − 1 must be equal to 1, implyinga = 2. Now we claim that n is a prime integer. If not, then let n= rs, 1 < r, s < n.Thus (an − 1)= ars − 1= (ar − 1)((ar )s−1 + (ar )s−2 + · · · + 1), a contradictionas both (ar − 1) and ((ar )s−1+ (ar )s−2+ · · ·+ 1) are positive integers greater than1, with the result that n to be a prime integer. �

Theorem 10.7.2 asserts that for primes of the form 2n − 1, we need to consideronly integers n that are prime. Motivated by the study of perfect numbers, thesespecial type of integers have been studied in great depth by a great French monk ofthe 17th century, Mersenne. These special type of integers are known as Mersennenumbers, which are defined as follows.

Definition 10.7.2 If n is a positive integer, then Mn = 2n − 1 is called the nthMersenne number. Further, if Mp = 2p − 1 is a prime integer, then Mp is called theMersenne prime.

Example 10.7.2 Already at the time of Mersenne, it was known that someMersenne numbers, such as, M2 = 3, M3 = 7, M5 = 31, M7 = 127 are primes,while M11 = 2047 = 23 × 89 and M37 = 237 − 1 = 137438953471 = 223 ×616318177 are composite. In 1640, Mersenne stated that Mp is also a prime forp = 13,17,19,31,67,127,257. Unfortunately, he was wrong about 67 and 257,and he did not include 61, 89, 107 (in the list among those less than 257), whichalso produce Mersenne primes. However, we must appreciate that his statement wasquite astonishing, in view of the size of the numbers involved.

Since Mn increases exponentially, it is very difficult to check the primality of Mn

for even moderate n. But the following theorem plays an important role in checkingthe primality for Mn. To prove this let us first prove the following lemma.

Lemma 10.7.1 For any two positive integers a and b, gcd(2a − 1,2b − 1) =2gcd(a,b) − 1.

Proof Let c= gcd(a, b). Then 2c − 1 divides both 2a − 1 and 2b − 1. Let d divideboth 2a − 1 and 2b − 1. We show that d also divides 2c − 1. If possible, supposed does not divide 2c − 1. Then there exists a prime p and a positive integer n suchthat pn divides d but pn does not divide 2c − 1. Now pn divides d implies pn

divides both 2a − 1 and 2b − 1. Note that as both 2a − 1 and 2b − 1 are odd, p

must be an odd prime integer. Also as c = gcd(a, b), there exist integers x and y

such that c = ax + by. Further, 2a ≡ 1 (modpn) and 2b ≡ 1 (modpn) imply that2c = 2ax+by ≡ 1 (modpn), with the result that pn divides 2c − 1, a contradiction.Thus d divides 2c − 1. Hence gcd(2a − 1,2b − 1)= 2gcd(a,b) − 1. This completesthe proof. �

Using the above lemma, we prove the following theorem.

Page 462: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

448 10 Algebraic Aspects of Number Theory

Theorem 10.7.3 If p is an odd prime, then every divisor of the pth Mersennenumber Mp = 2p − 1 is of the form 2kp+ 1, where k is a positive integer.

Proof To show the result, it is sufficient to prove that any prime q dividing Mp is ofthe form 2kp+1, for some positive integer k. By Fermat’s Little Theorem, q divides2q−1−1. Now by Lemma 10.7.1, we have gcd(2p−1,2q−1−1)= 2gcd(p,q−1)−1.As q is a common divisor of 2p − 1 and 2q−1 − 1, gcd(2p − 1,2q−1 − 1) > 1. Weclaim that gcd(p, q − 1) �= 1. If possible, let gcd(p, q − 1) = 1. Then gcd(2p −1,2q−1 − 1) = 1, a contradiction. Therefore gcd(p, q − 1) = p. Hence p dividesq − 1. Thus there exists a positive integer t such that q − 1 = tp. As p is oddand q − 1 is even, t must be even, say t = 2k, for some positive integer k. Henceq = 2kp+ 1, as required. �

10.8 Analysis of the Complexity of Algorithms

In this section, we study how to analyze an algorithm and how the computationalcomplexity of an algorithm is computed. This plays an important role in the the-ory of computational number theory as the analysis enables us to judge whether analgorithm is good/efficient or not. Computational complexity theory is an impor-tant branch in theoretical computer science and mathematics. Complexity theory, ormore precisely, computational complexity theory, deals with the resources requiredduring some computation to solve a given problem. The main objective of the com-putational complexity theory is to classify the computational problems accordingto their inherent difficulties. Again in computational complexity theory, complexityanalysis of an algorithm plays an important role. Complexity analysis is a tool thatallows us to explain how an algorithm behaves as the input grows larger i.e., if wefeed an algorithm a different input, the question is how will the algorithm behave?More specifically, if one algorithm takes 1 second to run for an input of size 1000,how will it behave if we double the input size? Will it run just as fast, half as fast,or four times slower? In practical programming, this is important as it allows us topredict how our algorithm will behave when the input data becomes larger. The pro-cess of computing involves the consumption of different resources like time taken toperform the computation, amount of memory used, power consumed by the systemperforming the computation, etc. To measure the amount of resources utilized bydifferent algorithms, we need the following notion of asymptotic notations.

10.8.1 Asymptotic Notation

Here we discuss some standard notations related to the rate of growth of functions.This concept will be useful not only in discussing the running time of algorithms butalso in a number of other contexts. In algorithm analysis, it is convenient to have a

Page 463: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 449

notation for running time which is not clogged up by too much details, because oftenit is not possible and often it would even be undesirable to have an exact formulafor the number of operations. For this, “O-notation” (read it as “big-Oh”-notation)is commonly used. We give the definitions and basic rules for manipulating boundsfor any given algorithm.

Let f and g be real-valued functions, both defined either on the set of non-negative integers (N), or on the set of non-negative reals R∗. Here we are interestedabout the behavior of both f (x) and g(x), for large x, mostly for x→∞. For thisreason, we only require that f (x) and g(x) are defined for all sufficiently large x.We further assume that g(x) > 0 for all sufficiently large x.

Definition 10.8.1 For the function g :N→R∗, let us define

• O(g(n))= {f (n)|f :N→R∗ and ∃ positive real constant c and n0 ∈N such that0≤ f (n)≤ cg(n),∀n≥ n0}.Remark Instead of writing f (n) ∈ O(g(n)), we write f (n) = O(g(n)). Thismeans that g(n) is an asymptotic upper bound for f (n). For example, if f (n)=n2 + 7n + 10000, then ∀n ≥ 10000, n2 + 7n + 10000 ≤ n2 + n2 + n2 = 3n2.Thus in this case, n0 = 10000 and c = 3. So, n2 + 7n + 10000 = O(n2). ThusO-notation classifies functions by simple representative growth functions evenif the exact values of the functions are unknown. Note that since we demand acertain behavior of a function only for n≥ n0, it does not matter if the functionsthat we consider are not defined or not specified for n < n0.

• Θ(g)= {f |f :N→R∗ and ∃ positive real constants c1, c2 and n0 ∈N such that0≤ c1g(n)≤ f (n)≤ c2g(n),∀n≥ n0}.Remark Instead of writing f (n) ∈ Θ(g(n)), we write f (n) = Θ(g(n)). In-formally, Θ notation stands for equality in asymptotic sense. For example, iff (n) = n2/2− 2n, then ∀n ≥ 8, n2/4 ≤ n2/2− 2n ≤ n2/2. So here, c1 = 1/4,c2 = 1/2 and n0 = 8. Thus f (n) = Θ(n2). Also note that 6n3 �= Θ(n2), as if6n3 = Θ(n2), there exist c2 ∈ R+ and n0 ∈ N such that ∀n ≥ n0, 6n3 ≤ c2n

2

which implies n ≤ c2/6, a contradiction, proving that 6n3 �= Θ(n2). The nota-tion Θ(1) is used either for a constant or for a constant function with respect tosome variable. Finally note that Θ(g(n))⊆O(g(n)), as f (n)=Θ(g(n)) impliesf (n) ∈O(g(n)).

• Ω(g(n))= {f (n)|f :N→R∗ and ∃ positive real constant c and n0 ∈N such that0≤ cg(n)≤ f (n),∀n≥ n0}.Remark Instead of writing f (n) ∈ Ω(g(n)), we write f (n) = Ω(g(n)). Thismeans that g(n) is an asymptotic lower bound for f (n). For example, if f (n)=n2 + 7n+ 10000, then ∀n≥ 1, n2 ≤ n2 + 7n+ 10000. Thus in this case, n0 = 1and c= 1. So, n2 + 7n+ 10000=Ω(n2). Note that for any two functions f andg, f (n)=Θ(g(n)) if and only if f (n)=O(g(n)) and f (n)=Ω(g(n)).

Page 464: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

450 10 Algebraic Aspects of Number Theory

Fig. 10.2 Asymptotic bounds

• o(g(n))= {f (n)|f :N→R∗ and ∀ positive real constant c and n0 ∈N such that0≤ f (n) < cg(n),∀n≥ n0}.Remark Instead of writing f (n) ∈ o(g(n)), we write f (n) = o(g(n)). Here,the bound is not an asymptotically tight upper bound for f (n). For example,2n = o(n2) but 2n �= o(n). The main difference between O and o is that inf (n) =O(g(n)), the bound 0 ≤ f (n) ≤ cg(n) holds for some constant c ∈ R+,but in f (n)= o(g(n)), the bound 0≤ f (n) < cg(n) holds for all constant c ∈R+.Intuitively, in o-notation, the function f (n) becomes insignificant relative to g(n)

as n approaches infinity, i.e., limn→∞ f (n)g(n)

= 0.

Note In Fig. 10.2, the above asymptotic bounds are described.

• ω(g(n))= {f (n)|f :N→R∗ and ∀ positive real constant c and n0 ∈N such that0≤ cg(n) < f (n),∀n≥ n0}.Remark Instead of writing f (n) ∈ ω(g(n)), we write f (n)= ω(g(n)). Here, thebound is not an asymptotically tight lower bound for f (n). For example, 2n2 =ω(n) but 2n2 �= ω(n2). An alternative way of defining the notation ω is f (n) ∈ω(g(n)) if and only if limn→∞ f (n)

g(n)=∞. Finally, note that f (n) ∈ ω(g(n)) if

and only if g(n) ∈ o(f (n)).

Page 465: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 451

10.8.2 Relational Properties Among the Asymptotic Notations

Here we shall discuss some of the relational properties among the asymptotic nota-tions.

Transitivity: f (n)=Θ(g(n)) and g(n)=Θ(h(n)) imply f (n)=Θ(h(n)).Similar result holds for O , Ω , o, ω.

Reflexivity: f (n)=Θ(f (n)). The same result holds good for O and Ω .But reflexivity does not hold for o and ω.

Symmetry: f (n) = Θ(g(n)) if and only if g(n) = Θ(f (n)). The sameresult does not hold for O , Ω , o, ω.

Transpose Symmetry: f (n) = O(g(n)) if and only if g(n) = Ω(f (n)). Also,f (n)= o(g(n)) if and only of g(n)= ω(f (n)).

10.8.3 Poly-time and Exponential-Time Algorithms

In this section, we shall introduce informally some of the important concepts ofcomplexity theory. Instead of using a fully abstract model of computation, such as,Turing machines, in this section, we consider all algorithms running on a digitalcomputer with a typical instruction set, an infinite number of bits of memory andconstant-time memory access. This model may be thought of as the random accessmachine (or register machine) model.

A computational problem is specified by an input (of a certain form) and anoutput (satisfying certain properties relative to the input). An instance of a compu-tational problem is a specific input. The input size of an instance of a computationalproblem is the number of bits required to represent the instance. The output size ofan instance of a computational problem is the number of bits necessary to repre-sent the output. A decision problem is a computational problem where the output iseither “yes” or “no”.

An algorithm to solve a computational problem is called deterministic if it doesnot make use of any randomness. We will study the asymptotic complexity of de-terministic algorithms by counting the number of bit operations performed by thealgorithm expressed as a function of the input size. Upper bounds on the complexityare presented using “big O” notation. When giving complexity estimates using bigO notation we implicitly assume that there is a countably infinite number of possibleinputs to the algorithm.

Order notation allows us to define several fundamental concepts that are usedto get a rough bound on the computational complexity of mathematical problems.Suppose that we are trying to solve a certain type of mathematical problem, wherethe input to the problem is a number whose size may vary. As an example, considerthe Integer Factorization Problem, whose input is a number N and whose output isa prime factor of N . We are interested in knowing how long it takes to solve theproblem in terms of the size of the input. Typically, one measures the size of theinput by its number of bits, i.e., how much storage it takes to record the input.

Page 466: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

452 10 Algebraic Aspects of Number Theory

Definition 10.8.2 A problem is said to be solvable in polynomial time if there isa constant c ≥ 0, independent of the size of the input, such that for inputs of sizeO(k) bits, there is an algorithm to solve the problem in O(kc) steps.

Remark If we take c to be 1 in Definition 10.8.2, then the problem is solvable inlinear time, while if we take c to be 2, then we say that the problem is solvablein quadratic time. In general, polynomial-time algorithms are considered to be fastalgorithms.

Definition 10.8.3 A problem is said to be solvable in exponential time if there is aconstant c > 0 such that for inputs of size O(k) bits, there is an algorithm to solvethe problem in O(eck) steps.

Remark Exponential-time algorithms are considered to be slow algorithms.

Remark In the theory of complexity, problems solvable in polynomial time are con-sidered to be “easy” while problems that require exponential time are considered tobe “hard”.

As we are going to analysis algorithms, we need to know what do we mean byan algorithm. Before that the notations related to algorithms as discussed in the nextsection.

10.8.4 Notations for Algorithms

The notion of an algorithm is one of the basic concepts in theoretical computerscience. Informally, an algorithm is a sequence of well-defined computational pro-cedure that takes as input some value, or a set of values and produces some value,or set of values, as output. The notion of an algorithm has been formalized as aprogram for a particular theoretical machine model known as the Turing machinemodel in the theory of algorithms and computational complexity. Let us first startwith a simple notion and notations related to algorithms for integers.

• An integer variable contains an integer. Variables are denoted by typewriter typenames like a, b, k, l, and so on.

• An array corresponds to a sequence of similar type of variables, indexed by asegment of the natural numbers. For example, int a[10] denotes an array with10 entities of integer type, while char a[10] denotes an array with 10 entities ofcharacter type. An array element is given by the name with the index in brackets.For example, a[0] denotes the first entity, while a[5] denotes the sixth entity ofthis array.

• If x is some integral value obtained by evaluating some expression and v is aninteger type variable, then v← x denotes an instruction that causes the value x

to be put into the variable v.

Page 467: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 453

• if-then statement and if-then-else statement are used with the obvious semantics.Let Bool-exp denote an expression that evaluates to a boolean value and statdenote a (simple or composite) statement. Then the statement

if Bool-exp then stat

is executed as follows: first the boolean expression Bool-exp is evaluated to eithertrue or false. If the result is true, the (simple or composite) statement stat iscarried out. Similarly, the statement

if Bool-exp then stat1 else stat2

is executed as follows: if the value of the Boolean expression Bool-exp is true,then stat1 is carried out, otherwise stat2 is carried out.

• In an algorithm, it is some times required to perform a set of instructions repeat-edly. This involves repeating some part of the algorithm either a specified numberof times or until a particular condition is being satisfied. This repeated operationsmay be done using loop control instructions through the while statement. Thestatement

while Bool-exp do stat

may be executed as follows: first the boolean expression bool-exp is evaluated.If the outcome is true, the body “stat” is carried out once, and we start againcarrying out the whole while statement. Otherwise the execution of the statementis finished.

• The loop body may contain a special instruction, known as break, which, whenexecuted, immediately terminates the execution of the inner loop in which thebreak statement is executed.

• The return statement is used to immediately finish the execution of the algorithm.

10.8.5 Analysis of Few Important Number Theoretic Algorithms

Efficiency of an algorithm can be measured in terms of execution time (time com-plexity) and the amount of memory required (space complexity). Now the questionis: which measure is more important? Answer often depends on the limitations ofthe technology available at time of analysis. However, in this section, we are go-ing to deal only with the time complexity but not the space complexity. Note thattime complexity analysis for an algorithm must be independent of the programminglanguage and the machine used. The major objectives of time complexity analysisare to determine the feasibility of an algorithm by estimating an upper bound onthe amount of work performed by the machine and to compare different algorithmsbefore deciding on which one to implement. To simplify the analysis, we sometimesignore the work that takes a constant amount of time.

Page 468: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

454 10 Algebraic Aspects of Number Theory

In this section, as we will be analyzing some number theoretic algorithms,let us first look at how a non-negative integer n is written to the base b. Letn = ck−1b

k−1 + ck−2bk−2 + · · · + c1b + c0, where ci ’s are integer between 0 and

b− 1. Then we say that (ck−1ck−2 · · · c1c0)b is the representation of n to the base b.If ck−1 is non-zero, then we call n a k-digit base b number. Note that any integer inthe interval [bk−1, bk − 1] is a k-digit number to the base b.

Theorem 10.8.1 Let n be a positive integer. Then the number of digits in the repre-sentation of n to the base b is [logb n] + 1, where [x] represents the greatest integernot exceeding x.

Proof Note that any integer satisfying bk−1 ≤ n < bk has k digits to the base b. Thenlogb bk−1 ≤ logb n < logb bk implies k − 1≤ logb n < k that implies [logb n] = k −1, with the result k = [logb n] + 1. �

Bit Operations While analyzing any program or algorithm to be run by a com-puter, we are interested in calculating the total time taken by the computer to run thealgorithm. For example, suppose by using two different logics we write two differ-ent programs, say P1 and P2, that can check whether a given integer is prime or not.On the same input in a same machine, suppose P1 takes less time than P2 to get acorrect output. Then surely we will call P1 a better algorithm than P2. So, it seemsthat we can measure the goodness of an algorithm by its run time. But if we con-sider only the run time, we may lead to a wrong conclusion. Suppose we are runningthe program P1 in a very old machine, say 15 years old machine while running theprogram P2 in a latest machine having latest hardware specification. It may happenthat P2 may take much less time than P1 to give correct answer on the same input.So run time of a program should not be a measure of goodness of an algorithm.We need something more basic that should be machine independent. One of thebest measures is to calculate the number of bit operations required to complete thealgorithm. The amount of time a computer takes to perform a task is proportionalto the number of bit operations. So now on, when we speak of estimating the timerequired by a computer to perform a particular task, we mean finding an estimationof the number of bit operations required by it. Let us explain through the followingexample what we exactly mean by the bit operations.

Example 10.8.1 (Addition of two k bits long binary strings) Suppose we want toadd two binary strings, say a and b. If one of the integers has fewer bits than theother, we fill in zeros to the left of the integer to make both integers of the samelength, say k. Let us explain the addition operation through the following example:

1 1 1 1 1 ← carry bits1 0 0 1 1 1 ← the 6 bit long binary string a

+ 1 1 1 0 1 ← the 5 bit long binary string b

1 0 0 0 1 0 0 ← the output binary string a + b

Page 469: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 455

Let us analyze the addition algorithm in detail. We need to repeat the following stepsk times starting from right to left:

1. Look at the top and the bottom bit and also at whether there is any carry above thetop bit. Note that for the right-most bits, there will be no carry bit. For example,in the above case, the right-most bits of a and b are 1 and 1, respectively, withoutany carry bit above the right-most bit of a.

2. There will be no carry, if both bits are 0. Put down 0 and move on to the left, ifthere are more bits left.

3. If either (i) both bits are 0 and there is a carry, or (ii) one of the bits is 0, the otheris 1, and there is no carry, then put down 1 and move to the left, if more bits areleft.

4. If either (i) one of the bits is 0, the other is 1, and there is a carry, or else (ii) bothbits are 1 and there is no carry, then put down 0 along with a carry in the nextcolumn, and move on to the left, if more bits are left.

5. If both bits are 1 and there is a carry, then put down 1, put a carry in the nextcolumn and move on to the left, if more bits are left.

Doing this procedure once is called a bit operation. So, the addition of two k bitbinary strings requires O(k) bit operations.

Example 10.8.2 (Multiplication of a k-bit long binary string with an l-bit longbinary string) Suppose, we want to multiply a k-bit integer n by an l-bit inte-ger m. Let us explain the method through an example by taking the binary stringsn= 10110 and m= 1011. So here k = 5 and l = 4. The multiplication may be doneas follows:

1 0 1 1 0 ← binary representation of n

× 1 0 1 1 ← binary representation of m

1 0 1 1 0 ← Row 1:1 0 1 1 0 0 ← Row 2:

← Row 3:1 0 1 1 0 0 0 0 ← Row 4:1 1 1 1 0 0 1 0 ← Row 5: output of the multiplication

As we are multiplying the number n by an l-bit integer m, we obtain at most l

rows as shown above, where each row consists of a copy of n, shifted to the left acertain number of times, i.e., with 0’s put on at the end. Note that, corresponding toeach occurrence of ‘0’ in m, a row is reduced. For example, in the above example,due to the occurrence of a single ‘0’ in m, the third row in the summation does notappear. Suppose there are l′ rows appearing in the summation part (Row 1 to Row 4).Clearly, l′ ≤ l. As we are interested in counting the number of bit operations, wecannot simultaneously add all the rows, if l′ > 2. Instead we shall first add the firsttwo rows and then add the resulting to the third row and so on. The details of theaddition process is as follows:

1. At each stage, we count the number of places to the left the number n has beenshifted to form the new row. For example, in the above multiplication, the second

Page 470: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

456 10 Algebraic Aspects of Number Theory

row of the summation part is a single shift of n to the left followed by a 0 put onto the end, i.e., the second row becomes 101100.

2. We copy down that many right-most bits of the partial sum, and then add to n theinteger formed from the rest of the partial sum. As explained in Example 10.8.1,it takes O(k) bit operations. For example, in the above sum, while adding Row 1and Row 2, we first count the number of places, the number n has been shiftedto the left to form the Row 2. We see that, in Row 2, the number n has beenshifted one position to the left. So, we cut that many bits, here only one bit, fromthe right of the first row 10110 to form a new binary string 1011 and add thisnewly formed number with the Row 2 to get s = 100001. The partial sum of theRow 1 and Row 2 is obtained by appending to the right of s = 100001, the lastbit that was cut from the right of the first row, it resulting that the partial sum isp = 1000010. Next we are going to add this partial sum with the Row 3. Due tothe occurrence of 0 in m, Row 3 is ignored or filled up with zeros. So, the partialsum of Row 1 to Row 3 is same as that of Row 1 and Row 2. So, we look atthe Row 4 and count the number of left shifts. We find that the number of leftshifts are 3. So, we cut three bits from the right of the partial sum p = 100010and get the binary string 1000. We add this newly formed string with n= 10110to get 11110. Finally we append the three bits 010 that was cut from the rightof the partial sum p = 100010 to the right of 11110 to get the final answer as11110010.

3. The example shows that the multiplication task can be broken down into l′ − 1additions, each taking k bit operations. As l′ ≤ l, the number of bit operationrequired is bounded by O(kl).

Remark In the above example, we only count the number of bit operations andneglect the time that a machine takes to shift the bits in n a few places to the left,or the time it takes to copy or to cut suitable number of bits of the partial sumcorresponding to the places through which n has been shifted to the left in the newrow. For the machines with latest specifications, the shifting, copying, and cuttingoperations are very fast compared to the large number of bit operations. As a result,we can safely ignore them. So, the time estimation for an arithmetic task may bedefined as an upper bound for the number of bit operations, without including anyconsideration of shift operations, changing registers (copying), memory access etc.

10.8.6 Euclidean and Extended Euclidean Algorithms

Given two integers x and y, not both zero, the greatest common divisor of x andy, denoted by gcd(x, y) is defined to be the largest integer g dividing both x andy. If by some means, we know the prime factorizations of both x and y, then find-ing the gcd(x, y) is very easy. The gcd is simply the product of all primes whichoccur in both factorizations raised to the minimum of the two exponents. For ex-ample, let x = 86826881610864294564952032561107= 535 · 1493 · 2517 and y =21919689538097272917485163493= 534 · 1492 · 2777. Then the gcd(x, y)= 534 ·

Page 471: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 457

1492 = 175176568681. Now if we deal with large numbers like x = 114555615673899844817675135734699353962887022183538809518439182723858423697776654969773636025351593611615831027792054723291491195805742582798507756943658064635 245140430063029062888878148865951675248208235095957553631424680802957119280684885 426825458311 having 252 digits and y = 132073632783916311588084946229129151629711907019458530075958808004382179191873 510656280334858074149753155301115732524850516990752830806525038208290693310820312 274512536646708871010931320561601007100248567646755988618892358053208718732009793 553765891653725017634596672971 having 270 digits, then finding gcd(x, y) using the prime factorization methodis not an effective one as it is likely that the prime factorizations of x and y are notknown. In fact, in the theory of numbers, an important area of research is the searchfor quicker methods of factoring large integers. In that respect, we are fortunateenough to have a quick way to find gcd of two integers x and y, even when we donot have any idea of the prime factorizations of x and y.

In Chap. 1, we have discussed about the greatest common divisor (gcd) of twopositive integers. In this chapter, we shall discuss how this can be efficiently com-puted by the Euclidean algorithm. We further analyze the efficiency of the algorithm.We shall show that this algorithm is very efficient in the sense that the algorithm runsin polynomial time in the size of inputs. For that let us first describe the algorithm.

Euclidean Algorithm Let r0 = a and r1 = b be two integers with a ≥ b > 0. If thedivision algorithm is successively applied to obtain rj = rj+1qj+1 + rj+2, where0 < rj+2 < rj+1, for j = 0,1, . . . , n− 2 and rn+1 = 0, then gcd(a, b)= rn, the lastnon-zero remainder.

Let us try to illustrate the algorithm through the following example.

Example 10.8.3 Let us try to compute gcd(55,34) using Euclidean algorithm. Thesteps are as follows:

55 = 34 · 1+ 21,

34 = 21 · 1+ 13,

21 = 13 · 1+ 8,

13 = 8 · 1+ 5,

8 = 5 · 1+ 3,

5 = 3 · 1+ 2,

3 = 2 · 1+ 1← rn,

2 = 1 · 2+ 0← rn+1.

Thus the gcd(55,34)= 1.

A pseudocode for the Euclidean algorithm is presented in Table 10.1.

Page 472: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

458 10 Algebraic Aspects of Number Theory

Table 10.1 Euclideanalgorithm Input: Two positive integers a and b.

Method:

1. r0 ← a

2. r1 ← b

3. i← 14. while ri �= 0

5. do

⎧⎪⎨

⎪⎩

qi ←[ ri−1ri]

ri+1 ← ri−1 − qiri

i← i + 16. i← i − 17. return gcd(a, b)= ri

Now we shall show that Euclidean algorithm always gives the greatest commondivisor of two positive integers in a finite number of steps. For that the followinglemma plays an important role.

Lemma 10.8.1 If a and b are two positive integers and a = bq + r , where q and r

are integers such that 0≤ r < b, then gcd(a, b)= gcd(b, r).

Proof Let d be a common divisor of a and b. As r = a− bq , d divides r . Thus if d

is a common divisor of b and r , then since a = bq+ r , d is also a divisor of a. Sincethe common divisors of a and b are the same as the common divisors of b and r , weget gcd(a, b)= gcd(b, r). �

Now we are going to prove the correctness of the Euclidean algorithm.

Proof Given that r0 = a and r1 = b. Now by successively applying the divisionalgorithm, we have

r0 = r1q1 + r2, 0 < r2 < r1

r1 = r2q2 + r3, 0 < r3 < r2

...

rj−2 = rj−1qj−1 + rj , 0 < rj < rj−1

...

rn−3 = rn−2qn−2 + rn−1, 0 < rn−1 < rn−2

rn−2 = rn−1qn−1 + rn, 0 < rn < rn−1

rn−1 = rnqn.

Since the sequence a = r0 ≥ r1 > r2 > r3 > · · · ≥ 0 is a strictly decreasing se-quence of non-negative integers, we eventually obtain a remainder zero. Thus byLemma 10.8.1, we have gcd(a, b)= gcd(r0, r1)= gcd(r1, r2)= gcd(r2, r3)= · · · =gcd(rn−2, rn−1) = gcd(rn−1, rn) = gcd(rn,0) = rn, the last non-zero remainder.This completes the proof. �

Page 473: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 459

Remark The Euclidean algorithm may be used to determine whether a positive in-teger a, less than a given positive integer n, has a multiplicative inverse modulo n.If the gcd(a,n) = 1, we can say that the multiplicative inverse of a modulo n ex-ists. However, the Euclidean algorithm does not directly provide the multiplicativeinverse modulo n, if it exists.

Now to analyze the time complexity of the Euclidean algorithm, we need thefollowing lemma.

Lemma 10.8.2 In the above mentioned Euclidean algorithm, rj+2 < 12 rj , for all

j = 0,1, . . . , n− 2.

Proof If rj+1 ≤ 12 rj , then we have rj+2 < rj+1 ≤ 1

2 rj . So, in this case, we are done.Now suppose, rj+1 > 1

2 rj . Note that 12 rj < rj+1 and rj+1 < rj , imply rj+1 < rj <

2rj+1. Thus in the expression rj = rj+1qj+1 + rj+2, we must have qj+1 = 1, i.e.,rj+2 = rj − rj+1 < rj − 1

2 rj = 12 rj . �

Now we are in a position to analyze the Euclidean algorithm through the follow-ing theorem.

Theorem 10.8.2 The time complexity for computing the Euclidean algorithm isO((log2 a)3).

Proof Lemma 10.8.2 asserts that every two steps in the Euclidean algorithm mustresult in cutting the size of the remainder at least in half and as the remainder nevergoes below 0, it follows that there are at most 2[log2 a] many above steps. Again, aseach step involves division and each division involves numbers not larger than a, ittakes altogether O((log2 a)2) bit operations. Thus total time required is O(log2 a) ·O((log2 a)2)=O((log2 a)3). �

Remark A more careful analysis of the number of bit operations required for thecomputation of Euclidean algorithm, taking into account of the decreasing size ofthe numbers in the successive divisions, can improve the time complexity of theEuclidean algorithm to O((log2 a)2) bit operations.

As an extension of the Euclidean algorithm, we state the following algorithmknown as Extended Euclidean Algorithm. In Chap. 1, we have already seen that if d

is the greatest common divisor of a and b, then there exist integers u and v such thatd = au+ bv. The Extended Euclidean algorithm actually provides a method to findsuch u and v. To understand the Extended Euclidean algorithm, let us first definetwo sequences of integers u0, u1, u2, . . . , un and v0, v1, v2, . . . , vn according to thefollowing recurrences in which the qi ’s are defined as in Table 10.1:

ui =⎧⎨

0 if i = 01 if i = 1ui−2 − qi−1ui−1 if i ≥ 2

Page 474: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

460 10 Algebraic Aspects of Number Theory

and

vi =⎧⎨

1 if i = 00 if i = 1vi−2 − qi−1vi−1 if i ≥ 2.

Now we are going to prove the following theorem which provides a method to findu and v, for given two positive integers a = r0 and b = r1, such that gcd(a, b) =au+ bv.

Theorem 10.8.3 For 0≤ i ≤ n, let us consider ri as defined in the Table 10.1 andui and vi as defined above. Then for 0≤ i ≤ n, ri = r0vi + r1ui .

Proof We shall prove the theorem by using the principle of mathematical inductionon i. The result is trivially true for i = 0 and i = 1. Let us assume that the resultis true for all i < n, where n ≥ 2. Now we shall prove the result for i = n. By theinduction hypothesis, we have

rn−2 = vn−2r0 + un−2r1

and

rn−1 = vn−1r0 + un−1r1.

Now,

rn = rn−2 − qn−1rn−1

= vn−2r0 + un−2r1 − qn−1(vn−1r0 + un−1r1)

= (vn−2 − qn−1vn−1)r0 + (un−2 − qn−1un−1)r1

= r0vn + r1un.

Hence the result is true for i = n. Consequently, by the principle of mathematicalinduction, the result is true for all i ≥ 0. This completes the proof of the theorem. �

A pseudocode for the Extended Euclidean algorithm is presented in Table 10.2.

Remark By a similar argument as in the case of the Euclidean algorithm, it can alsobe shown that the time required to execute the Extended Euclidean Algorithm isO((log2 a)3) bit operations.

Remark The Extended Euclidean algorithm may be used to determine the mul-tiplicative inverse of a given positive integer a modulo n, if it exists. Letgcd(a,n) = 1. Then using the Extended Euclidean algorithm we can find u andv such that 1= au+ nv. Then 1≡ au (modn), with the result that (u) is the multi-plicative inverse of (a) in Z∗n.

Page 475: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.8 Analysis of the Complexity of Algorithms 461

Table 10.2 ExtendedEuclidean algorithm: giventwo positive integers a and b,this algorithm returns r , u,and v such thatr = gcd(a, b)= au+ bv

Input: Two positive integers a and b.Method:

1. a0 ← a

2. b0 ← b

3. v0 ← 04. v← 15. u0 ← 16. u← 07. q←[ a0

b0]

8. r ← a0 − qb09. while r > 0

10. do

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨

⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

temp← v0 − qv

v0 ← v

v← temp

temp← v0 − qv

u0 ← u

u← temp

a0 ← b0

b0 ← r

q←[ a0b0]

r ← a0 − qb0

11. r ← b012. return r , u, and v

10.8.7 Modular Arithmetic

If we can find efficient algorithms for the basic arithmetic operations over the setof integers, then immediately we can find efficient algorithms for the correspondingoperations modulo some positive integer n. We note the following:

Suppose n is a k-bit integer and 0≤m1, m2 ≤ n− 1. Then

• the computation of (m1 +m2) (modn) can be done in time O(k);• the computation of (m1 −m2) (modn) can be done in time O(k);• the computation of (m1 ·m2) (modn) can be done in time O(k2);• the computation of (m−1

1 ) (modn) can be done in time O(k3).

10.8.8 Square and Multiply Algorithm

We are now going to compute a function of the form xc (modn) for given non-negative integer c and positive integer n. Computation of xc (modn) may be doneusing c − 1 modular multiplications. Note that c might be as big as φ(n) whichis almost as big as n and exponentially large compared to the size of n. So, this

Page 476: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

462 10 Algebraic Aspects of Number Theory

Table 10.3 Square andmultiply algorithm tocompute xc (modn)

Input: Three positive integers x, c, and n.Method:

1. a← 12. i← l − 13. while i ≥ 0

4. do

⎧⎪⎪⎪⎪⎨

⎪⎪⎪⎪⎩

a← a2 (modn)

if ci = 1

then a← (a ∗ x) (modn)

i← i − 15. return a

Table 10.4 Steps to calculate2013210 (mod 3197) usingsquare and multiply algorithm

i ci a

7 1 412 ∗ 2013 (mod 3197)= 2013

6 1 20132 ∗ 2013 (mod 3197)= 1774

5 0 17742 (mod 3197)= 1228

4 1 12282 ∗ 2013 (mod 3197)= 1110

3 0 11102 (mod 3197)= 1255

2 0 12552 (mod 3197)= 2101

1 1 21012 ∗ 2013 (mod 3197)= 55

0 0 552 (mod 3197)= 3025

method is very inefficient, if c is very large. However, there exists an efficient al-gorithm, known as square and multiply algorithm, which reduces the number ofmodular multiplications required to compute xc (modn) to at most 2l, where l isthe number of bits in the binary representation of c. Let the binary representation ofc be (cl−1cl−2 · · · c2c1)2, where c =∑l−1

i=0 ci2i and ci ∈ {0,1}. Let us first explainthe algorithm to compute xc (modn) in Table 10.3.

Let us now illustrate the square and multiply algorithm through the followingexample.

Example 10.8.4 Using square and multiply algorithm, let us compute 2013210

(mod 3197). Note that the binary representation of 210 is (11010010)2. Thus herel = 8. The steps are explained in Table 10.4. Thus 2013210 (mod 3197)= 3025.

Remark Note that in the square and multiply algorithm, the number of squaringperformed is l. The number of modular multiplications of type a← a ∗ x (modn)

is equal to the number of 1 present in the binary representation of c. Thus,O(log2 c(log2 l)2) bit operations are required to execute square and multiply al-gorithm to compute xc (modn).

Page 477: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.9 Primality Testing 463

Next we deal with one of the most important problems in number theory, knownas “primality testing”. Algebraic techniques are very much useful in primality test-ing. In the next section, we show how algebra can be an important tool in primalitytesting.

10.9 Primality Testing

Due to the great invention of public key cryptography at the end of the 20th century,the interest in primality testing i.e., checking whether a number is prime or not, hasgrown rapidly in the past three decades. The security of this type of cryptographicschemes primarily relies on the difficulty involved in factoring the product of verylarge primes. Integer factorization poses many problems, a key one being the test-ing of numbers for primality. A reliable and fast test for primality would help usin constructing efficient and secure cryptosystem. Therefore, the mathematics andcomputer science communities have begun to address the problem of primality test-ing. A primality test is simply a function that determines if a given integer greaterthan 1 is prime or composite. The following theorem plays an important role inprimality testing.

Theorem 10.9.1 If n is a positive composite integer, then n has a prime divisor notexceeding

√n.

Proof As n is composite, we can write n= ab, where 1 < a ≤ b < n. We claim thata ≤ √n. If not, then b ≥ a >

√n which implies n = ab >

√n√

n = n, a contra-diction. Hence, a ≤√n. Again, as a > 1, by Theorem 10.2.1, a must have a primedivisor, say p which is clearly less than or equal to

√n. �

Though the recent interest in primality testing grew at the end of the 20th century,the quest for discovering a good test is by no means a new one, and very likely oneof the oldest issues in mathematics. The ancient priests in Uruk the Sheepfold, circa2500 B.C., are known to have inscribed long lists of prime numbers. Both the ancientGreeks and the ancient Chinese independently developed primality testing.

10.9.1 Deterministic Primality Testing

One of the simplest and most famous primality test is the Sieve of Eratosthenes wholived in Greece at around circa 200 B.C. His method for determining primality isas follows. Suppose we want to determine if n is prime or not. First, we make alist of all integers 2, 3, . . . , /√n0. Next, we circle 2 and cross off from the list allmultiples of two. Then we circle 3 and cross off its multiples. We now continuethrough the list, each time advancing to the least integer that is not crossed off,

Page 478: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

464 10 Algebraic Aspects of Number Theory

circling that integer and crossing off all its multiples. We then test to see if anyof the circled numbers divide n. If the list of circled numbers is exhausted and nodivisor is found, then n is prime. This algorithm is based on the simple observationthat, if n is composite, then n has a prime factor less than or equal to

√n. Though

the algorithm itself is fairly straightforward and easy to implement, it is by no meansefficient.

Next we are going to prove some of the results that will lead to the notions ofdeterministic primality testing. Among these results, Fermat’s Little Theorem playsan important role. Recall that this theorem states that if p is a prime and a is any in-teger such that p does not divide a, then ap−1 ≡ 1 (modp). However, the converseof this theorem is not true. There exist composite integers N and an integer a suchthat aN−1 ≡ 1 (modN). These numbers play an important role in primality ques-tions. Nevertheless, a partial converse of Fermat’s Little Theorem was discoveredby Lucas in 1876. The following proposition may be used for primality test.

Proposition 10.9.1 Let N > 1. Assume that there exists an integer a > 1 such that

1. aN−1 ≡ 1 (modN);2. am �≡ 1 (modN), for m= 1,2, . . . ,N − 2.

Then N is a prime integer.

Proof Let us consider the group of units (Z∗N, ·). Then the order of Z∗N is φ(N). AsaN−1 ≡ aN−2 · a ≡ 1 (modN), a is a unit in the ring (ZN,+, ·). Thus (a) ∈ Z∗N .To show that N is prime, it is sufficient to show that φ(N)=N − 1, where φ(n) isthe Euler φ function. By hypothesis, order of (a) in the group Z∗N is N − 1. As theorder of an element in a finite group divides the order of the group, N − 1 dividesφ(N). As N − 1≤ φ(N), we have φ(N)=N − 1. Hence N is prime. �

Remark Though it might seem perfect, it requires N − 2 successive multiplicationsby a, and finding residues modulo N . So, for large N , the problem remains.

In 1891, Lucas gave the following test for primality:

Proposition 10.9.2 Let N > 1. Assume that there exists an integer a > 1, relativelyprime to N such that

1. aN−1 ≡ 1 (modN);2. am �≡ 1 (modN), for every m < N − 1 such that m divides N − 1.

Then N is a prime integer.

Proof The proof follows directly from Proposition 10.9.1. �

Remark To apply the proposition, it requires to know all factors of N − 1. So, thistest may only be easily applicable when N − 1 can be factored. For example, N =2n + 1 or N = 3 · 2n + 1 etc.

Page 479: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.9 Primality Testing 465

Brillhart, Lehmer, and Selfridge came up with the following test in 1975:

Proposition 10.9.3 Let N > 1. Assume that for every prime divisor q of N − 1,there exists an integer a > 1 such that

1. aN−1 ≡ 1 (modN);2. a(N−1)/q �≡ 1 (modN).

Then N is prime.

Proof As before (a) ∈ Z∗N . To show that N is prime, it is sufficient to show thatN − 1 divides φ(N). If possible, suppose N − 1 does not divide φ(N). Then thereexist a prime factor p of N − 1 and a positive integer n such that pn divides N − 1but does not divide φ(N). Let N − 1=X1p

n, for some integer X1. Further let theorder of (a) in Z∗N be e. As by hypothesis, (a)N−1 = (1), e divides N − 1=X1p

n

and e does not divide (N − 1)/p = X1pn−1. Let N − 1= X1p

n = eX2, for someinteger X2. Thus X1p

n = X1pn−1p = eX2 implies p divides eX2. As p is prime,

either p divides X2 or p divides e. Let p divide X2. Then X2 = pX3 for someinteger X3. Thus X1p

n = X1pn−1p = X2e implies X1p

n−1 = eX3 which impliese divides X1p

n−1 = (N − 1)/p, a contradiction. Thus p does not divide X2. As pn

divides eX2, and p does not divide X2, pn must divide e. Also as (a)φ(N) = (1)

and order of (a) in Z∗N is e, e divides φ(N), with the result that pn divides φ(N),a contradiction. Hence the proposition follows. �

Remark To apply the proposition, once again, it requires the knowledge of allfactors of N − 1. But here fewer congruences have to be satisfied than Proposi-tion 10.9.2.

10.9.2 AKS Algorithm

The AKS Algorithm is the first deterministic polynomial-time primality test namedafter its authors M. Agrawal, N. Kayal, and N. Saxena. In August 2002, this al-gorithm was presented in the paper “PRIMES is in P” Agrawal et al. (2002).This solved the longstanding problem of solving the primality testing determinis-tically of an integer N in polynomial time. The running time (with fast multipli-cation), was originally evaluated as essentially O((logN)12) and lately lowered toO((logN)7.5).

The main idea in the new primality testing algorithm is the following identitycharacterizing primes:

N is prime if and only if (1−X)N ≡ 1−XN (modN).

For more detailed result, the readers may refer the book Dietzfelbinger (2004).

Page 480: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

466 10 Algebraic Aspects of Number Theory

10.10 Probabilistic or Randomized Primality Testing

The main aim of this section is to bring out some of the efficient but simple prob-abilistic tests for primality by using group theoretic results. The first question thatcomes to our mind is: “What do we mean by a probabilistic test?” The next imme-diate question may be: “Is there any advantage of using probabilistic or randomizedalgorithm over deterministic algorithm?”

First let us try to explore some of the advantages of the use of probabilistic orrandomized algorithms over the deterministic algorithms in the context of primalitytesting. Suppose we are given an integer n > 1 and we want to determine whetherthe given integer n is prime or composite. If n is composite, Theorem 10.9.1 ensuresthe existence of a prime factor of n within the range from 2 to ,√n-, the greatestinteger not exceeding

√n. So, we simply divide n by 2, 3, up to ,√n-, testing if any

of these numbers divide n. Note that this deterministic algorithm does, not only theprimality testing for n, but also it produces a non-trivial factor of n, whenever n iscomposite. Of course, the major drawback of this deterministic algorithm is that itis terribly inefficient as it requires O(

√n) arithmetic operations, which is exponen-

tial in the binary length of n. Thus for practical purposes, this algorithm is limitedonly to small values of n. Let us try to see what happens when this algorithm isused to test the primality of an integer n having 100 decimal digits in a computerthat can perform 1 billion divisions per second. Then to perform

√n divisions, it

would take on the order of 1033 years which is quite impractical. So the questionthat comes to our mind is “does there exist a deterministic primality testing algo-rithm which is efficient?” In 2002, Agrawal et al. (2002) first came up with a pathbreaking work which provides a deterministic algorithm to check whether a givennumber is prime or composite in polynomial time. However, we must admit thattill date no deterministic primality testing algorithm is known which is as efficientas the probabilistic primality testing algorithms, such as Solovay–Strassen primal-ity testing or Miller–Rabin primality testing. In this section, we shall develop thoseprobabilistic primality tests that allow 100 decimal digit numbers to be tested forprimality in less than a second. One important thing we should note that these al-gorithms are probabilistic, and may make mistakes. However, the probability thatthey commit a mistake can be made so small as to be irrelevant for all practical pur-poses. For example, we can easily make the probability of error as small as 2−100:should one really care about an event that happens with such a negligible probabil-ity? Let us now try to answer the question “what do we mean by a probabilistic orrandomized test?” For better understanding we need to know two notions, namely,decision problem and randomized algorithm. A decision problem is a problem inwhich a question is to be answered “yes” or “no” while a randomized algorithm isany algorithm that uses random numbers, in contrast, an algorithm that does not userandom numbers is called a deterministic algorithm. For the randomized algorithms,the following definition plays an important role.

Definition 10.10.1 For a decision problem, a yes-biased Monte Carlo algorithmis a randomized algorithm in which a “yes” answer is always correct but a “no”

Page 481: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 467

Table 10.5 The decisionalproblem: Is-Composite Problem: Is-Composite.

Instance: A positive integer n≥ 2.

Question: Is n composite?

Table 10.6Solovay–Strassen primalitytest

Input: Odd integer n≥ 3.Method:

1. Choose an integer a randomly from {1,2,3, . . . , n− 1}.2. if gcd(a,n) �= 13. return (“Yes: The number is a composite integer”).4. x = (an), the Jacobi symbol of a modulo n

5. y ≡ a(n−1)/2 (modn)

6. if x ≡ y (modn)

7. return (“No: The number is a prime integer”).8. else9. return (“Yes: The number is a composite integer”).

answer may not be correct. Similarly, for a decision problem, a no-biased MonteCarlo algorithm is a randomized algorithm in which a “no” answer is always correctbut a “yes” answer may not be correct.

As we see that for a yes-biased or no-biased Monte Carlo algorithm, there is achance of getting error in the output, the following definition is very important forany Monte Carlo algorithm.

Definition 10.10.2 For a decision problem, a yes-biased Monte Carlo algorithmhas an error probability ε if for any instance the answer is “yes”, but the algorithmwill give an incorrect answer “no” with probability almost ε, where the probabilityis taken over all random choices made by the algorithm when it is run with a giveninput.

One of the very important decision problems, known as “Is-Composite” is de-scribed in Table 10.5.

As the answer to the problem “Is-Composite” is either “yes” or “no”, the problemis a decisional problem. In the next section, we are going to provide some efficientyes-biased Monte Carlo algorithms that will provide the answer in an efficient way.

10.10.1 Solovay–Strassen Primality Testing

The primality test of Solovay and Strassen is a randomized algorithm based on thetheory of quadratic reciprocity. This test is capable of recognizing composite num-bers with a probability of at least 1

2 . Let us first explain the algorithm in Table 10.6.

Page 482: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

468 10 Algebraic Aspects of Number Theory

First note that as the gcd algorithm, the square and multiply algorithm and thealgorithm to compute the Jacobi symbol can be done in time O((logn)3), theSolovay–Strassen Primality testing algorithm can run in time O((logn)3). Now, weshall show that Solovay–Strassen Primality testing algorithm is a yes-biased MonteCarlo Algorithm with error probability at most 1

2 . To prove this we shall use thefollowing proposition and lemma.

Proposition 10.10.1 Let n be an odd integer greater than 1. Let SS(n) = {a ∈Z∗n|(an)≡ a(n−1)/2 (modn)}. Then SS(n) is a subgroup of Z∗n.

Proof As (1) ∈ SS(n), SS(n) �= ∅. Let a, b ∈ SS(n). Then( a

n

) ≡ a(n−1)/2 (modn)

and(

bn

) ≡ b(n−1)/2 (modn). Now,(

abn

) = ( an)(

bn

) ≡ a(n−1)/2 (modn)b(n−1)/2

(modn)≡ (ab)(n−1)/2 (modn). Thus ab ∈ SS(n). So, SS(n) is closed under compo-sition modulo n. As SS(n) is a finite subset of Z∗n, SS(n) is a subgroup of Z∗n. �

Our next aim is to show that SS(n) is a proper subgroup of Z∗n. To prove that weshall take the help of the following lemmas.

Lemma 10.10.1 Let n = pkm be an odd integer greater than 1 with p an oddprime, gcd(p,m) = 1 and k ≥ 2. Then there exists an element (g) ∈ Z∗n such that( g

n

) �≡ g(n−1)/2 (modn).

Proof As φ(n)= pk−1(p−1)φ(m), p divides φ(n) which is the order of the groupZ∗n. Thus by Cauchy’s Theorem, there exists an element, say (g) ∈ Z∗n such thatorder of (g) is p. We claim that

( gn

) �≡ g(n−1)/2 (modn). If possible, let( g

n

) ≡g(n−1)/2 (modn). As (g) ∈ Z∗n, gcd(g,n) = 1. Now the value of

( gn

)is either +1

or −1. Thus g(n−1)/2 ≡±1 (modn) implies gn−1 ≡ 1 (modn). Hence order of (g)

divides n−1, i.e., p divides n−1. Again, as n= pkm, p divides n, a contradiction.Thus

( gn

) �≡ g(n−1)/2 (modn). This completes the proof. �

Lemma 10.10.2 Let n= p1p2 . . . pk , where pi ’s are distinct odd primes. Supposea ≡ u (modp1) and a ≡ 1(modp2p3 . . . pk), where u is a quadratic non-residuemodulo p1. Then

( an

) �≡ a(n−1)/2 (modn).

Proof Note that( a

n

) ≡ ( ap1

)( ap2···pk

)(mod n) ≡ ( u

p1

)( 1p2···pk

)(mod n) ≡ (−1)

(mod n). We claim that an−1

2 �≡ ( an)

(mod n). If possible let an−1

2 ≡ ( an)

(mod n).

Then an−1

2 ≡ (−1) (mod n)≡ (−1) (mod p1p2 · · ·pk), contradicting the fact that

an−1

2 ≡ 1 (mod p2 · · ·pk). Thus an−1

2 �≡ ( an)

(mod n). This completes the proof. �

We are now in a position to prove the following theorem.

Theorem 10.10.1 The Solovay–Strassen Primality testing algorithm is a yes-biased Monte Carlo Algorithm with error probability at most 1

2 .

Page 483: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 469

Proof Clearly, the Solovay–Strassen primality testing algorithm is a yes-biasedMonte-Carlo algorithm. Note that the error in the algorithm may occur when n is acomposite integer but the algorithm returns “no”, i.e., when a ∈ SS(n). So we needto find a bound on the size of SS(n). To get that we first show that SS(n) is a propersubgroup of Z∗n. As n is an odd positive integer, the form of n is either n = pkm

with p an odd prime, gcd(p,m) = 1 and k ≥ 2 or n= p1p2 . . . pk , where pi ’s aredistinct odd primes. In both the cases, from Lemmas 10.10.1 and 10.10.2, we seethat there exists an element, say (g), such that (g) ∈ Z∗n but (g) /∈ SS(n), it resultingthat SS(n) is a proper subgroup of Z∗n. As order of SS(n) divides the order of Z∗n, let|Z∗n||SS(n)| = t . Then t ≥ 2. Thus |SS(n)| = |Z∗n|

t≤ |Z∗n|

2 ≤ n−12 . Consequently, the error

probability of the algorithm is at most n−12(n−1)

= 12 . �

10.10.2 Pseudo-primes and Primality Testing Based on Fermat’sLittle Theorem

Fermat’s Little Theorem 10.4.2 ensures us that if p is a prime and a is any integersuch that 1 ≤ a < n, then ap−1 ≡ 1 (modp). Consequently, for a given n, if wecan find an integer b such that 1 ≤ b < n and bn−1 �≡ 1 (modn) then we knowthat n must be composite. We call this number b, 1 ≤ b < n, as an F -witness forn. So, if n has an F -witness, n must be a composite number, i.e., the F -witnessb for n provides a certificate for the compositeness of n. It can be shown that 2is an F -witness for all composite numbers not exceeding 340. However, 2340 ≡1 (mod 341), even though 341 = 11 · 31 is a composite number. So 2 is not an F -witness for 341. We call 2 as F -liar for 341. So in general, for an odd compositenumber n, an integer a, 1≤ a < n, is called an F -liar if an−1 ≡ 1 (modn). Thus 2is a F -liar for 341 while 3 is an F -witness for 341. So we see that there exist somecomposite integers which pass Fermat’s test for some base. This observation leadsto the definition of a special type of numbers, known as pseudo-primes. Let us firstdefine what is a pseudo-prime to some base.

Definition 10.10.3 Let n be a positive composite integer and a be a positive integer.Then the integer n is said to be a pseudo-prime to the base a if an ≡ a (modn).

Remark 1 Thus a positive odd composite integer n is a pseudo-prime to some basea, if a is an F -liar for n.

Remark 2 If gcd(a,n) = 1, then the congruence an ≡ a (mod n) is equivalent tothe congruence an−1 ≡ 1 (mod n).

Example 10.10.1 The integers 341= 11×31, 561= 3×11×17, 645= 3×5×43are examples of pseudo-primes to the base 2.

Page 484: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

470 10 Algebraic Aspects of Number Theory

It has been found that the pseudo-primes to some fixed base a is much rarer thanprime numbers. In particular, in the interval (2,1010), there are 455052512 primeswhile there are only 14884 pseudo-primes to the base 2. Although pseudo-primesto any given base are rare, there are, nevertheless, infinitely many pseudo-primes toany given base. Here we shall prove this for the base 2 only. The following lemmasare useful to prove the result.

Lemma 10.10.3 If k and n are positive integers such that k divides n, then 2k − 1divides 2n − 1.

Proof Let n = kq for some positive integer q . Then 2n − 1 = 2kq − 1 = (2k −1)((2k)q−1 + (2k)q−2 + · · · + 1) which implies that 2k − 1 divides 2n − 1. �

Lemma 10.10.4 If an odd positive integer n is a pseudo-prime to the base 2, then2n − 1 is also a pseudo-prime to the base 2.

Proof Lemma 10.10.3 ensures that N = 2n − 1 is a composite integer. Asgcd(2,N) = 1, to show that N is a pseudo-prime, we only need to show that2N−1 ≡ 1 (modN). Since by hypothesis, n is a pseudo-prime to the base 2,2n−1 ≡ 1 (modn). Thus there exists some integer k such that 2n−1 − 1= kn. Now2N−1 = 22n−2 = 22kn. As n divides 2kn, by Lemma 10.10.3, N = 2n − 1 divides22kn − 1 = 2N−1 − 1, with the result 2N−1 ≡ 1 (modN). Hence N = 2n − 1 is apseudo-prime to the base 2. �

Now we are in a position to prove the existence of infinitely many pseudo-primesto the base 2.

Theorem 10.10.2 There are infinitely many pseudo-primes to the base 2.

Proof Note that 341 is an odd pseudo-prime to the base 2. Now by Lemma 10.10.4,we will be able to construct infinitely many odd pseudo-primes to the base 2 bytaking ps1 = 341, ps2 = 2ps1 − 1, ps3 = 2ps2 − 1, . . .. Note that these odd inte-gers are all distinct since ps1 < ps2 < ps3 < · · · . Therefore, the infinite sequenceps1,ps2, . . . shows the existence of infinitely many pseudo-primes to the base 2. �

Thus we see that while testing the primality of an integer n, if we find that 2n−1 ≡1 (modn), then we know that n is either prime or a pseudo-prime to the base 2.One follow-up approach may be taken by testing whether an−1 ≡ 1 (modn) forvarious positive integers a. If we find any value b, 1≤ b < n with gcd(b,n)= 1 andbn−1 �≡ 1 (modn), then we can readily say that n is composite. For example, wehave seen that 341 is a pseudo-prime to the base 2. But, 3340 ≡ 56 �≡ 1 (mod 341),with the result that 341 is a composite integer.

