SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Fixed points and 2-cycles
         x
of x → x mod n
Joshua Holden
Forging a (variant) ElGamal Digital Signature
Frank the Forger wants to solve for r and s in:
                    H(m)     s r
(1)             g          ≡y r       (mod p).

He knows m, g , y , and p but not the discrete log of y
mod p base g . He could:
  calculate the discrete log of y ,
                      r     H(m) −s
  or he could solve r ≡ g       y (mod p) for r .
We wish to shed light on the difficulty of the second
                                              x
attack by studying the self-power map, x → x mod n,
                                           x
and the self-power multimap, x mod n → x mod n.
                                                                    Figure 1: The self-power map modulo 13.


Counting the fixed points and two-cycles
This work investigates:
  the number of fixed points of the self-power map, i.e., solutions to
                                                 x
  (2)                                           x ≡x     (mod p),

  the number of two-cycles, or solutions to
                                  h                          a
  (3)                         h ≡a        (mod p) and a ≡ h         (mod p),

  and the corresponding problems modulo prime powers.


1. Solving the prime modulus congruence between 1 and p − 1
Let F (p) be the number of solutions to (2) such that 1 ≤ x ≤ p − 1. We reduce the equation to
  x−1                                                       x−1
x     ≡ 1 (mod p). Then we consider the order of x and of x     modulo p. We proceed as in [4]
or [1] to prove:
Theorem 1.
                                                φ(n)            2√
                             F (p) −                 ≤ d (p − 1) p(1 + ln p),
                                                 n
                                        n|p−1
where d(p − 1) is the number of divisors of p − 1.
2. Solving the prime modulus congruence between 1 and (p − 1)p
Let G (p) be the number of solutions to (2) with
1 ≤ x ≤ (p − 1)p and p x. Similarly, let T (p)
be the number of solutions to (3) with
1 ≤ h, a ≤ p(p − 1), p h, and p a. Using
Chinese Remainder Theorem techniques we have:
Theorem 2.
                                φ(n)
           G (p) = (p − 1)
                                  n
                                         n|p−1

Theorem 3.
                                                        2
                                   2             φ(n)
            T (p) = (p − 1)
                                                  n
                                       n|p−1
                                                                                Figure 2: The self-power multimap modulo 5.



                                                                                                                                  e
3. Solving the prime power congruence between 1 and (p − 1)p
Using the p-adic techniques of [2], we can classify solutions as nonsingular or singular. Each
nonsingular solution lifts by Hensel’s Lemma to a unique solution modulo p e . Each singular
solution could lift to more than one or none at all.
Theorem 4. The singular solutions of (2) are those with x ≡ 1 modulo p. Each one lifts to
  e/2                      e                                                        e
p      solutions modulo p . (This leads to a complete count of solutions modulo p .)




        Figure 3: Left: Lifts of a singular fixed point modulo 3e . Right: Lifts of a singular two-cycle modulo 3e .
Theorem 5. The singular solutions of (3) are those with ha ≡ 1 modulo p. Each one lifts to
  e/2                    e                           e/3 + (e+1)/3
p     solutions modulo p if h ≡ −1 modulo p and p                  solutions otherwise.
The proof uses the Stationary Phase Formula from [3]. Again, this leads to a complete count.

References
[1] Cristian Cobeli and Alexandru Zaharescu, An Exponential Congruence with Solutions in Primitive Roots, Rev. Roumaine Math. Pures
    Appl. 44 (1999), no. 1, 15–22.
[2] Joshua Holden and Margaret M. Robinson, Counting Fixed Points, Two-Cycles, and Collisions of the Discrete Exponential Function using
    p-adic Methods, Journal of the Australian Mathematical Society. Special issue dedicated to Alf van der Poorten, to appear.
[3] J. Igusa, A Stationary Phase Formula for p-adic Integrals and its Applications, Algebraic Geometry and its Applications: Collections of
    Papers from Shreeram S. Abhyankar’s 60th Birthday Conference, 1994, pp. 175.
[4] Wen Peng Zhang, On a Problem of Brizolis, Pure Appl. Math. 11 (1995), no. suppl., 1–3.

