Matching Items (20)
148348-Thumbnail Image.png
Description

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both parties perform random walks between supersingular elliptic curves on isogeny graphs of prime degree and eventually end at the same location, a shared secret.<br/><br/>This thesis seeks to explore some of the theory and concepts underlying the security of SIDH, especially as it relates to finding supersingular elliptic curves, generating isogeny graphs, and implementing SIDH. As elliptic curves and SIDH may be an unfamiliar topic to many readers, the paper begins by providing a brief introduction to elliptic curves, isogenies, and the SIDH Protocol. Next, the paper investigates more efficient methods of generating supersingular elliptic curves, which are important for visualizing the isogeny graphs in the algorithm and the setup of the protocol. Afterwards, the paper focuses on isogeny maps of various degrees, attempting to visualize isogeny maps similar to those used in SIDH. Finally, the paper looks at an implementation of SIDH in PARI/GP and work is done to see the effects of using isogenies of degree greater than 2 and 3 on the security, runtime, and practicality of the algorithm.

ContributorsSteele, Aaron J (Author) / Jones, John (Thesis director) / Childress, Nancy (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
187716-Thumbnail Image.png
Description
Iwasawa theory is a branch of number theory that studies the behavior of certain objects associated to a $\mathbb{Z}_p$-extension. We will focus our attention to the cyclotomic $\mathbb{Z}_p$-extensions of imaginary quadratic fields for varying primes p, and will give some conditions for when the corresponding lambda-invariants are greater than

Iwasawa theory is a branch of number theory that studies the behavior of certain objects associated to a $\mathbb{Z}_p$-extension. We will focus our attention to the cyclotomic $\mathbb{Z}_p$-extensions of imaginary quadratic fields for varying primes p, and will give some conditions for when the corresponding lambda-invariants are greater than 1.
ContributorsStokes, Christopher Mathewson (Author) / Childress, Nancy (Thesis advisor) / Sprung, Florian (Committee member) / Montaño, Johnathan (Committee member) / Paupert, Julian (Committee member) / Kaliszewski, Steven (Committee member) / Arizona State University (Publisher)
Created2023
Description
Mark and Paupert concocted a general method for producing presentations for arithmetic non-cocompact lattices, \(\Gamma\), in isometry groups of negatively curved symmetric spaces. To get around the difficulty of constructing fundamental domains in spaces of variable curvature, their method invokes a classical theorem of Macbeath applied to a \(\Gamma\)-invariant

Mark and Paupert concocted a general method for producing presentations for arithmetic non-cocompact lattices, \(\Gamma\), in isometry groups of negatively curved symmetric spaces. To get around the difficulty of constructing fundamental domains in spaces of variable curvature, their method invokes a classical theorem of Macbeath applied to a \(\Gamma\)-invariant covering by horoballs of the negatively curved symmetric space upon which \(\Gamma\) acts. This thesis aims to explore the application of their method to the Picard modular groups, PU\((2,1;\mathcal{O}_{d})\), acting on \(\mathbb{H}_{\C}^2\). This document contains the derivations for the group presentations corresponding to \(d=2,11\), which completes the list of presentations for Picard modular groups whose entries lie in Euclidean domains, namely those with \(d=1,2,3,7,11\). There are differences in the method's application when the lattice of interest has multiple cusps. \(d = 5\) is the smallest value of \(d\) for which the corresponding Picard modular group, \(\PU(2,1;\mathcal{O}_5)\), has multiple cusps, and the method variations become apparent when working in this case.
ContributorsPolletta, David Michael (Author) / Paupert, Julien H (Thesis advisor) / Kotschwar, Brett (Committee member) / Fishel, Susanna (Committee member) / Kawski, Matthias (Committee member) / Childress, Nancy (Committee member) / Arizona State University (Publisher)
Created2021
187305-Thumbnail Image.png
Description
Let $E$ be an elliptic curve defined over a number field $K$, $p$ a rational prime, and $\Lambda(\Gamma)$ the Iwasawa module of the cyclotomic extension of $K$. A famous conjecture by Mazur states that the $p$-primary component of the Selmer group of $E$ is $\Lambda(\Gamma)$-cotorsion when $E$ has good ordinary