Now the question that comes to our mind is: “exploiting the above fact, can wedevelop a yes-biased Monte Carlo algorithm for the problem Is-Composite?”

For that let us first prove the following useful result which is some kind of inverseof Fermat’s Little Theorem.

Page 485: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 471

Table 10.7 Fermat’s testInput: Odd integer n≥ 3.Method:

1. Choose an integer a randomly from {2,3, . . . , n− 2}.2. if (an−1 �≡ 1 (modn))

3. return (“Yes: The number is a composite integer”).4. else5. return (“No: The number is a prime integer”).

Theorem 10.10.3 For an integer n ≥ 2, if an−1 ≡ 1 (modn) for all a, 1 ≤ a < n,then n must be a prime number.

Proof As n≥ 2, for all a, 1≤ a < n, a · an−2 = an−1 ≡ 1 (modn) implies that (a)

has an inverse in the ring Zn, i.e., (a) ∈ Z∗n. Thus a and n are relatively prime for alla, 1≤ a < n. Hence n must be a prime integer. �

Theorem 10.10.3 ensures that if n is a composite integer, then there must existat least one F -witness for n. Further note that as (1)n−1 ≡ 1 (modn) and (n −1)n−1 ≡ (−1)n−1 (modn) ≡ 1 (modn) for all odd integer n ≥ 3, 1 and n− 1 arealways F -liars for n, called the trivial F -liars for n. The above observation leads tothe randomized primality testing algorithm known as Fermat’s Test as described inTable 10.7.

Now we shall show that the algorithm is a yes-biased Monte Carlo algorithm forn, provided there is at least one F -witness a for n such that gcd(a,n)= 1. To provethat let us first prove the following lemma.

Lemma 10.10.5 For an odd composite integer n ≥ 3, if there exists at least oneF -witness c for n such that gcd(c, n) = 1, then the set of all F -liars for n, i.e.,LF

n = {(a) ∈ Zn : 1≤ a < n and an−1 ≡ 1 (modn)} is a proper subgroup of Z∗n.

Proof Clearly, (1) ∈ LFn and hence LF

n is a non-empty subset of Z∗n. Now let(a), (b) ∈ LF

n . Then an−1 ≡ 1 (modn) and bn−1 ≡ 1 (modn). Thus (ab)n−1 ≡an−1bn−1 ≡ 1 (modn), resulting in (ab) ∈ LF

n . Hence from the property of finitegroup, LF

n is a subgroup of Z∗n. Further, as there exists at least one F -witness, sayc for n such that (c) ∈ Z∗n and cn−1 �≡ 1 (modn), it follows that (c) �∈ LF

n . HenceLF

n � Z∗n . �

Now we shall prove the following theorem.

Theorem 10.10.4 If n ≥ 3 is an odd composite integer such that there exists atleast one F -witness a for n such that (a) ∈ Z∗n, then the algorithm as described inTable 10.7 is a yes-biased Monte Carlo algorithm with error probability at most 1

2 .

Proof Clearly the algorithm as described in Table 10.7 is a yes-biased Monte CarloAlgorithm. Now the error occurs when (a) ∈ LF

n \ {(1), (n − 1)}. As LFn � Z∗n,

Page 486: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

472 10 Algebraic Aspects of Number Theory

Table 10.8 RepeatedFermat’s test Input: Odd integer n≥ 3 and an integer k ≥ 1.

Method:

1. repeat k times2. Choose an integer a randomly from {2,3, . . . , n− 2}3. if (an−1 �≡ 1 (modn))

4. return (“Yes: The number is a composite integer”).5. return (“No: The number is a prime integer”).

|LFn | is a proper divisor of |Z∗n| = φ(n) < n− 1. Thus |LF

n | ≤ n−12 . As a result, the

probability that an a randomly chosen from {2,3, . . . , n−2} is in LFn \{(1), (n−1)}

is at mostn−1

2 −2n−3 = n−5

2(n−3)< 1

2 . �

Remark To increase the confidence level of the primality testing as described inTable 10.7, we may repeat the process as described in Table 10.8.

Remark Note that if the algorithm as described in Table 10.8 outputs “Yes: Thenumber is a composite integer”, then the algorithm finds an F -witness for n andhence n must be a composite integer. On the other hand, if n is composite and thereexists at least one F -witness for n in Z∗n, then the error probability in all k attemptsis at most ( 1

2 )k . Thus by choosing k large enough, the error probability can be madeas small as desired.

Unfortunately, there are composite integers that cannot be shown to be compositeusing the above approach, because there are integers which are pseudo-primes toevery relatively prime base, that is, there are composite integers n such that bn−1 ≡1 (modn), for all b relatively prime with n. This leads to the following importantdefinition.

Definition 10.10.4 A composite integer n which satisfies an−1 ≡ 1 (modn) for allpositive integer a with gcd(a,n)= 1 is called a Carmichael number named after RCarmichael who studied them in the early part of the 20th century.

Example 10.10.2 The integer n= 561 is the smallest Carmichael number.

In 1912, Carmichael conjectured that there exist infinitely many Carmichaelnumbers. After 8 years, Alford, Granville and Pomerance showed the correctnessof the conjecture. As the proof of the conjecture is out of the scope of this book, weare not discussing that here. However, the following theorems provide some usefulproperties of Carmichael number.

Theorem 10.10.5 Let n = p1p2 · · ·pk , where pi ’s are distinct primes such thatpi − 1 divides n− 1 for all i ∈ {1,2, . . . , k}. Then n is a Carmichael number.

Page 487: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 473

Proof Let a be a positive integer such that gcd(a,n)= 1. Then gcd(a,pi)= 1 forall i ∈ {1,2, . . . , k}. Hence by Fermat’s Little Theorem 10.4.2, api−1 ≡ 1 (modpi)

for all i which implies an−1 ≡ 1 (modpi) for all i as pi − 1 divides n − 1, byhypothesis. The rest of the theorem follows from Chinese Remainder Theorem. �

Example 10.10.3 Using Theorem 10.10.5, we can conclude that n= 6601= 7 ·23 ·41 is a Carmichael number.

Now we shall show that the converse of the Theorem 10.10.5 is also true. Toprove that we need some concepts from group theory. For an abelian group (G, ·),we say that an integer k kills the group G iff Gk = {e}, where e is the identityelement of G. Let KG = {k ∈ Z : k kills G}. Then clearly KG is a subgroup of thegroup (Z,+) and hence of the form nZ for a uniquely determined non-negativeinteger n. This integer n is called exponent of G. Note that if n �= 0, then this n isthe least positive integer that kills G. Further note that for any integer k such thatGk = {e}, the exponent n of G divides k. Also, if G is a finite cyclic group, then theexponent of G is same as the order of the group G. Using the concept of exponentof the group, we prove the following theorem.

Theorem 10.10.6 The converse of the Theorem 10.10.5 is also true.

Proof Let n be a Carmichael number. Then n is a composite integer and an−1 ≡ 1(mod n), for all (a) ∈ Z∗n. Hence n− 1 kills the group Z∗n. Let n= p

α11 p

α22 · · ·pαk

k

be the prime factorization of n, where pi ’s are distinct primes and αi ≥ 1, for alli = 1,2, . . . , k. Now by Chinese Remainder Theorem, we have Z∗n is isomorphic tothe group Z∗

pα11× Z∗

pα22× · · · × Z∗

pαkk

, where each of the Z∗p

αii

is a cyclic group of

order pαi−1i (pi − 1). Thus n− 1 kills the group Z∗n iff n− 1 kills each the groups

Z∗p

αii

, i.e., iff pαi−1i (pi − 1) divides n− 1, for all i = 1,2, . . . , k. Now we claim that

αi = 1, for all i = 1,2, . . . , k. If not, then there exists pi , for some i such that pi

will divide both n− 1 and n, a contradiction. Thus αi = 1 for all i = 1,2, . . . , k andhence n= p1p2 · · ·pk and pi − 1 divides n− 1, for all i = 1,2, . . . , k. �

The following theorem also provides useful information about Carmichael num-bers.

Theorem 10.10.7 A Carmichael number must have at least three distinct odd primefactors.

Proof From Theorem 10.10.6, it follows that if an integer n > 2 is a Carmichaelnumber, then n= p1p2 · · ·pk , where pi ’s are distinct odd primes such that pi − 1divides n− 1 for all i ∈ {1,2, . . . , k}. We need to show that k ≥ 3. As n is a positivecomposite integer, k > 1. If possible, let k = 2, i.e., let n= pq , where p and q aredistinct primes. Without loss of generality, let us assume that p > q . Now p−1|n−

Page 488: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

474 10 Algebraic Aspects of Number Theory

1= pq − 1= q(p− 1)+ (q − 1). Thus p− 1|q − 1, a contradiction. So, n must bea product of at least three distinct odd primes. �

In the next section we are going to introduce another probabilistic primality test-ing based on finding non-trivial square root of 1 modulo n.

10.10.3 Miller–Rabin Primality Testing

If n is a Carmichael number, then the probability that Fermat’s test for “Is-Composite” returns a wrong answer is φ(n)−2

n−3 >φ(n)

n=∏p|n(1− 1

p) which is very

close to 1, if n has only few and large prime factors. As a result, the repetition trickfor reducing the error probability does not hold. So we need to search for othertechniques.

The next primality testing algorithm is based on finding non-trivial square root of1 modulo n. First let us try to explain what do we mean by a square root of 1 modulon. An integer a, 1≤ a < n is called a square root of 1 modulo n if a2 ≡ 1 (modn).Note that, 1 and n− 1 are always square roots of 1 modulo n. Thus these numbersare called trivial square roots of 1 modulo n. Recall that the Corollary of Theo-rem 10.5.1 ensures that if p is an odd prime number then 1 has no non-trivial squareroot modulo p. Thus to develop a primality testing algorithm, we may use the fact“If there exists a non-trivial square root of 1 modulo n, then n must be a compositenumber.” Before developing a “yes-biased” Monte Carlo algorithm for the problem“Is-Composite”, let us first look at the Fermat’s primality testing little closely. Aswe are interested in odd n, let us assume that n= 2h · t + 1, where gcd(2, t)= 1 andh ≥ 1. Thus an−1 ≡ ((at (modn))2h

) (modn) implies that an−1 (modn) may becalculated in h+ 1 intermediate steps if we let b0 ≡ at (modn); bi ≡ b2

i−1 (modn),for i = 1,2, . . . , h. Thus bh ≡ an−1 (modn). Now let us try to explain through anexample how this observation may be helpful in developing a probabilistic primalitytesting.

Let n= 325. Then n−1= 81 ·22. In the Table 10.9, we calculate the powers b0 =a81 (modn), b1 = (a81)2 ≡ a162 (modn), b2 ≡ a324 (modn) for a list of differentvalues of a, 2≤ a < n− 1 and show that how this table plays an important role forprimality testing.

Note that 2 is an F -witness for 325 having gcd(2,325)= 1 while 130 is also anF -witness with gcd(130,325)= 65 > 1. Note that 7, 18, 32, 118, 126, 199, 224 and251 are all F -liars for 325. So, these numbers will not help us in the primality test-ing using Fermat’s test. But, if we start calculation with 118, 224 and 251, we seethat 274, 274 and 51 are non-trivial square roots of 1 modulo 325. This observationdirectly implies that 325 is a composite number. On the other hand, the calculationwith 7, 18, 32 and 199 provide no information regarding primality testing based onnon-trivial square root modulo 1 as−1≡ 324 (mod 325) is a trivial square root mod-ulo 325 and 7162 ≡−1 (mod 325), 18162 ≡−1 (mod 325), 32162 ≡−1 (mod 325)

and 19981 ≡ −1 (mod 325). Likewise, calculation with 126 does not provide any

Page 489: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 475

Table 10.9 Calculation of a324 (mod 325) for different base values of a

a b0 = a81 (mod 325) b1 = (a162) (mod 325) b2 = a324 (mod 325)

2 252 129 66

7 307 324 1

18 18 324 1

32 57 324 1

118 118 274 1

126 1 1 1

130 0 0 0

199 324 1 1

224 274 1 1

251 51 1 1

Table 10.10 General form of the sequence of bi ’s, where “∗” denotes an arbitrary element from{2,3, . . . , n− 3}SN. b0 b1 . . . . . . bh−1 bh Information

1 1 1 . . . 1 1 1 . . . 1 1 No information

2 −1 1 . . . 1 1 1 . . . 1 1 No information

3 ∗ 1 . . . 1 1 1 . . . 1 1 n is composite

4 ∗ −1 . . . 1 1 1 . . . 1 1 No information

5 ∗ ∗ . . . 1 1 1 . . . 1 1 n is composite

6 ∗ ∗ . . . −1 1 1 . . . 1 1 No information

7 ∗ ∗ . . . ∗ 1 1 . . . 1 1 n is composite

8 ∗ ∗ . . . ∗ −1 1 . . . 1 1 No information

9 ∗ ∗ . . . ∗ ∗ 1 . . . 1 1 n is composite

10 ∗ ∗ . . . ∗ ∗ −1 . . . 1 1 No information

11 ∗ ∗ . . . ∗ ∗ ∗ . . . 1 1 n is composite

12 ∗ ∗ . . . ∗ ∗ ∗ . . . −1 1 No information

13 ∗ ∗ . . . ∗ ∗ ∗ . . . ∗ 1 n is composite

14 ∗ ∗ . . . ∗ ∗ ∗ . . . ∗ −1 n is composite

15 ∗ ∗ . . . ∗ ∗ ∗ . . . ∗ ∗ n is composite

information on primality testing as 12681 ≡ 1 (mod 325) is also a trivial square rootmodulo 325. So depending on different values of a, we get useful information fromthe sequence of bi ’s. Thus we need to know a general form of the sequence of bi ’s,i = 0,1,2, . . . , h which is described in Table 10.10.

As Row 1, Row 2, Row 4, Row 6, Row 8, Row 10, and Row 12 of Table 10.10do not ensure the existence of any non-trivial square root of 1 modulo n, we getno information regarding the primality testing. On the other hand, Row 3, Row 5,Row 7, Row 9, Row 11 and Row 13 ensure the existence of non-trivial square root

Page 490: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

476 10 Algebraic Aspects of Number Theory

of 1 modulo n, thereby provides the information that n is a composite integer. ForRow 14 and Row 15, as bh �≡ 1 (modn), the corresponding a is an F -witness for n.The above observation leads to the following definition.

Definition 10.10.5 Let n = 2h · t + 1 ≥ 3 be an odd integer, where gcd(2, t) = 1and h ≥ 1. An integer a, 1 ≤ a < n, is called an A-witness for n if at �≡ 1 (modn)

and at2i �≡ −1 (modn) for all i, 0≤ i < h. On the other hand, if n is composite anda is not an A-witness for n, that is, either at ≡ 1 (modn) or at2i ≡−1 (modn) forsome i, 0≤ i < h, then a is said to be an A-liar for n.

Example 10.10.4 For n= 325, a =2, 118, 130, 224, 251 are examples of A-witnesswhile a =7, 18, 32, 126 and 199 are examples of A-liars.

Now we are going to prove the following lemma which will help us in developinga probabilistic primality testing.

Lemma 10.10.6 If a is an A-witness for n, then n must be a composite integer.

Proof Let a be an A-witness for n. Let us consider the sequence b0, b1, b2, . . . , bh−1as in the Table 10.10. Now we may have two cases. First let bh �≡ 1 (modn). Thena must be an F -witness for n, implying that n is a composite integer. Now let bh ≡1 (modn). As a is an A-witness, b0 �≡ 1 (modn) and n− 1 does not occur in thesequence b0, b1, b2, . . . , bh−1. Let i be the minimum i ≥ 1 such that bi ≡ 1 (modn).Such i always exists as bh ≡ 1 (modn). As bi−1 �∈ {1, n− 1}, bi−1 is a non-trivialsquare root of 1 modulo n and thereby n is a composite integer. �

Based on the above lemma, very soon we are going to develop a primality test-ing. Before that let us try to find some properties of A-liars. For that the followingdefinition plays an important role.

Definition 10.10.6 A positive integer n≥ 3 of the form 2ht + 1, where gcd(2, t)=1, passes Miller’s test for a base a, 1 ≤ a < n, if either at ≡ 1 (modn) or a2i t ≡−1 (modn), for some i with 0 ≤ i ≤ h− 1. In other words, n passes Miller’s testfor a base a, 1≤ a < n, if a is an A-liar for n.

Through the following theorems, we try to find some of the properties of thoseodd integers which pass the Miller’s test for some base a. These properties will leadto the primality testing algorithm.

Theorem 10.10.8 If n is an odd prime and a is a positive integer such that 1≤ a <

n, then n passes Miller’s test for the base a.

Proof Let ak = a(n−1)/2k, k = 0,1, . . . , h. By Fermat’s Little Theorem, we have

a0 = a2ht = an−1 ≡ 1 (modn). Again as a21 = (a2h−1t )2 = an−1 = a0 ≡ 1 (modn),

Page 491: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 477

by the Corollary of Theorem 10.5.1, it follows that either a1 ≡ 1 (modn) or a1 ≡−1 (modn). So, in general, if we have found that a0 ≡ a1 ≡ · · · ≡ ak ≡ 1 (modn)

with k < h, then since a2k+1 ≡ ak ≡ 1 (modn), we have either ak+1 ≡ 1 (modn) or

ak+1 ≡−1 (modn). Thus continuing this process, we find that either ak ≡ 1 (modn)

for k = 0,1,2, . . . , h or ak ≡ −1 (modn) for some integer k. Hence, n passesMiller’s test for the base a. �

Theorem 10.10.9 If a composite integer n passes Miller’s test for a base a, then n

is a pseudo-prime to the base a.

Proof As n passes Miller’s test for the base a, either at ≡ 1 (modn) or a2i t ≡−1 (modn), for some i with 0 ≤ i ≤ h − 1, where n = 2ht + 1, h ≥ 1 andgcd(2, t) = 1. Thus an = an−1a = (a2i t )2h−i

a = (±1)2h−ia ≡ a (modn), with the

result that n is a pseudo-prime to the base a. �

The above theorem leads to the following important definition.

Definition 10.10.7 If n is a composite integer that passes Miller’s test for a base a,then we say that n is a strong pseudo-prime to the base a.

Example 10.10.5 Let n= 2047= 23 · 89. Then n− 1= 2046= 21 · 1023. As both22046 ≡ 1 (mod 2047) and 21023 ≡ 1 (mod 2047), 2047 is a strong pseudo-prime tothe base 2.

The following theorem shows the existence of infinitely many strong pseudo-primes to the base 2. To prove this let us first prove the following lemma.

Lemma 10.10.7 Let n be an odd integer which is a pseudo-prime to the base 2.Then N = 2n − 1 is a strong pseudo-prime to the base 2.

Proof As n is a composite integer, Lemma 10.10.3 ensures that N = 2n − 1 is alsoa composite integer. Also as 2n−1 ≡ 1 (modn), there exists some odd integer k

such that 2n−1 = kn + 1. Now, N − 1 = 2n − 2 = 2(2n−1 − 1) = 2nk and 2n =N + 1≡ 1 (modN). Thus 2

N−12 = 2nk = (2n)k ≡ 1 (modN), which implies that N

passes Miller’s test for the base 2. Consequently, N is a strong pseudo-prime to thebase 2. �

We are now in a position to prove the existence of infinitely many strong pseudo-primes to the base 2.

Theorem 10.10.10 There are infinitely many strong pseudo-primes to the base 2.

Proof Lemma 10.10.7 ensures that every odd pseudo-prime to the base 2 yields astrong pseudo-prime 2n − 1 to the base 2. The rest of the theorem follows fromTheorem 10.10.2. �

Page 492: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

478 10 Algebraic Aspects of Number Theory

Table 10.11 Miller–Rabinprimality test Input: Odd integer n≥ 3.

Method:

1. write n− 1= 2ht, where h≥ 1 and gcd(2, t)= 1.2. choose a random integer a such that 2≤ a ≤ n− 2.3. b← at (modn)

4. if b≡ 1 (modn)

5. return (“No: the number is a prime integer”).6. for i← 0 to h− 1

7. do

⎧⎪⎨

⎪⎩

if b≡−1 (modn)

return (“No: the number is a prime integer”).

b← b2 (modn)

8. return (“Yes: the number is a composite integer”).

Remark The smallest odd strong pseudo-prime to the base 2 is 2047. So, if n isan odd integer less than 2047 and n passes Miller’s test to the base 2, then n mustbe a prime integer. Using the concept of strong pseudo-prime, we are now goingto present another yes-biased Monte Carlo algorithm for Composites, known as theMiller–Rabin primality test (also known as “strong pseudo-prime test”). Let us firstdescribe the algorithm in Table 10.11, where n is an odd integer greater than 1.

Now we shall show that the algorithm as described in Table 10.11 is a yes-biasedMonte Carlo algorithm.

Theorem 10.10.11 The Miller–Rabin primality testing algorithm is a yes-biasedMonte Carlo algorithm.

Proof To show that the Miller–Rabin primality testing for an odd integer n ≥ 3 isa yes-biased Monte Carlo algorithm, we need to show that if the algorithm returns“Yes: the number is a composite integer”, then n must be composite. We shall provethe result by the method of contradiction. Suppose, the algorithm returns “Yes: thenumber is a composite integer” for some prime n. Since it returns “Yes: the numberis a composite integer”, it must be the case that

at �≡ 1 (modn). (10.15)

Now we consider the sequence of values b0 = at , b1 = b20 = a2t , b2 = b2

1 = b22

0 =a22t , . . . , bh−1 = b2h−1

0 = a2h−1t . As the algorithm returns “Yes: the number is a

composite integer”, we must say that a2i t �≡ −1 (modn), 0≤ i ≤ h−1. On the otherhand, as n is prime and 2≤ a ≤ n− 2, by Fermat’s Little Theorem 10.4.2, we havean−1 ≡ 1 (modn), i.e., a2ht ≡ 1 (modn). Thus by Corollary of Theorem 10.5.1,a2h−1t ≡±1 (modn). As a2h−1t �≡ −1 (modn), we have a2h−1t ≡ 1 (modn). Thena2h−2t must be a square root of 1. Thus continuing similar argument, we have at ≡1 (modn), contradicting (10.15), proving that the Miller–Rabin primality testingalgorithm is a yes-biased Monte Carlo algorithm. �

Page 493: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 479

To obtain an error bound of the Miller–Rabin algorithm for a given odd integern ≥ 3, we need to consider the set of A-liars for n. But unfortunately, unlike theset of all F -liars for n, the set of all A-liars for n does not have a good algebraicstructure like group structure. To explain that let us revisit the Table 10.9. Notethat 7 and 32 are A-liars for 325 while their product 224 is an A-witness for 325.Thus to obtain an error bound, we consider the set MR(n), for a given odd positiveinteger n, defined by MR(n)= {a ∈ Zn\{(0)} : an−1 = (1) and for j = 0,1, . . . , h−1, at2j+1 = (1) implies at2j = ±(1)}, where n = 2ht + 1, h ≥ 1 and gcd(2, t) = 1.We shall prove that the set of all A-liars is contained in MR(n). Further we shallprove the main result that if n is a composite integer, then |MR(n)| ≤ n−1

4 . To provethe main result, let us first prove the following lemmas.

Lemma 10.10.8 If n passes Miller’s test for a base a, i.e., if a is an A-liar for n,then a ∈MR(n).

Proof The lemma follows from Theorem 10.10.9, Table 10.10 and the Definition ofMR(n). �

Lemma 10.10.9 Let f : Z∗n → Z∗n be a group homomorphism defined by f (x) =xn−1, ∀x ∈ Z∗n. Then |kerf | = gcd(φ(n), n−1), where n= pe, for some odd primep with e ≥ 1.

Proof As p is an odd prime and e ≥ 1, by Theorem 10.4.6, Z∗n is a cyclic group oforder φ(n). So, the group (Z∗n, .) is isomorphic to the group (Zφ(n),+). Thus thehomomorphism x �→ xn−1 in Z∗n induces a homomorphism g : Zφ(n) → Zφ(n) inZφ(n) defined by g(x)= (n−1)x, ∀x ∈ Zφ(n). Hence |kerf | = |kerg|. Now we aregoing to calculate |kerg|. Note that kerg = {x ∈ Zφ(n) : (n− 1)x ≡ 0 (modφ(n))}.Let d = gcd(φ(n), n− 1). Thus y ∈ kerg if and only if (n− 1)y ≡ 0 (modφ(n))

if and only if φ(n) divides (n− 1)y if and only if φ(n)d

divides ((n− 1)/d)y if and

only if φ(n)d

divides y if and only if y ≡ 0 (mod φ(n)d

). Thus kernel of g contains

precisely the d residue classes, namely, (iφ(n)

d), where i = 0,1, . . . , d − 1, with the

result |kerf | = |kerg| = gcd(φ(n), n− 1). �

Lemma 10.10.10 Suppose that a is an element of an additive abelian group.Suppose further that for some prime p and an integer e ≥ 1, pea = (0) andpe−1a �= (0). Then the order of the element a is pe.

Proof Let m be the order of the element a. Then m divides pe. As p is a primeinteger, m must be of the form pi for some i ∈ {0,1,2, . . . , e}. We claim that i = e.If i < e, then ma = pia = (0) which implies that pe−1a = (0), contradicting thefact that pe−1a �= (0). Hence i must be equal to e, with the result m= pe. �

Now we are in a position to prove the main theorem. But before proving thatlet us first discuss some notions of random variable and uniform distribution from

Page 494: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

480 10 Algebraic Aspects of Number Theory

probability theory. Here, we introduce the concepts from probability theory, startingwith the basic notions of probability distributions on finite sample spaces as definedbelow.

Definition 10.10.8 Let Ω be a finite non-empty set. A finite probability distributionon Ω is a function P : Ω → [0,1] that satisfies

∑ω∈Ω P(ω) = 1. The set Ω is

called the sample space of P .

Intuitively, the elements of Ω represent the possible outcomes of a random ex-periment, where the probability of outcome ω ∈Ω is P(ω).

Example 10.10.6 If we think of tossing a fair coin, then setting Ω = {H,T } andP(ω)= 1

2 for all ω ∈Ω gives a probability distribution that naturally describes thepossible outcomes of the experiment.

The above example leads to a very important distribution in the theory of proba-bility, known as uniform distribution.

Definition 10.10.9 Let Ω be a finite non-empty set. If P(w)= 1|Ω| for all ω ∈Ω ,

then P is called the uniform distribution on Ω .

Now let us define another important term in the theory of probability, an event.

Definition 10.10.10 An event is a subset A of Ω and the probability of A is definedto be

P [A] =∑

ω∈A

P (ω).

It is sometimes convenient to associate a real number, or other mathematicalobject, with each outcome of a random experiment. This idea has been formalizedby the notion of a random variable as defined below.

Definition 10.10.11 Let P be a probability distribution on a sample space Ω .A random variable X is a function X :Ω → S, where S is some set. We say thatX takes values in S. In particular, if S = R, i.e., the values taken by X are realnumbers, then we say that X is real valued.

For s ∈ S, “X = s” denotes the event {ω ∈ Ω : X(ω) = s}. Thus P [X = s] =∑ω∈X−1({s}) P (ω). It is further possible to combine random variables to define

new random variables. Suppose, X1,X2, . . . ,Xm are random variables, whereXi :Ω → Si , i = 1,2, . . . ,m. From these m random variables, we can get a new ran-dom variable (X1,X2, . . . ,Xm) that maps ω ∈Ω to (X1(ω),X2(ω), . . . ,Xm(ω)) ∈S1 × S2 × · · · × Sm. More generally, if g : S1 × S2 × · · · × Sm → T is a func-tion, then g((X1,X2, . . . ,Xm)) denotes the random variable that maps ω tog((X1(ω),X2(ω), . . . ,Xm(ω))). Next we are going to define the distribution ofa random variable X.

Page 495: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.10 Probabilistic or Randomized Primality Testing 481

Definition 10.10.12 Let X :Ω → S be a random variable. The variable determinesa probability distribution PX : S → [0,1] on the set S, where PX is defined byPX(a) = P [X = a], for all a ∈ S. PX is called the distribution of X. In particular,if PX is the uniform distribution on S, then we say that the random variable X isuniformly distributed over S.

Uniform distributions have many very nice and simple properties. To understandthe nature of uniform distribution, we should know some simple criteria that willensure that certain random variables have uniform distributions. For that we needthe following definition.

Definition 10.10.13 Let T and S be finite sets. We say that a function f : S → T

is a regular function if every element in the image of f has the same number ofpre-images under f .

Based on the definition of regular function, let us prove the following theorem.

Theorem 10.10.12 Let f : S → T be a surjective, regular function and X be arandom variable that is uniformly distributed over S. Then f (X) is also uniformlydistributed over T .

Proof As f is surjective and regular, for every x ∈ T , the order of the set Sx =f−1({x}) will be |S|

|T | . Thus for each x ∈ T , we have

P[f (X)= x

] =∑

ω∈X−1(Sx)

P (ω)=∑

s∈Sx

ω∈X−1({s})P (ω)

=∑

s∈Sx

P [X = s] =∑

s∈Sx

1

|S| =|S||T |

1

|S| =1

|T | .

Hence the result. �

Based on this theorem, we prove the following theorem, which will help us inproving an error bound for Miller–Rabin primality testing.

Theorem 10.10.13 Let f : G → G′ be a group epimorphism from the abeliangroup G onto the abelian group G′ and X be a random variable that is uniformlydistributed over G. Then f (G) is also uniformly distributed over G′.

Proof To prove the theorem, it is sufficient to prove that f is regular. For that letus consider kerf . Then kerf is a subgroup of G and for every g′ ∈ G′, the setf−1({g′}) is a coset of kerf . The theorem follows from the fact that every coset ofkerf has the same size. �

Now we are in a position to prove the main result in this section.

Page 496: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

482 10 Algebraic Aspects of Number Theory

Theorem 10.10.14 If n is an odd prime, then MR(n)= Z∗n. If n is a positive com-posite integer, then |MR(n)| ≤ n−1

4 .

Proof First let n be an odd prime. Then by Theorem 10.4.5, (Z∗n, ·) is a cyclic groupof order n − 1. As MR(n) ⊆ Z∗n, we need to show that Z∗n ⊆ MR(n). Let a ∈ Z∗n.As n is a prime integer, an−1 = (1). Now consider any j = 0,1, . . . , h − 1 suchthat a2j+1t = (1). Such a j exists, as for j = h− 1, an−1 = (1). Let b = a2j t . Thenb2 = a2j+1t = (1). As n is prime, then by the Corollary of Theorem 10.5.1, the onlypossible choices for b are ±(1). Thus a2j+1t = (1) implies a2j t = ±(1), with theresult that a ∈MR(n). Hence MR(n)= Z∗n.

Now we assume that n is composite. We divide the proof into two cases.Case 1: Let n= pe, where p is an odd prime and e > 1. Let us consider the map

ψ : Z∗n→ Z∗n defined by ψ(x)= xn−1, ∀x ∈ Z∗n. Then clearly ψ is a homomorphismand MR(n)⊆ kerψ . Now by Lemma 10.10.9, we have |kerψ | = gcd(φ(n), n− 1).Thus |MR(n)| ≤ |kerψ | = gcd(pe−1(p− 1),pe − 1)= p− 1= pe−1

pe−1+pe−2+···+1≤

n−14 .

Case 2: Let n = pα11 p

α22 . . . p

αk

k be the prime factorization of n with k > 1. Letn− 1= t2h, where h ≥ 1 and gcd(t,2)= 1. Let ψ : Z∗

pα11× Z∗

pα22× · · · × Z∗

pαkk

→Z∗n be the ring isomorphism as defined in the Chinese Remainder Theorem. Letφ(p

αi

i )= ti2hi , where φ is the Euler φ-function, hi ≥ 1 and gcd(ti ,2)= 1, for i =1,2, . . . , k. Let l = min{h,h1, h2, . . . , hk}. Then l ≥ 1. Also by Theorem 10.4.6,each of Z∗

pαii

is a cyclic group of order ti2hi .

We claim that for a ∈ MR(n), at2l = (1). If l = h, then from the definitionof MR(n), at2h = (1). So we assume that l < h. We shall prove that in this casealso at2l = (1). We shall prove this by the method of contradiction. If possible letat2l �= (1) and let j be the smallest index in the range l, l + 1, . . . , h− 1 such thatat2j+1 = (1). Then by the definition of MR(n), we have at2j = −(1). Since l < h,we have l = hi for some i ∈ {1,2, . . . , k}. Let a = ψ(a1, a2, . . . , ak). Then we haveat2j

i = −(1). Then by Lemma 10.10.10, the order of ati in Z∗

pαii

is 2j+1. Now by

Lagrange’s Theorem, 2j+1 must divide ti2hi , a contradiction as j + 1 > j ≥ l = hi

and gcd(2, ti )= 1. Thus at2l = (1).From the claim in the previous paragraph and the definition of MR(n), it fol-

lows that for any a ∈MR(n), at2l−1 =±(1). Now we are going to use some resultsfrom the probability theory. We consider an experiment in which a is chosen atrandom (i.e., with a uniform distribution) from Z∗n. To prove the main result, it suf-

ficient to prove that Pr[at2l−1 =±(1)] ≤ 14 . Let a = ψ(a1, a2, . . . , ak). As a is uni-

formly distributed over Z∗n, each ai ∈ Z∗p

αii

is also uniformly distributed over Z∗p

αii

and the collection of all the ai ’s is a mutually independent collection of randomvariables. Let us consider the group homomorphism f i

j : Z∗p

αii

→ Z∗p

αii

defined by

f ij (ai) = at2j

i , for i = 1,2, . . . , k and j = 0,1,2, . . . , h. Then by Lemma 10.10.9

Page 497: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.11 Exercise 483

we have |kerf ij | = gcd(ti2hi , t2j ). Also, by using first isomorphism theorem we

have | Im(f ij )| = ti2hi

gcd(ti2hi ,t2j ). Further, as l ≤ h and l ≤ hi , we have gcd(ti2hi , t2l )

divides gcd(ti2hi , t2h) and gcd(ti2hi , t2l) divides gcd(ti2hi , t2hi ), it follows that| Im(f i

h)| divides | Im(f il )| and | Im(f i

l )| divides | Im(f il−1)|. Thus | Im(f i

l−1)| iseven and contains at least 2| Im(f i

h)| elements. As Z∗p

αii

is cyclic and Im(f il−1) is

a subgroup of Z∗p

αii

, Im(f il−1) is also cyclic. So, in particular, Im(f i

l−1) contains a

unique subgroup of order 2, namely {(1),−(1)}. Thus −(1) ∈ Im(f il−1). Now let us

consider two events E1 and E2 as follows:Note that the event at2l−1 =±(1) occurs if and only if either

1. E1: at2l−1

i =+(1) for i = 1,2, . . . , k or

2. E2: at2l−1

i =−(1) for i = 1,2, . . . , k.

Further note that the events E1 and E2 are disjoint, and since the values at2l−1

i are

mutually independent, with each value at2l−1

i uniformly distributed over Im(f il−1)

by Theorem 10.10.13, and since Im(f il−1) contains ±(1), we have

Pr[at2l−1 =±(1)

]= Pr[E1] + Pr[E2] = 2k∏

i=1

1

| Im(f il−1)|

,

and since | Imf il−1| ≥ 2|(Imf i

h)|, we have

Pr[at2l−1 =±(1)

]≤ 2−k+1k∏

i=1

1

| Im(f ih)| . (10.16)

If k ≥ 3, then from (10.16) we can directly say that Pr[at2l−1 = ±(1)] ≤ 14 , and in

that case, we are done. Now let us suppose that k = 2. In this case, Theorem 10.10.7implies that n is not a Carmichael number, which implies that for some i = 1, . . . , l,we must have Im(f i

h) �= {(1)}, with the result | Im(f ih)| ≥ 2, and (10.16) finally

implies that Pr[at2l−1 =±(1)] ≤ 14 , as required. �

10.11 Exercise

Exercises-I

1. Show that the last digit in the decimal expression of Fn = 22n + 1 is 7 if n≥ 2.2. Use the fact that every prime divisor of F4 = 65537 is of the form 26k + 1 to

verify that F4 is a prime integer.3. Estimate the number of decimal digits in the mth Fermat number Fm.4. Show that 91 is a pseudo-prime to the base 3.

Page 498: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

484 10 Algebraic Aspects of Number Theory

5. Show that every odd composite integer is a pseudo-prime to the base 1 and−1.6. Show that if p is a prime and 2p − 1 is composite, then 2p − 1 is a pseudo-

prime to the base 2.7. Show that if n is a pseudo-prime to the bases a and b, then n is also a pseudo-

prime to the base ab.8. Show that if a and n are positive integers with gcd(a,n)= gcd(a − 1, n)= 1,

then 1+ a + a2 + · · · + aφ(n)−1 ≡ 0 (modm).9. Show that aφ(b) + bφ(a) ≡ 1 (modab), if a and b are relatively prime positive

integers.10. Use Euler’s Theorem to find the last digit in the decimal representation of

71000.11. Find the last digit in the decimal representation of 171717

.12. Prove the following:

(a) If n is an integer greater than 2 then φ(n) is even.(b) φ(3n)= 3φ(n) if and only if 3 divides n.(c) φ(3n)= 2φ(n) if and only if 3 does not divide n.(d) If n is odd then φ(2n)= φ(n).(e) If n is even then φ(2n)= 2φ(n).(f) If m divides n then φ(m) divides φ(n).(g) If n is a composite positive integer and φ(n) divides n − 1, then n is a

square free integer and is the product of at least three distinct primes.

13. For all positive integer n and for all positive integer a ≥ 2, prove that n dividesφ(an − 1).

14. Which of the following congruences have solutions and how many: x2 ≡2 (mod 11) and x2 ≡−2 (mod 59).

15. Prove that σ(n) is an odd integer if and only if n is a perfect square or a doubleof a perfect square.

16. Prove that there exist infinitely many primes of the form 8k+ 1.17. Prove that there exist infinitely many primes of the form 8k− 1.18. Prove that if p and q are primes of the form 4k+ 3 and if x2 ≡ p (modq) has

no solutions, then prove that x2 ≡ q (modp) has two solutions.19. Find all solutions of x2 ≡ 1 (mod 15).20. Find all primes p such that x2 ≡−1 (modp).21. Write down the last two digits of 91500.

Exercises-II Identify the correct alternative(s) (there may be more than one) fromthe following list:

1. Which of the following numbers is the largest?234

, 243, 324

, 342, 423

, 432.

(a) 432(b) 342

(c) 234(d) 423

.

Page 499: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

10.12 Additional Reading 485

2. Suppose the sum of the seven positive numbers is 21. What is the minimumpossible value of the average of the squares of these numbers?

(a) 9 (b) 21 (c) 63 (d) 7.

3. The number of elements in the set {n : 1 ≤ n ≤ 1000, n and 1000 are relativelyprime} is

(a) 300 (b) 250 (c) 100 (d) 400.

4. The number of 4 digit numbers with no two digits common is

(a) 5040 (b) 3024 (c) 4536 (d) 4823.

5. The unit digit of 2100 is

(a) 2 (b) 8 (c) 6 (d) 4.

6. The number of multiples of 1044 that divide 1055 is

(a) 121 (b) 12 (c) 11 (d) 144.

7. The number of positive divisors of 50,000 is

(a) 40 (b) 30 (c) 20 (d) 50.

8. The last digit of (38)2011 is

(a) 4 (b) 6 (b) 2 (d) 8.

9. The last two digits of 781 are

(a) 37 (b) 17 (c) 07 (d) 47.

10. Given a positive integer n, let φ(n) denote the number of integers k such that1≤ k ≤ n and gcd(k, n)= 1. Then identify the correct statement(s):

(a) φ(m) divides m for every positive integer m;(b) a divides φ

(am−1

)for all positive integers a and m such that gcd(a,m)= 1;

(c) m divides φ(am−1

)for all positive integers a and m such that gcd(a,m)=1;

(d) m divides φ(am − 1

)for all positive integers a and m.

10.12 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Burton 1989; Hoff-stein et al. 2008; Ireland and Rosen 1990; Jones and Jones 1998; Katz and Lindell2007; Koblitz 1994; Rosen 1992; Mollin 2009; Ribenboim 2004; Stinson 2002) forfurther details.

Page 500: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

486 10 Algebraic Aspects of Number Theory

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Agrawal, M., Kayal, N., Saxena, N.: Primes is in P. Preprint, IIT Kanpur. http://www.cse.iitk.ac.in/news/primality.pdf (August 2002)

Burton, D.M.: Elementary Number Theory. Brown, Dulreque (1989)Dietzfelbinger, M.: Primality Testing in Polynomial Time from Randomized Algorithms to

“PRIMES is in P”. LNCS, vol. 3000, Tutorial. Springer, Berlin (2004)Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer,

Berlin (2008)Ireland, K., Rosen, M.: A Classical Introduction to Modern Number Theory, 2nd edn. Springer,

Berlin (1990)Jones, G.A., Jones, J.M.: Elementary Number Theory. Springer, London (1998)Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC, London/Boca

Raton (2007)Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer, Berlin (1994)Rosen, Kenneth.H.: Elementary Number Theory & Its Applications, 3rd edn. Addition-Wesley,

Reading (1992)Mollin, R.A.: Advanced Number Theory with Applications. CRC Press/Chapman & Hall, Boca

Raton/London (2009)Ribenboim, P.: The Little Book of Bigger Primes. Springer, New York (2004)Stinson, D.R.: Cryptography, Theory & Practice. CRC Press Company, Boca Raton (2002)

Page 501: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 11Algebraic Numbers

Algebraic number theory arose through the attempts of mathematicians to prove Fer-mat’s Last Theorem. One of the continuous themes since early 20th century whichmotivated algebraic number theory was to establish analogy between algebraic num-ber fields and algebraic function fields. The study of algebraic number theory wasinitiated by many mathematicians. This list includes the names of Kronecker, Kum-mer, Dedekind, Dirichlet, Gauss, and many others. Gauss called algebraic numbertheory ‘Queen of Mathematics’. Andrew Wiles established Fermat’s Last Theorema few years back. An algebraic number is a complex number which is algebraicover the field Q of rational numbers. An algebraic number field is a subfield of thefield C of complex numbers, which is a finite field extension of the field Q and isobtained from Q by adjoining a finite number of algebraic elements. The conceptsof algebraic numbers, algebraic integers, Gaussian integers, algebraic number fieldsand quadratic fields are introduced in this chapter after a short discussion on generalproperties of field extensions and finite fields. Moreover, the countability of alge-braic numbers, existence of transcendental numbers, impossibility of duplication ofgeneral cube and impossibility of trisection of a general angle by straight edge andcompass are shown. The celebrated theorem known as Fundamental Theorem ofAlgebra is also proved in this chapter by using the tools from homotopy theory asdiscussed in Chap. 2. This theorem proves the algebraic completeness of the thefield of complex numbers. Like the field of complex numbers, we further prove thatthe field of algebraic numbers is also algebraically closed.

11.1 Field Extension

We begin with a review of basic concepts of field extension followed by finite fields.While studying field extension, we mainly consider a pair of fields F and K suchthat F is a subfield of K . Taking F as the basic field, an extension field K of F isa field K which contains F as a subfield. The basic results needed for the study offield extensions are discussed first followed by a discussion on simple extensions.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_11, © Springer India 2014

487

Page 502: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

488 11 Algebraic Numbers

Definition 11.1.1 Let K be a field and F be a subfield of K . Then K is said to bea field extension of F , written as K/F .

Example 11.1.1 (i) C is a field extension of R, denoted by C/R.(ii) Q(

√2) = {a + b

√2 : a, b ∈ Q} is a field extension of Q, denoted by

Q(√

2)/Q.(iii) R is a field extension of Q, denoted by R/Q.(iv) Let K be a field. If charK is 0, then K contains a subfield F isomorphic

to Q. If charK = p > 0, for some prime p, then K contains a subfield F isomor-phic to Zp . Thus K can be viewed as a field extension of F , where F is a fieldisomorphic to Q or Zp according as charK is 0 or p.

(v) Let F be a field and K = F(x), the field of rational functions in x over F ,which is the quotient field of the integral domain F [x]. Then K is a field extensionof F .

Definition 11.1.2 Let K be a field extension of F and α1, α2, . . . , αn be in K . Thenthe smallest field extension of F containing both F and {α1, α2, . . . , αn} is calledthe field generated by F and {α1, α2, . . . , αn} and is denoted by F(α1, α2, . . . , αn).

We now describe the elements of F(α1, α2, . . . , αn).

Theorem 11.1.1 Let K be a field extension of F and α1, α2, . . . , αn be in K . Then

F(α1, α2, . . . , αn)

= {f (α1, α2, . . . , αn)/g(α1, α2, . . . , αn) : f,g ∈ F [x1, x2, . . . , xn] and

g(α1, α2, . . . , αn) �= 0}.

Proof Let S be the set defined by S = {f (α1, α2, . . . , αn)/g(α1, α2, . . . , αn) :f,g ∈ F [x1, x2, . . . , xn] and g(α1, α2, . . . , αn) �= 0}. Then S is a subfield of K suchthat F ⊆ S, since a = a/1 ∈ S for every a ∈ F . Let L be a subfield of K con-taining F and {α1, α2, . . . , αn}. Then L⊇ S, because L contains f (α1, α2, . . . , αn)

and also f (α1, α2, . . . , αn)/g(α1, α2, . . . , αn), if g(α1, α2, . . . , αn) �= 0. This showsthat S is the smallest subfield of K containing F and {α1, α2, . . . , αn}. HenceF(α1, α2, . . . , αn)= S. �

Corollary Let K be a field extension of F and α ∈K . Then F(α)= {f (α)/g(α),

where f (x), g(x) ∈ F [x] and g(α) �= 0} is the quotient field of F [α].

Definition 11.1.3 Let K be a field extension of F . The field K is said to be asimple extension of F iff there exists an element α in K such that K = F(α). Theelement α ∈K is said to be a primitive element of the extension and F(α) is said tobe generated by F and α.

Page 503: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.1 Field Extension 489

Example 11.1.2 The field extension Q(√

5) of Q is a simple extension with√

5 asits primitive element. The field Q(

√5) is generated by Q and a root

√5 of the equa-

tion x2 − 5= 0 and consists of all real numbers a + b√

5 with rational coefficientsa and b.

Definition 11.1.4 A field F is said to be a prime field iff F has no proper subfield.

Example 11.1.3 (i) Q is a prime field, because Q has no proper subfield.(ii) Zp is a prime field for every prime integer p.

Definition 11.1.5 Let K be a field extension of the field F . Then an element α ofK is said to be

(a) a root of a polynomial f (x)= a0 + a1x + · · · + anxn in F [x] iff f (α)= a0 +

a1α+ · · · + anαn = 0;

(b) algebraic over F iff α is a root of some non-null polynomial f (x) in F [x];(c) transcendental over F iff α is not a root of any non-null polynomial in F [x].

Remark Every element a of a field F is algebraic over F .

Definition 11.1.6 Let K be a field extension of the field F . Then K is said to be analgebraic extension over F iff every element of K is algebraic over F . Otherwise,K is called a transcendental extension over F . A simple extension F(α) is saidto be an algebraic or transcendental over F according to whether the element α isalgebraic or transcendental over F .

Example 11.1.4

(a) (i) For the field extension Q(√

2) of Q, every element α = a+ b√

2 ∈Q(√

2)

is algebraic over Q.(ii) The element i ∈C is algebraic over R.

(iii) The element π in R is transcendental over Q(√

2).(iv) The element 2πi ∈C is algebraic over R but transcendental over Q.

(b) For the field extension R of Q,

(i) e and π are both transcendental over Q;For proof see [Hardy and Wright (2008, pp. 218–227)];

(ii)√

π is transcendental over Q;(iii) π2 is transcendental over Q.

Remark Example 11.1.4(a)(iv) shows that the two properties algebraic and tran-scendental vary depending on the base field.

Theorem 11.1.2 Let F be a field and F(x) be the field of rational functions in x

over F . Then the element x of F(x) is transcendental over F .

Page 504: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

490 11 Algebraic Numbers

Proof F(x) is clearly a field extension of the field F . If x is not transcendentalover F , then there is a non-null polynomial f (y)= a0 + a1y + · · · + any

n over F ,of which x is a root. This shows that a0+ a1x + · · · + anx

n = 0. Hence each ai = 0implies that f (y) is a null polynomial. This gives a contradiction. �

Theorem 11.1.3 Let K be a field extension of F and an element α of K be al-gebraic over F . Then F(α) and F [x]/〈f (x)〉 are isomorphic for some monic irre-ducible polynomial f (x) in F [x], of which α is a root.

Proof Define the mapping μ : F [x]→ F [α], f (x) �→ f (α).Then μ is an epimorphism and hence by the First Isomorphism Theorem,

F [x]/kerμ ∼= F [α]. But α is algebraic over F ⇒ kerμ �= {0}. Again kerμ isan ideal of the Euclidean domain F [x]. But F [x] is a PID ⇒ kerμ is a princi-pal ideal of F [x]. Hence kerμ = 〈g(x)〉 for some g(x) ∈ F [x]. If a is the lead-ing coefficient of g(x), then f (x) = a−1g(x) is a monic polynomial of F [x] andkerμ = 〈g(x)〉 = 〈f (x)〉. Clearly, f (x) is irreducible in F [x] and hence 〈f (x)〉is a maximal ideal in F [x]. Consequently, F [x]/〈f (x)〉 is a field. Thus F(α) =Q(F [α])∼=Q(F [x]/〈f (x)〉)= F [x]/〈f (x)〉. Hence the theorem follows. �

Corollary Let K be a field extension of the field F . If an element α of K is algebraicover F , then there exists a unique monic irreducible polynomial in F [x] of whichα is a root.

Proof Using Theorem 11.1.3, there exists a monic irreducible polynomial f (x) inF [x] such α is a root of f (x). If g(x) is a monic irreducible polynomial in F [x]such that α is a root of g(x), then by the above definition of μ,g(x) ∈ kerμ =〈f (x)〉. Consequently, f (x) divides g(x) in F [x]. Suppose g(x) = q(x)f (x) forsome q(x) ∈ F [x]. Since g(x) is irreducible in F [x], it follows that either q(x) orf (x) is a unit in F [x]. As f (x) is not a unit in F [x], q(x) is a unit and thus q(x)= c

for some non-zero element of F . Again, since f (x) and g(x) are both monic, c= 1and hence f (x)= g(x). �

This corollary leads to Definition 11.1.7.

Definition 11.1.7 Let F be a field and K be a field extension of F . Then the uniquemonic irreducible polynomial f (x) in F [x] having α as a root is called the minimalpolynomial of α over F and the degree of f (x) is called the degree of α over F .

We now show that, under a suitable condition, F(α)= F [α].

Proposition 11.1.1 Let K be a field extension of the field F . Then F(α)= F [α] iffα is algebraic over F .

Proof Suppose α is algebraic over F . Then as proved in Theorem 11.1.3, F [α] ∼=F [x]/〈f (x)〉, where f (x) is a monic irreducible polynomial in F [x], of which α isa root. Since F [x]/〈f (x)〉 is a field, F [α] is a field and hence F(α)= F [α].

Page 505: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.1 Field Extension 491

Conversely, suppose F(α)= F [α]. If α = 0, then α is the root of the polynomialx ∈ F [x]. If α �= 0, then α−1 ∈ F(α) and hence α−1 = a0 + a1α + · · · + anα

n forsome ai ∈ F , i = 0,1, . . . , n, n ∈ N. Consequently, 0 =−1+ a0α + a1α

2 + · · · +anα

n+1 ⇒ α is a root of the non-null polynomial f (x)=−1+ a0x + a1x2 + · · · +

anxn+1 ∈ F [x] ⇒ α is algebraic over F . �

Example 11.1.5 (i) The element i of C is algebraic over R and x2+1 is the minimalpolynomial of i over R. Again x − i is the minimal polynomial of i over C.

(ii) The element√

5 of Q(√

5) is algebraic over Q and x2 − 5 is the minimalpolynomial of

√5 over Q. The degree of

√5 over Q is 2.

Theorem 11.1.4 Let K be a field extension of the field F and the element α of K

is algebraic over F . Suppose f (x) is the minimal polynomial of α over F .

(a) If a polynomial g(x) of F [x] has a root α, then f (x) divides g(x) in F [x].(b) f (x) is the monic polynomial of smallest degree in F [x] such that α is a root of

f (x).

Proof (a) follows from the Corollary to Theorem 11.1.3.(b) If f (x) is not of the smallest degree polynomial in F [x], of which α is a root,

then there exists a monic polynomial g(x) in F [x] such that α is a root of g(x) anddegg(x) < degf (x). This gives a contradiction. �

Definition 11.1.8 Let L and K be two field extensions of the same field F . Anisomorphism ψ : L→K of fields, whose restriction to F is the identity homomor-phism, is called an isomorphism of field extensions or an F -isomorphism. Two fieldextensions L and K of the same field F are said to be isomorphic field extensionsiff there exists an F -isomorphism ψ : L→K .

Proposition 11.1.2 Let L and K be two field extensions of the same field F andψ : L→ K be an F -isomorphism. Suppose f (x) ∈ F [x] and α is a root of f (x)

in L. If β =ψ(α) ∈K , then β is also a root of f (x).

Proof If f (x) = a0 + a1x + · · · + anxn ∈ F [x], then ψ(ai) = ai and ψ(α) = β .

Again f (α)= 0 gives 0=ψ(0)=ψ(f (α))=ψ(a0+a1α+· · ·+anαn)=ψ(a0)+

ψ(a1)ψ(α) + · · · + ψ(an)(ψ(α))n, since ψ is a homomorphism. This shows that0= a0 + a1β + · · · + anβ

n. Hence β =ψ(α) is a root of f (x). �

Theorem 11.1.5 Let F be a field and L,K be two field extensions of F . If α ∈ L

and β ∈ K are both algebraic elements over F , then there is an isomorphismψ : F(α)→ F(β) of fields, such that ψ(α) = β and ψ |F = identity, iff α and β

have the same minimal polynomial over F .

Proof Suppose that f (x) is the minimal polynomial of both α and β over F . Thenby Theorem 11.1.3, there exist two isomorphisms μ : F [x]/〈f (x)〉→ F(α) and λ :

Page 506: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

492 11 Algebraic Numbers

F [x]/〈f (x)〉 → F(β). Hence the composite isomorphism ψ = λ ◦ μ−1 : F(α)→F(β) shows that F(α) and F(β) are isomorphic under ψ .

Conversely, suppose ψ : F(α)→ F(β) is an isomorphism such that ψ(α) = β

and ψ |F = identity. If f (x) ∈ F [x] is a polynomial such that f (α) = 0, thenψ(α) = β is also a root of f (x) by Proposition 11.1.2. Hence α and β have thesame minimal polynomial. �

Example 11.1.6 If ω = e2π/3 is a complex cube root of 1 and α is a real root ofthe polynomial f (x) = x3 − 3 in Q[x], then f (x) is the minimal polynomial ofboth α and ωα over Q. Hence by Theorem 11.1.5 there exists a Q-isomorphismψ :Q(α)→Q(ωα), such that ψ(α)= ωα. Note that the elements of Q(α) are realnumbers, but the elements of Q(ωα) are not.

Let F be a field and K be a field extension of F . Then we may consider K as avector space over F by using the field operations.

Definition 11.1.9 Let F be a field and K a field extension of F . Then the dimen-sion of the vector space K over F is called the degree or dimension of K over F andis denoted by [K : F ]. If [K : F ] is finite, then K is called a finite extension overF (or K is said to be finite over F ) or K/F is called a finite extension. Otherwise,K is said to be an infinite extension of F .

Example 11.1.7 (i) C is a finite extension over R. This is so because {1, i} forms abasis of C over R and hence [C :R] = 2.

