Math E-320 Blog

Previous blogs: 2021, 2017, 2016, 2015 (fall), 2015 (spring), 2014, 2013, 2012, 2011, 2010.

Lecture 13: Computer science

The poll has shown that cryptology has been the most favorite topic this semester. Maybe because a fun homework had just been done in this subject ...?

Something about AI: On May 29, 2022: Hammond sent the following link to an article which fits well into the AI part mentioned during our class.

We did one of the break out rooms without the jam board to experiment with some Bedford statistics and also to see how to get organized with work without a shared screen. Splitting up the task, sharing information on paper displaying it to the camera or using the chat were some creative solutions. Also interesting was to hear from everybody, where computers have been exciting. A few things which have come up is to use tablets in the classroom, being able to look up information easily on the web, or to have an entire library on your finger tip, or to see the transition to powerful visual user interfaces or to see hand made design transition to computerized CAD. When trying to predict what happens in the future of computing, we have looked at old 1900 predictions like this for the classroom
Some more are here or here. In the short movie about computer science
here is a slide with an illustration on experimental mathematics. Here is a bit more about the Babylonian graph:
And I decided to write down a few things here. It was also an opportunity to look at the fascinating history of the Pythagorean theorem. There were some questionable speculations in recent years suggesting that the Pythagorean theorem appeared thousands of years before Pythagoras an example or here. ``The Babylonians were using Pythagoras' Theorem over 1,000 years before he was born". Or ``Babylonians calculated with triangles centuries before Pythagoras". Such titles are misleading as they suggest that the theorem was ``known: 1000 years before Pythagoras. The fact that Babylonians have found some Pythagorean triples was already clear when the tablets were found. New in our headline-driven time is the ``speculative element" to make a story more exciting. In short
There is no evidence at all that the Pythagorean theorem was known at the time of the Babylonians.

Giving a few examples of integers a2 + b2 = c2 is even not the same than conjecturing that a Pythagorean theorem might hold. The Pythagorean theorem is a statement about right angle triangles. If you have a right angle triangle, then the relation holds. This is far, far away from a statement that for some select example cases of triangles, the relation holds. There are many, many examples of relations which hold in a few cases but do not hold in general. Formulating a Pythagorean theorem at the time of the Babylonians would have technically been possible, even without using any algebra notation. They managed to explain a computation of the length of a hypothenuse of a 45-45-90 triangle in YBC 7289. A picture like the one given by Chinese mathematicians 300 BC (however using a rather general triangle, not only 3-4-5 triangle) would have been enough. Note that also that picture from 300 BC only shows 32+42=52 and not the general case, even so, we can project from our modern point of view that the author of that text suspected that the general relation to hold as we see that the ``proof deforms". We do not know whether the author of that text had realized that. It is speculation from our side. On the other hand, we have seen crystal clear proofs written down by Euclid and reports (especially by third party texts like Platos) that it might have come from Pythagoras. The rumor that Pythagoras sacrificed 100 cattle to the gods after finding his theorem has already been disputed by the Romans.

Fermat famously claimed that Fn = 22n + 1 is prime. While true for 3, 5, 17, 257 and 65537, it turned out to be false in general. Already the 5th one 4294967297 is no more prime. Today, we see numerically that Fn has no square prime factor for all known n. At the moment, (in 2022) we do not know whether this is true or not. Assume if this were true and would become a theorem in the year 2300. In 1000 years in the 31'st century, it would be foolish for a mathematics historian to claim that already in the 20th century, one has known the theorem that Fn has no square prime factors. Actually it seems that many number theorists (maybe even all) made the observation by looking at the table of known Fermat numbers that they are all square free. It looks also, as if experts (like Richard K. Guy) suspect that there are some large Fn which are not square free. For preparation of our number theory class, I wrote down this.

Back to the exaggerations: even in the Wikipedia article about Pythgagoras the formulation, while not wrong, is misleading: Here is the statement: (May 8th 2022):

Furthermore, the manner in which the Babylonians employed Pythagorean numbers implies that they knew that the principle was generally applicable, and knew some kind of proof, which has not yet been found in the (still largely unpublished) cuneiform sources.