Let $E$ be an elliptic curve defined over a number field $K$, $p$ a rational prime, and $\Lambda(\Gamma)$ the Iwasawa module of the cyclotomic extension of $K$. A famous conjecture by Mazur states that the $p$-primary component of the Selmer group of $E$ is $\Lambda(\Gamma)$-cotorsion when $E$ has good ordinary reduction at all primes of $K$ lying over $p$. The conjecture was proven in the case that $K$ is the field of rationals by Kato, but is known to be false when $E$ has supersingular reduction type. To salvage this result, Kobayashi introduced the signed Selmer groups, which impose stronger local conditions than their classical counterparts. Part of the construction of the signed Selmer groups involves using Honda's theory of commutative formal groups to define a canonical system of points. In this paper I offer an alternate construction that appeals to the Functional Equation Lemma, and explore a possible way of generalizing this method to elliptic curves defined over $p$-adic fields by passing from formal group laws to formal modules.
ContributorsReamy, Alexander (Author) / Sprung, Florian (Thesis advisor) / Childress, Nancy (Thesis advisor) / Paupert, Julien (Committee member) / Montaño, Jonathan (Committee member) / Kaliszewski, Steven (Committee member) / Arizona State University (Publisher)
Created2023
Description
This dissertation will cover two topics. For the first, let $K$ be a number field. A $K$-derived polynomial $f(x) \in K[x]$ is a polynomial that

factors into linear factors over $K$, as do all of its derivatives. Such a polynomial

is said to be {\it proper} if

its roots are distinct. An

This dissertation will cover two topics. For the first, let $K$ be a number field. A $K$-derived polynomial $f(x) \in K[x]$ is a polynomial that

factors into linear factors over $K$, as do all of its derivatives. Such a polynomial

is said to be {\it proper} if

its roots are distinct. An unresolved question in the literature is

whether or not there exists a proper $\Q$-derived polynomial of degree 4. Some examples

are known of proper $K$-derived quartics for a quadratic number field $K$, although other

than $\Q(\sqrt{3})$, these fields have quite large discriminant. (The second known field

is $\Q(\sqrt{3441})$.) I will describe a search for quadratic fields $K$

over which there exist proper $K$-derived quartics. The search finds examples for

$K=\Q(\sqrt{D})$ with $D=...,-95,-41,-19,21,31,89,...$.\\

For the second topic, by Krasner's lemma there exist a finite number of degree $n$ extensions of $\Q_p$. Jones and Roberts have developed a database recording invariants of $p$-adic extensions for low degree $n$. I will contribute data to this database by computing the Galois slope content, inertia subgroup, and Galois mean slope for a variety of wildly ramified extensions of composite degree using the idea of \emph{global splitting models}.
ContributorsCarrillo, Benjamin (Author) / Jones, John (Thesis advisor) / Bremner, Andrew (Thesis advisor) / Childress, Nancy (Committee member) / Fishel, Susanna (Committee member) / Kaliszewski, Steven (Committee member) / Arizona State University (Publisher)
Created2019
161884-Thumbnail Image.png
Description
Any permutation in the finite symmetric group can be written as a product of simple transpositions $s_i = (i~i+1)$. For a fixed permutation $\sigma \in \mathfrak{S}_n$ the products of minimal length are called reduced decompositions or reduced words, and the collection of all such reduced words is denoted $R(\sigma)$. Any

Any permutation in the finite symmetric group can be written as a product of simple transpositions $s_i = (i~i+1)$. For a fixed permutation $\sigma \in \mathfrak{S}_n$ the products of minimal length are called reduced decompositions or reduced words, and the collection of all such reduced words is denoted $R(\sigma)$. Any reduced word of $\sigma$ can be transformed into any other by a sequence of commutation moves or long braid moves. One area of interest in these sets are the congruence classes defined by using only braid moves or only commutation moves. This document will present work towards a conjectured relationship between the number of reduced words and the number of braid classes. The set $R(\sigma)$ can be drawn as a graph, $G(\sigma)$, where the vertices are the reduced words, and the edges denote the presence of a commutation or braid move between the words. This paper will present brand new work on subgraph structures in $G(\sigma)$, as well as new formulas to count the number of braid edges and commutation edges in $G(\sigma)$. The permutation $\sigma$ covers $\tau$ in the weak order poset if the length of $\tau$ is one less than the length of $\sigma$, and there exists a simple transposition $s_i$ such that $\sigma = \tau s_i$. This paper will cover new work on the relationships between the size of $R(\sigma)$ and $R(\tau)$, and how this creates a new method of writing reduced decompositions of $\sigma$ as products of permutations $\alpha$ and $\beta$, where both $\alpha$ and $\beta$ have a length greater than one. Finally, this thesis will also discuss how these results help relate the number of reduced words and the number of braid classes in certain cases.
ContributorsElder, Jennifer E (Author) / Fishel, Susanna (Thesis advisor) / Childress, Nancy (Committee member) / Czygrinow, Andrzej (Committee member) / Paupert, Julien (Committee member) / Vega, Oscar (Committee member) / Arizona State University (Publisher)
Created2021
132038-Thumbnail Image.png
Description
In this paper, we study the prime factorizations of numbers slightly larger than the factorial function. While these are closely related to the factorial prime, they have more inherent structure, which allows for explicit results as of yet not established on factorial prime. Case in point, the main result of