(ii) Let K =Q({√q : q is a prime integer})⊂R. Then [K :Q] is not finite.[Hint. As q is a prime integer,

√q is not an element of Q. Let us assume

that p1,p2, . . . , pn be distinct prime integers (each is different from q) such that√q /∈ Q(

√p1,√

p2, . . . ,√

pn), which is our induction hypothesis. We claim that√q /∈ Q(

√p1,√

p2, . . . ,√

pn,√

pn+1), where p1,p2, . . . , pn,pn+1 are distinctprime integers such that each is different from q . As

√q /∈Q, the induction hypoth-

esis is true for n = 0. If√

q ∈ Q(√

p1,√

p2, . . . ,√

pn,√

pn+1), then there existelements x, y ∈ Q(

√p1, . . . ,

√pn) such that

√q = x + y

√pn+1. As y = 0 con-

tradicts the induction hypothesis, it follows that y �= 0. If x = 0, then q = y2pn+1gives also a contradiction, since q and pn+1 are distinct primes. Again for x �= 0and y �= 0, q = x2 + 2xy

√pn+1 + pn+1y

2 ⇒√pn+1 = (q − x2 − pn+1y

2)/2xy ∈Q(√

p1,√

p2, . . . ,√

pn) ⇒ √q ∈ Q(

√p1,√

p2, . . . ,√

pn). This gives a contra-diction of hypothesis again. Thus by the induction hypothesis, we find that forany positive integer r , if p1,p2, . . . , pr , q are distinct prime integers, then

√q /∈

Q(√

p1,√

p2, . . . ,√

pr). Consequently, we get a strictly infinite ascending chain offields such that Q � Q(

√2) � Q(

√2,√

3) � · · · . This shows that [K : Q] is notfinite. Clearly, [R :Q] is not finite.]

Theorem 11.1.6 Let K be a finite field extension of the field F . If [K : F ] = n, then

(a) there exists a basis of K over F , consisting of n elements of K and(b) any set of (n+ 1) (or more) elements of K is always linearly dependent over F .

Page 507: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.1 Field Extension 493

Proof As K is an n-dimensional vector space over F , the theorem follows from theproperties of finite dimensional vector spaces. �

Corollary 1 The degree of an algebraic element α over a field F is equal to thedimension of the extension field F(α), regarded as a vector space over F , with abasis B = {1, α,α2, . . . , αn−1} if [F(α) : F ] = n.

Corollary 2 Let α and β be two algebraic elements over the same field F such thatF(α)= F(β). Then α and β have the same degree over F .

Theorem 11.1.7 Let K be a finite field extension of the field F and an element α

of K be algebraic over F . If n is the degree of the minimal polynomial f (x) of α

over F , then [F(α) : F ] = n.

Proof It is sufficient to prove that the set S = {1, α, . . . , αn−1} forms a basis ofthe vector space F(α) over F . Suppose a0 + a1α + · · · + an−1α

n−1 = 0, whereeach ai ∈ F . Then α is a root of the polynomial g(x) = a0 + a1x + · · · +an−1x

n−1 ∈ F [x]. Hence f (x) divides g(x) in F [x] by Theorem 11.1.4(a). But thisis possible only when a0 = a1 = · · · = an−1 = 0, since degg(x) < degf (x) = n.This concludes that S is linearly independent over F . We now claim that the set S

generates the vector space F(α). Let h(α) ∈ F(α). As α is algebraic over F ,F(α) = F [α] (see Proposition 11.1.1). Hence h(α) ∈ F [α]. Let h(x) be the poly-nomial in F [x] corresponding to h(α) in F [α]. Again F is a field ⇒ F [x] is aEuclidean domain ⇒ there exist polynomials q(x) and r(x) in F [x] such thath(x)= f (x)q(x)+ r(x), where r(x)= 0 or deg r(x) < degf (x). Hence for h(α)=f (α)g(α) + r(α), either h(α) = 0 or h(α) = r(α) is a linear combination of ele-ments of S, since deg r(x) < n. Thus S forms a basis of F(α) over K and hence[F(α) : F ] = n. �

Theorem 11.1.8 Let K be a finite field extension of the field F . If S = {α1, α2, . . . ,

αn} ⊂K forms a basis of the vector space K over F , then K = F(α1, α2, . . . , αn).

Proof Clearly, F(α1, α2, . . . , αn) ⊆ K , since F(α1, α2, . . . , αn) is the smallestfield containing F and S. For the reverse inclusion, let α ∈ K . As S formsa basis of K , there exist elements a1, a2, . . . , an in F such that α = a1α1 +a2α2 + · · · + anαn ∈ F(α1, α2, . . . , αn). Thus K ⊆ F(α1, α2, . . . , αn) and henceK = F(α1, α2, . . . , αn). �

We now prove a relation between a finite field extension and an algebraic exten-sion.

Theorem 11.1.9 Every finite field extension of F is an algebraic extension.

Proof Let K be a finite field extension of the field F . Suppose [K : F ] = n and α isa non-zero element of K . Then the (n+ 1) elements 1, α,α2, . . . , αn of the vector

Page 508: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

494 11 Algebraic Numbers

space K over F are linearly dependent. Hence there exist elements a0, a1, . . . , an

(not all zero) in F such that a0 + a1α + · · · + anαn = 0. This shows that α is a root

of the non-null polynomial a0+ a1x+· · ·+ anxn ∈ F [x]. This implies α and hence

K is algebraic over F . �

Corollary If K is a finite field extension of F , then every element of K is algebraicover F .

Remark The converse of Theorem 11.1.9 is not true in general. For example,the field K defined in Example 11.1.7(ii) is an algebraic field extension of Qbut K is not a finite field extension of Q. This is so because for α ∈ K , thereexist prime integers p1,p2, . . . , pn such that α ∈ Q(

√p1,√

p2, . . . ,√

pn). ButQ(√

p1,√

p2, . . . ,√

pn) is a finite extension of Q implies that α is algebraic over Q.Thus K is algebraic over Q but [K :Q] is not finite. The partial converse of Theo-rem 11.1.9 is true for the following particular case.

Theorem 11.1.10 The field extension K(α) over K is finite iff α is algebraicover K .

Proof If K(α) is a finite field extension over K , then by the Corollary to Theo-rem 11.1.9, it follows that α is algebraic over K . Conversely, let α be algebraicover K . Then K(α) is an extension over K implies that [K(α) :K] = n, where n isthe degree of the minimal polynomial f (x) of α over K . This proves that K(α) is afinite extension over K . �

Corollary Every element of a simple algebraic extension F(α) is algebraic over F .

Remark A transcendental element cannot appear in a simple algebraic extension.

Definition 11.1.10 Let K be a field extension of the field F . A subfield L of K issaid to be an intermediate field of K/F iff F ⊆ L⊆K holds and this intermediatefield L is said to be proper iff L �=K and L �= F .

Example 11.1.8 Let K be a field extension of a field F and α be an element of K .Then the field F(α) generated by F and α is an intermediate field, because F ⊆F(α)⊆K .

Remark Let L be an intermediate field of K/F . Then

(a) K is a vector space over F and L is a subspace of K ;(b) K/F is an algebraic extension iff K/L and L/F are both algebraic extensions.

Theorem 11.1.11 Let K be a finite field extension of the field F and L be anintermediate field of K/F . Then [K : F ] = [K : L][L : F ].

Page 509: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.1 Field Extension 495

Proof Let V be a basis of the vector space K over L and U be a basis of the vectorspace L over F . Suppose [L : F ] = m and [K : L] = n. Let V = {v1, v2, . . . , vn}and U = {u1, u2, . . . , um}. Construct W = {uv : u ∈ U,v ∈ V }. Then W forms abasis of K over F . Finally, cardW = nm proves the theorem. �

Remark If either cardV or cardU is infinite, then cardW is also infinite.

Corollary 1 If K is a field extension of the field F and each of the elementsα1, α2, . . . , αn of K are algebraic over F , then K(α1, α2, . . . , αn) is a finite ex-tension of F .

Proof The corollary follows by induction on n. �

Corollary 2 If V = {v1, v2, . . . , vn} is a basis of a finite field extension K of L andU = {u1, u2, . . . , um} is a basis of a finite field extension L of F , then W = {uv :u ∈U,v ∈ V }, consisting of mn elements, forms a basis of K over F .

Corollary 3 Let F be a field and K be a field extension of F such that [K : F ] = n.If an element α of K is algebraic over F , then the degree of α over F divides n.

Proof Consider the tower of fields: F ⊂ F(α) ⊂ K . Then n = [K : F ] = [K :F(α)][F(α) : F ]. As α is algebraic over F , then [F(α) : F ] is the degree of α

over F . Hence the corollary follows. �

Corollary 4 Let F be a field and K be a field extension of F of prime degree p. Ifα is an element of K but not in F , then α has the degree p over F and K = F(α).

Proof [K : F ] = p ⇒ [K : F(α)][F(α) : F ] = p. Again α /∈ F ⇒ [F(α) : F ] �=1 ⇒ [K : F(α)] = 1 and [F(α) : F ] = p. The corollary follows from Ex. 1 ofExercise-I. �

Corollary 5 Let F ⊂ L⊂K be a tower of fields such that K is algebraic over L

and L is algebraic over F . Then K is algebraic over F .

Proof It is sufficient to show that every element α ∈ K is algebraic over F .By hypothesis, K is algebraic over L ⇒ ∃a0, a1, . . . , an−1 (not all zero) ∈ L

such that αn + an−1αn−1 + · · · + a1α + a0 = 0 ⇒ α is algebraic over the field

F(a0, a1, . . . , an−1). Consider the tower of fields: F ⊂ F(a0)⊂ F(a0, a1)⊂ · · · ⊂F(a0, a1, . . . , an−1)⊂ F(a0, a1, . . . , an−1, α). Clearly, each extension of the abovetower is finite. Hence by Theorem 11.1.11, the degree of F(a0, a1, . . . , an−1, α)

over F is finite. Then it follows that α is algebraic over F . Hence K is algebraicover F . �

The structure of a simple transcendental extension is given in the next theorem.

Page 510: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

496 11 Algebraic Numbers

Theorem 11.1.12 If α is transcendental over a field F , then the field F(α) gen-erated by F and α is isomorphic to the field F(x) of all rational functions in x

over F .

Proof The extension F(α) is given by F(α) = {f (α)/g(α) : f (x), g(x) ∈ F [x]and g(α) �= 0}, using Corollary to Theorem 11.1.1. If two polynomial expressionsf1(α) and f2(α) are equal in F(α), their coefficients must be equal term by term,otherwise, the difference f1(α)− f2(α) will give a polynomial equation in α withcoefficients, not all zero. This contradicts our assumption that α is transcendentalover F . This shows that the map ψ : F [α] → F [x], f (α) �→ f (x) is a bijectionand hence it is an isomorphism under usual operations of polynomials. This isomor-phism gives rise to an isomorphism F(α)→ F(x), f (α)/g(α) �→ f (x)/g(x). �

11.1.1 Exercises

Exercises-I

1. Let K be a field extension of the field F . Prove that [K : F ] = 1 iff K = F .[Hint. [K : F ] = 1⇒ K is a vector space over F of dimension 1 with {1}

as a basis. Now x ∈ K ⇒ x = a.1 for some a ∈ F ⇒ K ⊆ F . Then F ⊆ K

and K ⊆ F ⇒K = F . Conversely, if K = F , then {1} is a basis of the vectorspace K over F . Hence [K : F ] = 1.]

2. Let K be a field extension of the field F such that [K : F ] is finite. If f (x) is anirreducible polynomial in F [x] such that f (α)= 0 for some α ∈K , then provethat degf (x) divides [K : F ].

[Hint. Suppose degf (x) = n. Then [F(α) : F ] = n ⇒ [K : F ] = [K :F(α)][F(α) : F ] = [K : F(α)] · n.]

3. Find [Q(3√

5) :Q].[Hint. 3

√5 has the minimal polynomial x3 − 5 over Q. Hence [Q(

3√

5) :Q] = 3.]

4. Let K be a field extension of the field F and a, b ∈ K be algebraic over F .If a has degree m over F and b �= 0 has degree n over F , then show that theelements a + b, ab, a − b and ab−1 are algebraic over F and each has at mostdegree mn over F .

5. Let K be a field extension of F such that [K : F ] = p, where p is a primeinteger. Then show that K/F has no proper intermediate field.

[Hint. Suppose K/F has an intermediate field L. Then [K : F ] = [K : L][L :F ] ⇒ [L : F ] divides p⇒ either [L : F ] = 1 or [L : F ] = p⇒ either L = F

or L=K .]6. Let K be a field extension of F and L be the set of all elements of K which are

algebraic over F . Then show that L is an intermediate field of K/F .7. Let K be a field extension of F and L be an intermediate field of K/F . Show

that L is an algebraic extension iff both K/F and L/F are algebraic extensions.

Page 511: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.1 Field Extension 497

8. Let K be a field extension of the field F and R be a ring such that F ⊆R ⊆K .If every element of R is algebraic over F , then prove that R is a field.

[Hint. Let a be a non-zero element of R and f (x)= xn + · · · + a1x + a0 beits minimal polynomial over F . Then an + · · · + a1a + a0 = 0. If a0 = 0, wehave a contradiction, since the minimal polynomial of α over F has degree n.Again if a0 �= 0, then a−1 exists.]

9. Show that Q(√

5,−√5)=Q(√

5).[Hint. Q(

√5,−√5) is the smallest field containing

√5,−√5 and Q. Again√

5 ∈ Q(√

5) ⇒ −√5 ∈ Q(√

5). Moreover, Q ⊂ Q(√

5),Q(√

5,−√5) ⊆Q(√

5) and√

5 ∈ Q(√

5,−√5) ⇒ Q(√

5) is the smallest field containingQ,√

5 and −√5.]10. Show that x2 − 5 is irreducible over Q(

√2).

[Hint. Suppose x2 − 5 is not irreducible over Q(√

2). Then x2 − 5 =(x − a)(x − b) for some a, b ∈ Q(

√2). Hence a + b = 0 and ab = −5 ⇒√

5 ∈Q(√

2). This is a contradiction.]11. Let K be finite extension of the field F . If α,β ∈K are algebraic over F , then

show that α + β , αβ and α−1 (α �= 0) are also algebraic over F .[Hint. Clearly, F(α,β) is a finite extension of F shows that F(α,β) is an

algebraic extension of F .]12. (a) If α is transcendental over a field F , then show that

(i) the map μ : F [x]→ F [α], f (x) �→ f (α) is an isomorphism;(ii) F(α) is isomorphic to the field F(x) of rational functions over F in the

indeterminate x.

(b) Show that the field Q(π) is isomorphic to the field Q(x) of rational functionsover Q.

[Hint. See Theorem 11.1.12.]13. For the field extension R of Q, show that π is transcendental over Q(

√2).

14. Let K be a field extension of F and L be also a field extension of F . If α ∈K

and β ∈ L are both algebraic over F , then show that there is an isomorphismof fields: μ : F(α)→ F(β), which is the identity on the subfield F and whichmaps α �→ β iff the monic irreducible polynomials for α and β over F are thesame.

15. If f (x) is an irreducible polynomial of degree n over a field F , then showthat there is an extension K of F such that [K : F ] = n and f (x) has a rootin K .

16. Let K be a field extension of the field F and α,β be two algebraic elementsof K over F having degrees m and n respectively. If gcd(m,n)= 1, show that[F(α,β) : F ] =mn.

17. Show that every irreducible polynomial in R[x] has degree 1 or 2.[Hint. Let f (x) be an irreducible polynomial in R[x]. Then f (x) has a

root in C by s of Algebra. Since [C : R] = 2, the degree of α over R di-vides 2.]

Page 512: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

498 11 Algebraic Numbers

11.2 Finite Fields

Given a prime integer p and a positive integer n, we have shown in Chap. 6 theexistence of a finite field with pn elements.

Finite fields form an important class of fields. A field having finitely many ele-ments is called a finite field. If F is a finite field, the kernel of the homomorphismψ : Z→ F , n �→ n1F is a prime ideal. Then kerψ �= {0}, because F is finite but Zis infinite. Thus kerψ = 〈p〉, generated by a prime integer p and ψ(Z) is isomor-phic to the quotient field Z/〈p〉 = Zp . So F contains a subfield K isomorphic to theprime field Zp . Hence F can be considered as an extension of Zp .

In this section we study finite fields. Throughout the section p denotes a primeinteger.

Definition 11.2.1 A field having finitely many elements is called a finite field orGalois field.

Let K be a finite field. If charK = p, then by Example 11.1.1(iv), K may beconsidered as a finite dimensional vector space over Zp . Then the dimension of K

over Zp is finite and it is denoted by [K : Zp].

Theorem 11.2.1 Let K be a finite field of characteristic p and [K : Zp] = n. ThenK contains exactly pn elements.

Proof Let B = {x1, x2, . . . , xn} be a basis of K over Zp and x ∈K . Then x can beexpressed as x = a1x1 + a2x2 + · · · + anxn, where ai ∈ Zp . As Zp has p elements,K has at most pn elements. Since B is a basis of K , the elements a1x1 + a2x2 +· · · + anxn are all distinct for every distinct choice of elements a1, a2, . . . , an of Zp .Thus K has exactly pn elements. �

Theorem 11.2.2 Let K be a finite field of characteristic p. Then every element ofK is a root of the polynomial xpn − x over Zp .

Proof Let [K : Zp] = n. Then K is a finite field of pn elements. Hence the multi-plicative group K \ {0} is of order pn − 1. If y is a non-zero element of K , thenypn−1 = 1 and hence ypn = y. Moreover, 0pn = 0. Thus every element of K is aroot of the polynomial xpn − x over Zp . �

To describe finite fields, we need the concept of splitting fields.

Definition 11.2.2 Let F be a field. A polynomial f (x) in F [x] is said to split over afield K containing F iff f (x) can be factored as a product of linear factors in K[x].A field K containing F is said to be a splitting field for f (x) over F iff f (x) splitsover K and there is no proper intermediate field L of K/F (i.e., if L is a subfieldof K such that F ⊆ L⊆K , then either L= F or L=K).

Page 513: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.2 Finite Fields 499

Remark 1 Let F be a field and f (x) be a polynomial in F [x] of positive degree n.Then an extension K of F is a splitting field of f (x) such that

(i) f (x) factors into linear factors in K[x] as f (x)= a(x−α1)(x−α2) · · · (x−αn),with αi ∈K and a ∈ F ;

(ii) K is generated by F and the roots of f (x), i.e., K = F(α1, α2, . . . , αn).

The second condition shows that K is the smallest extension of F which containsall the roots of f (x).

Remark 2 If F is a field, then every polynomial f (x) in F [x] of positive degreehas a splitting field over F .

Remark 3 Let F be a field and f (x) ∈ F [x] is of positive degree. Then any twosplitting fields of f (x) are isomorphic and hence the splitting field of f (x) is uniqueup to isomorphism.

Example 11.2.1 (i) C is the splitting field of the polynomial x2+ 1 over R but R isnot splitting field of x2 + 1 over Q.

(ii) Let K be a finite field of characteristic p. Then K is the splitting field ofxpn − x over Zp . This is so because if S is the splitting field of xpn − x over Zp ,then S contains all the roots of the polynomial xpn − x over Zp . Hence S ⊆ K .Again by Theorem 11.2.2, K ⊆ S. Consequently K = S.

11.2.1 Exercises

Exercises-II

1. Show that any two finite fields with same number of elements are isomorphic.[Hint. Let K and S be two finite fields containing pn elements, where p is

prime and n is a positive integer. Then K and S are both the splitting fields ofthe same polynomial xpn − x over Zp and hence they are isomorphic.]

2. Corresponding to a given prime integer p, and a positive integer n, show thatthere exists a finite field consisting of pn = q roots of xq − x over Zp , which isdetermined uniquely up to an isomorphism and is denoted by Fpn . This field issometimes called the Galois field GF(pn).

3. Prove that Fpn is a subfield of Fpm iff n is a divisor of m.[Hint. Let H be a subfield of Fpm . Then H is a finite extension of Zp

and H = Fpn , where n = [H : Zp]. Thus m = [Fpm : Zp] = [Fpm : H ][H :Zp]. Conversely, if n is a divisor of m, then (pn − 1)|(pm − 1) and hence(xpn − x)|(xpm − x). Consequently, all the roots of xpn − x, over Zp , are con-tained among the roots of xpm − x over Zp .]

Page 514: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

500 11 Algebraic Numbers

4. Let F be a field and G be a finite multiplicative subgroup of F ∗ = F \ {0}. Thenshow that G is cyclic and G consists of all the nth roots of unity in F , where|G| = n. (A generator of G is called a primitive element for F .)

[Hint. Use the Structure Theorem for abelian groups or see Chap. 10.]5. Let F be a finite field. For the finite extension F(a, b) of F with a, b algebraic

over F , show that there exists an element c in F(a, b) such that F(a, b)= F(c),i.e., F(a, b) is a simple extension of F .

6. Let F be a field of pn elements, where p is prime and n is a positive integer.Then show that [F : Zp] = n.

[Hint. Suppose [F : Zp] = m. Then by Theorem 11.2.1, F has exactly pm

elements. Hence pm = pn⇒m= n.]7. Let F be a finite field of characteristic p. Then prove that

(a) if c is a primitive element for F , then cp is also;(b) if n= [F : Zp], then there exists an element c in F such that c is algebraic

over Zp , of degree n and F = Zp(c).

8. Every finite field F of characteristic p has an automorphism ψ : F → F,

x �→ xp . Find the order of ψ in the automorphism group of F . If F is not fi-nite, examine the validity of the above result.

[Hint. For the field F = Zp(x), the field of rational functions, the map ψ :F → F,x �→ xp is not an automorphism.]

9. Let F be a finite field and K a finite field extension of F . Then prove that thenumber of elements of K is some power of the number of elements of F .

[Hint. If charF = p > 0, then F has pm = q (say) elements. Again if[K : F ] = n, then K has qn elements.]

11.3 Algebraic Numbers

An algebraic number is a complex number which is algebraic over the field Q ofrational numbers. In this section we shall discuss the basic properties of algebraicnumbers. The theory of algebraic numbers was born and developed through theattempts to prove Fermat’s Last Theorem. In this section we study the properties ofalgebraic numbers, such as the set A of algebraic numbers is countable and formsa field, called the algebraic number field which is algebraically closed. We provethe fundamental theorem of algebra and show the existence of real transcendentalnumbers.

Definition 11.3.1 A complex number α which is algebraic over Q (i.e., α is a rootof some non-null polynomial over Q) is called an algebraic number. Otherwise, it issaid to be transcendental.

Example 11.3.1 (i) Every rational number q is an algebraic number. This is sobecause q satisfies the equation x − q = 0 over Q.

(ii) 1/√

5 is an algebraic number. This is so because it satisfies the equationx2 − 1/5= 0 over Q.

Page 515: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.3 Algebraic Numbers 501

(iii) e and π are transcendental numbers [see Hardy and Wright (2008, pp. 218–227)].

Theorem 11.3.1 An algebraic number α satisfies a unique monic irreducible poly-nomial equation f (x) = 0 over Q. Moreover, every polynomial equation g(x) = 0over Q satisfied by α is divisible by f (x) in Q[x].

Proof Let S be the set of all polynomial equations over Q satisfied by the givenalgebraic number α and h(x)= 0 be one of the lowest degree polynomial equationsin S. If the leading coefficient of h(x) is q , define f (x) by f (x)= q−1h(x). Hencef (α) = 0 and f (x) is monic. We claim that f (x) is irreducible in Q[x]. Supposef (x) = f1(x)f2(x) in Q[x]. Then at least one of f1(α) = 0 and f2(α) = 0 holds.This implies a contradiction, because f (x)= 0 is a polynomial equation of lowestdegree in S having α as a root. Again, since Q is a field, Q[x] is Euclidean domain.Hence for the polynomials f (x) and g(x), there exist polynomials q(x) and r(x)

in Q[x] such that g(x)= f (x)q(x)+ r(x), where r(x)= 0 or deg r(x) < degf (x).Then r(x) must be identically zero, otherwise, the degree of r(x) would be lessthan the degree of f (x) and α would be a root of the polynomial equation r(x)= 0.Consequently, f (x) divides g(x) in Q[x]. To prove the uniqueness of f (x), supposem(x) is an irreducible monic polynomial over Q such that m(α) = 0. Then f (x)

divides m(x). Hence there exists some polynomial n(x) in Q[x] such that m(x)=f (x)n(x). Since m(x) is irreducible in Q[x], n(x) must be constant in Q[x]. Again,since f (x) and m(x) are both monic polynomials, it follows that n(x) = 1. Thisproves the uniqueness of f (x). �

This theorem leads to the following definition.

Definition 11.3.2 Let α be an algebraic number. Then the irreducible monic poly-nomial f (x) over Q having α as a root is called the minimal polynomial of α andthe degree of f (x) is called the degree of α.

Example 11.3.2√

3 is an algebraic number and f (x) = x2 − 3 is the minimalpolynomial of

√3 over Q. The field extension Q(

√3) of Q is of degree 2 with a

basis B = {1,√

3}.

Theorem 11.3.2 Let F be a finite field extension of Q of degree n. Then everyelement α of F is an algebraic number and is a root of an irreducible polynomialover Q, of degree ≤n.

Proof Clearly, the set S = {1, α,α2, . . . , αn−1, αn}, consisting of n+ 1 elements ofthe n-dimensional vector space F over Q, is linearly dependent over Q. This impliesthat α is algebraic over Q and hence α is an algebraic number. �

Corollary Every element of a simple algebraic extension Q(α) is an algebraicnumber.

Page 516: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

502 11 Algebraic Numbers

Definition 11.3.3 A field F is said to be algebraically closed (or complete) iff everypolynomial in F [x], with degree ≥1, has a root in F .

Two important algebraically closed fields, such as the field C of complex num-bers and the field of algebraic numbers are discussed here.

First we show that C is algebraically closed by the Fundamental Theorem of Al-gebra. There are several proofs of the Fundamental Theorem of Algebra. We presentone of them by using the concept of homotopy as discussed in Sect. 2.10 of Chap. 2.

Theorem 11.3.3 (Fundamental Theorem of Algebra) Every non-constant polyno-mial with complex coefficients has a complex root.

Proof To prove the theorem it is sufficient to prove that a non-constant polynomial

f (z)= zn + an−1zn−1 + · · · + a1z+ a0, ai ∈C (11.1)

has a root in C. If a0 = 0, then 0 is a root of f (z). So we assume that a0 �= 0.We may consider f as a continuous function f : C→ C, defined by (11.1). Sup-pose f (z) has no root in C. Then f (z) is never zero. Consider the unit circleS1 = {z ∈ C : |z| = 1} in the complex plane. Define a continuous family of mapsft : S1 → S1, z �→ f (z)/|f (tz)| for non-negative real numbers t . Then any twomaps of this family are homotopic. For t = 0, f0 is a constant map. On the otherhand, for sufficiently large t, ft is homotopic to g. where g(z) = zn, because zn isdominant in the expression of f (z) for sufficiently large t . Hence f0 cannot be ho-motopic to g, because their degrees are different. This contradiction concludes thatf (z) has a root in C. �

Corollary 1 The field C of complex numbers is algebraically closed.

Remark This corollary proves the algebraic completeness of the field of complexnumbers.

Corollary 2 The field R of real numbers is embedded in the algebraically closedfield C of complex numbers.

We now show that the set of algebraic numbers forms an algebraically closedfield.

Theorem 11.3.4 (a) The set A of algebraic numbers is a field, called the algebraicnumber field.

(b) The field A is algebraically closed.

Proof (a) It is sufficient to show that the sum, product, difference and quotient ofany two elements α and β �= 0 in A are also in A. Clearly, α + β , α − β , αβ andαβ−1 are in the subfield Q(α,β) of C, which is generated by Q and two elements

Page 517: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.3 Algebraic Numbers 503

α and β of A. Again α is algebraic over Q ⇒ Q(α) is a finite extension of Qand similarly β is algebraic over Q(α)⇒ Q(α,β) is a finite extension over Q(α).Hence Q(α,β) is a finite extension of Q⇒ each element of Q(α,β) is an algebraicnumber. This shows that A is a field.

(b) Let f (x)= xn+ an−1xn−1+ · · · + a0 be a polynomial in A[x]. Then the co-

efficients a0, a1, . . . , an−1 generate an extension F =Q(a0, a1, . . . , an−1). Clearly,F is a finite extension of the field Q. Any complex root α of f (x) is algebraic overthe field F and hence F(α) is a finite extension of F . Consequently, F(α) is also afinite extension of Q. Thus the element α of this extension is an algebraic number,in the field A. This leads us to conclude that the field A is algebraically closed. �

Corollary The field Q of rational numbers is embedded in the field A of alge-braically closed field A.

We now show the existence of transcendental numbers. It does not follow im-mediately that there are transcendental numbers, though almost all real numbers aretranscendental. So we need an alternative definition of an algebraic number.

An algebraic number is a complex number α which satisfies an algebraic equa-tion of the form a0x

n+a1xn−1+· · ·+an = 0, where a0, a1, . . . , an are all integers,

not all zero. A number which is not an algebraic number is called a transcendentalnumber.

Theorem 11.3.5 The set of all algebraic numbers is countable.

Proof To prove this theorem we define the rank r of an equation a0xn + an−1

1 +· · · + an = 0, ai ∈ Z and a0 �= 0 as r = n+ |a0| + |a1| + · · · + |an|. The minimumvalue of rank r is 2. As there exist only a finite number of such equations of rank r ,we may write them as:

Ar,1,Ar,2, . . . ,Ar,mr .

Arranging the equations in the sequence:

A2,1,A2,2, . . . ,A2,r2,A3,1,A3,2, . . . ,A3,r3 ,A4,1, . . . ,

we can assign to them the integers 1,2,3, . . . . This shows that the aggregate of theseequations is countable. Clearly, every algebraic number corresponds to at least oneof these equations, and the number of algebraic numbers corresponding to at leastone of these equations is finite. Hence the theorem follows. �

Corollary The set of all real algebraic numbers is countable and has measure zero.

Existence of Transcendental Numbers The set of all real numbers is not count-able. On the other hand, the set of all real algebraic numbers is countable. Hencethere exist real numbers which are not algebraic. This shows the existence of realtranscendental numbers. This leads us to conclude the following.

Theorem 11.3.6 Almost all real numbers are transcendental.

Page 518: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

504 11 Algebraic Numbers

11.4 Exercises

Exercises-III

1. Show that the degree of an algebraic number α is equal to the dimension n =[Q(α) :Q], with a basis B = {1, α, . . . , αn−1}. (Here Q(α) is regarded as a vectorspace over Q.)

2. If two algebraic numbers α and β generate the same extension fields Q(α) andQ(β), i.e., Q(α)=Q(β), then show that α and β have the same degree.

3. Let F be a field. Show that the following statements are equivalent:

(a) F is algebraically closed;(b) every irreducible polynomial in F [x] is of degree 1;(c) if a polynomial f (x) ∈ F [x] is of degree ≥1, then f (x) can be expressed as

a product of linear factors in F [x];(d) if K is an algebraic field extension of F , then F =K .

4. Let F be a finite field. Then show that F cannot be algebraically closed.

We now introduce the concept of algebraic integers.

11.5 Algebraic Integers

The concept of algebraic integers is one of the most important discoveries in numbertheory. The ring of algebraic integers shares some properties of the ring of integersbut it differs as regards many other properties.

Definition 11.5.1 A complex number α is called an algebraic integer iff α is a rootof a monic irreducible polynomial f (x) in Q[x] with integral coefficients of theform

f (x)= xn + an−1xn−1 + · · · + a0.

Remark 1 An algebraic number α is an algebraic integer iff α satisfies some monicpolynomial equation f (x)= 0 with integral coefficients.

Remark 2 While defining algebraic integers, some authors do not insert the condi-tion of irreducibility of f (x) in Q[x], because of Theorem 11.5.2. The irreducibleequation satisfied by a rational number p/q is just the linear equation x −p/q = 0.Thus a rational number is an algebraic integer iff it is an integer in the ordinarysense. Such an integer in Z is called a rational integer to distinguish it from otheralgebraic integers.

Theorem 11.5.1 Every algebraic number is of the form α/β , where α is an alge-braic integer and β is a non-zero integer in Z.

Page 519: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.5 Algebraic Integers 505

Proof Let γ be an algebraic number. Then γ is a root of a monic irreducible poly-nomial f (x) = xn + an−1x

n−1 + · · · + a1x + a0 ∈ Q[x]. If β is the lcm of thedenominators of a0, a1, . . . , an−1, then β is a positive integer and each βai is aninteger, for i = 1,2, . . . , n− 1. Then βγ is a root of a monic polynomial in Z[x].Hence βγ is an algebraic integer, α (say). Thus γ = α/β , where α is an algebraicinteger and β is a non-zero integer. �

Definition 11.5.2 An algebraic element α �= 0 is called a unit iff both α and α−1

are algebraic integers.

Example 11.5.1 (i)√

3 is an algebraic integer, because it satisfies the equationx2 − 3= 0 over Z.

(ii) (1+√13)/2 is an algebraic integer, because it satisfies the equation x2−x−3= 0 over Z.

(iii) ω = 12 (−1+√3i) is an algebraic integer, because it satisfies the equation

x2+x+1= 0 over Z. In general, every root of unity is an algebraic integer, becauseit satisfies the monic polynomial equation xn − 1 = 0 over Z for some positiveinteger n.

(iv) 0,±1,±2, . . . are the only algebraic integers in Q (referred to as “rationalintegers”).

[Hint. Every integer n is an algebraic integer, because n is a root of (x − n) ∈Z[x]. On the other hand, suppose a rational number m/q with gcd(m,q)= 1 is analgebraic integer. Then there exists a polynomial f (x)= xn+an−1x

n−1+· · ·+a0 ∈Q[x] such that f (m/q) = 0 Consequently, mn + an−1qmn−1 + · · · + a0q

n = 0⇒q|mn⇒ q =±1, since gcd(m,q)= 1⇒m/q is an integer.]

(v) 1/√

2 is an algebraic number but it is not an algebraic integer.[Hint. As 1/

√2 satisfies the equation x2 − 1/2 over Q. So it is an alge-

braic number. If possible, let 1/√

2 be an algebraic integer. Then it satisfies amonic polynomial f (x) over Z such that f (1/

√2)= (1/

√2)n+an−1(1/

√2)n−1+

an−2(1/√

2)n−2 + · · · + a0 = 0. Then (1 + 2an−2 + 4an−4 + · · · ) +√

2(an−1 +2an−3 + · · · ) = 0. If a = 1+ 2an−2 + 4an−4 + · · · , and b = an−1 + 2an−3 + · · · ,then a + b

√2= 0. Again if b �= 0, then

√2=−a/b is the quotient of two integers.

This gives a contradiction. Hence b = 0 and thus a + b√

2 = 0 gives a = 0. Thisalso gives a contradiction, since a is odd.]

Remark In examining whether a given algebraic number is an algebraic integer, itis not necessary to appeal to an irreducible polynomial equation. This follows fromTheorem 11.5.2.

Theorem 11.5.2 A complex number α is an algebraic integer iff it satisfies over Qa monic polynomial equation with integral coefficients.

Proof If α is an algebraic integer, then clearly α satisfies a monic polynomial p(x)

over Q with integral coefficients. Conversely, let a complex number α satisfy amonic polynomial equation over Q with integral coefficients. Then α also satisfies

Page 520: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

506 11 Algebraic Numbers

an irreducible polynomial, say f (x) over Q with integral coefficients. Note that anycommon divisor of these integral coefficients may be removed. So without loss ofgenerality, we may assume that the gcd of these integral coefficient is 1, resultingf (x) to be a primitive polynomial in Z[x]. The given polynomial p(x) is monicand hence also primitive in Z[x]. Now, the polynomial p(x) is divisible in Q[x] bythe irreducible polynomial f (x). Let p(x)= f (x)g(x), where g(x) ∈Q[x]. Sinceboth p(x) and f (x) are primitive polynomials in Z[x], it follows that g(x) ∈ Z[x].Thus the leading coefficient 1 in p(x) is the product of the leading coefficients inf (x) and g(x). Hence, ±f (x) is monic, resulting that α is an algebraic integer bydefinition. �

11.6 Gaussian Integers

We recall that Z[i] = {a + bi : a, b ∈ Z} forms a ring, called Gaussian ring, namedafter C.F. Gauss. The elements of Z[i], called Gaussian integers are the points ofa square lattice in the complex plane. In this section we define Gaussian integersand Gaussian prime integers. Moreover, we study their properties with an eye to thecorresponding properties of integers.

Definition 11.6.1 A complex number of the form a+ bi, a, b ∈ Z (i.e., an elementof Z[i]), is called a Gaussian integer.

The set of all Gaussian integers is a subring of C. C.F. Gauss developed theproperties of Gaussian integers in his work on biquadratic reciprocity. Z[i] is anEuclidean domain with norm function defined by N(α) = αα = m2 + n2, for α =m+ ni ∈ Z[i]. Clearly, N(α) has the following properties in Z[i]:(a) N(αβ)=N(α)N(β) for all α,β ∈ Z[i] \ {0};(b) N(α)= 1 iff α is a unit;(c) 1, −1, i and −i are the only units in Z[i];(d) N(α)=

{1 if α is a unit>1 if α /∈ {0,1,−1, i,−i}.

Definition 11.6.2 A prime element in the Gaussian ring Z[i] is called a Gaussianprime integer.

Remark Every Gaussian prime is non-zero and non-unit.

Example 11.6.1 (i) 3 is a Gaussian prime integer.(ii) 5 is not a Gaussian prime integer.[Hint. As there are four units in Z[i], there are four factorizations of the integer 5

in Z[i], which are considered equivalent: 5= (2+ i)(2− i). This is the prime fac-torization of 5 in Z[i]. Every non-zero element α ∈ Z[i] has four associates, viz.,±α,±iα. For example, the associates of 2+ i are 2+ i, −2− i, −1+ 2i, 1− 2i.]

Page 521: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.6 Gaussian Integers 507

Example 11.6.2 3 + 2i is an algebraic integer, because it is a root of x2 − 6x +13= 0.

Proposition 11.6.1 For an element α in Z[i], if N(α)= p, a prime integer, then α

is prime in Z[i].

Proof Clearly, α is a non-zero non-unit, since p �= 0, p �= 1 and 1, −1, i and −i arethe only units in Z[i]. If possible, let α = βγ for some β,γ ∈ Z[i]. Then N(α)=N(β)N(γ )⇒ p = N(β)N(γ )⇒ either N(β) = 1 or N(γ ) = 1, since p is primeand N(β),N(γ ) are both positive integers. Hence either γ or β is a unit in Z[i].This shows that α is irreducible in Z[i]. As Z[i] is an Euclidean domain, Z[i] isalso a principal ideal domain. Hence α is a prime element in Z[i]. �

Remark N(3)= 9⇒ norm of a Gaussian prime integer may not be a prime integer.

Example 11.6.3 The Gaussian integer 1+ i is Gaussian prime, since N(1+ i)= 2is a prime integer.

Remark All prime integers are not Gaussian primes. Let p be a prime integer. Thenp is a Gaussian prime iff the ring Z[i]/〈p〉 is a field.

We now describe all Gaussian primes.

Theorem 11.6.1 The Gaussian primes are precisely of the following types:

(a) all prime integers of the form 4n+ 3 and their associates in Z[i];(b) the number 1+ i and its associates in Z[i];(c) all Gaussian integers α associated with either a + bi or a − bi, where a > 0,

b > 0, one of a or b is even and N(α)= a2 + b2 is a prime integer of the form4m+ 1.

Proof Let α = a + bi be a prime element in Z[i]. Then N(α) = a2 + b2 is aninteger >1. Suppose N(α) = αα = p

α11 p

α22 · · ·pαm

m , where p1,p2, . . . , pm are dis-tinct prime integers. Then α|pα1

1 pα22 · · ·pαm

m in Z[i]. We claim that α divides onlyone of the integers p1,p2, . . . , pm. If possible, let α divide two distinct primesp and q in the above expression. Now gcd(p, q) = 1 ⇒ 1 = px + qy for somex, y ∈ Z⇒ α|1⇒ a contradiction, since α is a prime element in Z[i]. This showsthat α divides only one prime p (say) in Z[i]. On dividing p by 4, we have eitherp ≡ 1 (mod 4) or p ≡ 2 (mod 4) or p ≡ 3 (mod 4).

(a) Suppose p ≡ 3 (mod 4). Now α|p in Z[i] ⇒ N(α)|N(p) = p2 ⇒ N(α) = p

or p2, since N(α) > 1. If N(α) = p, then a2 + b2 = p. Since p is an oddprime, either a is even and b is odd or a is odd and b is even which implyp ≡ 1 (mod 4) ⇒ a contradiction. Thus, N(α) = p2. Again α|p in Z[i] ⇒αβ = p for some β ∈ Z[i] ⇒N(α)N(β)=N(p)⇒ p2N(β)= p2 ⇒N(β)=1⇒ β is a unit in Z[i] ⇒ α and p are associates in Z[i]. Thus p is also a primeelement in Z[i], as required in (a).

Page 522: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

508 11 Algebraic Numbers

(b) Suppose p ≡ 2 (mod 4). Then p = 2= (1+i)(1−i). Now N(1+i)= 2⇒ 1+i

is prime in Z[i]. Again 1 − i = −i(1 + i) shows that 1 − i is an associate of(1 + i). Thus 1 + i and its associates are prime elements in Z[i], as requiredin (b).

(c) Suppose p ≡ 1 (mod 4). Now α|p⇒N(α)|N(p)⇒N(α)= p or p2 . SupposeN(α)= p2. As p ≡ 1 (mod 4), suppose p = 4k + 1, k ∈ Z. Then the quadratic

reciprocity of−1 modulo p, i.e.,(−1

p

)= (−1)p−1

2 (modp)= (−1)2k = 1. Hence

there exists an integer n such that n2 ≡ −1 (modp) ⇒ p|(n2 + 1) in Z ⇒p|(n2 + 1) in Z[i] ⇒ p|(n+ i)(n− i) in Z[i]. But α|p⇒ α|(n+ i)(n− i)⇒α|(n− i) or α|(n− i), since α is a Gaussian prime. We claim that p is not an as-sociate of α. Suppose p is an associate of α. Then p|α in Z[i] ⇒ p|(n + i)

or p|(n − i) in Z[i] ⇒ either np+ 1

pi or n

p− 1

pi is a Gaussian integer ⇒

a contradiction, since 1/p is not an integer ⇒ p is not an associate of α.Suppose N(α) = N(p) = p2. Then α|p⇒ p = αβ for some β ∈ Z[i]. HenceN(p) = N(α)N(β)⇒ N(β) = 1⇒ β is a unit in Z[i] ⇒ p is an associate ofα⇒ a contradiction ⇒ N(α) �= p2 ⇒ N(α) = p (which is the other possibil-ity) ⇒ N(α) = p⇒ a − bi is also a Gaussian prime integer. Suppose a − bi

is an associate of a + bi. Then a − bi = u(a + bi), where u ∈ {1,−1, i,−i}.If u= 1, then b = 0. Hence a2 =N(α)= p is not possible. Thus u �= 1. Simi-larly, u �= −1, i,−i. Consequently, a + bi is not an associate of a − bi. AgainN(α)= p⇒ a2 + b2 = p⇒ one of a and b must be even and the other mustbe odd. This proves (c). �

Like division algorithm for ordinary integers and for polynomials, a division al-gorithm can be developed for Gaussian integers.

Theorem 11.6.2 For given Gaussian integers α and β �= 0, there exist Gaussianintegers γ and λ in Z[i] such that

α = βγ + λ, where either λ= 0 or N(λ) < N(β). (11.2)

Proof Suppose α/β = r+ t i and choose integers r ′ and t ′ as close as possible to therational numbers r and t , respectively. Then α/β = (r ′+ t ′i)+[(r−r ′)+(t− t ′)i] =γ +μ (say), where |r − r ′| ≤ 1/2, |t − t ′| ≤ 1/2. Now α = βγ + βμ. As α, β andγ ∈ Z[i], βμ= α − βγ ∈ Z[i]. If r = r ′ and t = t ′, then μ= 0. If not, then μ �= 0.Let β = a+bi ∈ Z[i]. Then N(βμ)= (a2+b2)[(r− r ′)2+ (t− t ′)2]< (a2+b2)=N(β). Thus the proposition follows by assuming λ= βμ. �

Proposition 11.6.2 Two Gaussian integers α and β , not both zero, have a greatestcommon divisor δ in Z[i], which is a Gaussian integer given by δ = λα+μβ , whereλ and μ are Gaussian integers.

Proof Let J = 〈α,β〉 be the ideal generated by α and β in the ring Z[i]. Suppose δ

is one of the non-zero elements of J such that N(δ) is of minimum non-zero normand α = δγ +ψ and β = δγ1 +ψ1 as in Theorem 11.6.2. We claim that ψ and ψ1

Page 523: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.7 Algebraic Number Fields 509

are both zero. If not, then the remainders ψ and ψ1 are in J with N(ψ) < N(δ)

and N(ψ1) < N(δ), which implies a contradiction. Hence ψ = 0 = ψ1 shows thatα = δγ and β = δγ1. Consequently, δ is a common divisor of α and β . Again, sinceδ ∈ J , it has the form δ = λα + μβ , λ,μ ∈ Z[i]. Thus δ is a multiple of everycommon divisor of α and β . This proves that δ is the greatest common divisor of α

and β . �

The rest of the method of decomposition of Gaussian integers can be proved bythe method of rational integers.

Proposition 11.6.3 (a) If λ is a non-zero non unit Gaussian integer, then thereexists a Gaussian prime p such that p divides λ in Z[i].

(b) If λ is Gaussian prime and α, β are Gaussian integers such that λ|αβ , thenλ|α or λ|β in Z[i].

Proof Left as an exercise. �

Theorem 11.6.3 Every non-zero, non unit Gaussian integer α can be expresseduniquely as a product α = λ1λ2 . . . λn of prime Gaussian integers, such that anyother decomposition of α in Z[i] into prime Gaussian integers has the same numberof factors and can be arranged in such a way that the corresponding placed factorsare associates.

Proof Left as an exercise. �

Theorem 11.6.4 A complex number α in the field Q(i) is a Gaussian integer iffthe monic irreducible polynomial equation satisfied by α over Q has integral coeffi-cients.

Proof Let α = a + bi be a Gaussian integer which is not a rational integer. Thenb �= 0 and α satisfies a monic irreducible quadratic equation: x2 − 2ax + (a2 +b2)= 0 over Q with rational integers as coefficients. Conversely, let a number α =p + qi ∈ Q(i) satisfy a monic irreducible polynomial f (x) in Q[x] with integralcoefficients. Then it follows that α is a Gaussian integer. �

11.7 Algebraic Number Fields

An algebraic number field is a field which is obtained from the field Q by adjoin-ing a finite number of algebraic numbers. In this section we shall give some basicproperties of algebraic number fields.

Definition 11.7.1 An algebraic number field K is a subfield of C of the form K =Q(α1, α2, . . . , αn), where α1, α2, . . . , αn are algebraic numbers.

Page 524: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

510 11 Algebraic Numbers

Example 11.7.1 (i) Q(√

2,√

7,√

11,√

13) is an algebraic number field.(ii) Q(

17√

5, 1√5) is an algebraic number field.

(iii) Q(π2) is not an algebraic number field.

Proposition 11.7.1 The roots of unity which lie in any given algebraic number fieldform a cyclic group.

Proof Left as an exercise. �

Remark For more results see Exercises-IV.

11.8 Quadratic Fields

Explicit computation with algebraic integers is difficult. Instead of developing a gen-eral theory, we study algebraic integers in a quadratic field. More precisely, in thissection we describe algebraic integers in a field Q(α), where the complex number α

is root of an irreducible quadratic polynomial in Q[x].

Definition 11.8.1 A subfield F of C is called a quadratic field iff there exists acomplex number α such that F =Q(α), where α is a root of an irreducible quadraticpolynomial in Q[x].

Remark Q(α)= {a + bα : a, b ∈Q} and [Q(α) :Q] = 2.

Example 11.8.1 Q(√

7) is a quadratic field. This is so because x2− 7 is irreduciblein Q[x].

Theorem 11.8.1 Let F be a quadratic field. Then there exists a unique square freeinteger n such that F =Q(

√n).

Proof Let F =Q(α), where α is a root of the irreducible polynomial x2 + bx + c

over Q. If α1 and α2 are the two values of α, then α1 = −b+√

b2−4c2 and α2 =

−b−√

b2−4c2 . Hence α1+α2 =−b ∈Q⇒Q(α1)=Q(α2)⇒ F =Q(α)=Q(α1)=

Q(−b+√

b2−4c2 ) = Q(

√a), where a = b2 − 4c ∈ Q. But this a is not the square of

a rational number, since x2 + bx + c is irreducible in Q[x] by hypothesis. Supposea = p/q , where p,q are integers, q > 0 and gcd(p, q) = 1. Let l2 be the largestsquare dividing pq . Then pq = l2n, where n (�=1) is a square free integer andF =Q(

√a)=Q(

√p/q)=Q(

√pq)=Q(l

√n)=Q(

√n). To show the uniqueness

of n, let m be another square free integer such that F = Q(√

m). Then Q(√

n) =Q(√

m) ⇒ √n = x + y

√m for some x, y ∈ Q ⇒ n = x2 + my2 + 2xy

√m. If

xy �= 0, then√

m = (n− x2 −my2)/2xy. This is a contradiction, since√

m /∈ Q,

Page 525: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.9 Exercises 511

as m is square free. Hence xy = 0. Again if y = 0, then x = √n. This is again acontradiction, since

√n /∈Q as n is square free. Consequently, x = 0 and n=my2.

Again n is square free and hence y2 = 1. Consequently, m= n. �

We now describe the form of the algebraic integers α in the quadratic fieldF =Q(

√n), where n is a square free integer.

Let α = l+m√

nd

, where l,m,n are integers such that d > 0 and gcd(l,m,d)= 1.If m = 0, then α = l/d ⇒ α is a quadratic integer iff d = 1. Next suppose

m �= 0. Now α is a root of a polynomial x2 + bx + c ∈ Z[x] ⇒ (l+m

√n

d)2 +

b(l+m

√n

d) + c = 0 ⇒ l2 + m2n + bld + cd2 = 0 and 2l + bd = 0, since m �=

0. Let gcd(l, d) = t > 1. Then there exists a prime factor p of t and hencep|l and p|d ⇒ p2|m2n ⇒ p2|m2, since n is square free ⇒ p|m. This is acontradiction, since gcd(l,m,d) = 1 and hence t = 1. Thus gcd(l, d) = 1 ⇒d|2, since 2l + bd = 0 ⇒ d = 1 or d = 2. If d = 1, then α = l + m

√n is

a quadratic integer. If d = 2, then α = l+m√

n2 ⇒ (α − (l/2))2 = m2

4 n ⇒ α

is a root of the quadratic equation x2 − lx + l2−m2n4 = 0 over Z ⇒ l2 ≡

m2n (mod 4), since the above coefficients are all integers. Again gcd(l, d) =1 ⇒ gcd(l,2) = 1 ⇒ l is odd ⇒ 1 ≡ m2n (mod 4), since l2 = m2n (mod 4).We now consider the possible cases: n ≡ 1 (mod 4) or n ≡ 2 (mod 4) or n ≡3 (mod 4).

Case 1 If n≡ 1 (mod 4), then 1≡m2 (mod 4). This is true iff m is odd.Case 2 If n≡ 2 (mod 4), then 1≡ 2m2 (mod 4). But there is no integer m such that

1≡ 2m2 (mod 4).Case 3 If n≡ 3 (mod 4), then 1≡ 3m2 (mod 4). But there is no integer m such that

1≡ 3m2 (mod 4).

From the above discussion there follows Theorem 11.8.2.

Theorem 11.8.2 Let A be the set of all algebraic integers in the quadratic fieldF =Q(

√n)= {a + b

√n : a, b ∈Q}, where n is a square free integer. Then the set

A is given by

A={

l +m√

n, where l,m are integers and n �≡ 1 (mod 4)

l+m√

n2 , where l,m are odd integers and n≡ 1 (mod 4).

11.9 Exercises

Exercises-IV

1. Show that a simple transcendental extension of a field F is isomorphic to thefield of rational functions over F and is of infinite degree over F ; moreover,any two simple transcendental extensions of F are isomorphic.

Page 526: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

512 11 Algebraic Numbers

2. Let F(α) be a simple algebraic extension of a field F . Prove that

(a) F(α)∼= F [x]/〈f (x)〉, where f (x) is the minimal polynomial of α over F ;(b) If n is the degree of f (x), then S = {1, α,α2, . . . , αn−1} forms a basis of

F(α) over F ;(c) If β is an algebraic element of F(α), then the degree of β over F is a divisor

of degree of α.

3. (a) Let F be a subfield of C. If α ∈ C and β ∈ C are algebraic over F , showthat there exists an element γ ∈C such that F(α,β)= F(γ ).

(b) Let F be a subfield of C. If α1, α2, . . . , αn ∈C are algebraic over F , showthat there exists an element γ ∈C such that F(α1, α2, . . . , αn)= F(γ ).

(c) If F is an algebraic number field, prove that there exists an algebraic inte-ger γ such that F =Q(γ ).

[Hint. Use 3(b).](d) Let F =Q(γ ) be an algebraic number field, where γ is an algebraic integer.

If the degree of the minimal polynomial of γ over Q is n, then prove thatevery element of F can be expressed uniquely in the form a0+ a1γ +· · ·+an−1γ

n−1, where ai are rational numbers.[Hint. F is vector space over Q of dimension n.]

(e) Let F be an algebraic number field and K be the set of all algebraic integers.Then show that the set H = K ∩ F is an integral domain (called the ringof integers of the algebraic number field K) and the quotient field of H

is F .(f) Let F be a field of characteristic 0.

(i) If α,β are algebraic over F , show that there exists an element γ ∈F(α,β) such that F(α,β)= F(γ ).

(ii) Prove that any finite field extension of the field F is a simple exten-sion.

[Hint. Use induction argument to case (a).]

4. Let F be field and K be a field extension of F of prime dimension p. If α is anelement of K but not in F , show that α has degree p and K = F(α).

[Hint. [K : F ] = p⇒ [K : F(α)][F(α) : F ] = p⇒ [K : F(α)] = 1, since[F(α) : F ] �= 1, as α /∈ F . Hence [F(α) : F ] = p and K = F(α).]

5. Let F be a subfield of the field C. If an element α of C is algebraic over F , thenprove that

(a) every element β of F(α) is algebraic over F ;(b) degree of β over F ≤ degree of α over F .

6. Let F ⊂ L ⊂ K be a tower of fields such that K is algebraic over L and L isalgebraic over F . Prove that K is algebraic over F .

7. Let F be field. Prove that F is algebraically closed iff every irreducible poly-nomial in F [x] is of degree 1.

8. (a) Let F be field. Show that there exists an algebraic field extension K of F

such that K is algebraically closed (called an algebraic closure of F ).

Page 527: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.9 Exercises 513

(b) If K and L are two algebraic closures of F , then show that there is anisomorphism ψ :K → L such that ψ(a)= a, ∀a ∈ F .

Remark Given a field F , its algebraic closure is unique up to isomorphisms.

9. (a) Prove that a number α is an algebraic integer iff the additive group gen-erated by all the powers 1, α,α2, α3, . . . of α can be generated by a finitenumber of elements.

(b) If all the positive powers of an algebraic number α lie in an additive groupgenerated by a finite set of numbers α1, α2, . . . , αn, then show that α is analgebraic integer.

(c) Prove that the set of all algebraic integers is an integral domain.(d) In any field of algebraic numbers, prove that the set of algebraic integers is

also an integral domain.10. Show that the minimal polynomial of an algebraic integer is monic with integral

coefficients.11. (a) Let K be finite extension over F such that [K : F ] = n. Prove that every

element α of K has a degree m over F such that m is a divisor of n.(b) Let f (x) be an irreducible cubic polynomial over a field F . If K is an

extension of F of degree 2n, then show that f (x) is irreducible in K[x].(c) Using (b) as the algebraic basis show that by straight edge and compass

alone, it is impossible to

(i) duplicate a general cube (duplication of a cube);(ii) trisect a general angle (trisection of an angle).

If a real number can be constructed by straight edge and compassalone, then the number is said to be constructible.

[Hint. (a) The element α generates a simple extension F(α) of F . Hence[K : F(α)][F(α) : F ] = n.

(b) If f (x) is a reducible polynomial over K of degree 2n, then the cubicpolynomial f (x) must have at least one linear factor in K[x]. This shows thatK contains a root α of f (x). But such an element α of degree 3 over F cannotlie in a field K of degree 2n over F by (a).

(c) (i) If it possible to construct another cube of double the volume of a unitcube, then the side x of the new cube must satisfy the equation x3 − 2= 0. Butby the Eisenstein criterion, the polynomial x3 − 2 is irreducible in Q[x]. Overany field F corresponding to the straight edge and compass construction, thepolynomial x3 − 2 is also irreducible by (b).

