Prove that a^t = -1 (mod p^k) for

  • Thread starter xax
  • Start date
In summary, the conversation discussed proving the equation a^t = -1 (mod p^k) for p<>2, a prime number, and ord p^k (a) = 2t. It was explained that if the order of a is 2t, then one of the terms (a^t-1) or (a^t+1) will be equal to 0 mod p^k. It was also clarified that p cannot be 2 because the order is even.
  • #1
xax
26
0
Prove that a^t = -1 (mod p^k) for...

p<>2, prime and ord p^k (a) = 2t.
 
Physics news on Phys.org
  • #2
I am not certain about the meaning of p<>2, but if the order of a is 2t, then a^t==-1 Mod p^k...Because there are only two elements of order 2, and phi(2) =1, which tells us only one element belongs to 2. That is, if x^2==1 Mod P^k, then (x-1)(x+1) == 0 Mod P^k. So in an integral domain, one of the terms under discussion (a^t-1) or (a^t+1) will be equal to zero, Mod p^k.
 
Last edited:
  • #3
Thanks robert for your help, but how can I say that only a^t+1 = 0 mod p^k and it's not possible a^t-1=0 mod p^k?
Edit: p<>2 means p can't be 2.
 
  • #4
Because the order is even. If a^t-1 = 0 Mod p^k, then the order is odd.
 
  • #5
got it robert, thank you.
 

1. What does "a^t = -1 (mod p^k)" mean?

The equation "a^t = -1 (mod p^k)" means that when the number "a" is raised to the power of "t", and then divided by the number "p^k", the remainder is always -1.

2. What is the significance of this equation in science?

This equation is significant in mathematics and computer science, as it is used in modular arithmetic to solve problems related to number theory, cryptography, and coding theory.

3. Can this equation be proven?

Yes, this equation can be proven using mathematical induction or other methods in number theory. It is a known theorem and has been proven by many mathematicians.

4. What are the conditions for this equation to hold true?

The conditions for this equation to hold true are that "a" and "p" must be coprime (they have no common factors other than 1) and "p" must be a prime number. "t" and "k" can be any positive integers.

5. How is this equation used in real-life applications?

This equation has various real-life applications, including in computer security, where it is used in encryption and decryption algorithms. It is also used in coding theory to detect and correct errors in data transmission.

Similar threads

  • Linear and Abstract Algebra
Replies
2
Views
857
  • Linear and Abstract Algebra
Replies
1
Views
784
  • Linear and Abstract Algebra
Replies
17
Views
1K
Replies
2
Views
934
  • Linear and Abstract Algebra
Replies
2
Views
789
  • Linear and Abstract Algebra
Replies
11
Views
1K
  • Linear and Abstract Algebra
Replies
2
Views
801
  • Linear and Abstract Algebra
Replies
12
Views
1K
  • Linear and Abstract Algebra
Replies
3
Views
1K
  • Precalculus Mathematics Homework Help
Replies
17
Views
2K
Back
Top