108
An Algorithm in Computational Algebraic Number Theory An Algorithm in Computational Algebraic Number Theory Locating Fields of Signature [p, 0] Satisfying a Given Property Jason B. Hill University of Colorado at Boulder De Brún Workshop on Computational Algebra National University of Ireland, Galway July 31, 2008 1

An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number TheoryLocating Fields of Signature [p,0] Satisfying a Given Property

Jason B. HillUniversity of Colorado at Boulder

De Brún Workshop on Computational AlgebraNational University of Ireland, Galway July 31, 2008

1

Page 2: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Outline

1 IntroductionBackground and NotationThe DiscriminantThe Unit GroupProblem Statement

2 A Table Building Approach

3 A New Approach

4 Testing the Algorithm

5 Main Results

2

Page 3: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Introduction

First, allow me to say ...

I don’t claim to be a number theorist (at least not as of today,the 31st of July, 2008 in Galway),

but I do tend to like creatingalgorithms to solve challenging problems, such as the problemof creating an opening sentence for my talk that containstwenty a’s, six b’s, eight c’s, six d’s, fifty-two e’s, twelve f’s,eleven g’s, thirteen h’s, twenty-eight i’s, two j’s, three k’s,seventeen l’s, seven m’s, thirty-six n’s, twenty-six o’s, four p’s,one q, fifteen r’s, forty-seven s’s, forty-six t’s, six u’s, nine v’s,nine w’s, seven x’s, twelve y’s, one z, and a single!

3

Page 4: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Introduction

First, allow me to say ...

I don’t claim to be a number theorist (at least not as of today,the 31st of July, 2008 in Galway), but I do tend to like creatingalgorithms to solve challenging problems,

such as the problemof creating an opening sentence for my talk that containstwenty a’s, six b’s, eight c’s, six d’s, fifty-two e’s, twelve f’s,eleven g’s, thirteen h’s, twenty-eight i’s, two j’s, three k’s,seventeen l’s, seven m’s, thirty-six n’s, twenty-six o’s, four p’s,one q, fifteen r’s, forty-seven s’s, forty-six t’s, six u’s, nine v’s,nine w’s, seven x’s, twelve y’s, one z, and a single!

3

Page 5: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Introduction

First, allow me to say ...

I don’t claim to be a number theorist (at least not as of today,the 31st of July, 2008 in Galway), but I do tend to like creatingalgorithms to solve challenging problems, such as the problemof creating an opening sentence for my talk that containstwenty a’s, six b’s, eight c’s, six d’s, fifty-two e’s, twelve f’s,eleven g’s, thirteen h’s, twenty-eight i’s, two j’s, three k’s,seventeen l’s, seven m’s, thirty-six n’s, twenty-six o’s, four p’s,one q, fifteen r’s, forty-seven s’s, forty-six t’s, six u’s, nine v’s,nine w’s, seven x’s, twelve y’s, one z, and a single!

3

Page 6: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Prerequisites and Info

This talk is aimed at those with a “basic” understanding of:

Field theory: finite extensions of Q.Linear algebra: characteristic/minimal polynomials.Galois theory: automorphisms of finite extensions.

This research was the result of a question posed by David S.Dummit in connection to work by him and others on the properformulation of a strong variant of Stark’s Conjectures.

4

Page 7: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Prerequisites and Info

This talk is aimed at those with a “basic” understanding of:

Field theory: finite extensions of Q.Linear algebra: characteristic/minimal polynomials.Galois theory: automorphisms of finite extensions.

This research was the result of a question posed by David S.Dummit in connection to work by him and others on the properformulation of a strong variant of Stark’s Conjectures.

4

Page 8: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Some Notation:

Number Field: A finite extension of Q. For example, thefield K = Q(

√2) is a number field of degree 2.

Signature: Let K be a number field of degree n and let rand s be the number of real and complex conjugateembeddings of K , respectively. Then n = r + 2s and werefer to [r , s] as the signature of K .

Q(i) has signature [0,1].Q(√

2) has signature [2,0].The number field given by the roots of X 3 + X 2 − X − 3 hassignature [1,1].

5

Page 9: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Some Notation:

Number Field: A finite extension of Q. For example, thefield K = Q(

√2) is a number field of degree 2.

Signature: Let K be a number field of degree n and let rand s be the number of real and complex conjugateembeddings of K , respectively. Then n = r + 2s and werefer to [r , s] as the signature of K .

Q(i) has signature [0,1].Q(√

2) has signature [2,0].The number field given by the roots of X 3 + X 2 − X − 3 hassignature [1,1].

5

Page 10: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Some Notation:

Number Field: A finite extension of Q. For example, thefield K = Q(

√2) is a number field of degree 2.

Signature: Let K be a number field of degree n and let rand s be the number of real and complex conjugateembeddings of K , respectively. Then n = r + 2s and werefer to [r , s] as the signature of K .

Q(i) has signature [0,1].Q(√

2) has signature [2,0].The number field given by the roots of X 3 + X 2 − X − 3 hassignature [1,1].

5

Page 11: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Some Notation:

Number Field: A finite extension of Q. For example, thefield K = Q(

√2) is a number field of degree 2.

Signature: Let K be a number field of degree n and let rand s be the number of real and complex conjugateembeddings of K , respectively. Then n = r + 2s and werefer to [r , s] as the signature of K .