The part after ``implies" is speculation. Again, there is no historical evidence that they knew the theorem, there is no evidence that they conjectured the theorem, there is no evidence that they knew a proof. Anything in that direction (while possible) is speculation at best. The Wikipedia article gives as a reference There are about 100,000 unpublished cuneiform sources in the British Museum alone. Babylonian knowledge of proof of the Pythagorean Theorem is discussed by J. Hoyrup, 'The Pythagorean "Rule" and "Theorem" - Mirror of the Relation between Babylonian and Greek Mathematics,' in: J. Renger (red.): Babylon. Focus mesopotamischer Geschichte, Wiege früher Gelehrsamkeit, Mythos in der Moderne (1999). An other example is This article is speculation. There is no evidence that the Pythagorean theorem was known to the Sumerians. The statement refers to YBC 7289 which deals with the isosceles 90-45-45 degree triangle and which features a numerical approximation of the square root of 2.

The so-called Pythagorean theorem ("the sum of the hypotenuse of a right triangle is equal to the sum of the squares of the other two sides") was known to the Sumerians as early as 2000 B.C. A cuneiform tablet from Tell Hamal, dated to 1800 B.C., shows an algebraic-geometrical table with triangles described by perpendicular lines drawn from the right angle to the hypotenuse. Another shows an algebraic-geometrical problem involving a rectangle whose diagonal area is given and the length and width need to be determined. The are also tablets with quadratic equations. Also in the Britannic article we can read
They also show that the Babylonians were aware of the relation between the hypotenuse and the two legs of a right triangle (now commonly known as the Pythagorean theorem) more than a thousand years before the Greeks used it.
As evidence is again given YBC 7289.

Lecture 12: Cryptology

Cryptology involves combinatorics (complexity of ciphers), probability (estimate the chance of random attacks), number theory (public key or key exchange), dynamics (scrambling using maps like in DES) or geometry (physical locks or puzzles or elliptic curves) play together.The subject appears in many movies. Here is a collection of examples, compiled last year:
here is a poll from the class ranking these movies:
Cryptology is a vital part of our lives. Physical vaults of banks have more and more be replaced by electronic vaults. Wealth is no more stored in the form of precious metals stored in well protected banks. It is cryptological security which replaces heavy walls. It is not only for money, also intellectual properties or electronic records of real estate or records of health data or doctor notes are stored electronically. Such data obviously should not be accessible by third parties, neither by gangsters wanting to rob you, nor governments wanting to suppress opposition nor by corporations wanting to check on the health risks of potential employees. We also want voting to be temper proof or new business ideas shielded from big fish snatching it away. The times, where books, articles, records, history were stored on physical paper are more and more gone and become electronic; ink is replaced by electromagnetic configurations.

strong encryption is necessary to assure that such crucial information can not be tempered with. Without it, it would be possible today to burn books easily by just deleting any electronic record in any library of the world. It would be possible to break into bank accounts of the super rich and get their billions. It would be possible to smear an unwanted politician by planting smut pictures on their laptops. It would be possible for companies to employ only very healthy individuals who have no genetic risk for cancer for example. It does not need imagination to see that a world without strong cryptological protection would look like: the world would fall into chaos. Countries would attack each other electronically and bring down each others infra structure. Electronic wars would then lead to actual physical wars with terrible consequences. It is therefore important that we all understand how it works. The fact that cryptology is important not only manifests in academic interest. In this respect, the topic of cryptology beats any other mathematical field. We have looked at subjects like arithmetic, geometry, algebra, logic, analysis, probability, dynamics, topology in this course and there is not other field which is as strongly represented in the movie literature than cryptology.

