ALL Metrics
-
Views
-
Downloads
Get PDF
Get XML
Cite
Export
Track
Research Article

Factor puzzles from definition to applications

[version 1; peer review: 1 approved, 1 approved with reservations]
PUBLISHED 01 Jul 2022
Author details Author details
OPEN PEER REVIEW
REVIEWER STATUS

Abstract

Background: Factor puzzles are a salient tool that has been consigned to oblivion.
Methods: In this paper, we introduce factor puzzles and study the existence and uniqueness of solutions along with their connections to other areas of mathematics and real-world applications.
Results: Using concepts from elementary number theory, we prove several theorems pertinent to the existence and uniqueness of a solvable factor puzzle, and the number of solutions. Furthermore, we established connections between factor puzzles and polynomial as well as matrix factorizations. In addition, we demonstrate the importance of factor puzzles in the real world was evidenced by an application in cryptography.
Conclusion: Factor puzzles are a prominent tool with many remarkable connections and real-world applications.

Keywords

Factor puzzles, prime numbers, relatively prime numbers, common factors, greatest common devisor, polynomials, matrices, crypography

1. Introduction

Puzzles, due to their playful nature, have the potential to engage students.1 Furthermore, if they are well-designed, they can be used to engage students and introduce important concepts in any subject, particularly in mathematics.1,5,6,11 On the other hand, they can be used to give a practical exposition of the mathematical habits of mind3 and the five strands of mathematical proficiency.6 The mathematical habits of mind include pattern sniffing, experimenting, describing, tinkering, inventing, visualizing, conjecturing, and guessing.3 On the other hand, mathematical proficiency encompasses five intertwined strands, namely conceptual understanding, procedural fluency, strategic competence, adaptive reasoning, and productive disposition.7 Indeed, the main aim of this paper is to demonstrate how mathematicians think and approach problem solving through investigating factor puzzles.

In an m×n factor puzzle, you are given an array A=aij of natural numbers (or integers) arranged in m rows and in n columns, and you are expected to find a solution which consists of vectors B=bi,1im and C=cj,1jn of natural numbers such that aij=bicj for 1im and 1jn. For clarity, consider the following depiction (factor puzzle A).

(A)
17e81583-3d63-48c6-9b86-af838205a9db_graphic1.gif

As an example, a 2 × 2 factor puzzle looks like the following (factor puzzle B):

(B)
17e81583-3d63-48c6-9b86-af838205a9db_graphic2.gif

To the best of our knowledge, there is no systematic study of factor puzzles. As such, to mathematically study factor puzzles, the following questions were crystallized:

  • 1. Under what condition(s) does a factor puzzle possess a solution?

  • 2. How to solve a factor puzzle if it has a solution?

  • 3. If a factor puzzle is solvable, how many solutions does it have?

  • 4. When does a factor puzzle has a unique solution?

  • 5. Given a number of solutions, can we construct a factor puzzle that has this number of solutions?

  • 6. Do factor puzzles have connections to other mathematical concepts?

  • 7. Do factor puzzles have real-world applications?

In this paper, we shall provide answers to the forgoing questions. Moreover, while our work will be focused on 2 × 2 factor puzzles, the extension to larger puzzles should be clear from the context. To be precise, in Section 2.1, we address the important question of existence. In Section 2.2, we explain how to solve a factor puzzle, and establish criterion for the existence of a unique solution and develop an upper bound for the number of solutions of a factor puzzle. Connections to polynomial and matrix factorizations are demonstrated in Sections 2 and 3.

The overarching goal of cryptography is to securely communicate information.2 However, communicating securely, particularly sensitive information, requires encoding messages using a certain scheme. To decode a received message, the intended receiver needs the key used in encryption. It is possible, to add an extra layer of security, to mask the key by sending a factor puzzle whose solution is the key needed for decoding. This is the main purpose of Section 4.

Finally, we conclude in Section 5 by suggesting future directions.

2. Methods

In the following sections we will discuss the solvability of a factor puzzle, i.e., the existence of a solution and conditions for uniqueness, and its connection to factoring polynomials.

2.1 Proving the existence of a solution

To avoid wasting time, efforts, and resources, it is important to examine if a factor puzzle is solvable, i.e., has a solution, before attempting to solve it. To establish necessary and sufficient conditions for the solvability of a factor puzzle, we begin by considering a 2 × 2 factor puzzle. Furthermore, for ease for notation, we shall write it as follows:

(C)
17e81583-3d63-48c6-9b86-af838205a9db_graphic3.gif

Theorem 2.1.