Q(i) has signature [0,1].Q(√

2) has signature [2,0].The number field given by the roots of X 3 + X 2 − X − 3 hassignature [1,1].

5

Page 12: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Denote the Following:

Given a number field K , let

OK be the ring of algebraic integers in K ,UK be the (multiplicative) unit group of OK .d(K ) be the field discriminant of K . (see next slide)

UK ⊂ OK ⊂ K| | |

{−1,1} ⊂ Z ⊂ Q

6

Page 13: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Denote the Following:

Given a number field K , letOK be the ring of algebraic integers in K ,

UK be the (multiplicative) unit group of OK .d(K ) be the field discriminant of K . (see next slide)

UK ⊂ OK ⊂ K| | |

{−1,1} ⊂ Z ⊂ Q

6

Page 14: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Denote the Following:

Given a number field K , letOK be the ring of algebraic integers in K ,UK be the (multiplicative) unit group of OK .

d(K ) be the field discriminant of K . (see next slide)

UK ⊂ OK ⊂ K| | |

{−1,1} ⊂ Z ⊂ Q

6

Page 15: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Background and Notation

Denote the Following:

Given a number field K , letOK be the ring of algebraic integers in K ,UK be the (multiplicative) unit group of OK .d(K ) be the field discriminant of K . (see next slide)

UK ⊂ OK ⊂ K| | |

{−1,1} ⊂ Z ⊂ Q

6

Page 16: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

The Discriminant:

Consider a number field K of signature [r , s].

d(K ) ∈ Z is a numerical invariant of K .[r , s] determines the sign of d(K ).d(K ) gives information about the arithmetic structure ofOK . In general, a smaller |d(K )| value implies thatcalculations in OK and UK will be easier.Hermite: Up to isomorphism, there are only finitely manynumber fields satisfying any given finite discriminantbound.

7

Page 17: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

The Discriminant:

Consider a number field K of signature [r , s].

d(K ) ∈ Z is a numerical invariant of K .

[r , s] determines the sign of d(K ).d(K ) gives information about the arithmetic structure ofOK . In general, a smaller |d(K )| value implies thatcalculations in OK and UK will be easier.Hermite: Up to isomorphism, there are only finitely manynumber fields satisfying any given finite discriminantbound.

7

Page 18: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

The Discriminant:

Consider a number field K of signature [r , s].

d(K ) ∈ Z is a numerical invariant of K .[r , s] determines the sign of d(K ).

d(K ) gives information about the arithmetic structure ofOK . In general, a smaller |d(K )| value implies thatcalculations in OK and UK will be easier.Hermite: Up to isomorphism, there are only finitely manynumber fields satisfying any given finite discriminantbound.

7

Page 19: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

The Discriminant:

Consider a number field K of signature [r , s].

d(K ) ∈ Z is a numerical invariant of K .[r , s] determines the sign of d(K ).d(K ) gives information about the arithmetic structure ofOK . In general, a smaller |d(K )| value implies thatcalculations in OK and UK will be easier.

Hermite: Up to isomorphism, there are only finitely manynumber fields satisfying any given finite discriminantbound.

7

Page 20: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

The Discriminant:

Consider a number field K of signature [r , s].

d(K ) ∈ Z is a numerical invariant of K .[r , s] determines the sign of d(K ).d(K ) gives information about the arithmetic structure ofOK . In general, a smaller |d(K )| value implies thatcalculations in OK and UK will be easier.Hermite: Up to isomorphism, there are only finitely manynumber fields satisfying any given finite discriminantbound.

7

Page 21: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

As a Consequence:

Thus, given a property P that number fields of signature [r , s]may computationally satisfy, we have one of the followingsituations:

1 A number field K of signature [r , s] having unique smallest(abs. value) discriminant satisfying P exists.

2 No number field of signature [r , s] satisfies P.

8

Page 22: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

As a Consequence:

Thus, given a property P that number fields of signature [r , s]may computationally satisfy, we have one of the followingsituations:

1 A number field K of signature [r , s] having unique smallest(abs. value) discriminant satisfying P exists.

2 No number field of signature [r , s] satisfies P.

8

Page 23: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Discriminant

As a Consequence:

Thus, given a property P that number fields of signature [r , s]may computationally satisfy, we have one of the followingsituations:

1 A number field K of signature [r , s] having unique smallest(abs. value) discriminant satisfying P exists.

2 No number field of signature [r , s] satisfies P.

8

Page 24: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Unit Group

The Structure of Unit Groups

Given a number field K of signature [r , s]:

If r + s > 1 then |UK | =∞.Tor(UK ) 6= ∅.In fact, UK is finitely generated as a Z–module and wehave the following famous structure theorem:

Dirichlet’s Unit Theorem:

UK ' µ(K )⊕

Zr+s−1

where µ(K ) is a finite cyclic group generated by the root ofunity ζ. We refer to a full set of generators of UK as a set offundamental units.

9

Page 25: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Unit Group

The Structure of Unit Groups

Given a number field K of signature [r , s]:

If r + s > 1 then |UK | =∞.

Tor(UK ) 6= ∅.In fact, UK is finitely generated as a Z–module and wehave the following famous structure theorem:

Dirichlet’s Unit Theorem:

UK ' µ(K )⊕

Zr+s−1

where µ(K ) is a finite cyclic group generated by the root ofunity ζ. We refer to a full set of generators of UK as a set offundamental units.

9

Page 26: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Unit Group

The Structure of Unit Groups

Given a number field K of signature [r , s]:

If r + s > 1 then |UK | =∞.Tor(UK ) 6= ∅.

In fact, UK is finitely generated as a Z–module and wehave the following famous structure theorem:

Dirichlet’s Unit Theorem:

UK ' µ(K )⊕

Zr+s−1

where µ(K ) is a finite cyclic group generated by the root ofunity ζ. We refer to a full set of generators of UK as a set offundamental units.

9

Page 27: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Unit Group

The Structure of Unit Groups

Given a number field K of signature [r , s]:

If r + s > 1 then |UK | =∞.Tor(UK ) 6= ∅.In fact, UK is finitely generated as a Z–module and wehave the following famous structure theorem:

Dirichlet’s Unit Theorem:

UK ' µ(K )⊕

Zr+s−1

where µ(K ) is a finite cyclic group generated by the root ofunity ζ. We refer to a full set of generators of UK as a set offundamental units.

9

Page 28: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

The Unit Group

The Structure of Unit Groups

Given a number field K of signature [r , s]:

If r + s > 1 then |UK | =∞.Tor(UK ) 6= ∅.In fact, UK is finitely generated as a Z–module and wehave the following famous structure theorem:

Dirichlet’s Unit Theorem:

UK ' µ(K )⊕

Zr+s−1

where µ(K ) is a finite cyclic group generated by the root ofunity ζ. We refer to a full set of generators of UK as a set offundamental units.

9

Page 29: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Problem Statement

Initial Question: Consider some number field K havingsignature [5,0] and fundamental units ε0 = −1, ε1, ..., ε4. Is itpossible that for 1 ≤ i , j ≤ 4

|sgn(εi)− sgn(σεi)| = |sgn(εj)− sgn(σεj)|

for all σ ∈ Gal(K/Q)? Umm... what??

Let’s restate this in terms that are more computationallyadequate. This requires the definition of what we will call UnitGroup Rank.

10

Page 30: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Problem Statement

Initial Question: Consider some number field K havingsignature [5,0] and fundamental units ε0 = −1, ε1, ..., ε4. Is itpossible that for 1 ≤ i , j ≤ 4

|sgn(εi)− sgn(σεi)| = |sgn(εj)− sgn(σεj)|

for all σ ∈ Gal(K/Q)? Umm... what??

Let’s restate this in terms that are more computationallyadequate. This requires the definition of what we will call UnitGroup Rank.

10

Page 31: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Definition of Unit Group Rank

Let K be a number field of signature [p,0] for prime p withfundamental units ζ = −1, ε1, ..., εp−1 and embeddingsσi ∈Gal(K/Q). Define

M1 =

ζ|ζ|

ε1|ε1| · · · εp−1

|εp−1|

σ1(ζ)|σ1(ζ)|

σ1(ε1)|σ1(ε1)| · · · σ1(εp−1)

|σ1(εp−1)|

.... . .

...

σp−1(ζ)|σp−1(ζ)|

σp−1(ε1)|σp−1(ε1)| · · ·

σp−1(εp−1)|σp−1(εp−1)|

.

11

Page 32: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Definition of Unit Group Rank

Thus, M1 is a matrix over the multiplicative group of order 2.We define the matrix M2 over the additive group of order 2 asfollows. Let

M2(i , j) =

{0 if M1(i , j) = 11 if M2(i , j) = −1

The unit group rank of the number field K is defined as the(row) rank of M2.

The Question Becomes: Is it possible for a number field ofsignature [5,0] to have a unit group rank of 1?

12

Page 33: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Definition of Unit Group Rank

Thus, M1 is a matrix over the multiplicative group of order 2.We define the matrix M2 over the additive group of order 2 asfollows. Let

M2(i , j) =

{0 if M1(i , j) = 11 if M2(i , j) = −1

The unit group rank of the number field K is defined as the(row) rank of M2.

The Question Becomes: Is it possible for a number field ofsignature [5,0] to have a unit group rank of 1?

12

Page 34: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Definition of Unit Group Rank

Thus, M1 is a matrix over the multiplicative group of order 2.We define the matrix M2 over the additive group of order 2 asfollows. Let

M2(i , j) =

{0 if M1(i , j) = 11 if M2(i , j) = −1

The unit group rank of the number field K is defined as the(row) rank of M2.

The Question Becomes: Is it possible for a number field ofsignature [5,0] to have a unit group rank of 1?

12

Page 35: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

An Example:

For example, the field K of signature [5,0] generated by α aroot of the polynomial

X 5 − 2X 4 − 6X 3 + 8X 2 + 8X + 1

has a system of fundamental units given by

ζ = −1.ε1 = α,

ε2 = α2 − 2α,ε3 = α2 − 2α− 2,ε4 = α4 − 2α3 − 6α2 + 9α+ 7.

13

Page 36: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

An Example (cont.):

In this case, we find

M1 =

−1 1 −1 1 −1−1 1 −1 −1 1−1 1 −1 −1 1−1 1 1 −1 1−1 1 1 −1 1

, M2 =

1 0 1 0 11 0 1 1 01 0 1 1 01 0 0 1 01 0 0 1 0

.

Therefore, K has unit group rank 3.