(ii) A 60◦ angle is constructible, because cos 60◦ is half. But if an angleof 60◦ is trisected by straight edge and compass, then cos 60◦ = 4 cos3 20◦ −3 cos 20◦ shows that x = cos 20◦ must satisfy the cubic equation 8x3−6x−1=0 in Q[x]. But 8x3 − 6x − 1 is irreducible in Q[x].]

12. An extension K of a field F is a root field of a polynomial f (x) of degree ≥1,with coefficients in F iff

(i) f (x) can be factored into linear factors f (x) = a(x − α1) · · · (x − αn) inK[x]; and

Page 528: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

514 11 Algebraic Numbers

(ii) K = F(α1, α2, . . . , αn).Prove that

(a) any polynomial over any field has a root field (existence).(b) all root fields of a given polynomial over a given field F are isomorphic

(uniqueness).(c) for any prime integer p and any positive integer n, there exists a finite

field with q = pn elements, which is the root field of xq − x over Zp .

Exercises-V Identify the correct alternative(s) (there may be more than one) fromthe following list:

1. Let R be the quotient ring Z[i]/nZ[i]. Then R is an integral domain if n is

(a) 19 (b) 7 (c) 13 (d) 1.

2. The field extension Q(√

2+ 3√

2) over the field Q(√

2) has degree

(a) 1 (b) 3 (c) 2 (d) 6.

3. If the polynomial x4+x+6 has a root of multiplicity greater than 1 over a fieldof characteristic p (prime), then p is

(a) p = 5 (b) p = 3 (c) p = 2 (d) p = 7.

4. Let F be a field of eight elements and B be a subset of F such that B = {x ∈F : x7 = 1 and xn �= 1 for all positive integers n less than 7}. Then the numberof elements in B is

(a) 3 (b) 2 (c) 1 (d) 6.

5. Let f (x)= 2x2 + x + 2 and g(x)= x3 + 2x2 + 1 be two polynomials over thefield Z3. Then

(a) f (x) and g(x) are both irreducible;(b) neither f (x) nor g(x) is irreducible;(c) f (x) is irreducible, but g(x) is not;(d) g(x) is irreducible, but f (x) is not.

6. Let F be a field and the polynomial f (x) = x3 − 312312x + 123123 be irre-ducible in F [x]. Then

(a) F is a finite field with 7 elements;(b) F is a finite field with 13 elements;(c) F is a finite field with 3 elements;(d) F =Q of rational numbers.

7. Let ω be an imaginary cube root of unity i.e., ω is a complex number such thatω3 = 1 and ω �= 1. If K is the field Q(

3√

2,ω) generated by 3√

2 and ω over the

Page 529: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

11.10 Additional Reading 515

field Q of rational numbers and n is the number of subfields L of K such thatQ � L� K , then n is

(a) 4 (b) 3 (c) 5 (d) 2.

8. Let F5n be the finite field with 5n elements. If F5n contains a non-trivial root ofunity, then n is

(a) 15 (b) 6 (c) 92 (d) 30.

9. Which of the following statements is (are) correct?

(a) sin 7◦ is algebraic over Q;(b) sin−1 1 is algebraic over Q;(c) cos(π/17) is algebraic over Q;(d)

√2+√π is algebraic over Q(π).

10. Which of the following statements is (are) correct?

(a) There exists a finite field in which the additive group is not cyclic;(b) Every infinite cyclic group is isomorphic to the additive group of integers;(c) If F is a finite field, there exists a polynomial p over F such that p(x)= 0

for all x ∈ F , where 0 denotes the zero in F ;(d) Every finite field is isomorphic to a subfield of the field of complex num-

bers.

11. Consider the ring Zn for n ≥ 2. Which of the following statements is (are)correct?

(a) If Zn is a field, then n is a composite integer;(b) If Zn is a field iff n is a prime integer;(c) If Zn is an integral domain, then n is prime integer;(d) If there is an injective ring homomorphism of Z5 to Zn, then n is prime.

12. Let Fp be the field Zp , where p is a prime. Let Fp[x] be the associated poly-nomial ring. Which of the following quotient rings is (are) fields?

(a) F5[x]/〈x2 + x + 1〉; (b) F2[x]/〈x3 + x + 1〉;(c) F3[x]/〈x3 + x + 1〉; (d) F7[x]/〈x2 + 1〉.

11.10 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Alaca andWilliams 2004; Artin 1991; Birkhoff and Mac Lane 2003; Hardy and Wright 2008;Hungerford 1974; Rotman 1988) for further details.

Page 530: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

516 11 Algebraic Numbers

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Alaca, S., Williams, K.S.: Introductory Algebraic Number Theory. Cambridge University Press,Cambridge (2004)

Artin, M.: Algebra. Prentice-Hall, Englewood Cliffs (1991)Birkhoff, G., Mac Lane, S.: A Survey of Modern Algebra. Universities Press, Hyderabad (2003)Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 6th edn. Oxford University

Press, London (2008)Hungerford, T.W.: Algebra. Springer, New York (1974)Rotman, J.J.: An Introduction to Algebraic Topology. Springer, New York (1988)

Page 531: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Chapter 12Introduction to Mathematical Cryptography

The aim of this chapter is to introduce various cryptographic notions starting fromhistorical ciphers to modern cryptographic notions by using mathematical toolsmainly based on number theory, modern algebra, probability theory and informationtheory. In the modern busy digital world, the word “cryptography” is well knownto many of us. Everyday, knowingly or unknowingly, in many places we use differ-ent techniques of cryptography. Starting from the logging on a PC, sending e-mails,withdrawing money from ATM by using a PIN code, operating the locker at a bankwith the help of a designated person from the bank, sending message by using a mo-bile phone, buying things through Internet by using a credit card, transferring moneydigitally from one account to another over the Internet, we are applying cryptogra-phy everywhere. If we observe carefully, we see that in every case we need to hidesome information or it is necessary to transfer information secretly. So intuitively wecan guess that cryptography has something to do with security. In this chapter, weintroduce cryptography and provide a brief overview of the subject and discuss thebasic goals of cryptography and understand the subject, both intuitively and mathe-matically. More precisely various cryptographic notions starting from the historicalciphers to modern cryptographic notions like public-key encryption schemes, sig-nature schemes, oblivious transfer, secret sharing schemes and visual cryptographyby using mathematical tools mainly based on modern algebra are explained. Finally,the implementation issues of three public-key cryptographic schemes, namely RSA,ElGamal, and Rabin using the open-source software SAGE are discussed.

12.1 Introduction to Cryptography

Cryptography has been used almost since the time when writing concept was in-vented. For the larger part of its history, cryptography remained an art, a game of adhoc designs and attacks. Historically, the notion of cryptography arose as a meansto enable parties to maintain privacy of the information they sent to each other, evenin the presence of an enemy who even had an access to the communicated message.

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8_12, © Springer India 2014

517

Page 532: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

518 12 Introduction to Mathematical Cryptography

The name cryptography comes from the Greek words “kruptos” (means hidden)and “graphia” (means writing). In short, cryptography means the art of writing se-crets message. In general, the aim of cryptography is to construct efficient schemesachieving some desired functionality, even in an adversarial environment. For ex-ample, the most basic question in cryptography is that of secure communicationacross an insecure channel. Before we start describing the major objectives of cryp-tography, let us first introduce the basic model of cryptography. Under this model,two parties, conventionally named Alice (sender) and Bob (receiver), wish to com-municate with each other over an insecure channel (think of the Internet or mobilenetwork) in which Alice wishes to send a secret message to Bob. Now the firstquestion is: what do we mean by an insecure channel? Insecure channel means achannel through which the message will be sent to Bob is controlled by a whole lotof adversaries (enemies) who are trying to get hold of the message of Alice or tomodify it and trick Bob into believing that some other message was sent by Alice. Incryptography, we assume that the adversary has practically unlimited computationpower. He cannot only eavesdrop over any message, but also even take the messageand change some of its bits. Traditionally, the two basic goals of cryptography havebeen the secrecy and authenticity (or data-integrity). It is necessary in secrecy thatthe message should be guarded from the adversary, that is, the message that has beensent by Alice to Bob should be hidden from the adversary and only the intended re-cipient, i.e., Bob can see the message. On the other hand, authenticity ensures thatBob should not be tricked into accepting a message that did not originate from Al-ice, that is, the message received by Bob must be the same as the message that wassent by Alice. To achieve such goals, we must note that there must be something thatBob knows but the adversary does not know, otherwise the adversary could simplyapply the same method that Bob does and thus be able to read the messages sent byAlice.

Under these circumstances in presence of adversaries, achieving these securitygoals such as privacy or authenticity is provided by cryptography with the help ofa weapon, known as a protocol to Alice and Bob. A protocol is just a collection ofprograms or algorithms. A protocol for Alice will guide her to package or encapsu-late her data for transmission, on the other hand, the protocol for Bob will guide himto decapsulate the received package from Alice to recover the data together possiblywith associated information telling him whether or not to regard it as authentic.

To understand the basic cryptography, we first need to understand the basic ter-minologies associated with cryptography. The original secret message that Alicewants to send to Bob is called plain text, while the disguised message that is sentby Alice to Bob is called cipher text. The procedure of converting a plain text into acipher text is known as encryption, while the procedure to convert a cipher text intothe plain text is known as decryption.

Let us now define formally what do we mean by a cryptosystem.

Definition 12.1.1 A cryptosystem is a five-tuple (P,C,K,E,D), where the fol-lowing conditions are satisfied:

Page 533: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.3 Cryptanalysis 519

• P is a finite set of possible plain texts;• C is a finite set of possible cipher texts;• K, the key space, is a finite set of possible keys;• For each K ∈K, there is an encryption rule eK ∈ E and a corresponding decryp-

tion rule dK ∈ D. Each eK : P → C and dK : C → P are functions such thatdK(eK(x))= x for every plain text element x ∈P .

12.2 Kerckhoffs’ Law

In cryptography, Kerckhoffs’ law (also called Kerckhoffs’ assumption or Kerck-hoffs’ principle) was stated by Auguste Kerckhoffs (1835–1903), a professor oflanguages at the School of Higher Commercial Studies, Paris, in the 19th century.It states that a cryptosystem should be secure even if everything about the system,except the key, is of public knowledge. It was reformulated (perhaps independently)by Claude Shannon as “the enemy knows the system”. The idea is that if any partof a cryptosystem (except the key) has to be kept secret then the cryptosystem isnot secure. So in cryptography it is usually assumed that the enemy i.e., the adver-sary knows the cryptosystem that is being used. Of course, if the adversary does notknow the cryptosystem that is being used, then it will make the task of the adversarymore difficult. Thus the goal of a cryptographer is to design a secure cryptosystemwhich satisfies Kerckhoffs’ principle.

Broadly speaking, a cryptographer’s work may be divided into two parts: namely,the constructive part (cryptography) and the destructive part (cryptanalysis). In theconstructive part, the aim of a cryptographer is to construct a secure cryptosystem,on the other hand, in the destructive part, the aim of a cryptographer is to find weak-nesses of some existing cryptosystem to break the system. For example, the cryp-tographers associated with the banking sectors try to make their systems secure sothat all the transactions over the Internet can be made safely, whereas the cryptogra-phers of the defense or intelligence organizations try to break the code that had beentransmitted between two suspects. As a whole, both cryptography and cryptanalysisare included in the subject, called “CRYPTOLOGY”. There is no doubt that cryp-tography and cryptanalysis are complementing each other and are being developedside by side. To construct a good and secure cryptographic scheme one has to havea good knowledge in the cryptanalysis techniques. On the other hand, to attack ascheme, one has to have a good knowledge in the construction of the scheme. Thusunless one has a good knowledge in cryptanalysis, it is not possible for him/her toconstruct a good cryptographic scheme and vice versa.

12.3 Cryptanalysis

Cryptanalysis is the study of a cryptographic system for the purpose of findingweaknesses in the system and breaking the code used to encrypt the data without

Page 534: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

520 12 Introduction to Mathematical Cryptography

accessing the secret information which is normally required to do so. Typically, thisinvolves finding the secret key. Although the actual word “cryptanalysis” is rela-tively recent (it was coined by William Friedman in 1920), methods for breakingcodes and ciphers are much older. The first known recorded explanation of crypt-analysis was given in 9th Century by Arabic polymath Abu Yusuf Yaqub ibn Ishaqal-Sabbah Al-Kindi in A Manuscript on Deciphering Cryptographic Messages. Thismanuscript includes a description of the method of frequency analysis.

Even though the goal has been the same, the methods and techniques of crypt-analysis have changed drastically through the evolution of cryptography, rangingfrom the pen-and-paper methods of the past, through machines like Enigma in WorldWar II, to the computer-based schemes of the present. Even the results of cryptanaly-sis have changed, it is no longer possible to have unlimited success in code breaking.In the mid-1970s, a new class of cryptography, known as asymmetric cryptography,was introduced in the literature of cryptology. Methods for breaking these cryptosys-tems are different from before and usually involve solving a carefully constructedproblem in pure mathematics, the most well known being integer factorization.

Now we will discuss different attack models on cryptography. The most commontypes of attacks are given below.

• Cipher text only attack: In cryptography, a cipher text only attack is a form ofcryptanalysis, where the attacker is assumed to have access only to a set of ciphertexts. In the history of cryptography, early ciphers, implemented using pen-and-paper, were routinely broken using cipher texts alone. Cryptographers developeda variety of statistical techniques for attacking cipher text, such as, frequencyanalysis. Mechanical encryption devices, such as, Enigma made these attacksmuch more difficult. This cipher machine was invented by a German engineer,Arthur Scherbius. The Enigma machine was an ingenious advance in technology.It is an electromechanical machine, very similar to a typewriter, with a plugboardto swap letters, rotors to further scramble the alphabet and a lamp panel to dis-play the result. Most models of Enigma used 3 or 4 rotors with a reflector to allowthe same settings to be used for enciphering and deciphering. The German Navyand Army adopted the Enigma in 1926 and 1928, respectively, but only addedthe plugboard in 1930. The history of breaking the code for Enigma by Polishmathematicians is very exciting. The Polish were understandably nervous aboutGerman aggression and on September 1, 1932 the Polish Cipher Bureau hired a27-year-old Polish mathematician, Marian Rejewski, along with two fellow Poz-nan University mathematics graduates, Henryk Zygalski and Jerzy Rozycki, to tryto break the code of the Enigma machine. This was an early insight into the roleof mathematics in code breaking. The three Polish code breakers had access to anEnigma machine, but did not know the rotor wiring. Through a German spy, theFrench gained access to two months of Enigma key settings. But without the rotorwire, they were unable to make use of this information. They passed this infor-mation to their British and Polish colleagues and the Polish were able to quicklysolve the Enigma puzzle, recreating the three rotors then in use to mount a suc-cessful cipher text-only cryptanalysis to the Enigma. This was in March 1933 and

Page 535: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.4 Some Classical Cryptographic Schemes 521

they continued to break the code until the Nazis invaded Poland on September 1,1939, marking the start of WW2.

• Known plain text attack: In cryptography, a known plain text attack is a form ofcryptanalysis, where the attacker has a cipher text corresponding to a plain text ofan arbitrary message not of his choice.

• Chosen plain text attack: In cryptography, a chosen plain text attack is a formof cryptanalysis, where the attacker has the capability to compute the cipher textcorresponding to an arbitrary plain text message of his choice.

• Chosen cipher text attack: In cryptography, a chosen cipher text attack is a formof cryptanalysis, where the attacker has the temporary access to the decryptionmachinery to find the plain text corresponding to a cipher text message of hischoice.

In each case the objective to the attacker is to determine the key that was used. Weobserve that chosen cipher text attack is most relevant to a special type of cryptosys-tem known as asymmetric or public-key cryptosystem.

12.3.1 Brute-Force Search

Now we will discuss informally an important term in cryptanalysis known as brute-force search. Suppose a cryptanalyst has found a plain text and a correspondingcipher text but he does not know the key. He can simply try encrypting the plain textusing each possible key, until the cipher text matches or try decrypting the ciphertext to match the plain text. This is called brute-force search. So every cryptosys-tem can be broken using brute-force search attack. However, every well-designedcryptosystem has such a large key space that this brute-force search is not practical.

In academic cryptography, a weakness or a break in a scheme is usually definedquite conservatively. Bruce Schneier sums up this approach: “Breaking a cipher sim-ply means finding a weakness in the cipher that can be exploited with a complexityless than brute-force. Never mind that brute-force might require 2128 encryptions; anattack requiring 2110 encryptions would be considered a break. . .simply put, a breakcan just be a certificational weakness: evidence that the cipher does not perform asadvertised.”

12.4 Some Classical Cryptographic Schemes

Cryptography is as old as writing itself and has been used for thousands of years tosafeguard military and diplomatic communications. It has a long fascinating history.Kahn’s (1967) The Codebreakers is the most complete non-technical account of thesubject. This book traces cryptography from its initial and limited use by Egyptianssome 4000 years ago, to the twentieth century where it played a critical role in the

Page 536: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

522 12 Introduction to Mathematical Cryptography

outcome of both the world wars. Before the 1980s, cryptography was used primar-ily for military and diplomatic communications and in fairly limited contexts. Butnow cryptography is the only known practical method for protecting informationtransmitted through communication networks that use land lines, communicationsatellites and microwave facilities. In some instances it can be the most economicalway to protect stored data.

Let us start with some classical examples of cryptographic schemes in whichboth the sender and the receiver agree upon a common key secretly before the ac-tual communication starts. We shall explain later that this concept leads to a veryimportant notion of cryptography known as symmetric key cryptosystem.

12.4.1 Caesarian Cipher or Shift Cipher

This cryptographic scheme was discovered by Julius Caesar, used around 2000 yearsago, much earlier than the invention of group theory. Caesar used his scheme to sendinstructions or commands through messengers to his generals and allies who stayedat the war front. Now if the message was sent in a simple text form (plain text), itcould be caught by the enemies or the messenger might read the secret messages. Toavoid such a situation, Julius Caesar introduced a new method. Before going to thewar front Julius Caesar and his generals agreed upon a secret number, say 3, whichis the key of the cryptosystem. When Julius Caesar needed to send messages tothe generals at the war front, he just cyclically shifted every letter of the commandor instruction by 3 positions to the right. If we take the example of the Englishalphabets, without differentiating the lower and the upper case, we have altogether26 letters. So if we shift cyclically each letter of the English alphabets 3 times tothe right, A will be shifted to D, B will be shifted to E, . . . ,X will be shifted toA, Y will be shifted to B and finally, Z will be shifted to C. If a message said“ROME”, it would look like “URPH” (as R→ U,O → R,M → P and E→H ).Now those who know the value of the shift to be 3 (in cryptography we call thisvalue as “key”), they will shift cyclically each letter of the cypher text 3 times to theleft and can easily recover the plain text.

Now think about the Caesarian shift cipher in today’s view point. The questionis: can we associate the Caesarian shift cipher with mathematics? Today, we havean important tool of mathematics, known as Cyclic Group. We can number eachalphabet A,B, . . . ,Z of English literature (not distinguishing the lower and uppercases) as 0,1, . . . ,25, respectively. Since, each letter is shifted cyclically to the right(in the above example, it is shifted 3 times to the right), we can represent the set ofEnglish alphabets as the set Z26, the set of all integers modulo 26. We know that(Z26,+) forms a cyclic group with respect to addition modulo 26 defined on Z26properly. Now as each letter is shifted cyclically k times to the right, we can definethe encryption function, ek , from Z26 onto Z26 for the fixed k ∈ Z26, defined byek(x)= x+k, ∀x ∈ Z26. So the decryption function can be written as dk(x)= x−k,∀x ∈ Z26.

Page 537: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.4 Some Classical Cryptographic Schemes 523

Now the question is: In today’s computer age, is the shift cipher secure? Assumethat an adversary only has a piece of cipher text along with the knowledge thatthis cipher text is obtained by using shift cipher. The adversary does not have theknowledge of the secret key k. However, it is very easy for the adversary to have a“cipher text only attack” as there are only 26 possible keys. So the adversary willtry every key and will see which key decrypts the cipher text into a plain text that“makes sense”. As mentioned earlier, such an attack on an encryption scheme iscalled a brute-force attack or exhaustive search attack. Clearly, any secure encryp-tion scheme must not be vulnerable to such a brute-force attack; otherwise, it canbe completely broken, irrespective of how sophisticated the encryption algorithmis. This leads to a trivial but important principle, called, the “sufficient key spaceprinciple”. It states that

Any secure encryption scheme must have a key space that is not vulnerable to exhaustivesearch.

So we try to increase the size of the key space in the next cryptographic scheme.

12.4.2 Affine Cipher

Let us take P = C = Z26. Let K = {(a, b) ∈ Z26 × Z26 : gcd(a,26)= 1}. For K =(a, b) ∈K, let us define ek : P→ C and dk : C→ P by eK(x)= (ax + b) mod 26and dK(y)= a−1(y−b) mod 26, respectively, where (x, y) ∈ Z26. In this case, thesize of the key space is 26 · 12= 312 which is more than 26, the key space size ofCaesarian shift cipher.

Remark In today’s computer age, for an exhaustive search, a very powerful com-puter or many thousands of PC’s that are distributed around the world may be used.Thus, the number of possible keys must be very large, must be an order of at least260 or 270. But we must emphasize that the “sufficient key space principle” gives anecessary condition for security, not a sufficient one. The next encryption schemehas a very large key space. However, we shall show that it is still insecure.

12.4.3 Substitution Cipher

Let us take P = C = Z26. Let K be the set of all possible permutations on the set{0,1,2, . . . ,25}. For each permutation π , let us define eπ : P → C and dπ : C→P by eπ (x) = π(x) and dπ(y) = π−1(y) respectively, where π−1 is the inversepermutation of π . Then one can verify that (P,C,K,E,D) is a cryptosystem. Thetotal number of possible keys is 26! = 403291461126605635584000000 which ismore than 4.0× 1026, a very large number.

Let us consider the plain text written in English language. In that case, the P =C = Z26. Let us take a secret key π as defined in Table 12.1. Then the plain text

Page 538: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

524 12 Introduction to Mathematical Cryptography

Table 12.1 A permutation rule π in which A is replaced by d , i.e., π(A)= d , B is replaced by f ,i.e., π(B)= f and so on

A B C D E F G H I J K L M

d f h l n a c e g i k m o

N O P Q R S T U V W X Y Z

q s u w y z b j p r t v x

Table 12.2 Percentage of frequency of letters in English text

A B C D E F G H I J K L M

8.15 1.44 2.76 3.79 13.11 2.92 1.99 5.26 6.35 0.13 0.42 3.39 2.54

N O P Q R S T U V W X Y Z

7.10 8.00 1.98 0.12 6.83 6.10 10.47 2.46 0.92 1.54 0.17 1.98 0.08

“CRYPTOGRAPHYISFUN” becomes “hyvubscyduevgzajq”. A brute-force attackon the key space for this cipher takes much longer than a lifetime, even using themost powerful computer known today. However, this does not necessarily mean thatthe cipher is secure. In fact, as we will show now, it is easy to break this scheme eventhough it has a very large key space. For example, an attacker can easily attack thesubstitution cipher, written in English language, because the letters in the Englishlanguage (or any other human language) are not random. For instance, the letter qin English is always followed by the letter u in any word. Moreover, certain letters,such as e and t appear far much more frequently than other letters, such as j and q.Table 12.2 lists the letters with their typical frequencies in English text. So we seethat the most frequent letter is e, followed by t, a, o, and n. It may also be useful toconsider sequences of two or three consecutive letters called digrams and trigrams,respectively. The 30 most common digrams are (in decreasing order) TH, HE, IN,ER, AN, RE, ED, ON, ES, ST, EN, AT, TO, NT, HA, ND, OU, EA, NG, AS, OR, TI,IS, ET, IT, AR, TE, SE, HI, OF. The 12 most common trigrams are (in decreasingorder) THE, ING, AND, HER, ERE, ENT, THA, NTH, WAS, ETH, FOR, DTH.

Based on these features of English language and the fact that in a substitutioncipher a particular letter is always replaced by some other fixed letter, the attack,known as, frequency analysis, on the substitution may be done as follows:

• The number of different cipher text characters or combination of characters arecounted to determine the frequencies of usages.

• The cipher text is examined for patterns, repeated series and common combina-tions.

• The cipher text characters are replaced with possible plain text equivalents usingthe known language characteristics.

Page 539: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.4 Some Classical Cryptographic Schemes 525

Remark Note that Caesar Cipher is a special case of Substitution Cipher whichincludes only one of the 26! possible permutations on 26 elements.

All the examples discussed till now have a common feature, that is, all the plaintext alphabets are going to a fixed cipher text alphabet. This feature leads to thefollowing important definition.

Definition 12.4.1 A cryptosystem is said to be a mono-alphabetic cryptosystem ifand only if each alphabetic character is mapped into a unique alphabetic characteronce the key of the cryptosystem is fixed.

As we have described, the frequency attack on the mono-alphabetic substitutioncipher could be carried out, because the mapping of each alphabet was fixed. Thussuch an attack may be avoided by mapping different instances of the same plaintext alphabet to different cipher text alphabets. In that case, counting the characterfrequencies will not offer much information about the mapping. This feature leadsto the following definition.

Definition 12.4.2 A cryptosystem is said to be a poly-alphabetic cryptosystem ifand only if different instances of the same plain text alphabet are mapped into dif-ferent cipher text alphabets.

In the next section we are going to introduce an example of a poly-alphabeticcryptosystem.

12.4.4 Vigenère Cipher

Let n be a positive integer. Define C = P = K = (Z26)n. For a key K =

(k1, k2, . . . , kn), we define

ek(x1, x2, . . . , xn) = (x1 + k1, x2 + k2, . . . , xn + kn)mod 26

dk(y1, y2, . . . , yn) = (y1 − k1, y2 − k2, . . . , yn − kn)mod 26

Intuitively, the Vigenère cipher works by applying multiple shift ciphers in se-quence. Let us consider the following example.

Example 12.4.1 Let the plain text message be CRYPTOLOGY and the key be CIP.Let us represent the alphabets as elements of Z26 by identifying A by 0, B by 1 andso on.

Then the scheme is as follows:

C R Y P T O L O G Y 2 17 24 15 19 14 11 14 6 24C I P C I P C I P C 2 8 15 2 8 15 2 8 15 2

e z n r b d n w v a 4 25 13 17 1 3 13 22 21 0

Page 540: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

526 12 Introduction to Mathematical Cryptography

Remark Note that the two different instances of the same plain text alphabet O inthe word CRYPTOLOGY are mapped into different cipher text alphabets, namelyd and w. If the key is a sufficiently long word (chosen at random), then breakingthis cipher seems to be a very difficult task. Indeed, it was considered by many to bean unbreakable cipher and although it was invented in the 16th century a systematicattack on the scheme was only devised hundreds of years later. For more details,we refer the readers to the text books (Menezes et al. 1996; Stinson 2002; Katz andLindell 2007).

12.4.5 Hill Cipher

Hill cipher was first introduced in 1929 by the mathematician Lester S. Hill (1929).This cipher may be thought of as the first systematic and simple poly-alphabeticcipher, in which Algebra, specially Linear Algebra was used. Intuitively, in the Hillcipher, the plain text is divided into groups of adjacent letters of the some fixedlength, say n and then each such group is transformed into a different group of n

letters. An arbitrary n-Hill cipher has as its key a given n× n non-singular matrixwhose entries are integers 0,1,2, . . . , t−1, where t is the size of the set of alphabetsi.e., if the alphabets are the English letters only, then t = 26. The Hill cipher for theEnglish alphabets may be explained as follows: For n ≥ 2, let P = C = Zn

26 andK = {K :K is a non-singular matrix of order n with entities from Z26}. Let us takean n×n non-singular matrix K = (kij )n×n

as our key. For x = (x1, x2, . . . , xn) ∈ Pand K ∈K, the encryption rule eK(x)= y = (y1, y2, . . . , yn) is defined as follows:

(y1, y2, . . . , yn)= (x1, x2, . . . , xn)

⎢⎢⎣

k11 k12 · · · k1n

k21 k22 · · · k2n

· · · · · · · · · · · ·kn1 kn2 · · · knn

⎥⎥⎦ .

So idea is to take n linear combinations of the n alphabetic characters in one ciphertext element. Now we shall show how to decrypt the cipher text. The above equationcan be written as y = xK . As K is a non-singular matrix, for decryption, we canuse, dK(y)= yK−1 = x, where all the operations are performed in Z26.

Example 12.4.2 Let us consider a simple example of a Hill cipher with the set ofalphabets as the English letters only, i.e., “a” to “z” only. While encrypting anddecrypting, we shall represent the 26 characters in our alphabet in order by the non-negative integers 1,2, . . . ,26 (≡0). Let m= 2, i.e., we are considering only the Hill2-cipher with the key K = [ 7 3

2 5

]. Then the plain text element x could be written as

x = (x1, x2) and the cipher text element as y = (y1, y2) = (x1, x2)[ 7 3

2 5

]. Suppose

Alice wants to send some secret message say “LOVE” to Bob over an insecurechannel using the above mentioned Hill 2-cipher. Since, m = 2, Alice will break“LOVE” into two parts, each containing two characters i.e., “LO” and “VE”. The

Page 541: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.5 Introduction to Public-Key Cryptography 527

corresponding integer values are (12,15) and (22,5), respectively, since L, O, V, Ecorresponds to the integers 12, 15, 22, and 5, respectively. Note that the matrix K isknown to both Alice and Bob. For encryption Alice will compute

((12,15)

[7 32 5

])mod 26= (10,7)= (j, g) and

((22,5)

[7 32 5

])mod 26= (8,13)= (h,m).

So Alice will send to Bob the cipher text “jghm” over an insecure channel. Afterreceiving it, Bob will break “jghm” into “jg” and “hm” and convert it into (10,7)

and (8,13) and will compute:(

(10,7)

[7 32 5

]−1)

mod 26=(

(10,7)

[19 258 11

])mod 26= (12,15)= (l, o)

and(

(8,13)

[7 32 5

]−1)

mod 26=(

(8,13)

[19 258 11

])mod 26= (22,5)= (v, e).

So Bob gets back the message “love” sent from Alice.

Remark For the cryptanalysis of the Hill cipher, we refer the readers to the textbook (Stinson 2002).

In all of the above ciphers, if we observe carefully, we note that before sendingthe secret message, the sender and the receiver have to agree upon a common keysecretly. The same key is used for both encryption and decryption. This type ofcryptosystem is known as private-key or symmetric key cryptosystem. One drawbackof a private-key cryptosystem is that it requires a prior secure communication of thecommon key k between sender and receiver, using a secure channel, before anycipher text is transmitted. In practice, this may be very difficult to achieve as thesender (say Alice) and the receiver (say Bob) may not have the luxury of meetingbefore hand or they may not have an access to a reasonably secure channel. SinceAlice and Bob are not meeting in private, we have to assume that the adversary orthe attacker is able to hear everything that Alice and Bob pass back and forth. Underthis situation, is it possible for Alice and Bob to exchange a secret key for futuresecure communication? This leads to an interesting concept known as public-key orasymmetric cryptosystem.

12.5 Introduction to Public-Key Cryptography

Intuitively, in a public-key cryptosystem, there are two keys instead of one secretkey. One of these keys is an encryption key, used by sender to encrypt the mes-

Page 542: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

528 12 Introduction to Mathematical Cryptography

sage and the other is a decryption key, used by the receiver to decrypt the ciphertext. The most important thing is that the secrecy of encrypted messages should bepreserved even against an adversary who knows the encryption key (but not the de-cryption key). Cryptosystems with this property are called asymmetric or public-keycryptosystems, in contrast to the symmetric or private-key encryption schemes. In apublic-key cryptosystem the encryption key is called the public key, since it is keptopen or published by the receiver so that anyone who wishes to send an encryptedmessage may do so and the decryption key is called the private key since it is keptcompletely private by the receiver.

There are certain advantages of public-key cryptography over the secret keycryptography. As the public-key encryption allows key distribution to be done overpublic channels, it simplifies the initial deployment of the system. As a result, themaintenance of the system becomes quite easy when parties join or leave the cryp-tosystem. Further, if we are going to use a public-key cryptosystem, then we do notneed to store many secret keys for further secure communication. Even if all pairsof parties want the ability to communicate securely, each party needs only to storehis/her own private key in a secure fashion. The public keys of the other parties caneither be obtained when needed, or stored in a non-secure fashion. Finally, public-key cryptography plays an important role in the scenario where parties, who havenever previously interacted, want the ability to communicate securely. For example,a merchant may post his public key on-line; any buyer making a purchase can obtainthe merchant’s public key when they need to encrypt their credit card information.

Asymmetric cryptography is a relatively new field. Whiteld Diffie and Mar-tin Hellman, in 1976, published a paper entitled “New Directions in Cryptogra-phy” (Diffie and Hellman 1976) in which they formulated the concept of a public-key encryption system. A short time earlier, Ralph Merkle had independently in-vented a public-key construction for an undergraduate project at Berkeley, but thiswas little understood at the time. Merkle’s paper entitled “Secure communicationover insecure channels” appeared in Merkle (1982). However, it turns out that theconcept of public-key encryption was originally discovered by James Ellis whileworking at the British Government Communications Headquarters (GCHQ). Ellis’sdiscoveries in 1969 were classified as secret material by the British government andwere not declassified and released until 1997, after his death (cf. Hoffstein et al.2008).

The Diffie–Hellman key agreement was invented in 1976 during a collaborationbetween Whitfield Diffie and Martin Hellman and was the first practical methodfor establishing a shared secret over an insecure communication channel. The mostimportant contribution of the paper by Diffie and Hellman (1976) was the definitionof a Public Key Cryptosystem (PKC) and its associated components namely one-way functions and trapdoor information as defined below.

Definition 12.5.1 A one-way function is an invertible function that is easy to com-pute, but whose inverse is difficult to compute i.e., if any algorithm that attempts tocompute the inverse in a reasonable amount of time will almost certainly fail, wherethe phrase almost certainly must be defined probabilistically.

Page 543: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.5 Introduction to Public-Key Cryptography 529

A secure public-key cryptosystem is built using one-way functions that have atrapdoor which is defined below.

Definition 12.5.2 The trapdoor of a function is a piece of auxiliary information thatallows the inverse of the function to be computed easily but without that auxiliaryinformation it is computationally very hard to compute the inverse function.

Informally, a public-key (or asymmetric) cryptosystem consists of two types ofkeys, namely, a private key kpriv and a public key kpub. Corresponding to eachpublic/private-key pair (kpriv, kpub), there is an encryption algorithm ekpub and thecorresponding decryption algorithm dkpriv . The encryption algorithm ekpub corre-sponding to kpub is public of knowledge and easy to compute. Similarly, the decryp-tion algorithm dkpriv must be easily computable by someone who knows the privatekey kpriv, but it should be very difficult to compute for someone who knows onlythe public key kpub. The idea behind a public-key cryptosystem is that it might bepossible to find a cryptosystem where it is computationally infeasible to determinethe decryption function dkpriv , given the encryption function ekpub and the public keykpub but with the knowledge of secret key kpriv it is easy to compute the inverse ofekpub , i.e., dkpriv . In other words, the private key kpriv may be thought of as a trapdoorinformation for the function ekpub . Under this situation, say Alice wants to send asecret message to Bob. Then Alice will use the encryption rule ekpub that is madepublic by Bob, to encrypt the secret message and will send the encrypted messageto Bob through an insecure channel. A public-key cryptosystem is said to be secureif it is computationally infeasible to determine dkpriv given ekpub and kpub. In thatcase, only Bob can decrypt the cipher text to get the plain text. The main advantageof a public-key cryptosystem is that Alice can send an encrypted message to Bob,without any prior communication of a secret key, by using the public encryption ruleekpub (hence the name public-key cryptosystem). The formal definition of public-keycryptosystem is as follows.

Definition 12.5.3 A public-key (or asymmetric) cryptosystem is a five-tuple(P,C,K,E,D), where the following conditions are satisfied:

• P , the plain text space, is a finite set of possible plain texts,• C, the cipher text space, is a finite set of possible cipher texts,• K, the key space, is a finite set of possible keys,• For each k = (kpriv, kpub) ∈ K, there is an encryption rule ekpub ∈ E and the cor-

responding decryption rule dkpriv ∈D. Each ekpub : P→ C and dkpriv : C→ P arefunctions such that dkpriv(ekpub(x))= x for every plain text element x ∈ P .

It is quite interesting to note that Diffie and Hellman formulated this conceptwithout finding a specified encryption/decryption pair of functions, although theydid propose a similar method through which Alice and Bob can securely exchangea random piece of data whose value is not known initially to either one. Before de-scribing the method, let us first give a brief introduction about the discrete logarithmproblem.

Page 544: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

530 12 Introduction to Mathematical Cryptography

12.5.1 Discrete Logarithm Problem (DLP)

The discrete logarithm problem is a well-known mathematical problem that plays animportant role in public-key cryptography. The Diffie–Hellman Key Exchange pro-tocol (Diffie and Hellman 1976) and ElGamal public-key cryptosystems are basedon the discrete logarithm problem in a finite field Zp , where p is a large prime. Letus first explain the problem.

Let p be a large prime. Recall that Z∗p = Zp \ {(0)} is a cyclic group of orderp−1 (see Chap. 10). Thus there exists a primitive element, say g of Z∗p . As a result,every non-zero element of Zp is equal to some power of g. Further recall that, byFermat’s Little Theorem, gp−1 = (1) and no smaller power of g is equal to (1).Hence all the elements of Z∗p may be represented as Z∗p = {g,g2, . . . , gp−1}. Nowwe are going to define the discrete logarithm problem in Z∗p .

Definition 12.5.4 The Discrete Logarithm Problem (DLP) in Z∗p states that givena primitive element g of Z∗p and an element h ∈ Z∗p , find x such that gx = h. Thenumber x is called the discrete logarithm of h modulo p to the base g and is denotedby logg(p).

Remark Till date, in general, there is no efficient algorithm known to solve the DLP.Though here, we define the discrete logarithm problem in terms of the primitive

base g, in general this is not mandatory. We can take elements of any group and usethe group law instead of multiplication. This leads to the most general form of thediscrete logarithm problem as follows.

Definition 12.5.5 The Discrete Logarithm Problem (DLP) in a group (G,◦) statesthat, given an element g and h in G, find x such that

g ◦ g ◦ · · · ◦ g︸ ︷︷ ︸x times

= h.

Remark Discrete logarithm problem is not always hard. This hardness depends onthe groups. For example, a popular choice of groups for discrete logarithm-basedcrypto-systems is Z∗p where p is a prime number. However, if p− 1 is a product ofsmall primes, then the Pohlig–Hellman algorithm can solve the discrete logarithmproblem in this group very efficiently. That is why we always need a special type ofprime p, known as safe prime which is of the form 2q+1, where q is a large prime,when using Z∗p as the basis of discrete logarithm-based crypto-systems.

12.5.2 Diffie–Hellman Key Exchange

Until 1976, there was a belief that in cryptography, encryption could not be donewithout sharing a secret key among the sender and the receiver. However, Diffie and

Page 545: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.5 Introduction to Public-Key Cryptography 531

Hellman noticed that there is a natural asymmetry in the world such that there arecertain actions that can be easily performed but not easily reversed. For example,it is easy to multiply two large primes but difficult to recover these primes fromtheir product. The existence of such phenomena motivates to construct an encryp-tion scheme that does not rely on shared secrets, but rather one for which encryptingis “easy” but reversing this operation (i.e., decrypting) is infeasible for anyone otherthan the designated receiver. Using this observation, Diffie and Hellman solved thefollowing interesting problem which looks quite infeasible. The problem may bestated as follows: Suppose Alice wants to share some secret information with Bob.This information may be a common key for future secure communication betweenAlice and Bob using symmetric key encryption. The only problem is that whatevercommunication will be made between Alice and Bob will be observed by the adver-sary. In this situation, the question is: how is it possible for Alice and Bob to sharea key without making it available to the adversary? As mentioned earlier, at a firstglance, it seems that it is quite impossible for Alice and Bob to solve the problem.But Diffie and Hellman first came up with a brilliant solution to this problem takinginto account the difficulty of solving the discrete logarithm problem in Z∗p , where p

is a large prime.The steps for Diffie–Hellman key exchange protocol are as follows:

• At the first step, Alice and Bob agree on a large prime p and a generator, say g,of the cyclic group Z∗p .

• Alice and Bob make the values of p and g public, i.e., these values are known toall, in particular known to the adversary.

• Alice chooses a random integer a that she keeps secret, while at the same timeBob chooses randomly an integer b that he keeps secret.

• Alice and Bob use the secret integers a and b to compute X ≡ ga (mod p) andY ≡ gb (mod p), respectively.

• Alice sends through an insecure channel the value X to Bob while Bob sendsthrough an insecure channel the value Y to Alice. (Note that the adversary cansee the values of X and Y as they are sent over insecure channels).

• After getting the value Y from Bob, Alice computes with the help of thesecret value a, the value X′ ≡ Ya (mod p), while Bob computes Y ′ ≡ Xb

(mod p) with the help of the secret value b that he has. Note that as Z∗p isa commutative group, X′ ≡ Ya (mod p)≡ (gb)a (mod p) ≡ (g)ab (mod p)≡(Xa)b (mod p)≡ Y ′ (mod p).

• Thus the common key for Alice and Bob is gab (mod p).

Note that the adversary knows the values of X ≡ ga (mod p) and Y ≡gb (mod p). The adversary also knows the values of g and p. To the adversary,only a and b are unknown. So if the adversary can solve the DLP, then he can findboth a and b and thus can compute easily the shared secret value gab of Alice andBob. At this point of time, though it seems that Alice and Bob are safe provided thatthe adversary is unable to solve the DLP, this is not quite correct. There is no doubtthat one method of finding the shared value of Alice and Bob is to solve the DLP,

Page 546: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

532 12 Introduction to Mathematical Cryptography

but that is not the precise problem that the adversary is intended to solve. The adver-sary is actually intended to solve the following problem, known as Diffie–HellmanProblem (DHP).

Definition 12.5.6 Let p be a prime and g be a primitive element, i.e., the generatorof the cyclic group Z∗p . The Diffie–Hellman Problem (DHP) is the problem of com-puting the value of gab (mod p) from the known values of g, p, ga (mod p) andgb (mod p).

Remark There is no doubt that the DHP is no harder than the DLP i.e., if some onecan solve the DLP, then he can compute the secret values a and b of Alice and Bob,respectively, to compute their common key gab . However, the converse is less clearin the sense that if the adversary has an algorithm which can efficiently solve theDHP, then with that algorithm, can the adversary efficiently solve the DLP? Theanswer to this question is still not known.

In the next section we are going to discuss about the celebrated public-key en-cryption scheme known as RSA, based on factorization of integers and simple grouptheoretic techniques.

12.6 RSA Public Key Cryptosystem

In 1977, a year after the publication of the paper by Diffie and Hellman, three re-searchers at MIT developed a practical method to construct a public-key cryptosys-tem. This became known as RSA, after the initials of the three developers: RonRivest, Adi Shamir and Leonard Adelman. RSA is probably the most widely usedpublic-key cryptosystem. It was patented in USA in 1983.

We now explain the RSA cryptosystem (Rivest et al. 1978). But before that weneed a small introduction. Many of us have an impression that regarding compu-tation, computer has the greatest power and computer can compute any thing veryquickly given to it. But unfortunately, there are many computational works that evencomputers cannot do quickly. Let us consider two three digit prime numbers sayp = 101 and q = 113. Let n= pq . Now if we give n to the computer and ask com-puter, by writing a suitable program, to factorize n, the computer will work readily.Now we consider p and q , each being a prime of 512 bits, for example, we may con-sider p = 12735982667070981883239844093975974547292895820146911015162603493560951020761841391134902665367989016813709401453182925841369309737598466522100221796766571 and q = 9815633528541048344036980199411006531775509024061499455934333970333629916904868989032937272369426112046753560494458851516387792268371864577065884840687021, then n =125011738485819573660712032211427685316660097135566900318348291294168657952801258679858048916994784347267833622915865083150656156254866360306001879355302167187240476838112856712813416806772774907378919

Page 547: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.6 RSA Public Key Cryptosystem 533

Table 12.3 Algorithm for RSA public key cryptosystem

• Key Generation Algorithm by Bob:

1. Generate two distinct large prime numbers p and q , each roughly of same size.2. Compute n= pq and φ(n)= (p− 1)(q − 1).3. Select a random integer e with 1 < e < φ(n), such that gcd(e,φ(n))= 1.4. Use the extended Euclidean algorithm to find the integer d , 1 < d < φ(n), such that

ed ≡ 1 (mod φ(n)).5. Make public the public keys n and e (which are known to every body) and keep secret

the private keys p, q , and d (which are known only to Bob).

• Encryption Algorithm for Alice:

1. Obtain Bob’s public key (n, e).2. Represent the message m as an integer from the set {0,1,2, . . . , n− 1}.3. Compute c≡me (mod n).4. Send the cipher text c to Bob.

• Decryption Algorithm for Bob:

1. To obtain the plain text message m, Bob uses his private key d to get m≡ cd (mod n).

535173884158630044034390278552191020034924578825282807318048667680131867741261022374538179761526720006374991 is an 1024 bit number having309 many decimal digits. Now if we input n to a computer and ask it to factorize,then it will not be possible, even for a super computer, to factorize the number n in areasonable time. So for a computer also the factorization of large number which is aproduct of two distinct large primes is considered to be a difficult or hard problem.This is because not yet any efficient algorithm for factorization has been discovered.This inability of computers added a strength to the public-key cryptographic schemeRSA which is described in the next section.

12.6.1 Algorithm for RSA Cryptosystem (Rivest et al. 1978)

Suppose Alice wants to send a secret message to Bob using the RSA public-keycryptosystem. Note that as Alice wants to send the message to Bob, Bob has to takethe initiative to construct his public- and private-key pairs. This step is known as thekey generation step. Alice then collects the public key of Bob and uses the publiclyknown encryption algorithm to get the cipher text. Alice then sends the cipher text toBob through an insecure channel. After receiving the cipher text from Alice, usinghis private key, Bob decrypts the cipher text to get the plain text. The actual stepsfor RSA algorithm are described in Table 12.3.

Thus formally, the RSA cryptosystem is a five-tuple (P,C,K,E,D), whereP = C = Zn, n is the product of two distinct large prime numbers p and q ,K = {(n,p, q, e, d) : ed ≡ 1 (mod φ(n))}, φ(n), known as Euler φ function, isthe number of positive integers not exceeding n and relatively prime to n. Foreach K = (n,p, q, e, d) ∈ K, the encryption function eK is defined by eK(x) =

Page 548: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

534 12 Introduction to Mathematical Cryptography

xe (mod n) and the decryption function dK is defined by dK(y) = yd (mod n),where x, y ∈ Zn. The values n and e are considered to be the public keys while thevalues p, q , and d are considered to be the private keys.

12.6.2 Sketch of the Proof of the Decryption

A natural question that comes to our mind: Is really m≡ cd (mod n)? The sketchof the proof is as follows.

It is given that ed ≡ 1 (mod φ(n)). So there must exist some integer t suchthat ed = 1 + tφ(n). Since m ∈ {0,1,2, . . . , n − 1}, we consider the followingfour cases. Case 1: gcd(m,p) = p and gcd(m,q) = q , (this case happens onlywhen m = 0) Case 2: gcd(m,p) = 1 and gcd(m,q) = 1, Case 3: gcd(m,p) = 1and gcd(m,q) = q and finally, Case 4: gcd(m,p) = p and gcd(m,q) = 1. Ifgcd(m,p)= 1, then by Fermat’s Theorem, mp−1 ≡ 1 (mod p)⇒mt(p−1)(q−1) ≡1 (mod p)⇒m1+t (p−1)(q−1) ≡m (mod p). Now if gcd(m,p)= p, then also theabove equality holds as both sides are equal to 0 modulo p. Hence in both the cases,med ≡ m (mod p). By the same argument it follows that med ≡ m (mod q). Fi-nally, since p and q are distinct prime numbers, it follows that med ≡ m (mod n)

and hence cd ≡ (me)d ≡m (mod n). Hence the result follows.

Note It is currently difficult to obtain the private key d from the public key (n, e).However, if one could factor n into p and q , then one could obtain the privatekey d . Thus the security of the RSA system is based on the assumption that factor-ing is difficult. The discovery of an easy method of factoring would “break” RSAcryptosystem.

Remark The encryption function eK(m) defined by eK(m) = me (mod n), forall m ∈ P and K ∈ K, is a group homomorphism, as eK(m1m2) = (m1m2)

e

(mod n) = eK(m1)eK(m2). For this reason, RSA is known as homomorphic en-cryption scheme.

12.6.3 Some Attacks on RSA Cryptosystem

To understand some of the attacks on RSA cryptosystem, let us first review someof the properties of this cryptosystem. First of all this cryptosystem is deterministicor mono-alphabetic, i.e., the same plain text message will always be encrypted ormapped to the same cipher text. Further, the RSA encryption function is homomor-phic, i.e., eK(x · y)= eK(x)eK(y), for all x ∈ P and for all K ∈K. Based on theseproperties, we provide some of the following attacks on RSA cryptosystem.

• Encrypting short messages using small encryption exponent e: Suppose for theRSA encryption, we are going to encrypt a short message m using a small en-

Page 549: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.6 RSA Public Key Cryptosystem 535

cryption exponent e. Let us illustrate this example for a particular small e assumee to be 3 and the short message m is such that m < n1/3. The only information,regarding the plain text m, that is known to the adversary is that m < n1/3. In thatcase, a very practical attack can be made by the adversary. Note that major advan-tage for the adversary is that the encryption of m does not involve any modularreduction since the integer m3 is less than n. As a result, given the cipher textc ≡m3 (mod n), the adversary can determine m by simply computing m= c1/3

over the integers.• Encrypting same messages using same small encryption exponent e: The above

attack illustrates that short messages can be recovered easily from their smallencryption exponent. Now we extend the attack to the case of arbitrary lengthmessages as long as the same message m which is sent to multiple receiverswith the same small encryption exponent e but with different values of n. Letus illustrate the attack with small exponent e = 3. Let the same message m besent to three different receivers using the three public keys pk1 = (n1,3), pk2 =(n2,3) and pk3 = (n3,3), respectively, where ni = piqi , pi and qi are primes, i =1,2,3. Then the cipher texts are c1 ≡me (mod n1), c2 ≡me (mod n2) and c3 ≡me (mod n3). As the cipher texts reach the receiver through insecure channels,the adversary can get hold of these cipher texts. Note that we may assume thatgcd(ni, nj )= 1, for i �= j , otherwise, the adversary can decrypt the cipher text ci

to get the plain text m by factorizing ni to get pi and qi . Let n= n1n2n3. Then bythe Chinese Remainder Theorem, the adversary can find a unique non-negativevalue c < n such that c ≡ c1 (mod n1), c ≡ c2 (mod n2) and c ≡ c3 (mod n3),i.e., c ≡ m3 (mod n1), c ≡ m3 (mod n2) and c ≡ m3 (mod n3). As n1, n2 andn3 are pairwise relatively prime, we have c ≡m3 (mod n). Observe that m < ni

for all i = 1,2,3. Hence m3 < n. Thus using a similar technique as described inthe last paragraph, the adversary can attack the scheme.

• Encrypting same message using two relatively prime exponents of same modulusn: Suppose Alice wants to send the same message m to two of her employees,say Bob1 and Bob2, using the public keys (n, e1) and (n, e2) of Bob1 and Bob2,respectively, where gcd(e1, e2)= 1. Then the adversary can get hold of the ciphertexts c1 ≡me1 (mod n) and c2 ≡me2 (mod n) of Bob1 and Bob2, respectively.As gcd(e1, e2) = 1, by using Extended Euclidean algorithm, the adversary canfind integers u and v such that ue1 + ve2 = 1. Then the adversary will computecu

1 ·cv2 (mod n). Note that cu

1 ·cv2 (mod n)≡ (m)ue1+ve2 (mod n)≡m (mod n).

Thus from c1 and c2, the adversary will get the message m.• Bidding attack: Suppose one organization has decided to buy some software.

Many software companies produce that software product. But the organizationwants to select the software company through global tendering. That is the orga-nization will publish an advertisement in which they will specify the requirementof the software and will ask for the software companies to submit quotationsagainst that product. The organization will give the project to that software com-pany having minimum quotation. As the organization wants open tendering fortransparency, every body will see what is being sent to the organization. As a re-sult, the software companies will not send the quotation (only the amount, e.g.,

Page 550: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

536 12 Introduction to Mathematical Cryptography

20000000) as plain text form. So they must encrypt the quotation and will sendthe cipher text of that quotation. To get uniformity as well as high security, theorganization decides to use RSA encryption scheme with large primes p and q .Each software company will get the public key (n, e) to encrypt their quotations.Until now it looks like the system is quite safe and useful. However, we shall showthat due to the homomorphic property of the encryption, the RSA encryption isvery much unsafe for the bidding or auction purpose. We shall show how an ad-versary can submit a quotation which is a modification of some valid quotationof some software company. Suppose initially there are k software companies whosubmitted their cipher text of the quotations, say c1, c2, . . . , ck corresponding tothe quotations m1,m2, . . . ,mk , respectively. As the cipher texts will come to theorganization through an insecure channel or the organization may keep the ciphertexts public, the adversary will always be able to get hold of these cipher texts.The aim of the adversary is to submit quotations c′i which is, say 10 % less thanthe original quotation mi , for all i = 1,2, . . . , k. One thing we assume that mi ’sare all multiples of 10. This assumption is quite justified as usually the amount inthe quotations are multiples of 10. Thus to attack the scheme, the adversary willdo the following:

– collect all the cipher texts ci corresponding to the plain text mi , i = 1,2, . . . , k.– construct c′i = ci · (90)e · (100)−e, i = 1,2, . . . , k.– send c′i to the organization, i = 1,2, . . . , k.

Now let us see what is actually happening. Note that c′i = ci · (90)e · (100)−e =(m ·90 ·(100)−1)e . As p and q are large primes, gcd(100, n)= 1. Thus the inverseof 100 in the ring Zn exists and c′i will be simply the cipher text of the plain textm′i which is the 10 % decrease of the value of mi . Thus min{m′1,m′2, . . . ,m′k}<min{m1,m2, . . . ,mk}. As a result, the adversary will always get the project. Thesimilar attack may also be done in case of any on-line auction using RSA encryp-tion scheme in which the adversary can always submit a price which is higherthan all the actually submitted prices.

In the next section, we are going to describe another public-key cryptosystembased on discrete logarithm problem.

12.7 ElGamal Cryptosystem

Though Diffie–Hellman key exchange algorithm provided the first direction towardsthe invention of public-key cryptosystem, it did not achieve the full goal of being apublic-key cryptosystem. The first public-key cryptosystem, as mentioned in the lastsection, was the RSA system. However, though RSA was historically the first one,the most natural development of a public-key cryptosystem based on the discretelog problem and Diffie–Hellman key exchange was developed by ElGamal (1985).In this section we are going to describe the version of the ElGamal cryptosystemwhich is based on the discrete logarithm problem over the finite field Zp . Note thatthe similar construction can also be made generally using the DLP in any group.

Page 551: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.7 ElGamal Cryptosystem 537

Table 12.4 Algorithm forElGamal public keycryptosystem

• Key Generation Algorithm by Bob:

1. Generate a large prime number p.2. Find a primitive element say g of Z∗p . Bob may take help

of some trusted third party in generating the prime p andthe primitive element.

3. Choose a, 1≤ a ≤ p−1 and compute X ≡ ga (mod p).4. Keep a as a secret key and make public the entities g, p,

and X as public keys.

• Encryption Algorithm for Alice:

1. Obtain Bob’s public key.2. Represent the message as an integer m in the interval[1,p− 1].

3. Choose a random ephemeral key k ∈ Zp−1.4. Compute c1 ≡ gk (mod p) and c2 ≡mXk (mod p).5. Send the cipher text (c1, c2) to Bob.

• Decryption Algorithm for Bob:

1. To obtain the plain text message m, Bob uses his privatekey a to compute m≡ (ca

1 )−1 · c2 (mod p).

12.7.1 Algorithm for ElGamal Cryptosystem

Suppose Alice wants to send a secret message to Bob using the ElGamal public-keycryptosystem. The steps for ElGamal algorithm are described in Table 12.4.

