Abstract Algebra
Abstract Algebra
Thomas W. Judson
Stephen F. Austin State University
iii
iv PREFACE
Chapters 16
Chapter 10
Chapter 11
Chapter 17 Chapter 15
Chapter 21
Chapter 22
Chapter 23
Exercise sections are the heart of any mathematics text. An exercise set
appears at the end of each chapter. The nature of the exercises ranges over
several categories; computational, conceptual, and theoretical problems are
included. A section presenting hints and solutions to many of the exercises
appears at the end of the text. Often in the solutions a proof is only sketched,
and it is up to the student to provide the details. The exercises range in
difficulty from very easy to very challenging. Many of the more substantial
problems require careful thought, so the student should not be discouraged
if the solution is not forthcoming after a few minutes of work.
There are additional exercises or computer projects at the ends of many
of the chapters. The computer projects usually require a knowledge of pro-
gramming. All of these exercises and projects are more substantial in nature
and allow the exploration of new results and theory.
Acknowledgements
I would like to acknowledge the following reviewers for their helpful com-
ments and suggestions.
David Anderson, University of Tennessee, Knoxville
Robert Beezer, University of Puget Sound
Myron Hood, California Polytechnic State University
Herbert Kasube, Bradley University
John Kurtzke, University of Portland
Inessa Levi, University of Louisville
Geoffrey Mason, University of California, Santa Cruz
Bruce Mericle, Mankato State University
Kimmo Rosenthal, Union College
Mark Teply, University of Wisconsin
I would also like to thank Steve Quigley, Marnie Pommett, Cathie Griffin,
Kelle Karshick, and the rest of the staff at PWS for their guidance through-
out this project. It has been a pleasure to work with them.
Thomas W. Judson
Contents
Preface iii
1 Preliminaries 1
1.1 A Short Note on Proofs . . . . . . . . . . . . . . . . . . . . . 1
1.2 Sets and Equivalence Relations . . . . . . . . . . . . . . . . . 4
2 The Integers 22
2.1 Mathematical Induction . . . . . . . . . . . . . . . . . . . . . 22
2.2 The Division Algorithm . . . . . . . . . . . . . . . . . . . . . 26
3 Groups 35
3.1 The Integers mod n and Symmetries . . . . . . . . . . . . . . 35
3.2 Definitions and Examples . . . . . . . . . . . . . . . . . . . . 40
3.3 Subgroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4 Cyclic Groups 57
4.1 Cyclic Subgroups . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.2 The Group C . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.3 The Method of Repeated Squares . . . . . . . . . . . . . . . . 66
5 Permutation Groups 74
5.1 Definitions and Notation . . . . . . . . . . . . . . . . . . . . . 75
5.2 The Dihedral Groups . . . . . . . . . . . . . . . . . . . . . . . 83
vi
CONTENTS vii
9 Isomorphisms 141
9.1 Definition and Examples . . . . . . . . . . . . . . . . . . . . . 141
9.2 Direct Products . . . . . . . . . . . . . . . . . . . . . . . . . . 146
11 Homomorphisms 165
11.1 Group Homomorphisms . . . . . . . . . . . . . . . . . . . . . 165
11.2 The Isomorphism Theorems . . . . . . . . . . . . . . . . . . . 168
16 Rings 239
16.1 Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
16.2 Integral Domains and Fields . . . . . . . . . . . . . . . . . . . 244
16.3 Ring Homomorphisms and Ideals . . . . . . . . . . . . . . . . 246
16.4 Maximal and Prime Ideals . . . . . . . . . . . . . . . . . . . . 250
16.5 An Application to Software Design . . . . . . . . . . . . . . . 253
17 Polynomials 263
17.1 Polynomial Rings . . . . . . . . . . . . . . . . . . . . . . . . . 264
17.2 The Division Algorithm . . . . . . . . . . . . . . . . . . . . . 268
17.3 Irreducible Polynomials . . . . . . . . . . . . . . . . . . . . . 272
21 Fields 329
21.1 Extension Fields . . . . . . . . . . . . . . . . . . . . . . . . . 329
21.2 Splitting Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 340
21.3 Geometric Constructions . . . . . . . . . . . . . . . . . . . . . 343
Notation 418
Index 422
x CONTENTS
1
Preliminaries
3 + 56 13 + 8/2.
2 + 3 = 5.
1
2 CHAPTER 1 PRELIMINARIES
2x = 6 exactly when x = 4.
x3 4x2 + 5x 6.
All but the first and last examples are statements, and must be either true
or false.
A mathematical proof is nothing more than a convincing argument
about the accuracy of a statement. Such an argument should contain enough
detail to convince the audience; for instance, we can see that the statement
2x = 6 exactly when x = 4 is false by evaluating 2 4 and noting that
6 6= 8, an argument that would satisfy anyone. Of course, audiences may
vary widely: proofs can be addressed to another student, to a professor,
or to the reader of a text. If more detail than needed is presented in the
proof, then the explanation will be either long-winded or poorly written. If
too much detail is omitted, then the proof may not be convincing. Again
it is important to keep the audience in mind. High school students require
much more detail than do graduate students. A good rule of thumb for an
argument in an introductory abstract algebra course is that it should be
written to convince ones peers, whether those peers be other students or
other readers of the text.
Let us examine different types of statements. A statement could be as
simple as 10/5 = 2; however, mathematicians are usually interested in
more complex statements such as If p, then q, where p and q are both
statements. If certain statements are known or assumed to be true, we
wish to know what we can say about other statements. Here p is called
the hypothesis and q is known as the conclusion. Consider the following
statement: If ax2 + bx + c = 0 and a 6= 0, then
b b2 4ac
x= .
2a
The hypothesis is ax2 + bx + c = 0 and a 6= 0; the conclusion is
b b2 4ac
x= .
2a
Notice that the statement says nothing about whether or not the hypothesis
is true. However, if this entire statement is true and we can show that
1.1 A SHORT NOTE ON PROOFS 3
ax2 + bx + c = 0
b c
x2 + x =
a a
2 2
b b b c
x2 + x + =
a 2a 2a a
2 2
b b 4ac
x+ =
2a 4a2
b b2 4ac
x+ =
2a 2a
b b2 4ac
x= .
2a
If we can prove a statement true, then that statement is called a propo-
sition. A proposition of major importance is called a theorem. Sometimes
instead of proving a theorem or proposition all at once, we break the proof
down into modules; that is, we prove several supporting propositions, which
are called lemmas, and use the results of these propositions to prove the
main result. If we can prove a proposition or a theorem, we will often,
with very little effort, be able to derive other related propositions called
corollaries.
Quantifiers are important. Words and phrases such as only, for all,
for every, and for some possess different meanings.
4 CHAPTER 1 PRELIMINARIES
Never assume any hypothesis that is not explicitly stated in the theo-
rem. You cannot take things for granted.
Suppose you wish to show that an object exists and is unique. First
show that there actually is such an object. To show that it is unique,
assume that there are two such objects, say r and s, and then show
that r = s.
Sometimes it is easier to prove the contrapositive of a statement. Prov-
ing the statement If p, then q is exactly the same as proving the
statement If not q, then not p.
Although it is usually better to find a direct proof of a theorem, this
task can sometimes be difficult. It may be easier to assume that the
theorem that you are trying to prove is false, and to hope that in the
course of your argument you are forced to make some statement that
cannot possibly be true.
Remember that one of the main objectives of higher mathematics is
proving theorems. Theorems are tools that make new and productive ap-
plications of mathematics possible. We use examples to give insight into
existing theorems and to foster intuitions as to what new theorems might
be true. Applications, examples, and proofs are tightly interconnected
much more so than they may seem at first appearance.
X = {x1 , x2 , . . . , xn }
X = {x : x satisfies P}
1.2 SETS AND EQUIVALENCE RELATIONS 5
{4, 5, 8} {2, 3, 4, 5, 6, 7, 8, 9}
and
N Z Q R C.
Trivially, every set is a subset of itself. A set B is a proper subset of a
set A if B A but B 6= A. If A is not a subset of B, we write A 6 B; for
example, {4, 7, 9} 6 {2, 4, 5, 8, 9}. Two sets are equal, written A = B, if we
can show that A B and B A.
It is convenient to have a set with no elements in it. This set is called
the empty set and is denoted by . Note that the empty set is a subset of
every set.
To construct new sets out of old sets, we can perform certain operations:
the union A B of two sets A and B is defined as
A B = {x : x A or x B};
A B = {x : x A and x B}.
We can consider the union and the intersection of more than two sets. In
this case we write
n
[
Ai = A1 . . . An
i=1
and
n
\
Ai = A1 . . . An
i=1
A \ B = A B 0 = {x : x A and x
/ B}.
Then
A B = {x R : 2 x 3}
A B = {x R : 0 < x < 4}
A \ B = {x R : 0 < x < 2}
A0 = {x R : x 0 or x > 3}.
1. A A = A, A A = A, and A \ A = ;
2. A = A and A = ;
1.2 SETS AND EQUIVALENCE RELATIONS 7
3. A (B C) = (A B) C and A (B C) = (A B) C;
4. A B = B A and A B = B A;
5. A (B C) = (A B) (A C);
6. A (B C) = (A B) (A C).
Proof. We will prove (1) and (3) and leave the remaining results to be
proven in the exercises.
(1) Observe that
A A = {x : x A or x A}
= {x : x A}
=A
and
A A = {x : x A and x A}
= {x : x A}
= A.
Also, A \ A = A A0 = .
(3) For sets A, B, and C,
A (B C) = A {x : x B or x C}
= {x : x A or x B, or x C}
= {x : x A or x B} C
= (A B) C.
1. (A B)0 = A0 B 0 ;
2. (A B)0 = A0 B 0 .
Example 2. Other relations between sets often hold true. For example,
(A \ B) (B \ A) = .
(A \ B) (B \ A) = (A B 0 ) (B A0 )
= A A0 B B 0
= .
{(x, 1), (x, 2), (x, 3), (y, 1), (y, 2), (y, 3)}
and
A C = .
We define the Cartesian product of n sets to be
A B
f
1 a
2 b
3 c
A g B
1 a
2 b
3 c
A B C
f g
1 a X
2 b Y
3 c Z
A C
gf
1 X
2 Y
3 Z
and
(g f )(x) = g(f (x)) = 2x2 + 5.
In general, order makes a difference; that is, in most cases f g 6= g f .
and
3
(g f )(x) = g(f (x)) = g(x3 ) = x3 = x.
Proof. We will prove (1) and (3). Part (2) is left as an exercise. Part (4)
follows directly from (2) and (3).
(1) We must show that
h (g f ) = (h g) f.
For a A we have
(3) Assume that f and g are both onto functions. Given c C, we must
show that there exists an a A such that (g f )(a) = g(f (a)) = c. However,
since g is onto, there is a b B such that g(b) = c. Similarly, there is an
a A such that f (a) = b. Accordingly,
If S is any set, we will use idS or id to denote the identity mapping
from S to itself. Define this map by id(s) = s for all s S. A map g : B A
1.2 SETS AND EQUIVALENCE RELATIONS 13
Example 12. The natural logarithm and the exponential functions, f (x) =
ln x and f 1 (x) = ex , are inverses of each other provided that we are careful
about choosing domains. Observe that
f (f 1 (x)) = f (ex ) = ln ex = x
and
f 1 (f (x)) = f 1 (ln x) = eln x = x
whenever composition makes sense.
We can find an inverse map of TA by simply inverting the matrix A; that is,
TA1 = TA1 . In this example,
1 2 1
A = ;
5 3
TB (x, y) = (3x, 0)
and
(x, y) = T TB1 (x, y) = (3ax + 3by, 0)
for all x and y. Clearly this is impossible because y might not be 0.
A = P 1 BP = P 1 B(P 1 )1 .
the relation is transitive. Two matrices that are equivalent in this manner
are said to be similar.
A partition P of a set X is a collection
S of nonempty sets X1 , X2 , . . .
such that Xi Xj = for i 6= j and k Xk = X. Let be an equivalence
relation on a set X and let x X. Then [x] = {y X : y x} is called the
equivalence class of x. We will see that an equivalence relation gives rise
to a partition via equivalence classes. Also, whenever a partition of a set
exists, there is some natural underlying equivalence relation, as the following
theorem demonstrates.
Example 20. In the equivalence relation in Example 16, two functions f (x)
and g(x) are in the same partition when they differ by a constant.
s r (mod n). Now suppose that r s (mod n) and s t (mod n). Then
there exist integers k and l such that r s = kn and s t = ln. To show
transitivity, it is necessary to prove that r t is divisible by n. However,
r t = r s + s t = kn + ln = (k + l)n,
and so r t is divisible by n.
If we consider the equivalence relation established by the integers modulo
3, then
[0] = {. . . , 3, 0, 3, 6, . . .},
[1] = {. . . , 2, 1, 4, 7, . . .},
[2] = {. . . , 1, 2, 5, 8, . . .}.
Notice that [0] [1] [2] = Z and also that the sets are disjoint. The sets
[0], [1], and [2] form a partition of the integers.
The integers modulo n are a very important example in the study of
abstract algebra and will become quite useful in our investigation of vari-
ous algebraic structures such as groups and rings. In our discussion of the
integers modulo n we have actually assumed a result known as the division
algorithm, which will be stated and proved in Chapter 2.
Exercises
1. Suppose that
A = {x : x N and x is even},
B = {x : x N and x is prime},
C = {x : x N and x is a multiple of 5}.
(a) A B (c) A B
(b) B C (d) A (B C)
2. If A = {a, b, c}, B = {1, 2, 3}, C = {x}, and D = , list all of the elements in
each of the following sets.
EXERCISES 19
(a) A B (c) A B C
(b) B A (d) A D
18. Determine which of the following functions are one-to-one and which are
onto. If the function is not onto, determine its range.
(a) f : R R defined by f (x) = ex
(b) f : Z Z defined by f (n) = n2 + 3
(c) f : R R defined by f (x) = sin x
(d) f : Z Z defined by f (x) = x2
19. Let f : A B and g : B C be invertible mappings; that is, mappings
such that f 1 and g 1 exist. Show that (g f )1 = f 1 g 1 .
20. (a) Define a function f : N N that is one-to-one but not onto.
20 CHAPTER 1 PRELIMINARIES
(a) x y in R if x y (c) x y in R if |x y| 4
(b) m n in Z if mn > 0 (d) m n in Z if m n (mod 6)
26. Define a relation on R2 by stating that (a, b) (c, d) if and only if a2 +b2
c2 + d2 . Show that is reflexive and transitive but not symmetric.
27. Show that an m n matrix gives rise to a well-defined map from Rn to Rm .
EXERCISES 21
22
2.1 MATHEMATICAL INDUCTION 23
8 = 23 > 3 + 4 = 7,
2(k + 4) = 2k + 8 > k + 5 = (k + 1) + 4
since k is positive. Hence, by induction, the statement holds for all integers
n 3.
is divisible by 9.
We have an equivalent statement of the Principle of Mathematical In-
duction that is often very useful.
Second Principle of Mathematical Induction. Let S(n) be a statement
about integers for n N and suppose S(n0 ) is true for some integer n0 . If
2.1 MATHEMATICAL INDUCTION 25
S(n0 ), S(n0 +1), . . . , S(k) imply that S(k +1) for k n0 , then the statement
S(n) is true for all integers n greater than n0 .
A nonempty subset S of Z is well-ordered if S contains a least element.
Notice that the set Z is not well-ordered since it does not contain a smallest
element. However, the natural numbers are well-ordered.
Principle of Well-Ordering. Every nonempty subset of the natural num-
bers is well-ordered.
The Principle of Well-Ordering is equivalent to the Principle of Mathe-
matical Induction.
a = bq + r
where 0 r < b.
S = {a bk : k Z and a bk 0}.
a b(q + 1) = a bq b = r b > 0.
In this case we would have a b(q + 1) in the set S. But then a b(q + 1) <
abq, which would contradict the fact that r = abq is the smallest member
of S. So r b. Since 0
/ S, r 6= b and so r < b.
Uniqueness of q and r. Suppose there exist integers r, r0 , q, and q 0 such
that
a = bq + r, 0 r < b
and
a = bq 0 + r0 , 0 r0 < b.
Then bq + r = bq 0 + r0 . Assume that r0 r. From the last equation we have
b(q q 0 ) = r0 r; therefore, b must divide r0 r and 0 r0 r r0 < b.
This is possible only if r0 r = 0. Hence, r = r0 and q = q 0 .
2.2 THE DIVISION ALGORITHM 27
Theorem 2.4 Let a and b be nonzero integers. Then there exist integers r
and s such that
gcd(a, b) = ar + bs.
Furthermore, the greatest common divisor of a and b is unique.
Proof. Let
r = a dq
= a (ar + bs)q
= a arq bsq
= a(1 rq) + b(sq),
which is in S. But this would contradict the fact that d is the smallest
member of S. Hence, r = 0 and d divides a. A similar argument shows that
d divides b. Therefore, d is a common divisor of a and b.
Suppose that d0 is another common divisor of a and b, and we want to
show that d0 | d. If we let a = d0 h and b = d0 k, then
d = ar + bs = d0 hr + d0 ks = d0 (hr + ks).
Corollary 2.5 Let a and b be two integers that are relatively prime. Then
there exist integers r and s such that ar + bs = 1.
28 CHAPTER 2 THE INTEGERS
Example 4. Let us compute the greatest common divisor of 945 and 2415.
First observe that
Reversing our steps, 105 divides 420, 105 divides 525, 105 divides 945, and
105 divides 2415. Hence, 105 divides both 945 and 2415. If d were another
common divisor of 945 and 2415, then d would also have to divide 105.
Therefore, gcd(945, 2415) = 105.
If we work backward through the above sequence of equations, we can
also obtain numbers r and s such that 945r + 2415s = 105. Observe that
b = aq1 + r1
a = r1 q2 + r2
r1 = r2 q3 + r3
..
.
rn2 = rn1 qn + rn
rn1 = rn qn+1 .
2.2 THE DIVISION ALGORITHM 29
To find r and s such that ar + bs = d, we begin with this last equation and
substitute results obtained from the previous equations:
d = rn
= rn2 rn1 qn
= rn2 qn (rn3 qn1 rn2 )
= qn rn3 + (1 + qn qn1 )rn2
..
.
= ra + sb.
The algorithm that we have just used to find the greatest common divisor
d of two integers a and b and to write d as the linear combination of a and
b is known as the Euclidean algorithm.
Prime Numbers
Let p be an integer such that p > 1. We say that p is a prime number, or
simply p is prime, if the only positive numbers that divide p are 1 and p
itself. An integer n > 1 that is not prime is said to be composite.
Proof. Suppose that p does not divide a. We must show that p | b. Since
gcd(a, p) = 1, there exist integers r and s such that ar + ps = 1. So
n = p1 p2 pk ,
n = q1 q2 ql ,
n = p1 p2 pk = q1 q2 ql ,
n0 = p2 pk = q2 ql
a1 = p1 pr
a 2 = q1 qs .
Therefore,
a = a1 a2 = p1 pr q1 qs .
So a
/ S, which is a contradiction.
Historical Note
EXERCISES 31
Prime numbers were first studied by the ancient Greeks. Two important results
from antiquity are Euclids proof that an infinite number of primes exist and the
Sieve of Eratosthenes, a method of computing all of the prime numbers less than a
fixed positive integer n. One problem in number theory is to find a function f such
that f (n) is prime for each integer n. Pierre Fermat (1601?1665) conjectured that
n
22 + 1 was prime for all n, but later it was shown by Leonhard Euler (17071783)
that 5
22 + 1 = 4,294,967,297
is a composite number. One of the many unproven conjectures about prime numbers
is Goldbachs Conjecture. In a letter to Euler in 1742, Christian Goldbach stated
the conjecture that every even integer with the exception of 2 seemed to be the sum
of two primes: 4 = 2 + 2, 6 = 3 + 3, 8 = 3 + 5, . . .. Although the conjecture has been
verified for the numbers up through 100 million, it has yet to be proven in general.
Since prime numbers play an important role in public key cryptography, there is
currently a great deal of interest in determining whether or not a large number is
prime.
Exercises
1. Prove that
n(n + 1)(2n + 1)
12 + 22 + + n2 =
6
for n N.
2. Prove that
n2 (n + 1)2
1 3 + 2 3 + + n3 =
4
for n N.
3. Prove that n! > 2n for n 4.
4. Prove that
n(3n 1)x
x + 4x + 7x + + (3n 2)x =
2
for n N.
5. Prove that 10n+1 + 10n + 1 is divisible by 3 for n N.
6. Prove that 4 102n + 9 102n1 + 5 is divisible by 99 for n N.
7. Show that
n
1X
n
a1 a2 an ak .
n
k=1
8. Prove the Leibniz rule for f (n) (x), where f (n) is the nth derivative of f ; that
is, show that
n
X n (k)
(f g)(n) (x) = f (x)g (nk) (x).
k
k=0
32 CHAPTER 2 THE INTEGERS
For every positive integer n, show that a set with exactly n elements has a
power set with exactly 2n elements.
13. Prove that the two principles of mathematical induction stated in Section 2.1
are equivalent.
14. Show that the Principle of Well-Ordering for the natural numbers implies
that 1 is the smallest natural number. Use this result to show that the
Principle of Well-Ordering implies the Principle of Mathematical Induction;
that is, show that if S N such that 1 S and n + 1 S whenever n S,
then S = N.
15. For each of the following pairs of numbers a and b, calculate gcd(a, b) and
find integers r and s such that gcd(a, b) = ra + sb.
16. Let a and b be nonzero integers. If there exist integers r and s such that
ar + bs = 1, show that a and b are relatively prime.
17. Fibonacci Numbers. The Fibonacci numbers are
1, 1, 2, 3, 5, 8, 13, 21, . . . .
a2 + b2 = r2
a2 b2 = s2 .
Programming Exercises
1. The Sieve of Eratosthenes. One method of computing all of the prime
numbers less than a certain fixed positive integer N is to list all of the numbers
n such that 1 < n < N . Begin by eliminating all of the multiples of 2. Next
eliminate all of the multiples of 3. Now eliminate all of the multiples of 5.
Notice that 4 has already been crossed out. Continue in this manner, noticing
that we do not have to go all the way to N ; it suffices to stop at N . Using
this method, compute all of the prime numbers less than N = 250. We
can also use this method to find all of the integers that are relatively prime
to an integer N . Simply eliminate the prime factors of N and all of their
multiples. Using this method, find all of the numbers that are relatively
prime to N = 120. Using the Sieve of Eratosthenes, write a program that
will compute all of the primes less than an integer N .
2. Let N0 = N {0}. Ackermanns function is the function A : N0 N0 N0
defined by the equations
A(0, y) = y + 1,
A(x + 1, 0) = A(x, 1),
A(x + 1, y + 1) = A(x, A(x + 1, y)).
Use this definition to compute A(3, 1). Write a program to evaluate Ack-
ermanns function. Modify the program to count the number of statements
executed in the program when Ackermanns function is evaluated. How many
statements are executed in the evaluation of A(4, 1)? What about A(5, 1)?
3. Write a computer program that will implement the Euclidean algorithm.
The program should accept two positive integers a and b as input and should
output gcd(a, b) as well as integers r and s such that
gcd(a, b) = ra + sb.
35
36 CHAPTER 3 GROUPS
7 + 4 1 (mod 5) 7 3 1 (mod 5)
3 + 5 0 (mod 8) 3 5 7 (mod 8)
Example 2. Most, but not all, of the usual laws of arithmetic hold for
addition and multiplication in Zn . For instance, it is not necessarily true
that there is a multiplicative inverse. Consider the multiplication table for
3.1 THE INTEGERS MOD N AND SYMMETRIES 37
a + b b + a (mod n)
ab ba (mod n).
(a + b) + c a + (b + c) (mod n)
(ab)c a(bc) (mod n).
a + 0 a (mod n)
a 1 a (mod n).
Proof. We will prove (1) and (6) and leave the remaining properties to be
proven in the exercises.
(1) Addition and multiplication are commutative modulo n since the
remainder of a + b divided by n is the same as the remainder of b + a divided
by n.
38 CHAPTER 3 GROUPS
(6) Suppose that gcd(a, n) = 1. Then there exist integers r and s such
that ar + ns = 1. Since ns = 1 ar, ra 1 (mod n). Letting b be the
equivalence class of r, ab 1 (mod n).
Conversely, suppose that there exists a b such that ab 1 (mod n).
Then n divides ab 1, so there is an integer k such that ab nk = 1. Let
d = gcd(a, n). Since d divides ab nk, d must also divide 1; hence, d = 1.
Symmetries
A B A B
identity
D C D C
A B C D
180
rotation
D C B A
A B B A
reflection
vertical axis
D C C D
A B D C
reflection
horizontal axis
D C A B
B B
identity
A B C
id =
A B C
A C A C
B A
rotation A B C
1 =
B C A
A C C B
B C
rotation A B C
2 =
C A B
A C B A
B C
reflection
A B C
1 =
A C B
A C A B
B B
reflection
A B C
2 =
C B A
A C C A
B A
reflection
A B C
3 =
B A C
A C B C
has at most six symmetries. To see that there are six permutations, observe
there are three different possibilities for the first vertex, and two for the
second, and the remaining vertex is determined by the placement of the
first two. So we have 3 2 1 = 3! = 6 different arrangements. To denote the
permutation of the vertices of an equilateral triangle that sends A to B, B
to C, and C to A, we write the array
A B C
.
B C A
Notice that this particular permutation corresponds to the rigid motion
of rotating the triangle by 120 in a clockwise direction. In fact, every
permutation gives rise to a symmetry of the triangle. All of these symmetries
are shown in Figure 3.2.
A natural question to ask is what happens if one motion of the trian-
gle 4ABC is followed by another. Which symmetry is 1 1 ; that is, what
happens when we do the permutation 1 and then the permutation 1 ? Re-
member that we are composing functions here. Although we usually multiply
left to right, we compose functions right to left. We have
(1 1 )(A) = 1 (1 (A)) = 1 (B) = C
(1 1 )(B) = 1 (1 (B)) = 1 (C) = B
(1 1 )(C) = 1 (1 (C)) = 1 (A) = A.
This is the same symmetry as 2 . Suppose we do these motions in the
opposite order, 1 then 1 . It is easy to determine that this is the same
as the symmetry 3 ; hence, 1 1 6= 1 1 . A multiplication table for the
symmetries of an equilateral triangle 4ABC is given in Table 3.2.
Notice that in the multiplication table for the symmetries of an equilat-
eral triangle, for every motion of the triangle there is another motion 0
such that 0 = id; that is, for every motion there is another motion that
takes the triangle back to its original orientation.
(a b) c = a (b c)
for a, b, c G.
e a = a e = a.
a a1 = a1 a = e.
n for the inverse, and 0 for the identity as usual. We also write m n
instead of m + (n).
It is often convenient to describe a group in terms of an addition or
multiplication table. Such a table is called a Cayley table.
Example 5. Not every set with a binary operation is a group. For example,
if we let modular multiplication be the binary operation on Zn , then Zn fails
to be a group. The element 1 acts as a group identity since 1 k = k 1 = k
for any k Zn ; however, a multiplicative inverse for 0 does not exist since
0 k = k 0 = 0 for every k in Zn . Even if we consider the set Zn \ {0},
we still may not have a group. For instance, let 2 Z6 . Then 2 has no
multiplicative inverse since
02=0 12=2
22=4 32=0
42=2 5 2 = 4.
Example 8. Let
1 0 0 1
1= I=
0 1 1 0
0 i i 0
J= K= ,
i 0 0 i
Theorem 3.8 In a group, the usual laws of exponents hold; that is, for all
g, h G,
2. (g m )n = g mn for all m, n Z;
It is important to realize that the last statement can be made only because
Z and Zn are commutative groups.
Historical Note
Although the first clear axiomatic definition of a group was not given until the
late 1800s, group-theoretic methods had been employed before this time in the
development of many areas of mathematics, including geometry and the theory of
algebraic equations.
Joseph-Louis Lagrange used group-theoretic methods in a 17701771 memoir to
study methods of solving polynomial equations. Later, Evariste Galois (18111832)
succeeded in developing the mathematics necessary to determine exactly which
polynomial equations could be solved in terms of the polynomials coefficients.
Galois primary tool was group theory.
The study of geometry was revolutionized in 1872 when Felix Klein proposed
that geometric spaces should be studied by examining those properties that are
invariant under a transformation of the space. Sophus Lie, a contemporary of
Klein, used group theory to study solutions of partial differential equations. One of
the first modern treatments of group theory appeared in William Burnsides The
Theory of Groups of Finite Order [1], first published in 1897.
3.3 SUBGROUPS 47
3.3 Subgroups
Definitions and Examples
Sometimes we wish to investigate smaller groups sitting inside a larger group.
The set of even integers 2Z = {. . . , 2, 0, 2, 4, . . .} is a group under the
operation of addition. This smaller group sits naturally inside of the group
of integers under addition. We define a subgroup H of a group G to be a
subset H of G such that when the group operation of G is restricted to H,
H is a group in its own right. Observe that every group G with at least two
elements will always have at least two subgroups, the subgroup consisting of
the identity element alone and the entire group itself. The subgroup H = {e}
of a group G is called the trivial subgroup. A subgroup that is a proper
subset of G is called a proper subgroup. In many of the examples that we
have investigated up to this point, there exist other subgroups besides the
trivial and improper subgroups.
Example 10. Consider the set of nonzero real numbers, R , with the group
operation of multiplication. The identity of this group is 1 and the inverse
of any element a R is just 1/a. We will show that
Example 12. Let SL2 (R) be the subset of GL2 (R) consisting of matrices
of determinant one; that is, a matrix
a b
A=
c d
Example 14. One way of telling whether or not two groups are the same
is by examining their subgroups. Other than the trivial subgroup and the
group itself, the group Z4 has a single subgroup consisting of the elements
0 and 2. From the group Z2 , we can form another group of four elements
as follows. As a set this group is Z2 Z2 . We perform the group operation
coordinatewise; that is, (a, b)+(c, d) = (a+c, b+d). Table 3.5 is an addition
table for Z2 Z2 . Since there are three nontrivial proper subgroups of Z2 Z2 ,
H1 = {(0, 0), (0, 1)}, H2 = {(0, 0), (1, 0)}, and H3 = {(0, 0), (1, 1)}, Z4 and
Z2 Z2 must be different groups.
1. The identity e of G is in H.
2. If h1 , h2 H, then h1 h2 H.
3. If h H, then h1 H.
Exercises
1. Find all x Z satisfying each of the following equations.
50 CHAPTER 3 GROUPS
a b c d a b c d
a a c d a a a b c d
(a) b b b c d (c) b b c d a
c c d a b c c d a b
d d a b c d d a b c
a b c d a b c d
a a b c d a a b c d
(b) b b a d c (d) b b a c d
c c d a b c c b a d
d d c b a d d d b c
3. Write out Cayley tables for groups formed by the symmetries of a rectangle
and for (Z4 , +). How many elements are in each group? Are the groups the
same? Why or why not?
4. Describe the symmetries of a rhombus and prove that the set of symmetries
forms a group. Give Cayley tables for both the symmetries of a rectangle
and the symmetries of a rhombus. Are the symmetries of a rectangle and
those of a rhombus the same?
5. Describe the symmetries of a square and prove that the set of symmetries
is a group. Give a Cayley table for the symmetries. How many ways can
the vertices of a square be permuted? Is each permutation necessarily a
symmetry of the square? The symmetry group of the square is denoted by
D4 .
6. Give a multiplication table for the group U (12).
7. Let S = R \ {1} and define a binary operation on S by a b = a + b + ab.
Prove that (S, ) is an abelian group.
8. Give an example of two elements A and B in GL2 (R) with AB 6= BA.
9. Prove that the product of two matrices in SL2 (R) has determinant one.
10. Prove that the set of matrices of the form
1 x y
0 1 z
0 0 1
EXERCISES 51
11. Prove that det(AB) = det(A) det(B) in GL2 (R). Use this result to show
that the binary operation in the group GL2 (R) is closed; that is, if A and B
are in GL2 (R), then AB GL2 (R).
12. Let Zn2 = {(a1 , a2 , . . . , an ) : ai Z2 }. Define a binary operation on Zn2 by
Prove that Zn2 is a group under this operation. This group is important in
algebraic coding theory.