14

Page 37: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.3: Only 2 instances known.2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 38: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.

4: Hundreds of thousands known.3: Only 2 instances known.2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 39: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.

3: Only 2 instances known.2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 40: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.3: Only 2 instances known.

2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 41: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.3: Only 2 instances known.2: No instances known.

1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 42: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.3: Only 2 instances known.2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 43: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Introduction

Problem Statement

Previously Known:

Previously Known Cases for Unit Group Ranks of TotallyReal Quintic Number Fields:

5: Millions known.4: Hundreds of thousands known.3: Only 2 instances known.2: No instances known.1: No instances known. (Conjectured to not exist.)

Say we could find a totally real quintic number field having aunit group rank of 1. We would like to find the one having thesmallest field discriminant.

15

Page 44: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Table Building Approach

One possible approach is to use a “table building”technique.That is, use an existing algorithm to generate an instanceof every number field of degree 5 satisfying somediscriminant bound. Sort the results by signature and thensort the relevant fields by unit group rank.

16

Page 45: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Hunter’s Theorem

Hunter’s Theorem: Let K be a number field of degree n overQ and let γn be Hermite’s Constant for dimension n. Then thereexists some α ∈ OK\Z with the following properties:

1 If σi(α) denotes the conjugates of α in C, then

n∑i=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

(|d(K )|

n

)1/(n−1)

2 0 ≤ TrK/Q(α) ≤ n/2.

17

Page 46: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Hunter’s Theorem

Hunter’s Theorem: Let K be a number field of degree n overQ and let γn be Hermite’s Constant for dimension n. Then thereexists some α ∈ OK\Z with the following properties:

1 If σi(α) denotes the conjugates of α in C, then

n∑i=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

(|d(K )|

n

)1/(n−1)

2 0 ≤ TrK/Q(α) ≤ n/2.

17

Page 47: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Hunter’s Theorem

Hunter’s Theorem: Let K be a number field of degree n overQ and let γn be Hermite’s Constant for dimension n. Then thereexists some α ∈ OK\Z with the following properties:

1 If σi(α) denotes the conjugates of α in C, then

n∑i=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

(|d(K )|

n

)1/(n−1)

2 0 ≤ TrK/Q(α) ≤ n/2.

17

Page 48: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Using Hunter’s Theorem:

Hence, suppose a number field K of degree n satisfies|d(K )| < B. Then there exists some α ∈ OK\Z such that

nXi=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

„|d(K )|

n

«1/(n−1)

≤ n4

+ γn−1

„Bn

«1/(n−1)

If we denote the characteristic polynomial of α by

Cα,Q(X ) = X n − a1X n−1 + · · ·+ (−1)nan =n∏

i=1

(X − σi(α)),

then we may use Hunter’s Theorem to start to bound therelevant coefficients.

18

Page 49: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Using Hunter’s Theorem:

Hence, suppose a number field K of degree n satisfies|d(K )| < B. Then there exists some α ∈ OK\Z such that

nXi=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

„|d(K )|

n

«1/(n−1)

≤ n4

+ γn−1

„Bn

«1/(n−1)

If we denote the characteristic polynomial of α by

Cα,Q(X ) = X n − a1X n−1 + · · ·+ (−1)nan =n∏

i=1

(X − σi(α)),

then we may use Hunter’s Theorem to start to bound therelevant coefficients.

18

Page 50: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Using Hunter’s Theorem:

Hence, suppose a number field K of degree n satisfies|d(K )| < B. Then there exists some α ∈ OK\Z such that

nXi=1

|σi(α)|2 ≤ 1n

TrK/Q(α)2 + γn−1

„|d(K )|

n

«1/(n−1)

≤ n4

+ γn−1

„Bn

«1/(n−1)

If we denote the characteristic polynomial of α by

Cα,Q(X ) = X n − a1X n−1 + · · ·+ (−1)nan =n∏

i=1

(X − σi(α)),

then we may use Hunter’s Theorem to start to bound therelevant coefficients.

18

Page 51: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Using Hunter’s Theorem:

Using elementary symmetric polynomials, the arithmetic –geometric mean inequality, and some ideas from field theory,we find:

|ak | ≤(

nk

)(a2

1n

+ γn−1

(Bn

)1/(n−1))k/2

.

For the constant term of the characteristic polynomial we find:

|an|2/n =

(n∏

i=1

|σi(α)|2)1/n

(a2

1n + γn−1

(Bn

)1/(n−1))

n.

19

Page 52: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials. Many arereducible and can be removed. Others result in isomorphicfields and can be removed. In the end, only one totally realquintic number field results from this list.

20

Page 53: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials. Many arereducible and can be removed. Others result in isomorphicfields and can be removed. In the end, only one totally realquintic number field results from this list.

20

Page 54: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials.

Many arereducible and can be removed. Others result in isomorphicfields and can be removed. In the end, only one totally realquintic number field results from this list.

20

Page 55: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials. Many arereducible and can be removed.

Others result in isomorphicfields and can be removed. In the end, only one totally realquintic number field results from this list.

20

Page 56: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials. Many arereducible and can be removed. Others result in isomorphicfields and can be removed.

In the end, only one totally realquintic number field results from this list.