Informally, the plain text m is “masked” by multiplying it by Xk to get c2.The value c1 = gk is also transmitted as a cipher text c1. The receiver Bob whoknows the secret key a is able to compute Xk . Thus Bob can “remove the mask”by computing c2(c

a1)−1 (mod p). Thus formally, the ElGamal cryptosystem is

a five-tuple (P,C,K,E,D), where P = Z∗p , C = Z∗p × Z∗p , K = {(p,g, a,X) :X ≡ ga (mod p)} and p is a large prime. The value a is considered as a se-cret key and the entities g, p, and X are considered as the public keys. For eachK = (p,g, a,X) ∈ K and for a secret random ephemeral key k ∈ Zp−1, the en-cryption function eK is defined by eK(m,k) = (c1, c2), where c1 ≡ gk (mod p)

and c2 ≡ mXk (mod p). For c1, c2 ∈ Z∗p , the decryption function is defined as

dK(c1, c2)= c2(ca1)−1 (mod p).

Remark 1 The ElGamal cryptosystem will be insecure if the adversary can computethe value of a, i.e., if the adversary can compute logg X, as in that case, the adver-sary will decrypt the cipher just like Bob does. Thus a necessary condition that theElGamal cryptosystem to be secure is that the Discrete Logarithm Problem in Z∗p isinfeasible.

Remark 2 Due to the use of random ephemeral key k ∈ Zp−1, the encryptionscheme becomes randomized. More specifically, there will be p − 1 many options

Page 552: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

538 12 Introduction to Mathematical Cryptography

of the cipher texts that are the encryption of the same plain text, with the result thatthe encryption scheme as poly-alphabetic.

In the next section we are going to introduce another public-key cryptosystemwhich is a variant of the Rabin encryption scheme. The actual Rabin scheme is verysimilar to the RSA encryption scheme, but with one crucial difference: it is possibleto prove that the Rabin encryption scheme is CPA-secure under the assumption thatfactoring is hard. This equivalence makes the scheme attractive.

12.8 Rabin Cryptosystem

The Rabin cryptosystem was published in 1979 by Michael O. Rabin. The Rabincryptosystem was the first asymmetric cryptosystem for which the security is basedon the fact that it is easy to compute square roots modulo a composite number N

if the factorization of N is known, yet it appears difficult to compute square rootsmodulo N , when the factorization of N is unknown. In other words, the factoringassumption implies the difficulty of computing square roots modulo a composite.However, due to the deterministic encryption nature (i.e., mono-alphabetic nature)of the schemes, the actual Rabin encryption scheme was not chosen plaintext attack(CPA) secure. But a simple variant of original Rabin encryption provides a CPAsecurity. In this section, we shall discuss about a variant of the original Rabin en-cryption scheme which is CPA-secure. For detailed security notions, the reader mayrefer the books (Adhikari et al. 2013; Katz and Lindell 2007).

The preliminaries required to understand the scheme is explained in the nextsection.

12.8.1 Square Roots Modulo N

Finding square roots modulo N = pq , where p and q are distinct primes plays animportant role in constructing the Rabin public-key cryptosystem. The followingproposition provides a characterization of an element y to be a quadratic residuemodulo a composite integer N , where N is a product of two distinct odd primes.

Proposition 12.8.1 Let N = pq where p and q are distinct odd primes andy ∈ Z∗N . Let (yp, yq) denote the corresponding element in Z∗p × Z∗q , where yp ≡y (mod p) and yq ≡ y (mod q). Then y is a quadratic residue modulo N if andonly if yp is a quadratic residue modulo p and yq is a quadratic residue modulo q .

Proof Let y be a quadratic residue modulo N . Then there exists x ∈ Z∗N suchthat x2 ≡ y (mod N). Let for x ∈ Z∗N , (xp, xq) be the corresponding element inZ∗p×Z∗q , where xp ≡ x (mod p) and xq ≡ x (mod q). Thus (xp, xq)2 = (x2

p, x2q) is

Page 553: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.8 Rabin Cryptosystem 539

the corresponding element of x2 in Z∗p×Z∗q , with the result that (x2p, x2

q)= (yp, yq),

which implies that x2p ≡ yp (mod p) and x2

q ≡ yq (mod q). Thus yp is a quadraticresidue modulo p and yq is a quadratic residue modulo q .

Conversely, suppose yp and yq are quadratic residues modulo p and q , respec-tively. Then there exist xp and xq in Z∗p and Z∗q , respectively, such that x2

p ≡yp (mod p) and x2

q ≡ yq (mod q). Then arguing as above, we can say that there

exist x, y ∈ Z∗N such that x2 ≡ y (mod N), with the result that y is a quadraticresidue modulo N . �

The security of the Rabin cryptosystem is based on the fact that it is easy tocompute square roots modulo an odd composite number N = pq if the factorizationof N is known, where p and q are distinct odd primes such that p ≡ q ≡ 3 (mod 4).However, there is no efficient method yet known to compute square roots modulo N

if the factorization of N is not known. In fact, we shall show that computing squareroots modulo N is equivalent to (in the sense that it is equally hard as) factoring N .For that let us prove the following proposition which shows that if we can computethe square roots modulo N = pq , where p and q are distinct odd primes, then wecan find an efficient algorithm for factoring.

Proposition 12.8.2 Let N = pq , where p and q are distinct odd primes. Let a1 anda2 be such that a2

1 ≡ a22 ≡ b (mod N), but a1 �≡ ±a2 (mod N). Then there exists

an efficient algorithm to factor N .

Proof As a21 ≡ a2

2 (mod N), N divides (a1 + a2)(a1 − a2). Thus p divides (a1 +a2)(a1−a2) and hence p divides one of (a1+a2) or (a1−a2). Let p divide a1+a2.The proof is similar if p divides a1 − a2. We claim that q does not divide a1 + a2,as otherwise, N will divide a1+ a2, contradicting the fact that a1 �≡ ±a2 (mod N).Thus q does not divide a1+a2 and hence gcd(N,a1+a2)= p. As the Euclidean al-gorithm to compute gcd of two integers is an efficient one, we can find p efficiently,thereby factor N efficiently. �

Proposition 12.8.3 Let N = pq , where p and q are distinct odd primes of theform p ≡ q ≡ 3 (mod 4). Then every quadratic residue modulo N has exactly onesquare root which is also a quadratic residue modulo N .

Proof As p ≡ q ≡ 3 (mod 4),(−1

p

) ≡ (−1)p−1

2 ≡ (−1) (mod p),(−1

q

) ≡(−1)

q−12 ≡ (−1) (mod q), where

(−1p

)and(−1

q

)denote respectively the Legen-

dre symbols of −1 modulo p and q , respectively. Let y be an arbitrary quadraticresidue modulo N . As N is a product of two distinct primes, y will have four distinctsquare roots modulo N , namely (xp, xq), (−xp, xq), (xp,−xq) and (−xp,−xq).We shall show that out of these four square roots modulo N , exactly one of them isa quadratic residue modulo N . Let

(xp

p

)= 1 and(xq

q

)=−1. Similar arguments are

applicable for other cases. Then(−xq

q

)= (−1q

)(xq

q

)= (−1)(−1)= 1, with the result

Page 554: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

540 12 Introduction to Mathematical Cryptography

Table 12.5 A variant ofRabin public keycryptosystem

• Key Generation Algorithm by Bob:

1. Choose two k-bit primes p and q such that p ≡ q ≡3 (mod 4).

2. Compute N = pq .3. Publish N as public key and p, q are kept secret as pri-

vate keys.

• Encryption Algorithm for Alice:

1. Collect the public key N .2. Let m ∈ {0,1} be the plain text.3. Choose x ∈R QRN and compute C = (c, c′), where c≡

x2 (mod N) and c′ = lsb(x)⊕m, QRN denotes the setof quadratic residues modulo N and lsb denotes the leastsignificant bit of the binary representation of x.

4. Send C to Bob.

• Decryption Algorithm for Bob:

1. Collect C = (c, c′), sent by Alice.2. Compute unique x ∈R QRN such that x2 ≡ c (mod N).

[This is possible due to Proposition 12.8.3]3. Compute m= lsb(x)⊕ c′.

that −xq is a quadratic residue modulo q . Thus by Proposition 12.8.1, (xp,−xq)

is a quadratic residue modulo N . By similar argument it can be shown that each of(xp, xq), (−xp, xq) and (−xp,−xq) cannot be a quadratic residue modulo N . �

Based on the above propositions, we are going to discuss a variant of RabinCryptosystem in Table 12.5 which can be shown to be chosen plain text attack (CPA)secure based solely on the assumption that factorization is hard. As the securitynotions are out of scope for this book, we are not discussing the proof of the CPAsecurity.

12.8.2 Algorithm for a variant of Rabin Cryptosystem

Suppose Alice wants to send message to Bob. Then a variant of Rabin cryptosystemscheme is explained in Table 12.5.

In the Rabin encryption scheme, receiver is required to compute the modularsquare roots. So in the scheme, we first find an algorithm for computing squareroots modulo a prime p ≡ 3 (mod 4) and then extend that to compute squareroots modulo a composite N = pq with known factorization of N , where p ≡ q ≡3 (mod 4). Before doing that let us start with the case for finding square roots mod-ulo a prime p ≡ 3 (mod 4).

Let p = 4k + 3, k = 0,1,2, . . . . Then p+14 is an integer. Let a be a quadratic

residue modulo p. Then(ap

)= 1. This implies that ap−1

2 ≡ 1 (mod p). Multiplying

Page 555: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.9 Digital Signature 541

Table 12.6 Algorithm tocompute four square roots ofa ∈ Z∗N modulo N = pq

having the knowledge offactorization of N , wherep ≡ q ≡ 3 (mod 4)

• Input: Two primes p and q such that N = pq and aquadratic residue a ∈ Z∗N , where p ≡ q ≡ 3 (mod 4).

• Method:

1. Compute ap ≡ a (mod p) and aq ≡ a (mod q).2. Using Lemma 12.8.1, compute two square roots xp and−xp of ap modulo p. Similarly compute xq and −xq ofaq modulo q .

3. Using the Chinese Remainder Theorem, compute thefour elements x1, x2, x3 and x4 in Z∗N correspond-ing to the elements (xp, xq), (−xp, xq), (xp,−xq) and(−xp,−xq), respectively, in Z∗p ×Z∗q .

• Output: Four square roots of a modulo N .

both sides by a, we get a ≡ ap−1

2 +1 ≡ a2k+2 ≡ (ak+1)2 (mod p). Thus ak+1 ≡a

p+14 (mod p) is a square root of a modulo p. The other square root being −ak+1

(mod p). This leads to the following lemma.

Lemma 12.8.1 Let a be a quadratic residue modulo a prime p, where p is a primeof the form 4k + 3, k = 0,1,2, . . . . Then ak+1 (mod p) and −ak+1 (mod p) aretwo square roots of a modulo p.

Proof As p is a prime, a has exactly two distinct square roots modulo p and if x isa square root modulo p, then −x is also a square root modulo p. �

Using Lemma 12.8.1 and the Chinese Remainder Theorem, we can describe thealgorithm as in Table 12.6 to compute square roots of a modulo N = pq providedthe factorization of N is known, where p and q are primes of the form p ≡ q ≡3 (mod 4).

12.9 Digital Signature

In general, a “conventional” handwritten signature of a person attached to a docu-ment is used to specify that the person is responsible for the document. In our dailylife, we use signature while writing a letter, withdrawing money from bank throughcheque or signing a contract, etc. We all have heard about signature, but what is then“digital signature”? Before we come to the concept of digital signature, let us firstexplore some of the examples from real life to review the concept of signature. Sup-pose Alice wants to sell her house for $125,000 and Bob wants to buy the house.Bob receives a signed letter from Alice mentioning that the price of the house is$125,000. When Bob reads the signed letter, he knows that this letter is indeed fromAlice, that is, as long as it is not somebody else forging Alice’s signature. Now thequestion is, how can Bob be absolutely sure that the signed letter comes from Alice

Page 556: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

542 12 Introduction to Mathematical Cryptography

and it is not a forgery? It may happen that somebody else, say an adversary, sendsthe letter to Bob in the name of Alice by copying her signature while actually Alicewanted to sell her house for $225,000. It may further happen that Alice may changeher mind to sell her house for $325,000 and when Bob comes with the letter fromAlice, she may claim that it must be a forgery: she never signed such a letter.

These lead to the following important features of signature:

• Authenticity: It convinces Bob that the signed letter indeed comes from Alice.• Unforgeability: Nobody else but Alice could have signed the message.• Not reusability: The same signature cannot be attached to another message.• Unalterability: Once a message has been signed, it cannot be altered i.e., if Alice

signs on a message m and then claims the same signature s for different messageM , then there should be some mechanism through which Bob can check the cor-rectness. As a result, no one will be able to use the same signature s for differentmessages.

• Non-repudiation: After signing a message, Alice cannot deny that she signed themessage.

Now we are going to define a digital signature scheme. Public-key cryptosystemplays an important role in constructing and defining digital signature. Informally,any signature scheme consists of two components: one is a signing algorithm andthe other is a verification algorithm. Suppose Alice wants to send a digitally signedmessage to Bob. Alice can sign a digital message m by using a signing algorithmsigsk which is based on a secret key sk, known only to Alice, to produce a digitalsignature sigsk(m) for the message m. The resulting signature sigsk(m) can sub-sequently be verified by Bob using a publicly known verification algorithm verpk

based on the public key pk. Thus given a message m and a purported signature s onm, the verification algorithm returns “true” if s is a valid signature on m, else it re-turns “no”. The formal definition of a digital signature scheme is defined as follows.

Definition 12.9.1 A digital signature scheme is a five-tuple (P,A,K,S,V), wherethe following conditions are satisfied:

• P is a finite set of possible messages.• A is a finite set of possible signatures.• K is a finite set of possible keys. K is known as keyspace.• For each key K = (pk, sk) ∈ K, there is a signing algorithm sigsk ∈ S based on

the private key sk and a corresponding verification algorithm verpk ∈ V basedon the public key pk. Each sigsk : P→A and verpk : P ×A→ {true, false} arefunctions such that for all (m, s) ∈ P ×A, the following conditions are satisfied:

verpk(m, s)={

true if s = sigsk(m)

false if s �= sigsk(m).

The pair (m, s) is called a digitally signed message.

Page 557: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.9 Digital Signature 543

Remark Let us now discuss some of the differences between the conventional pen-and-ink signature and the digital signature. In case of a traditional pen-and-ink sig-nature, the signature is an integral part of some document, while in case of digi-tal signature, the digital signature is not attached physically to the message that issigned. In that case, some algorithm is required to somehow “bind” the digital signa-ture with the message. Another difference between these two is from the viewpointof verification. In case of traditional signature, the validity of the signature is verifiedby comparing it with other stored authentic signatures. Clearly, this method is notsecure as someone may forge someone else’s signature. On the other hand, digitalsignatures can be verified by any one using the publicly verifiable algorithm. One ofthe major characteristics of digital signature is that the digital copy of signed digitalmessage is exactly identical with the original one, while a photocopy of a pen-and-ink signature on some document can usually be distinguished from the originaldocument. As a result, in case of digital signature, a certain care must be taken sothat a same digital signature on some document should not be used more than once.For example, suppose Alice signs digitally a cheque of some bank to issue $2000to Bob. So Alice must take some measure while digitally signing the message, i.e.,must put some date or some thing else so that Bob will not be able to reuse the samedigitally signed cheque more than once.

Now let us explore a digital signature scheme which is based on RSA public-keycryptosystem.

12.9.1 RSA Based Digital Signature Scheme

In Sect. 12.6, we have already explored about the celebrated RSA algorithm forpublic-key cryptography. This RSA scheme may also be used to produce a verysimple signature scheme, known as RSA-based digital signature scheme which isalmost the reverse of the RSA public-key cryptosystem. Let us explain the algo-rithm.

Suppose Alice wants to sign digitally a message m and wants to send it to Bob.The algorithm is given in Table 12.7.

Remark 1 Any one can forge the RSA digital signature of Alice by choosing a ran-dom s ∈ Zn and then computing m ≡ se (mod n). Then clearly, s = sigd(m) is avalid signature on the random message m. However, not yet, any efficient methodis found through which we can first choose a meaningful message m and then com-pute the corresponding signature y. In fact, it can be shown that if this could bedone, then the RSA cryptosystem is insecure. Further, due to the homomorphic na-ture of the RSA cryptosystem, it is vulnerable to existential forgery in which it ispossible to generate legitimate message and signature without knowing the privatekey d . For example, if (m1, s1) and (m2, s2) are two pairs of signed messages, then(m1 ·m2, s1 · s2) is also a legitimate signed message.

Page 558: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

544 12 Introduction to Mathematical Cryptography

Table 12.7 Algorithm for RSA based signature scheme

• Key Generation Algorithm by Alice:

1. Generate two distinct large prime numbers p and q , each roughly of same size.2. Compute n= pq and φ(n)= (p− 1)(q − 1).3. Select a random integer e with 1 < e < φ(n), such that gcd(e,φ(n))= 1.4. Use the extended Euclidean algorithm to find the integer d , 1 < d < φ(n), such that

ed ≡ 1 (mod φ(n)).5. Make public the values of n and e (which are known to every body and hence considered

as public keys) and keep secret the private keys p, q , and d (which are known only toAlice).

• Signing Algorithm for Alice:

1. Represent the message as an integer m in the interval [0, n− 1].2. Compute the signature sigd (m)= s ≡md (mod n).3. Send the pair (m, s) to Bob.

• The Verification Algorithm for Bob:

1. Obtain the pair (m, s), the public keys n and e from Alice.2. Compute vere,n(m, s). If m ≡ se (mod n) i.e., if vere,n(m, s) = true, Bob accepts the

signature, else rejects. This works because se ≡med (mod n)≡m (mod n).

Remark 2 There has been a rich literature on various security notions of differenttypes of signature schemes which are out of scope for this book. The reader may readthe book (Katz 2010) for detailed and systematic analysis of signature schemes.

In the next section, we are going to discuss about a very important primitiveknown as oblivious transfer that plays an important role in modern cryptography.

12.10 Oblivious Transfer

Suppose Alice and Bob are very shy. However, they would like to know whether theyare interested in each other or not. So one simple way could be a direct approach toeach other. If both of them will show their interest towards each others, there willnot be a problem. But if one of them will refuse, it could be a problem for the otherdue to face saving. So they need some protocol in which they will be able to figureout if they both agree but in such a way that if they do not then any of them who hasrejected the matter has no clue about the other’s opinion. Moreover they may want tobe able to carry out this protocol publicly over a distance. This problem is known asdating or matching problem. At this point of time, it looks quite complicated. Well,both Alice and Bob may choose some trusted third party to whom both of them mayconfer their decisions and the trusted third party will declare whether both of themagree or not by keeping the decision of the individual secret for ever. But findingsuch a trusted third party is very difficult. However, for this kind of situation, animportant primitive of cryptography, known as oblivious transfer, could be a usefultool.

Page 559: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.10 Oblivious Transfer 545

Informally, an oblivious transfer is a protocol between two players, a sender Sand a receiver R, such that it achieves the following: the sender S has two secretinput bits b0 and b1 while the receiver R has a secret selection bit s. The protocolconsists of a number of exchanges of information between the sender S and thereceiver R. At the end of the protocol, the receiver R obtains the bit bs but withouthaving obtained any information about the other bit b1−s . This is known as sender’ssecurity. On the other hand, the sender S does not get any information about theselection bit s chosen by the receiver R. This is known as the receiver’s security.

Let the output of an oblivious transfer protocol be denoted by OT(b0, b1, s)= bs

for the inputs of the secret bits b0 and b1 of the sender S and the secret selection bits of the receiver R. Observe that bs is actually equal to (1⊕ s) · b0 ⊕ s · b1, where“⊕” denotes the addition of two bits modulo 2 and “·” denotes the binary “AND”of two bits. Note that if s = 0, then OT(b0, b1,0)= (1⊕ 0) · b0 ⊕ 0 · b1 = b0 and ifs = 1, then OT(b0, b1,1)= (1⊕ 1) · b0 ⊕ 1 · b1 = b1.

Now we again come to the problem of dating as discussed at the beginning ofthis section. To apply the oblivious transfer, let us first model this problem math-ematically. Suppose, there are two players, say a Sender S and a Receiver R. Inthe context of the dating problem, we may assume Alice to be Sender and Bob tobe Receiver. As the secret decisions of each of these players are either yes or no,we may assume that each of them has a secret bit, where 1 stands for “yes” and 0stands for “no”. Suppose the Sender S has the secret bit a and the Receiver R hasthe secret bit b. They actually want to compute a · b, i.e., the logical “AND” of thebits a and b such that the following conditions are satisfied:

• None of the sender or receiver is led to accept a false result (this property is knownas correctness).

• Both the sender and the receiver learn the result a · b (this property is known asfairness).

• Each learns nothing more than what is implied by the result and the own input(this property is known as privacy). For example, at the end of the oblivious trans-fer protocol for the dating problem, both Sender and the Receiver will learn a · b.So for the sender (Alice), if a = 1 and she comes to know that a · b= 1, then shegets the information that the secret bit b for the Receiver (Bob) must be 1, whileif the secret bit a of the Sender (Alice) is 0 then a · b is always 0, irrespective ofthe input bit b of the receiver (Bob). Therefore the Receiver’s (Bob’s) choice forb remains unknown to the Sender’s. A similar argument is also applicable whenb= 0.

Now we are in a position to solve the dating problem by using an ObliviousTransfer protocol. Note that we have not yet said any thing about the existence ofsuch Oblivious Transfer protocol. In the next section, we are going to provide anOblivious Transfer protocol. Before that, assuming the existence of such ObliviousTransfer protocol, we are going to provide the following protocol that will solvethe dating problem: Consider Alice to be the Sender and Bob to be the Receiverof an Oblivious Transfer protocol with the inputs for Alice to be the secret bitsb0 = 0 and b1 = a while the secret selection bit for Bob to be s = b. Then we have

Page 560: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

546 12 Introduction to Mathematical Cryptography

OT(0, a, b)= (b⊕1) ·0⊕b ·a = b ·a = a ·b. As an output of the Oblivious Transferprotocol, Bob receives a · b. Finally, Bob sends a · b to Alice so that both of themlearn the result a · b.

Now let us see what are the conditions required to make the protocol secure. Notethat to achieve the correctness and fairness, we have to assume that Bob indeed sendsthe correct value a ·b to Alice. So we have to assume that both Alice and Bob followthe rules of the game but may try to learn as much as possible about the inputs ofthe other players. We call such players as semi-honest players. Further, note thatif b = 0, then a · b is always 0, no matter what the value of the secret input a ofAlice is. Thus the player Bob learns nothing more about a by the properties of theOblivious Transfer protocol. On the other hand, if a = 0, then again from the factthat the Oblivious Transfer protocol does not leak information about b and the factthat in this case Bob returns 0 to Alice in the final step no matter what b is, Alicelearns nothing more about b as a result of the complete protocol.

Assuming the existence of an oblivious transfer protocol, we have solved thedating problem. Now we are going to provide an oblivious transfer protocol basedon RSA cryptosystem, as described in Sect. 12.6.

12.10.1 OT Based on RSA

To construct the RSA based oblivious transfer protocol, we assume that both theplayers, i.e., the Sender and the Receiver are semi-honest. It has been proved byAlexi et al. (1988) that in case of RSA cryptosystem, if a plain text m is chosen atrandom, then given just the cipher text c ≡ me (mod n) along with the values ofn and e, guessing the least significant bit of m i.e., lsb(m) significantly better thanat random is as hard as finding all bits of m. This is called a “hard-core” bit forthe RSA encryption function. The hardness related to the hard-core bit is actuallyexploited to obtain an oblivious transfer by masking the two secret bits b0 and b1 ofthe Sender. Here the Sender has two secret bits b0 and b1 while the Receiver has oneselection bit s. The Sender first starts the key set up steps for the RSA encryptionby choosing two distinct primes p and q and compute n = p · q . For the publickey, the Sender chooses a random e such that gcd(e,φ(n)) = 1, where φ denotesthe Euler phi function. Then for the decryption, the Sender finds d such that ed ≡1 (mod n). Finally, the sender makes public the values of e, n, and keeps secret thevalues of d , p, and q . After the key setup step, the Sender sends the public valuesto the Receiver. The Receiver, having selection bit s, chooses a random plain textms (mod n) and computes the cipher text cs ≡me

s (mod n). The Receiver furtherselects a random integer c1−s modulo n and consider it as another cipher text. Notethat the Receiver can easily find the lsb(ms) while due to the hardness of hard-corebit for RSA encryption function, determining the lsb(m1−s) from c1−s is infeasible.The Receiver sends the cipher text pair (c0, c1) to the Sender. As the Sender hasthe secret key for decryption, she can decrypt the cipher text pair (c0, c1) to get

Page 561: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.11 Secret Sharing 547

Table 12.8 Algorithm for OT based on RSAAlgorithm for Sender:

• Choose two distinct large primes p and q .• Compute n= pq .• Select a random integer e, 1 < e < φ(n), such that gcd(e,φ(n))= 1.• Find the integer d , 1 < d < φ(n), such that ed ≡ 1 (mod φ(n)).• Send the public values n and e to the receiver.• Keep secret the values p, q , and d .• The Sender has two secret bits b0 and b1.

Algorithm for Receiver:

• Collect the public values n and e.• The Receiver has a secret selection bit s.• Choose a random plain text m ∈ Zn and compute the cipher text cs ≡me (mod n).• Select c1−s randomly from Zn as another cipher text.• Send the ordered pair (cs , c1−s ) to the Sender.

Algorithm for Sender:

• Decrypt (c0, c1) to get (m0,m1).• Compute r0 = lsb(m0) and r1 = lsb(m1).• Mask the bits b0 and b1 by computing b′0 = b0 ⊕ r0 and b′1 = b1 ⊕ r1 and send (b′0, b′1) to

receiver.

Algorithm for Receiver:

• Recover bs by computing b′s ⊕ rs .• The bit b1−s remains concealed since he cannot guess r1−s with high enough probability.

the plain text (m0,m1). Let r0 = lsb(m0) and r1 = lsb(m1). Then the Sender masksthe bits b0 and b1 by computing b′0 = b0 ⊕ r0 and b′1 = b1 ⊕ r1 and sends (b′0, b′1)to the Receiver. The Receiver recovers bs by computing b′s ⊕ rs . Note that the bitb1−s remains concealed since the Receiver cannot guess r1−s with high enoughprobability. Note that the selection bit s is unconditionally hidden from the Senderand security of the Sender is guaranteed due to the assumption that the receiver issemi-honest.

The actual algorithm is given in Table 12.8.In the next section we are going to introduce a very important concept of cryp-

tography, known as secret sharing.

12.11 Secret Sharing

Due to the recent development of computers and computer networks, huge amountof digital data can easily be transmitted or stored. But the transmitted data in net-works or stored data in computers may easily be destroyed or substituted by enemiesif the data are not enciphered by some cryptographic tools. So it is very important torestrict access of confidential information stored in a computer or in a certain nodes

Page 562: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

548 12 Introduction to Mathematical Cryptography

of a system. Access should be gained through a secret key, password or token. Againstoring the secret key or password securely could be a problem. The best solutioncould be to memorize the secret key. But for large and complicated secret key, it isalmost impossible to memorize the key. As a result, it should be stored safely. Whilestoring data in a hard disk, the threats such as troubles of storage devices or attacksof destruction make the situation even worse. In order to prevent such attacks, wemay make as many copies of the secret data as possible. But if we have many copiesof the secret data, the secret may be leaked out and hence the number of the copiesshould be as small as possible. Under this circumstances, it is desirable that the se-cret key should be governed by a secure key management scheme. If the key or thesecret data is shared among several participants in such a way that the secret datacan only be reconstructed by a significantly large and responsible group acting inagreement, then a high degree of security is attained.

Shamir (1979) and Blakley (1979), independently, addressed this problem in1979 when they introduced the concept of a threshold secret sharing scheme.A (t, n) threshold scheme is a method whereby n pieces of information, calledshares, corresponding to the secret data or key K , are distributed to n participantsso that the secret key can be reconstructed from the knowledge of any t or moreshares and the secret key cannot be reconstructed from the knowledge of fewer thant shares.

But in reality, there are many situations in which it is desirable to have a moreflexible arrangement for reconstructing the secret key. Given some n participants,one may want to designate certain authorized groups of participants who can usetheir shares to recover the key. This kind of scheme is called general secret sharingscheme.

Formally, a general secret sharing scheme is a method of sharing a secret K

among a finite set of participants P = {P1,P2, . . . ,Pn} in such a way that

1. If the participants in A ⊆ P are qualified to know the secret, then by poolingtogether their partial information, they can reconstruct the secret K ,

2. Any set B ⊂P which is not qualified to know K , cannot reconstruct the secret K .

The key is chosen by a special participant D, called the dealer and it is usuallyassumed that D /∈ P . The dealer gives partial information, called share or shadow,to each participant to share the secret key K . The collection of subsets of participantsthat can reconstruct the secret in this way is called access structure Γ . Γ is usuallymonotone, that is, if X ∈ Γ and X ⊆ X′ ⊆ P , then X′ ∈ Γ . A minimal qualifiedsubset Y ∈ Γ is a subset of participants such that Y ′ /∈ Γ for all Y ′ ⊂ Y . The basisof Γ , denoted by Γ0, is the family of all minimal qualified subsets. A secret sharingscheme is said to be perfect if the condition 2 of the above definition is strengthenedas follows: Any unauthorized group of shares cannot be used to gain any informationabout the secret key that is if an unauthorized subset of participants B ⊂P pool theirshares, then they can determine nothing more than any outsider about the value ofthe secret K .

Page 563: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.11 Secret Sharing 549

12.11.1 Shamir’s Threshold Secret Sharing Scheme

Shamir’s original (t, n)-threshold scheme for n≥ t ≥ 2, given in Shamir (1979), isbased on polynomial interpolation of t points in a two dimensional plane. The basicintuition behind the scheme is that it requires two points to define a unique straightline that passes through these two pints, it requires three points to fully define aunique quadratic passing through these three points, it requires four points to fullydefine a unique cubic and so on. Thus in general, one can fit a unique polynomial ofdegree k − 1 to any set of k points that lie on the polynomial. To construct a (t, n)-threshold scheme, the dealer is going to choose a polynomial f (x) of degree t − 1in a two dimensional plane. Note that any t points on the curve f (x) can determinethe curve f (x) uniquely, i.e., if we are given t or more points on the curve f (x),we can uniquely reconstruct f (x), while there will be infinitely many curves whichpass through any t − 1 or less points on the curve f (x). So t − 1 or less number ofpoints on the curve f (x) cannot reconstruct the curve f (x) uniquely. Thus n pointson the t − 1-degree curve f (x) = a0 + a1x + a2x

2 + · · · + at−1xt−1, with a0 =

secret, are chosen by the dealer for the n participants. To each participant, a pointis given. Thus when t or more participants come together, they can reconstruct thepolynomial f (x) to get the constant coefficient a0 = secret. But for any set of t − 1or less participants come together, they cannot reconstruct a0 uniquely. In fact theywill have infinitely many choices for a0. This intuitive idea helps us in buildingShamir’s (t, n)-threshold secret sharing scheme. Instead of taking a two dimensionalEuclidean plane, Shamir proposed the scheme over a finite field GF[q] having q

elements such that the secret k and the number of participants n is less than q . Letf (x) be a polynomial of degree at most t − 1 over the finite field GF[q] having q

elements. Assume that, for j (1≤ j ≤ t) distinct elements xj of GF[q], the valuesof f (xj ) are known. Hence the system of t linearly independent equations

f (xj )=t−1∑

i=0

aixij ,

in t unknowns a0, a1, . . . , at−1, can be obtained. Lagrange’s interpolation can nowbe used to determine uniquely the t unknowns. So the polynomial can be recoveredfrom the t points. Shamir (1979) used this property of polynomial interpolation toconstruct a t-out-of-n threshold scheme.

For simplicity, take GF[q] to be Zq , for some large prime q such that n ≤ q .This set Zq is the key space, i.e., the secret key K is to be chosen from Zq . InShamir’s scheme a secret K from Zq and then a polynomial f (x) of degree t−1 arechosen by the Dealer in such a way that the constant term of the polynomial is K ,i.e., f (0) = K . The participants are labeled P1,P2, . . . ,Pn. The dealer chooses n

distinct non-zero elements from Zq , say x1, x2, . . . , xn (that is why q ≥ n + 1).These xi ’s are made public. For i = 1,2, . . . , n, participant Pi is given the valuesf (xi) and xi i.e., a point (xi, f (xi)) on the curve f (x), as a share. When any t

participants come together, they can use their shares to recover f (x) and hence

Page 564: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

550 12 Introduction to Mathematical Cryptography

reconstruct the secret K as follows: Suppose the t participants Pi1 ,Pi2, . . . ,Pit wantto find the unknown value K . Each participants Pik has the knowledge of xik andf (xik ). Since the secret polynomial is of degree at most t − 1, the participants mayassume the form of the polynomial as

A(x)= a0 + a1x + a2x2 + · · · + at−1x

t−1,

where ai ’s are unknown elements of Zq with a0 = K , which is actually retrievedas a key by the qualified set participants. The aim of the participants is to find a0from their shares. Now f (xik )=A(xik ), 1≤ k ≤ t . When the t participants come to-gether, they can obtain t linear equations in the t unknowns a0, a1, . . . , at−1, whereall the operations are done in Zq . Now if the equations are linearly independent, theparticipants will get a unique solution to the system of equations and a0 = K willbe revealed as the key. We show using Vandermonde matrix that these system ofequations has always a unique solution. Note that this system of equations can bewritten as

a0 + a1xi1 + a2x2i1+ · · · + at−1x

t−1i1= f (xi1)

a0 + a1xi2 + a2x2i2+ · · · + at−1x

t−1i2= f (xi2)

. . .

a0 + a1xit + a2x2it+ · · · + at−1x

t−1it= f (xit ).

This can be written in a matrix form as follows:⎡

⎢⎢⎢⎢⎣

1 xi1 x2i1

. . . xt−1i1

1 xi2 x2i2

. . . xt−1i2

· · · · · · · · · · · · · · ·1 xit x2

it. . . xt−1

it

⎥⎥⎥⎥⎦

⎢⎢⎣

a0a1· · ·

at−1

⎥⎥⎦=

⎢⎢⎣

f (xi1)

f (xi2)· · ·f (xit )

⎥⎥⎦ .

The coefficient matrix is known as Vandermonde matrix and its determinant is ofthe form

1≤j<k≤t

(xik − xij ) (mod q).

Since Zq is a field and xi ’s are all distinct, the determinant of the coefficient matrixis always non-zero and hence the system of equations has a unique solution. Thisshows that any group of t participants can recover the key in this threshold scheme.

Now we will show what will happen if a group of t − 1 or less participants try tocompute the secret key K? Assume that t − 1 participants wish to collaborate andtry to guess the secret. The t − 1 participants generate a set of t − 1 equations in t

unknowns. These equations have as their solution a set of q polynomials

f (x)= a0 +t−1∑

i=1

aixi,

Page 565: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 551

where a0 ranges over all the elements of Zq . Hence each of the possible keys isequally likely. This proves that the scheme is perfectly secure.

Remark Note that Shamir’s secret sharing scheme is a single use secret sharingscheme for single secret. For multi-use, multi-secret sharing schemes, the readermay refer to Das and Adhikari (2010).

In the next section, we are going to discuss about a special kind of secret sharingscheme, known as visual cryptography.

12.12 Visual Cryptography

Most of the secret sharing schemes are based on algebraic calculations in theirrealizations. But there are some different realizations from ordinal secret sharingschemes. Visual cryptography is one such secret sharing scheme. In visual cryptog-raphy, the problem is to encrypt some written material (handwritten notes, printedtext, pictures, etc.) in a perfectly secure way in such a manner that the decoding maybe done visually, without any cryptographic computations. The concept of visualcryptography was first proposed by Naor and Shamir (1994). Visual cryptographicscheme for a set P of n participants is a cryptographic paradigm that enables a secretimage to be split into n shadow images called shares, where each participant in Preceives one share. Certain qualified subsets of participants can “visually” recoverthe secret image with some loss of contrast, but other forbidden sets of participantshave no information about the secret image. The collection of all qualified subsets isdenoted by ΓQual and the collection of all forbidden subsets is denoted by ΓForb. Thepair (ΓQual,ΓForb) is called the access structure of the scheme. A participant P ∈ Pis an essential participant if there exists a set X ⊆ P such that X ∪ {P } ∈ ΓQualbut X /∈ ΓQual. Typically, in a (k, n)-Visual Cryptographic Scheme ((k, n)-VCS),a page of secret image/text is encrypted to generate n pages of cipher text whichmay be printed on n transparency sheets. If k − 1 or less number of transparencysheets are superimposed, it will give no information on the secret image and willbe indistinguishable from random noise. However, if any k of the transparencies arestacked together, the secret image will be revealed. So in a (k, n)-VCS, there is asecret image and a set of n persons, called participants. The secret image is splitinto n shadow images, called shares and each participant receives one share. k − 1or less many participants cannot decipher the secret image from their shares but anyk or more participants may together recover the secret image by photocopying theshares given to the participants onto transparencies and then stacking them. Sincethe reconstruction is done by human visual system, no computations are involvedduring decoding unlike traditional cryptographic schemes where a fair amount ofcomputations is needed to reconstruct the plain text.

In this section, we shall discuss different techniques for black and white visualcryptography in which the secret is a black and white image made up of black and

Page 566: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

552 12 Introduction to Mathematical Cryptography

Fig. 12.1 (2,2)-VCS for black and white image

white pixels. Two parameters are very important in visual cryptography, namelythe pixel expansion and the contrast. Pixel expansion is the number of pixels, onthe transparencies corresponding to the shares (each such pixel is called subpixel),needed to encode one pixel of the original secret image. On the other hand, thecontrast is the clarity with which the reconstructed image is visible.

Now let us explain how a visual cryptographic scheme may be constructed.

12.12.1 (2,2)-Visual Cryptographic Scheme

Suppose we have a secret black and white image i.e., the image is made up of onlyblack and white pixels. Now suppose we want to distribute the secret image as sharesamong a set of two participants in such a way that from a single share it is notpossible to decode the secret image, but if both of the participants come togetherand superimpose their shares they will be able to decode the secret image. Thisscheme is known as the (2,2)-Visual Cryptographic Scheme (in short (2,2)-VCS),illustrated in Fig. 12.1.

Naor and Shamir (1994) devised the following scheme for the (2,2)-VCS. Thealgorithm specifies how to encode a single pixel and it would be applied for everypixel in the image to be shared. A pixel P is split into two pixels in each of the twoshares (each such pixel in the shares is called subpixel). If P is white, then a cointoss is used to randomly choose one of the first two rows in Fig. 12.2.

If P is black, then a coin toss is used to randomly choose one of the last two rowsin Fig. 12.2. Then the pixel is encrypted as two subpixels in each of the two shares,as determined by the chosen row in Fig. 12.2. Every pixels is encrypted using a newcoin toss.

Suppose we look at the two subpixels, in the first share, corresponding to thepixel P in the secret image. One of these two subpixels is black and the other iswhite. Moreover, each of the two possibilities “black-white” and “white-black” is

Page 567: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 553

Fig. 12.2 (2,2)-VCS forblack and white image

equally likely to occur, independent of whether the corresponding pixel in the secretimage is black or white. Thus just by looking at the first share it is not possible topredict whether the subpixels in the share correspond to a black or white pixel in thesecret image. The same argument is applicable for the second share also. Since allthe pixels in the secret image were encrypted using independent random coin flips,there is no information to be gained by looking at any group of pixels on a share,either. This demonstrates the security of the scheme.

Now we consider the situation when two shares are superimposed. In Fig. 12.2it is shown in the last column. If the pixel P in the original image is black thenafter superimposition of two shares, we get two black subpixels in the superimposedimage, whereas if P is white then after superimposition of two shares we get onewhite and one black subpixels in the superimposed image. Thus we can say that inthis particular case the reconstructed pixel has grey level of 1 if P is black and a greylevel of 1/2 if P is white. So we see that in case of a white pixel in the secret image,there will be 50 % loss of contrast in the reconstructed image, but it should still bevisible.

Now we shall explain mathematically the (2, 2)-VCS as described in Fig. 12.2.First let us try to explain the phenomenon of superimposition of transparenciesmathematically. Note that when a black pixel, printed on a transparency, is superim-posed over a white pixel, printed on a transparency (actually left blank), as a visualeffect, we get a black pixel. Similarly, if both the pixels are black, the superimposedpixel will look black. The superimposed pixel will look white only when both thepixels are white. Now let us denote the superimposition operation by “∗”, a whitepixel by 0 and a black pixel by 1. Then, as mentioned above, we have 1 ∗ 1 = 1,1 ∗ 0 = 1, 0 ∗ 1 = 1 and 0 ∗ 0 = 0. If we look at the operation ∗ little carefully, itreveals that operation ∗ is noting but the Boolean “or” operation. Thus the superim-position of two pixels is simply the Boolean “or” operation.

Now let us explain the share distribution algorithm, as descried in Fig. 12.2,mathematically. As mentioned earlier, if the pixel of the secret image is 0, then one0 pixel and one 1 pixel is given to the first share holder, while one 0 pixel and one 1pixel is given to the second share holder. The same thing may also be done by givingone 1 pixel and one 0 pixel to the first share holder, while one 1 pixel and one 0 pixelto the second share holder. On the other hand, for a black pixel in the secret image,

Page 568: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

554 12 Introduction to Mathematical Cryptography

one 0 pixel and one 1 pixel is given to the first share holder, while one 1 pixel andone 0 pixel is given to the second share holder. The same thing may also be doneby giving one 1 pixel and one 0 pixel to the first share holder, while one 0 pixel andone 1 pixel to the second share holder. This phenomenon may be explained by thetwo 2× 2 Boolean matrices S0 and S1 given as follows:

S0 =[

0 10 1

]and S1 =

[0 11 0

].

These two matrices are called basis matrices of the (2,2)-VCS. First we observe thatthe two rows of S0 correspond to the “white-black” and “white-black” combinationsas given in the first line of the third column of Fig. 12.2. Similarly, the two rows ofS1 correspond to the “white-black” and “black-white” combinations as given in thethird line of the third column of Fig. 12.2. Now if we interchange the columns of S0,we see that the two rows of S0 correspond to the “black-white” and “black-white”combinations as given in the second line of the third column of Fig. 12.2. Similarly,if we interchange the columns of S1, we see that the two rows of S1 correspondto the “black-white” and “white-black” combinations as given in the fourth line ofthe third column of Fig. 12.2. That is why, S0 and S1 are called the basis matricesbecause these matrices can construct the (2,2)-VCS as follows.

Let the pixel P in the secret image be black. Since P is black, we use S1, thebasis matrix corresponding to the black pixel. We apply a random permutation onthe columns of S1 and let the resulting matrix be T 1. We give the first row of T 1

to the first participant as share and second row to the second participant as share.Similar procedure holds if P is a white pixel. Now for the security analysis, if welook at any individual share, it may be either “0 1” or “1 0”. But both these patternsare present for both the black and white pixels. So just by looking at an individualshare, it is not possible to predict correctly from which matrix it has come, i.e., withprobability 1

2 , we can guess from which matrix it has come. Note that any personhaving no share can also guess with probability 1

2 . Thus with only one share, anyparticipant will not have any extra privilege over any person having no share. Butif we superimpose two shares, for black pixel we get “1 1”, while for white pixeleither we get “1 0” or “0 1”. So we can distinguish the black and white pixels in thesuperimposed image. Thus to construct a VCS, we only need to construct the basismatrices S0 and S1.

One thing we note that in the above (2,2)-VCS, for each pixel we are giving twosubpixels to each share. So the size of the share will increase. The number of sub-pixels required to encode one pixel of the secret image (i.e., the number of columnsof the basis matrices S0 or S1) is known as pixel expansion. In the above (2,2)-VCSthe pixel expansion is 2. Pixel expansion determines the size of the share. In visualcryptography we want the pixel expansion to be as small as possible.

Another parameter is very important in visual cryptography. That parameter isknown as relative contrast. In order that the recovered image is clearly discernible,it is important that the grey level of a black pixel be darker than that of a white pixel.Informally, the difference in the grey levels of the two pixels is called contrast. Wewant the contrast to be as large as possible. Here the relative contrast is 2−1

2 = 1/2.

Page 569: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 555

Fig. 12.3 (k, n)-VCS for black and white image

12.12.2 Visual Threshold Schemes

A (k, n)-threshold structure is any access structure (ΓQual,ΓForb) in which

Γ0 ={B ⊆P : |B| = k

}

and

ΓForb ={B ⊆P : |B| ≤ k − 1

}.

In any (k, n)-threshold VCS, the image is visible if any k or more participants stacktheir transparencies (as shown in Fig. 12.3), but totally invisible if fewer than k

transparencies are stacked together or analyzed by any other method. In a strong(k, n)-threshold VCS, the image remains visible if more than k participants stacktheir transparencies.

12.12.3 The Model for Black and White VCS

Let P = {1, . . . , n} be a set of elements called participants and let 2P denote the setof all subsets of P . Let ΓQual and ΓForb be subsets of 2P , where ΓQual ∩ ΓForb = ∅.We will refer to members of ΓQual as qualified sets and the members of ΓForb asforbidden sets. The pair (ΓQual,ΓForb) is called the access structure of the scheme.In general, ΓQual ∪ ΓForb need not be 2P .

Let Γ0 = {A |A ∈ ΓQual ∧ ∀A′ ⊂A,A′ /∈ ΓQual} be the collection of all minimalqualified sets.

A participant P ∈ P is an essential participant if there exists a set X ⊆ P suchthat X∪ {P } ∈ ΓQual but X /∈ ΓQual. If a participant P ∈P is not an essential partic-ipant, then we call the participant as a non-essential participant.

Page 570: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

556 12 Introduction to Mathematical Cryptography

Let Γ ⊆ 2P \ {∅} (Γ ⊆ 2P ). If A ∈ Γ and A ⊆ A′ ⊆ P (A′ ⊆ A ⊆ P) impliesA′ ∈ Γ then Γ is said to be monotone increasing (decreasing) on P . If ΓQual ismonotone increasing, ΓForb is monotone decreasing and ΓQual ∪ ΓForb = 2P , thenthe access structure is called strong and Γ0 is called a basis. A visual cryptographicscheme with a strong access structure will be termed as a strong visual cryptographyscheme. In this paper we mostly deal with strong access structures. However, somepart of the paper deals with some restricted access structure. Throughout this paper,we presume that ΓQual ∪ ΓForb = 2P . So any X ⊆ P is either a qualified set or aforbidden set of participants.

We further assume that the secret image consists of a collection of black andwhite pixels, each pixel being shared separately. To understand the sharing processconsider the case where the secret image consists of just a single black or whitepixel. On sharing, this pixel appears in the n shares distributed to the participants.However, in each share the pixel is subdivided into m subpixels. This m is calledthe pixel expansion i.e., the number of pixels, on the transparencies correspondingto the shares (each such pixel is called subpixel), needed to represent one pixel ofthe original image. The shares are printed on transparencies. So a “white” subpixelis actually an area where nothing is printed and left transparent. We assume that thesubpixels are sufficiently small and close enough so that the eye averages them tosome shade of grey.

In order that the recovered image is clearly discernible, it is important that thegrey level of a black pixel be darker than that of a white pixel. Informally, the dif-ference in the grey levels of the two pixel types is called contrast. We want thecontrast to be as large as possible. Three variables control the perception of blackand white regions in the recovered image: a threshold value (t), a relative contrast(α(m)) and the pixel expansion (m). The threshold value is a numeric value thatrepresents a grey level that is perceived by the human eye as the color black. Thevalue α(m) ·m is the contrast, which we want to be as large as possible. We requirethat α(m) ·m≥ 1 to ensure that black and white areas will be distinguishable.

Notations Consider an n × m Boolean matrix M and let X ⊆ {1,2, . . . , n}. ByM[X] we will denote the |X| × m submatrix obtained from M by retaining onlythe rows indexed by the elements of X. MX will denote the Boolean “or” of therows of M[X]. The Hamming weight w(V ) is the number of 1’s in a Boolean vec-tor V .

Definition 12.12.1 Let (ΓQual,ΓForb) be an access structure on a set of n partici-pants. Two collections (multisets) of n×m Boolean matrices C0 and C1 constitutea visual cryptography scheme (ΓQual,ΓForb,m)-VCS if there exist values α(m) and{tX}X∈ΓQual satisfying:

1. Any (qualified) set X = {i1, i2, . . . , ip} ∈ ΓQual can recover the shared image bystacking their transparencies.

(Formally, for any M ∈ C0, MX the “or” of the rows i1, i2, . . . , ip satisfiesw(MX)≤ tX − α(m) ·m; whereas, for any M ∈ C1 it results in w(MX)≥ tX .)

Page 571: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 557

2. Any (forbidden) set X = {i1, i2, . . . , ip} ∈ ΓForb has no information on the sharedimage.

(Formally, the two collections of p×m matrices Dt , with t ∈ {0,1}, obtainedby restricting each n×m matrix in Ct to rows i1, i2, . . . , ip are indistinguishablein the sense that they contain the same matrices with the same frequencies.)

12.12.4 Basis Matrices

To construct a visual cryptographic scheme, it is sufficient to construct the basismatrices corresponding to the black and white pixel. In the following, we formallydefine what is meant by basis matrices.

Definition 12.12.2 (Adapted from Blundo et al. (1999)) Let (ΓQual,ΓForb) be anaccess structure on a set P of n participants. A (ΓQual,ΓForb,m)-VCS with relativedifference α(m) and a set of thresholds {tX}X∈ΓQual is realized using the n×m basismatrices S0 and S1 if the following two conditions hold:

1. If X = {i1, i2, . . . , ip} ∈ ΓQual, then S0X , the “or” of the rows i1, i2, . . . , ip of S0,

satisfies w(S0X)≤ tX − α(m) ·m; whereas, for S1 it results in w(S1

X)≥ tX .2. If X = {i1, i2, . . . , ip} ∈ ΓForb, the two p×m matrices obtained by restricting S0

and S1 to rows i1, i2, . . . , ip are equal up to a column permutation.

12.12.5 Share Distribution Algorithm

We use the following algorithm to encode the secret image. For each pixel P in thesecret image, do the following:

1. Generate a random permutation π of the set {1,2, . . . ,m}.2. If P is a black pixel, then apply π to the columns of S1; else apply π to the

columns of S0. Call the resulting matrix T .3. For 1≤ i ≤ n, row i of T comprises the m subpixels of P in the ith share.

12.12.6 (2,n)-Threshold VCS

In this section we consider only (2, n)-VCS for black and white images. In Naor andShamir (1994), Naor and Shamir first proposed a (2, n)-VCS for black and white im-ages. They constructed the 2-out-of-n visual secret sharing scheme by considering

Page 572: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

558 12 Introduction to Mathematical Cryptography

the two n× n basis matrices S0 and S1 given as follows.

S0 =

⎢⎢⎢⎣

1 0 0 . . . 01 0 0 . . . 0...

......

. . ....

1 0 0 . . . 0

⎥⎥⎥⎦

S1 =

⎢⎢⎢⎣

1 0 0 . . . 00 1 0 . . . 0...

......

. . ....

0 0 0 . . . 1

⎥⎥⎥⎦

S0 is a Boolean matrix whose first column comprises 1’s and whose remainingentries are 0’s. S1 is simply the identity matrix of dimension n.

When we encrypt a white pixel, we apply a random permutation to the columnsof S0 to obtain matrix T . We then distribute row i of T to participant i. To encrypta black pixel, we apply the permutation to S1. A single share of a black or whitepixel consists of a randomly placed black subpixel and (n − 1) white subpixels.Two shares of a white pixel have a combined Hamming weight of 1, whereas anytwo shares of a black pixel have a combined Hamming weight of 2, which looksdarker. The visual difference between the two cases becomes clearer as we stackadditional transparencies.

To exemplify this discussion, let us take a concrete example of a (2,4) VCS. Thebasis matrices S0 and S1 in this case are given by

S0 =

⎢⎢⎣

1 0 0 01 0 0 01 0 0 01 0 0 0

⎥⎥⎦ and S1 =

⎢⎢⎣

1 0 0 00 1 0 00 0 1 00 0 0 1

⎥⎥⎦ .

If one examines just a single share then it is impossible to determine whetherit represents a share of a black or a white pixel since single shares, whether blackor white, look alike. If two shares of a black pixel are superimposed together, weobtain two black and two white subpixels. Combining the shares of a white pixelyields only one black and three white subpixels. Therefore, on stacking two shares,a black pixel will look darker than a white pixel. In the above example the pixelexpansion is 4 and the relative contrast for any two participants is 1/4.

12.12.7 Applications of Linear Algebra to Visual CryptographicSchemes for (n,n)-VCS

Let us construct an (n,n)-VCS, i.e., the secret image is distributed among a setP = {1,2, . . . , n} of n participants in such a way that if all the n participants su-

Page 573: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 559

perimpose their shares, they get back the secret image as a superimposed image,but a set of n − 1 or less number of participants will get no information aboutthe secret image. So here Γ0 = {{1,2, . . . , n}}. As we mentioned earlier, to con-struct the scheme, it is sufficient to construct the basis matrices. To generate thebasis matrices, the dealer first associates with each participant i a variable xi ,i = 1,2, . . . , n. Then the dealer considers the two following systems of linear equa-tions over Z2:

fP = 0 (12.1)

fP = 1, (12.2)

where fP = x1 + x2 + · · · + xn. Clearly, the set of all solutions of (12.1) over Z2

forms a vector space over Z2. Let S0 and S1 be the Boolean matrices whose columnsare just all possible solutions of (12.1) and (12.2) respectively over the binary field.Then it can be shown that S0 and S1 satisfy all the two properties of the Defini-tion 12.12.1 and thereby form basis matrices of the (n,n)-VCS having pixel ex-pansion m= 2n−1. For more details, the reader may refer to the following theoremfrom Adhikari (2013).

Theorem 12.12.1 Let P = {1,2, . . . , n} be a set of n participants. Then there ex-ists an (n,n)-VCS with black and white images having optimal pixel expansionm= 2n−1 and relative contrast α(m)= 1/2n−1.

To understand the scheme, let us consider the following example.

Example 12.12.1 Let us construct a (4,4)-VCS scheme. As there are four par-ticipants, namely 1, 2, 3, and 4, we associate a variable xi to the ith participant,for i = 1,2,3,4. Now we consider the following two systems of linear equationsover Z2:

x1 + x2 + x3 + x4 = 0 (12.3)

x1 + x2 + x3 + x4 = 1. (12.4)

Let S0 and S1 be the Boolean matrices whose columns are just all possible so-lutions of (12.3) and (12.4), respectively, over the binary field. Then S0 and S1 aregiven by

S0 =

⎢⎢⎣

0 0 0 0 1 1 1 10 0 1 1 0 0 1 10 1 0 1 0 1 0 10 1 1 0 1 0 0 1

⎥⎥⎦ and S0 =

⎢⎢⎣

0 0 0 0 1 1 1 10 0 1 1 0 0 1 10 1 0 1 0 1 0 11 0 0 1 0 1 1 0

⎥⎥⎦ .

In (4,4)-VCS, if all the four participants come together to superimpose their shares,then only the secret image should be visible. To ensure that we need to check that

Page 574: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

560 12 Introduction to Mathematical Cryptography

these two matrices really satisfy the conditions of the basis matrices as in Defini-tion 12.12.1. Note that if X = {1,2,3,4}, i.e., if the set X of four participants cometogether and if we assume tX = 8, m= 8 and α(m)= 1

8 , then S0X , the “or” of all the

four rows of S0, satisfies w(S0X)≤ tX − α(m) ·m= 8− 1

8 · 8= 7 whereas, for S1,w(S1

X) ≥ tX = 8. To check the second property of the Definition 12.12.1, we seethat for any X ⊂ {1,2,3,4} with |X| ≤ 3, S0[X] and S1[X] are identical up to col-umn permutation. For example, if we take X = {2,3,4} and consider S0[X] andS1[X], then we see that both the matrices contain identical patters, i.e., exactly one(0 0 1)t column, exactly one (0 1 0)t column, exactly one (1 0 0)t column, exactlyone (1 1 1)t column, exactly one (0 0 0)t column, exactly one (0 1 1)t column, ex-actly one (1 0 1)t column and exactly one (1 1 0)t column. So the restricted matricesS0[X] and S1[X] are identical up to column permutation.

12.12.8 Applications of Linear Algebra to Visual CryptographicSchemes for General Access Structure

In this section we are going to show how liner algebra may play an important role inconstructing visual cryptographic schemes for general access structure. Until nowwe have discussed about the schemes for (2, n)-VCS for (n,n)-VCS. But for morepractical applications, we need more flexibility on the access structure. Let us startwith an example.

Example 12.12.2 Let us consider a strong access structure on a set of 5 participantshaving the access structure (ΓQual,ΓForb) with Γ0 = {{1,2}, {3,4}, {2,3}, {3,5}}. Toconstruct a VCS for the above mentioned access structure, let us first divide the setΓ0 into two parts namely Γ01 = {{1,2}, {3,4}} and Γ02 = {{2,3}, {3,5}}. For Γ01,let us consider the two following systems of linear equations over the binary field asfollows:

x1 + x2 = 0x3 + x4 = 0

x5 = 0

⎫⎬

⎭ (12.5)

x1 + x2 = 1x3 + x4 = 1

x5 = 0

⎫⎬

⎭ (12.6)

Let S01 and S1

1 be the Boolean matrices whose columns are just all possible so-lutions of the above two systems of (12.5) and (12.6), respectively, over the binaryfield.

Page 575: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 561

Fig. 12.4 RSA key generation algorithm in SAGE

Thus

S01 =

⎢⎢⎢⎢⎣

0 0 1 10 0 1 10 1 0 10 1 0 10 0 0 0

⎥⎥⎥⎥⎦and S1

1 =

⎢⎢⎢⎢⎣

0 0 1 11 1 0 00 1 0 11 0 1 00 0 0 0

⎥⎥⎥⎥⎦.

We further consider the two following systems of linear equations over the binaryfield:

x2 + x3 = 0x3 + x5 = 0

x1 = 0x4 = 0

⎫⎪⎪⎬

⎪⎪⎭(12.7)

x2 + x3 = 1x3 + x5 = 1

x1 = 0x4 = 0

⎫⎪⎪⎬

⎪⎪⎭(12.8)

Page 576: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

562 12 Introduction to Mathematical Cryptography

Table 12.9 RSA keygeneration algorithm

#Key Generation algorithm for RSA Cryptosystem@interactdef RSA_key_gen( bits = (32 .. 512) ):

p = next_prime( randint(2∧(bits-1), 2∧(bits)) )q = next_prime( randint(2∧(bits-1), 2∧(bits)) )N = p*qphiN = (p-1)*(q-1)e = 2∧16 - 1while gcd(e, phiN) != 1:

e = randint(17, 2∧(bits))e1 = mod(e, phiN)d1 = e1∧(-1)d = ZZ(d1)print ′——————— \n ′print ′ the public keys are: ′print ′N=′,Nprint ′e=′,eprint ′———————– \n′print ′the private keys are:′print ′p=′,pprint ′q=′,qprint ′d=′,dprint ′———————–\n′

As before,

S02 =

⎢⎢⎢⎢⎣

0 00 10 10 00 1

⎥⎥⎥⎥⎦and S1

2 =

⎢⎢⎢⎢⎣

0 01 00 10 01 0

⎥⎥⎥⎥⎦.

Finally,

S0 = S01 ||S0

2 =

⎢⎢⎢⎢⎣

0 0 1 1 0 00 0 1 1 0 10 1 0 1 0 10 1 0 1 0 00 0 0 0 0 1

⎥⎥⎥⎥⎦and

S1 = S11 ||S1

2 =

⎢⎢⎢⎢⎣

0 0 1 1 0 01 1 0 0 1 00 1 0 1 0 11 0 1 0 0 00 0 0 0 1 0

⎥⎥⎥⎥⎦

form the basis matrices for the given access structure having pixel expansion 6.

Page 577: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.12 Visual Cryptography 563

Fig. 12.5 Output of RSA key generation algorithm in SAGE

The above example actually follows from the following theorem proved in Ad-hikari (2013).

Theorem 12.12.2 For any given strong access structure (ΓQual,ΓForb) on a setP = {1,2, . . . , n} of n participants with Γ0 = {B1,B2, . . . ,Bk} where Bi ⊆P , ∀i =1,2, . . . , k and for any permutation σ ∈ Sk , the symmetric group of degree k, thereexists a strong visual cryptographic scheme (ΓQual,ΓForb,m) on P with m = mσ ,where mσ is given as follows:

mσ ={∑l

i=1 2|Bσ(2i−1)∪Bσ(2i)|−2 if k = 2l, l ≥ 1∑l

i=1 2|Bσ(2i−1)∪Bσ(2i)|−2 + 2|Bσ(2l+1)|−1 if k = 2l + 1, l ≥ 0.

Remark As a particular case of a general access structure, we can get a (k, n)-threshold scheme. For example, if we want to construct a (3,5)-threshold VCS,we can consider the Γ0 = {{1,2,3}, {1,2,4}, {1,2,5}, {1,3,4}, {1,3,5}, {1,4,5},{2,3,4}, {2,3,5}, {2,4,5}, {3,4,5}} and apply Theorem 12.12.2 to get the (3,5)-VCS.

So, in general, we may have the following theorem for (k, n)-VCS as provedin Adhikari (2013).

Page 578: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

564 12 Introduction to Mathematical Cryptography

Fig. 12.6 RSA encryption algorithm in SAGE

Theorem 12.12.3 Let (ΓQual,ΓForb) be an access structure on a set P = {1,2,

. . . , n} of n participants with Γ0 = {A⊆ P : |A| = k}, 2≤ k ≤ n. Then there existsa strong (k, n)-VCS with

mour ={

l · 2k−2, if l = (nk

)is even

(l + 1) · 2k−2, if l = (nk

)is odd

and relative contrast α(m)= 1mour

.

Remark For further studies, the readers may refer (Adhikari and Sikdar 2003; Ad-hikari and Bose 2004; Adhikari et al. 2004, 2007; Adhikari and Adhikari 2007;Adhikari 2006, 2013; Ateniese et al. 1996a,b; Blundo et al. 1999, 2003; Naor andShamir 1994).

In the next section, we are going to discuss about a nice application of open-source software, known as, SAGE for the implementation of cryptographic schemeswith very large integers having many digits, such as, integers having more than 300

Page 579: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 565

Fig. 12.7 Output of RSA encryption algorithm in SAGE

digits. For actual implementation of public-key cryptographic schemes, such bignumbers are essential. In the next section, we show how to deal with these numbers.

12.13 Open-Source Software: SAGE

Let us start our discussion with open-source software. Free and open-source soft-ware (FOSS) or free/libre/open-source software (FLOSS) are a class of softwaresthat are not only free softwares but also open source in the sense that these areliberally licensed to grant users the right to use, copy, study, change, and improvetheir designs through the availability of their source codes. This novel approach hasgained both momentum and acceptance, as the potential benefits have been increas-ingly recognized by both individuals and corporations. SAGE is one of such usefuloutcomes of such approach. SAGE (System for Algebra and Geometry Experimen-tation) is free as well as open-source mathematics software that is very much usefulfor research and teaching in algebra, geometry, number theory, cryptography, nu-merical computation and related areas. The overall goal of SAGE is to create aviable, free, open-source alternative to the costly mathematical computational soft-wares, such as, Maple, Mathematica, Magma, and MATLAB. SAGE is sometimescalled SAGEMATH to distinguish it from other uses of the word. Historically, thefirst version of SAGE was released on 24 February 2005 as free and open-sourcesoftware under the terms of the GNU General Public License. The originator and

Page 580: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

566 12 Introduction to Mathematical Cryptography

Table 12.10 RSA encryption algorithm using SAGE# RSA encryption algorithmfrom sage.crypto.util import ascii_to_bin, bin_to_ascii@interactdef RSA_encryption (txt = ′′Test for RSA′ ′, bits = (32 .. 512),N=12268090136639592443,e=2967411197):

btxt = ascii_to_bin( txt) #it converts the ASCII to binary, to use it we need to# import ascii_to_bin as written in the first line of the#program. ascii_to_bin outputs a binary string.

lbtxt = len(btxt) #the function len provides the length of any stringlen_block = 2*bits/2 #length of each block of the plain text, note that if we take

# len_block=2*bits, then it might exceed the range of Nnumber_of_blocks = ceil( lbtxt / len_block ) #number of plain text blockscblockarray=[ ] #it will contain the binary representation of c=m∧e(mod n),

#corresponding to each blockcarray=[ ] # it will contain required number of zeros to be appended at the left of

# the binary representation of c=m∧e(mod n) to make it a 2*bits# representation of c, corresponding to each block

for i in range(number_of_blocks): #it runs ROUND=number_of_ blocks times.print ′————————– ′print ′ROUND = ′, i+1print ′————————– ′mbin = btxt[ i*len_block: (i+1)*len_block ] #mbin contains a binary string

# of length len_block. We shall convert this binary string into# the corresponding decimal representation

print ′Plaintext Block = ′, bin_to_ ascii(mbin)m = ZZ( str(mbin), base=2 ) #To compute m∧e(mod N), we need to convert

# the mbin into the corresponding decimal representationC =Mod(m,N)∧eCC=ZZ(C)cblockarray=CC.binary() #To convert the CC into a binary of length 2*bits

# and to store in cblockarray, we need to pad# (2*bits−ZZ(len(cblockarray)) zeros to the left of cblockarray

padclength=2*bits-ZZ(len(cblockarray)) # number of zeros to be paddedfor k in range(padclength):

carray.append( ′0′ ) # at the end of the for loop,#carray contains padclength many zeros

carray.append(cblockarray) # appends the contents of carray to the contents# of cblockarray and stores it in carray

# End of the main for loopcbin = ′ ′.join(carray) # at the end of the original for loop, join the contents

# of ′ ′carry′ ′ to get the final binary string representing the whole# cipher text stored in cbin.

print ′final cipher text in binary′, cbin #print cbin as the cipher text in binary

the leader of the SAGE project was William Stein, a mathematician at the Univer-sity of Washington. SAGE uses the programming language Python. SAGE devel-opment uses both students and professionals for development. The development ofSAGE is supported by both volunteer work and grants. The website for SAGE ishttp://www.sagemath.org. The software may be downloaded from the links avail-able in that website. There is on-line computation facility available at that web-

Page 581: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 567

Table 12.11 RSA decryption algorithm using SAGE# RSA decryption algorithmfrom sage.crypto.util import ascii_to_bin, bin_to_ascii@interactdef RSA_decryption (ctext = ′′ 0011100011010000011100101100100110101111111010010001111100101001′ ′,bits = (32 .. 512), d=3319087257124301681,N=6915083087689750517):

f=[ ] # this is an array to be used latter onlctext = len(ctext) #it provides the length of the cipher textnb=lctext / (2*bits) # it provides the number of blockscblockarray = [ ]for i in range(nb):

print ′————————– ′print ′ROUND = ′, i+1print ′————————– ′cblockarray = ctext[ i*2*bits: (i+1)*2*bits ] # it actually crops a block

# of binary string of length 2*bits from the array# ctext to store it in the array cblockarray

c = ZZ( str(cblockarray), base=2 ) # converts binary string into decimalP=Mod(c,N)∧d # it calculates cd (mod N), as a result, P becomes

# an element of the ring of integers modulo NM = ZZ(P) # converts element of the ring Zn into an integerMbin =M.binary() # Mbin contains the binary representation of Mpadlen = ZZ( 8 − ZZ(len(Mbin)).mod(8) ) #Finally we need to convert the

# binary to ASCII. So the length of Mbib must be a# multiple of 8. padlen actually contains the number of zeros to# be padded to the left of Mbin to make it a multiple of 8

for k in range(padlen):f.append( ′0′ ) # the array f contains the number of zeros to be padded

f.append( Mbin ) # it appends the content of Mbin to the content of ffbin = ′ ′.join(f) # it actually contains the plain text in the binary formftxt = bin_to_ascii(fbin) # it converts the binary plain text into actual plain textprint ′ Final recovered message = ′, ftxt # final recovered plain text

site. We can simply create an on-line account at either http://www.sagenb.org orhttp://www.sagenb.kaist.ac.kr and use SAGE with the browser present at our com-puter.

In the next section, we are going to show how SAGE may be used to implementthree public-key cryptosystems, e.g., RSA, ElGamal, and Rabin cryptosystems withlarge numbers.

12.13.1 Sage Implementation of RSA Cryptosystem

We have already discussed about the RSA cryptosystem in Sect. 12.6. Now we aregoing to explain how RSA may be implemented using SAGE with large numbers.Recall that, when Alice wants to send secret message to Bob using RSA cryptosys-tem, Alice and Bob have to run three algorithms, namely, key generation algorithm(done by Bob), encryption algorithm (done by Alice) and decryption algorithm

Page 582: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

568 12 Introduction to Mathematical Cryptography

Fig. 12.8 RSA decryption algorithm with output in SAGE

(done by Bob). First we shall explain the key generation algorithm to be imple-mented by Bob. Here we are going to define a function known as “RSA_key_gen”which takes as input the security parameter, i.e., the length of each of the primes(i.e., number of bits to represent p or q) and produces the public and private keys.Here we are using the concept “@interact” so that the function “RSA_key_gen”can take input i.e., the bit length of p or q , in an interactive way. Due to the useof “@interact”, we can change the bit length (here 32 bits to 512 bits) interactivelywhile running the program without changing the main body of the program as shownin Fig. 12.4. If we write “@interact def RSA_key_gen (bits = (16 .. 1024)):”, thenwe can vary the length of the primes from 16 bits to 1024 bits interactively. In this

Page 583: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 569

Fig. 12.9 ElGamal key generation algorithm with output in SAGE

Table 12.12 ElGamal keygeneration algorithm

#Key Generation algorithm for ElGamal Cryptosystem@interactdef ELGAMAL_key_gen ( bits = (16 .. 512) ):

p = next_prime( randint(2∧(bits-1), 2∧(bits)-1))g = primitive_root(p)a = randint(1,p-1)X =Mod (g,p)∧aprint ′———————– \n′print ′ the public keys are:′print ′ g=′ ,gprint ′ p=′ ,pprint ′ X=′ ,Xprint ′ the private key is: ′print ′ a=′,a

key generation program, we are going to use the following functions whose utilitiesare described below:

• randint(a, b): This function outputs a random integer in the interval [a, b].

Page 584: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

570 12 Introduction to Mathematical Cryptography

Table 12.13 ElGamal encryption algorithm using SAGE# ElGamal encryption algorithmfrom sage.crypto.util import ascii_to_bin, bin_to_ascii@interactdef ElGamal_encryption ( txt = ′′Dr. Avishek Adhikari′ ′, bits = (16 .. 128), g = 10,p = 230430292394661874796713505744556451393,X = 199001885002992147485058529117175239418):

btxt = ascii_to_bin( txt )lbtxt = len(btxt)chr = bits # block sizelb = ceil( lbtxt / chr ) # no of blockscblockarray=[ ]f = [ ]carray1=[ ]cblockarray1=[ ]carray2=[ ]cblockarray2=[ ]r1 = randint(1,bits-1)r=ZZ(r1)print ′k=′, rfor i in range(lb):

mbin = btxt[ i*chr: (i+1)*chr ]mbin = btxt[ i*chr: (i+1)*chr ]m = ZZ( str(mbin), base=2 )C =Mod(g,p)∧rCC = ZZ(C)cblockarray1 = CC.binary()padclength1 = ZZ(bits-ZZ(len(cblockarray1)))for k in range(padclength1):

carray1.append( ′0 ′ )carray1.append(cblockarray1)D =Mod(m*X∧r,p)DD = ZZ(D)cblockarray2 = DD.binary()padclength2 = ZZ(bits-ZZ(len(cblockarray2)))for k in range(padclength2):

carray2.append( ′0′ )carray2.append(cblockarray2)

dbin = ′ ′.join(carray2)cbin = ′ ′.join(carray1)print ′ final cipher text in binary c=′, cbinprint ′d=′, dbin

• next_prime(a): This function outputs the next prime after a.• gcd(a, b): This function outputs the gcd of a and b.• mod(a, n): This function outputs an element of the ring Zn, i.e., mod(a, n) returns

the equivalence class (a) in Zn.• e∧(−1): If e is an element of Z∗n, then e∧(−1) represents the multiplicative in-

verse of e in Z∗n.

Page 585: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 571

Fig. 12.10 ElGamal encryption algorithm in SAGE

• ZZ(d): This function converts the element d from the ring Zn to the element ofthe ring of integers Z.

• #: “#” is used to comment a line.

Now the code for key generation algorithm in SAGE with documentation is writtenin Table 12.9. As screen short of the actual SAGE code with output for 512 bits areshown in Figs. 12.4 and 12.5, respectively.

Now we are going to explain the encryption algorithm. The idea of the encryptionalgorithm is as follows: Suppose Alice is going to encrypt a plain text message.Alice will use the function “RSA_encryption()” for encryption. This function takesas input the plain text stored in the array “txt”, the security parameter (i.e., thenumber of bits required to represent p or q in binary) stored in the variable “bits”,the public keys stored in the variables N and e. The program first converts the plaintext (ASCII characters) into binary and stores it in the array “btxt”. Suppose the

Page 586: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

572 12 Introduction to Mathematical Cryptography

Fig. 12.11 Output of the ElGamal encryption algorithm in SAGE

length (calculated using “len(btxt)”) of the binary string of the plain text is 3104(note that it has to be a multiple of 8, as each ASCII character is represented by 8bits). We subdivide the whole plain text string into certain blocks. So we need tocalculate the block size. For example, if the length of the binary representation of p(or q) is 512 bits, then we choose the block size to be 512 ∗ 2/2= 512 bits. So thenumber of blocks will be the ceiling of (3104/512) = 7, i.e., ceil(3104/512). Foreach such binary block, we convert it into the corresponding decimal representation,say m. Note that the value of m is always less than N = pq. Then we calculate c=me (mod N). Next we convert the decimal representation of c into binary. Notethat we need to pad certain number of zeros at the left of this binary representationto make it a binary string of length 2*bits, where the variable “bits” represents thenumber of bits to represent p or q. Finally, we concatenate the content of all thesub-blocks to get the final binary representation of the cipher text. The program willoutput the binary representation of the corresponding cipher text.

In this program, we are going to use the following functions whose utilities areexplained below.

• from sage.crypto.util import ascii_to_bin: The function “ascii_to_bin” is de-fined in sage.crypto.util. So to use “ascii_ to_bin”, we need to import it from “sage.crypto.util”.

• from sage.crypto.util import bin_to_ascii: The function “bin_to_ascii” is de-fined in sage.crypto.util. So to use “bin_to_ ascii”, we need to import it from “sage.crypto.util”.

• RSA_encryption(txt, bits, N, e): This function takes as input the plain text, thebit length, the public keys N and the encryption exponent e. This function outputsthe binary representation of the cipher text.

Page 587: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 573

Table 12.14 ElGamal decryption algorithm using SAGE# ElGamal decryption algorithmfrom sage.crypto.util import ascii_to_bin, bin_to_ascii@interactdef ElGamal_decryption (c= ′′0000000000000000000000000000000000000000000000000000000000110110001101011100100110101101110001011101111010100000000000000000000000000000000000000000000000000000000000000000000000000000001101100011010111001001101011011100010111011110101000000000000000000000′ ′,d= ′′ 0101100101100010001101001100110000001001101010000111011110100101101100110000110110111110000010100011111101000100001101010100000100100101011101111000110010010011000001001010110111110110100101110101010000110100110111101111001111010100011010010110011011101100′ ′,bits =(16 .. 128),a= 19531696595743956248020054501166321389,p=230430292394661874796713505744556451393):

f=[ ]lctext1 = len(c)lctext2 = len(d)nb=lctext1/ (bits)cblockarray1 = [ ]cblockarray2 = [ ]carray1=[ ]for i in range(nb):

cblockarray1 = c[ i*bits: (i+1)*bits ]c1 = ZZ( str(cblockarray1), base=2 )cblockarray2 = d[ i*bits: (i+1)*bits ]d1 = ZZ( str(cblockarray2), base=2 )x=Mod(c1,p)∧(-a)P=Mod(x*d1,p)M = ZZ(P)Mbin =M.binary()padlen = ZZ( 8 - ZZ(len(Mbin)).mod(8) )for k in range(padlen):

f.append( ′0′ ) f.append( Mbin )print ′f=′,f

fbin = ′ ′.join(f) ftxt = bin_to_ascii(fbin) print ′ Final recovered message = ′ , ftxt

• ascii_to_bin( ): It converts the ASCII to binary. To use it we need to importascii_to_bin as written in the first line of the program. “ascii_to_bin” outputs abinary string.

• bin_to_ascii(): It converts the binary to ASCII, to use it, we need to importascii_to_bin as written in the first line of the program.

• len(btxt): “len” provides the length of a string stored in btxt.• ceil(z): It gives the ceiling value of the rational number z.• Mod(a, N)∧e: It computes the value ae (mod N).• CC.binary(): It converts the decimal value stored in CC into binary.• carray.append(cblockarray): The function “append()” appends the contents of

the array “carray” to the contents of the array “cblockarray” and stores it in thearray “carray”.

• ′ ′.join(carray): The function “join()” joins the contents of the array “carray” toget a string.

Page 588: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

574 12 Introduction to Mathematical Cryptography

Fig. 12.12 ElGamal decryption algorithm in SAGE

The SAGE code with documentation is explained in Table 12.10.The actual SAGE code for RSA encryption program with output are shown in

Figs. 12.6 and 12.7, respectively.We are now going to explain the decryption algorithm done by Bob. The

RSA_decryption() function takes as input the cipher text in binary stored in the ar-ray “ctext”, the security parameter stored in “bits”, the decryption exponent d storedin “d” and the public value stored in “N”. This function outputs the plain text back.The program works as follows: First the binary cipher text is divided into blocks,each of size 2*bits. Then each binary block is converted into decimal number, say c.For each of the decimal representation c, we need to compute cd (mod N) to get M.Then we convert M into binary string of length a multiple of 8 by suitably paddingzeros to the left. Append each such binary string obtained from each block one after

Page 589: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 575

Fig. 12.13 Output of the ElGamal decryption algorithm in SAGE

Table 12.15 Rabin key generation algorithm#Key Generation algorithm for Rabin Cryptosystem@interactdef Rabin_key_gen( bits = (16 .. 128) ):

p=1q=1while(p==q):

while p%4!=3:p = next_prime( randint(2∧(bits-1), 2∧(bits)) )

while q%4!=3:q = next_prime( randint(2∧(bits-1), 2∧(bits)) )

print ′——————— \n ′print ′The private keys are: ′print ′p= ′,pprint ′q= ′,qprint ′——————— \n ′N=p*qprint ′The public key is: ′print ′N= ′,N

another. Finally convert this binary string into ASCII characters to get back the orig-inal plain text. The SAGE code with documentation for RSA decryption is presentedin Table 12.11.

A screen short of the actual SAGE code for RSA decryption algorithm and itsoutput are shown in Fig. 12.8.

Page 590: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

576 12 Introduction to Mathematical Cryptography

Fig. 12.14 Rabin key generation algorithm with output in SAGE

12.13.2 SAGE Implementation of ElGamal Plulic KeyCryptosystem

The EnGamal public-key cryptosystem is already explained in Sect. 12.7. The im-plementation of ElGamal is similar to that of RSA. Here also we need to implementthree algorithms, namely, key generation algorithm (run by Bob), encryption algo-rithm (run by Alice) and the decryption (run by Bob). For the key generation, thefunction “ELGAMAL_key_gen()” takes as input the security parameter stored inthe variable “bits” and out puts the public and the public values. In this algorithm,we use the function “primitive_root(n)” which returns a generator for the multiplica-tive group of integers modulo n, if one exists. The key generation algorithm for theElGamal cryptosystem is in Table 12.12.

A screen short of the actual SAGE code for ElGamal key generation algorithmalong with the output is shown in Fig. 12.9.

The SAGE code for ElGamal encryption is presented in Table 12.13.A screen short of the actual SAGE code for ElGamal encryption algorithm along

with the output are shown in Figs. 12.10 and 12.11, respectively.The SAGE code for ElGamal decryption is presented in Table 12.14.A screen short of the actual SAGE code for ElGamal decryption algorithm along

with the output are shown in Fig. 12.12 and 12.13 respectively.

Page 591: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 577

Table 12.16 Rabin encryption algorithm using SAGE# Rabin encryption algorithmfrom sage.crypto.util import least_significant_bitsfrom sage.crypto.util import ascii_to_bin@interactdef Rabin_encryption (txt = ′′A′ ′,N=2245559221,bits=16):

btxt = ascii_to_bin( txt ) # binary representation of the input in a multiple of 8C1_array=[ ] # the array will help to store the cipher text C1 in binaryC2_array=[ ] # the array will help to store the cipher text C2 in binaryC1_blockarray=[ ]lbtxt=len(btxt) # length of the input binary stringR=IntegerModRing(N) # we shall work in the Ring Z_N, that is, the ring of

#integers modulo Nfor i in range(lbtxt):

print ′——————— \n ′print ′ROUND = ′, i+1print ′——————— \n ′m=btxt[i] #since btxt contains binary string, we need to convert it to

# integer in the next stepm = ZZ( str(m), base=2 ) # integer representation of m from stringy=R.random_element()while (GCD(y,N)!=1):

y=R.random_element() #y is a random element from Z_N*r=Mod(y,N)∧2 # random element from QR_N and we need the integer valuex=ZZ(r) # integer value of r, so x is a random element from QR_Nc1=ZZ(Mod(x,N)∧) # 1st pair of the cipher text in integer form,

# we need to put it in binary, so ZZ is requiredlsb=least_significant_bits(x, 1) # lsb is an array contains the lsb of x

# in the zeroth location of lsb[ ]c2=(lsb[0]+m)%2 # 2nd pair of cipher textC1_blockarray=c1.binary() #c1 has to represent in binary representation of

# length of N, so we need to first make it binary and pad suitablypadclength=ZZ(2*bits-ZZ(len(C1_blockarray)))for k in range(padclength):

C1_array.append( ′0′ )C1_array.append(C1_blockarray) # the step in which the consecutive

# binary representations of C1’s are appendedC2_blockarray=c2.binary() # though c2 is in binary, to append, we need to

# make it a stringC2_array.append(C2_blockarray) # the step in which the consecutive binary

# string representations of C2’s are appendedC1_bin = ′′.join(C1_array)C2_bin = ′′.join(C2_array)print ′The final Cipher for C1 is: ′, C1_binprint ′The final Cipher for C2 is: ′, C2_bin

12.13.3 SAGE Implementation of Rabin Plulic Key Cryptosystem

We have already explained the Rabin public-key cryptosystem in Sect. 12.8. In thissection, we are going to implement this cryptosystem in SAGE. Like RSA and El-Gamal, Rabin cryptosystem also has three major parts, namely key generation, en-

Page 592: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

578 12 Introduction to Mathematical Cryptography

Table 12.17 Rabin decryption algorithm using SAGE# Rabin decryption algorithmfrom sage.crypto.util import least_significant_bits, ascii_to_bin, bin_to_ascii@interactdef Rabin_decryption(c1=′′ 011011110001111100000111011001000110011010110101100110010001111001111000111000111100001101111001100110′ ′,c2=′′00010011′ ′,p=34351,q=65371,bits=16):

N=p*qR=IntegerModRing(N)f=[ ]len_c1=len(c1)blocks=len_c1/(bits*2) # no of blocks each of length of N i.e., 2*bitsfor i in range(blocks):

cblockarray = c1[ i*2*bits: (i+1)*2*bits ]c = ZZ( str(cblockarray), base=2 ) # decimal representation of C1 in ith blockcp=c%pcq=c%qap=Mod(cp,p)∧((p+1)/4) # to calculate the 4 values of sq rootsaq=Mod(cq,q)∧((q+1)/4) # to calculate the 4 values of sq rootsap1=ZZ(ap) # to calculate the Ligendre Symbol, int value is required. That is

# why we need to convert the ring element into integer valueaq1=ZZ(aq)ap2=ZZ(-ap)aq2=ZZ(-aq)ls_ap1=legendre_symbol(ap1,p) # Ligendre symbol for ap1 modulo pls_ap2=legendre_symbol(ap2,p)ls_aq1=legendre_symbol(aq1,q)ls_aq2=legendre_symbol(aq2,q)if ((ls_ap1==1) & (ls_aq1==1)): # If both the values are 1, then we can find

# the required element x by using the Chinese Remainder Theorem (CRT)x=crt(ap1,aq1,p,q)

if ((ls_ap1==1) & (ls_aq2==1)):x=crt(ap1,aq2,p,q)

if ((ls_ap2==1) & (ls_aq1==1)):x=crt(ap2,aq1,p,q)

if ((ls_ap2==1) & (ls_aq2==1)):x=crt(ap2,aq2,p,q)

x1=ZZ(x) # As x is in the ring of integers modulo pq, to use the function# least_significant_bits(), we need to convert it in integer

lsb_x1=least_significant_bits(x1, 1) # least significant bit of the elementc_2_blockarray = c2[ i: (i+1)] # As c2 is a string of binary, we need to

# convert it from string to integer in the next linecc2 = ZZ( str(c_2_blockarray), base=2 )bin_plain_text=(lsb_x1[0]+cc2)%2string_bin_plain_text=bin_plain_text.binary()f.append(string_bin_plain_text) # f is the final binary

# array in string format to contain the bin plain text# out of the main for loop

fbin = ′′.join(f) # it joins the elements of f to use bin_to_asciiftxt = bin_to_ascii(fbin)print ′Final recovered message = ′, ftxt

Page 593: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.13 Open-Source Software: SAGE 579

Fig. 12.15 Rabin encryption algorithm in SAGE

cryption, and decryption. In the key generation step, for a given security parameter“bits”, we need two random primes p and q of length “bits” such that p ≡ q ≡3 (mod 4).

The SAGE code for Rabin key generation is presented in Table 12.15.A screen short of the actual SAGE code for Rabin key generation algorithm along

with the output are shown in Fig. 12.14.For encryption, we have to import the functions “least_significant_ bits” and

“ascii_to_bin” by writing “from sage.crypto.util import least_significant_bits” and“from sage.crypto.util import ascii_to_ bin” at the very beginning of the encryp-tion program. Here we shall deal with the Ring ZN , that is, the ring of integersmodulo N. After the use of the command “R=IntegerModRing(N)”, R becomes thering of integers modulo N. We further require a random element from R. The com-mand “R.random_ element()” returns a random element from the ring of integersmodulo N. Further, the command “least_significant_bits(x, 1)” returns the least sig-nificant bit of x. As mentioned earlier, to use this function, we need to import it from“ sage.crypto.util”.

Page 594: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

580 12 Introduction to Mathematical Cryptography

Fig. 12.16 Output of the Rabin encryption algorithm in SAGE

For the encryption algorithm we use the function “Rabin_encryption()”. As aninput, this encryption function takes the plain text stored in “txt”, the values N andthe security parameter “bits”. This function returns a pair of binary string of ciphertexts stored in C1_bin and C2_bin.

For decryption algorithm, we use the function “Rabin_decryption()” which takesas input the two binary strings of cipher texts stored in the variables c1 and c2, thevalues of p, q, and the security parameter “bits”. It outputs the original plain text.In this encryption algorithm, we have used all the previously explained functionsexcept the two new functions, namely “legendre_symbol(a,p)” and the function“crt(a,b,p,q)”. The function “legendre_symbol(a,p)” computes the Legendre sym-bol binomap, where p is a prime integer. On the other, the function “crt(a,b,p,q)”returns a solution to the congruences x ≡ a (mod p) and x ≡ b (mod q) using theChinese Remainder Theorem.

The SAGE code for Rabin encryption scheme with documentation is presentedin Table 12.16.

Screen shorts of the actual SAGE code for Rabin encryption algorithm alongwith the output are shown in Fig. 12.15 and Fig. 12.16, respectively.

The SAGE code for Rabin decryption scheme with documentation is presentedin Table 12.17.

Screen shorts of the actual SAGE code for Rabin decryption algorithm alongwith the output are shown in Fig. 12.17 and Fig. 12.18, respectively.

12.14 Exercises

1. Find the primes p and q if n= pq = 4386607 and φ(n)= 4382136.

Page 595: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

12.14 Exercises 581

Fig. 12.17 Rabin decryption algorithm in SAGE

2. Decrypt each of the following Caesar encryptions by trying the various possibleshifts until you obtain a meaningful text.

(a) LWKLQNWKDWLVKDOOQHYHUVHHDELOOERDUGORYHOBDVDWUHH

(b) UXENRBWXCUXENFQRLQJUCNABFQNWRCJUCNAJCRXWORWMB

Page 596: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

582 12 Introduction to Mathematical Cryptography

Fig. 12.18 Output of the Rabin decryption algorithm in SAGE

(c) BGUTBMBGZTFHNLXMKTIPBMAVAXXLXTEPTRLEXTOXKHHFYHKMAXFHNLX

3. Use the key K = (5,11) ∈ K to encrypt the message “ILOVECRYPTOGRAPHY” using Affine cipher, assuming that P = Z26. From the cipher text, de-scribe an attack, assuming that the key K is unknown to the adversary. Calcu-late maximum how many trials the adversary has to make before breaking thescheme.

4. Give an example of a cryptographic scheme which is poly-alphabetic.5. With the key AVI encrypt the plain text “ABSTRACTALGEBRA” using Vi-

genère Cipher.6. With the key k = [ 7 3

2 5

], encrypt the plain text “CRYPTOGRAPHYISFUN” us-

ing Hill 2-cipher.7. What are the advantages of using public-key cryptosystem over private key

cryptosystem.8. Let g be a primitive root for Zp , for some prime p. Suppose that x = a and

x = b are both integer solutions to the congruence gx ≡ y (mod p). Then

(a) prove that a ≡ b (mod p− 1).(b) Prove that logg(h1 · h2)= logg(h1)+ logg(h2) for all h1, h2 ∈ Z∗p .

9. Mount a man-in-middle attack for RSA cryptosystem.10. Mount a bidding attack on RSA cryptosystem.11. Construct basis matrices for a black and white visual cryptographic scheme

with Γ0 = {{1,2,3}, {2,3,4}}. What could be the pixel expansion and relativecontrast of the scheme.

12. Using SAGE, implement the Diffie–Hellman key agreement protocol for a 512bit prime.

13. Using SAGE, implement the bidding attack on RSA with 512 bit primes.14. Using SAGE, implement the RSA signature scheme with 512 bit primes.15. Using SAGE, implement Shamir’s secret sharing scheme in the field Zp with

512 bit prime p.

Page 597: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 583

12.15 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2007; Menezes et al. 1996;Stinson 2002; Katz and Lindell 2007) for further details.

References

Adhikari, A.: An overview of black and white visual cryptography using mathematics. J. CalcuttaMath. Soc 2, 21–52 (2006)

Adhikari, A.: Linear algebraic techniques to construct black and white visual cryptographicschemes for general access structure and its applications to color images. Des. Codes Cryp-togr. (2013). doi:10.1007/s10623-013-9832-5

Adhikari, A., Adhikari, M.R.: Introduction to Linear Algebra with Application to Basic Cryptog-raphy. Asian Books, New Delhi (2007)

Adhikari, A., Bose, M.: A new visual cryptographic scheme using Latin squares. IEICE Trans.Fundam. E 87-A (5), 1998–2002 (2004)

Adhikari, A., Sikdar, S.: A new (2, n)-color visual threshold scheme for color images. In: In-docrypt’03. Lecture Notes in Computer Science, vol. 2904, pp. 148–161. Springer, Berlin(2003)

Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for generalaccess structures. In: Indocrypt’04. Lecture Notes in Computer Science, vol. 3348, pp. 399–413.Springer, Berlin (2004)

Adhikari, A., Kumar, D., Bose, M., Roy, B.: Applications of partially balanced and balanced in-complete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. E90A (5), 949–951 (2007)

Adhikari, A., Adhikari, M.R., Chaubey, Y.P.: Contemporary Topics in Mathematics and Statisticswith Applications. Asian Books, New Delhi (2013)

Alexi, W., Chor, B., Goldreich, O., Schnorr, C.P.: RSA and Rabin functions: certain parts are ashard as the whole. SIAM J. Comput. 17(2), 194–209 (1988)

Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general accessstructures. Inf. Comput. 129, 86–106 (1996a)

Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryp-tography. In: auf der Heide, F.M., Monien, B. (eds.) 23rd International Colloquim on Automata,Languages and Programming (ICALP’96). Lecture Notes in Computer Science, vol. 1099, pp.416–428. Springer, Berlin (1996b)

Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS 1979. National Computer Conference,vol. 48, pp. 313–317 (1979)

Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryp-tol. 12(4), 261–289 (1999)

Blundo, C., D’arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptogra-phy. SIAM J. Discrete Math. 16(2), 224–261 (2003)

Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function.Appl. Math. Lett. 23(9), 993–996 (2010)

Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms.IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

Hill, L.S.: Cryptography in an algebraic alphabet. Am. Math. Mon. 36, 306–312 (1929)Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer,

Berlin (2008)Kahn, D.: The Codebreakers. Macmillan, New York (1967)

Page 598: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

584 12 Introduction to Mathematical Cryptography

Katz, J.: Digital Signatures. Springer, New York (2010)Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC, London/Boca

Raton (2007)Menezes, A., van Orschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press,

Boca Raton (1996)Merkle, R.C.: Secure communications over insecure channels. In: Secure Communications and

Asymmetric Cryptosystems. AAAS Sel. Sympos. Ser., vol. 69, pp. 181–196. Westview, Boulder(1982)

Naor, M., Shamir, A.: Visual cryptography. In: Advance in Cryptography, Eurocrypt’94. LectureNotes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994)

Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Commun. ACM 21(2), 120–126 (1978)

Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. CRC Press, Boca Raton (2002)

Page 599: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Appendix ASome Aspects of Semirings

Semirings considered as a common generalization of associative rings and dis-tributive lattices provide important tools in different branches of computer science.Hence structural results on semirings are interesting and are a basic concept. Semi-rings appear in different mathematical areas, such as ideals of a ring, as positivecones of partially ordered rings and fields, vector bundles, in the context of topolog-ical considerations and in the foundation of arithmetic etc. In this appendix somealgebraic concepts are introduced in order to generalize the corresponding conceptsof semirings N of non-negative integers and their algebraic theory is discussed.

A.1 Introductory Concepts

H.S. Vandiver gave the first formal definition of a semiring and developed the the-ory of a special class of semirings in 1934. A semiring S is defined as an algebra(S,+, ·) such that (S,+) and (S, ·) are semigroups connected by a(b+c)= ab+ac

and (b+c)a = ba+ca for all a, b, c ∈ S. The set N of all non-negative integers withusual addition and multiplication of integers is an example of a semiring, called thesemiring of non-negative integers. A semiring S may have an additive zero ◦ definedby ◦+ a = a+◦= a for all a ∈ S or a multiplicative zero 0 defined by 0a = a0= 0for all a ∈ S. S may contain both ◦ and 0 but they may not coincide. Consider thesemiring (N,+, ·), where N is the set of all non-negative integers;

a + b = {lcm of a and b, when a �= 0, b �= 0};= 0, otherwise;

and

a · b= usual product of a and b.

Then the integer 1 is the additive zero and integer 0 is the multiplicative zero of(N,+, ·).M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8, © Springer India 2014

585

Page 600: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

586 A Some Aspects of Semirings

In general, the concept of multiplicative zero 0 and additive zero ◦ may not coin-cide in a semiring. H.J. Weinert proved that both these concepts coincide if (S,+)

is a cancellative semigroup. Clearly, S has an absorbing zero (or a zero element) iffit has elements 0 and ◦ which coincide. Thus an absorbing zero of a semiring S isan element 0, such that 0a = a0= 0 and 0+ a = a + 0= a for all a ∈ S.

A semiring S may have an identity 1 defined by 1a = a1= a, for all a ∈ S.A semiring S is said to be additively commutative, iff a + b = b + a for all

a, b ∈ S. An additively commutative semiring with an absorbing zero 0 is called ahemiring. An additively cancellative hemiring is called a halfring. A multiplicativelycancellative commutative semiring with identity 1 is called a semidomain.

We mainly consider semirings S for which (S,+) is commutative. If (S, ·) isalso commutative, S is called a commutative semiring. Moreover, to avoid trivialexceptions, each semiring S is assumed to have at least two elements.

A subset A �= ∅ of a semiring S is called an ideal (left, right) of S iff a + b ∈A, sa ∈A and as ∈A(sa ∈A,as ∈A) hold, for all a, b ∈A and all s ∈ S. An idealA of S is called proper, iff A ⊂ S holds, where ⊂ denotes proper inclusion, and aproper ideal A is called maximal, iff there is no ideal B of S satisfying A⊂ B ⊂ S.An ideal A of S is called trivial iff A= S holds or A= {0} (the latter clearly holdsif S has an absorbing zero 0).

Many results in rings related to ideals have no analogues in semirings. As notedby Henriksen, it is not the case that any ideal A of a semiring S is the kernel of ahomomorphism. To get rid of these difficulties, he defined in 1958, a more restrictedclass of ideals in a semiring which he called k-ideals. A k-ideal A of a semiring S

is an ideal of S such that whenever x + a ∈A, where a ∈A and x ∈ S, then x ∈A.Iizuka defined a still more restricted class of ideals in semirings, which he calledh-ideals. An h-ideal A of a semiring S is an ideal of S such that if x + a + u =b+ u, where x,u ∈ S and a, b ∈A, then x ∈A. It is clear that every h-ideal is a k-ideal. But examples disapprove the converse. Using only commutativity of addition,the following concepts and statements essentially due to Bourne, Zassenhaus, andHenriksen, are well known. For each ideal A of a semiring S, the k-closure A ={a ∈ S : a+ a1 = a2 for some ai ∈A} is a k-ideal of S satisfying A⊆ A and ¯A= A.Clearly, an ideal A of S is a k-ideal of S iff A= A holds. A proper k-ideal A of S

is called a maximal k-ideal of S iff there is no k-ideal B of S satisfying A⊂ B ⊂ S.An ideal A of a semiring S is called completely prime or prime iff ab ∈ A impliesa ∈A or b ∈A, for all a, b ∈ S.

Let S and T be hemirings. A map f : S→ T is said to be a hemiring homomor-phism iff f (s1 + s2)= f (s1)+ f (s2);f (s1s2)= f (s2)f (s2) and f (0)= f (0).

A hemiring homomorphism f : S → T is said to be an N -homomorphism, iffwhenever f (x)= f (y) for some x, y ∈ S, there exist ri ∈ ker f such that x + r1 =y + r2 holds.

An equivalence relation ρ on a semiring S is called a congruence relation iff(a, b) ∈ ρ implies (a + c, b + c) ∈ ρ, (ca, cb) ∈ ρ and (ac, bc) ∈ ρ for all c ∈ S.A congruence relation ρ on a semiring S is said to be additively cancellative (AC)

iff (a + c, b + d) ∈ ρ, and (c, d) ∈ ρ imply (a, b) ∈ ρ. Each ideal A of S definesa congruence relation ρA on (S,+, ·) given by ρA = {(x, y) ∈ S × S : x + a1 =

Page 601: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.1 Introductory Concepts 587

y + a2 for some ai ∈ A}; this is known as Bourne congruence. The corre-sponding class semiring S/ρA, consisting of the classes xρA, is also denotedby S/A. Each ideal A of S defines another type of congruence relation knownas Iizuka congruence defined by σA = {(x, y) ∈ S × S : x + a + u = y +b+u for some a, b ∈A and u ∈ S}. The corresponding class semiring S/σA consistsof the classes xσA,x ∈ S.

Bourne and Zassenhaus defined the zeroid Z(S) of a semiring S as Z(S)= {z ∈S : z+ x = x for some x ∈ S}; it is an h-ideal of S and is contained in every h-idealof S. Z(S) and S are called trivial h-ideals and other h-ideals (if they exist) arecalled proper h-ideals of S. A proper h-ideal A of S is called a maximal h-ideal iffthere is no h-ideal B of S satisfying A ⊂ B ⊂ S. The h-closure Ah of each idealA of a semiring S defined by Ah = {x ∈ S : x + a1 + u = a2 + u for some ai ∈A and u ∈ S} is the smallest h-ideal of S containing A.

A semiring S is said to be additively regular iff for each a ∈ S, there exists anelement b ∈ S such that a = a + b + a. If in addition, the element b is unique andsatisfies b= b+ a + b, then S is called an additively inverse semiring.

A semiring S is said to be semisubtractive iff for each pair a, b in S at least oneof the equations a + x = b or b+ x = a is solvable in S.

Let S be a semiring with absorbing zero 0. A left semimodule over S is a com-mutative additive semigroup M with a zero element 0 together with an operation

S ×M →M; (a, x) �→ ax

called the scalar multiplication such that

for all a, b ∈ S,x, y ∈M, a(x + y)= ax + ay,

(a + b)x = ax + bx, (ab)x = a(bx), 0x = 0.

A right S-semimodule is defined in an analogous manner. Let H and T be hemir-ings. An (H,T ) bi-semimodule M is both a left semimodule over H and a rightsemimodule over T such that (bx)a = b(xa) for all x ∈M , b ∈H and a ∈ T .

Let R be an arbitrary hemiring. Let S be also a hemiring. R is said to be anS-semialgebra iff R is a bi-semimodule over S such that (ax)b = a(xb), for alla, b ∈R and x ∈ S.

An h-ideal A of the S-semialgebra R is said to be a left modular h-ideal iff thereexists an element e ∈R such that

(i) each x ∈R satisfies ex + a+ z= x + b+ z for some z ∈R and some a, b ∈A;(ii) each s ∈ S satisfies se+ c+h= es+ d +h for some h ∈R and some c, d ∈A.

In this case e is called a left unit modulo A.A pair (e1, e2) of elements of a semiring S is called an identity pair iff a+ e1a =

e2a and a + ae1 = ae2, for all a ∈ S.We define a right modular h-ideal in a similar manner. A congruence ρ on a

semiring S is called a ring congruence iff the quotient semiring S/ρ is a ring.A semiring S who ◦ and 1 is said to be h-Noetherian (k-Noetherian) iff it satis-fies any one of the following three equivalent conditions:

Page 602: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

588 A Some Aspects of Semirings

(i) S satisfies the ascending chain condition on h-ideals (k-ideals);(ii) The maximal condition for h-ideals (k-ideals) holds in S;

(iii) Every h-ideal (k-ideal) in S is finitely generated.

A.2 More Results on Semirings

In this section we present more results of algebraic theory of semirings which areclosely related to the corresponding results of ring theory.

Theorem A.2.1 Let S be a semiring such that S = 〈a1, a2, . . . , an〉 is finitely gen-erated. Then each proper k-ideal A of S is contained in a maximal k-ideal of S.

Proof Let k(A) be the set of all k-ideals B of S satisfying A ⊆ B � S, partiallyordered by inclusion. Then k(A) �= ∅, for A itself belongs to k(A). Consider a chain{Bi, i ∈ I } in k(A). We claim that B = ⋃〈i∈I 〉Bi is a proper k-ideal of S. Leta, b ∈ B and s ∈ S. Then there exist i, j ∈ I such that a ∈ Bi and b ∈ Bj . As{Bi, i ∈ I } forms a chain, either Bi ⊆ Bj or Bj ⊆ Bi . For definiteness, we sup-pose Bi ⊆ Bj , so that both a, b ∈ Bj . Since Bj is a k-ideal of S, a + b ∈ Bj ⊆ B ,as, sa ∈ Bj ⊆ B for all s ∈ S. Again, if a + x ∈ B , a ∈ B , x ∈ S, then proceedingas above, a + x, a ∈ Bj for some Bj of the above chain. Since Bj is a k-ideal, itfollows that x ∈ Bj ⊆ B . As a result B is a k-ideal of S. Next we verify that B isa proper k-ideal of S. Suppose to the contrary B = S = 〈a1, a2, . . . , an〉. Then eachar would belong to some k-ideal Bir of the chain {Bi}, where r = 1,2, . . . , n. Therebeing only finitely many Bir ’s, one contains all others, let us call it Bt , while t ∈ I .Thus a1, a2, . . . , an all lie in this Bt . Consequently, Bt = S, which is clearly impos-sible. As a result B ∈ k(A). Thus by Zorn’s Lemma k(A) has a maximal element aswe were to prove. �

Corollary Let S be a semiring with 1. Then each proper k-ideal of S is containedin a maximal k-ideal of S.

Proof The proof is immediate by S = 〈1〉. �

We now consider conditions on a semiring S such that S has non-trivial k-idealsor maximal k-ideals, among others by the help of the congruence class semiringS/A defined by an ideal A of S. Let S′ denote S′ = S\{0}, if S has 0, and S′ = S,otherwise.

Definition A.2.1 A semiring S is said to satisfy the condition (C′) iff for all a ∈ S′and all s ∈ S, there are s1, s2 ∈ S such that s + s1a = s2a holds.

Clearly, if S has an identity 1, then (C′) is equivalent to the condition (C), whichstates that 1+ s1a = s2a holds, for each a ∈ S′ and suitable s1, s2 ∈ S.

Page 603: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.2 More Results on Semirings 589

Example A.2.1 Let Q+ be the set of all non-negative rational numbers. Then(Q+,+, ·) with usual operations is a semiring with 1 as identity satisfying con-dition (C). The same is true, more generally, for each positive cone P of a totallyordered skew fields (Fuchs 1963).

Example A.2.2 Let N be the set of all non-negative integers. Define a + b =max{a, b} and denote by ab the usual multiplication. Then (N,+, ·) is a semiringwith 1 as identity which satisfies (C), since 1+ a = a holds for all a ∈N+.

Lemma A.2.1 If a semiring S with an absorbing zero 0 satisfies condition (C′),then ab= 0 for a, b ∈ S implies a = 0 or b= 0.

Proof By way of contradiction, assume ab= 0 and a �= 0 �= b. Then s + s1a = s2a

according to (C′) yields sb+ s1ab = s2ab, i.e., sb = 0 for all s ∈ S. Consequentlyx+ s3b= s4b implies x = 0, for all s3, s4 ∈ S, which contradicts (C′) applied to theelement b ∈ S′. �

Theorem A.2.2 Let S be a semiring. Then condition (C′) implies that S containsonly trivial k-ideals. The converse is true if (S, ·) is commutative and provided thatS has an element 0, then Sa = {sa : s ∈ S} �= {0} holds for all a ∈ S′.

Proof Assume that S satisfies (C′). Let A be a k-ideal of S which contains at leastone element a ∈ S′. Then s + s1a = s2a according to (C′) implies s ∈ A, for eachs ∈ S, i.e., A= S. For the converse, our supplementary assumption on S shows thatSa is an ideal of S and that Sa �= {0} holds for each a ∈ S′ if S has an element 0.We assume that S has only trivial k-ideals. Then the k-ideal Sa coincides with S

for each a ∈ S′, regardless whether S has an element 0 or not. Now Sa = {s ∈ S :s + s1a = s2a for some si ∈ S} = S states that S satisfies condition (C′). �

Theorem A.2.3 Let S be a commutative semiring with identity 1 and A a properk-ideal of S. Then A is maximal iff the semiring S/A = S/ρA satisfies condition(C), where ρA is the Bourne congruence on S.

Proof Suppose A is a maximal k-ideal of S. Then A is the absorbing zero of S/A

and 1ρA its identity. Consider any cρA ∈ (S/A)′. Then c �∈ A holds and the small-est ideal B of S containing c and A consists of all elements sc, a and sc + a

for s ∈ S and a ∈ A. From A � B it follows B = S and hence 1 + b1 = b2for suitable elements b1, b2 ∈ B . If b1 = s1c + a1 and b2 = s2c + a2 for suit-able si ∈ S and ai ∈ A, then we obtain 1 + s1c + a1 = s2c + a2. This implies1ρA + (s1ρA)(cρA) = (s2ρA)(cρA). Discussions of other cases are similar. As aresult S/ρA satisfies condition (C).

Conversely, assume (C) for S/A and let B be a k-ideal of S satisfying A � B .Then there is an element c ∈ B/A, and cρA ∈ (S\A)′ yields 1ρA + (s1ρA)(cρA)=(s2ρA)(cρA) for suitable si ∈ S by (C). Hence (1 + s1c)ρA = (s2c)ρA. Conse-quently, 1+ s1c + a1 = s2c + a2 holds for some ai ∈ A. Hence 1+ b1 = b2 holds

Page 604: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

590 A Some Aspects of Semirings

for some b1, b2 ∈ B . This implies 1 ∈ B . Consequently, B = S. This shows that A

is a maximal k-ideal of S. �

[For more results, see Weinert et al. 1996].In the rest of this section we only consider semirings S in which addition is

commutative.

Definition A.2.2 An ideal A of a semirings S is said to be completely prime iffab ∈A implies a ∈A or b ∈ B , for any a, b ∈ S.

Proposition A.2.1 Let S be a commutative semiring with identity. Then each maxi-mal k-ideal A of S is completely prime.

Proof By Theorem A.2.3, the semiring S/A satisfies the conditions (C) and hencecondition (C′) (see Definition A.2.1). Since S/A has A as its absorbing zero, wecan apply Lemma A.2.1 and find that S/A has no zero divisors. Hence aρA �= A

and bρA �= A imply (ab)ρA �= A, i.e., a �∈ A and b �∈ A imply ab �∈ A, where ρA isthe Bourne Congruence defined in Sect. A.1. �

Concerning the converse of Proposition B.2.1, we show that a completely primeideal A of a commutative semiring S with identity needs not be a k-ideal, and if itis one, A needs not be a maximal k-ideal of S.

Example A.2.3 (a) Let S be the set of all real numbers a satisfying 0 < a ≤ 1 anddefine a+b= a ·b=min{a, b}, ∀a, b ∈ S. Then (S,+, ·) is a commutative semiringwith 1 as identity. Each real number r such that 0 < r < 1 defines an ideal A= {a ∈S : a ≤ r} of S which is completely prime. However, r + 1= r together with r ∈A

and 1 ��∈ A show that A is not a k-ideal of S. The same is true if one includes 0 inthese considerations (in this case 0 is an absorbing element but not a zero of S∪{0}),but also if one adjoins 0 as an absorbing zero to S.

(b) The polynomial ring Z[x] over the ring Z of integers contains the subsemiring

S =N[x] ={

f (x)=n∑

i=1

aixi : ai ∈N

},

which is commutative and has 1 ∈N as its identity. The ideal A= 〈x〉 of S consistsof all f (x) ∈ S such that a0 = 0 holds. Then A is completely prime and a k-ideal ofS. Now consider the set B = {f (x) ∈ S : a0 is divisible by 2}. Then B is a k-idealof S, and A� B � S⇒A is not a maximal k-ideal.

All maximal k-ideals of the semiring N are described below:

Proposition A.2.2 Let (N,+, ·) be the semiring of non-negative integers underusual operations. Then N has exactly the k-ideals 〈a〉 = {na : n ∈N} for each a ∈N.Consequently, the maximal k-ideals of N are given by 〈p〉 for each positive prime p.

Page 605: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.3 Ring Congruences and Their Characterization 591

Proof Clearly, each ideal 〈a〉 of N is a k-ideal. Now assume that A �= {0} is a k-ideal of N. Let a be the smallest positive integer contained in A, and b any elementof A. Then b = qa + r holds for some positive q and r ∈ N satisfying 0 ≤ r < a.Since r belongs to the k-ideal A, it follows that r = 0, and hence A= 〈a〉. The laststatement follows, since 〈a〉 ⊆ 〈b〉⇔ b|a. �

Remark 1 None of the maximal k-ideals 〈p〉 of N is a maximal ideal of N. Thisfollows since each ideal A= 〈p〉 is properly contained in the proper ideal B = {b ∈N : b ≥ p} of N.

Remark 2 Let A= 〈p〉, p is prime in Remark 1 and τA be the hull-kernel topologydefined in A. Then

(a) (A, τA) is a connected space,(b) (A, τA) is compact.

(See Proposition A.6.1.)

Recall that a semiring S is said to be additively regular iff for each a ∈ S, ∃ anelement b ∈ S such that a = a + b + a. If in addition, the element b is uniqueand satisfies b = b + a + b, then S is called an additively inverse semiring. In anadditively inverse semiring, the unique inverse b of an element a is usually denotedby a′.

Exercise (Karvellas 1974) Let S be an additively inverse semiring. Then

(i) x = (x′)′, (x + y)′ = y′ + x′, (xy)′ = x′y = xy′ and xy = x′y′ ∀x, y ∈ S.(ii) E+ = {x ∈ S : x+ x = x} is an additively commutative semilattice and an ideal

of S.

