Keywords
Factor puzzles, prime numbers, relatively prime numbers, common factors, greatest common devisor, polynomials, matrices, crypography
Factor puzzles, prime numbers, relatively prime numbers, common factors, greatest common devisor, polynomials, matrices, crypography
Puzzles, due to their playful nature, have the potential to engage students.1 Furthermore, if they are well-designed, they can be used to engage students and introduce important concepts in any subject, particularly in mathematics.1,5,6,11 On the other hand, they can be used to give a practical exposition of the mathematical habits of mind3 and the five strands of mathematical proficiency.6 The mathematical habits of mind include pattern sniffing, experimenting, describing, tinkering, inventing, visualizing, conjecturing, and guessing.3 On the other hand, mathematical proficiency encompasses five intertwined strands, namely conceptual understanding, procedural fluency, strategic competence, adaptive reasoning, and productive disposition.7 Indeed, the main aim of this paper is to demonstrate how mathematicians think and approach problem solving through investigating factor puzzles.
In an factor puzzle, you are given an array of natural numbers (or integers) arranged in rows and in columns, and you are expected to find a solution which consists of vectors and of natural numbers such that for and . For clarity, consider the following depiction (factor puzzle A).
As an example, a 2 × 2 factor puzzle looks like the following (factor puzzle B):
To the best of our knowledge, there is no systematic study of factor puzzles. As such, to mathematically study factor puzzles, the following questions were crystallized:
1. Under what condition(s) does a factor puzzle possess a solution?
2. How to solve a factor puzzle if it has a solution?
3. If a factor puzzle is solvable, how many solutions does it have?
4. When does a factor puzzle has a unique solution?
5. Given a number of solutions, can we construct a factor puzzle that has this number of solutions?
6. Do factor puzzles have connections to other mathematical concepts?
7. Do factor puzzles have real-world applications?
In this paper, we shall provide answers to the forgoing questions. Moreover, while our work will be focused on 2 × 2 factor puzzles, the extension to larger puzzles should be clear from the context. To be precise, in Section 2.1, we address the important question of existence. In Section 2.2, we explain how to solve a factor puzzle, and establish criterion for the existence of a unique solution and develop an upper bound for the number of solutions of a factor puzzle. Connections to polynomial and matrix factorizations are demonstrated in Sections 2 and 3.
The overarching goal of cryptography is to securely communicate information.2 However, communicating securely, particularly sensitive information, requires encoding messages using a certain scheme. To decode a received message, the intended receiver needs the key used in encryption. It is possible, to add an extra layer of security, to mask the key by sending a factor puzzle whose solution is the key needed for decoding. This is the main purpose of Section 4.
Finally, we conclude in Section 5 by suggesting future directions.
In the following sections we will discuss the solvability of a factor puzzle, i.e., the existence of a solution and conditions for uniqueness, and its connection to factoring polynomials.
To avoid wasting time, efforts, and resources, it is important to examine if a factor puzzle is solvable, i.e., has a solution, before attempting to solve it. To establish necessary and sufficient conditions for the solvability of a factor puzzle, we begin by considering a 2 × 2 factor puzzle. Furthermore, for ease for notation, we shall write it as follows:
A 2 × 2 factor puzzle has a solution if and only if , or equivalently,
Assume solvability. Then , and , and therefore .
Conversely, suppose . Then divides . This means that such that divides and divides . Therefore, , and so and both divide . Hence, and define a solution of the given factor puzzle.◽
For the sake of illustration, consider the following examples.
1. Factor puzzle D
2. The following factor puzzle (E), on the other hand, has a unique solution. Namely, p = 2, q = 3, r = 1, s = 2, which can be obtained using the method outlined in the following section.
As a consequence of Theorem 2.1, we have the following general result.
An m × n factor puzzle has a solution if and only if for all and .
Note that there are sub-arrays. However, there will be some redundancy. For example, if and , then it suffices to check the condition for
Although it may be simple to prove that a factor puzzle is solvable, this does not provide an incite in how to actually solve these puzzles. In this section, we will attempt to put forward different methods that can be used for solving various puzzles.
2.2.1 Common factors
Although not efficient, one way to solve a satisfiable factor puzzle is to map it on a multiplication table.4 In contrast, a more proficient approach is investigating the common factors. To demonstrate, consider the following factor puzzle (G).
Using the times table (Table 1), one solution is
To discover other solutions, if there is any, one may need a bigger table. On the other hand, with Theorem 2.1 in mind, the common factors of 12 and 36 are 1, 2, 3, 4, 6, and 12. Furthermore, 36 divided by these common factors gives 36, 18, 12, 9, 6, and 3. Of these, only 12, 6, and 3 also divide 24. Hence, as shown below, the given factor puzzle affords three solutions (H):
Note that the aforementioned proficient approach can be utilized to estimate the number of solutions a factor puzzle has. In fact, we have the following result.
Let denote the number of factors of and
factor puzzle is solvable, then there are at most solutions. Here, gcd stands for greatest common divisor.
First, we verify that number of common factors of and equals number of factors of ). This follows from the fact that a common divisor of a and b divides any linear combination of a and b and, by Bézout’s theorem, can be written as a linear combination of a and b.9,p. 85
Now, since is a common factor of and b, is a common factor of and , is a common factor of a and d, and s is a common factor of b and c, the result follows.◽
To illustrate Theorem 2.3, consider the following factor puzzle (I):
Observe that the above factor puzzle is solvable (63 × 54 = 27 × 126). Furthermore,
Hence, the above factor puzzle has at most 3 solutions. In fact, as shown below, it has 3 solutions (J).