20

Page 57: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

A Lesson in Inefficiency:

For example, to generate an instance of all quintic numberfields (up to isomorphism) satisfying the discriminant bound|d(K )| < 14,642, we compute all fields given by a root of

mα,Q(X ) = X 5 − a1X 4 + a2X 3 − a3X 2 + a4X − a5

where

0 ≤ a1 ≤ 2, |a2| ≤ 112, |a3| ≤ 374, |a4| ≤ 627 and |a5| ≤ 7.

This results in a list of 9,517,449,375 polynomials. Many arereducible and can be removed. Others result in isomorphicfields and can be removed. In the end, only one totally realquintic number field results from this list.

20

Page 58: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Problems with the Table Building Approach:

This approach has two very big problems:

Computationally very inefficient: We only wish to spendtime analyzing fields of the correct signature.Discriminant bound doesn’t exist: We don’t even know thata field with the property exists, so we have no bound.

Let’s create an algorithm that solves these problems and:Spend no computation time whatsoever on othersignatures.Requires no discriminant bound. (Once an instance of afield with the signature and property required is found, thenwe obtain a bound. Until then, develop a method to searchwith increasing discriminant bounds without repeatingcalculations.)

21

Page 59: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Problems with the Table Building Approach:

This approach has two very big problems:Computationally very inefficient: We only wish to spendtime analyzing fields of the correct signature.

Discriminant bound doesn’t exist: We don’t even know thata field with the property exists, so we have no bound.

Let’s create an algorithm that solves these problems and:Spend no computation time whatsoever on othersignatures.Requires no discriminant bound. (Once an instance of afield with the signature and property required is found, thenwe obtain a bound. Until then, develop a method to searchwith increasing discriminant bounds without repeatingcalculations.)

21

Page 60: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Problems with the Table Building Approach:

This approach has two very big problems:Computationally very inefficient: We only wish to spendtime analyzing fields of the correct signature.Discriminant bound doesn’t exist: We don’t even know thata field with the property exists, so we have no bound.

Let’s create an algorithm that solves these problems and:Spend no computation time whatsoever on othersignatures.Requires no discriminant bound. (Once an instance of afield with the signature and property required is found, thenwe obtain a bound. Until then, develop a method to searchwith increasing discriminant bounds without repeatingcalculations.)

21

Page 61: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A Table Building Approach

Problems with the Table Building Approach:

This approach has two very big problems:Computationally very inefficient: We only wish to spendtime analyzing fields of the correct signature.Discriminant bound doesn’t exist: We don’t even know thata field with the property exists, so we have no bound.

Let’s create an algorithm that solves these problems and:Spend no computation time whatsoever on othersignatures.Requires no discriminant bound. (Once an instance of afield with the signature and property required is found, thenwe obtain a bound. Until then, develop a method to searchwith increasing discriminant bounds without repeatingcalculations.)

21

Page 62: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

A New Approach:

We wish to generate all number fields (up to isomorphism)satisfying an increasing discriminant bound and havingsignature [p,0] for prime p.For a number field given by a root of

mα,Q(X ) = X p − a1X p−1 + · · ·+ (−1)pap =

p∏i=1

(X − σi(α)),

Hunter’s Theorem tells us how to bound a1 independentlyof discriminant bounds.We can use some relatively simple calculus for the othercoefficients, and then “reverse engineer” the discriminantbound by using Hunter’s Theorem.

22

Page 63: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

A New Approach:

We wish to generate all number fields (up to isomorphism)satisfying an increasing discriminant bound and havingsignature [p,0] for prime p.

For a number field given by a root of

mα,Q(X ) = X p − a1X p−1 + · · ·+ (−1)pap =

p∏i=1

(X − σi(α)),

Hunter’s Theorem tells us how to bound a1 independentlyof discriminant bounds.We can use some relatively simple calculus for the othercoefficients, and then “reverse engineer” the discriminantbound by using Hunter’s Theorem.

22

Page 64: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

A New Approach:

We wish to generate all number fields (up to isomorphism)satisfying an increasing discriminant bound and havingsignature [p,0] for prime p.For a number field given by a root of

mα,Q(X ) = X p − a1X p−1 + · · ·+ (−1)pap =

p∏i=1

(X − σi(α)),

Hunter’s Theorem tells us how to bound a1 independentlyof discriminant bounds.

We can use some relatively simple calculus for the othercoefficients, and then “reverse engineer” the discriminantbound by using Hunter’s Theorem.

22

Page 65: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

A New Approach:

We wish to generate all number fields (up to isomorphism)satisfying an increasing discriminant bound and havingsignature [p,0] for prime p.For a number field given by a root of

mα,Q(X ) = X p − a1X p−1 + · · ·+ (−1)pap =

p∏i=1

(X − σi(α)),

Hunter’s Theorem tells us how to bound a1 independentlyof discriminant bounds.We can use some relatively simple calculus for the othercoefficients, and then “reverse engineer” the discriminantbound by using Hunter’s Theorem.

22

Page 66: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.The minimal polynomial in question is of degree 5, with 5distinct real roots.Hence, the first, second and third derivatives of thispolynomial are separable with real roots.The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 67: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.

The minimal polynomial in question is of degree 5, with 5distinct real roots.Hence, the first, second and third derivatives of thispolynomial are separable with real roots.The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 68: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.The minimal polynomial in question is of degree 5, with 5distinct real roots.