A 2 × 2 factor puzzle has a solution if and only if ac=bd, or equivalently, detadbc=0.

Proof.

Assume solvability. Then a=pr,b=ps,c=qs, and d=qr, and therefore ac=prqs=psqr=bd.

Conversely, suppose ac=bd. Then a divides bd. This means that a=αβ such that α divides b and β divides d. Therefore, c=bαdβ, and so bα and dβ both divide c. Hence, p=α,q=dβ,r=β, and s=bα define a solution of the given factor puzzle.◽

Example 2.1.

For the sake of illustration, consider the following examples.

  • 1. Factor puzzle D

(D)
17e81583-3d63-48c6-9b86-af838205a9db_graphic4.gif
has no solution because 2 × 6 = 12 ≠ 15 = 3 × 5.
  • 2. The following factor puzzle (E), on the other hand, has a unique solution. Namely, p = 2, q = 3, r = 1, s = 2, which can be obtained using the method outlined in the following section.

(E)
17e81583-3d63-48c6-9b86-af838205a9db_graphic5.gif
Whereas, the following factor puzzle (F) has two solutions. In fact, p = 2, q = 3, r = 4, s = 14 and p = 4, q = 6, r = 2, s = 7 are both solutions.
(F)
17e81583-3d63-48c6-9b86-af838205a9db_graphic6.gif

As a consequence of Theorem 2.1, we have the following general result.

Theorem 2.2.

An m × n factor puzzle has a solution if and only if aijakl=akjail for all 1i<km and 1j<ln.

Note that there are m2n2 2×2 sub-arrays. However, there will be some redundancy. For example, if m=2 and n=3, then it suffices to check the condition for

a11a12a21a22anda11a13a21a23.

2.2 Solving factor puzzles

Although it may be simple to prove that a factor puzzle is solvable, this does not provide an incite in how to actually solve these puzzles. In this section, we will attempt to put forward different methods that can be used for solving various puzzles.

2.2.1 Common factors

Although not efficient, one way to solve a satisfiable factor puzzle is to map it on a multiplication table.4 In contrast, a more proficient approach is investigating the common factors. To demonstrate, consider the following factor puzzle (G).

(G)
17e81583-3d63-48c6-9b86-af838205a9db_graphic7.gif

Using the times table (Table 1), one solution is p=6,q=4,r=2,ands=6.

Table 1. An example times table.

17e81583-3d63-48c6-9b86-af838205a9db_graphic8.gif

To discover other solutions, if there is any, one may need a bigger table. On the other hand, with Theorem 2.1 in mind, the common factors of 12 and 36 are 1, 2, 3, 4, 6, and 12. Furthermore, 36 divided by these common factors gives 36, 18, 12, 9, 6, and 3. Of these, only 12, 6, and 3 also divide 24. Hence, as shown below, the given factor puzzle affords three solutions (H):

(H)
17e81583-3d63-48c6-9b86-af838205a9db_graphic9.gif

Note that the aforementioned proficient approach can be utilized to estimate the number of solutions a factor puzzle has. In fact, we have the following result.

Theorem 2.3.

Let NFx denote the number of factors of x and k=minNFgcdabNFgcdadNFgcdbcNFgcdcd.

If a 2×2 factor puzzle is solvable, then there are at most k solutions. Here, gcd stands for greatest common divisor.

Proof.

First, we verify that number of common factors of a andb equals number of factors of gcd(a,b). This follows from the fact that a common divisor of a and b divides any linear combination of a and b and, by Bézout’s theorem, gcdab can be written as a linear combination of a and b.9,p. 85

Now, since p is a common factor of a and b, q is a common factor of c and d, r is a common factor of a and d, and s is a common factor of b and c, the result follows.◽

To illustrate Theorem 2.3, consider the following factor puzzle (I):

(I)
17e81583-3d63-48c6-9b86-af838205a9db_graphic10.gif

Observe that the above factor puzzle is solvable (63 × 54 = 27 × 126). Furthermore,

gcd63,126=63=327NFgcd63,126=6gcd126,54=18=232NFgcd12654=6gcd5427=27=33NFgcd5427=4gcd2763=9=32NFgcd2763=3

Hence, the above factor puzzle has at most 3 solutions. In fact, as shown below, it has 3 solutions (J).