Definition A.2.3 Let S be an additively inverse semiring in which addition is com-mutative and E+ denote the set of all additive idempotents of S. A left k-ideal A ofS is said to be full iff E+ ⊆A. A right k-ideal of S is defined dually. A non-emptysubset I of S is called a full k-ideal iff I is both a left and a right full k-ideal.

Example A.2.4 (a) In a ring every ring ideal is a full k-ideal.(b) In a distributive lattice with more than two elements, a proper ideal is a k-ideal

but not a full k-ideal.(c) Z × N+ = {(a, b) : a, b are integers and b > 0}. Define (a, b) + (c, d) =

(a + c, lcm(b, d)) and (a, b)(c, d) = (ac,gcd(b, d)). Then Z × N+ becomes anadditively inverse semiring in which addition is commutative. Let A = {(a, b) ∈Z×N+ : a = 0}. Then A is a full k-ideal of Z×N+.

A.3 Ring Congruences and Their Characterization

We now define a ring congruence and characterize those ring congruences ρ onadditively inverse semirings S in which addition is commutative and is such that

Page 606: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

592 A Some Aspects of Semirings

−(aρ)= a′ρ, where a′ denotes the inverse of a in S and−(aρ) denotes the additiveinverse of aρ in the ring S/ρ.

Definition A.3.1 A congruence ρ on a semiring S is called a ring congruence iffthe quotient semiring S/ρ is a ring.

Theorem A.3.1 Let A be a full k-ideal of S. Then the relation ρA = {(a, b) ∈ S×S :a + b′ ∈A} is a ring congruence of S such that −(aρA)= a′ρA.

Proof Since a + a′ ∈ E+ ⊆ A for all a ∈ S, it follows that ρA is reflexive. Leta + b′ ∈ A. Now from W.O. Ex. 1(a), we find that (a + b′)′ ∈ A. Then b + a′ =(b′)′ + a′ = (a + b′)′ ∈ A. Hence ρA is symmetric. Let a + b′ ∈ A and b+ c′ ∈ A.Then a + b+ b′ + c′ ∈A. Also b+ b′ ∈E+ ⊆A. Since A is a k-ideal, we find thata + c′ ∈ A. Hence ρA is an equivalence relation. Let (a, b) ∈ ρA and c ∈ S. Thena + b′ ∈A. Since

(c+ a)+ (c+ b)′ = c+ a + b′ + c′ = (a + b′)+ (c+ c′

) ∈A,

ca + (cb)′ = ca + cb′ = c(a + b′

) ∈A and

ac+ (bc)′ = ac+ b′c= (a + b′)c ∈A,

it follows that ρA is a congruence on S. So we obtain the quotient semiring whereaddition and multiplication are defined by

aρA + bρA = (a + b)ρA and (aρA)(bρA)= (ab)ρA.

Now

aρA + bρA = (a + b)ρA = (b+ a)ρA = bρA + aρA.

Let e ∈E+ and a ∈ S. Now (e+ a)+ a′ = e+ (a + a′) ∈E+.We find that (e+ a)ρA = aρA. Then eρA + aρA = aρA.Also

aρA + a′ρA =(a + a′

)ρA = eρA.

Hence eρA is the zero element and a′ρA is the negative element of aρA in the ringS/ρA. �

Theorem A.3.2 Let ρ be a congruence of S such that S/ρ is a ring and −(aρ)=a′ρ. Then there exists a full k-ideal A of S such that ρA = ρ.

Proof Let A= {a ∈ S : (a, e) ∈ ρ for some e ∈E+}. Since ρ is reflexive, it followsthat E+ ⊆A. Then A �= ∅, since E+ �= ∅. Let a, b ∈A. Then there exist e, f ∈E+such that (a, e) ∈ ρ and (b, f ) ∈ ρ. Then (a+b, e+f ) ∈ ρ. But e+f ∈E+. Hencea + b ∈A. Again for any r ∈ S, (ra, re) ∈ ρ and (ar, er) ∈ ρ. But re and er ∈E+.Hence A is an ideal of S. Let a+ b ∈A and b ∈A. Then there exist e, f ∈E+ suchthat (a + b,f ) ∈ ρ and (b, e) ∈ ρ. Hence fρ = (a + b)ρ = aρ + bρ = aρ + eρ.

Page 607: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.4 k-Regular Semirings 593

But fρ and eρ are additive idempotents in the ring S/ρ. Hence eρ = fρ is thezero element of S/ρ. As a result aρ is the zero element of S/ρ. Then aρ = eρ. Thisimplies a ∈A. So we find that A is a full k-ideal of S. Consider now the congruencesρA and ρ. Let (a, b) ∈ ρ. Then (a+b′, b+b′) ∈ ρ. But b+b′ ∈E+. Hence a+b′ ∈A and (a, b) ∈ ρA. Conversely, suppose that (a, b) ∈ ρA. Then a + b′ ∈ A. Hence(a + b′, e) ∈ ρ for some e ∈E+. As a result, eρ = aρ + b′ρ = aρ − bρ holds in thering S/ρ. But eρ is the zero element of S/ρ. Consequently aρ = bρ. This show that(a, b) ∈ ρ and hence ρA = ρ. �

Remark (a) Certain types of ring congruences on an additive inverse semiring arecharacterized with the help of full k-ideals (see Theorems A.3.1 and A.3.2).

(b) It is shown that the set of all full k-ideals of an additively inverse semiring inwhich addition is commutative forms a complete lattice which is also modular (seeW.O. Ex. 1(d)).

A.4 k-Regular Semirings

Definition A.4.1 Let S be an additively commutative semiring and a ∈ S. Then a

is called regular (in the sense of Von Neuman) if a = axa holds for some x ∈ S andk-regular if there are x, y ∈ S satisfying a + aya = axa. If all the elements of S

have the corresponding property, S is called a regular or a k-regular semiring. Sinceaya can be added to both sides of a = axa, each regular semiring is also k-regular.If S happens to be a ring, both concepts coincide and each (additively commutative)semifield S is regular.

Example A.4.1 For an additively commutative semiring S with an identity 1, a con-dition C′ is introduced in Definition A.2.1 by the property that each element a ∈ S

which is not multiplicatively absorbing zero satisfies 1+ s1a = s2a for suitable ele-ments si ∈ S. This condition implies that S has only trivial k-ideals, and the converseholds if (S, ·) is commutative (see Theorem A.2.2). Clearly, each semiring of thiskind is k-regular, but not necessarily regular.

Lemma A.4.1 Let S be an additively commutative and cancellative semiring andR =D(S) its difference ring. If R is regular, then S is k-regular. The converse holdsif S is semisubtractive, but not in general.

Proof Let R be regular and a ∈ S. Then a = ara holds for a suitable element r ∈R,say r = x − y for x, y ∈ S, which yields a + aya = axa. Now assume that S isk-regular and semisubtractive. Then each r �= 0 of R satisfies r = a or r = −a

for some a ∈ S, and a + aya = axa for some x, y ∈ S implies a = a(x − y)a or−a = a(y − x)a in R. For the last statement, let Q[z] be the polynomial ring overthe field of rational numbers and R =Q[z]/(z2). For brevity, we may write a + bz

for all elements of R. It was shown in Weinert (1963) that S = {a+ bz ∈R : a > 0}

Page 608: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

594 A Some Aspects of Semirings

is a subsemifield of R such that R =D(S) holds. Hence S is even regular, whereaszrz= 0 for all r ∈R shows that R is not regular. �

Note that S can be replaced by S ∪ {0} in this example.

Example A.4.2 Let Mn,n(H0) be the semiring of all n× n matrices over the semi-field H0 of all non-negative rational numbers. Then Mn,n(H0) is k-regular, since thematrix ring Mn,n(Q)=D(Mn,n(H0)) is well known to be regular. Clearly, H0 maybe replaced in this example by any semifield S such that D(S) is a field [see Weinert(1963)].

Lemma A.4.2 Let S be a k-regular semiring. Then A∩B = BA holds for each leftk-ideal A and each right k-ideal B of S.

Proof From BA⊆A∩B , we get BA⊆ A and BA⊆ B = B . Hence BA⊆A∩B .To show the reverse inclusion, assume a ∈A∩B . Then aza = a(za) ∈ BA for eachz ∈ S and a + aya = axa imply a ∈ BA. �

Theorem A.4.1 For such a hemiring S, the set K(S) of all k-ideals of S forms acomplete lattice (K(S),⊆). This lattice is distributive if

(2.1) A∩B =AB holds for all k-ideals A= A and B = B of S, hence in particularif the hemiring is k-regular.

Proof The intersection of any set of k-ideals of S is known to be a k-ideal of S,and S is a k-ideal of S. This yields the result that (K(S) ⊆) is a complete lattice,for which A ∧ B = A ∩ B is the infimum and A ∨ B = A+B is the supremumof A,B ∈ K(S). Moreover, as in each lattice, A ∧ (B ∨ C) ⊇ (A ∧ B) ∨ (A ∧ C)

holds for all A,B,C ∈K(S). So it remains to show the reverse inclusion. Now A∧(B ∨C)=A∩ (B +C)=A(B +C) holds by (2.1). Suppose x ∈A(B +C). Then

x + u = v for some u,v ∈ A(B +C). Hence u = a1y1 and v = a2v2 for suitableai ∈A and yi ∈ B +C. Then

y1 + b1 + c1 = b2 + c2 and y2 + b3 + c3 = b4 + c4

for suitable bi ∈ B and ci ∈ C. Thus

a1y1 + a1b1 + a1c1 = a1b2 + a1c2 yields u+ a1b1 + a1c1 = a1b2 + a1c2,

which states u ∈ AB +AC. Likewise we obtain v ∈ AB +AC and thus x ∈AB +AC for x + u = v, since AB +AC is k-closed. Now A ∧ (B ∨ C) ⊆AB +AC and AB +AC ⊆AB +AC = (A∩B)+ (A∩C)= (A∧B)∨ (A∧C)

complete the proof that the lattice (K(S),⊆) is distributive.We show in this context that, for each hemiring S, the condition (2.1) is equiva-

lent to

(2.2) A=AA holds for each k-ideal A= A of S.

Page 609: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.4 k-Regular Semirings 595

Clearly, (2.1) for A = B yields (2.2), and AB ⊆ A ∩ B implies for k-ideals al-ways AB ⊆ A∩B = A ∩ B . Applying (2.2) to the k-ideal A ∩ B , we get the otherinclusion of (2.1) by A∩B = (A∩B)(A∩B)⊆AB . �

Remark (2.2) follows from the (obviously stronger) condition that A=A2 holds forall ideals of a hemiring S. The latter, for instance is satisfied if S is regular, impliedby a result of Ashan (1993) that the complete lattice of all ideals of S is Brouwerianand thus distributive. However, none of the sufficient conditions for distributivitymentioned so far is necessary.

Example A.4.3 One easily checks that the set S = {0, a, b} becomes a hemiringaccording to the following tables.

+ 0 a b

0 0 a b

a a a b

b b b b

• 0 a b

0 0 0 0a 0 0 0b 0 0 b

This hemiring has the k-ideals {0} ⊂ {0, a} ⊂ S and one more ideal {0, b} whosek-closure is S. Hence (K(S),⊆) and obviously also the lattice of all ideals of S aredistributive. However, {0, a}2 = {0} disproves (2.2) and thus k-regularity and clearlyA2 =A for all ideals A of S.

Finally considering any ring as a hemiring, the k-ideals of R are just the ring-theoretical ideals of R, well known to form a modular lattice. So one could suspectthat the latter holds also for the lattice K(S) for each hemiring S. But the followingexample shows that the complete lattice (K(S),⊆) of all k-ideals of a hemiring S

does not need to be modular.

Remark For each k-regular hemiring S, the set K(S) of all k-ideals of S formsa complete distributive lattice. In general, however, the lattice of all k-ideals of ahemiring does not need to be even modular.

Example A.4.4 Consider the set S = {0, a, b, s, c, d}. We define (S,+) by the table

+ 0 a b s c d

0 0 a b s c d

a a a s s d d

b b s b s d d

s s s s s d d

c c d d d c d

d d d d d d d

and xy = 0 for all x, y ∈ S. Instead of dealing with associativity of (S,+) directly,note that (S\{0},+) is the commutative and idempotent semigroup generated by{a, b, c, d} subject to relations a + c = d and b + c = d . Clearly, s is shorting fora+b. Now one checks that the subsets of S as shown in Fig. A.1 are k-ideals of this

Page 610: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

596 A Some Aspects of Semirings

Fig. A.1 k-ideals of SS

{0, a, b, s}

{0, a} {0, c}

{0}

Fig. A.2 Commutativity ofthe ring completion diagram S◦

g

S

f

h

R

semiring. By a well known criterion, {0, a, b, s} ∩ {0, c} = {0} and {0, a} ∨ {0, c} ={0, a} + {0, c} = {0, a, c, d} = S show that (K(S)⊆) is not modular.

Remark For one sided h-ideals and k-ideals in semirings, see Weinert et al. (1996).

A.5 The Ring Completion of a Semiring

The concept of a ring completion of a semiring arises through the process of passingfrom the semiring of non-negative integers to yield the ring of integers. This conceptis used to study the stability properties of vector bundles (see Husemoller 1966,Chap. 8).

Definition A.5.1 Let S be a semiring with 0 (absorbing). The ring completion of S

is a pair (S◦, f ), where S◦ is a ring and f : S → S◦ is a semiring homomorphismsuch that for any semiring homomorphism h : S→R, where R is an arbitrary ring,there exists a unique ring homomorphism g : S◦ → R such that g ◦ f = h, i.e., thediagram in Fig. A.2 is commutative.

We now prescribe a construction of S◦.

Construction of S◦: Consider the pairs (a, b) ∈ S × S and define an equivalencerelation ρ on these pairs: (a, b) and (c, d) are said to be ρ-equivalent iff there exists

Page 611: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.6 Structure Spaces of Semirings 597

Fig. A.3 Commutativediagram for ring completion S◦

gS

f

f1

S◦1

h

some l ∈ S such that a+d+ l = c+b+ l. Denote the ρ-equivalent class of (a, b) by〈a, b〉. We may consider 〈a, b〉 = a − b. Let S◦ be the set of all ρ-equivalence class〈a, b〉. Define 〈a, b〉+〈c, d〉 = 〈a+c, b+d〉 and 〈a, b〉 ·〈c, d〉 = 〈ac+bd, bc+ad〉.These compositions are independent of the choice of the representatives of classesand hence are well defined. Clearly, 〈S◦,+, ·〉 is a ring with its zero element 0 =〈0,0〉 and negative of 〈a, b〉 being 〈b, a〉. The homomorphism f : S→ S◦ is definedby f (x)= 〈x,0〉.

Uniqueness of (S◦, f ):Let (S◦1 , f1) be another ring completion of (S◦, f ). Thenthere exist ring homomorphisms g : S◦ → S◦1 and h : S◦1 → S◦ making the diagramin Fig. A.3 commutative.

It follows from the commutativity of the diagram that both g ◦ h and h ◦ g areidentity homomorphisms of rings. Hence the rings S◦ and S◦1 are isomorphic.

Remark 1 S◦ may be viewed as the free abelian group generated by the set S mod-ulo the subgroup generated by (a + b)+ (−1)a + (−1)b, a, b ∈ S.

Remark 2 The process of passing from a semigroup to a group is analogous andyields its group completion.

A.6 Structure Spaces of Semirings

The structure spaces of semirings, formed by the class of prime k-ideals and primefull k-ideals are considered in this section. More precisely, the properties such asseparation axioms, compactness and connectedness in these structure spaces arestudied. Finally, these properties for the semiring of non-negative integers are ex-amined.

In this section we only consider semirings S for which (S,+) is commutative.

Definition A.6.1 Let A �= ∅ be any subset of a semiring S. Then the ideal generatedby A is the intersection of all ideals I of S containing A.

We recall the definition of hull-kernel topology and some of its properties (Gill-man 1957; Kohis 1957; Slowikowski and Zawadowski 1955).

Page 612: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

598 A Some Aspects of Semirings

Definition A.6.2 Let A be the set of all proper prime ideals of a commutative ringwith identity. For any subset A of A, A given by A= {I ∈A :⋂Iα∈A Iα ⊆ I } givesA �→ A a closure operator defining some topology τA called the hull-kernel topol-ogy on A. The hull-kernel topology on the set A of all proper prime k-ideals (fullk-ideals) of a commutative semiring with identity is defined in a similar way.

Proposition A.6.1

(a) (i) A⊆ A,(ii) A= ¯A,

(iii) A⊆ B⇒ A⊆ B , and(iv) A∪B = A∪ B for all subsets A, B of A

(b) (i) For any commutative semiring S with identity 1, let A be the set of allproper prime k-ideals of S and for each a ∈ S, Δ(a)= {I ∈A : a ∈ I }. IfcΔ(a) = A \Δ(a) then {cΔ(a) : a ∈ S} forms an open base for the hull-kernel topology on A.

(ii) (A, τA) is a T1-space iff no element of A is contained in any other elementof A.

(c) Let M be the set of all maximal k-ideals of S. Then (M, τM) is a T1-space,where τM is the induced topology on M from (A, τA).

(d) For the semiring N of non-negative integers, let A= 〈p〉, p is prime and A bethe set of all prime ideals A of N. Then

(i) (A, τA) is a connected space;(ii) (A, τA) is compact;

where τA is the hull-kernel topology on A.

Proof Left as an exercise. �

We now study further properties of the structure spaces. Let I be any k-idealof S. Define Δ(I)= {I ′ ∈A : I ⊆ I ′}.

Proposition A.6.2 Any closed set in A is of the form Δ(I), where I is a k-idealof S.

Proof Let A be any closed set in A, where A ⊆A. Let A = {Iα : α ∈Λ} and I =⋂α∈Λ Iα . Then A=Δ(I). �

Theorem A.6.1 (A, τA) is a Hausdorff space if and only if for any distinct pair ofelements I , J of A, there exist a, b ∈ S such that a �∈ J , b �∈ I and there does notexist any element K of A such that a �∈K and b �∈K .

Proof Let (A, τA) be Hausdorff. Then for any pair of distinct elements I , J of Athere exist basic open sets cΔ(a) and cΔ(b) such that I ∈ cΔ(a), J ∈ cΔ(b) andcΔ(a) ∩ cΔ(b)= ∅. It follows that a �∈ I , b �∈ J and for any prime k-ideal K of S

Page 613: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.6 Structure Spaces of Semirings 599

for which a, b �∈ K implies K ∈ cΔ(a) ∩ cΔ(b), a contradiction, since cΔ(a) ∩cΔ(b)= ∅.

Conversely, let the given condition hold and I, J ∈ A, I �= J . Let a, b ∈ S besuch that a �∈ I, b �∈ J and there does not exist any K of A such that a �∈K , b �∈K .Then I ∈ cΔ(a), J ∈ cΔ(b) and cΔ(a) ∩ cΔ(b)= ∅, which proves that (A, τA) isHausdorff. �

Corollary If (A, τA) is a T2-space, then no proper prime k-ideal contains any otherproper prime k-ideal. If (A, τA) contains more than one element, then there exista, b ∈ S such that A= cΔ(a)∪ cΔ(b)∪Δ(I), where I is the k-ideal generated bya, b.

Proof Suppose (A, τA) is a T2-space. Since every T2-space is a T1-space, (A, τA) isa T1-space. Hence by Proposition A.6.1 no proper prime k-ideal contains any otherproper prime k-ideal. Now let I, J ∈ A, where I �= J . Then by Theorem A.6.1,there exist a, b in S such that a �= b, a �∈ I, b �∈ J and cΔ(a) ∩ cΔ(b) = ∅. Let I

be the k-ideal generated by a, b. Then since cΔ(a)∩Δ(b)= ∅. Any element of A,belongs to cΔ(a) or cΔ(b) or Δ(I), and therefore cΔ(a)∪ cΔ(b)∪Δ(I)=A. �

Theorem A.6.2 (A, τA) is a regular space if and only if for any I ∈A and a �∈ I ,a ∈ S, there exist a k-ideal J of S and b ∈ S such that I ∈ cΔ(b)⊆Δ(J )⊆ cΔ(a).

Proof Let (A, τA) be a regular space. Then for any I ∈A and any closed set Δ(J )

not containing I , there exist disjoint open sets U,V such that I ∈U and Δ(J )⊆ V .If a �∈ I , then I ∈ cΔ(a) and A\ cΔ(a) is a closed set not containing I . Hence U,V

are disjoint open sets containing I and A \ cΔ(a), respectively. Then there existsb ∈ S such that I ∈ cΔ(b)⊆Δ(J )⊆ cΔ(a), where J is a k-ideal of S.

Conversely, let the given condition hold. Let I ∈ A and Δ(K) be any closedset not containing I . Let a �∈ I, a ∈ K . Then by the given condition, there exist ak-ideal J and an element b ∈ S such that I ∈ cΔ(b) ⊆Δ(J ) ⊆ cΔ(a). Obviously,cΔ(a) ∩Δ(K)= ∅. So, cΔ(b) and A \Δ(J ) are two disjoint open sets containingI and Δ(K), respectively. Consequently, (A, τA) is a regular space. �

Theorem A.6.3 (A, τA) is a compact space if and only if for any collection {ai} ofelements of S there exists a finite number of elements a1, a2, . . . , ar in S such thatfor any I ∈A, there exists ai such that ai �∈ I .

Proof Let (A, τA) be a compact space. Then the open cover {cΔ(a) : a ∈ S} has afinite subcover {cΔ(ai) : i = 1, . . . , r}. Thus if I ∈ A, then I ∈ cΔ(ai) for some i

which implies that ai �∈ I . Hence ai, . . . , ar are the required finite number of ele-ments.

The converse follows from Kohis (1957, Lemma 3.1). �

Corollary If S is finitely generated, then (A, τA) is compact.

Page 614: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

600 A Some Aspects of Semirings

Proof Let {ai : i = 1, . . . , r} be a set of generators of S. Then for any I ∈A, thereexists ai such that ai �∈ I , since I is a proper k-ideal. Hence by Theorem A.6.3.(A, τA) is compact. �

Proposition A.6.3 Let (S, τS ) be the space of all proper prime full k-ideals of S.Then (S, τS ) is compact if and only if E+ = {x ∈ S : x + x = x} �= {0}.

Proof Let {Δ(Iα) : α ∈ Λ} be any collection of closed sets in S with finite inter-section property. Let I be the proper prime k-ideal which is also the full k-idealgenerated by E+. Since any prime full k-ideal J contains E+, J contains I . HenceI ∈⋂α∈Λ Δ(Iα) �= ∅. Consequently, (S, τS ) is compact. �

Definition A.6.3 A semiring S is said to be k-Noetherian if and only if it satisfiesthe ascending chain condition on k-ideals on S i.e., if and only if for the ascendingchain I1 ⊆ I2 ⊆ · · · ⊆ In · · · of k-ideals of S, there exists a positive integer m suchthat In = Im for all n≥m.

Theorem A.6.4 If S is a k-Noetherian semiring, then (A, τA) is countably com-pact.

Proof Let {Δ(In)}∞n=1 be a countable collection of closed sets in A, with finite in-tersection property. Let 〈A〉 denote the prime k-ideal generated by A, where A (�=∅)is any subset of A. Let us consider the following ascending chain of prime k-ideals:I1 ⊆ 〈I1 ∪ I2〉 ⊆ 〈I1 ∪ I2 ∪ I3〉 ⊆ · · · . Since S is k-Noetherian, there exists a positiveinteger m such that 〈I1 ∪ I2 ∪ · · · ∪ In〉 = 〈I1 ∪ I2 ∪ · · · ∪ Im+1〉 = · · · , which showsthat 〈I1 ∪ · · · ∪ Im〉 ∈⋂∞n=1 Δ(In) �= ∅. Hence (A, τA) is countably compact. �

Corollary If S is a k-Noetherian semiring and (A, τA) is second countable, then(A, τA) is compact.

Proof It follows from Theorem A.6.4 and the fact any open cover of a second count-able space has a countable subcover. �

Theorem A.6.5 (A, τA) is disconnected if and only if there exist a k-ideal I of S

and a collection of points {aα}α∈Λ of S not belonging to I such that if I ′ ∈A andaα ∈ I ′, ∀α ∈Λ, then I \ I ′ �= ∅.

Proof Let (A, τA) be not connected. Then there exists a non-trivial open and closedsubset of A. Let I be the k-ideal of S for which Δ(I) is closed as well as open. ThenΔ(I) = ⋃α∈Λ cΔ(aα), where {aα}α∈λ is a collection of points of S. Now sincecΔ(aα)⊆Δ(I), ∀α ∈Λ for any Iα ∈ cΔ(aα) we have I ⊆ Iα , and therefore aα �∈ I

as aα �∈ Iα , ∀α ∈Λ. Now for any I ′ ∈A and aα ∈ I ′, ∀α ∈Λ we have I ′ �∈ Δ(I).Consequently, I �⊆ I i.e., I \ I ′ �= ∅.

Conversely, let the given condition hold. Then Δ(I)=⋃α∈Λ cΔ(aα) is an openand closed non-trivial subset of A and hence (A, τA) is disconnected. �

Page 615: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.7 Worked-Out Exercises and Exercises 601

Proposition A.6.4 (S, τS ) is connected space if E+ �= {0}.

Proof Let I be the proper k-ideal generated by E+. Then I belongs to any closedset Δ(I ′) of A, since any full k-ideal of S contains E+. Consequently any twoclosed sets of A are not disjoint. Hence (S, τS ) is connected. �

Example A.6.1 Let S =N be the set semiring of non-negative integers with respectto usual addition and multiplication. Then the prime proper k-ideals of S are (p)={np : n ∈ N} where p is a prime number (Sen and Adhikari 1993). Let A = {(p) :p is prime} and τA be the hull-kernel topology defined in A. Since any prime properk-ideal of N is not contained in other prime proper k-ideal, (A, τA) is a T1-space.Now let (p1) and (p2) be two distinct elements of A and let n1, n2 be two elementsof S such that n1 �∈ (p1) and n2 �∈ (p2), then we can always find an element (p) ofA, such that n1 �∈ (p) and n2 �∈ (p). In fact one can take p > n1, n2,p1,p2 and p isprime. Hence by Theorem A.6.1, (A, τA) is not a Hausdorff space. cΔ(n) is infiniteand its complement, which is closed in A, is finite. So any two non-trivial open setsintersect. Consequently, (A, τA) is neither a T2-space nor a regular space. For thisreason (A, τA) is a connected space. Clearly, (A, τA) is compact by Theorem A.6.3.

A.7 Worked-Out Exercises and Exercises

Worked-Out Exercises (W.O. Ex)

1. Let S be an additively inverse semiring in which addition is commutative andE+ denote the set of all additive idempotents of S.

(a) Every k-ideal of S is an additively inverse subsemiring of S.(b) Let A be an ideal of S. Then

(i) A = {a ∈ S : a + x ∈ A for some x ∈ A} is a k-ideal of S such thatA⊆ A.

(ii) A=A⇔A is a k-ideal.

(c) Let A and B be full k-ideals of S, then A+B is a full k-ideal of S such thatA⊆A+B and B ⊆A+B .

(d) If I (S) denotes the set of full k-ideals of S, then I (S) is a complete latticewhich is also modular.

Solution (a) Let I be a k-ideal of S. Clearly I is a subsemiring of S. Let a ∈ I . Then

a + (a′ + a)= a ∈ I.

Since I is a k-ideal, if follows a′ + a ∈ I . Again this implies that a′ ∈ I . Hence (a)follows.

(b) Let a, b ∈ A. Then a+ x, b+ y ∈A for some x, y ∈A. Now a+ x+ b+ y =(a + b)+ (x + y) ∈A.

Page 616: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

602 A Some Aspects of Semirings

As x + y ∈A, a + b ∈ A. Next let r ∈ S, ra + rx = r(a + x) ∈A.As rx ∈ A, ra ∈ A. Similarly, ar ∈ A. As a result A is an ideal of S. Next, let c

and c+d ∈ A. Then there exist x and y in A such that c+x ∈A and c+d+y ∈A.Now d + (c+ x + y)= (c+ d + y)+ x ∈A and c+ x + y ∈A.Hence d ∈ A and A is a k-ideal of S. Since a + a′ ∈ A for all a ∈ A, it follows

that A⊆ A.(c) It can be shown that A+ B is an ideal of S. Then from (b), we find A+B

is a k-ideal and A+ B ⊆ A+B . Now E+ ⊆ A,B . Hence E+ ⊆ A+ B ⊆ A+B .This implies that A+B is a full k-ideal. Let a ∈A. Then

a = a + a′ + a = a + (a′ + a) ∈A+B as a′ + a ∈E+ ⊆ B.

Hence A⊆A+B and similarly B ⊆A+B .(d) We first note that I (S) is a partially ordered set with respect to usual set

inclusion. Let A,B ∈ I (S). Then A∩B ∈ I (S) and from (c), A+B ∈ I (S). DefineA ∧ B = A ∩ B and A ∨ B = A+B . Let C ∈ I (S) be such that A,B ⊆ C. ThenA + B ⊆ C and A+B ⊆ C. But C = C. Hence A+B ⊆ C. As a result A+B

is the lub of A, B . Thus we find that I (S) is a lattice. Now E+ is an ideal of S.Hence E+ ∈ I (S) and also S ∈ I (S); consequently I (S) is a complete lattice. Nextsuppose that A,B,C ∈ I (S) such that

A∧B =A∧C and A∨B =A∨C and B ⊆ C.

Let x ∈ C. Then x ∈ A ∨ C = A ∨ B = A+B . Hence there exists a + b ∈ A+ B

such that x + a + b= a1 + b1 for some a1 ∈A, b1 ∈ B .Then x + a + a′ + b= a1 + b1 + a′.Now x ∈ C,a + a′ ∈ C and b ∈ B ⊆ C. Hence a1 + b1 + a′ ∈ C. But b1 ∈ C.

Consequently, a1 + a′ ∈ C ∩A= C ∩B . Hence a1 + a′ ∈ B . So from x + a + b=a1 + b1 we find that x + a + a′ + b = a1 + a′ + b ∈ B . But (a + a′)+ b ∈ B is ak-ideal. Hence x ∈ B and B = C. This proves that I (S) is a modular lattice.

Exercises

1. Define homomorphism, monomorphism, epimorphism, isomorphism for semir-ings with the help of the corresponding definitions for semigroups and rings.

2. A mapping f : (S,+, ·)→ (T ,+, ·) is a semiring homomorphism iff both f :(S,+)→ (T ,+) and f : (S, ·)→ (T , ·) are semigroup homomorphisms.

3. Let f : (S,+, ·)→ (T ,+, ·) be a semiring homomorphism. Then the homo-morphic image (f (S),+, ·) of (S,+, ·) is also a semiring. If (S,+, ·) is com-mutative, then (f (S),+, ·) is also commutative. If f is an isomorphism thenf−1 is also so.

4. Let H be a hemiring and 0 �= a ∈ H and (e1, e2) �= (0,0) be an identity pairof H . A pair (c, d) ∈ H × H is called an inverse relative of the identity pair(e1, e2) iff e1+ ca = e2+da and e1+ac= e2+ad . An additively cancellativehemiring H is called a division hemiring iff H contains an identity pair andevery non-zero element of H is invertible in H . A hemiring H is said to be aleft k-Artinian (left Artinian) iff H satisfies the d.c.c for k-ideals (ideals) of H .

Page 617: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

A.8 Additional Reading 603

(a) Let H = {( a b0 d

) : a, b, d ∈R and a, d ≥ 5}∪ {( 0 0

0 0

)}is a division hemiring

with(( 5 0

0 5

),( 6 0

0 6

))as a left identity pair.

(b) A division hemiring H has no zero divisors.(c) A division hemiring is multiplicatively cancellative.(d) Let H be an additively cancellative hemiring with more than one element.

Then H is multiplicatively cancellative k-Artinian iff H is a division hemir-ing.

5. A semiring (S,+, ·) satisfying |S| ≥ 2 is called a semifield iff the set of itsnon-zero elements S′ forms a multiplicative group.

(a) Let (S,+, ·) be a semifield satisfying |S′| ≥ 2. Then the identity e of thegroup (S′, ·) is also the identity of (S,+, ·) and (S,+, ·) is multiplicativelycancellative.

(b) Let (S,+, ·) be a semiring satisfying |S′| ≥ 2. Then (S,+, ·) is a semifieldiff it satisfies one of the following statements:

(i) (S,+, ·) has a left identity e and each a ∈ S′ is invertible in (S, ·);(ii) For arbitrary elements a ∈ S′, b ∈ S, ∃ elements x, y ∈ S such that

ax = b and ya = b.

(c) Let (S,+, ·) be a semiring satisfying |S| ≥ 2. If (S,+, ·) has an identityand each a ∈ S′ has a (left) inverse a′ ∈ S, then (S,+, ·) is semifield.

6. A semiring S satisfying the condition (C′) of Definition A.2.1 contains at mostone left ideal consisting of a single element.

7. Let S = (S,+) be a semimodule and A⊂ S a maximal k-closed subsemimoduleof S. Then A is also k-closed in S i.e., A ⊂ B = B ⊆ S ⇒ B = S for each k-closed subsemimodule B of S.

8. If a semiring S satisfies the condition (C′) of Definition A.2.1, it contains atmost two left k-ideals, which are in fact two-sided ones, namely S and possibly,the ideal {0} consisting of the multiplicatively absorbing element 0 of S.

9. Let S be a semiring. The each proper k-ideals (h-ideal) of S is contained in amaximal k-ideal (h-ideal) of S if ∃ a finitely generated ideal I of S such thatI = S.

10. Give an example of multiplicatively commutative semiring S which has onlytwo h-ideals (viz. Z(S) and S), but an infinite chain of k-ideal Bi satisfying

A= Z(S)⊂ B1 ⊂ B2 ⊂ · · · ⊂ S.

(In particular, A= Z(S) is a maximal h-ideal of S, but not a maximal k-ideal.)

A.8 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Adhikari andDas 1994; Adhikari et al. 1996; Ahsan 1993; Fuchs 1963; Gillman 1957; Glazek

Page 618: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

604 A Some Aspects of Semirings

1985; Golan 1992; Hazewinkel 1996; Hebich and Weinert 1993; Henriksen 1958;Husemoller 1966; Iizuka 1959; Sen and Adhikari 1992, 1993; Vandiver 1934; Wein-ert 1963; Weinert et al. 1996) for further details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Das, M.K.: Structure spaces of semirings. Bull. Calcutta Math. Soc. 86, 313–317(1994)

Adhikari, M.R., Sen, M.K., Weinert, H.J.: On k-regular semirings. Bull. Calcutta Math. Soc. 88,141–144 (1996)

Ahsan, J.: Fully idempotent semirings. Proc. Jpn. Acad., Ser. A 69, 185–188 (1993)Fuchs, L.: Partially Ordered Algebraic Systems. Addison-Wesley, Reading (1963)Gillman, L.: Rings with Hausdorff structure space. Fundam. Math. 45, 1–16 (1957)Glazek, K.: A Short Guide Through the Literature on Semirings. Math. Inst. Univ. Wroclaw, Poland

(1985)Golan, J.S.: The Theory of Semirings with Applications in Mathematics and Theoretical Computer

Science. Longman, Harlow (1992)Hazewinkel, M. (ed.): Handbook of Algebra, vol. I. Elsevier, Amsterdam (1996)Hebich, U., Weinert, H.J.: Algebraische Theorie und Anwendungen in der Informatik. Tember,

Stuttgart (1993)Henriksen, M.: Ideals in semirings with commutative addition. Not. Am. Math. Soc. 5, 321 (1958)Husemoller, D.: Fibre Bundles, 2nd edn. Springer, New York (1966)Iizuka, K.: On the Jacobson radical of a semiring. Tohoku Math. J. 11(2), 409–421 (1959)Karvellas, P.H.: Inverse semirings. J. Aust. Math. Soc. 18, 277–288 (1974)Kohis, C.W.: The space of pair ideals of a ring. Fundam. Math. 45, 1–27 (1957)Sen, M.K., Adhikari, M.R.: On k-ideals of semirings. Int. J. Math. Math. Sci. 15(2), 347–350

(1992)Sen, M.K., Adhikari, M.R.: On maximal k-ideals of semirings. Proc. Am. Math. Soc. 113(3), 699–

703 (1993)Slowikowski, W., Zawadowski, W.: A generalization of maximal ideals method of Stone and

Gelfaand. Fundam. Math. 42, 215–231 (1955)Vandiver, H.S.: Note on a simply type of algebra in which cancellation law of addition does not

hold. Bull. Am. Math. Soc. 40, 914–920 (1934)Weinert, H.J.: Über Halbringe und Halbkorper II. Acta Math. Acad. Sci. Hung. 14, 209–227 (1963)Weinert, H.J., Sen, M.K., Adhikari, M.R.: One sided k-ideals and h-ideals in semirings. Pannon.

Hungary 7(1), 147–162 (1996)

Page 619: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Appendix BCategory Theory

Category theory is a very important branch of modern mathematics. It has beengrowing quite rapidly both in contents and applicability to other branches of the sub-ject. The concepts of categories, functors, natural transformations and duality formthe foundation of category theory. These concepts were introduced during 1942–1945 by S. Eilenberg and S. Mac Lane.1 Originally, the purpose of these notionswas to provide a technique for classifying certain concepts such as that of naturalisomorphism. In pedagogical methods in mathematics we compartmentalize math-ematics into its different branches without emphasizing their interrelationships. Butwith the help of category theory one can move from one branch of mathematics toanother. It provides a convenient language to tie together several notions and exist-ing results of different branches of mathematics in a unified way. This language isconveyed in this chapter through modern algebra, algebraic topology, topologicalalgebra, sheaf theory etc.

B.1 Categories

A category may be thought roughly as consisting of sets, possibly with additionalstructures, and functions, possibly preserving additional structures. More precisely,a category can be defined by the following characteristics.

Definition B.1.1 A category C consists of

(a) a class of objects X,Y,Z, . . . denoted by ob(C);(b) for each ordered pair of objects X, Y a set of morphisms with domain X and

range Y denoted by C(X,Y ) or simply (X,Y ); i.e., if f ∈ (X,Y ), then X is

1 (i) Natural isomorphism in group theory. Proc. Natl. Acad. Sci. USA 28, 537–544 (1942)(ii) General theory of natural equivalence. Trans. Am. Math. Soc. 58, 231–294 (1945)

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8, © Springer India 2014

605

Page 620: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

606 B Category Theory

called the domain of f and Y is called the codomain (or range) of f : one also

writes f :X→ Y or Xf−→ Y to denote the morphism from X to Y ;

(c) for each ordered triple of objects X,Y and Z and a pair of morphisms f :X→Y and g : Y → Z, their composite denoted by gf : X→ Z i.e., if f ∈ (X,Y )

and g ∈ (Y,Z), then their composite gf satisfies the following two axioms:

(i) associativity: if f ∈ (X,Y ), g ∈ (Y,Z) and h ∈ (Z,W), then h(gf ) =(hg)f ∈ (X,W);

(ii) identity: for each object Y in C, there is a morphism 1Y ∈ (Y,Y ) such thatif f ∈ (X,Y ), then 1Y f = f and if h ∈ (Y,Z), then h1Y = h. Clearly, 1Y

is unique.

If the class of objects is a set, the category is said to be small.

Example B.1.1 (i) Sets and functions form a category denoted by S.(Here the class of objects is the class of all sets and for sets X and Y, (X,Y )

equals the set of functions from X to Y and the composition has the usual meaning,i.e., usual composition of functions.)

(ii) Sets and injections (or surjections or bijections) form a category.(iii) Groups and homomorphisms form a category denoted by Grp.(Here the class of objects is the class of all groups and for groups X and Y, (X,Y )

equals the set of homomorphisms from X to Y and the composition has the usualmeaning.)

(iv) Rings and homomorphisms form a category denoted by Ring.(v) Commutative rings and homomorphisms form a category.(vi) R-modules and R-homomorphisms form a category denoted by ModR .(vii) Topological spaces and continuous maps form a category denoted by Top.(viii) Finite sets and functions form a category.(ix) Given a partial ordered set (X,≤), there is a category C whose objects are

the elements of X and such that C(x, x′) is either the singleton consisting of theordered pair (x, x′) or empty, according to whether x ≤ x′ or x �≤ x′, 1x = (x, x)

and (q, r)(x, q)= (x, r) when x ≤ q ≤ r .(Note that C(x, x′) is not a set of functions.)(x) Given a category C, there is an opposite (dual) category C0 whose objects

Y 0 are in one-to-one correspondence with the objects Y of C and whose morphismsf 0 : Y 0 → X0 are in one-to-one correspondence with the morphisms f : X → Y

and for g : Y → Z in C, f 0g0 is defined by f 0g0 = (gf )0.(xi) If C1 and C2 are categories, their product C1 × C2 is the category whose

objects are ordered pairs (Y1, Y2) of objects Y1 in C1 and Y2 in C2 and whosemorphisms (X1,X2)→ (Y1, Y2) are ordered pairs of morphisms (f1, f2), wheref1 : X1 → Y1 in C1 and f2 : X2 → Y2 in C2. Similarly, there is a product of anarbitrary indexed family of categories.

(xii) Let C be a category. We define a category C2 in the following way: objectsof C2 are the morphisms of C; morphisms of C2 are certain pairs of morphisms ofC, for f ∈ C(A,B) and g ∈ C(C,D), the pair (α,β) is a morphism from f to g inC2 iff α :A→ C and β : B→D satisfy the commutativity relation: βf = gα.

Page 621: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.2 Special Morphisms 607

Note that as objects of C2 and C × C are different, C2 �= C × C.(xiii) Exact sequences of R-modules and R-homomorphisms form a category.

Definition B.1.2 A subcategory C′ ⊂ C is a category such that

(a) the objects of C′ are also objects of C, i.e., ob(C′)⊆ ob(C);(b) for objects X′ and Y ′ of C′, C′(X′, Y ′)⊆ C(X′, Y ′);(c) if f ′ : X′ → Y ′ and g′ : Y ′ → Z′ are morphisms of C′, their composite in C′

equals their composite in C.

Definition B.1.3 A subcategory C′ of C is said to be a full subcategory of C iff forobjects X′ and Y ′ in C′, C(X′, Y ′)= C′(X′, Y ′).

The category in Example B.1.1(ii) is a subcategory of the category in Exam-ple B.1.1(i) and the category in Example B.1.1(viii) is a full subcategory of thecategory in Example B.1.1(i).

Remark The categories in Examples B.1.1(iii)–(vii) are not subcategories of thecategory in Example B.1.1(i), because each object of one of the former categoriesconsists of a set, endowed with an additional structure (hence, different objects inthese categories may have the same underlying sets).

In category Example B.1.1(ix), the morphisms are not functions and so this cat-egory is not a subcategory of the category in Example B.1.1(i).

B.2 Special Morphisms

Let C be a category and A,B,C, . . . objects of C.

Definition B.2.1 A morphism f :A→ B in C is called a coretraction iff there is amorphism g : B → A in C such that gf = 1A. In this case g is called a left inverseof f and f is called a right inverse of g and A is called a retract of B .

Dually we say that f is a retraction iff there is a morphism g′ : B→A such thatfg′ = 1B in C. In this case g′ is called a right inverse of f .

Definition B.2.2 A two-sided inverse (or simply an inverse) of f is a morphismwhich is both a left inverse of f and a right inverse of f .

Lemma B.1 If f : A→ B in C has a left inverse and a right inverse, they areequal.

Proof Let g′ : B → A be a left inverse of f and g′′ : B → A a right inverse off , then g′f = 1A and fg′′ = 1B . Now g′ = g′1B = g′(fg′′)= (g′f )g′′ = 1Ag′′ =g′′. �

Page 622: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

608 B Category Theory

Definition B.2.3 A morphism f : A→ B is called an equivalence (or an isomor-phism) in a category C denoted by f : A ≈ B iff there is a morphism g : B → A

which is a two-sided inverse of f .

Proposition B.2.1 If f :A→ B is a morphism in C such that f is both a retractionand a coretraction, then f is an equivalence.

Proof It follows from Definition B.2.1 and Lemma B.1. �

Remark An equivalence f : A≈ B has a unique inverse denoted by f−1 : B → A

and f−1 is also an equivalence.

Definition B.2.4 Two objects A and B in C are said to be equivalent iff there is anequivalence f :A≈ B in C.

Remark As the composite of equivalences is an equivalence, the relation of beingequivalent is an equivalence relation in any set of objects of a category C.

Definition B.2.5 A morphism α ∈ C(A,B) is called a monomorphism (or monic)iff αf = ag⇒ f = g for all pairs of morphisms f , g with codomain A and samedomain in C.

Definition B.2.6 A morphism α ∈ C(A,B) is called an epimorphism (or epic) ifff α = gα ⇒ f = g for all pairs of morphism f , g with domain B and samecodomain in C.

Remark The notion of an epimorphism is dual to that of a monomorphism in thesense that α is an epimorphism in C iff it is a monomorphism in its dual category C0.A coretraction is necessarily a monomorphism and a retraction is an epimorphism.Thus an isomorphism is both a monomorphism and an epimorphism in C.

Proposition B.2.2 If α : A→ B is a coretraction and also an epimorphism in C,then it is an isomorphism in C.

Proof As α is a coretraction, there exists a morphism β : B→A such that βα = 1A.Then

(αβ)α = α(βα)= α1A = α = 1Bα. (B.1)

Since α is an epimorphism, (B.1) shows that αβ = 1B . Consequently α is both aretraction and a coretraction. Hence α is an isomorphism. �

B.3 Functors

Our main interest in categories is in the maps from one category to another. Thosemaps which have the natural properties of preserving identities and composites are

Page 623: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.3 Functors 609

called functors. An algebraic representation of topology is a mapping from topologyto algebra. Such a representation, formally called a functor, converts a topologicalproblem into an algebraic one.

Definition B.3.1 Let C and D be categories. A covariant functor (or contravariantfunctor) T from C to D consists of

(i) an object function which assigns to every object X of C an object T (X) of D;and

(ii) a morphism function which assigns to every morphism f :X→ Y in C, a mor-phism T (f ) : T (X)→ T (Y ) (or T (f ) : T (Y )→ T (X)) in D such that

(a) T (1X)= 1T (X);(b) T (gf )= T (g)T (f ) (or T (gf )= T (f )T (g)) for g : Y →W in C.

Example B.3.1 (i) There is a covariant functor from the category of groups andhomomorphisms to the category of sets and functions which assigns to every groupits underlying set. This functor is called a forgetful functor because it forgets thestructure of a group.

(ii) Let R be a commutative ring. Given a fixed R-module M0, there is a covari-ant functor πM0 (or contravariant functor πM0 ) from the category of R-modules andR-homomorphisms to itself which assigns to an R-module M the R-module HomR

(M0,M) (or HomR(M,M0) and if α :M → N is an R-module homomorphism,then πM0(α) : HomR(M0,M) → HomR(M0,N) is defined by πM0(α)(f ) = αf

∀f ∈ HomR(M0,M) (πM0(α) : HomR(N,M0) → HomR(M,M0) is defined byπM0(α)(f )= f α ∀f ∈HomR(N,M0)).

(iii) Let C be any category and C ∈ ob(C). Then there is a covariant functorhC : C→ S (category of sets and functions) defined by hC(A)= C(C,A) (set of allmorphisms from the object C to the object A in C) ∀ objects A ∈ ob(C) and for f :A→ B in C, hC(f ) : hC(A)→ hC(B) is defined by hC(f )(g) = fg ∀g ∈ hC(A)

(the right hand side is the composite of morphisms in C).Its dual functor hC defined in an usual manner is a contravariant functor.(iv) For any category C there is a contravariant functor to its opposite category C0

which assigns to an object X of C the object X0 of C0 and to a morphism f :X→ Y

in C the morphism f 0 : Y 0 →X0 in C0.

Remark A functor from a category C to itself is sometimes called a functor on C.Any contravariant functor on C corresponds to a covariant functor on C0 and viceversa. Thus any functor can be regarded as a covariant (or contravariant) functor ona suitable category. In spite of this, we consider covariant as well as contravariantfunctors on C.

Definition B.3.2 A functor T : C→D is called

(i) faithful iff the mapping T : C(A,B)→D(T (A),T (B)) is injective;(ii) full iff the mapping T : C(A,B)→D(T (A),T (B)) is surjective; and

(iii) an embedding iff T is faithful and T (A)= T (B)⇒A= B .

Page 624: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

610 B Category Theory

Definition B.3.3 A category C is called concrete iff there is a faithful functor T :C→ S .

B.4 Natural Transformations

In some occasions we have to compare functors with each other. We do this bymeans of suitable maps between functors.

Definition B.4.1 Let C and D be categories. Suppose T1 and T2 are functors of thesame variance (either both covariant or both contravariant) from C to D. A naturaltransformation φ from T1 to T2 is a function from the objects of C to morphisms ofD such that for every morphism f :X→ Y in C the appropriate one of the followingconditions hold:

φ(Y )T1(f )= T2(f )φ(X) (when T1 and T2 are both covariant functors)

or

φ(X)T1(f )= T2(f )φ(Y ) (when T1 and T2 are both contravariant functors).

Definition B.4.2 Let C and D be categories and T1, T2 be functors of the samevariance from C to D. If φ is a natural transformation from T1 to T2 such thatφ(X) is an equivalence in D for each object X in C, then φ is called a naturalequivalence.

Example B.4.1 Let R be a commutative ring and Mod be the category of R-modules and R-homomorphism, M and N be objects in Mod. Suppose g :M →N

is a morphism in Mod. So by Example B.3.1(ii), πM , πN are both covariant functorsand πM , πN are both contravariant functors from Mod to itself. Then there exists anatural transformation g∗ : πN → πM , where g∗(X) : πN(X)→ πM(X) is definedby g∗(X)(h)= hg for every object X in Mod and for all h ∈ πN(X); and a naturaltransformation

g∗ : πM → πN, where g∗(X) is defined in an analogous manner.

If g is an equivalence in Mod, then both the natural transformations g∗ and g∗are natural equivalences.

Theorem B.4.1 (Yoneda’s Lemma) Let C be any category and T a covariant func-tor from C to S (category of sets and functions). Then for any object C in C, thereis an equivalence θ = θC,T : (hC,T )→ T (C), where (hC,T ) is the class of naturaltransformations from the set valued functor hC to the set valued functor T such thatθ is natural in C and T .

Page 625: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.4 Natural Transformations 611

Fig. B.1 Commutativity ofthe rectangle for naturaltransformation η

hC(C)η(C)

hC(f )

T (C)

T (f )

hC(X)η(X)

T (X)

Fig. B.2 Commutativity ofthe rectangle for naturaltransformation ρ

hC(X)hC(g)

ρ(x)(X)

hC(Y )

ρ(x)(Y )

T (X)T (g)

T (Y )

Proof We claim that every object C in C, (hC,T ) is a set. Let η : hC → T be anatural transformation.

Then for each f : C→X in C the diagram in Fig. B.1 is commutative.Hence

T (f )(η(C))(1C)= (T (f )η(C)

)(1C)= η(X)hC(f )(1C)= η(X)(f ) (B.2)

since hC(1C)= f 1C = f (see Example B.3.1(iii)).This shows that for each X, the function η(X) is completely determined by the

element η(C)(1C) ∈ T (C). The latter being a set, so is (hC,T ).Having dealt with this part we proceed with the main part.We define

θ : (hC,T )→ T (C) by θ(η)= η(C)(1C) ∈ T (C) ∀η ∈ (hC,T ). (B.3)

We now define a function

ρ : T (C)→ (hC,T ) by ρ(x)(X)(f )= T (f )(x)(B.4)

∀x ∈ T (C), X ∈ C and f ∈ C(C,X).

Then ρ(x) ∈ (hC,T ). Now from the definition of ρ it follows that ρ(x)(X) :C(C,X)→ T (X) is a function in S , because for f ∈ C(C,X), T (f ) ∈ S(T (C),

T (X))⇒ T (f )(x) ∈ T (X) ∀x ∈ T (C).Now for g :X→ Y in C, the diagram in Fig. B.2 is commutative.This is because

ρ(x)(Y )hC(g)(f ) = ρ(x)(Y )(gf )= T (gf )(x)= T (g)(T (f )(x)

)

= T (g)ρ(x)(X)(f ) ∀f ∈ hC(X).

Consequently, ρ(x) is a natural transformation from hC to T .

Page 626: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

612 B Category Theory

Fig. B.3 Commutativity ofthe rectangle for naturality ofθ in T

(hC,T )θ=θC,T

N∗(α)

T (C)

α(C)

(hC,S)θ=θC,S

S(C)

Fig. B.4 Commutativity ofthe rectangle for naturality ofθ in C

(hC,T )θC=θC,T

N∗(f )

T (C)

T (f )

(hD,T )θD=θD,T

T (D)

Now

(ρθ)(η)= ρ(θ(η))= ρ(η(C)(1C)

)

⇒ (ρθ)(η)(X)(f )= ρ(η(C)(1C)

)(X)(f )= Tf

(η(C)(1C)

)(B.5)

by (B.4) = η(X)(f ) by (B.2) ∀X ∈ C and ∀f ∈ C(C,X)⇒ ρθ = identity.

Also,

∀x ∈ T (C), (θρ)(x)= θ(ρ(x))= ρ(x)(C)(1C)

(B.6)by (B.3) = T (1C)(X) by (B.4) = 1T (C)(x)= x⇒ θρ = identity.

Consequently, θ is an equivalence.To show that θ is natural in T , we have to prove that the diagram in Fig. B.3

is commutative, where α : T → S is any natural transformation from the set val-ued functor T to the set valued functor S and N∗(α) : (hC,T ) → (hC,S) isdefined by N∗(α)(η) = αη, the latter is given by (αη)(X) = α(X)η(X) ∀X ∈C. Now α(C)θ(η) = α(C)η(C)(1C) = (αη)(C)(1C) and θN∗(α)(η) = θ(αη) =(αη)(C)(1C)⇒ the above diagram commutes⇒ θ is natural in T .

To show that θ is natural in C, we have to prove that the diagram in Fig. B.4 iscommutative.

For every morphism f : C→D in C, where for each X ∈ C and η ∈ (ηC,T ),

N∗(f )(η)(X) : hD(X)→ T (X) is defined by

N∗(f )(η(X))(g)= η(X)(gf ) ∀g ∈ hD(X).

Chasing the element η ∈ (hC,T ) anticlockwise, we have

θDN∗(f )(η)= (N∗(f )(η)(D))(1D)= η(D)(f ) (B.7)

Page 627: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.4 Natural Transformations 613

Fig. B.5 Commutativity ofthe rectangle for naturalityof η

hC(C)η(C)

hC(f )

T (C)

T (f )

hC(D)η(D)

T (D)

and chasing η clockwise, we have

T (f )θC(η)= T (f )η(C)(1C). (B.8)

Again by the naturality of η, the diagram in Fig. B.5 is commutative.Hence

T (f )η(C)(1C)= η(D)(hCf )(1C)= η(D)(f 1C)= η(D)(f ) (B.9)

Hence (B.7)–(B.9) show that θ is natural in T . �

Remark For the dual result of the theorem, see Exercise 9.

Example B.4.2 Let Grp be the category of groups and homomorphisms S be thecategory of sets and functions and S : Grp→ S be the forgetful functor which as-signs to each group G its underlying set SG. Then

(i) there is a natural equivalence from the covariant functor hZ to the covariantfunctor S; and

(ii) there is an equivalence θ : (S,S)→ SZ.

[Hint. (i) Let G be an arbitrary object in Grp and η : hZ → S a natural transfor-mation.

Define η(G) : hZ(G)→ SG by

η(G)(f )= f (1) ∀f ∈ ηZ(G)=Hom(Z,G),

where 1 is the generator of the infinite cyclic group Z.Again define ρ(G) : SG→ hZ(G) by ρ(G)(x) = f , where f is the group ho-

momorphism : Z→G defined by f (1)= x.Then ρ(G)η(G)(f ) = ρ(G)(f (1)) = ρ(G)(x) = f and η(G)ρ(G)(x) =

η(G)(f )= f (1)= x⇒ η(G) is an equivalence ∀G ∈Grp⇒ η is a natural equiva-lence.

(ii) Take in particular C = Grp, C = Z, T = S in Yoneda’s Lemma. Then it fol-lows by (i) and Yoneda’s Lemma that (S,S) ∼= (hZ, hZ) ∼= hZ(Z) = Hom(Z,Z) ∼=Z, the last equivalence is obtained by assigning to the group homomorphismf ∈Hom(Z,Z) the integer f (1) ∈ Z.]