Hence, the first, second and third derivatives of thispolynomial are separable with real roots.The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 69: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.The minimal polynomial in question is of degree 5, with 5distinct real roots.Hence, the first, second and third derivatives of thispolynomial are separable with real roots.

The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 70: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.The minimal polynomial in question is of degree 5, with 5distinct real roots.Hence, the first, second and third derivatives of thispolynomial are separable with real roots.The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 71: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

What We Already Know:

For signature [5,0] fields, we already know 0 ≤ a1 ≤ 2.The minimal polynomial in question is of degree 5, with 5distinct real roots.Hence, the first, second and third derivatives of thispolynomial are separable with real roots.The third derivative is given by

m′′′α,Q(α) = 60X 2 − 24a1X + 6a2

and will have two real roots precisely when a2 < 2a21/5.

In the worst case, we find a2 ≤ 1.

23

Page 72: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

The Main Idea – Heart of the Algorithm:We iterate on a2 downward from a2 = 1.In each of the cases a1 = 0,1,2:

1 Using the given a1 and a2, integrate m′′′α,Q(α).

2 Calculate the range of a3 values for which m′′α,Q(α) has only

distinct real roots.3 The idea is: It can only be pushed up or down so far before

a root becomes complex.4 Iterate over that range doing the following:5 Using the given a1,a2,a3, integrate m′′

α,Q(α).6 Calculate the range of a4 values for which m′

α,Q(α) has onlydistinct real roots.

7 Iterate over that range...

This results in a “tree” of coefficient values, dependent on(in this order)

a2, a1, a3, a4, a5

24

Page 73: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

The Main Idea – Heart of the Algorithm:We iterate on a2 downward from a2 = 1.In each of the cases a1 = 0,1,2:

1 Using the given a1 and a2, integrate m′′′α,Q(α).

2 Calculate the range of a3 values for which m′′α,Q(α) has only

distinct real roots.3 The idea is: It can only be pushed up or down so far before

a root becomes complex.4 Iterate over that range doing the following:5 Using the given a1,a2,a3, integrate m′′

α,Q(α).6 Calculate the range of a4 values for which m′

α,Q(α) has onlydistinct real roots.

7 Iterate over that range...This results in a “tree” of coefficient values, dependent on(in this order)

a2, a1, a3, a4, a5

24

Page 74: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

Using the Algorithm to Find Fields:

Using this “tree” approach, we iterate a2 downward until aninstance of a field with our property is found.Once located, we use that field’s discriminant to calculatethe lower bound for a2 using Hunter’s Theorem, andcontinue in the same fashion until either

1 That bound is reached. (The field in question is the lowestdiscriminant field satisfying the signature and property.)

2 Another field with smaller discriminant is found and werecalculate the a2 bound.

We can also use some isomorphism limiting algorithms(e.g., POLREDABS) before calculating number fieldproperties in order to limit repeat calculations.

25

Page 75: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

Using the Algorithm to Find Fields:

Using this “tree” approach, we iterate a2 downward until aninstance of a field with our property is found.

Once located, we use that field’s discriminant to calculatethe lower bound for a2 using Hunter’s Theorem, andcontinue in the same fashion until either

1 That bound is reached. (The field in question is the lowestdiscriminant field satisfying the signature and property.)

2 Another field with smaller discriminant is found and werecalculate the a2 bound.

We can also use some isomorphism limiting algorithms(e.g., POLREDABS) before calculating number fieldproperties in order to limit repeat calculations.

25

Page 76: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

Using the Algorithm to Find Fields:

Using this “tree” approach, we iterate a2 downward until aninstance of a field with our property is found.Once located, we use that field’s discriminant to calculatethe lower bound for a2 using Hunter’s Theorem, andcontinue in the same fashion until either

1 That bound is reached. (The field in question is the lowestdiscriminant field satisfying the signature and property.)

2 Another field with smaller discriminant is found and werecalculate the a2 bound.

We can also use some isomorphism limiting algorithms(e.g., POLREDABS) before calculating number fieldproperties in order to limit repeat calculations.

25

Page 77: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

A New Approach

Using the Algorithm to Find Fields:

Using this “tree” approach, we iterate a2 downward until aninstance of a field with our property is found.Once located, we use that field’s discriminant to calculatethe lower bound for a2 using Hunter’s Theorem, andcontinue in the same fashion until either

1 That bound is reached. (The field in question is the lowestdiscriminant field satisfying the signature and property.)

2 Another field with smaller discriminant is found and werecalculate the a2 bound.

We can also use some isomorphism limiting algorithms(e.g., POLREDABS) before calculating number fieldproperties in order to limit repeat calculations.

25

Page 78: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

Testing the Algorithm

A general form of the algorithm (for signature [p,0] with p aprime) was coded in the PARI/GP environment.Given a signature [p,0] and a property P, the algorithmfinds a smallest discriminant field of signature [p,0]satisfying P.

26

Page 79: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

Testing the Algorithm

A general form of the algorithm (for signature [p,0] with p aprime) was coded in the PARI/GP environment.

Given a signature [p,0] and a property P, the algorithmfinds a smallest discriminant field of signature [p,0]satisfying P.

26

Page 80: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

Testing the Algorithm

A general form of the algorithm (for signature [p,0] with p aprime) was coded in the PARI/GP environment.Given a signature [p,0] and a property P, the algorithmfinds a smallest discriminant field of signature [p,0]satisfying P.