(J)
17e81583-3d63-48c6-9b86-af838205a9db_graphic11.gif

As a corollary of Theorem 2.3, we have the following result, which follows from the fact that 1 is the greatest common divisor between two relatively primes numbers.

Corollary 2.1.

If one of the pairs ab,bc,cd,orda is relatively prime, then a solvable factor puzzle has a unique solution.

Moreover, utilizing Theorem 3.1, we can construct a factor puzzle with a desired number of solutions. This exemplifies an inverse problem. The following factor puzzle has k solutions for any positive integer k. Additionally, there is nothing special about the number 2 in this context. In fact, any prime number can be used instead.

(K)
17e81583-3d63-48c6-9b86-af838205a9db_graphic12.gif

2.2.2 Factoring polynomials

If we think of the numbers bis and cjs as the coefficients of a polynomial of degrees m1 and n1, respectively, then the aijs can be thought of as the coefficients of a polynomial of degree m+n2; see the depiction below (L):

(L)
17e81583-3d63-48c6-9b86-af838205a9db_graphic13.gif

The 2×2 factor puzzle corresponds to factoring a quadratic equation into linear factors, the 2×3 or 3×2 corresponds to factoring a cubic equation into quadratic and linear factors, etc. Therefore, solving factor puzzles corresponds to factoring polynomials. For example, consider the polynomial fx=3x2+11x+6. The corresponding factor puzzle is

(M)
17e81583-3d63-48c6-9b86-af838205a9db_graphic14.gif

Using Theorem 2.1, this factor puzzle is solvable if t(11 − t) = 18, or t = 2,9. Hence, we have two solutions depicted in (N):

(N)
17e81583-3d63-48c6-9b86-af838205a9db_graphic15.gif

In other words, fx=3x2+11x+6=3x+2x+3.

Similarly, if fx=2x3+9x2+10x+3, then the corresponding factor puzzle is

(O)
17e81583-3d63-48c6-9b86-af838205a9db_graphic16.gif

By Theorem 2.2, this factor puzzle is solvable if s9s=2t and s10t=6, or st=14, (2,7), (6,9). Hence, we have the following three solutions depicted in (P):

(P)
17e81583-3d63-48c6-9b86-af838205a9db_graphic17.gif

In other words, fx=2x3+9x2+10x+3=2x+1x2+4x+3=x+12x2+7x+3=x+32x2+3x+1.

3. Factor puzzles and matrix factorization

Another perspective of factor puzzles is matrix factorization (Q):

(Q)
a11a12a1na21a22a2nam1am2amnA=b1b2bmBc1c2cnC

.

Note that matrices B and C constitute a factorization of the matrix A.

That being said, an interesting observation is that if a square matrix A is factorizable in the fashion depicted above (Q), then the matrix is singular, i.e., det(A) = 0.8 This fact follows from the definition of determinant and Theorem 2.2. In particular, a 2×2 matrix A is factorizable in the fashion depicted above (Q) if and only if the matrix is singular, i.e., det(A) = 0.

4. Use case

To secure communicating information, a sender encrypts the original message using a scheme (key), unknown except for the intended parties, and the intended receiver decrypts using the key inverse.2 One approach for encryption is to replace a text message by a sequence of numbers using a linear transformation. Table 2 demonstrates a correspondence between English alphabets and the numbers 1−26. The space corresponds to number 27. Alternative correspondences are possible.

Table 2. A simple encryption where letters correspond to numbers.

ABCDEFGHIJKLM
12345678910111213
NOPQRSTUVWXYZ
14151617181920212223242526

For example, consider the message “TOP SECURITY CLEARANCE”.10,p. 146 Using the above tabulated correspondence (Table 2), this message can be written as follows:

TO=2015,P=1627,SE=195,CU=321,RI=189,TY=2025
C=273,LE=205,AR=118,AN=114,CE=35

To encode the message, one can use, for example, the solution vectors of the following factor puzzle (R):

(R)
17e81583-3d63-48c6-9b86-af838205a9db_graphic18.gif

i.e., 2312.Consequently, the encrypted message, which will be sent along with the factor puzzle, will be as follows

855011370532969456336115706333553056372944292113.

The calculations are explained below (S).