Page 628: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

614 B Category Theory

B.5 Presheaf and Sheaf

Let X be a topological space. A presheaf A (of abelian groups) on X is a contravari-ant functor from the category of open subsets of X and inclusions to the category ofabelian groups and homomorphisms. In general, one may define presheaf with val-ues in an arbitrary category. Thus, if each A(U) is a ring for every open set U ⊂X

and for each pair of open sets of U , V (U ⊂ V ),ρU,V : A(V ) → A(U) is a ring homomorphism (called restriction) such that

ρU,U = identity and ρU,V ρV,W = ρU,W when U ⊂ V ⊂W ⊂ X, then A is calleda presheaf of rings.

Similarly, let A be a presheaf of rings on X and suppose that B is a presheaf onX such that each B(U) is an A(U)-module and ρU,V : B(V )→ B(U) are modulehomomorphisms such that ρU,U = identity and ρU,V ρV,W = ρU,W for open setsU ⊂ V ⊂W ⊂X. Then B is said to be a presheaf of A-modules.

If M is an abelian group, then there is the ‘constant presheaf’ with A(U) =M

for all U and ρU,V = identity ∀U ⊂ V . We also have the presheaf B assigning toU the group (under pointwise addition) B(U) of all functions from U to M , whereρU,V is the canonical restriction. If M is the group of all real numbers, we have thepresheaf C with C(U) being the group of all continuous real valued functions on U .

A sheaf (of abelian groups) on a topological space X is a pair A= (S,π), where

(i) S is a topological space;(ii) π : S → X is a local homeomorphism, i.e., every point α ∈ S has an open

neighborhood N in S such that π |N is a homeomorphism between N and anopen neighborhood of π(α) in X;

(iii) Each Ax = π−1(x), for x ∈X, is an abelian group (and is called the Stalk of S

over x);(iv) The group operations are continuous.

The meaning of (iv) is as follows: Let S ⊕ S = {(α,β) ∈ S × S : π(α)= π(β)} bethe subset of S×S with induced topology, the map S×S→ S defined by (α,β)→(α−β) is continuous (equivalently, the map f : S→ S, α→−α is continuous andthe map S × S→ S, (α,β)→ (α + β) is continuous).

Similarly, we may, for example, define a sheaf of rings or a module (sheaf ofmodules) over a sheaf of rings. Thus for a sheaf of rings, each stalk is assumed tohave the (given) structure of a ring and the map S⊕S→ S, (α,β) �→ αβ is assumedto be continuous (in addition to (iv)). For a sheaf of R-module each stalk of S is anR-module and the module multiplication S → S defined by α �→ rα is continuousfor each r ∈R.

The Canonical Presheaf of a Sheaf Let A= (S,π) be a sheaf on X. A sectionof A over an open set U ⊂X is a continuous map s :U → S such that πs :U →U

is the identity on U .By (iii) the set of all sections of A over U is an abelian group denoted by A(U).

Similarly, if R is a sheaf of rings, R((U)) is a ring.

Page 629: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.5 Presheaf and Sheaf 615

Fig. B.6 Commutativity ofthe rectangle for ahomomorphism of presheaves

A(U)h(U)

ρU,V

B(U)

τU,V

A(V )h(V )

B(V )

Now we assign to each open set U of X the group A(U) of sections of the sheafA over U , where A(U) is understood to be the zero group if U = ∅. If V ⊂ U ,define

ρU,V:A(U)→A(V ) (B.10)

to be the homomorphism which assigns to each section of A over U , its restrictionto V (if V = ∅, we put ρ

U,V= 0). The assignment

U �→ A(U) for open sets U ⊂ X defines a presheaf {A(U),ρU,V } on X. This

presheaf is called the canonical presheaf of the sheaf A = (S,π) on the presheafof sections of A.

The Sheaf Generated by a Presheaf Let A be a presheaf on X. For each openset U ⊂X, consider the space U ×A(U), where U has the subspace topology andA(U) has the discrete topology. Form the disjoint union E =⋃〈V⊂X〉(U ×A(U)).

We consider the following equivalence relation ρ on E.If (x, s) ∈ U × A(U) and (y, t) ∈ V × A(V ), then (x, s)ρ(y, t) ⇔ (x =

y and ∃ an open neighborhood W of x with W ⊂ U ∩ V and ρU,W (s)= ρV,W (t)).Let A be the quotient space E/ρ and π : A→ X be the projection induced bythe map p : E → X, (x, s) �→ x. Then π is a local homeomorphism. Clearly,A = π−1(x) is the direct limit of A(U) for U ranging over the open neighbor-hoods of x. Thus the stalk Ax has a natural group structure. Clearly, the groupoperations in A are continuous (since they are in E). Thus A is a sheaf called thesheaf generated by the presheaf A.

Homomorphisms of Presheaves and Sheaves We mainly consider presheavesor sheaves over a fixed base space X. A homomorphism h : A→ B of presheavesis a collection of homomorphisms hU : A(U)→ B(U) commuting the restrictionsi.e., making the diagram in Fig. B.6 commutative for V ⊂U ⊂X. ρ

U,Vand τ

U,Vare

defined by (B.10) in Fig B.6. Then h is a natural transformation of functors.A homomorphism f : A→ A′ of sheaves A = (Y,π) and A′ = (Y ′,π ′) on X

is a continuous map f : Y → Y ′ such that f (Ax)⊂A′x ∀x ∈X and the restrictionfx :Ax →A′x of f to stalks is a homomorphism ∀x ∈X.

A homomorphism of sheaves induces a homomorphism of their correspondingcanonical presheaves.

Conversely, let h : A→ B be a homomorphism of the presheaves. For each x ∈X, h induces a homomorphism hx :Ax = lim〈x∈U〉A(U)→ lim〈x∈U 〉B(U) = Bx ,and therefore, a map η :A→ B. If s ∈A(U), then h maps the section θ(s) ∈A(U)

onto the section θ(h(s)) ∈ B(U).

Page 630: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

616 B Category Theory

B.6 Exercises

Exercises

1. If α : A→ B is a retraction and also a monomorphism in a category C, provethat α is an isomorphism (Dual result of Proposition B.2.2).

[Hint. α is a retraction⇒∃ a monomorphism β : B→A such that αβ = 1B .Again α(βα)= (αβ)α = 1Bα = α1A⇒ βα = 1A (as α is a monomorphism).]

2. Show that if α : A→ B is an epimorphism in S , then α0 ∈ S0 is a monomor-phism.

3. (a) Let T be a functor from a category C to a category D. Show that T mapsequivalences in S to equivalences in D.

(b) Show that the equivalences in the category

(i) S are bijections;(ii) Grp are isomorphisms of groups;

(iii) Ring are isomorphisms of rings;(iv) ModR are isomorphisms of modules;(v) Top are homeomorphisms of topological spaces.

4. Let A be a subspace of a topological space X and f :A→ Y continuous. Thenf is said to have a continuous extension F : X→ Y iff F ◦ i = f , where i :A ↪→X is the inclusion map.

Let T be a covariant (or contravariant) functor from the category of topo-logical spaces and continuous maps to a category S . Show that a necessarycondition that a map f :A→ Y be extendable to X is that ∃ a morphism

φ : T (X)→ T (Y )(or φ : T (Y )→ T (X)

)

in S such that

φ ◦ T (i)= T (f )(or T (f )= T (i) ◦ φ

).

5. Let Rn be the Euclidean n-space, with ‖x‖ =√∑

x2i , En = n-ball= [x ∈Rn :

‖x‖ ≤ 1} and Sn−1 = (n− 1)-sphere= {x ∈Rn : ‖x‖ = 1}.Prove the following:

(a) the identity map 1Sn : Sn → Sn cannot be extended to a continuous mapEn+1 → Sn;

(b) Brouwer Fixed Point Theorem Any continuous map f : En+1 → En+1

has a fixed point (i.e., f (x)= x for some x ∈En+1).[Hint. (a) If possible, let f : En+1 → Sn be a continuous extension of

1nS . Then f ◦ i = 1n

S (see Exercise 4). Assume that Hn is the homologyfunctor such that Hn(S

n)∼= Z and Hn(En+1)= 0.

Use Hn on f ◦ i = 1nS and obtain Hn(S

n)Hn(i)−→ Hn(E

n+1)Hn(f )−→ Hn(S

n)

such that the composite homomorphism is the identity homomorphism ofHn(S

n) which is not possible as the composite homomorphism Z→ 0→Z cannot be identity. For n = 1, the result (a) can be proved in a similar

Page 631: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

B.6 Exercises 617

way by using the result that π1(S1)∼= Z and π1(E

2)= 0 (see Sect. 2.10 ofChap. 2).

(b) Let f : En+1 → En+1 be a continuous map. If possible f has nofixed point (i.e. f (x) �= x for any x ∈ En+1). Then for any x ∈ En+1 joinf (x) to x by a line and move along the line in the direction from f (x)

to x until the unique point r(x) ∈ Sn is reached. Then r : En+1 → Sn isa continuous map extending 1Sn, which contradicts the result of (a). TheBrouwer fixed point theorem for dimension 2 as stated in (b) can be provedin a similar way by using the result that π1(S

1) ∼= Z and π1(E2) = 0 (see

Sect. 2.10 of Chap. 2).]

6. Let S be a category and (X,Y ) be the set of morphisms from X to Y in S .By keeping X fixed and varying Y , show that this set is an invariant of theequivalent sets in the sense that there is a bijective correspondence between thesets corresponding to the equivalent sets. Find the corresponding result when X

is varied and Y is kept fixed.[Hint. Let Y ≈ Z. So there exist f : Y → Z and g :Z→ Y such that g ◦f =

1Y and f ◦ g = 1Z . Then f∗ : (X,Y )→ (X,Z) defined by f∗(α)= f ◦ α andg∗ : (X,Z)→ (X,Y ) defined by g∗(β) = g ◦ β are such that (g ◦ f )∗ = g∗ ◦f∗ = identity and f∗ ◦ g∗ = identity. Consequently f∗ is a bijection.]

7. Let X and Y be objects of a category S and let g : X→ Y be a morphism inS . Show that there is a natural transformation g∗ from the covariant functorhY to the covariant functor hX and a natural transformation g∗ from the con-travariant functor hX to the contravariant functor hY . Further show that if g isan equivalence in S , both these natural transformations g∗ and g∗ are naturalequivalences.

8. Let A and C be objects of a category C. Using the Yoneda Lemma, show that(hC,hA)≈ C(A,C).

[Hint. Take T = hA. Then by Yoneda’s Lemma (hC,hA) ∼= hA(C) =C(A,C).]

9. Prove the dual result of Theorem B.4.1:Let C be any category and T a contravariant functor from C to S. Then for

any object C ∈ C, there is an equivalence θ : (hC,T )→ T (C) such that θ isnatural in C and T .

10. Let Htp denote the category of pointed topological spaces and homotopy classesof their base point preserving continuous maps and Grp be the category ofgroups and their homomorphisms.

(a) If P is an H -group, show that there exists a contravariant function πP fromHtp to Grp. Further show that a homomorphism α : P → P ′ between H -groups induces a natural transformation α∗ : πP → πP ′ .

(b) If P is a topological group, show that πP is a contravariant functor fromHtp to Grp.

(c) π1 is a covariant functor from Htp to Grp.

Proof (a) Using Theorems 2.9.1–2.9.3, Chap. 2, define πP :Htp→Grp, suchthat πP (X)= [X;P ] and also for f :X→ Y in Htp, πP (f )= f ∗ : [Y ;P ] →[X;P ] by f ∗[h] = [h ◦ f ], then πP is a contravariant functor.

Page 632: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

618 B Category Theory

Again, for [g] ∈ [Y ;P ], f ∗α∗[g] = f ∗[α ◦g] = [(α ◦g)◦f ] and α∗f ∗[g] =α∗[g ◦ f ] = [α ◦ (g ◦ f )] ⇒ f ∗ ◦ α∗ = α∗ ◦ f ∗. Consequently, α∗ is a naturaltransformation.

(b) If g1, g2 :X→ P are base point preserving continuous maps, then g1g2 :X → P is defined by (g1g2)(x) = g1(x)g2(x) ∀x ∈ X, where the right handside is the group product in P . The law of composition carries over to give anoperation on homotopy classes such that [g1][g2] = [g1g2]. Then [X;P ] is agroup. Hence (b) follows from (a).

(c) It follows from Sect. 2.10 of Chap. 2. �

11. Let C(X) be the ring of real valued continuous functions on a topological spaceX. Then C is a contravariant functor from the category Top of topologicalspaces and continuous functions to the category Ring of rings and homomor-phisms.

12. Let Spec (R) be the spectrum space of a ring R endowed with Zariski topology(see Sect. 9.12). Then Spec is a contravariant functor from Ring to Top.

13. (a) Show that all chain complexes and chain maps (see Definition 9.11.4) forma category. We denote this category by Comp.

(b) For each n ∈ Z, show that Hn : Comp → Mod is a covariant functor (seeDefinition 9.11.3).

(c) For each n ∈ Z, show that Hn: Comp → Mod is a contravariant functor(see Definition 9.11.9).

[Hint. For (a) and (b) use Proposition 9.11.4.]14. Let AB denote the category of abelian groups and their homomorphisms.

(a) For an abelian group G, let T (G) denote its torsion group.Show that T :Ab→Ab defines a functor if T (f ) is defined by T (f )=

f |T (G) for every homomorphism f in Ab such that

(i) f is a monomorphism in Ab implies that T (f ) is also so;(ii) f is an epimorphism in Ab does not always imply that T (f ) is also so.

(b) Let p be a fixed prime integer. Show that T : Ab→ Ab defines a functor,where the object function is defined by T (G)=G/pG and the morphismfunction T (f ) is defined by T (f ) :G/pG→H/pH , x + pG �→ f (x)+pH for every homomorphism f :G→H in Ab such that

(i) f is an epimorphism in Ab implies that T (f ) is an epimorphism;(ii) f is a monomorphism in Ab does not always imply that T (f ) is a

monomorphism.

B.7 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003; Mac Lane 1997;Mitchell 1965; Spanier 1966) for further details.

Page 633: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

References 619

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Mac Lane, S.: Categories for the Working Mathematician. Springer, Berlin (1997)Eilenberg, S., Mac Lane, S.: Natural isomorphism in group theory. Proc. Natl. Acad. Sci. 28, 537–

545 (1942)Eilenberg, S., Mac Lane, S.: Generalized theory of natural equivalences. Trans. Am. Math. Soc.

58, 231–294 (1945)Mitchell, B.: Theory of Categories. Academic Press, New York (1965)Spanier, E.H.: Algebraic Topology. McGraw-Hill, New York (1966)

Page 634: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Appendix CA Brief Historical Note

Modern algebra began with the work of French mathematician E. Galois (1811–1832) who died in a duel at a very young age. He created one of the most importanttheories in the history of algebra known as “The Theory of Galois”. Before Galois,algebraists had mainly concentrated on the solutions of algebraic equations. Scip-ione dal Ferro, Tartaglia, and Cardano solved cubic equations, and Ferrari solvedbiquadratic equations completely by radicals. The most important predecessors ofGalois are J.L. Lagrange (1736–1813), C.F. Gauss (1777–1855) and N.H. Abel(1802–1829).

Linear algebra arose through the study of the theory of solutions of linear equa-tions and analytic geometry. The former contributed the algebraic formulas andthe latter geometric images. The concept of vector spaces (linear spaces) becameknown around 1920. Hermann Weyl gave a formal definition. A study of matrices,determinants and their closely related topics is the main objective of linear alge-bra. Theories of determinants, quadratic forms, linear algebraic equations and lineardifferential equations were developed in the first third of the 19th century mainlyby J.L. Lagrange and C.F. Gauss. Gauss studied in the fifth part of ‘DisquisnionesArithmeticae’ in 1801, the problem of reduction of the quadratic forms with integralcoefficients to canonical forms by using invertible substitution of the variables withintegral coefficients. A.L. Cauchy considered in his paper “Memoir on Functions”just two values equal in magnitude but opposite in sign under the permutations of thevariables contained in them and extended the investigation of C.A. Vandermonde fordeterminants of small order. He viewed a determinant as a function of n2 variableswhich he arranged in a square table. Some years later, C.G.J. Jacobi published a se-ries of papers on theory of determinants and quadratic forms. The existing notationdenoting a determinant by means of two vertical bars is introduced by Arthur Cay-ley, a British mathematician. His work on analytical geometry of dimension n andthat of H. Grassmann in “The Science of Linear Extension” mark a turning pointin the evolution of linear algebra. An important role in studying Linear Algebra isplayed by B. Riemann (1826–1866) in his famous paper “On the Hypothesis thatlie at the Foundation of Geometry” and by F. Klein in his work on “n-DimensionalSpace V and the Related Geometric Notion of Algebra” in 1870. On the other hand,

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8, © Springer India 2014

621

Page 635: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

622 C A Brief Historical Note

Arthur Cayley introduced the concept of matrices in 1855 and published severalnotes in Crelle’s Journal. The theory of determinants is much older than the theoryof matrices. The German Mathematician Leibniz (1646–1716) introduced the con-cept of determinants in connection with the solvability of systems of linear equationscommunicated in a letter to L’Hospital dated April 28, 1693, but the term “determi-nant” was coined by C.F. Gauss in 1801. Cayley is the first mathematician to realizethe importance of theory of matrices and laid the foundation of this theory. Theprogress in linear algebra during the last few decades focuses several techniqueslike rank-factorization, generalized inverses and singular value decomposition. Vec-tor spaces over finite fields play a very important role in computer science, codingtheory, design of experiments, combinatorics etc. Vector spaces over the rationalfield Q are very important in number theory and design of experiments and linearspaces over the complex field C are essential for the study of eigenvalues. The the-ory of linear spaces over an arbitrary field F is mainly developed with an eye to themodel of linear spaces over R.

Leonhard Euler (1707–1783) He was born in Basel, Switzerland. He spent mostof his time in St. Petersburg and Berlin. He joined the St. Petersburg Academyof Sciences in 1727. He went to Berlin in 1741. He returned to St. Petersburgin 1766, where he remained until his death. He is one of the greatest mathemati-cian of the world. He published 886 papers and books. He is the inventor of theEuler “φ-function”. His other important contributions are “Euler’s formula”, “Eu-ler’s theorem”, “Eulerian angle”, “Eulerian number”, “Euler–Lagrange equation”etc. He represented the Königsberg bridge problem (concerning the seven bridgesin Königsberg crossing the river Pregel) by a graph in which the areas are points andthe bridges are edges. This study of the seven bridges of Königsberg is the begin-ning of combinatorial topology. His fundamental work in different areas makes hispresence everywhere in mathematics. He died in 1783.

Joseph Louis Lagrange (1736–1813) He was born on January 25, 1736 in Turin,Italy. His mathematical contribution to different branches of mathematics includingnumber theory, theory of equations, differential equations, celestial mechanics, andfluid mechanics is of fundamental importance. In 1771, he presented an extremelyvaluable memoir to the Berlin Academy ‘Réflections sur la théorie algébrique deséquations’. In this paper he tried to prescribe a general method of solution for poly-nomials of degree greater than 4. He, however, failed to achieve his goal. But somenew concepts introduced in this paper on permutations of roots stimulated his suc-cessors, like Abel and Galois to develop the necessary theory to find a generalmethod of solution. This paper is considered to be one of the main sources fromwhich modern group theory developed. In 1770, he proved his famous Lagrange’stheorem in group theory. His presence is felt everywhere in mathematics. He diedon April 10, 1813.

Carl Friedrich Gauss (1777–1855) He was born on April 30, 1777 in a poorfamily, in Brunswick, Germany. At the age of 20, he published the first proof ofthe fundamental theorem of algebra. Lagrange considered special equations, such

Page 636: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

C A Brief Historical Note 623

as the cyclotomic equation xn − 1 = 0. But he did not go very far. The completesolution of this equation by means of radicals was given by Gauss in 1801 in hisbook on number theory ‘Disquisitiones Arithmeticae’, which laid the foundationof algebraic number theory. A second edition of his master piece was published in1870 (15 years after his death). Gauss introduced the concept of congruence classZn of integers modulo n, notation i for

√−1, the term complex numbers and Gaus-sian integers Z[i] and studied these extensively. He was the first mathematician tostudy the structures of fields and groups and established their close relationship.He referred to mathematics as ‘Queen of Sciences’. Gauss did not have interestin teaching. He preferred his job as the Director of Observatory at Göttingen. Buthe accepted students like Dedekind, Dirichlet, Riemann, Eisenstein and Kummer.E.T. Bell remarked “Gauss lives everywhere in mathematics”. He coined the term‘determinant’ in 1801. He died on February 23, 1855.

Augustin Louis Cauchy (1789–1857) He was born on August 21, 1789, in Paris,France. He came in touch with his neighbors Laplace and Bertholet in his childhood.He became an engineer in 1810 and started his mathematical research in 1811 witha problem from Lagrange on convex polyhedrons. He loved teaching. He solved thelong standing Fermat’s problem on polygon numbers in 1812. He published morethan 800 papers and 8 books on mathematics, mathematical physics and celestialmechanics. His work on mathematics covered calculus, complex functions, alge-bra, differential equations, geometry and analysis. The notion of continuity is hiscontribution. His treatise on the definite integral submitted to the French Academyin 1814 forms a basis of the theory of complex functions. He made a distinctionbetween permutations and substitutions. The n variables written in any order wascalled a permutation but a passage from one permutation to another written by 2-row notation called a substitution was introduced by him. We now call a substitutiona permutation. He introduced the concept of ‘group of substitutions’ which was latercalled ‘group of permutations’. Cauchy published a sequence of papers on substi-tutions during 1844–1846. The concepts of order of an element, a subgroup, andconjugates are found in his papers. He proved a theorem on a group of finite order,now called, Cauchy’s Theorem in his honor. His work on determinants and matri-ces are also important. Cauchy extended the investigation of C.A. Vandermonde fordeterminants of small order. He viewed a determinant as a function of n2 variableswhich he arranged in a square table. He died on May 22, 1857.

Niels Henrik Abel (1802–1829) He was born on August 5, 1802, in Finnöy, Nor-way. While he was a school student, he was greatly influenced by his mathematicsteacher Holmbëë to read the work of Euler, Lagrange, Laplace, and Cauchy. In-spired by their work he began to solve the then unsolved problem of solvability ofthe quintic equation. After a long effort, he proved in 1824 that a solution of thisproblem by radicals is impossible. He then published a leaflet in French entitled‘Mémorie sur les équations algébriques’ in 1824. While proving this impossibil-ity, he used some results obtained by Lagrange and Cauchy. The groups in whichcomposition is commutative are now called Abelian in his honour. His work on el-liptic functions revolutionized the theory of elliptic functions. He moved to Paris

Page 637: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

624 C A Brief Historical Note

and Berlin in search of a teaching assignment. The information of his appointmentas a Professor of Mathematics at the University of Berlin reached his home 2 daysafter his death from tuberculosis on April 6, 1829. An Abel Prize (equivalent toNobel Prize) has been instituted in 2002 by Norway Government to mark his 200thBirth Anniversary.

C.G.J. Jacobi (1804–1851) He published a number of papers on theory of de-terminants and quadratic forms. The identity introduced by him, called “The JacobiIdentity” is a relationship [A, [B,C]]+[B, [C,A]]+[C, [A,B]] = 0, between threeelements A, B , and C, where [A,B] is the commutator. The elements of a Lie al-gebra satisfy this identity. Jacobi’s Identity has wide applications in science andengineering.

H. Grassmann (1809–1877) His work on analytical geometry for dimension n

appeared in “The Science of Linear Extension” and marked a turning point in theevolution of linear algebra.

Evariste Galois (1811–1832) He was born on October 25, 1811 in Bour-la-Reine,near Paris, France. Galois twice failed at the entrance examination for the ÉcolePolytechnique. Galois presented his first paper on the solution of algebraic equa-tions to the Académie des Sciences de Paris in May, 1829. He also presented hissecond paper on equations of prime degree to the Academy. Both the papers weresent to Cauchy but were lost for ever. He presented another paper on solution ofalgebraic equations to the Academy in February, 1830 which was sent to Fourierby the Academy. This paper was also lost for ever. Galois published in the “Bul-letin des Sciences Mathématiques of Férussac” in April 1830 an article wherein heannounced some of his main results of the lost papers. One theorem of the paperstates “In order that an equation of prime degree is solvable by radicals, it is nec-essary and sufficient that, if two of its roots are known, the others can be expressedrationally. This shows that the general equation of degree 5 cannot be solved byradicals.” He published two more papers in June, 1830 on resolutions of numeri-cal equations and on the structure of finite field. Galois presented to the Academya new version of his memoir entitled “Memoire sur les conditions de résolubilitédes équations par radicaux” in January, 1831. This paper was published in 1846 (14years after the death of Galois) by Liouville in the Journal “de mathématiques puresat appliqués II”. An edition containing all preserved letters and manuscripts of Ga-lois was published by Gauthier-Villars in 1962 under the title “Ecrits et mémoiresmathématiques d’Evariste Galois”.

Arthur Cayley (1821–1895) He was born on August 16, 1821, in Cambridge,England. He became a lawyer in 1849. During his practice in the legal professionup to 1863, he wrote about 300 mathematical papers. He joined as Professor ofPure Mathematics at Cambridge in 1863 and worked there up to his death on Jan-uary 26, 1895. He worked on mathematics, theoretical dynamics and mathematicalastronomy. He wrote 966 papers and one book. In 1854, Cayley published two pa-pers under the title “On the Theory of Groups Depending on the Symbolic Equationθn = 1” in Philosophical Magazine of Royal Society, London, Vol. 7. In 1878, he

Page 638: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

C A Brief Historical Note 625

gave the abstract definition of groups and formulated the problem: to find all finitegroups of a given order n, and proved the famous Cayley Theorem for any finitegroup. He introduced multiplication table for a finite group known as Cayley Ta-ble. He introduced the concept of matrices in 1855 and published several notes inCrelle’s Journal. He is the first mathematician who realized the importance of theoryof matrices and laid the foundation work on this theory. He developed matrix the-ory and proved Cayley–Hamilton theorem. He is one of the earlier mathematicianswho studied geometry of dimensions greater than 3. The existing notation denotinga determinant by means of two vertical bars was introduced by A. Cayley. He isconsidered as the founder of abstract group theory.

Leopold Kronecker (1823–1891) He was born on December 7, 1823 in Ger-many. After 1870, the abstract notion of “groups” was developed in several stages,essentially due to Kronecker (1870) and Cayley (1878). The modern definition ofa group by axioms was given for abelian groups by Kronecker in 1870. After theintroduction of the concept of abstract group by Cayley and Kronecker, the theoryof groups changed its character. Earlier to them, the main problem was to determinethe structure of permutation groups under certain conditions as well as to determinethe structure of finite dimensional continuous groups of transformations. But after-wards, the main problem became: to create a general theory of the structure of ab-stract groups, and to determine all finite groups of a given order. E.E. Kummer washis mathematics teacher. Kronecker was greatly inspired by Kummer for research.Kronecker’s work on algebraic number theory placed him as one of the inventors ofalgebraic number theory along with Kummer and Dedekind. Kronecker is consid-ered to be the first mathematician who clearly understood the wok of Galois. WhileWeierstrass and Cantor were creating modern analysis, Kronecker remarked “Godmade positive integers, all else is due to man”. This remark badly affected Cantor.Kronecker died on December 29, 1891.

Bernhard Riemann (1826–1866) His famous paper “On the Hypothesis that lieat the Foundation of Geometry” plays an important role in studying linear algebra.His idea on geometry of space has made a significant effect on the development ofmodern theoretical physics. He clarified the notion of integral by defining an integralcalled Riemann Integral.

Richard Dedekind (1831–1916) He was born on October 6, in 1831 inBrunswick, Germany. He was in contact with Gauss, Dirichlet, Riemann. He com-pleted his Ph.D. work under Gauss. He attended a series of lectures of Dirichlet ontheory of numbers and lectures of Riemann on Abelian and elliptic functions. Hebecame interested in analytic geometry and algebraic analysis, differential integralcalculus and also in mechanics. He introduced the concept of “Dedekind cut” in1872. He edited the work of Gauss, Dirichlet, Riemann. He coined the term “ideal”and developed ideal theory and unique factorization theory. While studying idealsin algebraic number fields, he introduced the concepts of ascending chain condition.He replaced the concept the permutation group by abstract group. He loved teachingon Galois theory. He died on February 12, 1916.

Page 639: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

626 C A Brief Historical Note

Peter Ludvig Mejdell Sylow (1832–1918) He was born on December 12, 1832in Oslo, Norway. In 1872, he published a paper of fundamental importance in Math.Annalen 5, 584–594. It contained eight theorems and extended Cauchy’s result. Thetheorems in this paper are known as Sylow’s Theorems. He is famous for his workon structural results in finite group theory. He died on September 7, 1918. Sylowand Lie prepared an edition on the complete work of Abel during 1883–1881 withSylow as the main author according to Lie.

Camille Jordan (1838–1922) He was born on January 5, 1838 in Lyons, France.He was an engineer but he took admission at École Polytechnique in 1855 to studymathematics. He became professor of analysis in École Polytechnique in 1876. Jor-dan published 120 papers in mathematics. He originated the notion of a boundedfunction. He proved his famous theorem: “A plane can be decomposed into two re-gions by a simple closed curve” (called Jordan curve theorem). He was greatly influ-enced by the work of Riemann. He used combinatorial methods to work in topologyand introduced the concept of path homotopy. Jordan was basically an algebraist.He developed the theory of finite groups and its applications following Galois. Heintroduced the concept of composition series and proved the famous Jordan–HölderTheorem and the concept of simple groups and epimorphisms. His mathematicalwork of 667 pages “Traité des substitutions et des équations algébriques” publishedin 1870, attracted many scholars like Sophus Lie from Norway and Felix Klein fromGermany. In the preface to his “Traité”, he acknowledged the contribution of his pre-decessors: Galois who invented the principles of Galois Theory, Betti who wrote amemoir, in which the complete sequence of Galois Theory had been rigorously es-tablished for the first time, Abel, Kronecker, and Cayley. He proved finiteness the-orems and introduced the concept of simple groups. He studied the general lineargroups and the fields of p elements (p is a prime) and applied his work to classicalgroups to determine the structure of Galois groups of equations. He died on January22, 1922.

Sophus Lie (1842–1899) He was born at Nordfjordeid, Norway, in December1842. He made significant joint work with C.F. Klien. They went to Paris in 1870and lived in adjacent rooms for 2 months. Their joint paper was published in 1871in Math. Annalen 4, 424–429. They considered one dimensional continuous groups.In later years, they moved in different directions. S. Lie developed his theory ofcontinuous maps and used it in investigating differential equations and C.F. Kleininvestigated discrete groups. S. Lie is the inventor of Lie Algebra. The fundamentalidea of his Lie theory was published in his paper in Math. Annalen 16, in 1880.Lie’s investigation on the integration of differential equations attracted himself toinvestigate groups of transformations transforming a differential equation into itself.He developed his theory of transformation groups to solve his integration problems.Continuous transformation groups (called Lie groups, named after Lie), commutatorbrackets and Lie algebras are essentially due to him. They have wide applications inquantum mechanics. He died in 1899.

Page 640: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

C A Brief Historical Note 627

Georg Ferdinand Ludwig Philipp Cantor (1845–1918) He was born in March1845. He was a German mathematician. He originated naive set theory. He is knownas the father of set theory, which forms a strong foundation of different disciplinesin modern science. There are two general approaches to set theory. The first one iscalled “naive set theory” and the second one is called “axiomatic set theory”, alsoknown as “Zermelo–Fraenkel set theory”. These two approaches differ in a numberof ways. While developing mathematical theory of sets to study the real numbersand Fourier series, Cantor established the importance of a bijective correspondencebetween two sets and introduced the concepts of infinite sets, well-ordered sets,cardinal and ordinal numbers of sets and their arithmetic. He proved that the setof real numbers is not countable by a process known as Cantor’s diagonal process.This result shows the existence of transcendental numbers (which are not algebraicover the field Q of rational numbers) as the set A of algebraic numbers is countable.Transcendental numbers are precisely all the members of R of real numbers whichare not algebraic over the field Q. He died in January 6, 1918.

C. Felix Klein (1849–1925) He did not consider groups in his first paper on Non-Euclidean geometry but he considered transformation groups of invertible transfor-mations of a manifold in his second paper published in 1873. He defined group likeJordan. According to Klein, projective geometry and Euclidean geometry deal withproperties of figures which are invariant under respective transformations. Klein-4group is named in honor of Klein. His work on “n-dimensional vector spaces andthe related geometric notion of algebra’ in 1870 stimulated the study of linear alge-bra. Inspired by seminar lectures of Kronecker and Klein, the algebraist O.L. Hölder(1859–1937) completed the proof of so-called Jordan–Hölder theorem on composi-tion series, which plays a fundamental role in group theory.

Jules Henri Poincaré (1854–1912) He is a French mathematician and is knownas the father of topology. He was born in 1854 in Nancy, Lorraine, France. He haspublished around 300 papers and several books spread over different areas of puremathematics, celestial mechanics, fluid mechanics, optics, electricity, telegraphy,capillarity, elasticity, thermodynamics, potential theory, quantum theory, theory ofrelativity, physical cosmology and philosophy of science. The fundamental groupdefined in Chap. 3 was invented by Henri Poincaré in 1895 through his work Anal-ysis Situs. This group is also called Poincaré’s group in his honor. This group isassociated to any given pointed topological space. It is a topological invariant in thesense that two homeomorphic pointed topological spaces have isomorphic funda-mental groups. Intuitively, this group provides information about the basic shape, orholes, of the topological space. Poincaré’s work in algebraic topology is mainly ingeometric terms. The fundamental group is the first and simplest of the homotopygroups. Poincaré is the first mathematician who applied algebraic objects in homo-topy theory. Historically, an idea of a fundamental group was in the study of Rie-mann surfaces by Bernhard Riemann, Henri Poincaré, and Felix Klein. This grouphas wide applications in different areas. For example, Brouwer fixed point theo-rem and fundamental theorem of algebra are proved in this book and an extension

Page 641: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

628 C A Brief Historical Note

problem is solved by using homotopy theory and this group. His result on index ofintersection of two subgroups of a finite group is known as Poincaré’s theorem. Hedied in 1912 in Paris, France. His famous Poincaré conjecture, which was one of themost important long standing unsolved problems in mathematics till 2002–2003.The conjecture is “Every simply connected, closed 3-manifold is homeomorphicto the 3-sphere.” Grigory Perelman, a Russian mathematician solved this problem.He was awarded a Fields Medal at the Madrid, Spain meeting of the InternationalCongress of Mathematicians (ICM) for “his contributions to geometry and his revo-lutionary insights into the analytical and geometric structure of the Ricci flow”. Buthe declined to accept it.

David Hilbert (1862–1943) He was born on January 23, 1862 in Königsberg,Germany. The great mathematician Lindeman stimulated Hilbert to work on thetheory of invariants. He proved his famous theorem known as Hilbert Basis the-orem which made a revolution in algebraic geometry and ring theory. Greatly in-fluenced by the axioms of Euclid, he proposed 21 axioms with their significance.While addressing the Second International Congress of Mathematicians (ICM) of1900 at Paris, Hilbert posed 23 interesting problems for investigation including thecontinuum hypothesis, well ordering of reals, transcendence of powers of algebraicnumbers, Riemann hypothesis, extension of the Principle of Dirichlet and others.He also worked on algebraic number theory, foundation of geometry, integral equa-tion, calculus of variations, functional analysis and theoretical physics. He died onFebruary 14, 1943.

Amalie Emmy Noether (1882–1935) She was born on March 23, 1882 in Erlan-gen, Germany. Her father, Max Noether was a famous mathematician. She startedher mathematics career at the University of Göttingen in 1903 as a non-regular stu-dent, as at that time girl students were not allowed to be admitted as regular students.However, she was permitted in 1904 to enroll at the University of Erlangen whereher father taught. Hilbert invited her to Göttingen in 1915. After prolonged effortsof Hilbert, she was appointed an associate professor and taught there from 1922 to1933. As she was a Jew she had to leave the university and went to USA in 1933because of the rise of the Nazi regime. She gave lectures and did research workat Bryn Mawr College. In 1921 Noether extended the Dedekind theory of idealsand the representation theory of integral domains and rings of algebraic numbersfor arbitrary commutative rings satisfying ascending chain condition. These ringsare now called Noetherian ring. Motivated by Hilbert’s axiomatization of Euclideangeometry, Noether became interested in an abstract axiomatic approach to ring the-ory. Noether developed a general representation theory of groups and algebras overarbitrary ground fields. Her 45 research papers are divided into four categories:

Category 1. Group-Theoretic Foundations.Category 2. Non-commutative Ideal Theory.Category 3. Modules and Representations.Category 4. Representations of Groups and Algebras.

Page 642: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

C A Brief Historical Note 629

The basic concept of modern theory of rings came through the works of Noetherand Artin during 1920s.

The ascending chain condition was introduced by Noether in her theory of ideals.The concept of Noetherian rings is her invention. She died on April 14, 1935.

Joseph Henry MecLagan Wedderburn (1882–1948) He was born on Febru-ary 26, 1882 in Forfar, Scotland. He published 38 papers from 1905 to 1928and a book on matrices in 1934. He also worked on the structure of algebrasover arbitrary fields, instead of algebras over the fields of complex numbersor real numbers. He proved the celebrated theorem in 1905 known as ‘Wed-derburn theorem’ which asserts that a finite division ring is commutative. Itsintrinsic beauty is for interlinking the number of elements in a certain alge-braic system and the multiplication of that system. This result appears in manycontexts and developed a large area of research. His work on finite algebramade a revolution in projective geometry with a finite number of points. Forexample, his proof of the geometrical result that Desargues configuration im-plies Pappus configuration is of immense intrinsic beauty. He died on October 9,1948.

Emil Artin (1898–1962) He was born on March 3, 1898 in Vienna, Austria.Artin generalized some results of Wedderburn on algebras over fields in 1927, byconsidering rings with descending chain condition. He worked on various areas ofmathematics such as number theory, group theory, ring theory, field theory, geomet-ric algebra, and algebraic topology. Artinian ring is his invention. He proved in 1927the general laws of reciprocity, which cover all the previous laws of reciprocity up tothe time of Gauss. He formulated Galois theory in an abstract setting, he publishedGalois theory, as used today by establishing a connection between field extensionand the subgroups of automorphisms. He died on December 20, 1962.

Oscar Zariski (1899–1986) He was born in the city of Kobrin, the then part ofthe Russian Empire. In 1920, the city Kobrin fell in independent Poland as per po-litical agreement between Russia and Poland. He opted for the Polish nationalityfor his convenience to study mathematics. His work in the area of algebraic geom-etry is fundamental. The subject algebraic geometry arose through the study of thesolution sets of polynomial equations and can be traced back to Descartes. But itbecomes an important mathematical discipline in the 19th and 20th centuries. Bythe early twentieth century, the Italian school of algebraic geometers establishedmany interesting results and investigated many basic problems of algebraic geome-try. Zariski joined the strong group of the Italian school and by using modern algebrathe school reformulated the subject. Zariski introduced a topology with the help ofalgebraic sets as closed sets. This topology is now known as Zariski topology. Hewas a professor of mathematics at Harvard University and made Harvard a worldcenter for algebraic geometry and formed the basis for its twentieth century devel-opment.

Page 643: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

630 C A Brief Historical Note

C.1 Additional Reading

We refer the reader to the books (Adhikari and Adhikari 2003, 2004; Bell 1962;Birkoff and Mac Lane 2003; Hazewinkel et al. 2011; van der Waerden 1960) forfurther details.

References

Adhikari, M.R., Adhikari, A.: Groups, Rings and Modules with Applications, 2nd edn. UniversitiesPress, Hyderabad (2003)

Adhikari, M.R., Adhikari, A.: Text Book of Linear Algebra: An Introduction to Modern Algebra.Allied Publishers, New Delhi (2004)

Bell, E.T.: Men of Mathematics. Simon and Schuster, New York (1962)Birkhoff, G., Mac Lane, S.: A Survey of Modern Algebra. Universities Press, Andhra Pradesh

(2003)Hazewinkel, M., Gubareni, N., and Kirichenko, V.V.: Algebras, Rings and Modules, Vol. 1.

Springer, New Delhi (2011)van der Waerden, B.L.: A History of Algebra. Springer, Berlin (1960)

Page 644: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Index

SymbolsF -isomorphism, 491F -liar, 469F -witness, 469G-equivariant map, 142G-homomorphism, 142G-set, 138G-space, 151H -group, 114I : J , 231n-boundaries, 111n-chains, 406n-cycles, 111O-notation, 449p-groups, 144∅, 3

AAbel, 623Abelian group, 73Access structure, 548Action of a complex Lie group, 152Action of a group, 137Action of a real Lie group, 152Action of semigroup, 155Actions of topological group, 151Additivity law, 290Affine algebraic set, 214Affine algebraic surface, 214Affine cipher, 523Affine combination, 289Affine scheme, 410Affine set, 288Affine variety, 217Affinely independent, 289AKS Algorithm, 465Algebra ideal, 301

Algebra of vectors, 274Algebra over a field, 300Algebraic closure, 512Algebraic element, 489Algebraic extension, 489Algebraic integer, 504Algebraic multiplicity, 315Algebraic number, 500Algebraic number field, 502, 509Algebraic set, 214Algebraic set of zeros, 214Algebraically closed field, 502Alternating group, 127Amicable number, 414André Weil, 214Annihilator, 365Antisymmetric, 9Antisymmetric relation, 9Arithmetic function, 420Artin, 629Artinian module, 392Artinian ring, 260Ascending (descending) chain condition, 258Associates, 238Associative algebra, 358Associative law, 22Asymmetric cryptosystem, 529Asymptotic notation, 448

BBanach space, 331Basis, 284Basis of a module, 375Basis of a vector space, 284Betti number, 383Bezout’s identity, 241Bidding attack, 535

M.R. Adhikari, A. Adhikari, Basic Modern Algebra with Applications,DOI 10.1007/978-81-322-1599-8, © Springer India 2014

631

Page 645: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

632 Index

Bijection, 21Bijective, 21Bilinearity, 327Binary operation, 56Binary relation, 8Boole, 161Boolean algebra, 38Boolean ring, 193Boundary homomorphism, 406Brower fixed point theorem, 616Brute-force search, 521Burnside theorem, 143

CCaesarian cipher, 522Canonical homomorphism, 279Cantor, 627Cardinal number, 27Carmichael number, 472Cartesian product, 6Category, 605Cauchy, 623Cauchy sequence, 331Cauchy–Schwarz inequality, 327Cauchy’s theorem, 144Cayley, 624Cayley table, 56Cayley–Hamilton theorem, 317Cayley’s theorem, 140Center of a ring, 167Chain complex, 111, 406Chain homotopic, 407Chain map, 111Characteristic equation, 311Characteristic of a ring, 169Characteristic polynomial, 311Characteristic root, 310Chinese remainder theorem for modules, 405Chosen cipher text attack, 521Chosen plain text attack, 521Cipher text, 518Cipher text only attack, 520Class equation, 146Classical canonical form, 323Closure axiom, 56Coboundary homomorphism, 408Cochain complex, 408Cochain map, 409Cohen’s theorem, 262Cohomology class, 408Cohomology group, 408, 111Cohomology module, 408Column rank, 308Commutative, 73

Commutative ring, 160Companion matrix, 345Complement, 5Complement of a subspace, 278Complete field, 502Complete metric space, 331Complex Lie group, 152Complex projective space, 152Complex vector space, 275Composition, 56Concatenation of words, 156Congruence class of matrices, 336Congruence classes, 48Congruence modulo, 12Congruent, 48Congruent matrices, 336Conjugacy, 84Conjugacy class, 84Conjugate, 84Conjugate bilinearity, 327Conjugate element, 138Conjugate matrix, 314Conjugate symmetry, 326Conjugate transpose, 314Conjugation, 138Continuum hypothesis, 31Converse of Lagrange’s theorem, 145Coordinate ring, 217Coretraction, 607Correspondence theorem for modules, 370Correspondence theorem for rings, 208Countability of a set, 25Countable set, 25Cryptanalysis, 519Cryptology, 519Cryptosystem, 518Cyclic module, 361, 376Cyclic semigroup, 64Cyclotomic polynomial, 250

DDecision problem, 451Decryption, 518Dedekind, 625Degree of an element, 490Desargues, 629Determinant divisor, 320Determinant function, 98Deterministic algorithm, 451Deterministic primality testing, 463Diagonal, 6, 338Diamond lattice, 38Difference group, 94Differential operator, 340

Page 646: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Index 633

Diffie-Hellman key exchange, 530Diffie-Hellman problem (DHP), 532Digital signature, 542Dihedral group, 99Dimension, 286Direct product of modules, 363Direct sum, 278Direct sum of the modules, 364Dirichlet, 21Dirichlet’s theorem on primes, 418Discrete logarithm problem (DLP), 530Divide, 237Division algorithm, 42Division algorithm in polynomial ring, 253Division ring, 163Domain, 19Dorroh extension theorem, 173Dual space, 297Duplication of a cube, 513

EEigenspace, 311Eigenvalue, 310Eigenvector, 310Elementary divisor, 321Elementary divisors for modules, 384ElGamal cryptosystem, 536Embedding in a ring, 172Encryption, 518Endomorphism ring, 186Epimorphism theorem for modules, 371Equivalence class, 11Equivalence relation, 8Equivalent matrices, 307Euclidean algorithm, 457Euclidean domain, 243Euclidean norm function, 243Euclidean valuation, 243Euclid’s theorem, 46Euler, 622Euler phi-function, 421Euler’s theorem, 425Exact sequence, 386Existence theorem of a basis, 284Exponent of a module, 383Exponential time solvable, 452Extended Euclidean algorithm, 460Extension of a ring, 172External law of composition, 274

FFactorisable, 46Factorization, 242Factorization domain, 242

Faithful, 394Faithful functor, 609Faithful module, 394Family of sets, 7Fermat number, 443Fermat prime, 443Fermat’s last theorem, 414Fermat’s little theorem, 425Field, 165Field extension, 487Field generated, 488Field of formal power series, 181Field of quotients, 174Field of rational functions, 182Finite extension, 492Finite field, 498Finite set, 25Finitely generated, 85, 204, 281Finitely generated module, 361First isomorphism theorem for modules, 371First isomorphism theorem for vector spaces,

294First Sylow theorem, 147Fitting’s lemma, 394Five lemma, 390Formal power series ring, 177Four lemma, 389Fourier coefficient, 328Free abelian group, 103Free action, 139, 151Free module, 376Free part of module, 383Free rank, 383Frequency analysis, 524Frobenius homomorphism, 172Full linear group, 308Function, 19Functor, 608Fundamental group, 115Fundamental homomorphism theorem for

modules, 371Fundamental theorem of algebra, 502Fundamental theorem of arithmetic, 46

GGalois, 624Galois field, 498Gauss, 622Gauss lemma, 434Gauss theorem, 248Gaussian integer, 506Gaussian prime, 506Gelfand-Kolmogoroff, 185General linear group, 76, 308

Page 647: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

634 Index

General secret sharing scheme, 548Geometric multiplicity, 315Gödel, 31Gram–Schmidt orthogonalization process,

328Grassmann, 624Greatest common divisor, 43, 240Grothendieck, 411Group, 73Group action, 138Group of units, 424, 425Groupoid, 57

HHamilton, 164Hasse diagram, 13Hermitian matrix, 314Hilbert, 628Hilbert basis, 342Hilbert basis theorem, 259Hilbert space, 333Hilbert’s nullstellensatz theorem, 220Hill cipher, 526Homogeneity law, 290Homogeneous G-set, 142Homogeneous set, 142Homology class, 406Homology group, 111, 406Homology module, 406Homomorphisms of presheaves, 615Homomorphisms of sheaves, 615Homothecy, 369Homotopy, 115Hopf group, 112, 114Hypersurface, 214

IIdeal, 204Ideal of a set, 216Idempotent, 63Identification map, 151Identity element, 160Incongruent, 48Indefinite, 339Indeterminate, 179Index, 339Index of a subgroup, 140Indexing set, 7Infinite dimensional Euclidean space, 332Infinite dimensional unitary space, 332Infinite extension, 492Infinitely countable set, 25Infinitely generated, 281Injective, 21

Inner automorphism, 141Inner product, 326Inner product space, 327Instance of a computational problem, 451Integral domain, 162Integral quaternion, 164Intermediate field, 494Intersection, 4Invariant factor, 320, 383Invariant subspace, 344Inverse, 23Invertible, 163Invertible linear operator, 296Irrational flow, 154Irreducible element, 239Isomorphism of field extensions, 491Isomorphism theorem for modules, 370Isomorphism theorem for rings, 207Isomorphism theorem for vector spaces, 294Isomorphism theorem of quotient of quotient

for modules, 371Isotropy, 139Isotropy group, 139Isotropy subgroup, 142

JJacobi, 624Jacobi symbol, 440Jacobson radical, 264Jordan, 626Jordan block, 321Jordan canonical, 322Jordan form theorem, 322Jordan normal form, 323

KKerckhoffs’ law, 519Klein, 627Klein-4 group, 124Known plain text attack, 521Kronecker, 625Kronecker delta, 298Krull dimension, 271Krull-Zorn, 212

LLagrange, 622Lagrange’s theorem, 90Law of quadratic reciprocity, 438Least common multiple, 51, 241Least common multiple (lcm), 241Left ideal, 204Left invertible, 163Left translation, 138

Page 648: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Index 635

Legendre symbol, 432Leibniz, 622Lie, 626Lie group, 113Linear combination, 280Linear functional, 297Linear functionals on a module, 374Linear operator, 290Linear space, 274Linear transformation, 290Linearly independent, 282Local ring, 213Loop, 115

MMap, 19Matrix representation, 304Maximal condition, 258Maximal ideal, 209Maximal submodule, 362Mersenne number, 447Mersenne prime, 447Metric space, 330Minimal condition, 260Minimal polynomial, 302, 490, 501Minimal polynomial of a matrix, 318Minimal qualified subset, 548Minimal submodule, 362Module, 356Module homomorphism, 366Module of homomorphisms, 373Modules with chain conditions, 392Monic polynomial, 182Mono-alphabetic, 525Monoid, 59Monotone access structure, 548Multiplicative function, 420

NNakayama’s lemma, 401Natural transformation, 610Negative definite, 339Negative semidefinite, 339Nil ideal, 265Nilpotent, 63, 193Noether, 628Noetherian module, 392Noetherian ring, 258, 260Non-singular linear operator, 296Normal form, 338Normed linear space, 331Null space, 292Nullity, 295Number of divisor function, 423

OOblivious transfer, 544One–one, 21One-to-one correspondence, 21One-way, 528Onto, 21Open source software, 565Orbit, 139Orbit set, 139Orbit space, 151Order of a power series, 179Ordered pair, 6Orthogonal basis, 328Orthogonal complement, 330Orthogonal decomposition, 330Orthogonal direct sum, 330Orthogonal group, 122Orthonormal basis, 328OT based on RSA, 546

PPappus, 629Parallelogram law, 333Partial order, 12Partition, 10Partition of a set, 10Path, 115Path connected, 115Peano’s axiom, 39Pentagonal lattice, 16Perfect number, 445Perfect secret sharing, 548Permutation group, 75Permutation matrix, 304Pigeonhole principle, 21Pixel expansion, 552Plain text, 518Poincare, 627Poly-alphabetic, 525Polynomial ring, 181Polynomial time solvable, 452Polynomials in several variables, 196Poset, 12Positive definite, 339Positive definiteness, 326Positive semidefinite, 339Power series rings, 177Power set, 7Presheaf of rings, 614Primary decomposition theorem for modules,

384Primary ideal, 230Prime element, 239Prime field, 168, 489

Page 649: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

636 Index

Prime ideal, 209Prime integer, 45Prime number theorem, 419Prime subfield, 177Primitive element, 488Primitive root, 426Principal ideal, 204Principal ideal domain (PID), 212Principle of mathematical induction, 40Principle of strong mathematical induction, 47Principle of well-ordering, 41Private key, 528, 527Probabilistic primality testing, 466Product of ideals, 206Proper ideal, 205Property of trichotomy, 40Pseudo-prime, 469Public key, 528, 529

QQuadratic domain, 252Quadratic field, 510Quadratic form, 334Quadratic non-residue, 430Quadratic residue, 430Quaternion group, 123Quaternion rings, 164Quotient algebra, 301Quotient field, 174Quotient module, 370Quotient ring, 206Quotient semigroup, 156Quotient set, 11Quotient space, 279

RRabin cryptosystem, 538Randomized primality testing, 466Range, 19Range space, 292Rank, 295Rank of a free module, 377Rank of a matrix, 309Rational canonical form, 345Rational integer, 504Rational quaternion, 164Real Lie group, 152Real projective space, 151Real quaternion, 164Real quaternion ring, 164Real vector space, 275Rectangular band, 63Reflexive, 8Regular semigroup, 63

Regular semiring, 593Reimann sphere, 24Remainder theorem, 253Residue classes modulo n, 12Retract, 607Riemann, 625Right ideal, 204Right invertible, 163Ring, 160Ring completion, 596Ring embedding, 172Ring homomorphism, 170Ring of continuous functions, 185Ring of functions, 184, 193Row rank, 308RSA based digital signature, 543RSA public key cryptosystem, 532

SSAGE, 565Scalar, 275Scalar multiplication, 274Scheme, 411Schroeder-Bernstein equivalence principle, 28Schroeder-Bernstein theorem, 29Schur’s lemma, 369Second isomorphism theorem for modules,

371Second principle of mathematical induction,

47Second Sylow theorem, 147Secret sharing, 547Semiautomation, 155Semigroup, 58Semisimple, 364Semisimple ring, 231Set, 2Set of generators, 281Set of residue classes, 11Shadow, 548Shamir’s threshold secret sharing scheme, 549Share, 548Sheaf, 614Shift cipher, 522Short exact sequence, 386Short five lemma, 391Signature, 339Similar matrices, 306Simple extension, 488Simple module, 362Simple ring, 205Simplex, 289Skew field, 163Skew-Hermitian matrix, 314

Page 650: Mahima Ranjan Adhikari Avishek Adhikari Basic Modern ...

Index 637

Smith normal form, 343Solution space, 276Space curve, 214Space spanned, 281Special morphisms, 607Special quaternions, 165Spectrum of modules, 409Spectrum of rings, 410Splitting field, 498Splitting homomorphism, 388Square and multiply algorithm, 461Stabilizer, 139State machine, 155Statement, 2Stereographic projection, 24Strong mathematical induction, 47Structure space, 597Structure theorem for groups, 383Structure theorem for modules, 381Subalgebra, 300Subfield, 168Subgroup, 83Subgroupoid, 57Submodule, 358Subring, 166Subspace, 277Subspace generated, 281Substitution cipher, 523Substitution homomorphism, 183Sum of divisor function, 423Sum of ideals, 205Sum of subspaces, 278Sum of the submodules, 363Surjective, 21Sylow, 626Sylow’s theorem, 142Sylvester’s law of nullity, 295Sylvester’s theorem, 337Symmetric, 8Symmetric difference, 5Symmetric group, 75Symmetric key, 527Symmetry, 99

TTensor product, 404The Eisenstein criterion, 247Theorem of quotient of quotient of a sum for

modules, 372Third isomorphism theorem for modules, 372Third Sylow theorem, 148Three lemma, 389Threshold scheme, 548Topological group, 112, 151Topological rings, 197

Torsion module, 383Torus, 152Transcendental element, 489Transcendental extension, 489Transcendental number, 500Transfinite cardinal number, 28Transformation group, 116, 138Transition matrix, 304Transitive, 8Transitive action, 139Trapdoor of a function, 529Triangular matrix, 344Trisection of an angle, 513Trivial ideals, 205Twin primes, 419

UUniform distribution, 480Union, 4Union of sets, 4Unique factorization domain, 242Unit, 163Unit vector, 327Unitary matrix, 314Unitary module, 356Universal set, 4Urysohn lemma, 223

VVandermonde, 621Vector, 275Vector space, 274Venn diagrams, 5Vigenère cipher, 525

WWedderburn, 629Wedderburn Artin theorem, 405Wedderburn theorem, 189Well defined, 2Well-ordering principle, 41Weyl, 621Wiles, viiWilson’s theorem, 426

YYes-biased Monte Carlo algorithm, 466Yoneda’s lemma, 610

ZZariski, 629Zariski topology, 218Zero divisor, 161Zero ring, 161Zorn’s lemma, 16