In this paper, we study the prime factorizations of numbers slightly larger than the factorial function. While these are closely related to the factorial prime, they have more inherent structure, which allows for explicit results as of yet not established on factorial prime. Case in point, the main result of this paper is that these numbers, which are described in concrete terms below, cannot be prime powers outside of a handful of small cases; this is a generalization of a classical result stating they cannot be primes. Minor explicit results and heuristic analysis are then given to further characterize the set.
ContributorsLawson, Liam John (Author) / Jones, John (Thesis director) / Childress, Nancy (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2019-12
131401-Thumbnail Image.png
Description
This thesis project is focused on studying the number field sieve. The number field sieve is a factoring algorithm which uses algebraic number theory and is one of the fastest known factoring algorithms today. Factoring large integers into prime factors is an extremely difficult problem, yet also extremely important in

This thesis project is focused on studying the number field sieve. The number field sieve is a factoring algorithm which uses algebraic number theory and is one of the fastest known factoring algorithms today. Factoring large integers into prime factors is an extremely difficult problem, yet also extremely important in cryptography. The security of the cryptosystem RSA is entirely based on the difficulty of factoring certain large integers into a product of two distinct large primes. While the number field sieve is one of the fastest factoring algorithms known, it is still not efficient enough to factor cryptographic sized integers.

In this thesis we will examine the algorithm of the number field sieve and discuss some important advancements. In particular, we will focus on the advancements that have been done in the polynomial selection step, the first main step of the number field sieve. The polynomial selected determines the number field by which computations are carried out in the remainder of the algorithm. Selection of a good polynomial allows for better time efficiency and a higher probability that the algorithm will be successful in factoring.
ContributorsLopez, Rose Eleanor (Co-author) / Lopez, Rose (Co-author) / Childress, Nancy (Thesis director) / Jones, John (Committee member) / Pomerance, Carl (Committee member) / School of Music (Contributor) / Department of Physics (Contributor) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131186-Thumbnail Image.png
Description
Similar to the real numbers, the p-adic fields are completions of the rational numbers. However, distance in this space is determined based on divisibility by a prime number, p, rather than by the traditional absolute value. This gives rise to a peculiar topology which offers significant simplifications for p-adic continuous

Similar to the real numbers, the p-adic fields are completions of the rational numbers. However, distance in this space is determined based on divisibility by a prime number, p, rather than by the traditional absolute value. This gives rise to a peculiar topology which offers significant simplifications for p-adic continuous functions and p-adic integration than is present in the real numbers. These simplifications may present significant advantages to modern physics – specifically in harmonic analysis, quantum mechanics, and string theory. This project discusses the construction of the p-adic numbers, elementary p-adic topology, p-adic continuous functions, introductory p-adic measure theory, the q-Volkenborn distribution, and applications of p-adic numbers to physics. We define q-Volkenborn integration and its connection to Bernoulli numbers.
ContributorsBurgueno, Alyssa Erin (Author) / Childress, Nancy (Thesis director) / Jones, John (Committee member) / School of Mathematical and Statistical Sciences (Contributor, Contributor, Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
165120-Thumbnail Image.png
Description

Applying a classical theorem due to Macbeath applied to a suitably sized horoball, we calculate novel group presentations for singly-cusped Bianchi groups. We find new presentations for Bianchi groups with d = -43, -67, -163. With previously known presentations for d = -1, -2, -3, -7, -11, -19, this constitutes

Applying a classical theorem due to Macbeath applied to a suitably sized horoball, we calculate novel group presentations for singly-cusped Bianchi groups. We find new presentations for Bianchi groups with d = -43, -67, -163. With previously known presentations for d = -1, -2, -3, -7, -11, -19, this constitutes a complete set of presentations for singly-cusped Bianchi groups.

ContributorsReese, Tanner (Author) / Paupert, Julien (Thesis director) / Childress, Nancy (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05