How Is the Euler Totient Function Applied in Real Life?

  • Context: Undergrad 
  • Thread starter Thread starter matqkks
  • Start date Start date
  • Tags Tags
    Euler Function Phi
Click For Summary

Discussion Overview

The discussion revolves around the Euler Totient Function, its introduction, and its real-life applications, particularly in the context of cryptography and error correction codes. Participants explore theoretical aspects and practical implications of the function.

Discussion Character

  • Exploratory
  • Technical explanation
  • Conceptual clarification
  • Debate/contested

Main Points Raised

  • One participant questions the motivational introduction of the Euler Totient Function and its real-life applications, suggesting that the equation a^phi(n) = 1 (mod n) is a significant result but is unsure of other uses.
  • Another participant asserts that the function is integral to the RSA encryption scheme, indicating that it plays a role in cryptography, particularly in enabling passwordless connections via SSH.
  • A different participant elaborates on the function's application in RSA encryption, explaining that if n is a product of two or more prime numbers, phi(n) counts the integers from 1 to n-1 that are not multiples of those primes. They provide an example with n = 111.
  • This participant also discusses the concept of primitive roots in relation to prime numbers and finite fields, mentioning their relevance to Reed Solomon error correction codes and specific barcodes.
  • Further, they note that while phi(n) provides a certain value, it may not be the smallest exponent j that satisfies (a^j) mod n = 1, providing an example with n = 111 and a = 73.

Areas of Agreement / Disagreement

Participants express varying degrees of understanding and application of the Euler Totient Function, with some agreeing on its role in cryptography while others explore its implications in error correction codes. The discussion remains unresolved regarding the broader applications and significance of the function.

Contextual Notes

Participants mention specific mathematical properties and applications without reaching consensus on the overall significance or additional uses of the Euler Totient Function beyond those discussed.

matqkks
Messages
283
Reaction score
6
What is most motivating way of introducing this function? Does it in itself have any real life applications that have an impact. I can only think of a^phi(n)=1 (mod n) which is powerful result but is this function used elsewhere.
 
Mathematics news on Phys.org
It is part of the RSA encryption scheme. Is that what you mean? ssh RSA keys which allow passwordless connections over the ssh protocol rely on RSA.

So a more general answer might be "cryptography"
 
  • Like
Likes   Reactions: 1 person
I don't know what RSA encryption uses, but if n in (a^phi(n)) mod (n) = 1 is a product of 2 or more prime numbers, then phi(n) returns the count of how many numbers from 1 to n-1 are not multiples of those prime numbers. For example, if n = 3 x 37 = 111, then phi(n) = (3-1) (37-1) = 72, so there are 72 numbers from 1 to 110 not multiples of 3 or 37. Multpilication and division of any pair of those 72 numbers will produce a result that is part of the 72 number group, but addition and subraction may produce results that are not within the group.

If n is a prime number, then phi(n) is n-1, and there is at least one "primitive" often called "alpha" where every number 1 through n-1 mod n in the field can be considered as a power of "alpha" mod n. This can be the basis for a finite field group (add, subtract, multiply, divide all produce numbers within the group). Reed Solomon error correction code can be based on this type of finite field, such as pdf417 bar codes which use n = 929.

However, most error correction code is based on polynomials with singe bit coefficients (finite field mod 2) called a generator polynomial "g". Such a polynomial can be treated as a binary integer but the mathematical operations addition and subtraction are implemented as exclusive or. A finite field uses single bit polynomials modulo a generator polynomial "g".

Part of AES encryption calculates 1/x for 8 bit polynomials modulo the 9 bit polynomial [itex]1 x^8 + 1 x^4 + 1 x^3 + 1 x + 1[/itex] (hex 11b).
 
  • Like
Likes   Reactions: 1 person
I forgot to mention that although (a^phi(n)) mod n = 1, phi(n) may not be the smallest value that results in (a^j) mod n = 1. Using the example in my previous post for n = 3 x 37 = 111, j is never greater than 36, regardless of a, and in the case of a = 73, j is 2: (73^2) mod 111 = 1.
 

Similar threads

  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 6 ·
Replies
6
Views
4K
  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 8 ·
Replies
8
Views
3K
Replies
5
Views
2K
  • · Replies 4 ·
Replies
4
Views
3K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 10 ·
Replies
10
Views
2K
  • · Replies 1 ·
Replies
1
Views
2K
Replies
2
Views
3K