13. Show that R = R \ {0} is a group under the operation of multiplication.
14. Given the groups R and Z, let G = R Z. Define a binary operation
on G by (a, m) (b, n) = (ab, m + n). Show that G is a group under this
operation.
15. Prove or disprove that every group containing six elements is abelian.
16. Give a specific example of some group G and elements g, h G where (gh)n 6=
g n hn .
17. Give an example of three different groups with eight elements. Why are the
groups different?
18. Show that there are n! permutations of a set containing n items.
19. Show that
0 + a a + 0 a (mod n)
for all a Zn .
20. Prove that there is a multiplicative identity for the integers modulo n:
a 1 a (mod n).
22. Show that addition and multiplication mod n are associative operations.
23. Show that multiplication distributes over addition modulo n:
0 50000 30042 6
(a) Show that the UPC number 0-50000-30042-6, which appears in Fig-
ure 3.3, is a valid UPC number.
(b) Show that the number 0-50000-30043-6 is not a valid UPC number.
(c) Write a formula to calculate the check digit, d12 , in the UPC number.
(d) The UPC error detection scheme can detect most transposition errors;
that is, it can determine if two digits have been interchanged. Show
that the transposition error 0-05000-30042-6 is detected. Find a trans-
position error that is not detected.
(e) Write a program that will determine whether or not a UPC number is
valid.
2. It is often useful to use an inner product notation for this type of error
detection scheme; hence, we will use the notion
to mean
d1 w1 + d2 w2 + + dk wk 0 (mod n).
Suppose that (d1 , d2 , . . . , dk )(w1 , w2 , . . . , wk ) 0 (mod n) is an error detec-
tion scheme for the k-digit identification number d1 d2 dk , where 0 di <
n. Prove that all single-digit errors are detected if and only if gcd(wi , n) = 1
for 1 i k.
3. Let (d1 , d2 , . . . , dk ) (w1 , w2 , . . . , wk ) 0 (mod n) be an error detection
scheme for the k-digit identification number d1 d2 dk , where 0 di < n.
Prove that all transposition errors of two digits di and dj are detected if and
only if gcd(wi wj , n) = 1 for i and j between 1 and k.
4. ISBN Codes. Every book has an International Standard Book Number
(ISBN) code. This is a 10-digit code indicating the books publisher and
title. The tenth digit is a check digit satisfying
One problem is that d10 might have to be a 10 to make the inner product zero;
in this case, 11 digits would be needed to make this scheme work. Therefore,
the character X is used for the eleventh digit. So ISBN 3-540-96035-X is a
valid ISBN code.
(a) Is ISBN 0-534-91500-0 a valid ISBN code? What about ISBN 0-534-
91700-0 and ISBN 0-534-19500-0?
(b) Does this method detect all single-digit errors? What about all trans-
position errors?
(c) How many different ISBN codes are there?
(d) Write a computer program that will calculate the check digit for the
first nine digits of an ISBN code.
(e) A publisher has houses in Germany and the United States. Its German
prefix is 3-540. If its United States prefix will be 0-abc, find abc such
that the rest of the ISBN code will be the same for a book printed in
Germany and in the United States. Under the ISBN coding method
the first digit identifies the language; German is 3 and English is 0.
The next group of numbers identifies the publisher, and the last group
identifies the specific book.
The groups Z and Zn , which are among the most familiar and easily under-
stood groups, are both examples of what are called cyclic groups. In this
chapter we will study the properties of cyclic groups and cyclic subgroups,
which play a fundamental part in the classification of all abelian groups.
3Z = {. . . , 3, 0, 3, 6, . . .}.
57
58 CHAPTER 4 CYCLIC GROUPS
Theorem 4.1 Let G be a group and a be any element in G. Then the set
hai = {ak : k Z}
Proof. The identity is in hai since a0 = e. If g and h are any two elements
in hai, then by the definition of hai we can write g = am and h = an for some
integers m and n. So gh = am an = am+n is again in hai. Finally, if g = an
in hai, then the inverse g 1 = an is also in hai. Clearly, any subgroup H
of G containing a must contain all the powers of a by closure; hence, H
contains hai. Therefore, hai is the smallest subgroup of G containing a.
Remark. If we are using the + notation, as in the case of the integers
under addition, we write hai = {na : n Z}.
For a G, we call hai the cyclic subgroup generated by a. If G contains
some element a such that G = hai, then G is a cyclic group. In this case a
is a generator of G. If a is an element of a group G, we define the order
of a to be the smallest positive integer n such that an = e, and we write
|a| = n. If there is no such integer n, we say that the order of a is infinite
and write |a| = to denote the order of a.
Example 3. Notice that a cyclic group can have more than a single gen-
erator. Both 1 and 5 generate Z6 ; hence, Z6 is a cyclic group. Not every
element in a cyclic group is necessarily a generator of the group. The order
of 2 Z6 is 3. The cyclic subgroup generated by 2 is h2i = {0, 2, 4}.
The groups Z and Zn are cyclic groups. The elements 1 and 1 are
generators for Z. We can certainly generate Zn with 1 although there may
be other generators of Zn , as in the case of Z6 .
21 = 2 22 = 4
23 = 8 24 = 7
25 = 5 26 = 1.
4.1 CYCLIC SUBGROUPS 59
S3
{id}
Proof. The main tools used in this proof are the division algorithm and
the Principle of Well-Ordering. Let G be a cyclic group generated by a and
suppose that H is a subgroup of G. If H = {e}, then trivially H is cyclic.
Suppose that H contains some other element g distinct from the identity.
Then g can be written as an for some integer n. We can assume that n > 0.
60 CHAPTER 4 CYCLIC GROUPS
ak = amq+r = (am )q ar = hq ar .
h0 = ak = amq = hq
and H is generated by h.
ak = ans = (an )s = es = e.
Corollary 4.7 The generators of Zn are the integers r such that 1 r < n
and gcd(r, n) = 1.
19=9 29=2 3 9 = 11
49=4 5 9 = 13 69=6
7 9 = 15 89=8 99=1
10 9 = 10 11 9 = 3 12 9 = 12
13 9 = 5 14 9 = 14 15 9 = 7.
C = {a + bi : a, b R},
z + w = (2 + 3i) + (1 2i) = 3 + i
and
zw = (2 + 3i)(1 2i) = 8 i.
Also,
2 3
z 1 = i
13 13
|z| = 13
z = 2 3i.
z1 = 2 + 3i
z3 = 3 + 2i
0 x
z2 = 1 2i
a + bi
r
0 x
z = a + bi = r(cos + i sin ).
Hence, p
r = |z| = a2 + b2
and
a = r cos
b = r sin .
a = 2 cos 60 = 1
and
b = 2 sin 60 = 3.
Hence, the rectangular representation is z = 1 + 3 i.
64 CHAPTER 4 CYCLIC GROUPS
and
b
= arctan = arctan(1) = 315 ,
a
so 3 2 3 2 i = 6 cis 315 .
The polar representation of a complex number makes it easy to find prod-
ucts and powers of complex numbers. The proof of the following proposition
is straightforward and is left as an exercise.
z n+1 = z n z
= rn (cos n + i sin n)r(cos + i sin )
= rn+1 [(cos n cos sin n sin ) + i(sin n cos + cos n sin )]
= rn+1 [cos(n + ) + i sin(n + )]
= rn+1 [cos(n + 1) + i sin(n + 1)].
4.2 THE GROUP C 65
z 10 = (1 + i)10
10
= 2 cis
4
10 5
= ( 2 ) cis
2
= 32 cis
2
= 32i.
T = {z C : |z| = 1}.
Although the circle group has infinite order, it has many interesting finite
subgroups. Suppose that H = {1, 1, i, i}. Then H is a subgroup of the
circle group. Also, 1, 1, i, and i are exactly those complex numbers that
satisfy the equation z 4 = 1. The complex numbers satisfying the equation
z n = 1 are called the nth roots of unity.
The zs are distinct since the numbers 2k/n are all distinct and are greater
than or equal to 0 but less than 2. The fact that these are all of the roots
of the equation z n = 1 follows from from Corollary 17.6, which states that
a polynomial of degree n can have at most n roots. We will leave the proof
that the nth roots of unity form a cyclic subgroup of T as an exercise.
A generator for the group of the nth roots of unity is called a primitive
nth root of unity.
Example 11. The 8th roots of unity can be represented as eight equally
spaced points on the unit circle (Figure 4.4). The primitive 8th roots of
unity are
2 2
= + i
2 2
2 2
3 = + i
2 2
2 2
5 = i
2 2
2 2
7 = i.
2 2
However, such numbers are so large that we do not want to attempt the
calculations; moreover, past a certain point the computations would not be
feasible even if we had every computer in the world at our disposal. Even
writing down the decimal representation of a very large number may not be
1
The results in this section are needed only in Chapter 7.
4.3 THE METHOD OF REPEATED SQUARES 67
y
i
3
1 0 1 x
5 7
i
Each step involves squaring the answer obtained in the previous step, divid-
ing by n, and taking the remainder.
Exercises
1. Prove or disprove each of the following statements.
(a) U (8) is cyclic.
(b) All of the generators of Z60 are prime.
(c) Q is cyclic.
(d) If every subgroup of a group G is cyclic, then G is a cyclic group.
(e) A group with a finite number of subgroups is finite.
2. Find the order of each of the following elements.
(a) 5 Z12 (c) 3 R (e) 72 in Z240
(b) 3 R (d) i C (f) 312 in Z471
20. List and graph the 6th roots of unity. What are the generators of this group?
What are the primitive 6th roots of unity?
21. List and graph the 5th roots of unity. What are the generators of this group?
What are the primitive 5th roots of unity?
22. Calculate each of the following.
Programming Exercises
1. Write a computer program that will write any decimal number as the sum
of distinct powers of 2. What is the largest integer that your program will
handle?
2. Write a computer program to calculate ax (mod n) by the method of re-
peated squares. What are the largest values of n and x that your program
will accept?
EXERCISES 73
A 7 B
B 7 C
C 7 A.
74
5.1 DEFINITIONS AND NOTATION 75
( (x)). That is, we do first, then . There are several ways to approach
this inconsistency. We will adopt the convention of multiplying permutations
right to left. To compute , do first and then . That is, by (x) we
mean ( (x)). (Another way of solving this problem would be to write
functions on the right; that is, instead of writing (x), we could write (x).
We could also multiply permutations left to right to agree with the usual
way of multiplying elements in a group. Certainly all of these methods have
been used.
Then
1 2 3 4
= ,
1 4 3 2
but
1 2 3 4
= .
3 2 1 4
Cycle Notation
The notation that we have used to represent permutations up to this point is
cumbersome, to say the least. To work effectively with permutation groups,
we need a more streamlined method of writing down and manipulating per-
mutations.
A permutation SX is a cycle of length k if there exist elements
a1 , a2 , . . . , ak X such that
(a1 ) = a2
(a2 ) = a3
..
.
(ak ) = a1
5.1 DEFINITIONS AND NOTATION 77
is a cycle of length 3.
Not every permutation is a cycle. Consider the permutation
1 2 3 4 5 6
= (1243)(56).
2 4 1 3 6 5
= (1352)
= (256).
We can think of as
1 7 3
3 7 5
5 7 2
2 7 1
and as
2 7 5
5 7 6
6 7 2
Example 5. The cycles (135) and (27) are disjoint; however, the cycles
(135) and (347) are not. Calculating their products, we find that
(135)(27) = (135)(27)
(135)(347) = (13475).
The product of two cycles that are not disjoint may reduce to something
less complicated; the product of disjoint cycles cannot be simplified.
a1 7 a2
a2 7 a3
..
.
ak1 7 ak
ak 7 a1 .
However, (ai ) = ai since and are disjoint. Therefore,
(ai ) = ( (ai ))
= (ai )
= a(i mod k)+1
= (a(i mod k)+1 )
= ((ai ))
= (ai ).
Similarly, if x {b1 , b2 , . . . , bl }, then and also commute.
5.1 DEFINITIONS AND NOTATION 79
Example 6. Let
1 2 3 4 5 6
=
6 4 3 1 5 2
1 2 3 4 5 6
= .
3 2 1 5 6 4
Using cycle notation, we can write
= (1624)
= (13)(456)
= (136)(245)
= (143)(256).
Remark. From this point forward we will find it convenient to use cycle
notation to represent permutations. When using cycle notation, we often
denote the identity permutation by (1).
Transpositions
The simplest permutation is a cycle of length 2. Such cycles are called
transpositions. Since
(23)(16)(23)
or by
(35)(16)(13)(16)(13)(35)(56),
but (16) will always be the product of an odd number of transpositions.
id = 1 2 r ,
(ab)(ab) = id
(bc)(ab) = (ac)(bc)
(cd)(ab) = (ab)(cd)
(ac)(ab) = (ab)(bc),
The first equation simply says that a transposition is its own inverse. If
this case occurs, delete r1 r from the product to obtain
id = 1 2 r3 r2 .
= 1 2 m = 1 2 n ,
where m is even. We must show that n is also an even number. The inverse
of 1 is m 1 . Since
id = m 1 = 1 n m 1 ,
n must be even by Lemma 5.5. The proof for the case in which can be
expressed as an odd number of transpositions is left as an exercise.
In light of Theorem 5.6, we define a permutation to be even if it can be
expressed as an even number of transpositions and odd if it can be expressed
as an odd number of transpositions.
82 CHAPTER 5 PERMUTATION GROUPS
Proof. Since the product of two even permutations must also be an even
permutation, An is closed. The identity is an even permutation and therefore
is in An . If is an even permutation, then
= 1 2 r ,
: An B n
by
( ) = .
Suppose that ( ) = (). Then = and so
= 1 = 1 = .
One of the end-of-chapter exercises will be to write down all the subgroups
of A4 . You will find that there is no subgroup of order 6. Does this surprise
you?
Historical Note
Lagrange first thought of permutations as functions from a set to itself, but it was
Cauchy who developed the basic theorems and notation for permutations. He was
the first to use cycle notation. Augustin-Louis Cauchy (17891857) was born in
Paris at the height of the French Revolution. His family soon left Paris for the
village of Arcueil to escape the Reign of Terror. One of the familys neighbors there
was Pierre-Simon Laplace (17491827), who encouraged him to seek a career in
mathematics. Cauchy began his career as a mathematician by solving a problem
in geometry given to him by Lagrange. Over 800 papers were written by Cauchy
on such diverse topics as differential equations, finite groups, applied mathematics,
and complex analysis. He was one of the mathematicians responsible for making
calculus rigorous. Perhaps more theorems and concepts in mathematics have the
name Cauchy attached to them than that of any other mathematician.
1
n 2
n1 3
n choices to replace the first vertex. If we replace the first vertex by k, then
the second vertex must be replaced either by vertex k + 1 or by vertex k 1;
hence, there are 2n possible rigid motions of the n-gon. We summarize these
results in the following theorem.
1 2
8 2 1 3
rotation
7 3 8 4
6 4 7 5
5 6
1 1
8 2 2 8
reflection
7 3 3 7
6 4 4 6
5 5
rn = id
s2 = id
srs = r1 .
1 1
6 2 2 6
5 3 3 5
4 4
1 1
5 2 2 5
4 3 3 4
We will denote the rotation 360 /n by r. The rotation r generates all of the
other rotations. That is,
360
rk = k .
n
Label the n reflections s1 , s2 , . . . , sn , where sk is the reflection that leaves
vertex k fixed. There are two cases of reflection, depending on whether n
is even or odd. If there are an even number of vertices, then 2 vertices are
left fixed by a reflection. If there are an odd number of vertices, then only
a single vertex is left fixed by a reflection (Figure 5.3). In either case, the
order of sk is two. Let s = s1 . Then s2 = id and rn = id. Since any rigid
motion t of the n-gon replaces the first vertex by the vertex k, the second
vertex must be replaced by either k + 1 or by k 1. If the second vertex is
replaced by k + 1, then t = rk1 . If it is replaced by k 1, then t = rk1 s.
Hence, r and s generate Dn ; that is, Dn consists of all finite products of r
and s. We will leave the proof that srs = r1 as an exercise.
1 2
4 3
are
r = (1234)
r2 = (13)(24)
r3 = (1432)
r4 = id
and the reflections are
s1 = (24)
s2 = (13).
The order of D4 is 8. The remaining two elements are
rs1 = (12)(34)
r3 s1 = (14)(23).
1 2
4 3
3 4
2 1
1 2 2 1
4 3 4 3
3 4 3 4
2 1 1 2
Proof. From Proposition 5.11, we already know that the motion group of
the cube has 24 elements, the same number of elements as there are in S4 .
There are exactly four diagonals in the cube. If we label these diagonals 1,
2, 3, and 4, we must show that the motion group of the cube will give us
any permutation of the diagonals (Figure 5.5). If we can obtain all of these
permutations, then S4 and the group of rigid motions of the cube must be
the same. To obtain a transposition we can rotate the cube 180 about the
axis joining the midpoints of opposite edges (Figure 5.6). There are six such
88 CHAPTER 5 PERMUTATION GROUPS
Exercises
1. Write the following permutations in cycle notation.
(a) (c)
1 2 3 4 5 1 2 3 4 5
2 4 1 5 3 3 5 1 4 2
(b) (d)
1 2 3 4 5 1 2 3 4 5
4 2 5 1 3 1 4 3 2 5
4. Find (a1 , a2 , . . . , an )1 .
5. List all of the subgroups of S4 . Find each of the following sets.
(a) { S4 : (1) = 3}
(b) { S4 : (2) = 2}
(c) { S4 : (1) = 3 and (2) = 2}
EXERCISES 89
Find the center of D8 . What about the center of D10 ? What is the center of
Dn ?
30. Let = (a1 , a2 , . . . , ak ) be a cycle of length k.
(a) Prove that if is any permutation, then
is a cycle of length k.
(b) Let be a cycle of length k. Prove that there is a permutation such
that 1 = .
31. For and in Sn , define if there exists an Sn such that 1 =
. Show that is an equivalence relation on Sn .
32. Let SX . If n (x) = y, we will say that x y.
(a) Show that is an equivalence relation on X.
(b) If An and Sn , show that 1 An .
(c) Define the orbit of x X under SX to be the set
Ox, = {y : x y}.
= (1254)
= (123)(45)
= (13)(25).
(d) If Ox, Oy, 6= , prove that Ox, = Oy, . The orbits under a permu-
tation are the equivalence classes corresponding to the equivalence
relation .
(e) A subgroup H of SX is transitive if for every x, y X, there exists
a H such that (x) = y. Prove that hi is transitive if and only if
Ox, = X for some x X.
EXERCISES 91
Lagranges Theorem, one of the most important results in finite group the-
ory, states that the order of a subgroup must divide the order of the group.
This theorem provides a powerful tool for analyzing finite groups; it gives
us an idea of exactly what type of subgroups we might expect a finite group
to possess. Central to understanding Lagrangess Theorem is the notion of
a coset.
6.1 Cosets
Let G be a group and H a subgroup of G. Define a left coset of H with
representative g G to be the set
gH = {gh : h H}.
Right cosets can be defined similarly by
Hg = {hg : h H}.
If left and right cosets coincide or if it is clear from the context to which type
of coset that we are referring, we will use the word coset without specifying
left or right.
92
6.1 COSETS 93
We will always write the cosets of subgroups of Z and Zn with the additive
notation we have used for cosets here. In a commutative group, left and
right cosets are always identical.
The right cosets of H are exactly the same as the left cosets:
It is not always the case that a left coset is the same as a right coset.
Let K be the subgroup of S3 defined by the permutations {(1), (12)}. Then
the left cosets of K are
The following lemma is quite useful when dealing with cosets. (We leave
its proof as an exercise.)
1. g1 H = g2 H;
2. Hg11 = Hg21 ;
3. g1 H g2 H;
94 CHAPTER 6 COSETS AND LAGRANGES THEOREM
4. g2 g1 H;
5. g11 g2 H.
Proof. Let LH and RH denote the set of left and right cosets of H in
G, respectively. If we can define a bijective map : LH RH , then the
theorem will be proved. If gH LH , let (gH) = Hg 1 . By Lemma 6.1,
the map is well-defined; that is, if g1 H = g2 H, then Hg11 = Hg21 . To
show that is one-to-one, suppose that
Hg11 = (g1 H) = (g2 H) = Hg21 .
Again by Lemma 6.1, g1 H = g2 H. The map is onto since (g 1 H) = Hg.
6.2 LAGRANGES THEOREM 95
Proof. We first show that the map is one-to-one. Suppose that (h1 ) =
(h2 ) for elements h1 , h2 H. We must show that h1 = h2 , but (h1 ) = gh1
and (h2 ) = gh2 . So gh1 = gh2 , and by left cancellation h1 = h2 . To show
that is onto is easy. By definition every element of gH is of the form gh
for some h H and (h) = gh.
Corollary 6.6 Suppose that G is a finite group and g G. Then the order
of g must divide the number of elements in G.
Corollary 6.7 Let |G| = p with p a prime number. Then G is cyclic and
any g G such that g 6= e is a generator.
Theorem 6.9 Two cycles and in Sn have the same length if and only
if there exists a Sn such that = 1 .
= (a1 , a2 , . . . , ak )
= (b1 , b2 , . . . , bk ).
(a1 ) = b1
(a2 ) = b2
..
.
(ak ) = bk .
Then = 1 .
Conversely, suppose that = (a1 , a2 , . . . , ak ) is a k-cycle and Sn . If
(ai ) = b and (a(i mod k)+1 ) = b0 , then (b) = b0 . Hence,
Theorem 6.11 Let U (n) be the group of units in Zn . Then |U (n)| = (n).
Theorem 6.12 (Eulers Theorem) Let a and n be integers such that n >
0 and gcd(a, n) = 1. Then a(n) 1 (mod n).
Historical Note
Joseph-Louis Lagrange (17361813), born in Turin, Italy, was of French and Italian
descent. His talent for mathematics became apparent at an early age. Leonhard
Euler recognized Lagranges abilities when Lagrange, who was only 19, communi-
cated to Euler some work that he had done in the calculus of variations. That year
he was also named a professor at the Royal Artillery School in Turin. At the age
of 23 he joined the Berlin Academy. Frederick the Great had written to Lagrange
98 CHAPTER 6 COSETS AND LAGRANGES THEOREM
proclaiming that the greatest king in Europe should have the greatest mathe-
matician in Europe at his court. For 20 years Lagrange held the position vacated
by his mentor, Euler. His works include contributions to number theory, group
theory, physics and mechanics, the calculus of variations, the theory of equations,
and differential equations. Along with Laplace and Lavoisier, Lagrange was one of
the people responsible for designing the metric system. During his life Lagrange
profoundly influenced the development of mathematics, leaving much to the next
generation of mathematicians in the form of examples and new problems to be
solved.
Exercises
1. Suppose that G is a finite group with an element g of order 5 and an element
h of order 7. Why must |G| 35?
2. Suppose that G is a finite group with 60 elements. What are the orders of
possible subgroups of G?
3. Prove or disprove: Every subgroup of the integers has finite index.
4. Prove or disprove: Every subgroup of the integers has finite order.
5. List the left and right cosets of the subgroups in each of the following.
6. Describe the left cosets of SL2 (R) in GL2 (R). What is the index of SL2 (R)
in GL2 (R)?
7. Verify Eulers Theorem for n = 15 and a = 4.
8. Use Fermats Little Theorem to show that if p = 4n + 3 is prime, there is no
solution to the equation x2 1 (mod p).
9. Show that the integers have infinite index in the additive group of rational
numbers.
10. Show that the additive group of real numbers has infinite index in the additive
group of the complex numbers.
11. Let H be a subgroup of a group G and suppose that g1 , g2 G. Prove that
the following conditions are equivalent.
(a) g1 H = g2 H
EXERCISES 99
Cryptography is the study of sending and receiving secret messages. The aim
of cryptography is to send messages across a channel so only the intended
recipient of the message can read it. In addition, when a message is received,
the recipient usually requires some assurance that the message is authentic;
that is, that it has not been sent by someone who is trying to deceive the
recipient. Modern cryptography is heavily dependent on abstract algebra
and number theory.
The message to be sent is called the plaintext message. The disguised
message is called the ciphertext. The plaintext and the ciphertext are both
written in an alphabet, consisting of letters or characters. Characters can
include not only the familiar alphabetic characters A, . . ., Z and a, . . ., z but
also digits, punctuation marks, and blanks. A cryptosystem, or cipher,
has two parts: encryption, the process of transforming a plaintext message
to a ciphertext message, and decryption, the reverse transformation of
changing a ciphertext message into a plaintext message.
There are many different families of cryptosystems, each distinguished
by a particular encryption algorithm. Cryptosystems in a specified cryp-
tographic family are distinguished from one another by a parameter to the
encryption function called a key. A classical cryptosystem has a single key,
which must be kept secret, known only to the sender and the receiver of
the message. If person A wishes to send secret messages to two different
people B and C, and does not wish to have B understand Cs messages or
vice versa, A must use two separate keys, so one cryptosystem is used for
exchanging messages with B, and another is used for exchanging messages
with C.
100
7.1 PRIVATE KEY CRYPTOGRAPHY 101
Systems that use two separate keys, one for encoding and another for
decoding, are called public key cryptosystems. Since knowledge of the
encoding key does not allow anyone to guess at the decoding key, the en-
coding key can be made public. A public key cryptosystem allows A and B
to send messages to C using the same encoding key. Anyone is capable of
encoding a message to be sent to C, but only C knows how to decode such
a message.
Example 1. One of the first and most famous private key cryptosystems
was the shift code used by Julius Caesar. We first digitize the alphabet by
letting A = 00, B = 01, . . . , Z = 25. The encoding function will be
0, 11, 6, 4, 1, 17, 0,
or ALGEBRA. Notice here that there is nothing special about either of the
numbers 3 or 26. We could have used a larger alphabet or a different shift.
102 CHAPTER 7 INTRODUCTION TO CRYPTOGRAPHY
c = ap + b mod 26
for p. By Proposition 3.1, this is possible exactly when a has an inverse or,
equivalently, when gcd(a, 26) = 1. In this case
A cryptosystem would be more secure if a ciphertext letter could rep-
resent more than one plaintext letter. To give an example of this type of
cryptosystem, called a polyalphabetic cryptosystem, we will generalize
affine codes by using matrices. The idea works roughly the same as before;
however, instead of encrypting one letter at a time we will encrypt pairs of
letters. We can store a pair of letters p1 and p2 in a vector
p1
p= .
p2
f 1 (p) = A1 p A1 b.
Example 4. Suppose that we wish to encode the word HELP. The corre-
sponding digit string is 7, 4, 11, 15. If
3 5
A= ,
1 2
then
1 2 21
A = .
25 3
104 CHAPTER 7 INTRODUCTION TO CRYPTOGRAPHY
If b = (2, 2)t , then our message is encrypted as RRCR. The encrypted letter
R represents more than one plaintext letter.
Frequency analysis can still be performed on a polyalphabetic cryptosys-
tem, because we have a good understanding of how pairs of letters appear
in the English language. The pair th appears quite often; the pair qz never
appears. To avoid decryption by a third party, we must use a larger matrix
than the one we used in Example 4.
n = pq = 667
and
(n) = m = (p 1)(q 1) = 616.
We can let E = 487, since gcd(616, 487) = 1. The encoded message is
computed to be
23487 mod 667 = 368.
This computation can be reasonably done by using the method of repeated
squares as described in Chapter 4. Using the Euclidean algorithm, we de-
termine that 191E = 1 + 151m; therefore, the decrypting key is (n, D) =
(667, 191). We can recover the original message by calculating
Now let us examine why the RSA cryptosystem works. We know that
DE 1 (mod m); hence, there exists a k such that
DE = km + 1 = k(n) + 1.
By Theorem 6.12,
We can now ask how one would go about breaking the RSA cryptosys-
tem. To find D given n and E, we simply need to factor n and solve for D
by using the Euclidean algorithm. If we had known that 667 = 23 29 in
Example 5, we could have recovered D.
106 CHAPTER 7 INTRODUCTION TO CRYPTOGRAPHY
Message Verification
There is a problem of message verification in public key cryptosystems.
Since the encoding key is public knowledge, anyone has the ability to send
an encoded message. If Alice receives a message from Bob, she would like
to be able to verify that it was Bob who actually sent the message. Sup-
pose that Bobs encrypting key is (n0 , E 0 ) and his decrypting key is (n0 , D0 ).
Also, suppose that Alices encrypting key is (n, E) and her decrypting key
is (n, D). Since encryption keys are public information, they can exchange
coded messages at their convenience. Bob wishes to assure Alice that the
message he is sending is authentic. Before Bob sends the message x to Alice,
he decrypts x with his own key:
0
x0 = xD mod n0 .
Anyone can change x0 back to x just by encryption, but only Bob has the
ability to form x0 . Now Bob encrypts x0 with Alices encryption key to form
E
y 0 = x0 mod n,
a message that only Alice can decode. Alice decodes the message and then
encodes the result with Bobs key to read the original message, a message
that could have only been sent by Bob.
Historical Note
Encrypting secret messages goes as far back as ancient Greece and Rome. As we
know, Julius Caesar used a simple shift code to send and receive messages. However,
the formal study of encoding and decoding messages probably began with the Arabs
in the 1400s. In the fifteenth and sixteenth centuries mathematicians such as Alberti
and Viete discovered that monoalphabetic cryptosystems offered no real security.
In the 1800s, F. W. Kasiski established methods for breaking ciphers in which
a ciphertext letter can represent more than one plaintext letter, if the same key
was used several times. This discovery led to the use of cryptosystems with keys
that were used only a single time. Cryptography was placed on firm mathematical
foundations by such people as W. Friedman and L. Hill in the early part of the
twentieth century.
During World War II mathematicians were very active in cryptography. Efforts
to penetrate the cryptosystems of the Axis nations were organized in England and in
the United States by such notable mathematicians as Alan Turing and A. A. Albert.
The period after World War I saw the development of special-purpose machines for
encrypting and decrypting messages. The Allies gained a tremendous advantage in
World War II by breaking the ciphers produced by the German Enigma machine
and the Japanese Purple ciphers.
EXERCISES 107
Exercises
1. Encode IXLOVEXMATH using the cryptosystem in Example 1.
2. Decode ZLOOA WKLVA EHARQ WKHA ILQDO, which was encoded using
the cryptosystem in Example 1.
3. Assuming that monoalphabetic code was used to encode the following secret
message, what was the original message?
XE X (mod n).
n = x2 y 2 = (x y)(x + y).
1: while x2 y 2 > n do
y y+1
if x2 y 2 < n then
xx+1
y1
goto 1
else if x2 y 2 = 0 then
axy
bx+y
write n = a b
The expression d n e means the smallest integer greater than or equal
to the square root of n. Write another program to do factorization using
trial division and compare the speed of the two algorithms. Which
algorithm is faster and why?
2. Primality Testing. Recall Fermats Little Theorem from Chapter 6. Let p
be prime with gcd(a, p) = 1. Then ap1 1 (mod p). We can use Fermats
Little Theorem as a screening test for primes. For example, 15 cannot be
prime since
2151 214 4 (mod 15).
However, 17 is a potential prime since
Which of the following numbers are primes and which are pseudoprimes?
110 CHAPTER 7 INTRODUCTION TO CRYPTOGRAPHY
111
112 CHAPTER 8 ALGEBRAIC CODING THEORY
m-digit message
Encoder
Transmitter
Noise
Receiver
Decoder
error and reconstruct the original message. Our goal is to transmit error-free
messages as cheaply and quickly as possible.
(x1 , x2 , . . . , xn ) 7 (x1 , x2 , . . . , xn , x1 , x2 , . . . , xn , x1 , x2 , . . . , xn ).
To decode the message, we choose as the ith digit the one that appears
in the ith place in at least two of the three transmissions. For exam-
ple, if the original message is (0110), then the transmitted message will
be (0110 0110 0110). If there is a transmission error in the fifth digit, then
the received codeword will be (0110 1110 0110), which will be correctly de-
8.1 ERROR-DETECTING AND CORRECTING CODES 113
A = 6510 = 010000012 ,
B = 6610 = 010000102 ,
C = 6710 = 010000112 .
Notice that the leftmost bit is always set to 0; that is, the 128 ASCII char-
acters have codes
000000002 = 010 ,
..
.
011111112 = 12710 .
The bit can be used for error checking on the other seven bits. It is set to
either 0 or 1 so that the total number of 1 bits in the representation of a
character is even. Using even parity, the codes for A, B, and C now become
A = 010000012 ,
B = 010000102 ,
C = 110000112 .
1s, and we can now request that the codeword be transmitted again. When
used for error checking, the leftmost bit is called a parity check bit.
By far the most common error-detecting codes used in computers are
based on the addition of a parity bit. Typically, a computer stores informa-
tion in m-tuples called words. Common word lengths are 8, 16, and 32 bits.
One bit in the word is set aside as the parity check bit, and is not used to
store information. This bit is set to either 0 or 1, depending on the number
of 1s in the word.
Adding a parity check bit allows the detection of all single errors because
changing a single bit either increases or decreases the number of 1s by one,
and in either case the parity has been changed from even to odd, so the new
word is not a codeword. (We could also construct an error detection scheme
based on odd parity; that is, we could set the parity check bit so that a
codeword always has an odd number of 1s.)
The even parity system is easy to implement, but has two drawbacks.
First, multiple errors are not detectable. Suppose an A is sent and the first
and seventh bits are changed from 0 to 1. The received word is a codeword,
but will be decoded into a C instead of an A. Second, we do not have the
ability to correct errors. If the 8-tuple (1001 1000) is received, we know that
an error has occurred, but we have no idea which bit has been changed. We
will now investigate a coding scheme that will not only allow us to detect
transmission errors but will actually correct the errors.
Received Word
000 001 010 011 100 101 110 111
Transmitted 000 0 1 1 2 1 2 2 3
Codeword 111 3 2 2 1 2 1 1 0
Maximum-Likelihood Decoding
The coding scheme presented in Example 3 is not a complete solution to the
problem because it does not account for the possibility of multiple errors.
For example, either a (000) or a (111) could be sent and a (001) received.
We have no means of deciding from the received word whether there was a
single error in the third bit or two errors, one in the first bit and one in the
second. No matter what coding scheme is used, an incorrect message could
be received: we could transmit a (000), have errors in all three bits, and
receive the codeword (111). It is important to make explicit assumptions
about the likelihood and distribution of transmission errors so that, in a
particular application, it will be known whether a given error detection
scheme is appropriate. We will assume that transmission errors are rare,
and, that when they do occur, they occur independently in each bit; that
is, if p is the probability of an error in one bit and q is the probability of
an error in a different bit, then the probability of errors occurring in both
of these bits at the same time is pq. We will also assume that a received
n-tuple is decoded into a codeword that is closest to it; that is, we assume
that the receiver uses maximum-likelihood decoding.
p
0 0
q
q
1 p 1
pn = (0.995)500 0.082.
8.1 ERROR-DETECTING AND CORRECTING CODES 117
Block Codes
If we are to develop efficient error-detecting and error-correcting codes, we
will need more sophisticated mathematical tools. Group theory will allow
faster methods of encoding and decoding messages. A code is an (n, m)-
block code if the information that is to be coded can be divided into blocks
of m binary digits, each of which can be encoded into n binary digits. More
specifically, an (n, m)-block code consists of an encoding function
E : Zm n
2 Z2
D : Zn2 Zm
2 .
E(x7 , x6 , . . . , x1 ) = (x8 , x7 , . . . , x1 ),
The minimum distance for this code is 3. We also have the following weights:
The following proposition lists some basic properties about the weight
of a codeword and the distance between two codewords. The proof is left as
an exercise.
2. d(x, y) 0;
Proof. Suppose that a codeword x is sent and the word y is received with
at most n errors. Then d(x, y) n. If z is any codeword other than x, then
Historical Note
Shannons Theorem proclaimed exactly how good codes could be expected to be.
Richard Hamming began working with linear codes at Bell Labs in the late 1940s
and early 1950s after becoming frustrated because the programs that he was running
could not recover from simple errors generated by noise. Coding theory has grown
tremendously in the past several years. The Theory of Error-Correcting Codes,
by MacWilliams and Sloane [5], published in 1977, already contained over 1500
references. Linear codes (Reed-Muller (32, 6)-block codes) were used on NASAs
Mariner space probes. More recent space probes such as Voyager have used what
are called convolution codes. Currently, very active research is being done with
Goppa codes, which are heavily dependent on algebraic geometry.
Lemma 8.4 Let x and y be binary n-tuples. Then w(x + y) = d(x, y).
Proof. Suppose that x and y are binary n-tuples. Then the distance
between x and y is exactly the number of places in which x and y differ.
But x and y differ in a particular coordinate exactly when the sum in the
coordinate is 1, since
1+1=0
0+0=0
1+0=1
0 + 1 = 1.
Consequently, the weight of the sum must be the distance between the two
codewords.
Theorem 8.5 Let dmin be the minimum distance for a group code C. Then
dmin is the minimum of all the nonzero weights of the nonzero codewords in
C. That is,
dmin = min{w(x) : x 6= 0}.
dmin = min{d(x, y) : x 6= y}
= min{d(x, y) : x + y 6= 0}
= min{w(x + y) : x + y 6= 0}
= min{w(z) : z 6= 0}.
122 CHAPTER 8 ALGEBRAIC CODING THEORY
Linear Codes
From Example 8, it is now easy to check that the minimum nonzero weight
is 3; hence, the code does indeed detect and correct all single errors. We
have now reduced the problem of finding good codes to that of generating
group codes. One easy way to generate group codes is to employ a bit of
matrix theory.
Define the inner product of two binary n-tuples to be
x y = x1 y1 + + xn yn ,
x y = xt y
y1
y2
= x1 x2 xn .
..
yn
= x1 y1 + x2 y2 + + xn yn .
Let Mmn (Z2 ) denote the set of all mn matrices with entries in Z2 . We
do matrix operations as usual except that all our addition and multiplication
operations occur in Z2 . Define the null space of a matrix H Mmn (Z2 )
to be the set of all binary n-tuples x such that Hx = 0. We denote the null
space of a matrix H by Null(H).
Proof. Since each element of Zn2 is its own inverse, the only thing that
really needs to be checked here is closure. Let x, y Null(H) for some
matrix H in Mmn (Z2 ). Then Hx = 0 and Hy = 0. So
H(x + y) = H(x + y) = Hx + Hy = 0 + 0 = 0.
Hence, x + y is in the null space of H and therefore must be a codeword.
A code is a linear code if it is determined by the null space of some
matrix H Mmn (Z2 ).
the received word is not a codeword. We must either attempt to correct the
word or request that it be transmitted again.
Example 12. Suppose that we have the following eight words to be en-
coded:
(000), (001), (010), . . . , (111).
For
0 1 1
A = 1 1 0 ,
1 0 1
the associated standard generator and canonical parity-check matrices are
1 0 0
0 1 0
0 0 1
G= 0
1 1
1 1 0
1 0 1
and
0 1 1 1 0 0
H = 1 1 0 0 1 0 ,
1 0 1 0 0 1
respectively.
Observe that the rows in H represent the parity checks on certain bit
positions in a 6-tuple. The 1s in the identity matrix serve as parity checks
for the 1s in the same row. If x = (x1 , x2 , x3 , x4 , x5 , x6 ), then
x2 + x3 + x4
0 = Hx = x1 + x2 + x5 ,
x1 + x3 + x6
x2 + x3 + x4 = 0
x1 + x2 + x5 = 0
x1 + x3 + x6 = 0.
Here x4 serves as a check bit for x2 and x3 ; x5 is a check bit for x1 and x2 ;
and x6 is a check bit for x1 and x3 . The identity matrix keeps x4 , x5 , and x6
126 CHAPTER 8 ALGEBRAIC CODING THEORY
An even easier way to compute the null space is with the generator matrix
G (Table 8.4).
is a group code.
We must also show that two message blocks cannot be encoded into the
same codeword. That is, we must show that if Gx = Gy, then x = y.
Suppose that Gx = Gy. Then
Gx Gy = G(x y) = 0.
where (
1, i=j
ij =
0, i 6= j
is the Kronecker delta.
e1 = (100 00)t
e2 = (010 00)t
..
.
en = (000 01)t
We state this result in the following proposition and leave the proof as
an exercise.
Proposition 8.11 Let ei be the binary n-tuple with a 1 in the ith coordinate
and 0s elsewhere and suppose that H Mmn (Z2 ). Then Hei is the ith
column of the matrix H.
and
1 1 1 0 0
H2 = 1 0 0 0 0 ,
1 1 0 0 1
then the null space of H1 is a single error-detecting code and the null space
of H2 is not.
We can even do better than Theorem 8.12. This theorem gives us con-
ditions on a matrix H that tell us when the minimum weight of the code
130 CHAPTER 8 ALGEBRAIC CODING THEORY
formed by the null space of H is 2. We can also determine when the mini-
mum distance of a linear code is 3 by examining the corresponding matrix.
Proof. The n-tuple ei + ej has 1s in the ith and jth entries and 0s
elsewhere, and w(ei + ej ) = 2 for i 6= j. Since
can only occur if the ith and jth columns are identical, the null space of H
is a single error-correcting code.
Suppose now that we have a canonical parity-check matrix H with three
rows. Then we might ask how many more columns we can add to the
matrix and still have a null space that is a single error-detecting and single
error-correcting code. Since each column has three entries, there are 23 = 8
possible distinct columns. We cannot add the columns
0 1 0 0
0 , 0 , 1 , 0 .
0 0 0 1
Theorem 8.15 Let H Mmn (Z2 ) and suppose that the linear code cor-
responding to H is single error-correcting. Let r be a received n-tuple that
was transmitted with at most one error. If the syndrome of r is 0, then no
error has occurred; otherwise, if the syndrome of r is equal to some column
of H, say the ith column, then the error has occurred in the ith bit.
Hence, x has an error in the third bit and z has an error in the fourth bit. The
transmitted codewords for x and z must have been (110110) and (010011),
respectively. The syndrome of y does not occur in any of the columns of the
matrix H, so multiple errors must have occurred to produce y.
Coset Decoding
We can use group theory to obtain another way of decoding messages. A
linear code C is a subgroup of Zn2 . Coset or standard decoding uses
the cosets of C in Zn2 to implement maximum-likelihood decoding. Suppose
that C is an (n, m)-linear code. A coset of C in Zn2 is written in the form
8.4 EFFICIENT DECODING 133
Cosets
C (00000) (01101) (10011) (11110)
(10000) + C (10000) (11101) (00011) (01110)
(01000) + C (01000) (00101) (11011) (10110)
(00100) + C (00100) (01001) (10111) (11010)
(00010) + C (00010) (01111) (10001) (11100)
(00001) + C (00001) (01100) (10010) (11111)
(10100) + C (00111) (01010) (10100) (11001)
(00110) + C (00110) (01011) (10101) (11000)
Example 18. Let C be the (5, 3)-linear code given by the parity-check
matrix
0 1 1 0 0
H = 1 0 0 1 0 .
1 1 0 0 1
The code consists of the codewords
There are 252 = 23 cosets of C in Z52 , each with order 22 = 4. These cosets
are listed in Table 8.5.
Our task is to find out how knowing the cosets might help us to decode
a message. Suppose that x was the original codeword sent and that r is
the n-tuple received. If e is the transmission error, then r = e + x or,
equivalently, x = e + r. However, this is exactly the statement that r is an
element in the coset e + C. In maximum-likelihood decoding we expect the
error e to be as small as possible; that is, e will have the least weight. An
n-tuple of least weight in a coset is called a coset leader. Once we have
determined a coset leader for each coset, the decoding process becomes a
task of calculating r + e to obtain x.
Proposition 8.16 Let C be an (n, k)-linear code given by the matrix H and
suppose that x and y are in Zn2 . Then x and y are in the same coset of C
if and only if Hx = Hy. That is, two n-tuples are in the same coset if and
only if their syndromes are the same.
Proof. Two n-tuples x and y are in the same coset of C exactly when
x y C; however, this is equivalent to H(x y) = 0 or Hx = Hy.
Example 20. Table 8.6 is a decoding table for the code C given in Exam-
ple 18. If x = (01111) is received, then its syndrome can be computed to
be
0
Hx = 1 .
1
Examining the decoding table, we determine that the coset leader is (00010).
It is now easy to decode the received codeword.
Given an (n, k)-block code, the question arises of whether or not coset
decoding is a manageable scheme. A decoding table requires a list of cosets
EXERCISES 135
and syndromes, one for each of the 2nk cosets of C. Suppose that we have
a (32, 24)-block code. We have a huge number of codewords, 224 , yet there
are only 23224 = 28 = 256 cosets.
Exercises
1. Why is the following encoding scheme not acceptable?
Information: 0 1 2 3 4 5 6 7 8
Codeword: 000 001 010 011 101 110 111 000 001
2. Without doing any addition, explain why the following set of 4-tuples in Z42
cannot be a group code.
5. Suppose that a linear code C has a minimum weight of 7. What are the
error-detection and error-correction capabilities of C?
6. In each of the following codes, what is the minimum distance for the code?
What is the best situation we might hope for in connection with error detec-
tion and error correction?
(a) (011010) (011100) (110111) (110000)
(b) (011100) (011011) (111011) (100011)
(000000) (010101) (110100) (110011)
(c) (000000) (011100) (110101) (110001)
(d) (0110110) (0111100) (1110000) (1111111)
(1001001) (1000011) (0001111) (0000000)
7. Compute the null space of each of the following matrices. What type of (n, k)-
block codes are the null spaces? Can you find a matrix (not necessarily a
standard generator matrix) that generates each code? Are your generator
matrices unique?
136 CHAPTER 8 ALGEBRAIC CODING THEORY
(a) (c)
0 1 0 0 0 1 0 0 1 1
1 0 1 0 1 0 1 0 1 1
1 0 0 1 0
(d)
(b)
0 0 0 1 1 1 1
1 0 1 0 0 0 0
1 1 1 0 0 1 1
1 0 1 0 0
1
0
0 1 0 1 0 1
1 0 0 1 0
0 1 1 0 0 1 1
1 1 0 0 0 1
if possible.
10. Suppose that a 1000-bit binary message is transmitted. Assume that the
probability of a single error is p and that the errors occurring in different
bits are independent of one another. If p = 0.01, what is the probability of
more than one error occurring? What is the probability of exactly two errors
occurring? Repeat this problem for p = 0.0001.
11. Which matrices are canonical parity-check matrices? For those matrices that
are canonical parity-check matrices, what are the corresponding standard
generator matrices? What are the error-detection and error-correction capa-
bilities of the code generated by each of these matrices?
(a) (c)
1 1 0 0 0
1 1 1 0
0 0 1 0 0 1 0 0 1
0 0 0 1 0
1 0 0 0 1 (d)
(b)
0 0 0 1 0 0 0
0 1 1 0 0 0 0 1 1 0 1 0 0
1 1 0 1 0 0
1 0 1 0 0 1 0
0 1 0 0 1 0 0 1 1 0 0 0 1
1 1 0 0 0 1
EXERCISES 137
12. List all possible syndromes for the codes generated by each of the matrices
in the previous exercise.
13. Let
0 1 1 1 1
H = 0 0 0 1 1 .
1 0 1 0 1
Compute the syndrome caused by each of the following transmission errors.
(a) An error in the first bit
(b) An error in the third bit
(c) An error in the last bit
(d) Errors in the third and fourth bits
14. Let C be the group code in Z32 defined by the codewords (000) and (111).
Compute the cosets of H in Z32 . Why was there no need to specify right or
left cosets? Give the single transmission error, if any, to which each coset
corresponds.
15. For each of the following matrices, find the cosets of the corresponding code
C. Give a decoding table for each code if possible.
(a) (c)
0 1 0 0 0 1 0 0 1 1
1 0 1 0 1 0 1 0 1 1
1 0 0 1 0
(d)
(b)
0 0 1 0 0 1 0 0 1 1 1 1
1 1 0 1 0 1 1 1 0 0 1 1
0 1 0 1 0 1 0 1 0 1 0 1
1 1 0 0 1 1 1 1 0 0 1 0
16. Let x, y, and z be binary n-tuples. Prove each of the following statements.
(a) w(x) = d(x, 0)
(b) d(x, y) = d(x + z, y + z)
(c) d(x, y) = w(x y)
17. A metric on a set X is a map d : X X R satisfying the following
conditions.
(a) d(x, y) 0 for all x, y X;
(b) d(x, y) = 0 exactly when x = y;
(c) d(x, y) = d(y, x);
138 CHAPTER 8 ALGEBRAIC CODING THEORY
Programming Exercises
Write a program to implement a (16, 12)-linear code. Your program should be
able to encode and decode messages using coset decoding. Once your program is
written, write a program to simulate a binary symmetric channel with transmission
noise. Compare the results of your simulation with the theoretically predicted error
probability.
Many groups may appear to be different at first glance, but can be shown
to be the same by a simple renaming of the group elements. For example,
Z4 and the subgroup of the circle group T generated by i can be shown
to be the same by demonstrating a one-to-one correspondence between the
elements of the two groups and between the group operations. In such a
case we say that the groups are isomorphic.
(a b) = (a) (b)
(0) = 1
(1) = i
(2) = 1
(3) = i.
Since
(m + n) = im+n = im in = (m)(n),
141
142 CHAPTER 9 ISOMORPHISMS
(x + y) = ex+y = ex ey = (x)(y).
Of course, we must still show that is one-to-one and onto, but this can be
determined using calculus.
(m + n) = 2m+n = 2m 2n = (m)(n).
Example 4. The groups Z8 and Z12 cannot be isomorphic since they have
different orders; however, it is true that U (8)
= U (12). We know that
U (8) = {1, 3, 5, 7}
U (12) = {1, 5, 7, 11}.
1 7 1
3 7 5
5 7 7
7 7 11.
The map is not the only possible isomorphism between these two groups.
We could define another isomorphism by (1) = 1, (3) = 11, (5) = 5,
(7) = 7. In fact, both of these groups are isomorphic to Z2 Z2 (see
Example 14 in Chapter 3).
1. 1 : H G is an isomorphism.
2. |G| = |H|.
Proof. Assertions (1) and (2) follow from the fact that is a bijection.
We will prove (3) here and leave the remainder of the theorem to be proved
in the exercises.
(3) Suppose that h1 and h2 are elements of H. Since is onto, there
exist elements g1 , g2 G such that (g1 ) = h1 and (g2 ) = h2 . Therefore,
We are now in a position to characterize all cyclic groups.
Proof. Let G be a cyclic group with infinite order and suppose that a is a
generator of G. Define a map : Z G by : n 7 an . Then
(m + n) = am+n = am an = (m)(n).
144 CHAPTER 9 ISOMORPHISMS
Hence, we can modify our goal of classifying all groups to classifying all
groups up to isomorphism; that is, we will consider two groups to be the
same if they are isomorphic.
Cayleys Theorem
Cayley proved that if G is a group, it is isomorphic to a group of permu-
tations on some set; hence, every group is a permutation group. Cayleys
Theorem is what we call a representation theorem. The aim of represen-
tation theory is to find an isomorphism of some group G that we wish to
study into a group that we know a great deal about, such as a group of
permutations or matrices.
G = {g : g G}.
Also,
e (a) = ea = a
and
(g1 g )(a) = g1 (ga) = g 1 ga = a = e (a).
We can define an isomorphism from G to G by : g 7 g . The group
operation is preserved since
(gh) = gh = g h = (g)(h).
146 CHAPTER 9 ISOMORPHISMS
ga = g a = h a = ha.
Hence, g = h. That is onto follows from the fact that (g) = g for any
g G.
The isomorphism g 7 g is known as the left regular representation
of G.
Historical Note
Arthur Cayley was born in England in 1821, though he spent much of the first
part of his life in Russia, where his father was a merchant. Cayley was educated
at Cambridge, where he took the first Smiths Prize in mathematics. A lawyer
for much of his adult life, he wrote several papers in his early twenties before
entering the legal profession at the age of 25. While practicing law he continued his
mathematical research, writing more than 300 papers during this period of his life.
These included some of his best work. In 1863 he left law to become a professor
at Cambridge. Cayley wrote more than 900 papers in fields such as group theory,
geometry, and linear algebra. His legal knowledge was very valuable to Cambridge;
he participated in the writing of many of the universitys statutes. Cayley was also
one of the people responsible for the admission of women to Cambridge.
Example 8. Consider
Z2 Z2 = {(0, 0), (0, 1), (1, 0), (1, 1)}.
Although Z2 Z2 and Z4 both contain four elements, it is easy to see that
they are not isomorphic since for every element (a, b) in Z2 Z2 , (a, b) +
(a, b) = (0, 0), but Z4 is cyclic.
The group G H is called the external direct product of G and H.
Notice that there is nothing special about the fact that we have used only
two groups to build a new group. The direct product
n
Y
Gi = G1 G2 Gn
i=1
Example 9. The group Zn2 , considered as a set, is just the set of all binary
n-tuples. The group operation is the exclusive or of two binary n-tuples.
For example,
(01011101) + (01001011) = (00010110).
This group is important in coding theory, in cryptography, and in many
areas of computer science.
148 CHAPTER 9 ISOMORPHISMS
Proof. Suppose that m is the least common multiple of r and s and let
n = |(g, h)|. Then
(g, h)m = (g m , hm ) = (eG , eH )
(g n , hn ) = (g, h)n = (eG , eH ).
Hence, n must divide m, and n m. However, by the second equation,
both r and s must divide n; therefore, n is a common multiple of r and s.
Since m is the least common multiple of r and s, m n. Consequently, m
must be equal to n.
Q
Corollary 9.9 Let (g1 , . . . ,Q gn ) Gi . If gi has finite order ri in Gi , then
the order of (g1 , . . . , gn ) in Gi is the least common multiple of r1 , . . . , rn .
Example 10. Let (8, 56) Z12 Z60 . Since gcd(8, 12) = 4, the order of 8
is 12/4 = 3 in Z12 . Similarly, the order of 56 in Z60 is 15. The least common
multiple of 3 and 15 is 15; hence, (8, 56) has order 15 in Z12 Z60 .
Corollary 9.12 If
m = pe11 pekk ,
where the pi s are distinct primes, then
Zm
= Zpe11 Zpek .
k
e
Proof. Since the greatest common divisor of pei i and pj j is 1 for i 6= j, the
proof follows from Corollary 9.11.
In Chapter 13, we will prove that all finite abelian groups are isomorphic
to direct products of the form
Zpe1 Zpek
1 k
G = HK = {hk : h H, k K};
H K = {e};
Example 14. Not every group can be written as the internal direct product
of two of its proper subgroups. If the group S3 were an internal direct
product of its proper subgroups H and K, then one of the subgroups, say H,
would have to have order 3. In this case H is the subgroup {(1), (123), (132)}.
The subgroup K must have order 2, but no matter which subgroup we
choose for K, the condition that hk = kh will never be satisfied for h H
and k K.
Hi hj6=i Hj i = {e};
Exercises
1. Prove that Z
= nZ for n 6= 0.
2. Prove that C is isomorphic to the subgroup of GL2 (R) consisting of matrices
of the form
a b
b a
a b = a + b + ab.
Prove that G is a group under this operation. Show that (G, ) is isomorphic
to the multiplicative group of nonzero real numbers.
152 CHAPTER 9 ISOMORPHISMS
(a) (3, 4) in Z4 Z6
(b) (6, 15, 4) in Z30 Z45 Z24
(c) (5, 10, 15) in Z25 Z25 Z25
(d) (8, 8, 8) in Z10 Z24 Z80
17. Prove that D4 cannot be the internal direct product of two of its proper
subgroups.
18. Prove that the subgroup of Q consisting of elements of the form 2m 3n for
m, n Z is an internal direct product isomorphic to Z Z.
19. Prove that S3 Z2 is isomorphic to D6 . Can you make a conjecture about
D2n ? Prove your conjecture. [Hint: Draw the picture.]
20. Prove or disprove: Every abelian group of order divisible by 3 contains a
subgroup of order 3.
EXERCISES 153
33. Write out the permutations associated with each element of S3 in the proof
of Cayleys Theorem.
34. An automorphism of a group G is an isomorphism with itself. Prove that
complex conjugation is an automorphism of the additive group of complex
numbers; that is, show that the map (a + bi) = a bi is an isomorphism
from C to C.
35. Prove that a + ib 7 a ib is an automorphism of C .
36. Prove that A 7 B 1 AB is an automorphism of SL2 (R) for all B in GL2 (R).
37. We will denote the set of all automorphisms of G by Aut(G). Prove that
Aut(G) is a subgroup of SG , the group of permutations of G.
38. Find Aut(Z6 ).
39. Find Aut(Z).
40. Find two nonisomorphic groups G and H such that Aut(G)
= Aut(H).
41. Let G be a group and g G. Define a map ig : G G by ig (x) = gxg 1 .
Prove that ig defines an automorphism of G. Such an automorphism is called
an inner automorphism. The set of all inner automorphisms is denoted
by Inn(G).
154 CHAPTER 9 ISOMORPHISMS
If H is a subgroup of a group G, then right cosets are not always the same as
left cosets; that is, it is not always the case that gH = Hg for all g G. The
subgroups for which this property holds play a critical role in group theory:
they allow for the construction of a new class of groups, called factor or
quotient groups. Factor groups may be studied by using homomorphisms,
a generalization of isomorphisms.
155
156 CHAPTER 10 NORMAL SUBGROUPS AND FACTOR GROUPS
are
N = {(1), (123), (132)}
(12)N = N (12) = {(12), (13), (23)}.
The following theorem is fundamental to our understanding of normal
subgroups.
2. For all g G, gN g 1 N .
3. For all g G, gN g 1 = N .
Factor Groups
If N is a normal subgroup of a group G, then the cosets of N in G form
a group G/N under the operation (aN )(bN ) = abN . This group is called
the factor or quotient group of G and N . Our first task is to prove that
G/N is indeed a group.
Proof. The group operation on G/N is (aN )(bN ) = abN . This operation
must be shown to be well-defined; that is, group multiplication must be
independent of the choice of coset representative. Let aN = bN and cN =
dN . We must show that
0 + 3Z = {. . . , 3, 0, 3, 6, . . .}
1 + 3Z = {. . . , 2, 1, 4, 7, . . .}
2 + 3Z = {. . . , 1, 2, 5, 8, . . .}.
+ 0 + 3Z 1 + 3Z 2 + 3Z
0 + 3Z 0 + 3Z 1 + 3Z 2 + 3Z
1 + 3Z 1 + 3Z 2 + 3Z 0 + 3Z
2 + 3Z 2 + 3Z 0 + 3Z 1 + 3Z
In general, the subgroup nZ of Z is normal. The cosets of Z/nZ are
nZ
1 + nZ
2 + nZ
..
.
(n 1) + nZ.
rn = id
s2 = id
srs = r1 .
10.2 Simplicity of An
Of special interest are groups with no nontrivial normal subgroups. Such
groups are called simple groups. Of course, we already have a whole
class of examples of simple groups, Zp , where p is prime. These groups are
trivially simple since they have no proper subgroups other than the subgroup
consisting solely of the identity. Other examples of simple groups are not
so easily found. We can, however, show that the alternating group, An , is
simple for n 5. The proof of this result requires several lemmas.
Proof. To show that the 3-cycles generate An , we need only show that
any pair of transpositions can be written as the product of 3-cycles. Since
(ab) = (ba), every pair of transpositions must be one of the following:
(ab)(ab) = id
(ab)(cd) = (acb)(acd)
(ab)(ac) = (acb).
(iaj) = (ija)2
(iab) = (ijb)(ija)2
(jab) = (ijb)2 (ija)
(abc) = (ija)2 (ijc)(ijb)2 (ija).
is a 3-cycle.
(a1 a2 a3 )(a1 a2 a3 )1
1 (a1 a2 a3 )(a1 a2 a3 )1
is also in N . Since
1 (a1 a2 a3 )(a1 a2 a3 )1
= 1 (a1 a2 a3 )(a1 a3 a2 )
= (a1 a2 ar )1 1 (a1 a2 a3 ) (a1 a2 ar )(a1 a3 a2 )
= (a1 ar ar1 a2 )(a1 a2 a3 )(a1 a2 ar )(a1 a3 a2 )
= (a1 a3 ar ),
= (a1 a2 a3 )(a4 a5 a6 ).
Then
1 (a1 a2 a4 )(a1 a2 a4 )1 N
since
(a1 a2 a4 )(a1 a2 a4 )1 N.
So
1 (a1 a2 a4 )(a1 a2 a4 )1
= [ (a1 a2 a3 )(a4 a5 a6 )]1 (a1 a2 a4 ) (a1 a2 a3 )(a4 a5 a6 )(a1 a2 a4 )1
= (a4 a6 a5 )(a1 a3 a2 ) 1 (a1 a2 a4 ) (a1 a2 a3 )(a4 a5 a6 )(a1 a4 a2 )
= (a4 a6 a5 )(a1 a3 a2 )(a1 a2 a4 )(a1 a2 a3 )(a4 a5 a6 )(a1 a4 a2 )
= (a1 a4 a2 a6 a3 ).
10.2 SIMPLICITY OF AN 161
2 = (a1 a2 a3 ) (a1 a2 a3 )
= (a1 a3 a2 ).
So N contains a 3-cycle.
The only remaining possible case is a disjoint product of the form
= (a1 a2 )(a3 a4 ),
1 (a1 a2 a3 )(a1 a2 a3 )1
1 (a1 a2 a3 )(a1 a2 a3 )1
= 1 (a1 a2 )(a3 a4 )(a1 a2 a3 ) (a1 a2 )(a3 a4 )(a1 a2 a3 )1
= (a1 a3 )(a2 a4 ).
and
Historical Note
One of the foremost problems of group theory has been to classify all simple finite
groups. This problem is over a century old and has been solved only in the last
few years. In a sense, finite simple groups are the building blocks of all finite
groups. The first nonabelian simple groups to be discovered were the alternating
groups. Galois was the first to prove that A5 was simple. Later mathematicians,
such as C. Jordan and L. E. Dickson, found several infinite families of matrix
groups that were simple. Other families of simple groups were discovered in the
1950s. At the turn of the century, William Burnside conjectured that all nonabelian
simple groups must have even order. In 1963, W. Feit and J. Thompson proved
Burnsides conjecture and published their results in the paper Solvability of Groups
of Odd Order, which appeared in the Pacific Journal of Mathematics. Their
proof, running over 250 pages, gave impetus to a program in the 1960s and 1970s
to classify all finite simple groups. Daniel Gorenstein was the organizer of this
remarkable effort. One of the last simple groups was the Monster, discovered
by R. Greiss. The Monster, a 196,833 196,833 matrix group, is one of the 26
sporadic, or special, simple groups. These sporadic simple groups are groups that
fit into no infinite family of simple groups.
Exercises
1. For each of the following groups G, determine whether H is a normal sub-
group of G. If H is a normal subgroup, write out a Cayley table for the
factor group G/H.
(a) G = S4 and H = A4
(b) G = A5 and H = {(1), (123), (132)}
(c) G = S4 and H = D4
(d) G = Q8 and H = {1, 1, i, i}
(e) G = Z and H = 5Z
2. Find all the subgroups of D4 . Which subgroups are normal? What are all
the factor groups of D4 up to isomorphism?
3. Find all the subgroups of the quaternion group, Q8 . Which subgroups are
normal? What are all the factor groups of Q8 up to isomorphism?
4. Let T be the group of nonsingular upper triangular 22 matrices with entries
in R; that is, matrices of the form
a b
,
0 c
EXERCISES 163
where x R.
(a) Show that U is a subgroup of T .
(b) Prove that U is abelian.
(c) Prove that U is normal in T .
(d) Show that T /U is abelian.
(e) Is T normal in GL2 (R)?
5. Show that the intersection of two normal subgroups is a normal subgroup.
6. If G is abelian, prove that G/H must also be abelian.
7. Prove or disprove: If H is a normal subgroup of G such that H and G/H
are abelian, then G is abelian.
8. If G is cyclic, prove that G/H must also be cyclic.
9. Prove or disprove: If H and G/H are cyclic, then G is cyclic.
10. Let H be a subgroup of index 2 of a group G. Prove that H must be a normal
subgroup of G. Conclude that Sn is not simple.
11. Let G be a group of order p2 , where p is a prime number. If H is a subgroup
of G of order p, show that H is normal in G. Prove that G must be abelian.
12. If a group G has exactly one subgroup H of order k, prove that H is normal
in G.
13. Define the centralizer of an element g in a group G to be the set
C(g) = {x G : xg = gx}.
15. Let G be a group and let G0 = haba1 b1 i; that is, G0 is the subgroup of all
finite products of elements in G of the form aba1 b1 . The subgroup G0 is
called the commutator subgroup of G.
(a) Show that G0 is a normal subgroup of G.
(b) Let N be a normal subgroup of G. Prove that G/N is abelian if and
only if N contains the commutator subgroup of G.
11
Homomorphisms
(m + n) = g m+n = g m g n = (m)(n).
165
166 CHAPTER 11 HOMOMORPHISMS
Example 3. Recall that the circle group T consists of all complex numbers
z such that |z| = 1. We can define a homomorphism from the additive
group of real numbers R to T by : 7 cos + i sin . Indeed,
( + ) = cos( + ) + i sin( + )
= (cos cos sin sin ) + i(sin cos + cos sin )
= (cos + i sin ) + (cos + i sin )
= ()().
Geometrically, we are simply wrapping the real line around the circle in a
group-theoretic fashion.
The following proposition lists some basic properties of group homomor-
phisms.
Proof. (1) Suppose that e and e0 are the identities of G1 and G2 , respec-
tively; then
e0 (e) = (e) = (ee) = (e)(e).
By cancellation, (e) = e0 .
11.1 GROUP HOMOMORPHISMS 167
(g 1 )(g) = (g 1 g) = (e) = e.
Z7 , there are only two possible kernels, {0} and all of Z7 . The image of
a subgroup of Z7 must be a subgroup of Z12 . Hence, there is no injective
homomorphism; otherwise, Z12 would have a subgroup of order 7, which is
impossible. Consequently, the only possible homomorphism from Z7 to Z12
is the one mapping all elements to zero.
Since (g1 K) = (g2 K), does not depend on the choice of coset represen-
tative. Clearly is onto (G). To show that is one-to-one, suppose that
(g1 K) = (g2 K). Then (g1 ) = (g2 ). This implies that (g11 g2 ) = e,
or g11 g2 is in the kernel of ; hence, g11 g2 K = K; that is, g1 K = g2 K.
Finally, we must show that is a homomorphism, but
Mathematicians often use diagrams called commutative diagrams to
describe such theorems. The following diagram commutes since = .
G H
G/K
(m + n) = g m+n = g m g n = (m)(n).
H/H N
= HN/N.
(hn)1 = n1 h1 = h1 (hn1 h1 ).
G/N
G/H
= .
H/N
Z/mZ
= (Z/mnZ)/(mZ/mnZ).
Exercises
1. Prove that det(AB) = det(A) det(B) for A, B GL2 (R). This shows that
the determinant is a homomorphism from GL2 (R) to R .
172 CHAPTER 11 HOMOMORPHISMS
ig : G G,
3. The set of all inner automorphisms is denoted by Inn(G). Show that Inn(G)
is a subgroup of Aut(G).
4. Find an automorphism of a group G that is not an inner automorphism.
5. Let G be a group and ig be an inner automorphism of G, and define a map
G Aut(G)
by
g 7 ig .
Prove that this map is a homomorphism with image Inn(G) and kernel Z(G).
Use this result to conclude that
G/Z(G)
= Inn(G).
175
176 CHAPTER 12 MATRIX GROUPS AND SYMMETRY
where
x1
x2
x = . .
..
xn
We will often abbreviate the matrix A by writing (aij ).
Conversely, if T : Rn Rm is a linear map, we can associate a matrix
A with T by considering what T does to the vectors
e1 = (1, 0, . . . , 0)t
e2 = (0, 1, . . . , 0)t
..
.
en = (0, 0, . . . , 1)t .
x1 e1 + x2 e2 + + xn en .
Consequently, if
then
T (x) = T (x1 e1 + x2 e2 + + xn en )
= x1 T (e1 ) + x2 T (e2 ) + + xn T (en )
n n
!t
X X
= a1k xk , . . . , amk xk
k=1 k=1
= Ax.
y y
(1, 1)
(0, 1)
(1, 0) x (1, 0) x
180 CHAPTER 12 MATRIX GROUPS AND SYMMETRY
There is a more geometric way of viewing the group O(n). The orthog-
onal matrices are exactly those matrices that preserve the length of vectors.
We can define the length of a vector using the Euclidean inner product,
or dot product, of two vectors. The Euclidean inner product of two vectors
x = (x1 , . . . , xn )t and y = (y1 , . . . , yn )t is
y1
y2
hx, yi = xt y = (x1 , x2 , . . . , xn ) . = x1 y1 + + xn yn .
..
yn
Associated with the notion of the length of a vector is the idea of the distance
between two vectors. We define the distance between two vectors x and y
to be kx yk. We leave as an exercise the proof of the following proposition
about the properties of Euclidean inner products.
Example 5. The vector x = (3, 4)t has length 32 + 42 = 5. We can also
see that the orthogonal matrix
3/5 4/5
A=
4/5 3/5
preserves the length of this vector. The vector Ax = (7/5, 24/5)t also has
length 5.
12.1 MATRIX GROUPS 181
2. A1 = At .
y y
(sin , cos )
(cos , sin )
(a, b)
x x
(a, b)
(0, 1)t . If T (e1 ) = (a, b)t , then a2 + b2 = 1 and T (e2 ) = (b, a)t . Hence, T
can be represented by
a b cos sin
A= = ,
b a sin cos
where 0 < 2. A matrix T in O(2) either reflects or rotates a vector in
R2 (Figure 12.2). A reflection is given by the matrix
1 0
,
0 1
whereas a rotation by an angle in a counterclockwise direction must come
from a matrix of the form
cos sin
.
sin cos
If det A = 1, then A gives a reflection.
Two of the other matrix or matrix-related groups that we will consider
are the special orthogonal group and the group of Euclidean motions. The
special orthogonal group, SO(n), is just the intersection of O(n) and
SLn (R); that is, those elements in O(n) with determinant one. The Eu-
clidean group, E(n), can be written as ordered pairs (A, x), where A is in
O(n) and x is in Rn . We define multiplication by
(A, x)(B, y) = (AB, Ay + x).
The identity of the group is (I, 0); the inverse of (A, x) is (A1 , A1 x). In
Exercise 6, you are asked to check that E(n) is indeed a group under this
operation.
184 CHAPTER 12 MATRIX GROUPS AND SYMMETRY
y y
x+y
x x
12.2 Symmetry
An isometry or rigid motion in Rn is a distance-preserving function f
from Rn to Rn . This means that f must satisfy
kf (x) f (y)k = kx yk
y y
x x
T (x)
kxk2 2hf (x), f (y)i + kyk2 = kf (x)k2 2hf (x), f (y)i + kf (y)k2
= hf (x) f (y), f (x) f (y)i
= kf (x) f (y)k2
= kx yk2
= hx y, x yi
= kxk2 2hx, yi + kyk2 .
Consequently,
hf (x), f (y)i = hx, yi.
Now let e1 and e2 be (1, 0)t and (0, 1)t , respectively. If
x = (x1 , x2 ) = x1 e1 + x2 e2 ,
then
f (x) = hf (x), f (e1 )if (e1 ) + hf (x), f (e2 )if (e2 ) = x1 f (e1 ) + x2 f (e2 ).
f (y) = Ay + x1
g(y) = By + x2 ,
their composition is
R , . . . , Rn1 , T R , . . . , T Rn1 .
T R T = R1 .
(1, 1) (1, 1)
(2, 0)
(1, 1)
Notice that a lattice can have several bases. For example, the vectors
(1, 1)t and (2, 0)t have the same lattice as the vectors (1, 1)t and (1, 1)t
(Figure 12.7). However, any lattice is completely determined by a basis.
Given two bases for the same lattice, say {x1 , x2 } and {y1 , y2 }, we can
12.2 SYMMETRY 189
write
y1 = 1 x1 + 2 x2
y2 = 1 x1 + 2 x2 ,
where 1 , 2 , 1 , and 2 are integers. The matrix corresponding to this
transformation is
1 2
U= .
1 2
If we wish to give x1 and x2 in terms of y1 and y2 , we need only calculate
U 1 ; that is,
1 y1 x1
U = .
y2 x2
Since U has integer entries, U 1 must also have integer entries; hence the
determinants of both U and U 1 must be integers. Because U U 1 = I,
det(U U 1 ) = det(U ) det(U 1 ) = 1;
consequently, det(U ) = 1. A matrix with determinant 1 and integer
entries is called unimodular. For example, the matrix
3 1
5 2
is unimodular. It should be clear that there is a minimum length for vectors
in a lattice.
We can classify lattices by studying their symmetry groups. The sym-
metry group of a lattice is the subgroup of E(2) that maps the lattice to
itself. We consider two lattices in R2 to be equivalent if they have the same
symmetry group. Similarly, classification of crystals in R3 is accomplished
by associating a symmetry group, called a space group, with each type of
crystal. Two lattices are considered different if their space groups are not
the same. The natural question that now arises is how many space groups
exist.
A space group is composed of two parts: a translation subgroup and
a point group. The translation subgroup is an infinite abelian subgroup
of the space group made up of the translational symmetries of the crystal;
the point group is a finite group consisting of rotations and reflections of
the crystal about a point. More specifically, a space group is a subgroup of
G E(2) whose translations are a set of the form {(I, t) : t L}, where L is
a lattice. Space groups are, of course, infinite. Using geometric arguments,
we can prove the following theorem (see [5] or [6]).
190 CHAPTER 12 MATRIX GROUPS AND SYMMETRY
Rectangular
Square Rhombic
Parallelogram
Hexagonal
To answer the question of how the point groups and the translation
groups can be combined, we must look at the different types of lattices.
Lattices can be classified by the structure of a single lattice cell. The possible
cell shapes are parallelogram, rectangular, square, rhombic, and hexagonal
(Figure 12.8). The wallpaper groups can now be classified according to the
types of reflections that occur in each group: these are ordinarily reflections,
glide reflections, both, or none.
Historical Note
p4m p4g
Exercises
1. Prove the identity
1
kx + yk2 kxk2 kyk2 .
hx, yi =
2
(a) (b)
1/2 1/ 2 1/ 5 2/5
1/ 2 1/ 2 2/ 5 1/ 5
EXERCISES 193
(c) (d)
4/ 5 0 3/5 1/3 2/3 2/3
3/ 5 0 4/ 5 2/3 2/3 1/3
0 1 0 2/3 1/3 2/3
(a)
(c)
(b)
Figure 12.10.
Figure 12.11.
17. Determine which of the 17 wallpaper groups preserves the symmetry of the
pattern in Figure 12.11.
18. Find the rotation group of a dodecahedron.
19. For each of the 17 wallpaper groups, draw a wallpaper pattern having that
group as a symmetry group.
EXERCISES 195
G = Hn Hn1 H1 H0 = {e},
where each subgroup Hi is normal in Hi+1 and each of the factor groups
Hi+1 /Hi is abelian, then G is a solvable group. In addition to allowing us
to distinguish between certain classes of groups, solvable groups turn out to
be central to the study of solutions to polynomial equations.
196
13.1 FINITE ABELIAN GROUPS 197
Example 1. Obviously, all finite groups are finitely generated. For example,
the group S3 is generated by the permutations (12) and (123). The group
Z Zn is an infinite group but is finitely generated by {(1, 0), (0, 1)}.
Example 2. Not all groups are finitely generated. Consider the rational
numbers Q under the operation of addition. Suppose that Q is finitely
generated with generators p1 /q1 , . . . , pn /qn , where each pi /qi is a fraction
expressed in its lowest terms. Let p be some prime that does not divide
any of the denominators q1 , . . . , qn . We claim that 1/p cannot be in the
subgroup of Q that is generated by p1 /q1 , . . . , pn /qn , since p does not divide
the denominator of any element in this subgroup. This fact is easy to see
since the sum of any two generators is
h = gi11 ginn ,
The reason that powers of a fixed gi may occur several times in the
product is that we may have a nonabelian group. However, if the group is
abelian, then the gi s need occur only once. For example, a product such as
a3 b5 a7 could always be simplified (in this case, to a4 b5 ).
Proof. Let K be the set of all products of the form gi11 ginn , where the
gik s are not necessarily distinct. Certainly K is a subset of H. We need
only show that K is a subgroup of G. If this is the case, then K = H, since
H is the smallest subgroup containing all the gi s.
198 CHAPTER 13 THE STRUCTURE OF GROUPS
Clearly, the set K is closed under the group operation. Since gi0 = 1,
the identity is in K. It remains to show that the inverse of an element
g = g1k1 giknn in K must also be in K. However,
Now let us restrict our attention to finite abelian groups. We can express
any finite abelian group as a finite direct product of cyclic groups. More
specifically, letting p be prime, we define a group G to be a p-group if every
element in G has as its order a power of p. For example, both Z2 Z2 and
Z4 are 2-groups, whereas Z27 is a 3-group. We shall prove that every finite
abelian group is isomorphic to a direct product of cyclic p-groups. Before we
state the main theorem concerning finite abelian groups, we shall consider
a special case.
Proof. If |G| = 1, then the theorem is trivial. Suppose that the order of
G is greater than 1, say
|G| = p1 1 pnn ,
where p1 , . . . , pn are all prime, and define Gi to be the set of elements in G of
order pki for some integer k. Since G is an abelian group, we are guaranteed
that Gi is a subgroup of G for i = 1, . . . , n. We must show that
G = G 1 Gn .
That is, we must be able to write every g G as a unique product gp1 gpn
where gpi is of the order of some power of pi . Since the order of g divides
the order of G, we know that
|g| = p1 1 p2 2 pnn
The order of gi h1 1 1
i is a power of pi ; hence, the order of g1 h1 gn hn is the
1
least common multiple of the orders of the gi hi . This must be 1, since the
order of the identity is 1. Therefore, |gi h1
i | = 1 or gi = hi for i = 1, . . . , n.
We shall now state the Fundamental Theorem of Finite Abelian Groups.
Z2 Z2 Z3 Z3 Z3 Z5 ;
Z2 Z2 Z3 Z9 Z5 ;
Z2 Z2 Z27 Z5 ;
Z4 Z3 Z3 Z3 Z5 ;
Z4 Z3 Z9 Z5 ;
Z4 Z27 Z5 .
The proof of the Fundamental Theorem relies on the following lemma.
Lemma 13.4 Let G be a finite abelian p-group and suppose that g G has
maximal order. Then G can be written as hgiH for some subgroup H of G.
200 CHAPTER 13 THE STRUCTURE OF GROUPS
and the order of g r must be less than or equal to pm1 . Therefore, g r cannot
generate hgi. Notice that p must occur as a factor of r, say r = ps, and
hp = g r = g ps . Define a to be g s h. Then a cannot be in hgi; otherwise, h
would also have to be in hgi. Also,
ap = g sp hp = g r hp = hp hp = e.
We have now formed an element a with order p such that a / hgi. Since h
was chosen to have the smallest order of all of the elements that are not in
hgi, |H| = p.
Now we will show that the order of gH in the factor group G/H must
be the same as the order of g in G. If |gH| < |g| = pm , then
m1 m1
H = (gH)p = gp H;
m1
hence, g p must be in hgi H = {e}, which contradicts the fact that the
order of g is pm . Therefore, gH must have maximal order in G/H. By the
Correspondence Theorem and our induction hypothesis,
G/H
= hgHi K/H
We now state the more general theorem for all finitely generated abelian
groups. The proof of this theorem can be found in any of the references at
the end of this chapter.
G = Hn Hn1 H1 H0 = {e},
The correct way to study a subnormal or normal series of subgroups,
{Hi } of G, is actually to study the factor groups Hi+1 /Hi . We say that two
subnormal (normal) series {Hi } and {Kj } of a group G are isomorphic if
there is a one-to-one correspondence between the collections of factor groups
{Hi+1 /Hi } and {Kj+1 /Kj }.
Z60 /h3i
= h20i/{0}
= Z3
h3i/h15i = h4i/h20i
= Z5
h15i/{0}
= Z60 /h4i
= Z4 .
A subnormal series {Hi } of a group G is a composition series if all the
factor groups are simple; that is, if none of the factor groups of the series
contains a normal subgroup. A normal series {Hi } of G is a principal
series if all the factor groups are simple.
Z60 /h3i
= Z3
h3i/h15i = Z5
h15i/h30i
= Z2
h30i/{0}
= Z2 .
13.2 SOLVABLE GROUPS 203
Sn An {(1)}
Example 10. Not every group has a composition series or a principal series.
Suppose that
{0} = H0 H1 Hn1 Hn = Z
G = Hn Hn1 H1 H0 = {e}
G = Km Km1 K1 K0 = {e}
204 CHAPTER 13 THE STRUCTURE OF GROUPS
be two composition series for G. We can form two new subnormal series for
G since Hi Km1 is normal in Hi+1 Km1 and Kj Hn1 is normal in
Kj+1 Hn1 :
we have a composition series for Hn1 . Our induction hypothesis says that
this series must be equivalent to the composition series
Hn1 H1 H0 = {e}.
G = Hn Hn1 H1 H0 = {e}
and
are equivalent. If Hn1 = Km1 , then the composition series {Hi } and {Kj }
are equivalent and we are done; otherwise, Hn1 Km1 is a normal subgroup
of G properly containing Hn1 . In this case Hn1 Km1 = G and we can
apply the Second Isomorphism Theorem once again; that is,
Therefore,
and
Sn An {(1)}
Exercises
1. Find all of the abelian groups of order less than or equal to 40 up to isomor-
phism.
2. Find all of the abelian groups of order 200 up to isomorphism.
3. Find all of the abelian groups of order 720 up to isomorphism.
4. Find all of the composition series for each of the following groups.
G = Pn Pn1 P1 P0 = {e}
21. Suppose that G is a solvable group with order n 2. Show that G contains
a normal nontrivial abelian factor group.
22. Zassenhaus Lemma. Let H and K be subgroups of a group G. Suppose
also that H and K are normal subgroups of H and K respectively. Then
(a) H (H K ) is a normal subgroup of H (H K).
(b) K (H K) is a normal subgroup of K (H K).
(c) H (H K)/H (H K )
= K (H K)/K (H K)
(H K)/(H K)(H K ).
=
[Hint: Use the diagram in Figure 13.1. The Zassenhaus Lemma is often
referred to as the Butterfly Lemma because of this diagram.]
H K
H K
H (H K) K (H K)
H (H K ) K (H K)
H K
(H K)(H K )
H K H K
23. Schreiers Theorem. Use the Zassenhaus Lemma to prove that two sub-
normal (normal) series of a group G have isomorphic refinements.
24. Use Schreiers Theorem to prove the Jordan-Holder Theorem.
Programming Exercises
Write a program that will compute all possible abelian groups of order n. What is
the largest n for which your program will work?
208 CHAPTER 13 THE STRUCTURE OF GROUPS
1. ex = x for all x X;
209
210 CHAPTER 14 GROUP ACTIONS
(, x) 7 (x)
for G and x X.
e x = e x = ex = x
(gh) x = gh x = g h x = g (hx) = g (h x).
(h1 h2 , g) = h1 h2 g(h1 h2 )1
= h1 (h2 gh1 1
2 )h1
= (h1 , (h2 , g)),
Again, it is easy to see that the first axiom is true. Since (gg 0 )xH = g(g 0 xH),
the second axiom is also true.
If G acts on a set X and x, y X, then x is said to be G-equivalent to
y if there exists a g G such that gx = y. We write x G y or x y if two
elements are G-equivalent.
Proof. Clearly, e Gx since the identity fixes every element in the set X.
Let g, h Gx . Then gx = x and hx = x. So (gh)x = g(hx) = gx = x;
hence, the product of two elements in Gx is also in Gx . Finally, if g Gx ,
then x = ex = (g 1 g)x = (g 1 )gx = g 1 x. So g 1 is in Gx .
We will denote the number of elements in the fixed point set of an element
g G by |Xg | and denote the number of elements in the orbit of x of x X
by |Ox |. The next theorem demonstrates the relationship between orbits of
an element x X and the left cosets of Gx in G.
consequently, the map is one-to-one. Finally, we must show that the map
is onto. Let gGx be a left coset. If gx = y, then (y) = gGx .
is the set of points that are fixed by conjugation. The nontrivial orbits of
the action are called the conjugacy classes of G. If x1 , . . . , xk are repre-
sentatives from each of the nontrivial conjugacy classes of G and |Ox1 | =
n1 , . . . , |Oxk | = nk , then
|G| = |Z(G)| + n1 + + nk .
One of the consequences of the class equation is that the order of each
conjugacy class must divide the order of |G|.
Example 10. For Sn it takes a bit of work to find the conjugacy classes. We
begin with cycles. Suppose that = (a1 , . . . , ak ) is a cycle and let Sn .
By Theorem 6.9,
1 = ( (a1 ), . . . , (ak )).
Consequently, any two cycles of the same length are conjugate. Now let
= 1 2 r be a cycle decomposition, where the length of each cycle i
is ri . Then is conjugate to every other Sn whose cycle decomposition
has the same lengths.
The number of conjugate classes in Sn is the number of ways in which
n can be partitioned into sums of positive integers. For example, we can
partition the integer 3 into the following three sums:
3=1+1+1
3=1+2
3 = 3;
therefore, there are three conjugacy classes. The problem of finding the
number of such partitions for any positive integer n is what computer scien-
tists call NP-complete. This effectively means that the problem cannot be
solved for a large n because the computations would be too time-consuming
for even the largest computer.
|G| = |Z(G)| + n1 + + nk .
Since each ni > 1 and ni | G, p must divide each ni . Also, p | |G|; hence, p
must divide |Z(G)|. Since the identity is always in the center of G, |Z(G)|
1. Therefore, |Z(G)| p and there exists some g Z(G) such that g 6= 1.
14.3 BURNSIDES COUNTING THEOREM 215
B W W B
W W W W
W W W W
B W W B
gag 1 y = ga g 1 y = ga x = g x = y,
Suppose that (a) = (b). Then gag 1 = gbg 1 or a = b; hence, the map is
injective. To show that is onto, let b be in Gy ; then g 1 bg is in Gx since
g 1 bg x = g 1 b gx = g 1 b y = g 1 y = x;
and (g 1 bg) = b.
Proof. We look at all the fixed points x of all the elements in g G; that
is, we look at all gs and all xs such that gx = x. If viewed in terms of fixed
point sets, the number of all gs fixing xs is
X
|Xg |.
gG
P P
hence, gG |Xg | = xX |Gx |. By Lemma 14.6,
X
|Gy | = |Ox | |Gx |.
yOx
X(1) = X
X(13) = {2, 4, 5}
X(13)(25) = {4}
X(25) = {1, 3, 4}.
A Geometric Example
Before we apply Burnsides Theorem to switching-theory problems, let us
examine the number of ways in which the vertices of a square can be colored
black or white. Notice that we can sometimes obtain equivalent colorings
by simply applying a rigid motion to the square. For instance, as we have
pointed out, if we color one of the vertices black and the remaining three
white, it does not matter which vertex was colored black since a rotation
will give an equivalent coloring.
The symmetry group of a square, D4 , is given by the following permu-
tations:
(1) (13) (24) (1432)
(1234) (12)(34) (14)(23) (13)(24)
218 CHAPTER 14 GROUP ACTIONS
The group G acts on the set of vertices {1, 2, 3, 4} in the usual manner. We
can describe the different colorings by mappings from X into Y = {B, W }
where B and W represent the colors black and white, respectively. Each map
f : X Y describes a way to color the corners of the square. Every D4
induces a permutation e of the possible colorings given by e(f ) = f for
f : X Y . For example, suppose that f is defined by
f (1) = B
f (2) = W
f (3) = W
f (4) = W
and = (12)(34). Then e(f ) = f sends vertex 2 to B and the remaining
vertices to W . The set of all such e is a permutation group G e on the set
of possible colorings. Let X denote the set of all possible colorings; that is,
e
Xe is the set of all possible maps from X to Y . Now we must compute the
number of G-equivalence
e classes.
1. X e(1) = Xe since the identity fixes every possible coloring. |X| e =
24 = 16.
2. Xe(1234) consists of all f X
e such that f is unchanged by the permuta-
tion (1234). In this case f (1) = f (2) = f (3) = f (4), so that all values
of f must be the same; that is, either f (x) = B or f (x) = W for every
vertex x of the square. So |X e(1234) | = 2.
3. |X
e(1432) | = 2.
e(13)(24) | = 22 = 4.
e(13)(24) , f (1) = f (3) and f (2) = f (4). Thus, |X
4. For X
5. |X
e(12)(34) | = 4.
6. |X
e(14)(23) | = 4.
7. For X
e(13) , f (1) = f (3) and the other corners can be of any color;
e(13) | = 23 = 8.
hence, |X
8. |X
e(24) | = 8.
By Burnsides Theorem, we can conclude that there are exactly
1 4
(2 + 21 + 22 + 21 + 22 + 22 + 23 + 23 ) = 6
8
ways to color the vertices of the square.
14.3 BURNSIDES COUNTING THEOREM 219
Example 13. Suppose that we wish to color the vertices of a square using
four different colors. By Proposition 12.8, we can immediately decide that
there are
1 4
(4 + 41 + 42 + 41 + 42 + 42 + 43 + 43 ) = 55
8
possible ways.
x1
x2
.. f f (x1 , x2 , . . . , xn )
.
xn
Switching Functions
In switching theory we are concerned with the design of electronic circuits
with binary inputs and outputs. The simplest of these circuits is a switching
function that has n inputs and a single output (Figure 14.2). Large electronic
circuits can often be constructed by combining smaller modules of this kind.
The inherent problem here is that even for a simple circuit a large number
of different switching functions can be constructed. With only four inputs
and a single output, we can construct 65, 536 different switching functions.
However, we can often replace one switching function with another merely
by permuting the input leads to the circuit (Figure 14.3).
a a
f f (a, b) f f (b, a) = g(a, b)
b b
(0, 0, 0) 7 (0, 0, 0)
(0, 0, 1) 7 (0, 1, 0)
(0, 1, 0) 7 (1, 0, 0)
..
.
(1, 1, 0) 7 (1, 0, 1)
(1, 1, 1) 7 (1, 1, 1).
222 CHAPTER 14 GROUP ACTIONS
Historical Note
EXERCISES 223
G = Hn Hn1 H1 H0 = {e}
such that Hi is normal in Hi+1 and Hi+1 /Hi is abelian. This conjecture was finally
proven by W. Feit and J. Thompson in 1963. Burnsides The Theory of Groups
of Finite Order, published in 1897, was one of the first books to treat groups in a
modern context as opposed to permutation groups. The second edition, published
in 1911, is still a classic.
Exercises
1. Examples 15 in the first section each describe an action of a group G on a set
X, which will give rise to the equivalence relation defined by G-equivalence.
For each example, compute the equivalence classes of the equivalence relation,
the G-equivalence classes .
2. Compute all Xg and all Gx for each of the following permutation groups.
(a) X = {1, 2, 3},
G = S3 = {(1), (12), (13), (23), (123), (132)}
(b) X = {1, 2, 3, 4, 5, 6},
G = {(1), (12), (345), (354), (12)(345), (12)(354)}
3. Compute the G-equivalence classes of X for each of the G-sets in Exercise 2.
For each x X verify that |G| = |Ox | |Gx |.
4. Let G be the additive group of real numbers. Let the action of G on
the real plane R2 be given by rotating the plane counterclockwise about the
origin through radians. Let P be a point on the plane other than the origin.
(a) Show that R2 is a G-set.
(b) Describe geometrically the orbit containing P .
(c) Find the group GP .
5. Let G = A4 and suppose that G acts on itself by conjugation; that is,
(g, h) 7 ghg 1 .
(a) Determine the conjugacy classes (orbits) of each element of G.
224 CHAPTER 14 GROUP ACTIONS
(a) S4 (c) Z9
(b) D5 (d) Q8
17. How many equivalence classes of switching functions are there if the input
variables x1 , x2 , and x3 can be permuted by any permutation in S3 ? What if
the input variables x1 , x2 , x3 , and x4 can be permuted by any permutation
in S4 ?
EXERCISES 225
H H
H H
18. How many equivalence classes of switching functions are there if the input
variables x1 , x2 , x3 , and x4 can be permuted by any permutation in the
subgroup of S4 generated by the permutation (x1 x2 x3 x4 )?
19. A striped necktie has 12 bands of color. Each band can be colored by one of
four possible colors. How many possible different-colored neckties are there?
20. A group acts faithfully on a G-set X if the identity is the only element of
G that leaves every element of X fixed. Show that G acts faithfully on X
if and only if no two distinct elements of G have the same action on each
element of X.
21. Let p be prime. Show that the number of different abelian groups of order pn
(up to isomorphism) is the same as the number of conjugacy classes in Sn .
22. Let a G. Show that for any g G, gC(a)g 1 = C(gag 1 ).
23. Let |G| = pn and suppose that |Z(G)| = pn1 for p prime. Prove that G is
abelian.
24. Let G be a group with order pn where p is prime and X a finite G-set. If
XG = {x X : gx = x for all g G} is the set of elements in X fixed by the
group action, then prove that |X| |XG | (mod p).
Programming Exercise
Write a program to compute the number of conjugacy classes in Sn . What is the
largest n for which your program will work?
226 CHAPTER 14 GROUP ACTIONS
Theorem 15.1 (Cauchy) Let G be a finite group and p a prime such that
p divides the order of G. Then G contains a subgroup of order p.
227
228 CHAPTER 15 THE SYLOW THEOREMS
Hence, we may assume that p divides [G : C(xi )] for all i. Since p divides
|G|, the class equation says that p must divide |Z(G)|; hence, by Cauchys
Theorem, Z(G) has an element of order p, say g. Let N be the group
generated by g. Clearly, N is a normal subgroup of Z(G) since Z(G) is
abelian; therefore, N is normal in G since every element in Z(G) commutes
with every element in G. Now consider the factor group G/N of order |G|/p.
By the induction hypothesis, G/N contains a subgroup H of order pr1 . The
inverse image of H under the canonical homomorphism : G G/N is a
subgroup of order pr in G.
A Sylow p-subgroup P of a group G is a maximal p-subgroup of G.
To prove the other two Sylow Theorems, we need to consider conjugate
subgroups as opposed to conjugate elements in a group. For a group G, let
S be the collection of all subgroups of G. For any subgroup H, S is a H-set,
where H acts on S by conjugation. That is, we have an action
H S S
defined by
h K 7 hKh1
for K in S.
The set
N (H) = {g G : gHg 1 = H}
is a subgroup of G. Notice that H is a normal subgroup of N (H). In fact,
N (H) is the largest subgroup of G in which H is normal. We call N (H) the
normalizer of H in G.
|G| = pr m = |N (P )| [G : N (P )] = |N (P )| k.
Theorem 15.7 (Third Sylow Theorem) Let G be a finite group and let
p be a prime dividing the order of G. Then the number of Sylow p-subgroups
is congruent to 1 (mod p) and divides |G|.
P = {P = P1 , P2 , . . . , Pk },
by conjugation. From the proof of the Second Sylow Theorem, the only
P -conjugate of P is itself and the order of the other P -conjugacy classes is a
15.2 EXAMPLES AND APPLICATIONS 231
Historical Note
Peter Ludvig Mejdell Sylow was born in 1832 in Christiania, Norway (now Oslo).
After attending Christiania University, Sylow taught high school. In 1862 he ob-
tained a temporary appointment at Christiania University. Even though his ap-
pointment was relatively brief, he influenced students such as Sophus Lie (1842
1899). Sylow had a chance at a permanent chair in 1869, but failed to obtain the
appointment. In 1872, he published a 10-page paper presenting the theorems that
now bear his name. Later Lie and Sylow collaborated on a new edition of Abels
works. In 1898, a chair at Christiania University was finally created for Sylow
through the efforts of his student and colleague Lie. Sylow died in 1918.
Theorem 15.8 If p and q are distinct primes with p < q, then every group
G of order pq has a single subgroup of order q and this subgroup is normal
in G. Hence, G cannot be simple. Furthermore, if q 6 1 (mod p), then G
is cyclic.
dividing 56, then this must be a normal subgroup and we are done. By the
Third Sylow Theorem, there are either one or eight Sylow 7-subgroups. If
there is only a single Sylow 7-subgroup, then it must be normal.
On the other hand, suppose that there are eight Sylow 7-subgroups.
Then each of these subgroups must be cyclic; hence, the intersection of any
two of these subgroups contains only the identity of the group. This leaves
8 6 = 48 distinct elements in the group, each of order 7. Now let us count
Sylow 2-subgroups. There are either one or seven Sylow 2-subgroups. Any
element of a Sylow 2-subgroup other than the identity must have as its order
a power of 2; and therefore cannot be one of the 48 elements of order 7 in
the Sylow 7-subgroups. Since a Sylow 2-subgroup has order 8, there is only
enough room for a single Sylow 2-subgroup in a group of order 56. If there
is only one Sylow 2-subgroup, it must be normal.
For other groups G it is more difficult to prove that G is not simple.
Suppose G has order 48. In this case the technique that we employed in the
last example will not work. We need the following lemma to prove that no
group of order 48 is simple.
|H| |K|
|HK| = .
|H K|
HK = {hk : h H, k K}.
a = (h1 )1 h2 = k1 (k2 )1 .
h2 = h1 a1
k2 = ak1 .
The proof of this theorem laid the groundwork for a program in the
1960s and 1970s that classified all finite simple groups. The success of this
program is one of the outstanding achievements of modern mathematics.
Exercises
1. What are the orders of all Sylow p-subgroups where G has order 18, 24, 54,
72, and 80?
2. Find all the Sylow 3-subgroups of S4 and show that they are all conjugate.
3. Show that every group of order 45 has a normal subgroup of order 9.
4. Let H be a Sylow p-subgroup of G. Prove that H is the only Sylow p-subgroup
of G contained in N (H).
5. Prove that no group of order 96 is simple.
6. Prove that no group of order 160 is simple.
236 CHAPTER 15 THE SYLOW THEOREMS
(b) Let S denote the set of all pk element subsets of G. Show that p does
not divide |S|.
(c) Define an action of G on S by left multiplication, aT = {at : t T } for
a G and T S. Prove that this is a group action.
(d) Prove p6 ||OT | for some T S.
(e) Let {T1 , . . . , Tu } be an orbit such that p6 |u and H = {g G : gT1 = T1 }.
Prove that H is a subgroup of G and show that |G| = u|H|.
(f) Show that pk divides |H| and pk |H|.
(g) Show that |H| = |OT | pk ; conclude that therefore pk = |H|.
26. Let G be a group. Prove that G0 = haba1 b1 : a, b Gi is a normal subgroup
of G and G/G0 is abelian. Find an example to show that {aba1 b1 : a, b
G} is not necessarily a group.
A Project
The main objective of finite group theory is to classify all possible finite groups up
to isomorphism. This problem is very difficult even if we try to classify the groups
238 CHAPTER 15 THE SYLOW THEOREMS
of order less than or equal to 60. However, we can break the problem down into
several intermediate problems.
1. Find all simple groups G ( |G| 60). Do not use the Odd Order Theorem
unless you are prepared to prove it.
2. Find the number of distinct groups G, where the order of G is n for n =
1, . . . , 60.
3. Find the actual groups (up to isomorphism) for each n.
This is a challenging project that requires a working knowledge of the group theory
you have learned up to this point. Even if you do not complete it, it will teach you
a great deal about finite groups. You can use Table 15.2 as a guide.
Up to this point we have studied sets with a single binary operation satis-
fying certain axioms, but often we are more interested in working with sets
that have two binary operations. For example, one of the most natural alge-
braic structures to study is the integers with the operations of addition and
multiplication. These operations are related to one another by the distribu-
tive property. If we consider a set with two such related binary operations
satisfying certain axioms, we have an algebraic structure called a ring. In a
ring we add and multiply such elements as real numbers, complex numbers,
matrices, and functions.
16.1 Rings
A nonempty set R is a ring if it has two closed binary operations, addition
and multiplication, satisfying the following conditions.
1. a + b = b + a for a, b R.
2. (a + b) + c = a + (b + c) for a, b, c R.
6. For a, b, c R,
a(b + c) = ab + ac
(a + b)c = ac + bc.
239
240 CHAPTER 16 RINGS
This last condition, the distributive axiom, relates the binary operations of
addition and multiplication. Notice that the first four axioms simply require
that a ring be an abelian group under addition, so we could also have defined
a ring to be an abelian group (R, +) together with a second binary operation
satisfying the fifth and sixth conditions given above.
If there is an element 1 R such that 1 6= 0 and 1a = a1 = a for
each element a R, we say that R is a ring with unity or identity . A
ring R for which ab = ba for all a, b in R is called a commutative ring.
A commutative ring R with identity is called an integral domain if, for
every a, b R such that ab = 0, either a = 0 or b = 0. A division ring
is a ring R, with an identity, in which every nonzero element in R is a
unit; that is, for each a R with a 6= 0, there exists a unique element a1
such that a1 a = aa1 = 1. A commutative division ring is called a field.
The relationship among rings, integral domains, division rings, and fields is
shown in Figure 16.1.
Rings
Integral Division
Domains Rings
Fields
(a1 + b1 i + c1 j + d1 k) + (a2 + b2 i + c2 j + d2 k)
= (a1 + a2 ) + (b1 + b2 )i + (c1 + c2 )j + (d1 + d2 )k
and
(a1 + b1 i + c1 j + d1 k)(a2 + b2 i + c2 j + d2 k) = + i + j + k,
where
= a1 a2 b1 b2 c1 c2 d1 d2
= a1 b2 + a1 b1 + c1 d2 d1 c2
= a1 c2 b1 d2 + c1 a2 d1 b2
= a1 d2 + b1 c2 c1 b2 d1 a2 .
(a + bi + cj + dk)(a bi cj dk) = a2 + b2 + c2 + d2 .
1. a0 = 0a = 0;
3. (a)(b) = ab.
16.1 RINGS 243
1 = = (a2 + b2 )(c2 + d2 ).
2. (0) = 0.
Example 15. Every ring R has at least two ideals, {0} and R. These ideals
are called the trivial ideals.
Let R be a ring with identity and suppose that I is an ideal in R such
that 1 is in R. Since for any r R, r1 = r I by the definition of an ideal,
I = R.
Proof. The zero ideal {0} is a principal ideal since h0i = {0}. If I is any
nonzero ideal in Z, then I must contain some positive integer m. There
exists at least one such positive integer n in I by the Principle of Well-
Ordering. Now let a be any element in I. Using the division algorithm, we
know that there exist integers q and r such that
a = nq + r
and
(ra) = (r)(a) = (r)0 = 0.
Remark. In our definition of an ideal we have required that rI I and
Ir I for all r R. Such ideals are sometimes referred to as two-sided
ideals. We can also consider one-sided ideals; that is, we may require
only that either rI I or Ir I for r R hold but not both. Such
ideals are called left ideals and right ideals, respectively. Of course,
in a commutative ring any ideal must be two-sided. In this text we will
concentrate on two-sided ideals.
Theorem 16.9 Let I be an ideal of R. The factor group R/I is a ring with
multiplication defined by
(r + I)(s + I) = rs + I.
16.3 RING HOMOMORPHISMS AND IDEALS 249
Proof. We already know that R/I is an abelian group under addition. Let
r + I and s + I be in R/I. We must show that the product (r + I)(s + I) =
rs+I is independent of the choice of coset; that is, if r0 r +I and s0 s+I,
then r0 s0 must be in rs + I. Since r0 r + I, there exists an element a in
I such that r0 = r + a. Similarly, there exists a b I such that s0 = s + b.
Notice that
r0 s0 = (r + a)(s + b) = rs + as + rb + ab
and as + rb + ab I since I is an ideal; consequently, r0 s0 rs + I. We will
leave as an exercise the verification of the associative law for multiplication
and the distributive laws.
The ring R/I in Theorem 16.9 is called the factor or quotient ring.
Just as with group homomorphisms and normal subgroups, there is a rela-
tionship between ring homomorphisms and ideals.
this is a ring homomorphism, we need only show that ((r + K)(s + K)) =
(r + K)(s + K); but
I/I J
= (I + J)/J.
R/J
R/I
= .
I/J
1 + M = ab + M = ba + M = (a + M )(b + M ).
(a + P )(b + P ) = ab + P = 0 + P = P.
Example 20. Every ideal in Z is of the form nZ. The factor ring Z/nZ = Zn
is an integral domain only when n is prime. It is actually a field. Hence, the
nonzero prime ideals in Z are the ideals pZ, where p is prime. This example
really justifies the use of the word prime in our definition of prime ideals.
Since every field is an integral domain, we have the following corollary.
Historical Note
Amalie Emmy Noether, one of the outstanding mathematicians of this century, was
born in Erlangen, Germany in 1882. She was the daughter of Max Noether (1844
1921), a distinguished mathematician at the University of Erlangen. Together with
Paul Gordon (18371912), Emmy Noethers father strongly influenced her early
education. She entered the University of Erlangen at the age of 18. Although
women had been admitted to universities in England, France, and Italy for decades,
there was great resistance to their presence at universities in Germany. Noether
was one of only two women among the universitys 986 students. After completing
her doctorate under Gordon in 1907, she continued to do research at Erlangen,
occasionally lecturing when her father was ill.
Noether went to Gottingen to study in 1916. David Hilbert and Felix Klein
tried unsuccessfully to secure her an appointment at Gottingen. Some of the faculty
objected to women lecturers, saying, What will our soldiers think when they return
to the university and are expected to learn at the feet of a woman? Hilbert,
annoyed at the question, responded, Meine Herren, I do not see that the sex of
a candidate is an argument against her admission as a Privatdozent. After all,
the Senate is not a bathhouse. At the end of World War I, attitudes changed
and conditions greatly improved for women. After Noether passed her habilitation
examination in 1919, she was given a title and was paid a small sum for her lectures.
16.5 AN APPLICATION TO SOFTWARE DESIGN 253
xa (mod m)
x b (mod n)
k1 m (b a) (mod n)
254 CHAPTER 16 RINGS
has a solution for k1 . Since m and n are relatively prime, there exist integers
s and t such that ms + nt = 1. Consequently,
(b a)ms = (b a) (b a)nt,
or
[(b a)s]m (b a) (mod n).
Now let k1 = (b a)s.
To show that any two solutions are congruent modulo mn, let c1 and c2
be two solutions of the system. That is,
ci a (mod m)
ci b (mod n)
for i = 1, 2. Then
c2 c1 (mod m)
c2 c1 (mod n).
Therefore, both m and n divide c1 c2 . Consequently, c2 c1 (mod mn).
x a1 (mod n1 )
x a2 (mod n2 )
..
.
x ak+1 (mod nk+1 ).
Considering the first k equations, there exists a solution that is unique mod-
ulo n1 nk , say a. Since n1 nk and nk+1 are relatively prime, the system
x a (mod n1 nk )
x ak+1 (mod nk+1 )
x3 (mod 4)
x4 (mod 5)
x1 (mod 9)
x5 (mod 7).
x 19 (mod 20)
x1 (mod 9)
x5 (mod 7).
x 19 (mod 180)
x5 (mod 7).
Solving this last system, we find that 19 is a solution for the system that is
unique up to modulo 1260.
256 CHAPTER 16 RINGS
Example 23. Suppose that we wish to multiply 2134 by 1531. We will use
the integers 95, 97, 98, and 99 because they are relatively prime. We can
break down each integer into four parts:
and
x9 (mod 95)
x0 (mod 97)
x 30 (mod 98)
x 55 (mod 99).
Exercises
1. Which of the following sets are rings with respect to the usual operations of
addition and multiplication? If the set is a ring, is it also a field?
(a) 7Z
(b) Z18
(c) Q( 2 ) = {a + b 2 : a, b Q}
(d) Q( 2, 3 ) = {a + b 2 + c 3 + d 6 : a, b, c, d Q}
(e) Z[ 3 ] = {a + b 3 : a, b Z}
(f) R = {a + b 3 3 : a, b Q}
(g) Z[i] = {a + bi : a, b Z and i2 = 1}
258 CHAPTER 16 RINGS
(h) Q( 3 3 ) = {a + b 3 3 + c 3 9 : a, b, c Q}
2. Let R be the ring of 2 2 matrices of the form
a b
,
0 0
with entries in Z2 ?
EXERCISES 259
(a) (c)
x2 (mod 4)
x2 (mod 5) x4 (mod 7)
x6 (mod 11) x7 (mod 9)
x5 (mod 11)
(b) (d)
x3 (mod 5)
x3 (mod 7) x0 (mod 8)
x0 (mod 8) x1 (mod 11)
x5 (mod 15) x5 (mod 13)
14. Use the method of parallel computation outlined in the text to calculate
2234 + 4121 by dividing the calculation into four separate additions modulo
95, 97, 98, and 99.
15. Explain why the method of parallel computation outlined in the text fails
for 2134 1531 if we attempt to break the calculation down into two smaller
calculations modulo 98 and 99.
16. If R is a field, show that the only two ideals of R are {0} and R itself.
17. Let a be any element in a ring R with identity. Show that (1)a = a.
18. Prove that (a)(b) = ab for any elements a and b in a ring R.
19. Let : R S be a ring homomorphism. Prove each of the following state-
ments.
(a) If R is a commutative ring, then (R) is a commutative ring.
(b) (0) = 0.
(c) Let 1R and 1S be the identities for R and S, respectively. If is onto,
then (1R ) = 1S .
260 CHAPTER 16 RINGS
I/I J
= I + J/J.
22. Prove the Third Isomorphism Theorem for rings: Let R be a ring and I and
J be ideals of R, where J I. Then
R/J
R/I
= .
I/J
32. If we do not require the identity of a ring to be distinct from 0, we will not
have a very interesting mathematical structure. Let R be a ring such that
1 = 0. Prove that R = {0}.
33. Let S be a subset of a ring R. Prove that there is a subring R0 of R that
contains S.
34. Let R be a ring. Define the center of R to be
: U (R) Inn(R)
xr (mod I)
x s (mod J)
has a solution.
(b) In addition, prove that any two solutions of the system are congruent
modulo I J.
(c) Let I and J be ideals in a ring R such that I + J = R. Show that there
exists a ring isomorphism
R/(I J)
= R/I R/J.
Programming Exercise
Write a computer program implementing fast addition and multiplication
using the Chinese Remainder Theorem and the method outlined in the text.
Most people are fairly familiar with polynomials by the time they begin to
study abstract algebra. When we examine polynomial expressions such as
p(x) = x3 3x + 2
q(x) = 3x2 6x + 5,
we have a pretty good idea of what p(x) + q(x) and p(x)q(x) mean. We just
add and multiply polynomials as functions; that is,
and
(pq)(x) = p(x)q(x)
= (x3 3x + 2)(3x2 6x + 5)
= 3x5 6x4 4x3 + 24x2 27x + 10.
263
264 CHAPTER 17 POLYNOMIALS
p(x) = a0 + a1 x + + an xn
q(x) = b0 + b1 x + + bm xm ,
p(x) = a0 + a1 x + + an xn
q(x) = b0 + b1 x + + bm xm .
p(x) + q(x) = c0 + c1 x + + ck xk ,
where
i
X
ci = ak bik = a0 bi + a1 bi1 + + ai1 b1 + ai b0
k=0
17.1 POLYNOMIAL RINGS 265
for each i. Notice that in each case some of the coefficients may be zero.
and
q(x) = 2 + 0x x2 + 0x3 + 4x4
are polynomials in Z[x]. If the coefficient of some term in a polynomial
is zero, then we usually just omit that term. In this case we would write
p(x) = 3 + 2x3 and q(x) = 2 x2 + 4x4 . The sum of these two polynomials
is
p(x) + q(x) = 5 x2 + 2x3 + 4x4 .
The product,
Example 2. Let
be polynomials in Z12 [x]. The sum of p(x) and q(x) is 7 + 4x2 + 3x3 + 4x4 .
The product of the two polynomials is the zero polynomial. This example
tells us that R[x] cannot be an integral domain if R is not an integral domain.
Proof. Our first task is to show that R[x] is an abelian group under
polynomial addition. The zero
Pnpolynomial, f (x) = 0, is the additive identity.
Given a polynomial p(x) = i=0 i
Pai x , the inverse of p(x) is easily verified to
be p(x) = ni=0 (ai )xi = ni=0 ai xi . Commutativity and associativity
P
follow immediately from the definition of polynomial addition and from the
fact that addition in R is both commutative and associative.
266 CHAPTER 17 POLYNOMIALS
m
! n+p i
X X X
= ai xi bj cij xi
i=0 i=0 j=0
m n p
!" ! !#
X X X
i i i
= ai x bi x ci x
i=0 i=0 i=0
= p(x)[q(x)r(x)]
The commutativity and distribution properties of polynomial multiplication
are proved in a similar manner. We shall leave the proofs of these properties
as an exercise.
Proposition 17.2 Let p(x) and q(x) be polynomials in R[x], where R is an
integral domain. Then deg p(x) + deg q(x) = deg(p(x)q(x)). Furthermore,
R[x] is an integral domain.
17.1 POLYNOMIAL RINGS 267
Theorem 17.4 (Division Algorithm) Let f (x) and g(x) be two nonzero
polynomials in F [x], where F is a field and g(x) is a nonconstant polynomial.
Then there exist unique polynomials q(x), r(x) F [x] such that
f (x) = g(x)q(x) + r(x),
where either deg r(x) < deg g(x) or r(x) is the zero polynomial.
Proof. We will first consider the existence of q(x) and r(x). Let S =
{f (x) g(x)h(x) : h(x) F [x]} and assume that
g(x) = a0 + a1 x + + an xn
is a polynomial of degree n. This set is nonempty since f (x) S. If f (x) is
the zero polynomial, then
0 = f (x) = 0 g(x) + 0;
hence, both q and r must also be the zero polynomial.
Now suppose that the zero polynomial is not in S. In this case the
degree of every polynomial in S is nonnegative. Choose a polynomial r(x)
of smallest degree in S; hence, there must exist a q(x) F [x] such that
r(x) = f (x) g(x)q(x),
or
f (x) = g(x)q(x) + r(x).
We need to show that the degree of r(x) is less than the degree of g(x).
Assume that deg g(x) deg r(x). Say r(x) = b0 + b1 x + + bm xm and
m n. Then
f (x) g(x)[q(x) (bm /an )xmn ] = f (x) g(x)q(x) + (bm /an )xmn g(x)
= r(x) + (bm /an )xmn g(x)
= r(x) + bm xm + terms of lower degree
17.2 THE DIVISION ALGORITHM 269
and
g(x)[q(x) q 0 (x)] = r0 (x) r(x).
If g is not the zero polynomial, then
However, the degrees of both r(x) and r0 (x) are strictly less than the degree
of g(x); therefore, r(x) = r0 (x) and q(x) = q 0 (x).
and the degree of r(x) must be less than the degree of x . Since the
degree of r(x) is less than 1, r(x) = a for a F ; therefore,
p(x) = (x )q(x) + a.
But
0 = p() = 0 q(x) + a = a;
consequently, p(x) = (x )q(x), and x is a factor of p(x).
Conversely, suppose that x is a factor of p(x); say p(x) = (x)q(x).
Then p() = 0 q(x) = 0.
Proof. We will use induction on the degree of p(x). If deg p(x) = 0, then
p(x) is a constant polynomial and has no zeros. Let deg p(x) = 1. Then
p(x) = ax + b for some a and b in F . If 1 and 2 are zeros of p(x), then
a1 + b = a2 + b or 1 = 2 .
Now assume that deg p(x) > 1. If p(x) does not have a zero in F , then we
are done. On the other hand, if is a zero of p(x), then p(x) = (x )q(x)
for some q(x) F [x] by Corollary 17.5. The degree of q(x) is n 1 by
Proposition 17.2. Let be some other zero of p(x) that is distinct from .
Then p() = ( )q() = 0. Since 6= and F is a field, q() = 0. By
our induction hypothesis, p(x) can have at most n 1 zeros in F that are
distinct from . Therefore, p(x) has at most n distinct zeros in F .
Let F be a field. A monic polynomial d(x) is a greatest common
divisor of polynomials p(x), q(x) F [x] if d(x) evenly divides both p(x)
and q(x); and, if for any other polynomial d0 (x) dividing both p(x) and q(x),
d0 (x) | d(x). We write d(x) = gcd(p(x), q(x)). Two polynomials p(x) and
q(x) are relatively prime if gcd(p(x), q(x)) = 1.
Proposition 17.7 Let F be a field and suppose that d(x) is the greatest
common divisor of two polynomials p(x) and q(x) in F [x]. Then there exist
polynomials r(x) and s(x) such that
Proof. Let d(x) be the monic polynomial of smallest degree in the set
S = {f (x)p(x) + g(x)q(x) : f (x), g(x) F [x]}.
We can write d(x) = r(x)p(x) + s(x)q(x) for two polynomials r(x) and s(x)
in F [x]. We need to show that d(x) divides both p(x) and q(x). We shall
first show that d(x) divides p(x). By the division algorithm, there exist
polynomials a(x) and b(x) such that p(x) = a(x)d(x) + b(x), where b(x) is
either the zero polynomial or deg b(x) < deg d(x). Therefore,
b(x) = p(x) a(x)d(x)
= p(x) a(x)(r(x)p(x) + s(x)q(x))
= p(x) a(x)r(x)p(x) a(x)s(x)q(x)
= p(x)(1 a(x)r(x)) + q(x)(a(x)s(x))
is a linear combination of p(x) and q(x) and therefore must be in S. However,
b(x) must be the zero polynomial since d(x) was chosen to be of smallest
degree; consequently, d(x) divides p(x). A symmetric argument shows that
d(x) must also divide q(x); hence, d(x) is a common divisor of p(x) and q(x).
To show that d(x) is a greatest common divisor of p(x) and q(x), suppose
that d0 (x) is another common divisor of p(x) and q(x). We will show that
d0 (x) | d(x). Since d0 (x) is a common divisor of p(x) and q(x), there exist
polynomials u(x) and v(x) such that p(x) = u(x)d0 (x) and q(x) = v(x)d0 (x).
Therefore,
d(x) = r(x)p(x) + s(x)q(x)
= r(x)u(x)d0 (x) + s(x)v(x)d0 (x)
= d0 (x)[r(x)u(x) + s(x)v(x)].
Since d0 (x) | d(x), d(x) is a greatest common divisor of p(x) and q(x).
Finally, we must show that the greatest common divisor of p(x) and
q(x)) is unique. Suppose that d0 (x) is another greatest common divisor of
p(x) and q(x). We have just shown that there exist polynomials u(x) and
v(x) in F [x] such that d(x) = d0 (x)[r(x)u(x) + s(x)v(x)]. Since
deg d(x) = deg d0 (x) + deg[r(x)u(x) + s(x)v(x)]
and d(x) and d0 (x) are both greatest common divisors, deg d(x) = deg d0 (x).
Since d(x) and d0 (x) are both monic polynomials of the same degree, it must
be the case that d(x) = d0 (x).
Notice the similarity between the proof of Proposition 17.7 and the proof
of Theorem 2.4.
272 CHAPTER 17 POLYNOMIALS
Proof. Let p(x) have a zero a Q. Then p(x) must have a linear factor
x a. By Gausss Lemma, p(x) has a factorization with a linear factor in
Z[x]. Hence, for some Z
Thus a0 / Z and so | a0 .
a + c = 2
ac + b + d = 0
ad + bc = 1
bd = 1.
ad + bc = b(a + c) = 1.
Proof. By Gausss Lemma, we need only show that f (x) does not factor
into polynomials of lower degree in Z[x]. Let
am = b0 cm + b1 cm1 + + bm c0
is not divisible by p, since each term on the right-hand side of the equation
is divisible by p except for b0 cm . Therefore, m = n since ai is divisible by p
for m < n. Hence, f (x) cannot be factored into polynomials of lower degree
and therefore must be irreducible.
Ideals in F [x]
Let F be a field. Recall that a principal ideal in F [x] is an ideal hp(x)i
generated by some polynomial p(x); that is,
Example 9. It is not the case that every ideal in the ring F [x, y] is a
principal ideal. Consider the ideal of F [x, y] generated by the polynomials
x and y. This is the ideal of F [x, y] consisting of all polynomials with no
constant term. Since both x and y are in the ideal, no single polynomial
can generate the entire ideal.
Theorem 17.13 Let F be a field and suppose that p(x) F [x]. Then the
ideal generated by p(x) is maximal if and only if p(x) is irreducible.
Proof. Suppose that p(x) generates a maximal ideal of F [x]. Then hp(x)i is
also a prime ideal of F [x]. Since a maximal ideal must be properly contained
inside F [x], p(x) cannot be a constant polynomial. Let us assume that p(x)
factors into two polynomials of lesser degree, say p(x) = f (x)g(x). Since
hp(x)i is a prime ideal one of these factors, say f (x), is in hp(x)i and therefore
be a multiple of p(x). But this would imply that hp(x)i hf (x)i, which is
impossible since hp(x)i is maximal.
Conversely, suppose that p(x) is irreducible over F [x]. Let I be an ideal
in F [x] containing hp(x)i. By Theorem 17.12, I is a principal ideal; hence,
I = hf (x)i for some f (x) F [x]. Since p(x) I, it must be the case
that p(x) = f (x)g(x) for some g(x) F [x]. However, p(x) is irreducible;
hence, either f (x) or g(x) is a constant polynomial. If f (x) is constant,
then I = F [x] and we are done. If g(x) is constant, then f (x) is a constant
17.3 IRREDUCIBLE POLYNOMIALS 277
multiple of I and I = hp(x)i. Thus, there are no proper ideals of F [x] that
properly contain hp(x)i.
Historical Note
Throughout history, the solution of polynomial equations has been a challenging
problem. The Babylonians knew how to solve the equation ax2 + bx + c = 0.
Omar Khayyam (10481131) devised methods of solving cubic equations through
the use of geometric constructions and conic sections. The algebraic solution of
the general cubic equation ax3 + bx2 + cx + d = 0 was not discovered until the
sixteenth century. An Italian mathematician, Luca Paciola (ca. 14451509), wrote
in Summa de Arithmetica that the solution of the cubic was impossible. This was
taken as a challenge by the rest of the mathematical community.
Scipione del Ferro (14651526), of the University of Bologna, solved the de-
pressed cubic,
ax3 + cx + d = 0.
He kept his solution an absolute secret. This may seem surprising today, when
mathematicians are usually very eager to publish their results, but in the days
of the Italian Renaissance secrecy was customary. Academic appointments were
not easy to secure and depended on the ability to prevail in public contests. Such
challenges could be issued at any time. Consequently, any major new discovery was
a valuable weapon in such a contest. If an opponent presented a list of problems
to be solved, del Ferro could in turn present a list of depressed cubics. He kept the
secret of his discovery throughout his life, passing it on only on his deathbed to his
student Antonio Fior (ca. 1506?).
Although Fior was not the equal of his teacher, he immediately issued a chal-
lenge to Niccolo Fontana (14991557). Fontana was known as Tartaglia (the Stam-
merer). As a youth he had suffered a blow from the sword of a French soldier during
an attack on his village. He survived the savage wound, but his speech was perma-
nently impaired. Tartaglia sent Fior a list of 30 various mathematical problems;
Fior countered by sending Tartaglia a list of 30 depressed cubics. Tartaglia would
either solve all 30 of the problems or absolutely fail. After much effort Tartaglia
finally succeeded in solving the depressed cubic and defeated Fior, who faded into
obscurity.
At this point another mathematician, Gerolamo Cardano (15011576), entered
the story. Cardano wrote to Tartaglia, begging him for the solution to the depressed
cubic. Tartaglia refused several of his requests, then finally revealed the solution to
Cardano after the latter swore an oath not to publish the secret or to pass it on to
anyone else. Using the knowledge that he had obtained from Tartaglia, Cardano
eventually solved the general cubic
ax3 + bx2 + cx + d = 0.
278 CHAPTER 17 POLYNOMIALS
Cardano shared the secret with his student, Ludovico Ferrari (15221565), who
solved the general quartic equation,
In 1543, Cardano and Ferrari examined del Ferros papers and discovered that he
had also solved the depressed cubic. Cardano felt that this relieved him of his
obligation to Tartaglia, so he proceeded to publish the solutions in Ars Magna
(1545), in which he gave credit to del Ferro for solving the special case of the cubic.
This resulted in a bitter dispute between Cardano and Tartaglia, who published
the story of the oath a year later.
Exercises
1. List all of the polynomials of degree 3 or less in Z2 [x].
2. Compute each of the following.
(a) (5x2 + 3x 4) + (4x2 x + 9) in Z12
(b) (5x2 + 3x 4)(4x2 x + 9) in Z12
(c) (7x3 + 3x2 x) + (6x2 8x + 4) in Z9
(d) (3x2 + 2x 4) + (4x2 + 2) in Z5
(e) (3x2 + 2x 4)(4x2 + 2) in Z5
(f) (5x2 + 3x 2)2 in Z12
3. Use the division algorithm to find q(x) and r(x) such that a(x) = q(x)b(x) +
r(x) with deg r(x) < deg b(x) for each of the following pairs of polynomials.
(a) p(x) = 5x3 + 6x2 3x + 4 and q(x) = x 2 in Z7 [x]
(b) p(x) = 6x4 2x3 + x2 3x + 1 and q(x) = x2 + x 2 in Z7 [x]
(c) p(x) = 4x5 x3 + x2 + 4 and q(x) = x3 2 in Z5 [x]
(d) p(x) = x5 + x3 x2 x and q(x) = x3 + x in Z2 [x]
4. Find the greatest common divisor of each of the following pairs p(x) and q(x)
of polynomials. If d(x) = gcd(p(x), q(x)), find two polynomials a(x) and b(x)
such that a(x)p(x) + b(x)q(x) = d(x).
(a) p(x) = 7x3 + 6x2 8x + 4 and q(x) = x3 + x 2, where p(x), q(x) Q[x]
(b) p(x) = x3 + x2 x + 1 and q(x) = x3 + x 1, where p(x), q(x) Z2 [x]
(c) p(x) = x3 + x2 4x + 4 and q(x) = x3 + 3x 2, where p(x), q(x) Z5 [x]
(d) p(x) = x3 2x + 4 and q(x) = 4x3 + x + 3, where p(x), q(x) Q[x]
5. Find all of the zeros for each of the following polynomials.
EXERCISES 279
23. Show that xp x has p distinct zeros in Zp [x], for any prime p. Conclude
that therefore
ax2 + bx + c = 0
to obtain
b b2 4ac
x= .
2a
The discriminant of the quadratic equation = b2 4ac determines the
nature of the solutions of the equation. If > 0, the equation has two
distinct real solutions. If = 0, the equation has a single repeated real root.
If < 0, there are two distinct imaginary solutions.
EXERCISES 281
x3 + bx2 + cx + d = 0
and use this result to show that the three possible solutions for y are
s r s r
3 q p 3 q 2 q p3 q2
i 2i 3
+ + + + ,
2 27 4 2 27 4
where i = 0, 1, 2.
7. The discriminant of the cubic equation is
p3 q2
= + .
27 4
Show that y 3 + py + q = 0
(a) has three real roots, at least two of which are equal, if = 0.
(b) has one real root and two conjugate imaginary roots if > 0.
(c) has three distinct real roots if < 0.
8. Solve the following cubic equations.
282 CHAPTER 17 POLYNOMIALS
x4 + ax3 + bx2 + cx + d = 0
can be reduced to
y 4 + py 2 + qy + r = 0
by using the substitution x = y a/4.
10. Show that 2
1 1 2
y2 + z = (z p)y 2 qy + z r .
2 4
11. Show that the right-hand side of (10) can be put in the form (my + k)2 if
and only if
2 1 2
q 4(z p) z r = 0.
4
z 3 pz 2 4rz + (4pr q 2 ) = 0.
Solving the resolvent cubic equation, put the equation found in (10) in the
form 2
2 1
y + z = (my + k)2
2
to obtain the solution of the quartic equation.
13. Use this method to solve the following quartic equations.
One of the most important rings we study is the ring of integers. It was our
first example of an algebraic structure: the first polynomial ring that we
examined was Z[x]. We also know that the integers sit naturally inside the
field of rational numbers, Q. The ring of integers is the model for all integral
domains. In this chapter we will examine integral domains in general, an-
swering questions about the ideal structure of integral domains, polynomial
rings over integral domains, and whether or not an integral domain can be
embedded in a field.
283
284 CHAPTER 18 INTEGRAL DOMAINS
and
[a, b] [c, d] = [ac, bd],
respectively. The next lemma demonstrates that these operations are inde-
pendent of the choice of representatives from each equivalence class.
[a1 d1 + b1 c1 , b1 d1 ] = [a2 d2 + b2 c2 , b2 d2 ]
(a1 d1 + b1 c1 )(b2 d2 ) = a1 d1 b2 d2 + b1 c1 b2 d2
= a1 b2 d1 d2 + b1 b2 c1 d2
= b1 a2 d1 d2 + b1 b2 d1 c2
= (b1 d1 )(a2 d2 + b2 c2 ).
is a field.
Proof. The additive and multiplicative identities are [0, 1] and [1, 1], re-
spectively. To show that [0, 1] is the additive identity, observe that
and
(ab) = [ab, 1] = [a, 1][b, 1] = (a)(b);
hence, is a homomorphism. To show that is one-to-one, suppose that
(a) = (b). Then [a, 1] = [b, 1], or a = a1 = 1b = b. Finally, any element
of FD can expressed as the quotient of two elements in D, since
and
Therefore, is a homomorphism.
To complete the proof of the theorem, we need to show that is one-to-
one. Suppose that ([a, b]) = ab1 = 0. Then a = 0b = 0 and [a, b] = [0, b].
Therefore, the kernel of is the zero element [0, b] in FD , and is injective.
1. a | b hbi hai.
3. a is a unit in D hai = D.
Theorem 18.8 Let D be a PID and hpi be a nonzero ideal in D. Then hpi
is a maximal ideal if and only if p is irreducible.
290 CHAPTER 18 INTEGRAL DOMAINS
Proof. Let p be irreducible and suppose that p | ab. Then habi hpi. By
Corollary 16.17, since hpi is a maximal ideal, hpi must also be a prime ideal.
Thus, either a hpi or b hpi. Hence, either p | a or p | b.
unit. By the same argument as before, ha1 i ha2 i. We can continue with
this construction to obtain an ascending chain of ideals
By Lemma 16.10, there exists a positive integer N such that han i = haN i
for all n N . Consequently, aN must be irreducible. We have now shown
that a is the product of two elements, one of which must be irreducible.
Now suppose that a = c1 p1 , where p1 is irreducible. If c1 is not a unit,
we can repeat the preceding argument to conclude that hai hc1 i. Either
c1 is irreducible or c1 = c2 p2 , where p2 is irreducible and c2 is not a unit.
Continuing in this manner, we obtain another chain of ideals
a = p1 p2 pr
a = p1 p2 pr = q1 q2 qs ,
a = p1 p2 pr = u1 p1 q2 qs
or
p2 pr = u1 q2 qs .
Continuing in this manner, we can arrange the qi s such that p2 = q2 , p3 =
q3 , . . . , pr = qr , to obtain
u1 u2 ur qr+1 qs = 1.
In this case qr+1 qs is a unit, which contradicts the fact that qr+1 , . . . , qs
are irreducibles. Therefore, r = s and the factorization of a is unique.
Example 5. Every PID is a UFD, but it is not the case that every UFD
is a PID. In Corollary 18.22, we will prove that Z[x] is a UFD. However,
Z[x] is not a PID. Let I = {5f (x) + xg(x) : f (x), g(x) Z[x]}. We can
easily show that I is an ideal of Z[x]. Suppose that I = hp(x)i. Since 5 I,
5 = f (x)p(x). In this case p(x) = p must be a constant. Since x I,
x = pg(x); consequently, p = 1. However, it follows from this fact that
hp(x)i = Z[x]. But this would mean that 3 is in I. Therefore, we can write
3 = 5f (x) + xg(x) for some f (x) and g(x) in Z[x]. Examining the constant
term of this polynomial, we see that 3 = 5f (x), which is impossible.
Euclidean Domains
We have repeatedly used the division algorithm when proving results about
either Z or F [x], where F is a field. We should now ask when a division
algorithm is available for an integral domain.
Let D be an integral domain such that for each a D there is a non-
negative integer (a) satisfying the following conditions.
Factorization in D[x]
One of the most important polynomial rings is Z[x]. One of the first ques-
tions that come to mind about Z[x] is whether or not it is a UFD. We will
prove a more general statement here. Our first task is to obtain a more
general version of Gausss Lemma (Theorem 17.9).
Let D be a unique factorization domain and suppose that
p(x) = an xn + + a1 x + a0
Theorem 18.15 (Gausss Lemma) Let D be a UFD and let f (x) and
g(x) be primitive polynomials in D[x]. Then f (x)g(x) is primitive.
Lemma 18.16 Let D be a UFD, and let p(x) and q(x) be in D[x]. Then the
content of p(x)q(x) is equal to the product of the contents of p(x) and q(x).
Proof. Let p(x) = cp1 (x) and q(x) = dq1 (x), where c and d are the
contents of p(x) and q(x), respectively. Then p1 (x) and q1 (x) are primitive.
We can now write p(x)q(x) = cdp1 (x)q1 (x). Since p1 (x)q1 (x) is primitive,
the content of p(x)q(x) must be cd.
18.2 FACTORIZATION IN INTEGRAL DOMAINS 295
Proof. Let a and b be nonzero elements of D such that af (x), bg(x) are
in D[x]. We can find a1 , b2 D such that af (x) = a1 f1 (x) and bg(x) =
b1 g1 (x), where f1 (x) and g1 (x) are primitive polynomials in D[x]. Therefore,
abp(x) = (a1 f1 (x))(b1 g1 (x)). Since f1 (x) and g1 (x) are primitive polynomi-
als, it must be the case that ab | a1 b1 by Gausss Lemma. Thus there exists
a c D such that p(x) = cf1 (x)g1 (x). Clearly, deg f (x) = deg f1 (x) and
deg g(x) = deg g1 (x).
The following corollaries are direct consequences of Lemma 18.17.
Historical Note
with real coefficients can be factored into linear factors over the complex
numbers. The acceptance of complex numbers was brought about by Gauss,
who was the first person to use the notation of i for 1.
Gauss then turned his attention toward number theory; in 1801, he
published his famous book on number theory, Disquisitiones Arithmeticae.
Throughout his life Gauss was intrigued with this branch of mathematics.
He once wrote, Mathematics is the queen of the sciences, and the theory
of numbers is the queen of mathematics.
In 1807, Gauss was appointed director of the Observatory at the Univer-
sity of Gottingen, a position he held until his death. This position required
him to study applications of mathematics to the sciences. He succeeded in
making contributions to fields such as astronomy, mechanics, optics, geodesy,
and magnetism. Along with Wilhelm Weber, he coinvented the first prac-
tical electric telegraph some years before a better version was invented by
Samuel F. B. Morse.
Gauss was clearly the most prominent mathematician in the world in the
early nineteenth century. His status naturally made his discoveries subject
to intense scrutiny. Gausss cold and distant personality many times led him
to ignore the work of his contemporaries, making him many enemies. He
did not enjoy teaching very much, and young mathematicians who sought
him out for encouragement were often rebuffed. Nevertheless, he had many
outstanding students, including Eisenstein, Riemann, Kummer, Dirichlet,
and Dedekind. Gauss also offered a great deal of encouragement to Sophie
Germain (17761831), who overcame the many obstacles facing women in
her day to become a very prominent mathematician. Gauss died at the age
of 78 in Gottingen on February 23, 1855.
Exercises
1. Let z = a + b 3 i be in Z[ 3 i]. If a2 + 3b2 = 1, show that z must be a unit.
Show that the only units of Z[ 3 i] are 1 and 1.
2. The Gaussian integers, Z[i], are a UFD. Factor each of the following elements
in Z[i] into a product of irreducibles.
(a) 5 (c) 6 + 8i
(b) 1 + 3i (d) 2
Q(i) = {p + qi : p, q Q}.
(a) If D is a PID and a and b are both nonzero elements of D, prove there
exists a unique greatest common divisor of a and b. We write gcd(a, b)
for the greatest common divisor of a and b.
(b) Let D be a PID and a and b be nonzero elements of D. Prove that
there exist elements s and t in D such that gcd(a, b) = as + bt.
12. Let D be an integral domain. Define a relation on D by a b if a and b are
associates in D. Prove that is an equivalence relation on D.
13. Let D be a Euclidean domain with Euclidean valuation . If u is a unit in
D, show that (u) = (1).
14. Let D be a Euclidean domain with Euclidean valuation . If a and b are
associates in D, prove that (a) = (b).
15. Show that Z[ 5 i] is not a unique factorization domain.
16. Prove or disprove: Every subdomain of a UFD is also a UFD.
17. An ideal of a commutative ring R is said to be finitely generated if there
exist elements a1 , . . . , an in R such that every element r R can be written
as a1 r1 + + an rn for some r1 , . . . , rn in R. Prove that R satisfies the
ascending chain condition if and only if every ideal of R is finitely generated.
18. Let D be an integral domain with a descending chain of ideals I1 I2 .
Show that there exists an N such that Ik = IN for all k N . A ring satisfying
this condition is said to satisfy the descending chain condition, or
DCC. Rings satisfying the DCC are called Artinian rings, after Emil
Artin.
19. Let R be a commutative ring with identity. We define a multiplicative
subset of R to be a subset S such that 1 S and ab S if a, b S.
(a) Define a relation on R S by (a, s) (a0 , s0 ) if there exists an s S
such that s (s0 a sa0 ) = 0. Show that is an equivalence relation on
R S.
(b) Let a/s denote the equivalence class of (a, s) R S and let S 1 R be
the set of all equivalence classes with respect to . Define the operations
of addition and multiplication on S 1 R by
a b at + bs
+ =
s t st
ab ab
= ,
st st
respectively. Prove that these operations are well-defined on S 1 R and
that S 1 R is a ring with identity under these operations. The ring
S 1 R is called the ring of quotients of R with respect to S.
(c) Show that the map : R S 1 R defined by (a) = a/1 is a ring
homomorphism.
300 CHAPTER 18 INTEGRAL DOMAINS
The axioms of a ring give structure to the operations of addition and multi-
plication on a set. However, we can construct algebraic structures, known as
lattices and Boolean algebras, that generalize other types of operations. For
example, the important operations on sets are inclusion, union, and intersec-
tion. Lattices are generalizations of order relations on algebraic spaces, such
as set inclusion in set theory and inequality in the familiar number systems
N, Z, Q, and R. Boolean algebras generalize the operations of intersection
and union. Lattices and Boolean algebras have found applications in logic,
circuit theory, and probability.
19.1 Lattices
Partially Ordered Sets
We begin by the study of lattices and Boolean algebras by generalizing the
idea of inequality. Recall that a relation on a set X is a subset of X X.
A relation P on X is called a partial order of X if it satisfies the following
axioms.
301
302 CHAPTER 19 LATTICES AND BOOLEAN ALGEBRAS
{a, b, c}
Example 4. There can be more than one partial order on a particular set.
We can form a partial order on N by a b if a | b. The relation is certainly
reflexive since a | a for all a N. If m | n and n | m, then m = n; hence, the
19.1 LATTICES 303
24
8 12
4 6
2 3
Proof. By the Principle of Duality, we need only prove the first statement
in each part.
(1) By definition a b is the least upper bound of {a, b}, and b a is the
least upper bound of {b, a}; however, {a, b} = {b, a}.
(2) We will show that a (b c) and (a b) c are both least upper
bounds of {a, b, c}. Let d = a b. Then c d c = (a b) c. We also
know that
a a b = d d c = (a b) c.
A similar argument demonstrates that b (a b) c. Therefore, (a b) c
is an upper bound of {a, b, c}. We now need to show that (a b) c is the
least upper bound of {a, b, c}. Let u be some other upper bound of {a, b, c}.
Then a u and b u; hence, d = a b u. Since c u, it follows that
(a b) c = d c u. Therefore, (a b) c must be the least upper bound
of {a, b, c}. The argument that shows a (b c) is the least upper bound of
{a, b, c} is the same. Consequently, a (b c) = (a b) c.
(3) The join of a and a is the least upper bound of {a}; hence, a a = a.
(4) Let d = a b. Then a a d. On the other hand, d = a b a,
and so a d a. Therefore, a (a b) = a.
Given any arbitrary set L with operations and , satisfying the con-
ditions of the previous theorem, it is natural to ask whether or not this set
comes from some lattice. The following theorem says that this is always the
case.
Theorem 19.3 Let L be a nonempty set with two binary operations and
satisfying the commutative, associative, idempotent, and absorption laws.
We can define a partial order on L by a b if a b = b. Furthermore, L is
a lattice with respect to if for all a, b L, we define the least upper bound
and greatest lower bound of a and b by a b and a b, respectively.
a c = a (b c) = (a b) c = b c = c,
306 CHAPTER 19 LATTICES AND BOOLEAN ALGEBRAS
or a c.
To show that L is a lattice, we must prove that a b and a b are,
respectively, the least upper and greatest lower bounds of a and b. Since
a = (a b) a = a (a b), it follows that a a b. Similarly, b a b.
Therefore, a b is an upper bound for a and b. Let u be any other upper
bound of both a and b. Then a u and b u. But a b u since
(a b) u = a (b u) = a u = u.
The proof that a b is the greatest lower bound of a and b is left as an
exercise.
a (b c) = (a b) (a c)
for all a, b, c L.
a (b c) = [a (a c)] (b c)
= a [(a c) (b c)]
= a [(c a) (c b)]
= a [c (a b)]
= a [(a b) c]
= [(a b) a] [(a b) c]
= (a b) (a c).
Theorem 19.5 A set B is a Boolean algebra if and only if there exist binary
operations and on B satisfying the following axioms.
1. a b = b a and a b = b a for a, b B.
2. a (b c) = (a b) c and a (b c) = (a b) c for a, b, c B.
3. a (b c) = (a b) (a c) and a (b c) = (a b) (a c) for
a, b, c B.
a=aO
= a (a a0 )
= (a a) (a a0 )
= (a a) I
= a a.
Observe that
I b = (I b) I = (I I) (b I) = I I = I.
a (a b) = (a I) (a b)
= a (I b)
=aI
= a.
The other idempotent and absorption laws are proven similarly. Since B
also satisfies (1)(3), the conditions of Theorem 19.3 are met; therefore, B
must be a lattice. Condition (4) tells us that B is a distributive lattice.
For a B, O a = a; hence, O a and O is the smallest element in B.
To show that I is the largest element in B, we will first show that a b = b
is equivalent to a b = a. Since a I = a for all a B, using the absorption
laws we can determine that
a I = (a I) I = I (I a) = I
3. If a b = I and a b = O, then b = a0 .
5. I 0 = O and O0 = I.
Proof. We will prove only (2). The rest of the identities are left as exercises.
For a b = a c and a b = a c, we have
b = b (b a)
= b (a b)
= b (a c)
= (b a) (b c)
= (a b) (b c)
= (a c) (b c)
= (c a) (c b)
= c (a b)
= c (a c)
= c (c a)
= c.
(a b) = (a) (b)
(a b) = (a) (b)
We will show that any finite Boolean algebra is isomorphic to the Boolean
algebra obtained by taking the power set of some finite set X. We will need
a few lemmas and definitions before we prove this result. Let B be a finite
Boolean algebra. An element a B is an atom of B if a 6= O and a b = a
for all nonzero b B. Equivalently, a is an atom of B if there is no nonzero
b B distinct from a such that O b a.
Lemma 19.7 Let B be a finite Boolean algebra. If b is a nonzero element
of B, then there is an atom a in B such that a b.
Proof. If b is an atom, let a = b. Otherwise, choose an element b1 , not
equal to O or b, such that b1 b. We are guaranteed that this is possible
since b is not an atom. If b1 is an atom, then we are done. If not, choose b2 ,
not equal to O or b1 , such that b2 b1 . Again, if b2 is an atom, let a = b2 .
Continuing this process, we can obtain a chain
O b3 b2 b1 b.
Since B is a finite Boolean algebra, this chain must be finite. That is, for
some k, bk is an atom. Let a = bk .
Lemma 19.8 Let a and b be atoms in a finite Boolean algebra B such that
a 6= b. Then a b = O.
Proof. Since a b is the greatest lower bound of a and b, we know that
a b a. Hence, either a b = a or a b = O. However, if a b = a, then
either a b or a = O. In either case we have a contradiction because a and
b are both atoms; therefore, a b = O.
Lemma 19.9 Let B be a Boolean algebra and a, b B. The following
statements are equivalent.
1. a b.
2. a b0 = O.
3. a0 b = I.
Proof. (1) (2). If a b, then a b = b. Therefore,
a b0 = a (a b)0
= a (a0 b0 )
= (a a0 ) b0
= O b0
= O.
19.2 BOOLEAN ALGEBRAS 311
a = a (a0 b)
= (a a0 ) (a b)
= O (a b)
= a b.
Thus, a b.
a = a b = a (a1 an ) = (a a1 ) (a an ).
Theorem 19.12 Let B be a finite Boolean algebra. Then there exists a set
X such that B is isomorphic to P(X).
Clearly, is onto.
Now let a = a1 an and b = b1 bm be elements in B, where each
ai and each bi is an atom. If (a) = (b), then {a1 , . . . , an } = {b1 , . . . , bm }
and a = b. Consequently, is injective.
The join of a and b is preserved by since
(a b) = (a1 an b1 bm )
= {a1 , . . . , an , b1 , . . . , bm }
= {a1 , . . . , an } {b1 , . . . , bm }
= (a1 an ) (b1 bm )
= (a) (b).
Corollary 19.13 The order of any finite Boolean algebra must be 2n for
some positive integer n.
A a b B
Figure 19.3. a b
A B
Figure 19.4. a b
We can build more complicated electrical circuits out of series and par-
allel circuits by replacing any switch in the circuit with one of these two
fundamental types of circuits. Circuits constructed in this manner are called
series-parallel circuits.
We will consider two circuits equivalent if they act the same. That is,
if we set the switches in equivalent circuits exactly the same we will obtain
the same result. For example, in a series circuit a b is exactly the same as
b a. Notice that this is exactly the commutative law for Boolean algebras.
In fact, the set of all series-parallel circuits forms a Boolean algebra under the
operations of and . We can use diagrams to verify the different axioms
of a Boolean algebra. The distributive law, a (b c) = (a b) (a c),
is illustrated in Figure 19.5. If a is a switch, then a0 is the switch that is
always open when a is closed and always closed when a is open. A circuit
that is always closed is I in our algebra; a circuit that is always open is O.
The laws for a a0 = O and a a0 = I are shown in Figure 19.6.
b a b
c a c
Figure 19.5. a (b c) = (a b) (a c)
a a0
a0
We leave as an exercise the proof of this theorem for the Boolean alge-
bra axioms not yet verified. We can now apply the techniques of Boolean
algebras to switching theory.
Example 10. Given a complex circuit, we can now apply the techniques
of Boolean algebra to reduce it to a simpler one. Consider the circuit in
Figure 19.7. Since
(a b) (a b0 ) (a b) = (a b) (a b) (a b0 )
= (a b) (a b0 )
= a (b b0 )
=aO
= a,
a a a
b b0 b
Figure 19.7. (a b) (a b0 ) (a b)
EXERCISES 315
we can replace the more complicated circuit with a circuit containing the
single switch a and achieve the same function.
Historical Note
George Boole (18151864) was the first person to study lattices. In 1847, he pub-
lished The Investigation of the Laws of Thought, a book in which he used lattices to
formalize logic and the calculus of propositions. Boole believed that mathematics
was the study of form rather than of content; that is, he was not so much concerned
with what he was calculating as with how he was calculating it. Booles work was
carried on by his friend Augustus De Morgan (18061871). De Morgan observed
that the principle of duality often held in set theory, as is illustrated by De Morgans
laws for set theory. He believed, as did Boole, that mathematics was the study of
symbols and abstract operations.
Set theory and logic were further advanced by such mathematicians as Alfred
North Whitehead (18611947), Bertrand Russell (18721970), and David Hilbert
(18621943). In Principia Mathematica, Whitehead and Russell attempted to show
the connection between mathematics and logic by the deduction of the natural
number system from the rules of formal logic. If the natural numbers could be
determined from logic itself, then so could much of the rest of existing mathematics.
Hilbert attempted to build up mathematics by using symbolic logic in a way that
would prove the consistency of mathematics. His approach was dealt a mortal blow
by Kurt Godel (19061978), who proved that there will always be undecidable
problems in any sufficiently rich axiomatic system; that is, that in any mathematical
system of any consequence, there will always be statements that can never be proven
either true or false.
As often occurs, this basic research in pure mathematics later became indis-
pensable in a wide variety of applications. Boolean algebras and logic have become
essential in the design of the large-scale integrated circuitry found on todays com-
puter chips. Sociologists have used lattices and Boolean algebras to model social
hierarchies; biologists have used them to describe biosystems.
Exercises
1. Draw the lattice diagram for the power set of X = {a, b, c, d} with the set
inclusion relation, .
2. Draw the diagram for the set of positive integers that are divisors of 30. Is
this poset a Boolean algebra?
3. Draw a diagram of the lattice of subgroups of Z12 .
4. Let B be the set of positive integers that are divisors of 36. Define an order
on B by a b if a | b. Prove that B is a Boolean algebra. Find a set X such
that B is isomorphic to P(X).
316 CHAPTER 19 LATTICES AND BOOLEAN ALGEBRAS
(a) (a b a0 ) a (c) a (a b)
0
(b) (a b) (a b) (d) (c a b) c0 (a b)0
7. Draw a circuit that will be closed exactly when only one of three switches a,
b, and c are closed.
8. Prove or disprove that the two circuits shown are equivalent.
a b c a b
a0 b
a c0 a c0
a b0
a0
b
a a b
a0
b a0 b
a b c
a0 b0 c
a b0 c0
11. Prove or disprove: The set of all nonzero integers is a lattice, where a b is
defined by a | b.
12. Prove that a b is the greatest lower bound of a and b in Theorem 19.3.
EXERCISES 317
13. Let L be a nonempty set with two binary operations and satisfying the
commutative, associative, idempotent, and absorption laws. We can define a
partial order on L, as in Theorem 19.3, by a b if a b = b. Prove that the
greatest lower bound of a and b is a b.
14. Let G be a group and X be the set of subgroups of G ordered by set-theoretic
inclusion. If H and K are subgroups of G, show that the least upper bound
of H and K is the subgroup generated by H K.
15. Let R be a ring and suppose that X is the set of ideals of R. Show that X is
a poset ordered by set-theoretic inclusion, . Define the meet of two ideals
I and J in X by I J and the join of I and J by I + J. Prove that the set
of ideals of R is a lattice under these operations.
16. Let B be a Boolean algebra. Prove each of the following identities.
(a) a I = I and a O = O for all a B.
(b) If a b = I and a b = O, then b = a0 .
(c) (a0 )0 = a for all a B.
(d) I 0 = O and O0 = I.
(e) (a b)0 = a0 b0 and (a b)0 = a0 b0 (De Morgans laws).
17. By drawing the appropriate diagrams, complete the proof of Theorem 19.14
to show that the switching functions form a Boolean algebra.
18. Let B be a Boolean algebra. Define binary operations + and on B by
a + b = (a b0 ) (a0 b)
a b = a b.
22. Let B be a Boolean algebra. Prove that a = 0 if and only if (ab0 )(a0 b) = b
for all b B.
23. Let L and M be lattices. Define an order relation on L M by (a, b) (c, d)
if a c and b d. Show that L M is a lattice under this partial order.
Programming Exercises
A Boolean or switching function on n variables is a map f : {O, I}n
{0, I}. A Boolean polynomial is a special type of Boolean function: it is any
type of Boolean expression formed from a finite combination of variables x1 , . . . , xn
together with O and I, using the operations , , and 0 . The values of the functions
are defined in Table 19.1. Write a program to evaluate Boolean polynomials.
( + )v = v + v;
(u + v) = u + v;
1v = v;
where , F and u, v V .
The elements of V are called vectors; the elements of F are called
scalars. It is important to notice that in most cases two vectors cannot be
319
320 CHAPTER 20 VECTOR SPACES
u = (u1 , . . . , un ) = (u1 , . . . , un ).
Example 4. Let V = Q( 2 ) = {a + b 2 : a, b Q}. Then V is a vector
space over Q. If u = a+b 2 and v = c+d 2, then u+v = (a+c)+(b+d) 2
is again in V . Also, for Q, v is in V . We will leave it as an exercise to
verify that all of the vector space axioms hold for V .
Proposition 20.1 Let V be a vector space over F . Then each of the fol-
lowing statements is true.
1. 0v = 0 for all v V .
2. 0 = 0 for all F .
3. If v = 0, then either = 0 or v = 0.
20.2 SUBSPACES 321
0v = (0 + 0)v = 0v + 0v;
20.2 Subspaces
Just as groups have subgroups and rings have subrings, vector spaces also
have substructures. Let V be a vector space over a field F , and W a subset
of V . Then W is a subspace of V if it is closed under vector addition and
scalar multiplication; that is, if u, v W and F , it will always be the
case that u + v and v are also in W .
v = 1 v1 + 2 v2 + + n vn = 1 v1 + 2 v2 + + n vn .
Then 1 = 1 , 2 = 2 , . . . , n = n .
Proof. If
v = 1 v1 + 2 v2 + + n vn = 1 v1 + 2 v2 + + n vn ,
then
(1 1 )v1 + (2 2 )v2 + + (n n )vn = 0.
Since v1 , . . . , vn are linearly independent, i i = 0 for i = 1, . . . , n.
The definition of linear dependence makes more sense if we consider the
following proposition.
1 v1 + 2 v2 + + n vn = 0,
with at least one of the i s not equal to zero. Suppose that k 6= 0. Then
1 k1 k+1 n
vk = v1 vk1 vk+1 vn .
k k k k
Conversely, suppose that
Then
The following proposition is a consequence of the fact that any system of
homogeneous linear equations with more unknowns than equations will have
a nontrivial solution. We leave the details of the proof for the end-of-chapter
exercises.
324 CHAPTER 20 VECTOR SPACES
Example
8.Let Q( 2 ) = {a + b 2: a, b Q}. The sets {1, 2 } and
{1 + 2, 1 2 } are both bases of Q( 2 ).
From the last two examples it should be clear that a given vector space
has several bases. In fact, there are an infinite number of bases for both
of these examples. In general, there is no unique basis for a vector space.
However, 3
every basis of R consists of exactly three vectors, and every basis
of Q( 2 ) consists of exactly two vectors. This is a consequence of the next
proposition.
{v1 , . . . , vk , vk+1 , . . . , vn }
is a basis for V .
Exercises
1. If F is a field, show that F [x] is a vector space over F , where the vectors
in F [x] are polynomials. Vector addition is polynomial addition, and scalar
multiplication is defined by p(x) for F .
2. Prove that Q( 2 ) is a vector space.
3. Let Q( 2, 3 ) be the field generated by elements
of the form a + b 2 + c 3,
where a, b, c are in Q. Prove that
Q( 2, 3 ) is a vector space of dimension
4 over Q. Find a basis for Q( 2, 3 ).
4. Prove that the complex numbers are a vector space of dimension 2 over R.
5. Prove that the set Pn of all polynomials of degree less than n form a subspace
of the vector space F [x]. Find a basis for Pn and compute the dimension
of Pn .
6. Let F be a field and denote the set of n-tuples of F by F n . Given vectors
u = (u1 , . . . , un ) and v = (v1 , . . . , vn ) in F n and in F , define vector addition
by
u + v = (u1 , . . . , un ) + (v1 , . . . , vn ) = (u1 + v1 , . . . , un + vn )
and scalar multiplication by
u = (u1 , . . . , un ) = (u1 , . . . , un ).
8. Show that the set of all possible solutions (x, y, z) R3 of the equations
Ax + By + Cz = 0
Dx + Ey + Cz = 0
forms a subspace of R3 .
9. Let W be the subset of continuous functions on [0, 1] such that f (0) = 0.
Prove that W is a subspace of C[0, 1].
10. Let V be a vector space over F . Prove that (v) = ()v = (v) for all
F and all v V .
11. Let V be a vector space of dimension n. Prove each of the following state-
ments.
(a) If S = {v1 , . . . , vn } is a set of linearly independent vectors for V , then
S is a basis for V .
(b) If S = {v1 , . . . , vn } spans V , then S is a basis for V .
(c) If S = {v1 , . . . , vk } is a set of linearly independent vectors for V with
k < n, then there exist vectors vk+1 , . . . , vn such that
{v1 , . . . , vk , vk+1 , . . . , vn }
is a basis for V .
12. Prove that any set of vectors containing 0 is linearly dependent.
13. Let V be a vector space. Show that {0} is a subspace of V of dimension zero.
14. If a vector space V is spanned by n vectors, show that any set of m vectors
in V must be linearly dependent for m > n.
15. Linear Transformations. Let V and W be vector spaces over a field F , of
dimensions m and n, respectively. If T : V W is a map satisfying
T (u + v) = T (u) + T (v)
T (v) = T (v)
(d) Let {v1 , . . . , vk } be a basis for the null space of T . We can extend this
basis to be a basis {v1 , . . . , vk , vk+1 , . . . , vm } of V . Why? Prove that
{T (vk+1 ), . . . , T (vm )} is a basis for the range of T . Conclude that the
range of T has dimension m k.
(e) Let dim V = dim W . Show that a linear transformation T : V W is
injective if and only if it is surjective.
16. Let V and W be finite dimensional vector spaces of dimension n over a field
F . Suppose that T : V W is a vector space isomorphism. If {v1 , . . . , vn }
is a basis of V , show that {T (v1 ), . . . , T (vn )} is a basis of W . Conclude that
any vector space over a field F of dimension n is isomorphic to F n .
17. Direct Sums. Let U and V be subspaces of a vector space W . The sum of
U and V , denoted U + V , is defined to be the set of all vectors of the form
u + v, where u U and v V .
(a) Prove that U + V and U V are subspaces of W .
(b) If U + V = W and U V = 0, then W is said to be the direct sum
of U and V and we write W = U V . Show that every element w W
can be written uniquely as w = u + v, where u U and v V .
(c) Let U be a subspace of dimension k of a vector space W of dimension
n. Prove that there exists a subspace V of dimension n k such that
W = U V . Is the subspace V unique?
(d) If U and V are arbitrary subspaces of a vector space W , show that
18. Dual Spaces. Let V and W be finite dimensional vector spaces over a
field F .
(a) Show that the set of all linear transformations from V into W , denoted
by Hom(V, W ), is a vector space over F , where we define vector addition
as follows:
(c) Consider the basis {(3, 1), (2, 2)} for R2 . What is the dual basis for
(R2 ) ?
(d) Let V be a vector space of dimension n over a field F and let V be the
dual space V . Show that each element v V gives rise to an element
v in V and that the map v 7 v is an isomorphism of V with V .
329
330 CHAPTER 21 FIELDS
and
let
E = Q( 2 + 3 ) be the smallest field containing both Q and
2 + 3. Both E and F are extension fields of the rational numbers. We
claim
that E is an
extension
field of F .
To seethis, we
needonly show that
2 is in E. Since 2 + 3 is in E, 1/( 2+ 3 ) = 3 2 must also be
in
E. Taking
linear combinations of 2 + 3 and 3 2, we find that
2 and 3 must both be in E.
0 1 1+
0 0 0 0 0
1 0 1 1+
0 1+ 1
1+ 0 1+ 1
The following theorem, due to Kronecker, is so important and so basic
to our understanding of fields that it is often known as the Fundamental
Theorem of Field Theory.
Proof. To prove this theorem, we will employ the method that we used
to construct Example 2. Clearly, we can assume that p(x) is an irreducible
polynomial. We wish to find an extension field E of F containing an element
such that p() = 0. The ideal hp(x)i generated by p(x) is a maximal ideal
in F [x] by Theorem 17.13; hence, F [x]/hp(x)i is a field. We claim that
E = F [x]/hp(x)i is the desired field.
We first show that E is a field extension of F . We can define a ho-
momorphism of commutative rings by the map : F F [x]/hp(x)i, where
(a) = a + hp(x)i for a F . It is easy to check that is indeed a ring
homomorphism. Observe that
and
(a)(b) = (a + hp(x)i)(b + hp(x)i) = ab + hp(x)i = (ab).
To prove that is one-to-one, assume that
Algebraic Elements
An element in an extension field E over F is algebraic over F if f () = 0
for some nonzero polynomial f (x) F [x]. An element in E that is not
algebraic over F is transcendental over F . An extension field E of a field
F is an algebraic extension of F if every element in E is algebraic over
F . If E is a field extension of F and 1 , . . . , n are contained in E, we
denote the smallest field containing F and 1 , . . . , n by F (1 , . . . , n ). If
E = F () for some E, then E is a simple extension of F .
Example 4. Both 2 and i are algebraic over Q since they are zeros
of the polynomials x2 2 and x2 + 1, respectively. Clearly and e are
algebraic over the real numbers; however, it is a nontrivial fact that they
are transcendental over Q. Numbers in R that are algebraic over Q are in fact
quite rare. Almost all real numbers are transcendental over Q.1 (In many
cases we do not know whether or not a particular number is transcendental;
for example, it is not known whether + e is transcendental or algebraic.)
1
If we choose a number in R, then there is a probability of 1 that the number will be
transcendental over Q.
21.1 EXTENSION FIELDS 333
= b0 + b1 + + bn1 n1
for bi F .
n = an1 n1 a0 .
Similarly,
n+1 = n
= an1 n an2 n1 a0
= an1 (an1 n1 a0 ) an2 n1 a0 .
= b0 + b1 + + bn1 n1 = c0 + c1 + + cn1 n1
is in F [x] and g() = 0. Since the degree of g(x) is less than the degree
of p(x), the irreducible polynomial of , g(x) must be the zero polynomial.
Consequently,
b0 c0 = b1 c1 = = bn1 cn1 = 0,
1, , . . . , n
cannot be linearly independent. Hence, there exist ai F , not all zero, such
that
an n + an1 n1 + + a1 + a0 = 0.
Therefore,
p(x) = an xn + + a0 F [x]
is a nonzero polynomial with p() = 0.
Remark. Theorem 21.6 says that every finite extension of a field F is an
algebraic extension. The converse is false, however. We will leave it as an
exercise to show that the set of all elements in R that are algebraic over Q
forms an infinite field extension of Q.
The next theorem is a counting theorem, similar to Lagranges Theorem
in group theory. Theorem 21.6 will prove to be an extremely useful tool in
our investigation of finite field extensions.
[K : F ] = [K : E][E : F ].
c1 v1 + c2 v2 + + cn vn = 0
21.1 EXTENSION FIELDS 337
implies that
c1 = c2 = = cn = 0.
Let X
u= cij (i j ) = 0
i,j
for cij F . We need to prove that all of the cij s are zero. We can rewrite
u as
m n
!
X X
cij i j = 0,
j=1 i=1
P
where i cij i E. Since the j s are linearly independent over E, it must
be the case that
Xn
cij i = 0
i=1
for all j. However, the j are also linearly independent over F . Therefore,
cij = 0 for all i and j, which completes the proof.
The following corollary is easily proved using mathematical induction.
[F () : F ] = [F () : F ()][F () : F ].
Example 8. Let us determine an extension field of Qcontaining
3+ 5. It
4
is easy to determine that the minimal polynomial of 3 + 5 is x 16x + 4.
It follows that
[Q( 3 + 5 ) : Q] = 4.
338 CHAPTER 21 FIELDS
We know that {1, 3 } is a basis for
Q( 3 ) over Q. Hence,
3 + 5 can-
not be inQ( 3 ). It follows that 5 cannot be in Q( 3 ) either. There-
} is
fore, {1, 5 a basis
for Q( 3, 5 ) = (Q(
3 ))( 5 )over
Q( 3 ) and
{1, 3, 5, 3 5 = 15 } is a basis for Q( 3, 5 ) = Q( 3 + 5 ) over Q.
This example shows that it is possible that some extension F (1 , . . . , n ) is
actually a simple extension of F even though n > 1.
Example 9. Let us compute a basis for Q( 3 5, 5 i), where 5 is the
positive square
root of 5 and 3 5 is the real cube root of 5. We know that
5i / Q( 3 5 ), so
3 3
[Q( 5, 5 i) : Q( 5 )] = 2.
3
3
It is easy to determine that
{1,
5i } is a basis for Q( 5, 5 i) over Q( 5 ).
3 3 2 3
We also know {1, 5, ( 5 ) } is a basis for Q( 5 ) over Q. Hence, a
that
basis for Q( 5, 3 5 ) over Q is
{1, 5 i, 5, ( 5 )2 , ( 5 )5 i, ( 5 )7 i = 5 5 i or 5 i}.
3 3 6 6 6 6
Notice that 6 5 i is a zero of x6 + 5. We can show that this polynomial is
irreducible over Q using Eisensteins Criterion, where we let p = 5. Conse-
quently,
6 3
Q Q( 5 ) Q( 5, 5 i).
But it must be the case that Q( 6 5 i) = Q( 3 5, 5 i), since the degree of
both of these extensions is 6.
1. E is a finite extension of F .
E = F (1 , . . . , n ) F (1 , . . . , n1 ) F (1 ) F,
Algebraic Closure
Given a field F , the question arises as to whether or not we can find a field
E such that every polynomial p(x) has a root in E. This leads us to the
following theorem.
Corollary 21.12 The set of all algebraic numbers forms a field; that is, the
set of all complex numbers that are algebraic over Q makes up a field.
where deg q2 (x) = deg p(x) 2. The process must eventually stop since the
degree of p(x) is finite.
Conversely, suppose that every nonconstant polynomial p(x) in F [x] fac-
tors into linear factors. Let ax b be such a factor. Then p(b/a) = 0.
Consequently, F is algebraically closed.
It is a nontrivial fact that every field has a unique algebraic closure. The
proof is not extremely difficult, but requires some rather sophisticated set
theory. We refer the reader to [3], [4], or [8] for a proof of this result.
We now state the Fundamental Theorem of Algebra, first proven by
Gauss at the age of 22 in his doctoral thesis. This theorem states that
every polynomial with coefficients in the complex numbers has a root in the
complex numbers. The proof of this theorem will be given in Chapter 23.
F such that p(x) factors into a product of linear polynomials? What is the
smallest extension containing all the roots of p(x)?
Let F be a field and p(x) = a0 + a1 x + + an xn be a nonconstant
polynomial in F [x]. An extension field E of F is a splitting field of p(x)
if there exist elements 1 , . . . , n in E such that E = F (1 , . . . , n ) and
p(x) = (x 1 )(x 2 ) (x n ).
A polynomial p(x) F [x] splits in E if it is the product of linear factors
in E[x].
Example 11. Let p(x) = x3 3 be in Q[x]. Then p(x) has a root in the
3
field Q( 3 ). However, this field is not a splitting field for p(x) since the
complex cube roots of 3,
3 3 ( 6 3 )5 i
,
2
are not in Q( 3 3 ).
Proof. If p(x) has degree n, then by Theorem 21.5 we can write any
element in E() as a linear combination of 1, , . . . , n1 . Therefore, the
isomorphism that we are seeking must be
where
a0 + a1 + + an1 n1
is an element in E(). The fact that is an isomorphism could be checked by
direct computation; however, it is easier to observe that is a composition
of maps that we already know to be isomorphisms.
We can extend to be an isomorphism from E[x] to F [x], which we will
also denote by , by letting
1. Given an arbitrary angle, can one trisect the angle into three equal
subangles using only a straightedge and compass?
2. Given an arbitrary circle, can one construct a square with the same
area using only a straightedge and compass?
3. Given a cube, can one construct the edge of another cube having
twice the volume of the original? Again, we are only allowed to use a
straightedge and compass to do the construction.
After puzzling mathematicians for over two thousand years, each of these
constructions was finally shown to be impossible. We will use the theory of
fields to provide a proof that the solutions do not exist. It is quite remarkable
that the long-sought solution to each of these three geometric problems came
from abstract algebra.
First, let us determine more specifically what we mean by a straightedge
and compass, and also examine the nature of these problems in a bit more
depth. To begin with, a straightedge is not a ruler. We cannot measure
arbitrary lengths with a straightedge. It is merely a tool for drawing a line
through two points. The statement that the trisection of an arbitrary angle is
impossible means that there is at least one angle that is impossible to trisect
with a straightedge-and-compass construction. Certainly it is possible to
trisect an angle in special cases. We can construct a 30 angle; hence, it is
possible to trisect a 90 angle. However, we will show that it is impossible
to construct a 20 angle. Therefore, we cannot trisect a 60 angle.
Constructible Numbers
A real number is constructible if we can construct a line segment of
length || in a finite number of steps from a segment of unit length by using
a straightedge and compass.
Theorem 21.21 The set of all constructible real numbers forms a subfield
F of the field of real numbers.
1
C
A E
x
Lemma 21.22 If is a constructible number, then is a constructible
number.
Proof. In Figure 21.2 the triangles 4ABD, 4BCD, and 4ABC are
similar; hence, 1/x = x/, or x2 = .
1
A D C
By Theorem 21.21, we can locate in the plane any point P = (p, q) that
has rational coordinates p and q. We need to know what other points can
be constructed with a compass and straightedge from points with rational
coordinates.
346 CHAPTER 21 FIELDS
Proof. Let (x1 , y1 ) and (x2 , y2 ) be points on a line whose coordinates are
in F . If x1 = x2 , then the equation of the line through the two points is
xx1 = 0, which has the form ax+by +c = 0. If x1 6= x2 , then the equation
of the line through the two points is given by
y2 y1
y y1 = (x x1 ),
x2 x1
which can also be put into the proper form.
To prove the second part of the lemma, suppose that (x1 , y1 ) is the center
of a circle of radius r. Then the circle has the equation
(x x1 )2 + (y y1 )2 r2 = 0.
x2 + y 2 + d1 x + e1 x + f1 = 0
x2 + y 2 + d2 x + e2 x + f2 = 0
21.3 GEOMETRIC CONSTRUCTIONS 347
x2 + y 2 + d1 x + e1 x + f1 = 0
ax + by + c = 0
2 2
x + y + dx + ey + f = 0.
Q = F0 F1 Fk
such that Fi = Fi1 ( i ) with Fk . In particular, there exists an integer
k > 0 such that [Q() : Q] = 2k .
348 CHAPTER 21 FIELDS
Trisecting an Angle
Trisecting an arbitrary angle is impossible. We will show that it is impossible
to construct a 20 angle. Consequently, a 60 angle cannot be trisected. We
first need to calculate the triple-angle formula for the cosine:
cos 3 = cos(2 + )
= cos 2 cos sin 2 sin
= (2 cos2 1) cos 2 sin2 cos
= (2 cos2 1) cos 2(1 cos2 ) cos
= 4 cos3 3 cos .
cosine,
1
43 3 = .
2
Therefore, is a zero of 8x3 6x1. This polynomial has no factors in Z[x],
and hence is irreducible over Q[x]. Thus, [Q() : Q] = 3. Consequently,
cannot be a constructible number.
Historical Note
Algebraic number theory uses the tools of algebra to solve problems in number
theory. Modern algebraic number theory began with Pierre de Fermat (16011665).
Certainly we can find many positive integers that satisfy the equation x2 + y 2 =
z 2 ; Fermat conjectured that the equation xn + y n = z n has no positive integer
solutions for n 3. He stated in the margin of his copy of the Latin translation of
Diophantus Arithmetica that he had found a marvelous proof of this theorem, but
that the margin of the book was too narrow to contain it. Building on work of other
mathematicians, it was Andrew Wiles who finally succeeded in proving Fermats
Last Theorem in the 1990s. Wiless achievement was reported on the front page of
the New York Times.
Attempts to prove Fermats Last Theorem have led to important contribu-
tions to algebraic number theory by such notable mathematicians as Leonhard
Euler (17071783). Significant advances in the understanding of Fermats Last
Theorem were made by Ernst Kummer (18101893). Kummers student, Leopold
Kronecker (18231891), became one of the leading algebraists of the nineteenth
century. Kroneckers theory of ideals and his study of algebraic number theory
added much to the understanding of fields.
David Hilbert (18621943) and Hermann Minkowski (18641909) were among
the mathematicians who led the way in this subject at the beginning of the twentieth
century. Hilbert and Minkowski were both mathematicians at Gottingen University
in Germany. Gottingen was truly one the most important centers of mathematical
research during the last two centuries. The large number of exceptional mathemati-
cians who studied there included Gauss, Dirichlet, Riemann, Dedekind, Noether,
and Weyl.
Andre Weil answered questions in number theory using algebraic geometry, a
field of mathematics that studies geometry by studying commutative rings. From
about 1955 to 1970, A. Grothendieck dominated the field of algebraic geometry.
Pierre Deligne, a student of Grothendieck, solved several of Weils number-theoretic
conjectures. One of the most recent contributions to algebra and number theory is
Gerd Faltings proof of the Mordell-Weil conjecture. This conjecture of Mordell and
Weil essentially says that certain polynomials p(x, y) in Z[x, y] have only a finite
number of integral solutions.
350 CHAPTER 21 FIELDS
Exercises
1. Show that each of the following numbers is algebraic over Q by finding the
minimal polynomial of the number over Q.
q
(a) 1/3 + 7
(b) 3 + 3 5
(c) 3 + 2 i
(d) cos + i sin for = 2/n with n N
p
3
(e) 2i
2. Find a basis for each of the following field extensions. What is the degree of
each extension?
(a) Q( 3, 6 ) over Q
(b) Q( 3 2, 3 3 ) over Q
(c) Q( 2, i) over Q
(d) Q( 3, 5, 7 ) over Q
(e) Q( 2, 3 2 ) over Q
(f) Q( 8 ) over Q( 2 )
(g) Q(i, 2 + i, 3 + i) over Q
(h) Q( 2 + 5 ) over Q( 5 )
(i) Q( 2, 6 + 10 ) over Q( 3 + 5 )
3. Find the splitting field for each of the following polynomials.
353
354 CHAPTER 22 FINITE FIELDS
= a1 1 + + an n ,
Fortunately, we have an easy test to determine the separability of any
polynomial. Let
f (x) = a0 + a1 x + + an xn
be any polynomial in F [x]. Define the derivative of f (x) to be
Lemma 22.4 Let F be a field and f (x) F [x]. Then f (x) is separable if
and only if f (x) and f 0 (x) are relatively prime.
Proof. Let f (x) be separable. Then f (x) factors over some extension field
of F as f (x) = (x 1 )(x 2 ) (x n ), where i 6= j for i 6= j. Taking
the derivative of f (x), we see that
f 0 (x) = (x 2 ) (x n )
+ (x 1 )(x 3 ) (x n )
+ + (x 1 ) (x n1 ).
Theorem 22.5 For every prime p and every positive integer n, there exists
a finite field F with pn elements. Furthermore, any field of order pn is
n
isomorphic to the splitting field of xp x over Zp .
356 CHAPTER 22 FINITE FIELDS
n
Proof. Let f (x) = xp x and let F be the splitting field of f (x). Then by
n
Lemma 20.4, f (x) has pn distinct zeros in F , since f 0 (x) = pn xp 1 1 = 1
is relatively prime to f (x). We claim that the roots of f (x) form a subfield
of F . Certainly 0 and 1 are zeros of f (x). If and are zeros of f (x),
n n n
then + and are also zeros of f (x), since p + p = ( + )p
n n n
and p p = ()p . We also need to show that the additive inverse and
the multiplicative inverse of each root of f (x) are roots of f (x). For any
zero of f (x), = (p 1) is also a zero of f (x). If 6= 0, then
n n
(1 )p = (p )1 = 1 . Since the zeros of f (x) form a subfield of F and
f (x) splits in this subfield, the subfield must be all of F .
Let E be any other field of order pn . To show that E is isomorphic
to F , we must show that every element in E is a root of f (x). Certainly
0 is a root of f (x). Let be a nonzero element of E. The order of the
n
multiplicative group of nonzero elements of E is pn 1; hence, p 1 = 1
n
or p = 0. Since E contains pn elements, E must be a splitting field
of f (x); however, by Corollary 21.20, the splitting field of any polynomial is
unique up to isomorphism.
The unique finite field with pn elements is called the Galois field of
order pn . We will denote this field by GF(pn ).
Theorem 22.6 Every subfield of the Galois field GF(pn ) has pm elements,
where m divides n. Conversely, if m | n for m > 0, then there exists a
unique subfield of GF(pn ) isomorphic to GF(pm ).
GF(p24 )
GF(p8 ) GF(p12 )
GF(p4 ) GF(p6 )
GF(p2 ) GF(p3 )
GF(p)
1 = 6 = 2 + 3 11 = + 2 + 3
2 = 2 7 = 1 + + 3 12 = 1 + + 2 + 3
3 = 3 8 = 1 + 2 13 = 1 + 2 + 3
4 = 1+ 9 = + 3 14 = 1 + 3
5 = + 2 10 = 1 + + 2 15 = 1.
Example 4. Consider the (6, 3)-linear codes generated by the two matrices
1 0 0 1 0 0
0 1 0 1 1 0
0 0 1 1 1 1
G1 =
and G2 = 1 1 1 .
1 0 0
0 1 0 0 1 1
0 0 1 0 0 1
It is easy to see that the codewords form a cyclic code. In the second code,
3-tuples are encoded in the following manner:
This code cannot be cyclic, since (101101) is a codeword but (011011) is not
a codeword.
Polynomial Codes
We would like to find an easy method of obtaining cyclic linear codes. To
accomplish this, we can use our knowledge of finite fields and polynomial
rings over Z2 . Any binary n-tuple can be interpreted as a polynomial in
Z2 [x]. Stated another way, the n-tuple (a0 , a1 , . . . , an1 ) corresponds to the
polynomial
f (x) = a0 + a1 x + + an1 xn1 ,
where the degree of f (x) is at most n 1. For example, the polynomial
corresponding to the 5-tuple (10011) is
Conversely, with any polynomial f (x) Z2 [x] with deg f (x) < n we can
associate a binary n-tuple. The polynomial x + x2 + x4 corresponds to the
5-tuple (01101).
Let us fix a nonconstant polynomial g(x) in Z2 [x] of degree n k. We can
define an (n, k)-code C in the following manner. If (a0 , . . . , ak1 ) is a k-tuple
to be encoded, then f (x) = a0 + a1 x + + ak1 xk1 is the corresponding
polynomial in Z2 [x]. To encode f (x), we multiply by g(x). The codewords
in C are all those polynomials in Z2 [x] of degree less than n that are divisible
by g(x). Codes obtained in this manner are called polynomial codes.
(1 + x3 ) 1 = 1 + x3
(1 + x3 )x = x + x4
(1 + x3 )x3 = x2 + x5 .
Since the smallest weight of any nonzero codeword is 2, this code has the
ability to detect all single errors.
Rings of polynomials have a great deal of structure; therefore, our imme-
diate goal is to establish a link between polynomial codes and ring theory.
Recall that xn 1 = (x 1)(xn1 + + x + 1). The factor ring
Rn = Z2 [x]/hxn 1i
that satisfy the condition tn = 1. It is an easy exercise to show that Zn2 and
Rn are isomorphic as vector spaces. We will often identify elements in Zn2
with elements in Z[x]/hxn 1i. In this manner we can interpret a linear
code as a subset of Z[x]/hxn 1i.
The additional ring structure on polynomial codes is very powerful in
describing cyclic codes. A cyclic shift of an n-tuple can be described by
22.2 POLYNOMIAL CODES 361
x7 1 = (1 + x)(1 + x + x3 )(1 + x2 + x3 ).
Example 7. In Example 6,
x7 1 = g(x)h(x) = (1 + x + x3 )(1 + x + x2 + x4 ).
22.2 POLYNOMIAL CODES 363
p(x) = (x 1 )(x 2 ) (x n1 ),
where
1 1 1
1 2 n1
= (1)n+n det
12 22 2
n1 .
.. .. .. ..
. . . .
1n2 2n2 n2
n1
By our induction hypothesis,
Y
= (1)n+n (i j ).
1j<in1
g( r ) = g( r+1 ) = = g( r+s1 ) = 0.
f ( r ) = f ( r+1 ) = = f ( r+s1 ) = 0.
22.2 POLYNOMIAL CODES 365
( i0 )r x0 + ( i1 )r x1 + + ( is1 )r xn1 = 0
( i0 )r+1 x0 + ( i1 )r+1 x1 + + ( is1 )r+1 xn1 = 0
..
.
( i0 )r+s1 x0 + ( i1 )r+s1 x1 + + ( is1 )r+s1 xn1 = 0.
However, this system has a unique solution, since the determinant of the
matrix
( i0 )r ( i1 )r ( is1 )r
( i0 )r+1 ( i1 )r+1 ( is1 )r+1
.. .. . . ..
. . . .
i
( )0 r+s1 i
( )1 r+s1 ( i s1 ) r+s1
can be shown to be nonzero using Lemma 22.12 and the basic properties of
determinants (Exercise). Therefore, this solution must be ai0 = ai1 = =
ais1 = 0.
BCH Codes
Some of the most important codes, discovered independently by A. Hoc-
quenghem in 1959 and by R. C. Bose and D. V. Ray-Chaudhuri in 1960, are
BCH codes. The European and transatlantic communication systems both
use BCH codes. Information words to be encoded are of length 231, and
a polynomial of degree 24 is used to generate the code. Since 231 + 24 =
255 = 28 1, we are dealing with a (255, 231)-block code. This BCH code
will detect six errors and has a failure rate of 1 in 16 million. One advantage
of BCH codes is that efficient error correction algorithms exist for them.
The idea behind BCH codes is to choose a generator polynomial of small-
est degree that has the largest error detection and error correction capabil-
ities. Let d = 2r + 1 for some r 0. Suppose that is a primitive nth root
366 CHAPTER 22 FINITE FIELDS
Proof. (1) (2). If f (t) is in C, then g(x) | f (x) in Z2 [x]. Hence, for
i = 1, . . . , 2r, f ( i ) = 0 since g( i ) = 0. Conversely, suppose that f ( i ) = 0
for 1 i d. Then f (x) is divisible by each mi (x), since mi (x) is the
minimal polynomial of i . Therefore, g(x) | f (x) by the definition of g(x).
Consequently, f (x) is a codeword.
(2) (3). Let f (t) = a0 + a1 t + + an1 vtn1 be in Rn . The corre-
sponding n-tuple in Zn2 is x = (a0 a1 an1 )t . By (2),
a0 + a1 + + an1 n1
f ()
a0 + a1 2 + + an1 ( 2 )n1 f ( 2 )
Hx = = .. = 0
..
. .
a0 + a1 2r + + an1 ( 2r )n1 f ( 2r )
exactly when f (t) is in C. Thus, H is a parity-check matrix for C.
(3) (1). By (3), a code polynomial f (t) = a0 + a1 t + + an1 tn1 is
in C exactly when f ( i ) = 0 for i = 1, . . . , 2r. The smallest such polynomial
is g(t) = lcm[m1 (t), . . . , m2r (t)]. Therefore, C = hg(t)i.
Exercises
1. Calculate each of the following.
(a) x5 1 (c) x9 1
6 5 4 3 2
(b) x + x + x + x + x + x + 1 (d) x4 + x3 + x2 + x + 1
12. Prove or disprove: There exists a finite field that is algebraically closed.
13. Let p be prime. Prove that the field of rational functions Zp (x) is an infinite
field of characteristic p.
n
14. Let D be an integral domain of characteristic p. Prove that (a b)p =
n n
ap bp for all a, b D.
15. Show that every element in a finite field can be written as the sum of two
squares.
16. Let E and F be subfields of a finite field K. If E is isomorphic to F , show
that E = F .
17. Let F E K be fields. If K is separable over F , show that K is also
separable over E.
18. Let E be an extension of a finite field F , where F has q elements. Let E
be algebraic over F of degree n. Prove that F () has q n elements.
19. Show that every finite extension of a finite field F is simple; that is, if E is
a finite extension of a finite field F , prove that there exists an E such
that E = F ().
20. Show that for every n there exists an irreducible polynomial of degree n
in Zp [x].
21. Prove that the Frobenius map : GF(pn ) GF(pn ) given by : 7 p
is an automorphism of order n.
22. Show that every element in GF(pn ) can be written in the form ap for some
unique a GF(pn ).
23. Let E and F be subfields of GF(pn ). If |E| = pr and |F | = ps , what is the
order of E F ?
24. Wilsons Theorem. Let p be prime. Prove that (p 1)! 1 (mod p).
EXERCISES 369
25. If g(t) is the minimal generator polynomial for a cyclic code C in Rn , prove
that the constant term of g(x) is 1.
26. Often it is conceivable that a burst of errors might occur during transmission,
as in the case of a power surge. Such a momentary burst of interference
might alter several consecutive bits in a codeword. Cyclic codes permit the
detection of such error bursts. Let C be an (n, k)-cyclic code. Prove that
any error burst up to n k digits can be detected.
27. Prove that the rings Rn and Zn2 are isomorphic as vector spaces.
28. Let C be a code in Rn that is generated by g(t). If hf (t)i is another code in
Rn , show that hg(t)i hf (t)i if and only if f (x) divides g(x) in Z2 [x].
29. Let C = hg(t)i be a cyclic code in Rn and suppose that xn 1 = g(x)h(x),
where g(x) = g0 + g1 x + + gnk xnk and h(x) = h0 + h1 x + + hk xk .
Define G to be the n k matrix
g0 0 0
g1 g0 0
.. .. ..
. .
.
. . .
G = gnk gnk1
g0
0
gnk g1
. .. .. ..
.. . . .
0 0 gnk
s(x) = (x + a1 )(x + a2 ) (x + ak ).
3. Recall the (15, 7)-block BCH code in Example 7. By Theorem 8.3, this code
is capable of correcting two errors. Suppose that these errors occur in bits
a1 and a2 . The error-locator polynomial is s(x) = (x + a1 )(x + a2 ). Show
that
2 2 s3
s(x) = x + s1 x + s1 + .
s1
Finally, at the beginning of the nineteenth century, Ruffini and Abel both
found quintics that could not be solved with any formula. It was Galois,
however, who provided the full explanation by showing which polynomials
could and could not be solved by formulas. He discovered the connection
between groups and field extensions. Galois theory demonstrates the strong
interdependence of group and field theory, and has had far-reaching impli-
cations beyond its original purpose.
In this chapter we will prove the Fundamental Theorem of Galois Theory.
This result will be used to establish the insolvability of the quintic and to
prove the Fundamental Theorem of Algebra.
371
372 CHAPTER 23 GALOIS THEORY
Proof. We need only show that the set of automorphisms of E that fix F
elementwise is a subgroup of the group of all automorphisms of E. Let
and be two automorphisms of E such that () = and () = for all
F . Then () = () = and 1 () = . Since the identity fixes
every element of E, the set of automorphisms of E that leave elements of F
fixed is a subgroup of the entire group of automorphisms of E.
Let E be a field extension of F . We will denote the full group of auto-
morphisms of E by Aut(E). We define the Galois group of E over F to
be the group of automorphisms of E that fix F elementwise; that is,
(a) = (a + 0i) = a 0i = a,
id
id id
id
id
id
We may alsoregard
the field Q( 3, 5 ) as a vector space over
Q that
hasbasis
{1, 3, 5, 15 }. It is no coincidence that |G(Q( 3, 5 )/Q)| =
[Q( 3, 5 ) : Q)] = 4.
Proof. Let
f (x) = a0 + a1 x + a2 x2 + + an xn
and suppose that E is a zero of f (x). Then for G(E/F ),
0 = (0)
= (f ())
= (a0 + a1 + a2 2 + + an n )
= a0 + a1 () + a2 [()]2 + + an [()]n ;
Theorem 23.5 Let f (x) be a polynomial in F [x] and suppose that E is the
splitting field for f (x) over F . If f (x) has no repeated roots, then
|G(E/F )| = [E : F ].
374 CHAPTER 23 GALOIS THEORY
Proof. The proof is similar to the proof of Theorem 21.19. We will use
mathematical induction on the degree of f (x). If the degree of f (x) is 0 or
1, then E = F and there is nothing to show. Assume that the result holds
for all polynomials of degree k with 0 k < n. Let p(x) be an irreducible
factor of f (x) of degree r. Since all of the roots of p(x) are in E, we can
choose one of these roots, say , so that F F () E. If is any other
root of p(x), then F F () E. By Lemma 21.18, there exists a unique
isomorphism : F () F () for each such that fixes F elementwise.
Since E is a splitting field of F (), there are exactly r such isomorphisms.
We can factor p(x) in F () as p(x) = (x )p1 (x). The degrees of p1 (x)
and q1 (x) are both less than r. Since we know that E is the splitting field
of p1 (x) over F (), we can apply the induction hypothesis to conclude that
[E : F ] = [E : F ()][F () : F ]
Corollary 23.6 Let F be a finite field with a finite extension E such that
[E : F ] = k. T hen G(E/F ) is cyclic.
Proof. Let p be the characteristic of E and F and assume that the orders
of E and F are pm and pn , respectively. Then nk = m. We can also assume
m
that E is the splitting field of xp x over a subfield of order p. Therefore,
m
E must also be the splitting field of xp x over F . Applying Theorem 23.5,
we find that |G(E/F )| = k.
To prove that G(E/F ) is cyclic, we must find a generator for G(E/F ).
n
Let : E E be defined by () = p . We claim that is the element
in G(E/F ) that we are seeking. We first need to show that is in Aut(E).
If and are in E,
n n n
( + ) = ( + )p = p + p = () + ()
f (x) = x4 + x3 + x2 + x + 1
= cos(2/5) + i sin(2/5).
Hence, the splitting field of f (x) must be Q(). We can define automor-
phisms i of Q() by i () = i for i = 1, . . . , 4. It is easy to check that
these are indeed distinct automorphisms in G(Q()/Q). Since
[Q() : Q] = |G(Q()/Q)| = 4,
Separable Extensions
Many of the results that we have just proven depend on the fact that a
polynomial f (x) in F [x] has no repeated roots in its splitting field. It is
evident that we need to know exactly when a polynomial factors into distinct
linear factors in its splitting field. Let E be the splitting field of a polynomial
f (x) in F [x]. Suppose that f (x) factors over E as
r
Y
f (x) = (x 1 )n1 (x 2 )n2 (x r )nr = (x i )ni .
i=1
376 CHAPTER 23 GALOIS THEORY
Proof. First assume that charF = 0. Since deg f 0 (x) < deg f (x) and
f (x) is irreducible, the only way gcd(f (x), f 0 (x)) 6= 1 is if f 0 (x) is the zero
polynomial; however, this is impossible in a field of characteristic zero. If
charF = p, then f 0 (x) can be the zero polynomial if every coefficient of f (x)
is a multiple of p. This can happen only if we have a polynomial of the form
f (x) = a0 + a1 xp + a2 x2p + + an xnp .
Certainly extensions of a field F of the form F () are some of the easiest
to study and understand. Given a field extension E of F , the obvious
question to ask is when it is possible to find an element E such that
E = F (). In this case, is called a primitive element. We already know
that primitive elements exist for certain extensions. For example,
Q( 3, 5 ) = Q( 3 + 5 )
and
3 6
Q( 5, 5 i) = Q( 5 i).
Corollary 22.9 tells us that there exists a primitive element for any finite
extension of a finite field. The next theorem tells us that we can often find
a primitive element.
i (a b) = i (a) i (b) = a b
and
i (ab) = i (a)i (b) = ab.
If a 6= 0, then i(a1 )
= [i (a)]1 = a1 . Finally, i (0) = 0 and i (1) = 1
since i is an automorphism.
FG = { F : () = for all G}
is a subfield of F .
378 CHAPTER 23 GALOIS THEORY
The subfield F{i } of F is called the fixed field of {i }. The field fixed
for a subgroup G of Aut(F ) will be denoted by FG .
Example 5. Let : Q( 3, 5 ) Q( 3, 5 ) be theautomorphism
that
maps 3 to 3. Then Q( 5 ) is the subfield of Q( 3, 5 ) left fixed by
.
|G| = [E : EG ] = [E : F ].
a1 1 + a2 2 + + an+1 n+1 = 0.
has more equations than unknowns. From linear algebra we know that this
system has a nontrivial solution, say xi = ai for i = 1, 2, . . . , n + 1. Since 1
is the identity, the first equation translates to
a1 1 + a2 2 + + an+1 n+1 = 0.
23.2 THE FUNDAMENTAL THEOREM 379
x1 = 1 1 = 0
x2 = a2 i (a2 )
..