26

Page 81: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

Examples:

The following queries were made, results were given andverified in QaoS:

The smallest discriminant totally real quintic number fieldhaving an abelian Galois group:

The algorithm terminates at a2 = −6 and finds the uniquefield having discriminant 14,641:

X 5 + X 4 − 4X 3 − 3X 2 + 3X + 1

This is the smallest discriminant for any totally real quinticnumber field.

27

Page 82: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

Examples:

The following queries were made, results were given andverified in QaoS:

The smallest discriminant totally real quintic number fieldhaving an abelian Galois group:

The algorithm terminates at a2 = −6 and finds the uniquefield having discriminant 14,641:

X 5 + X 4 − 4X 3 − 3X 2 + 3X + 1

This is the smallest discriminant for any totally real quinticnumber field.

27

Page 83: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving class number 2:

When a2 = −7 the algorithm returns the field generated by aroot of

X 5 − 2X 4 − 7X 3 + 8X 2 + 5X − 1

wih field discriminant 10,940,453. The calculated lower boundfor a2 is found to be −28. When a2 = −11 the field given by

X 5 − 11X 3 − 9X 2 + 14X + 9

with discriminant 4,010,276 is found. The new lower bound fora2 is -22, and no smaller discriminant fields are found.

28

Page 84: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving class number 2:

When a2 = −7 the algorithm returns the field generated by aroot of

X 5 − 2X 4 − 7X 3 + 8X 2 + 5X − 1

wih field discriminant 10,940,453. The calculated lower boundfor a2 is found to be −28.

When a2 = −11 the field given by

X 5 − 11X 3 − 9X 2 + 14X + 9

with discriminant 4,010,276 is found. The new lower bound fora2 is -22, and no smaller discriminant fields are found.

28

Page 85: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving class number 2:

When a2 = −7 the algorithm returns the field generated by aroot of

X 5 − 2X 4 − 7X 3 + 8X 2 + 5X − 1

wih field discriminant 10,940,453. The calculated lower boundfor a2 is found to be −28. When a2 = −11 the field given by

X 5 − 11X 3 − 9X 2 + 14X + 9

with discriminant 4,010,276 is found. The new lower bound fora2 is -22, and no smaller discriminant fields are found.

28

Page 86: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving regulator greater than 100 but less than 101:

X 5 − X 4 − 11X 3 + 7X 2 + 18X + 6

The smallest discriminant totally real number field of odd primedegree having a non-cyclic simple Galois group:

X 5 + X 4 − 11X 3 − X 2 + 12X + 4 (A5)

The smallest discriminant totally real number field of odd primedegree greater than 5 having a primitive Galois group:

X 7 − X 6 − 6X 5 + 4X 4 + 10X 3 − 4X 2 − 4X + 1 (S7)

29

Page 87: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving regulator greater than 100 but less than 101:

X 5 − X 4 − 11X 3 + 7X 2 + 18X + 6

The smallest discriminant totally real number field of odd primedegree having a non-cyclic simple Galois group:

X 5 + X 4 − 11X 3 − X 2 + 12X + 4 (A5)

The smallest discriminant totally real number field of odd primedegree greater than 5 having a primitive Galois group:

X 7 − X 6 − 6X 5 + 4X 4 + 10X 3 − 4X 2 − 4X + 1 (S7)

29

Page 88: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving regulator greater than 100 but less than 101:

X 5 − X 4 − 11X 3 + 7X 2 + 18X + 6

The smallest discriminant totally real number field of odd primedegree having a non-cyclic simple Galois group:

X 5 + X 4 − 11X 3 − X 2 + 12X + 4 (A5)

The smallest discriminant totally real number field of odd primedegree greater than 5 having a primitive Galois group:

X 7 − X 6 − 6X 5 + 4X 4 + 10X 3 − 4X 2 − 4X + 1 (S7)

29

Page 89: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Testing the Algorithm

The smallest discriminant totally real quintic number fieldhaving regulator greater than 100 but less than 101:

X 5 − X 4 − 11X 3 + 7X 2 + 18X + 6

The smallest discriminant totally real number field of odd primedegree having a non-cyclic simple Galois group:

X 5 + X 4 − 11X 3 − X 2 + 12X + 4 (A5)

The smallest discriminant totally real number field of odd primedegree greater than 5 having a primitive Galois group:

X 7 − X 6 − 6X 5 + 4X 4 + 10X 3 − 4X 2 − 4X + 1 (S7)

29

Page 90: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Searching for a Rank 1 Totally Real Quintic:

The algorithm (PARI/GP) ran on 28 CPUs at 2.8 GHz for 12days.In the process, some things were learned: blocks ofreducible polynomials, memory requirements, etc.

30

Page 91: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Searching for a Rank 1 Totally Real Quintic:

The algorithm (PARI/GP) ran on 28 CPUs at 2.8 GHz for 12days.

In the process, some things were learned: blocks ofreducible polynomials, memory requirements, etc.

30

Page 92: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Searching for a Rank 1 Totally Real Quintic:

The algorithm (PARI/GP) ran on 28 CPUs at 2.8 GHz for 12days.In the process, some things were learned: blocks ofreducible polynomials, memory requirements, etc.

30

Page 93: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Fields Having Previously Known Ranks:

The totally real quintic number field of smallest discriminanthaving...

