Professional Documents
Culture Documents
MAT - 431
CIA-1 (Component A)
Submitted By:
Department of Mathematics
CHRIST (Deemed to be University), Bengaluru
January 2024
DECLARATION
This is to certify that the research work entitled “Applications of Group Theory” is a report
submitted to the Department of Mathematics under the supervision of Dr Tabitha Rajashekhar
in partial fulfillment for the award of the marks for the Continuous Internal Assessment (CIA)
for the course Linear Algebra (MAT431) during the academic year 2023-24.
I, hereby confirm the originality of the work and that there is no plagiarism in any part of the
report.
ACKNOWLEDGEMENT
I would like to express my sincere gratitude to my BSc. Mathematics teacher Dr. Tabitha
Rajashekhar, Associate Professor, Department of Mathematics, School of Sciences, CHRIST
(Deemed to be University), for her vital support, guidance and encouragement without which
this project would not have come forth.
I would also like to thank Dr. Mayamma Joseph, Head of the Department, Department of
Mathematics, School of Sciences, CHRIST (Deemed to be University) for her continued
support and to provide the facilities required to execute this project.
Last, but not the least, I would like to thank everyone else who contributed directly or indirectly
to this project.
2 Conceptualization 3
4 Conclusion 13
1 Introduction
The subject of groups and group theory forms an integral part of algebra,
and even beyond the world of mathematics, we encounter the applications of
group theory in our day-to-day lives and across various fields. Group theory is
applied in a wide range of areas, such as physics, computer science, chemistry,
and robotics and also plays a vital role in many mathematical fields like prime
factorization, number theory and many geometrical concepts.
By mathematical definition, any non-empty set together with one or more
binary operations is called an algebraic structure. Now, let G be an algebraic
structure such that a ∗ b represents the elements of G obtained by applying
the binary operation, denoted by ∗, between the elements “a” and “b” of G.
Then this algebraic structure (G, ∗) is a group if the operation ∗ satisfies the
following 4 properties:
1. Closure property
2. Associative property
1. a, b ∈ G =⇒ a ∗ b ∈ G.
2. a, b, c ∈ G =⇒ a ∗ (b ∗ c) = (a ∗ b) ∗ c.
Example: (N, +) is a semi group
3 Applications of Group Theory
3.1 Cryptography and Diffie–Hellman Key Exchange
A very interesting application of group theory and different types of groups
is in Group-based cryptography, which is used to construct cryptographic
primitives. Cryptography is the art of writing and solving codes to ensure
secure communication across different channels. Most cryptographic schemes
use groups in some way. In particular, the Diffie–Hellman key exchange uses
finite cyclic groups. So the term group-based cryptography refers mostly to
cryptographic protocols that use infinite non-abelian groups.
Diffie–Hellman key exchange (1976) is a method of securely exchanging
cryptographic keys over a public channel and was one of the first public-key
protocols as conceived by Ralph Merkle and named after Whitfield Diffie
and Martin Hellman. It is one of the earliest practical examples of public
key exchange implemented within the field of cryptography, wherein there is
involvement of a private key and a corresponding public key.
Traditionally, the first step of secure communication requires that the 2
parties first exchange keys by some secure physical means, such as paper key
lists transported by a trusted courier. Then, the keys are decoded to obtain
the information. The Diffie–Hellman key exchange method, however, allows
two parties that have no prior knowledge of each other to jointly establish
a shared secret key over an insecure channel. That means that with their
individual keys and the DH mechanism, they can automatically generate a
secret key, which works for both of them but is very difficult to be hacked
into by a third party. This key can then be used to encrypt subsequent
communications. The execution of this method involves large and complex
numbers, but we will understand the mechanism through a simple example.[2]
The original implementation of the protocol uses the multiplicative group
of integers modulo p, where p is prime, and g is a primitive root modulo p.
These two values are chosen in this way to ensure that the resulting shared
secret can take on any value from 1 to p–1 (reduces the risk of a third party
guessing the secret key). Here is an example of the protocol -:
1. Alice and Bob publicly agree to use a |p| = 23 and base g = 5 (which
is a primitive root modulo 23).
A = 54 .|23| = 4
B = 53 .|23| = 10
s = 104 .|23| = 18
s = 43 .|23| = 18
6. Alice and Bob both get the same number, 18, so they now share a
secret key (the number 18), which is the private key.
The essence of this calculation and both Alice and Bob have arrived at
the same values, lies in this expression:
Ab |p| = g ab |p| = g ba |p| = B a |p|
Using this calculation, which involves the properties of Abelian groups, both
parties obtain the same key.
Also, it should be noted that the values a and b are kept secret. All the
other values: p, g, g a |p|, and g b |p| are sent in the clear. However, because
it takes an extremely long time to compute the secret key using the public
values, it is impossible for anyone to breach the security. Once Alice and
Bob compute the shared secret(using group theory) they can use it as an
encryption key, known only to them, for sending messages across the same
open communications channel.[6]
αx, βy, γz
ϵR
ϵR = R ⇐⇒ αx = x, βy = y, γz = z
A > B > C ⇐⇒ A = ϵR
pA = f (xR )
The symmetry is apparently responsible for the price being finally influ-
enced by object R, which served as the reference point at the beginning of
the process, i.e., the reference point (the familiar point R that leads to main-
taining symmetry) finally influences the price and consumer decision. This
implies that irrational choice is based on symmetry, which is mathematically
proved by group theory and symmetry groups. The understanding of this
approach could only be derived from the potential of group theory.
y 2 = x(x − an )(x + bn )
properties of elliptic curves and allows for the study of their Galois rep-
resentations through the more accessible theory of modular forms. It has
numerous applications, including the proof of Fermat’s Last Theorem, the
Taniyama–Shimura–Weil conjecture, and the construction of explicit points
with large height on elliptic curves.
4 Conclusion
Thus, the concept of group theory is helpful in explaining seemingly unrelated
yet important phenomena like irrational choice in behavioural economics and
Diffie-Hellman key exchange in cryptography. The properties of Abelian
groups are used in the Diffie-Hellman key exchange method, such that the
two parties can create a shared private key to ensure secure communication,
alongside the individual public keys. These properties are further used in
other cryptographic methods in a much more complex form.
Group Theory also provides a powerful framework for understanding and
analyzing the Rubik’s Cube. By recognizing the cube’s movements as ele-
ments of a group, we can explore its symmetries and transformations, and
solve strategies in a systematic and mathematical manner. Group Theory
not only allows us to classify different cube states but also provides insights
into the complexity and solvability of the puzzle
The Modularity Theorem in number theory relies on group theory, reveal-
ing deep connections between elliptic curves and modular forms. Similarly,
the symmetry groups are used to mathematically establish the concepts of
symmetry in human cognition and decision-making, which may lead to irra-
tional choices.
This portrays the importance of mathematical topics and fields of study
like group theory in different disciplines like cryptography, behavioural eco-
nomics, robotics, physics, chemistry, etc.
References
[1] Chen, J. Group theory and the rubik’s cube.
[6] Lake, J. What is the diffie–hellman key exchange and how does it work?,
2021.
[7] R. van Dobben de Bruyn. The modularity theorem, June 21, 2011.