.
xn+1 = an+1 i (an+1 )
Let f (x) be the minimal polynomial of over F . The field E must contain
all of the roots of f (x) since it is a normal extension F ; hence, E is a splitting
field for f (x).
(2) (3). Let E be the splitting field over F of a separable polynomial.
By Proposition 23.11, EG(E/F ) = F . Since |G(E/F )| = [E : F ], this is a
finite group.
(3) (1). Let F = EG for some finite group of automorphisms G of E.
Since [E : F ] |G|, E is a finite extension of F . To show that E is a finite,
normal extension of F , let f (x) F [x] be an irreducible monic polynomial
that has a root in E. We must show that f (x) is the product of distinct
linear factors in E[x]. By Proposition 23.3, automorphisms in G permute
the roots of f (x) lying in E. Hence, if we let G Q act on , we can obtain
distinct roots 1 = , 2 , . . . , n in E. Let g(x) = ni=1 (x i ). Then g(x)
is separable over F and g() = 0. Any automorphism in G permutes the
factors of g(x) since it permutes these roots; hence, when acts on g(x), it
must fix the coefficients of g(x). Therefore, the coefficients of g(x) must be
in F . Since deg g(x) deg f (x) and f (x) is the minimal polynomial of ,
f (x) = g(x).
[K : F ] |G| |G(K/F )| = [K : F ].
It follows that G = G(K/F ), since they must have the same order.
Before we determine the exact correspondence between field extensions
and automorphisms of fields, let us return to a familiar example.
Example 6. In Example 2 we examined the automorphisms of Q( 3, 5 )
fixing Q. Figure 23.1 compares
the
lattice of field extensions of Q with the
lattice of subgroups of G(Q( 3, 5 )/Q). The Fundamental Theorem of
Galois Theory tells us what the relationship is between the two lattices.
We are now ready to state and prove the Fundamental Theorem of Galois
Theory.
{id, , , } Q( 3, 5 )
{id, } {id, } {id, } Q( 3 ) Q( 5 ) Q( 15 )
{id} Q
Figure 23.1. G(Q( 3, 5 )/Q)
2. If F K E, then
G(K/F )
= G(E/F )/G(E/K).
E {id}
L G(E/L)
K G(E/K)
F G(E/F )
G(K/F )
= G(E/F )/G(E/K).
For G(E/F ), let K be the automorphism of K obtained by restrict-
ing to K. Since K is a normal extension, the argument in the preced-
ing paragraph shows that K G(K/F ). Consequently, we have a map
: G(E/F ) G(K/F ) defined by 7 K . This map is a group homomor-
phism since
( ) = ( )K = K K = ()( ).
23.2 THE FUNDAMENTAL THEOREM 383
Hence, the image of is G(K/F ) and is onto. Applying the First Isomor-
phism Theorem, we have
G(K/F )
= G(E/F )/G(E/K).
4
is a basis
of Q( 2, i) over Q. The lattice of field extensions of Q contained
4
in Q( 2, i) is illustrated in Figure 23.3(a).
The Galois groupG of f (x) must be of order 8. Let be the automor-
4 4
phism defined by ( 2 ) = 2 and (i) = i, and be the automorphism
defined by complex conjugation; that is, (i) = i. Then G has an ele-
ment of order 4 and an element of order 2. It is easy to verify by direct
computation that the elements of G are {id, , 2 , 3 , , , 2 , 3 } and
that the relations 2 = id, 4 = id, and = 1 are satisfied; hence, G
must be isomorphic to D4 . The lattice of subgroups of G is illustrated in
Figure 23.3(b).
Historical Note
Solutions for the cubic and quartic equations were discovered in the 1500s. At-
tempts to find solutions for the quintic equations puzzled some of historys best
mathematicians. In 1798, P. Ruffini submitted a paper that claimed no such so-
lution could be found; however, the paper was not well received. In 1826, Niels
384 CHAPTER 23 GALOIS THEORY
Q( 4 2, i)
Q( 4 2 ) Q( 4 2 i) Q( 2, i) Q((1 + i) 4 2 ) Q((1 i) 4 2 )
Q( 2 ) Q(i) Q( 2 i)
Q (a)
D4
{id} (b)
Henrik Abel (18021829) finally offered the first correct proof that quintics are not
always solvable by radicals.
Abel inspired the work of Evariste Galois. Born in 1811, Galois began to display
extraordinary mathematical talent at the age of 14. He applied for entrance to the
Ecole Polytechnique several times; however, he had great difficulty meeting the for-
mal entrance requirements, and the examiners failed to recognize his mathematical
genius. He was finally accepted at the Ecole Normale in 1829.
Galois worked to develop a theory of solvability for polynomials. In 1829, at
the age of 17, Galois presented two papers on the solution of algebraic equations
to the Academie des Sciences de Paris. These papers were sent to Cauchy, who
subsequently lost them. A third paper was submitted to Fourier, who died before
23.3 APPLICATIONS 385
he could read the paper. Another paper was presented, but was not published
until 1846.
Galoiss democratic sympathies led him into the Revolution of 1830. He was
expelled from school and sent to prison for his part in the turmoil. After his release
in 1832, he was drawn into a duel over a love affair. Certain that he would be
killed, he spent the evening before his death outlining his work and his basic ideas
for research in a long letter to his friend Chevalier. He was indeed dead the next
day, at the age of 21.
23.3 Applications
Solvability by Radicals
Throughout this section we shall assume that all fields have characteristic
zero to ensure that irreducible polynomials do not have multiple roots. The
immediate goal of this section is to determine when the roots of a polynomial
f (x) can be computed in a finite number of operations on the coefficients
of f (x). The allowable operations are addition, subtraction, multiplication,
division, and the extraction of nth roots. Certainly the solution to the
quadratic equation, ax2 + bx + c = 0, illustrates this process:
b b2 4ac
x= .
2a
The only one of these operations that might demand a larger field is the
taking of nth roots. We are led to the following definition.
An extension field E of a field F is an extension by radicals if there
are elements 1 , . . . , r K and positive integers n1 , . . . , nr such that
E = F (1 , . . . , r ),
Theorem 22.7, the nth roots of unity form a cyclic group. Any generator of
this group is called a primitive nth root of unity.
Proof. First suppose that F contains all of its nth roots of unity. The roots
of xn a are n a, n a, . . . , n1 n a, where is a primitive nth root of unity.
If is one of these roots, then distinct roots of xn 1 are , , . . . , n1 ,
and E = F (). Since G(E/F ) permutes the roots xn 1, the elements in
G(E/F ) must be determined by their action on these roots. Let and be
in G(E/F ) and suppose that () = i and () = j . If F contains the
roots of unity, then
() = ( j ) = j () = ij = i () = ( i ) = ().
E = F (1 , . . . , r ),
G(E/Fi1 )/G(E/Fi )
= G(Fi /Fi1 ).
Therefore, f (x) can have at most one maximum and one minimum. It is
easy to show that f (x) changes sign between 3 and 2, between 2 and 0,
23.3 APPLICATIONS 389
40
-4 -2 2 4
x
-40
and once again between 0 and 4 (Figure 23.4). Therefore, f (x) has exactly
three distinct real roots. The remaining two roots of f (x) must be complex
conjugates. Let K be the splitting field of f (x). Since f (x) has five distinct
roots in K and every automorphism of K fixing Q is determined by the
way it permutes the roots of f (x), we know that G(K/Q) is a subgroup of
S5 . Since f is irreducible, there is an element in G(K/Q) such that
(a) = b for two roots a and b of f (x). The automorphism of C that takes
a + bi 7 a bi leaves the real roots fixed and interchanges the complex
roots; consequently, G(K/Q) S5 . By Lemma 23.19, S5 is generated by
a transposition and an element of order 5; therefore, G(K/F ) must be all
of S5 . By Theorem 10.6, S5 is not solvable. Consequently, f (x) cannot be
solved by radicals.
For our proof we shall assume two facts from calculus. We need the
results that every polynomial of odd degree over R has a real root and that
every positive real number has a square root.
Proof. Suppose that E is a proper finite field extension of the complex
numbers. Since any finite extension of a field of characteristic zero is a
simple extension, there exists an E such that E = C() with the root
of an irreducible polynomial f (x) in C[x]. The splitting field L of f (x) is a
finite normal separable extension of C that contains E. We must show that
it is impossible for L to be a proper extension of C.
Suppose that L is a proper extension of C. Since L is the splitting field
of f (x)(x2 + 1) over R, L is a finite normal separable extension of R. Let
K be the fixed field of a Sylow 2-subgroup G of G(L/R). Then L K R
and |G(L/K)| = [L : K]. Since [L : R] = [L : K][K : R], we know that
[K : R] must be odd. Consequently, K = R() with having a minimal
polynomial f (x) of odd degree. Therefore, K = R.
We now know that G(L/R) must be a 2-group. It follows that G(L/C)
is a 2-group. We have assumed that L 6= C; therefore, |G(L/C)| 2. By the
first Sylow Theorem and the Fundamental Theorem of Galois Theory, there
exists a subgroup G of G(L/C) of index 2 and a field E fixed elementwise
by G. Then [E : C] = 2 and there exists an element E with minimal
polynomial x2 +bx+c in C[x]. This polynomial has roots (b b2 4c )/2
that are in C, since b2 4c is in C. This is impossible; hence, L = C.
Although our proof was strictly algebraic, we were forced to rely on
results from calculus. It is necessary to assume the completeness axiom
from analysis to show that every polynomial of odd degree has a real root
and that every positive real number has a square root. It seems that there
is no possible way to avoid this difficulty and formulate a purely algebraic
argument. It is somewhat amazing that there are several elegant proofs of
the Fundamental Theorem of Algebra that use complex analysis. It is also
interesting to note that we can obtain a proof of such an important theorem
from two very different fields of mathematics.
EXERCISES 391
Exercises
1. Compute each of the following Galois groups. Which of these field extensions
are normal field extensions? If the extension is not normal, find a normal
extension of Q in which the extension field is contained.
(a) G(Q( 30 )/Q) (d) G(Q( 2, 3 2, i)/Q)
(b) G(Q( 4 5 )/Q)
(c) G(Q( 2, 3, 5 )/Q) (e) G(Q( 6, i)/Q)
3. Give the order and describe a generator of the Galois group of GF(729)
over GF(9).
4. Determine the Galois groups of each of the following polynomials in Q[x];
hence, determine the solvability by radicals of each of the polynomials.
5. Find a primitive element in the splitting field of each of the following poly-
nomials in Q[x].
10. Let F E. If f (x) is solvable over F , show that f (x) is also solvable over
E.
11. Construct a polynomial f (x) in Q[x] of degree 7 that is not solvable by
radicals.
12. Let p be prime. Prove that there exists a polynomial f (x) Q[x] of degree
p with Galois group isomorphic to Sp . Conclude that for each prime p with
p 5 there exists a polynomial of degree p that is not solvable by radicals.
13. Let p be a prime and Zp (t) be the field of rational functions over Zp . Prove
that f (x) = xp t is an irreducible polynomial in Zp (t)[x]. Show that f (x)
is not separable.
14. Let E be an extension field of F . Suppose that K and L are two intermediate
fields. If there exists an element G(E/F ) such that (K) = L, then K
and L are said to be conjugate fields. Prove that K and L are conjugate
if and only if G(E/K) and G(E/L) are conjugate subgroups of G(E/F ).
15. Let Aut(R). If a is a positive real number, show that (a) > 0.
16. Let K be the splitting field of x3 + x2 + 1 Z2 [x]. Prove or disprove that K
is an extension by radicals.
17. Let F be a field such that char F 6= 2. Prove that the splitting field of
f (x) = ax2 + bx + c is F ( ), where = b2 4ac.
18. Prove or disprove: Two different subgroups of a Galois group will have dif-
ferent fixed fields.
19. Let K be the splitting field of a polynomial over F . If E is a field extension
of F contained in K and [E : F ] = 2, then E is the splitting field of some
polynomial in F [x].
20. We know that the cyclotomic polynomial
xp 1
p (x) = = xp1 + xp2 + + x + 1
x1
is irreducible over Q for every prime p. Let be a zero of p (x), and consider
the field Q().
(a) Show that , 2 , . . . , p1 are distinct zeros of p (x), and conclude that
they are all the zeros of p (x).
(b) Show that G(Q()/Q) is abelian of order p 1.
(c) Show that the fixed field of G(Q()/Q) is Q.
21. Let F be a finite field or a field of characteristic zero. Let E be a finite normal
extension of F with Galois group G(E/F ). Prove that F K L E if
and only if {id} G(E/L) G(E/K) G(E/F ).
EXERCISES 393
22. Let F be a field of characteristic zero and let f (x) F [x] be a separable
polynomial of degree n. If E isQthe splitting field of f (x), let 1 , . . . , n be the
roots of f (x) in E. Let = i6=j (i j ). We define the discriminant
of f (x) to be 2 .
(a) If f (x) = ax2 + bx + c, show that 2 = b2 4ac.
(b) If f (x) = x3 + px + q, show that 2 = 4p3 27q 2 .
(c) Prove that 2 is in F .
(d) If G(E/F ) is a transposition of two roots of f (x), show that
() = .
(e) If G(E/F ) is an even permutation of the roots of f (x), show that
() = .
(f) Prove that G(E/F ) is isomorphic to a subgroup of An if and only if
F.
(g) Determine the Galois groups of x3 + 2x 4 and x3 + x 3.
Chapter 1. Preliminaries
1. (a) {2}. (b) {5}.
2. (a) {(a, 1), (a, 2), (a, 3), (b, 1), (b, 2), (b, 3), (c, 1), (c, 2), (c, 3)}.
(d) .
6. If x A (B C), then either x A or x B C x A B and A C
x (A B) (A C) A (B C) (A B) (A C).
Conversely, x (A B) (A C) x A B and A C x
A or x is in both B and C x A(BC) (AB)(AC) A(BC).
Hence, A (B C) = (A B) (A C).
10. (A B) (A \ B) (B \ A) = (A B) (A B 0 ) (B A0 ) = [A (B
B 0 )] (B A0 ) = A (B A0 ) = (A B) (A A0 ) = A B.
14. A \ (B C) = A (B C)0 = (A A) (B 0 C 0 ) = (A B 0 ) (A C 0 ) =
(A \ B) (A \ C).
17. (a) Not a map. f (2/3) is undefined.
(c) Not a map. f (1/2) = 3/4 and f (2/4) = 3/8.
18. (a) One-to-one but not onto. f (R) = {x R : x > 0}.
(c) Neither one-to-one nor onto.
20. (a) f (n) = n + 1.
22. (a) Let x, y A. Then g(f (x)) = (g f )(x) = (g f )(y) = g(f (y)) f (x) =
f (y) x = y, so g f is one-to-one.
(b) Let c C, then c = (g f )(x) = g(f (x)) for some x A. Since f (x) B,
g is onto.
23. f 1 (x) = (x + 1)/(x 1).
24. (a) Let y f (A1 A2 ) there exists an x A1 A2 such that f (x) = y
y f (A1 ) or f (A2 ) y f (A1 ) f (A2 ) f (A1 A2 ) f (A1 ) f (A2 ).
395
396 HINTS AND SOLUTIONS
Chapter 3. Groups
1. (a) {. . . , 4, 3, 10, . . .}. (c) {. . . , 8, 18, 44, . . .}. (e) {. . . , 1, 5, 11, . . .}.
2. (a) Not a group. (c) A group.
6. 1 5 7 11
1 1 5 7 11
5 5 1 11 7
7 7 11 1 5
11 11 7 5 1
8. Pick two matrices. Almost any pair will work.
15. There is a group of order 6 that is nonabelian.
16. Look at the symmetry group of an equilateral triangle or a square.
17. There are actually five different groups of order 8.
18. Let
1 2 n
=
a1 a2 an
be in Sn . All of the ai s must be distinct. There are n ways to choose a1 ,
n 1 ways to choose a2 , . . ., 2 ways to choose an1 , and only one way to
choose an . Therefore, we can form in n(n 1) 2 1 = n! ways.
24. (aba1 )n = (aba1 )(aba1 ) (aba1 ) = ab(aa1 )b(aa1 )b (aa1 )ba1 =
abn a1 .
30. abab = (ab)2 = e = a2 b2 = aabb ba = ab.
34. H1 = {id}, H2 = {id, 1 , 2 }, H3 = {id, 1 }, H4 = {id, 2 }, H5 = {id, 3 },
S3 .
40. id = 1= 1 + 0 2, (a + b 2 )(c+ d 2 ) = (ac + 2bd) + (ad + bc) 2, and
(a + b 2 )1 = a/(a2 2b2 ) b 2/(a2 2b2 ).
45. Not a subgroup. Look at S3 .
48. a4 b = ba b = a6 b = a2 ba ab = a3 ba = ba.
(c) 3Z = {. . . , 3, 0, 3, 6, . . .}
1 + 3Z = {. . . , 2, 1, 4, 7, . . .}
2 + 3Z = {. . . , 1, 2, 5, 8, . . .}.
1 0
Cosets
C (00000) (00101) (10011) (10110)
(10000) + C (10000) (10101) (00011) (00110)
(01000) + C (01000) (01101) (11011) (11110)
(00100) + C (00100) (00001) (10111) (10010)
(00010) + C (00010) (00111) (10001) (10100)
(11000) + C (11000) (11101) (01011) (01110)
(01100) + C (01100) (01001) (11111) (11010)
(01010) + C (01010) (01111) (11001) (11100)
HINTS AND SOLUTIONS 401
A decoding table does not exist for C since it is only single error-detecting.
19. Let x C have odd weight and define a map from the set of odd codewords
to the set of even codewords by y 7 x+y. Show that this map is a bijection.
23. For 20 information positions, at least six check bits are needed to ensure an
error-correcting code.
Chapter 9. Isomorphisms
1. The group nZ is an infinite cyclic group generated by n. Every infinite cyclic
group is isomorphic to Z.
2. Define : C GL2 (R) by
a b
(a + bi) = .
b a
3. False.
6. Define a map from Zn into the nth roots of unity by k 7 cis(2k/n).
8. Assume that Q is cyclic and try to find a generator.
11. D4 , Q8 , Z8 , Z2 Z4 , Z2 Z2 Z2 .
16. (a) 12. (c) 5.
20. True.
25. Z2 Z2 Z13 is not cyclic.
27. Let a be a generator for G. If : G H is an isomorphism, show that (a)
is a generator for H.
38. Any automorphism of Z6 must send 1 to another generator of Z6 .
45. To show that is one-to-one, let g1 = h1 k1 and g2 = h2 k2 . Then (g1 ) =
(g2 ) (h1 k1 ) = (h2 k2 ) (h1 , k1 ) = (h2 , k2 ) h1 = h2 , k1 = k2
g1 = g2 .
13. Since eg = ge for all g G, the identity is in C(g). If x, y C(g), then xyg =
xgy = gxy xy C(g). If xg = gx, then x1 g = gx1 x1 C(g)
C(g) is a subgroup of G. If hgi is normal in G, then g1 xg11 g = gg1 xg11 for
all g1 G.
15. (a) Let g G and h G0 . If h = aba1 b1 , then ghg 1 = gaba1 b1 g 1 =
(gag 1 )(gbg 1 )(ga1 g 1 )(gb1 g 1 ) = (gag 1 )(gbg 1 )(gag 1 )1 (gbg 1 )1 .
We also need to show that if h = h1 hn with hi = ai bi a1 1
i bi , then ghg
1
1 1
is a product of elements of the same type. However, ghg = gh1 hn g =
(gh1 g 1 )(gh2 g 1 ) (ghn g 1 ).
1 1
kx + yk2 + kxk2 kyk2 = hx + y, x + yi kxk2 kyk2
1.
2 2
1
kxk2 + 2hx, yi + kyk2 kxk2 kyk2
=
2
= hx, yi.
10. Show that the kernel of the map det : O(n) R is SO(n).
13. True.
17. p6m.
HINTS AND SOLUTIONS 403
N = Nn Nn1 N1 N0 = {e}
G/N = Gn /N Gn1 /N G1 /N G0 /N = {N }.
The series
is a subnormal series. The factors of this series are abelian since Gi+1 /Gi
=
(Gi+1 /N )/(Gi /N ).
16. Use the fact that Dn has a cyclic subgroup of index 2.
21. G/G0 is abelian.
4. (a) {0}, {0, 9}, {0, 6, 12}, {0, 3, 6, 9, 12, 15}, {0, 2, 4, 6, 8, 10, 12, 14, 16}.
(c) There are no nontrivial ideals.
HINTS AND SOLUTIONS 405
30
10 15
2 5 3
5. False.
6. (a) (a b a0 ) a.
b a
a0
(c) a (a b).
a b
8. Not equivalent.
HINTS AND SOLUTIONS 407
T (u + v) = T (u) + T (v) = 0
T (v) = T (v) = 0 = 0.
(u + v) + (u0 + v 0 ) = (u + u0 ) + (v + v 0 ) U + V
(u + v) = u + v U + V.
8. False.
14. Suppose that E is algebraic over F and K is algebraic over E. Let K.
It suffices to show that is algebraic over some finite extension of F . Since
is algebraic over E, it must be the zero of some polynomial p(x) = 0 +
1 x + + n xn in E[x]. Hence is algebraic over F (0 , . . . , n ).
22. Q( 3, 7 ) Q( 3 + 7 ) since {1, 3, 7, 21 } is a basis for Q( 3, 7 )
over Q. Since [Q( 3, 7 ) : Q] = 4,[Q( 3 + 7 ) :Q] = 2 or 4. Sincethe
degree of the minimal polynomial of 3+ 7 is 4, Q( 3, 7 ) = Q( 3+ 7 ).
27. Let F () not in F . Then = p()/q(), where p and q are polynomials
in with q() 6= 0 and coefficients in F . If is algebraic over F , then
there exists a polynomial f (x) F [x] such that f () = 0. Let f (x) =
a0 + a1 x + + an xn . Then
n
p() p() p()
0 = f () = f = a0 + a1 + + an .
q() q() q()
Now multiply both sides by q()n to show that there is a polynomial in F [x]
that has as a zero.
Preamble
The purpose of this License is to make a manual, textbook, or other functional
and useful document free in the sense of freedom: to assure everyone the effective
freedom to copy and redistribute it, with or without modifying it, either commer-
cially or noncommercially. Secondarily, this License preserves for the author and
publisher a way to get credit for their work, while not being considered responsible
for modifications made by others.
This License is a kind of copyleft, which means that derivative works of the
document must themselves be free in the same sense. It complements the GNU
General Public License, which is a copyleft license designed for free software.
We have designed this License in order to use it for manuals for free software,
because free software needs free documentation: a free program should come with
manuals providing the same freedoms that the software does. But this License is
not limited to software manuals; it can be used for any textual work, regardless of
subject matter or whether it is published as a printed book. We recommend this
License principally for works whose purpose is instruction or reference.
410
GFDL LICENSE 411
below, refers to any such manual or work. Any member of the public is a licensee,
and is addressed as you. You accept the license if you copy, modify or distribute
the work in a way requiring permission under copyright law.
A Modified Version of the Document means any work containing the Doc-
ument or a portion of it, either copied verbatim, or with modifications and/or
translated into another language.
A Secondary Section is a named appendix or a front-matter section of
the Document that deals exclusively with the relationship of the publishers or au-
thors of the Document to the Documents overall subject (or to related matters)
and contains nothing that could fall directly within that overall subject. (Thus, if
the Document is in part a textbook of mathematics, a Secondary Section may not
explain any mathematics.) The relationship could be a matter of historical connec-
tion with the subject or with related matters, or of legal, commercial, philosophical,
ethical or political position regarding them.
The Invariant Sections are certain Secondary Sections whose titles are
designated, as being those of Invariant Sections, in the notice that says that the
Document is released under this License. If a section does not fit the above def-
inition of Secondary then it is not allowed to be designated as Invariant. The
Document may contain zero Invariant Sections. If the Document does not identify
any Invariant Sections then there are none.
The Cover Texts are certain short passages of text that are listed, as Front-
Cover Texts or Back-Cover Texts, in the notice that says that the Document is
released under this License. A Front-Cover Text may be at most 5 words, and a
Back-Cover Text may be at most 25 words.
A Transparent copy of the Document means a machine-readable copy, rep-
resented in a format whose specification is available to the general public, that is
suitable for revising the document straightforwardly with generic text editors or (for
images composed of pixels) generic paint programs or (for drawings) some widely
available drawing editor, and that is suitable for input to text formatters or for
automatic translation to a variety of formats suitable for input to text formatters.
A copy made in an otherwise Transparent file format whose markup, or absence
of markup, has been arranged to thwart or discourage subsequent modification by
readers is not Transparent. An image format is not Transparent if used for any
substantial amount of text. A copy that is not Transparent is called Opaque.
Examples of suitable formats for Transparent copies include plain ASCII with-
out markup, Texinfo input format, LaTeX input format, SGML or XML using
a publicly available DTD, and standard-conforming simple HTML, PostScript or
PDF designed for human modification. Examples of transparent image formats in-
clude PNG, XCF and JPG. Opaque formats include proprietary formats that can be
read and edited only by proprietary word processors, SGML or XML for which the
DTD and/or processing tools are not generally available, and the machine-generated
HTML, PostScript or PDF produced by some word processors for output purposes
only.
The Title Page means, for a printed book, the title page itself, plus such
following pages as are needed to hold, legibly, the material this License requires to
412 GFDL LICENSE
appear in the title page. For works in formats which do not have any title page
as such, Title Page means the text near the most prominent appearance of the
works title, preceding the beginning of the body of the text.
A section Entitled XYZ means a named subunit of the Document whose ti-
tle either is precisely XYZ or contains XYZ in parentheses following text that trans-
lates XYZ in another language. (Here XYZ stands for a specific section name men-
tioned below, such as Acknowledgements, Dedications, Endorsements,
or History.) To Preserve the Title of such a section when you modify the
Document means that it remains a section Entitled XYZ according to this defi-
nition.
The Document may include Warranty Disclaimers next to the notice which
states that this License applies to the Document. These Warranty Disclaimers
are considered to be included by reference in this License, but only as regards
disclaiming warranties: any other implication that these Warranty Disclaimers may
have is void and has no effect on the meaning of this License.
2. Verbatim Copying
You may copy and distribute the Document in any medium, either commercially or
noncommercially, provided that this License, the copyright notices, and the license
notice saying this License applies to the Document are reproduced in all copies, and
that you add no other conditions whatsoever to those of this License. You may not
use technical measures to obstruct or control the reading or further copying of the
copies you make or distribute. However, you may accept compensation in exchange
for copies. If you distribute a large enough number of copies you must also follow
the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you
may publicly display copies.
3. Copying In Quantity
If you publish printed copies (or copies in media that commonly have printed covers)
of the Document, numbering more than 100, and the Documents license notice
requires Cover Texts, you must enclose the copies in covers that carry, clearly and
legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover
Texts on the back cover. Both covers must also clearly and legibly identify you as
the publisher of these copies. The front cover must present the full title with all
words of the title equally prominent and visible. You may add other material on
the covers in addition. Copying with changes limited to the covers, as long as they
preserve the title of the Document and satisfy these conditions, can be treated as
verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should
put the first ones listed (as many as fit reasonably) on the actual cover, and continue
the rest onto adjacent pages.
GFDL LICENSE 413
4. Modifications
You may copy and distribute a Modified Version of the Document under the con-
ditions of sections 2 and 3 above, provided that you release the Modified Version
under precisely this License, with the Modified Version filling the role of the Docu-
ment, thus licensing distribution and modification of the Modified Version to who-
ever possesses a copy of it. In addition, you must do these things in the Modified
Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of
the Document, and from those of previous versions (which should, if there
were any, be listed in the History section of the Document). You may use
the same title as a previous version if the original publisher of that version
gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible
for authorship of the modifications in the Modified Version, together with at
least five of the principal authors of the Document (all of its principal authors,
if it has fewer than five), unless they release you from this requirement.
C. State on the Title page the name of the publisher of the Modified Version,
as the publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the
other copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the
public permission to use the Modified Version under the terms of this License,
in the form shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required
Cover Texts given in the Documents license notice.
414 GFDL LICENSE
The author(s) and publisher(s) of the Document do not by this License give
permission to use their names for publicity for or to assert or imply endorsement
of any Modified Version.
5. Combining Documents
You may combine the Document with other documents released under this License,
under the terms defined in section 4 above for modified versions, provided that
you include in the combination all of the Invariant Sections of all of the original
documents, unmodified, and list them all as Invariant Sections of your combined
work in its license notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple
identical Invariant Sections may be replaced with a single copy. If there are multiple
Invariant Sections with the same name but different contents, make the title of
each such section unique by adding at the end of it, in parentheses, the name of
the original author or publisher of that section if known, or else a unique number.
Make the same adjustment to the section titles in the list of Invariant Sections in
the license notice of the combined work.
In the combination, you must combine any sections Entitled History in the
various original documents, forming one section Entitled History; likewise com-
bine any sections Entitled Acknowledgements, and any sections Entitled Dedi-
cations. You must delete all sections Entitled Endorsements.
6. Collections Of Documents
You may make a collection consisting of the Document and other documents re-
leased under this License, and replace the individual copies of this License in the
various documents with a single copy that is included in the collection, provided
that you follow the rules of this License for verbatim copying of each of the docu-
ments in all other respects.
You may extract a single document from such a collection, and distribute it
individually under this License, provided you insert a copy of this License into the
extracted document, and follow this License in all other respects regarding verbatim
copying of that document.
ply to the other works in the aggregate which are not themselves derivative works
of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the
Document, then if the Document is less than one half of the entire aggregate,
the Documents Cover Texts may be placed on covers that bracket the Document
within the aggregate, or the electronic equivalent of covers if the Document is in
electronic form. Otherwise they must appear on printed covers that bracket the
whole aggregate.
8. Translation
Translation is considered a kind of modification, so you may distribute translations
of the Document under the terms of section 4. Replacing Invariant Sections with
translations requires special permission from their copyright holders, but you may
include translations of some or all Invariant Sections in addition to the original
versions of these Invariant Sections. You may include a translation of this License,
and all the license notices in the Document, and any Warranty Disclaimers, provided
that you also include the original English version of this License and the original
versions of those notices and disclaimers. In case of a disagreement between the
translation and the original version of this License or a notice or disclaimer, the
original version will prevail.
If a section in the Document is Entitled Acknowledgements, Dedications, or
History, the requirement (section 4) to Preserve its Title (section 1) will typically
require changing the actual title.
9. Termination
You may not copy, modify, sublicense, or distribute the Document except as ex-
pressly provided for under this License. Any other attempt to copy, modify, sub-
license or distribute the Document is void, and will automatically terminate your
rights under this License. However, parties who have received copies, or rights,
from you under this License will not have their licenses terminated so long as such
parties remain in full compliance.
either of that specified version or of any later version that has been published (not
as a draft) by the Free Software Foundation. If the Document does not specify a
version number of this License, you may choose any version ever published (not as
a draft) by the Free Software Foundation.
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace
the with . . . Texts. line with this:
with the Invariant Sections being LIST THEIR TITLES, with the
Front-Cover Texts being LIST, and with the Back-Cover Texts being
LIST.
If you have Invariant Sections without Cover Texts, or some other combination
of the three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend
releasing these examples in parallel under your choice of free software license, such
as the GNU General Public License, to permit their use in free software.
Notation
The following table defines the notation used in this book. Page numbers
refer to the first appearance of each symbol.
aA a is in the set A 4
N the natural numbers 5
Z the integers 5
Q the rational numbers 5
R the real numbers 5
C the complex numbers 5
AB A is a subset of B 5
the empty set 5
AB union of sets A and B 5
AB intersection of sets A and B 5
A0 complement of the set A 6
A\B difference between sets A and B 6
AB Cartesian product of sets A and B 8
An A A (n times) 8
id identity mapping 12
f 1 inverse of the function f 13
a b (mod n) a is congruent to b modulo n 17
n!
n factorial 24
n
binomial coefficient n!/(k!(n k)!) 24
k
m|n m divides n 27
gcd(m, n) greatest common divisor of m and n 27
P(X) power set of X 32
418
NOTATION 419
422
INDEX 423
Tartaglia, 277
Third Isomorphism Theorem
for groups, 171
for rings, 250
Thompson, J., 162, 223
Totally ordered set, 317
Transcendental element, 332
Transcendental number, 333
Transposition, 79
Trisection of an angle, 348