(S)
231220161931820272011315275219253518145=8511353696311563555644215070294536703330372913

To decode the received message, the receiver can solve the factor puzzle and then use the inverse matrix for decryption. Note that the solution is unique in this.

5. Conclusion

In this paper, we defined factor puzzles and their solutions. Furthermore, we addressed the important questions of existence and uniqueness of solutions, number of solutions, and its connections to polynomial and matrix factorizations. In addition, application to cryptography was discussed.

While the factor puzzles might be elementary, the combination of ideas presented in this manuscript are far from being elementary. Furthermore, while this line of research is still in its infancy, there is ample room for extension.

Data availability

There is no data associated with this article.

Comments on this article Comments (0)

Version 1
VERSION 1 PUBLISHED 01 Jul 2022
Comment
Author details Author details
Competing interests
Grant information
Copyright
Download
 
Export To
metrics
Views Downloads
F1000Research - -
PubMed Central
Data from PMC are received and updated monthly.
- -
Citations
CITE
how to cite this article
Abusaris R and ALHAMI K. Factor puzzles from definition to applications [version 1; peer review: 1 approved, 1 approved with reservations]. F1000Research 2022, 11:727 (https://doi.org/10.12688/f1000research.111241.1)
NOTE: If applicable, it is important to ensure the information in square brackets after the title is included in all citations of this article.
track
receive updates on this article
Track an article to receive email alerts on any updates to this article.

Open Peer Review

Current Reviewer Status: ?
Key to Reviewer Statuses VIEW
ApprovedThe paper is scientifically sound in its current form and only minor, if any, improvements are suggested
Approved with reservations A number of small changes, sometimes more significant revisions are required to address specific details and improve the papers academic merit.
Not approvedFundamental flaws in the paper seriously undermine the findings and conclusions
Version 1
VERSION 1
PUBLISHED 01 Jul 2022
Views
6
Cite
Reviewer Report 14 Feb 2024
Ammar Ali Neamah, Faculty of Computer Science and Mathematics, University of Kufa, Kufa, Najaf Governorate, Iraq 
Approved with Reservations
VIEWS 6
In this work, the authors provide Factor puzzles from definition to applications. The paper is well-written and nice to read, however I have the following concerns that I would like to ask authors to address them to improve the quality ... Continue reading
CITE
CITE
HOW TO CITE THIS REPORT
Ali Neamah A. Reviewer Report For: Factor puzzles from definition to applications [version 1; peer review: 1 approved, 1 approved with reservations]. F1000Research 2022, 11:727 (https://doi.org/10.5256/f1000research.122938.r237908)
NOTE: it is important to ensure the information in square brackets after the title is included in all citations of this article.
Views
6
Cite
Reviewer Report 22 Jan 2024
Otobong Gabriel Udoaka, Akwa Ibom State University, Akwa Ibom, Nigeria 
Approved
VIEWS 6
The article is well written, is well organized and followed the manuscript guidelines of the journal to a large extent. 
The introduction section is good and shows the importance of the study. Literature review is adequate. 
Outcomes of ... Continue reading
CITE
CITE
HOW TO CITE THIS REPORT
Udoaka OG. Reviewer Report For: Factor puzzles from definition to applications [version 1; peer review: 1 approved, 1 approved with reservations]. F1000Research 2022, 11:727 (https://doi.org/10.5256/f1000research.122938.r232328)
NOTE: it is important to ensure the information in square brackets after the title is included in all citations of this article.

Comments on this article Comments (0)

Version 1
VERSION 1 PUBLISHED 01 Jul 2022
Comment
Alongside their report, reviewers assign a status to the article:
Approved - the paper is scientifically sound in its current form and only minor, if any, improvements are suggested
Approved with reservations - A number of small changes, sometimes more significant revisions are required to address specific details and improve the papers academic merit.
Not approved - fundamental flaws in the paper seriously undermine the findings and conclusions
Sign In
If you've forgotten your password, please enter your email address below and we'll send you instructions on how to reset your password.

The email address should be the one you originally registered with F1000.

Email address not valid, please try again

You registered with F1000 via Google, so we cannot reset your password.

To sign in, please click here.

If you still need help with your Google account password, please click here.

You registered with F1000 via Facebook, so we cannot reset your password.

To sign in, please click here.

If you still need help with your Facebook account password, please click here.

Code not correct, please try again
Email us for further assistance.
Server error, please try again.