Contenu connexe

Tendances

Machine learning (8)
Machine learning (8)Machine learning (8)
Machine learning (8)
NYversity
 
Day 10 examples u1w14
Day 10 examples u1w14Day 10 examples u1w14
Day 10 examples u1w14
jchartiersjsd
 
شيت دمحمددسوقى
شيت دمحمددسوقىشيت دمحمددسوقى
شيت دمحمددسوقى
abdoo2020
 

Tendances (20)

Number theory
Number theoryNumber theory
Number theory
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Report in math 830
Report in math 830Report in math 830
Report in math 830
 
2 evaluating functions
2 evaluating functions2 evaluating functions
2 evaluating functions
 
Ch04
Ch04Ch04
Ch04
 
Machine learning (8)
Machine learning (8)Machine learning (8)
Machine learning (8)
 
Chap4
Chap4Chap4
Chap4
 
Lecture 18 antiderivatives - section 4.8
Lecture 18   antiderivatives - section 4.8Lecture 18   antiderivatives - section 4.8
Lecture 18 antiderivatives - section 4.8
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Functions JC H2 Maths
Functions JC H2 MathsFunctions JC H2 Maths
Functions JC H2 Maths
 
4.4 Set operations on relations
4.4 Set operations on relations4.4 Set operations on relations
4.4 Set operations on relations
 
AP Calculus January 15, 2009
AP Calculus January 15, 2009AP Calculus January 15, 2009
AP Calculus January 15, 2009
 
limits and continuity
limits and continuity limits and continuity
limits and continuity
 
Vectors2
Vectors2Vectors2
Vectors2
 
JC Vectors summary
JC Vectors summaryJC Vectors summary
JC Vectors summary
 
On the Family of Concept Forming Operators in Polyadic FCA
On the Family of Concept Forming Operators in Polyadic FCAOn the Family of Concept Forming Operators in Polyadic FCA
On the Family of Concept Forming Operators in Polyadic FCA
 
Day 10 examples u1w14
Day 10 examples u1w14Day 10 examples u1w14
Day 10 examples u1w14
 
C3 January 2012 QP
C3 January 2012 QPC3 January 2012 QP
C3 January 2012 QP
 
Concepts of Maxima And Minima
Concepts of Maxima And MinimaConcepts of Maxima And Minima
Concepts of Maxima And Minima
 
شيت دمحمددسوقى
شيت دمحمددسوقىشيت دمحمددسوقى
شيت دمحمددسوقى
 

Similaire à Fixed points and two-cycles of the self-power map

Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
Baasilroy
 
Analysis and numerics of partial differential equations
Analysis and numerics of partial differential equationsAnalysis and numerics of partial differential equations
Analysis and numerics of partial differential equations
Springer
 
Jyokyo-kai-20120605
Jyokyo-kai-20120605Jyokyo-kai-20120605
Jyokyo-kai-20120605
ketanaka
 
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Avichai Cohen
 

Similaire à Fixed points and two-cycles of the self-power map (20)

590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdf
 
590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdf
 
Number Theory for Security
Number Theory for SecurityNumber Theory for Security
Number Theory for Security
 
Ch7
Ch7Ch7
Ch7
 
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signature
 
Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
Digital Text Book :POTENTIAL THEORY AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS
 
Matrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial BackgroundsMatrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial Backgrounds
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
Practical computation of Hecke operators
Practical computation of Hecke operatorsPractical computation of Hecke operators
Practical computation of Hecke operators
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Analysis and numerics of partial differential equations
Analysis and numerics of partial differential equationsAnalysis and numerics of partial differential equations
Analysis and numerics of partial differential equations
 
Funcion gamma
Funcion gammaFuncion gamma
Funcion gamma
 
Ch08
Ch08Ch08
Ch08
 
Ponencia en el XVIII CCM
Ponencia en el XVIII CCMPonencia en el XVIII CCM
Ponencia en el XVIII CCM
 
Jyokyo-kai-20120605
Jyokyo-kai-20120605Jyokyo-kai-20120605
Jyokyo-kai-20120605
 
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
 
Igv2008
Igv2008Igv2008
Igv2008
 
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
 
SAS Homework Help
SAS Homework HelpSAS Homework Help
SAS Homework Help
 

Plus de Joshua Holden

Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Joshua Holden
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?
Joshua Holden
 