As a corollary of Theorem 2.3, we have the following result, which follows from the fact that 1 is the greatest common divisor between two relatively primes numbers.
If one of the pairs is relatively prime, then a solvable factor puzzle has a unique solution.
Moreover, utilizing Theorem 3.1, we can construct a factor puzzle with a desired number of solutions. This exemplifies an inverse problem. The following factor puzzle has k solutions for any positive integer k. Additionally, there is nothing special about the number 2 in this context. In fact, any prime number can be used instead.
2.2.2 Factoring polynomials
If we think of the numbers and as the coefficients of a polynomial of degrees and , respectively, then the can be thought of as the coefficients of a polynomial of degree ; see the depiction below (L):
The factor puzzle corresponds to factoring a quadratic equation into linear factors, the or corresponds to factoring a cubic equation into quadratic and linear factors, etc. Therefore, solving factor puzzles corresponds to factoring polynomials. For example, consider the polynomial . The corresponding factor puzzle is
Using Theorem 2.1, this factor puzzle is solvable if t(11 − t) = 18, or t = 2,9. Hence, we have two solutions depicted in (N):
In other words,
Similarly, if , then the corresponding factor puzzle is
By Theorem 2.2, this factor puzzle is solvable if and , or , (2,7), (6,9). Hence, we have the following three solutions depicted in (P):
In other words,
Another perspective of factor puzzles is matrix factorization (Q):
.
Note that matrices B and C constitute a factorization of the matrix A.
That being said, an interesting observation is that if a square matrix A is factorizable in the fashion depicted above (Q), then the matrix is singular, i.e., det(A) = 0.8 This fact follows from the definition of determinant and Theorem 2.2. In particular, a matrix A is factorizable in the fashion depicted above (Q) if and only if the matrix is singular, i.e., det(A) = 0.
To secure communicating information, a sender encrypts the original message using a scheme (key), unknown except for the intended parties, and the intended receiver decrypts using the key inverse.2 One approach for encryption is to replace a text message by a sequence of numbers using a linear transformation. Table 2 demonstrates a correspondence between English alphabets and the numbers 1−26. The space corresponds to number 27. Alternative correspondences are possible.
A | B | C | D | E | F | G | H | I | J | K | L | M |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |
N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 |
For example, consider the message “TOP SECURITY CLEARANCE”.10,p. 146 Using the above tabulated correspondence (Table 2), this message can be written as follows:
To encode the message, one can use, for example, the solution vectors of the following factor puzzle (R):
i.e., Consequently, the encrypted message, which will be sent along with the factor puzzle, will be as follows
The calculations are explained below (S).
To decode the received message, the receiver can solve the factor puzzle and then use the inverse matrix for decryption. Note that the solution is unique in this.
In this paper, we defined factor puzzles and their solutions. Furthermore, we addressed the important questions of existence and uniqueness of solutions, number of solutions, and its connections to polynomial and matrix factorizations. In addition, application to cryptography was discussed.
While the factor puzzles might be elementary, the combination of ideas presented in this manuscript are far from being elementary. Furthermore, while this line of research is still in its infancy, there is ample room for extension.
Views | Downloads | |
---|---|---|
F1000Research | - | - |
PubMed Central
Data from PMC are received and updated monthly.
|
- | - |
Is the work clearly and accurately presented and does it cite the current literature?
Yes
Is the study design appropriate and is the work technically sound?
Yes
Are sufficient details of methods and analysis provided to allow replication by others?
Partly
If applicable, is the statistical analysis and its interpretation appropriate?
Not applicable
Are all the source data underlying the results available to ensure full reproducibility?
No source data required
Are the conclusions drawn adequately supported by the results?
Partly
Competing Interests: No competing interests were disclosed.
Reviewer Expertise: My areas of expertise are Number Theory and Cryptography.
Is the work clearly and accurately presented and does it cite the current literature?
Yes
Is the study design appropriate and is the work technically sound?
Yes
Are sufficient details of methods and analysis provided to allow replication by others?
Yes
If applicable, is the statistical analysis and its interpretation appropriate?
Yes
Are all the source data underlying the results available to ensure full reproducibility?
No source data required
Are the conclusions drawn adequately supported by the results?
Yes
References
1. Abusaris R, ALHAMI K: Factor puzzles from definition to applications. F1000Research. 2022; 11. Publisher Full TextCompeting Interests: No competing interests were disclosed.
Reviewer Expertise: Pure Mathematics (Algebra: Semigroup theory, Group theory, Representation theory, Combinatories
Alongside their report, reviewers assign a status to the article:
Invited Reviewers | ||
---|---|---|
1 | 2 | |
Version 1 01 Jul 22 |
read | read |
Provide sufficient details of any financial or non-financial competing interests to enable users to assess whether your comments might lead a reasonable person to question your impartiality. Consider the following examples, but note that this is not an exhaustive list:
Sign up for content alerts and receive a weekly or monthly email with all newly published articles
Already registered? Sign in
The email address should be the one you originally registered with F1000.
You registered with F1000 via Google, so we cannot reset your password.
To sign in, please click here.
If you still need help with your Google account password, please click here.
You registered with F1000 via Facebook, so we cannot reset your password.
To sign in, please click here.
If you still need help with your Facebook account password, please click here.
If your email address is registered with us, we will email you instructions to reset your password.
If you think you should have received this email but it has not arrived, please check your spam filters and/or contact for further assistance.
Comments on this article Comments (0)