Unit group rank 5:

X 5 − X 4 − 4X 3 + 3X 2 + 3X − 1 d = 14,641

Unit group rank 4:

X 5 − 2X 4 − 3X 3 + 5X 2 + x − 1 d = 36,497

Unit group rank 3:

X 5 − 2X 4 − 6X 3 + 8X 2 + 8X + 1 d = 638,597

31

Page 94: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Fields Having Previously Known Ranks:

The totally real quintic number field of smallest discriminanthaving...

Unit group rank 5:

X 5 − X 4 − 4X 3 + 3X 2 + 3X − 1 d = 14,641

Unit group rank 4:

X 5 − 2X 4 − 3X 3 + 5X 2 + x − 1 d = 36,497

Unit group rank 3:

X 5 − 2X 4 − 6X 3 + 8X 2 + 8X + 1 d = 638,597

31

Page 95: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Fields Having Previously Known Ranks:

The totally real quintic number field of smallest discriminanthaving...

Unit group rank 5:

X 5 − X 4 − 4X 3 + 3X 2 + 3X − 1 d = 14,641

Unit group rank 4:

X 5 − 2X 4 − 3X 3 + 5X 2 + x − 1 d = 36,497

Unit group rank 3:

X 5 − 2X 4 − 6X 3 + 8X 2 + 8X + 1 d = 638,597

31

Page 96: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Fields Having Previously Known Ranks:

The totally real quintic number field of smallest discriminanthaving...

Unit group rank 5:

X 5 − X 4 − 4X 3 + 3X 2 + 3X − 1 d = 14,641

Unit group rank 4:

X 5 − 2X 4 − 3X 3 + 5X 2 + x − 1 d = 36,497

Unit group rank 3:

X 5 − 2X 4 − 6X 3 + 8X 2 + 8X + 1 d = 638,597

31

Page 97: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

The First Example of a Rank 2 Field:

The number field generated by a root α of the polynomial

X 5 − X 4 − 21X 3 − 7X 2 + 68X + 60

is the first known example of a totally real quintic having unitgroup rank 2.

It has discriminant 52,315,684 = 22 · 449 · 29129.The class number is 2.The Galois group is S5.

32

Page 98: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

The First Example of a Rank 2 Field:

The number field generated by a root α of the polynomial

X 5 − X 4 − 21X 3 − 7X 2 + 68X + 60

is the first known example of a totally real quintic having unitgroup rank 2.

It has discriminant 52,315,684 = 22 · 449 · 29129.The class number is 2.The Galois group is S5.

32

Page 99: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Success!! The First Example of a Rank 1 Field:

The number field generated by a root α of the polynomial

X 5 − 43X 3 − 5X 2 + 262X − 49

is the first known example of a totally real quintic having unitgroup rank 1.

It has discriminant

169,942,443,923,524 = 22 · 4248561090881

The class number is 4.The Galois group is S5.

33

Page 100: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Success!! The First Example of a Rank 1 Field:

The number field generated by a root α of the polynomial

X 5 − 43X 3 − 5X 2 + 262X − 49

is the first known example of a totally real quintic having unitgroup rank 1.

It has discriminant

169,942,443,923,524 = 22 · 4248561090881

The class number is 4.The Galois group is S5.

33

Page 101: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.

Rank 5: 20,075,722 (29.7%)Rank 4: 40,127,241 (59.3%)Rank 3: 7,400,436 (10.9%)Rank 2: 38,562 (0.057%)Rank 1: 8 (0.000012%)

34

Page 102: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.Rank 5: 20,075,722 (29.7%)

Rank 4: 40,127,241 (59.3%)Rank 3: 7,400,436 (10.9%)Rank 2: 38,562 (0.057%)Rank 1: 8 (0.000012%)

34

Page 103: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.Rank 5: 20,075,722 (29.7%)Rank 4: 40,127,241 (59.3%)

Rank 3: 7,400,436 (10.9%)Rank 2: 38,562 (0.057%)Rank 1: 8 (0.000012%)

34

Page 104: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.Rank 5: 20,075,722 (29.7%)Rank 4: 40,127,241 (59.3%)Rank 3: 7,400,436 (10.9%)

Rank 2: 38,562 (0.057%)Rank 1: 8 (0.000012%)

34

Page 105: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.Rank 5: 20,075,722 (29.7%)Rank 4: 40,127,241 (59.3%)Rank 3: 7,400,436 (10.9%)Rank 2: 38,562 (0.057%)

Rank 1: 8 (0.000012%)

34

Page 106: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Main Results

Final Results:67,641,969 non-isomorphic totally real quintics generated.Rank 5: 20,075,722 (29.7%)Rank 4: 40,127,241 (59.3%)Rank 3: 7,400,436 (10.9%)Rank 2: 38,562 (0.057%)Rank 1: 8 (0.000012%)

34

Page 107: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

Where to go from here...?

This approach can be generalized to most signatures forfields of prime degree.Using results of M.E.Pohst, it can be generalized to certainsignatures for composite degree fields.

35

Page 108: An Algorithm in Computational Algebraic Number Theory - …euclid.colorado.edu/~hilljb/talk.deBrun.2008.pdf · 2010-08-16 · An Algorithm in Computational Algebraic Number Theory

An Algorithm in Computational Algebraic Number Theory

Main Results

The End

[email protected]

http://www.jasonbhill.com

36