Plus de Joshua Holden (20)

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod p
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation Ciphers
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithm
 
Mapping the discrete logarithm
Mapping the discrete logarithmMapping the discrete logarithm
Mapping the discrete logarithm
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice Versa
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
 
Math in Your Hands
Math in Your HandsMath in Your Hands
Math in Your Hands
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a Maze
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversals
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical Cryptography
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door Ciphers
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Fixed points and two-cycles of the self-power map

  • 1. Fixed points and 2-cycles x of x → x mod n Joshua Holden Forging a (variant) ElGamal Digital Signature Frank the Forger wants to solve for r and s in: H(m) s r (1) g ≡y r (mod p). He knows m, g , y , and p but not the discrete log of y mod p base g . He could: calculate the discrete log of y , r H(m) −s or he could solve r ≡ g y (mod p) for r . We wish to shed light on the difficulty of the second x attack by studying the self-power map, x → x mod n, x and the self-power multimap, x mod n → x mod n. Figure 1: The self-power map modulo 13. Counting the fixed points and two-cycles This work investigates: the number of fixed points of the self-power map, i.e., solutions to x (2) x ≡x (mod p), the number of two-cycles, or solutions to h a (3) h ≡a (mod p) and a ≡ h (mod p), and the corresponding problems modulo prime powers. 1. Solving the prime modulus congruence between 1 and p − 1 Let F (p) be the number of solutions to (2) such that 1 ≤ x ≤ p − 1. We reduce the equation to x−1 x−1 x ≡ 1 (mod p). Then we consider the order of x and of x modulo p. We proceed as in [4] or [1] to prove: Theorem 1. φ(n) 2√ F (p) − ≤ d (p − 1) p(1 + ln p), n n|p−1 where d(p − 1) is the number of divisors of p − 1.
  • 2. 2. Solving the prime modulus congruence between 1 and (p − 1)p Let G (p) be the number of solutions to (2) with 1 ≤ x ≤ (p − 1)p and p x. Similarly, let T (p) be the number of solutions to (3) with 1 ≤ h, a ≤ p(p − 1), p h, and p a. Using Chinese Remainder Theorem techniques we have: Theorem 2. φ(n) G (p) = (p − 1) n n|p−1 Theorem 3. 2 2 φ(n) T (p) = (p − 1) n n|p−1 Figure 2: The self-power multimap modulo 5. e 3. Solving the prime power congruence between 1 and (p − 1)p Using the p-adic techniques of [2], we can classify solutions as nonsingular or singular. Each nonsingular solution lifts by Hensel’s Lemma to a unique solution modulo p e . Each singular solution could lift to more than one or none at all. Theorem 4. The singular solutions of (2) are those with x ≡ 1 modulo p. Each one lifts to e/2 e e p solutions modulo p . (This leads to a complete count of solutions modulo p .) Figure 3: Left: Lifts of a singular fixed point modulo 3e . Right: Lifts of a singular two-cycle modulo 3e . Theorem 5. The singular solutions of (3) are those with ha ≡ 1 modulo p. Each one lifts to e/2 e e/3 + (e+1)/3 p solutions modulo p if h ≡ −1 modulo p and p solutions otherwise. The proof uses the Stationary Phase Formula from [3]. Again, this leads to a complete count. References [1] Cristian Cobeli and Alexandru Zaharescu, An Exponential Congruence with Solutions in Primitive Roots, Rev. Roumaine Math. Pures Appl. 44 (1999), no. 1, 15–22. [2] Joshua Holden and Margaret M. Robinson, Counting Fixed Points, Two-Cycles, and Collisions of the Discrete Exponential Function using p-adic Methods, Journal of the Australian Mathematical Society. Special issue dedicated to Alf van der Poorten, to appear. [3] J. Igusa, A Stationary Phase Formula for p-adic Integrals and its Applications, Algebraic Geometry and its Applications: Collections of Papers from Shreeram S. Abhyankar’s 60th Birthday Conference, 1994, pp. 175. [4] Wen Peng Zhang, On a Problem of Brizolis, Pure Appl. Math. 11 (1995), no. suppl., 1–3.