It is nice to see that number theory has now a strong foothold in cryptology. The key exchange systems of Diffie and Hellman and the public key systems of Rivest, Shamir and Adleman have brought number theory, once a purely academic field without any applications to the top of the list of applications. If one would rank basic mathematical fields (like the ones we have covered in this course) according to ``applicability level", there is almost no question that 100 years ago, number theory would have been at the bottom and there is almost no question that today, number theory would be at the top. It could maybe even top analysis which contains important topics like partial differential equations, a mathematical branch which has allowed us to fly in airplanes or to predict the weather of tomorrow. It is a tough call however because analysis and algebra are both important for making our electronic devices operate. We could not do modern cryptology without strong computers. It is quite amazing that it is possible to operate a computer, watch movies, write texts, do computations while the information on the harddrive is stored in an encrypted way. With harddrive encryption (FileVault on OS X or DeviceEncryption on Windows, FullDisk encryption in Linux) it is no problem to lose a laptop. A third party (without enormous effort) could not read the content.
The NSA, as the largest employer of mathematicians could still crack it. But there are encryption techniques known today which even the NSA can not crack. They are the ones which are based on mathematical difficult problems. In order to attack them, one would have to solve basic mathematical problems. Every military agency in the world has a unit in which such problems are pondered. I myself have been in a cryptology unit in the Swiss army for some years. [Of course this is rather amateurish in comparison to professional groups like the NSA, as Swiss soldiers have (military is mandatory) to go for 3 weeks each year to military service only and in this time also repeat all kind of military drill like shooting or throwing grenades and go to coffee shops each morning and to drink beer every evening!). Still, it was quite impressive. This amateur group (consisting of mathematicians, statistitians and computer scientists, actually most of them professionals in their fields like several ETH professors, PhD students or PhDs working in various industries) was able within a few weeks to implement fast integer arithmetic from scratch, learn and implement all known encryption systems including cutting edge elliptic curve or digital signature techniques and also ponder questions about how to crack them. I myself have been programming in Pascal with Beat Scherer from scratch integer factorization Pollard-Brent Rho, continued fraction factorization by Morrison Brillard and the quadratic sieve (all above the from the computer science group implemented house built integer arithmetic) and also read quite a bit of algebraic geometry (Hartshorne) and pondered the discrete log problem using new ideas like with group theoretical attacks (applying any encryption several times produces eventually some loops. Does this make the discrete log problem vulnerable?) and of course reading lots of literature and doing lots of programming].

Lecture 11: Dynamics

A dynamical system is a defined by a differential equation or map. An example of a flow defined by a differential equation is the double pendulum dynamics in a four dimensional space given by two angles and two velocities. An example of a map is a billiard map in a convex table. Chaos means that the system shows sensitive dependence on initial conditions on a significant set of initial conditions. In the case of the double pendulum, it means that on the three dimensional energy surface, there is a set of positive volume on which the motion has positive Lyapunov exponents. In the case of a billiard, we want a set of position angle initial conditions of positive area for which the dynamics has positive Lyapunov exponents. We measured the entropy of lp billiards in 1994. It is important however to see that these are just measurements. Nobody has a method which would allow to prove there is positive entropy for some smooth billiard or then to prove that any smooth billiard has zero entropy (something which hardly anybody would believe but who knows what happens really).

In principle, chaos can be is easy. The map T(x)=4x(1-x) on the unit interval [0,1] is completely understood, completely random. It is a random number generator. Also integrability, the pendulum we use in clocks is an example. It swings regularly, allowing to count time. The problem is that most systems are neither integrable, nor random. They show a mixed, complex behavior. The double pendulum is a good example. There is some regularity for small energy. In that case, we essentially have two uncoupled oscillators. Still, even in that regime of regularity, we expect some small parts of the phase space to be random. Also our solar system is turning around in astounding regularity, given that all the bodies interact with each other this is remarkable. One an measure some chaos in the solar system but it is very week. One big question is whether the solar system with the current given parameters is stable. Computer simulations indicate that it is for a very long time. But it could be in principle that in the long future (provided we leave the sun's mass constant which it is not of course as it radiates away energy all the time), something drastic happens like that Mars gets expelled. The theory which explains the stability of the solar system or the double pendulum with small energy is called KAM theory.

Lecture 10: Analysis

Update: Hammond found this Mandelbrot zoom. which had been the 2014 record. When discussing logs and exponential notation the question came up, when negative exponents like 10-3 have appeared first in literature. Sarah found a reference indicating that this was Nicolas Churquet in 1484 (Le Triparty en la Science des Nombres). I could not yet get hold of that document.
We have also seen that instead of the "Spock formula" dim=-log(n)/log(r), it is maybe better to see the relation as n = 1/rdim which is more intuitive to indicate that 1/rdim boxes that are needed to cover a space of dimension dim.
The field of analysis is so big that it was split into subfields like complex analysis, calculus of variations, harmonic analysis, differential equations or functional analysis. We traditionally have looked at this topic always in a more tabloid style by looking at some famous objects. Mathematically, we learn how to compute the dimension of any self-similar fractals. We also learn how the Mandelbrot or Mandelbulb sets are generated.

Despite the fact that the topic of ``fractals" is often thrown in to the corner of ``arm chair mathematics", there are serious challenges ahead. Here are some open problems: