Skip to content →

Tag: arxiv

working archive plugin, please!

Over the last two weeks Ive ported all old neverendingbooks-post from the last 4 years to a nearly readable format. Some tiny problems remain : a few TeX-heavy old posts are still in $…$ format rather than LaTeXrender-compatible (but Ill fix this soon), a few links may turn out to be dead (still have to check out those), TheLibrary-project links do not exist at the moment (have to decide whether to revive the project or to start a similar idea afresh), some other techie-things such as FoaF-stuff will be updated/expanded soon, et. etc. (and still have to port some 20 odd posts).

Anyway, the good news being that we went from about 40 posts since last july to over 310 posts, all open to the internal Search engine. Having all this stuff online is only useful if one can browse through it easily, so I wanted to install a proper up-to-date archive-plugin…

The current theme Redoable has build-in support for the Extended Live Archives v0.10beta-r18 plugin which would be ideal if I could get it installed… Im not the total newbie in installing WordPress-plugins and Ive read all the documentation and the support-forum and chmodded whathever I felt like chmodding, but still no success… If you know how to kick it into caching the necessary files, please drop a comment!

The next alternative Ive tried was the AWSOM Archive Version 1.2.3 plugin which gave me a pull-down menu just under the title-bar but not much seems to happen when using bloody Safari (Flock was OK though). Maybe Ill give it another go…

UPDATE (jan. 9th) : The AWSOM Archive seems to be working fine with the Redoable theme when custom installed in the footer. So, there is now a pulldown-menu at the bottom of the page.

**UPDATE (jan. 12th) : Ive installed the new version 1.3 of AWSOM Archive and it works from the default position **

At a loss I opted in the end for the simplest (though not the most aesthetic) plugin : Justin Blanton’s Smart Archives. This provides a year-month scheme at the top followed by a reverse ordered list of all months and titles of posts and is available as the arXiv neverendingbooks link available also from the sidebar (up, second link). I hope it will help you not to get too lost on this site…

Suggestions for a working-from-the-box WordPress Archive plugin, anyone???

4 Comments

tori & crypto : Diffie-Hellman or GCHQ?

Boris Kunyavskii arXived the paper Algebraic tori – thirty years after dedicated to the 80th anniversary of V. E. Voskresenskii. The goal is to give an overview of results of V. E. Voskresenskii on arithmetic and birational properties of algebraic tori which culminated in his monograph “Algebraic Tori” published in Russian 30 years ago. As Ive worked on this stuff a long time ago I glanced through the paper and it contains a nice summary of the work of V.E. Voskresenskii, and later of Jean-Louis Colliot-Thelene, Jean-Jacques Sansuc and David Saltman. To my surprise I also made a guest-appearance and even seem to have a conjecture (??!!). Fortunately the ‘conjecture’ turned out to be correct as was proved by Nicole Lemire and Martin Lorenz. But a much bigger surprise (at least to me) is contained in the final section of the paper where applications of (stable) rationality of certain tori are given to primality testing and public key cryptography!

In [GPS]
the authors propose to use a similar idea of compression for using tori
in an even more recent cryptographic protocol (so-called pairing-based
cryptography). It is interesting to note that the efficiency (compression factor) of the above mentioned cryptosystems heavily depends on
rationality of tori under consideration (more precisely, on an explicit
rational parameterization of the underlying variety). As the tori used
by Rubin and Silverberg are known to be stably rational, the seemingly abstract question on rationality of a given stably rational torus
is moving to the area of applied mathematics. The first challenging
problem here is to obtain an explicit rational parameterization of the
8-dimensional torus $T_{30} $ , deïfined over a finite field k and splitting over
its cyclic extension L of degree 30.

This is a particular case of a problem posed by Voskresenskii [Vo77,
Problem 5.12] 30 years ago. Let us hope that we will not have to wait
another 30 years for answering this question on a degree 30 extension.

That’s all it takes to get me seriously side-tracked… so the last couple of hours I’ve been reading up on this connection between tori and cryptography. I will spend a couple of posts on these beautiful results. The latest seems to be that, while rationality of $T_{30} $ is still unknown, one can use an explicit stable-rationality description of it to get a better bound than the XTR-system (the system corresponding to the torus $T_{6} $) which in turn is better than the LUC-system (corresponding to $T_2 $), which is turn is twice as efficient as the Diffie-Hellman key exchange system… So let us start gently with the latter one…

Whitfield Diffie (r.) and Martin Hellman (m.) published in 1976 their public key-exchange system. Take a large prime power $q=p^N $, make it public and consider the finite field $\mathbb{F}_q $ which is known to have a cyclic group of units $\mathbb{F}^*_q $ of order $q-1 $. Now, take $g $ to be an element in it of large order (preferable a generator but that isnt necessary) and also make this element public.

Now choose a random integer $a $ (your hidden secret) and compute the element $g^a \in \mathbb{F}_q $ and publicize this element. Suppose someone else published his/her element $g^b $ constructed from his/her secret integer $b $ then both you and this other person can compute from the published data and their secret numbers the element (the shared key)

$g^{ab}=(g^b)^a = (g^a)^b $

(because you know $a $ and the published $g^b $ and your correspondent knows $b $ and the published $g^a $) but nobody else can compute it from the public-available data only because discrete logarithms cannot be feasibly computed in the group $\mathbb{F}_q^* $. Hellman suggests to call this system the Diffie-Hellman-Merkl key-exchange (via this link)

The first researchers to discover and publish the concepts of PKC were Whitfield Diffie and Martin Hellman from Stanford University, and Ralph Merkle from the University of California at Berkeley. As so often happens in the scientific world, the two groups were working independently on the same problem — Diffie and Hellman on public key cryptography and Merkle on public key distribution — when they became aware of each other’s work and realized there was synergy in their approaches. In Hellman’s words: “We each had a key part of the puzzle and while it’s true one of us first said X, and another of us first said Y, and so on, it was the combination and the back and forth between us that allowed the discovery.”

And that was the full story until 1997. In December, 1997, it was revealed that researchers at the GCHQ organization did some work in the early 1970’s in the field of “non-secret encryption”. The people involved are James Ellis, Clifford Cocks and Malcolm Williamson (r.).

Here is a note by Ellis on his recollection of the history of ‘Non-secret encryption” :

Cryptography is a most unusual science. Most professional scientists aim to be the first to publish their work,
because it is through dissemination that the work realises its value. In contrast, the fullest value of cryptography
is realised by minimising the information available to potential adversaries. Thus professional cryptographers
normally work in closed communities to provide sufficient professional interaction to ensure quality while
maintaining secrecy from outsiders. Revelation of these secrets is normally only sanctioned in the interests
of historical accuracy after it has been demonstrated clearly that no further benefit can be obtained from
continued secrecy.
In keeping with this tradition it is now appropriate to tell the story of the invention and development within
CESG of non-secret encryption (NSE) which was our original name for what is now called PKC. The task of writing
this paper has devolved on me because NSE was my idea and I can therefore describe these early developments from
personal experience. No techniques not already public knowledge, or specific applications of NSE will be mentioned…

The once secret notes of Williamson are also available. NON-SECRET ENCRYPTION USING A FINITE FIELD
by M J Williamson, 21 January 1974
and THOUGHTS ON CHEAPER NON-SECRET ENCRYPTION
M J Williamson, 10 August 1976
.

2 Comments

Superpotentials and Calabi-Yaus

Yesterday, Jan Stienstra gave a talk at theARTS entitled “Quivers, superpotentials and Dimer Models”. He started off by telling that the talk was based on a paper he put on the arXiv Hypergeometric Systems in two Variables, Quivers, Dimers and Dessins d’Enfants but that he was not going to say a thing about dessins but would rather focuss on the connection with superpotentials instead…pleasing some members of the public, while driving others to utter despair.

Anyway, it gave me the opportunity to figure out for myself what dessins might have to do with dimers, whathever these beasts are. Soon enough he put on a slide containing the definition of a dimer and from that moment on I was lost in my own thoughts… realizing that a dessin d’enfant had to be a dimer for the Dedekind tessellation of its associated Riemann surface!
and a few minutes later I could slap myself on the head for not having thought of this before :

There is a natural way to associate to a Farey symbol (aka a permutation representation of the modular group) a quiver and a superpotential (aka a necklace) defining (conjecturally) a Calabi-Yau algebra! Moreover, different embeddings of the cuboid tree diagrams in the hyperbolic plane may (again conjecturally) give rise to all sorts of arty-farty fanshi-wanshi dualities…

I’ll give here the details of the simplest example I worked out during the talk and will come back to general procedure later, when I’ve done a reference check. I don’t claim any originality here and probably all of this is contained in Stienstra’s paper or in some physics-paper, so if you know of a reference, please leave a comment. Okay, remember the Dedekind tessellation ?

So, all hyperbolic triangles we will encounter below are colored black or white. Now, take a Farey symbol and consider its associated special polygon in the hyperbolic plane. If we start with the Farey symbol

[tex]\xymatrix{\infty \ar@{-}_{(1)}[r] & 0 \ar@{-}_{\bullet}[r] & 1 \ar@{-}_{(1)}[r] & \infty} [/tex]

we get the special polygonal region bounded by the thick edges, the vertical edges are identified as are the two bottom edges. Hence, this fundamental domain has 6 vertices (the 5 blue dots and the point at $i \infty $) and 8 hyperbolic triangles (4 colored black, indicated by a black dot, and 4 white ones).

Right, now let us associate a quiver to this triangulation (which embeds the quiver in the corresponding Riemann surface). The vertices of the triangulation are also the vertices of the quiver (so in our case we are going for a quiver with 6 vertices). Every hyperbolic edge in the triangulation gives one arrow in the quiver between the corresponding vertices. The orientation of the arrow is determined by the color of a triangle of which it is an edge : if the triangle is black, we run around its edges counter-clockwise and if the triangle is white we run over its edges clockwise (that is, the orientation of the arrow is independent of the choice of triangles to determine it). In our example, there is one arrows directed from the vertex at $i $ to the vertex at $0 $, whether you use the black triangle on the left to determine the orientation or the white triangle on the right. If we do this for all edges in the triangulation we arrive at the quiver below

where x,y and z are the three finite vertices on the $\frac{1}{2} $-axis from bottom to top and where I’ve used the physics-convention for double arrows, that is there are two F-arrows, two G-arrows and two H-arrows. Observe that the quiver is of Calabi-Yau type meaning that there are as much arrows coming into a vertex as there are arrows leaving the vertex.

Now that we have our quiver we determine the superpotential as follows. Fix an orientation on the Riemann surface (for example counter-clockwise) and sum over all black triangles the product of the edge-arrows counterclockwise MINUS sum over all white triangles
the product of the edge arrows counterclockwise. So, in our example we have the cubic superpotential

$IH’B+HAG+G’DF+FEC-BHI-H’G’A-GFD-CEF’ $

From this we get the associated noncommutative algebra, which is the quotient of the path algebra of the above quiver modulo the following ‘commutativity relations’

$\begin{cases} GH &=G’H’ \\ IH’ &= IH \\ FE &= F’E \\ F’G’ &= FG \\ CF &= CF’ \\ EC &= GD \\ G’D &= EC \\ HA &= DF \\ DF’ &= H’A \\ AG &= BI \\ BI &= AG’ \end{cases} $

and morally this should be a Calabi-Yau algebra (( can someone who knows more about CYs verify this? )). This concludes the walk through of the procedure. Summarizing : to every Farey-symbol one associates a Calabi-Yau quiver and superpotential, possibly giving a Calabi-Yau algebra!

6 Comments

Wiki on iTouch

I’ve reduced the springboard of my jailbroken iTouch to a minimalistic Dock consisting only of the iPhone Mail.app to read and write mails properly (as opposed to having to use webmail on an unbroken iTouch), an RSS-reader to watch other math-blogs and the arXiv (via Install.app under Productivity/MobileRSS), the Safari webbrowser and a Finder (via Install.app under Productivity/MobileFinder) to launch all other programs, when needed.

To achieve this effect, install (as in the jailbreak-post) all these apps as well as Customize.app (under Utilities). This allows you to change the icon order on your springboard and dock as well as to toggle the visibility of these icons. Just make sure to have either Finder or Customize visible at all times or it will be difficult to get at the invisible apps (an alternative is to install something called Sunburst).

While the iTouch is great to read, it is harder to type a lot of text into it. Whence the idea of running a Wiki on it (now that we have PHP enabled Apache) and use another computer to create the wiki-pages. For example think of a small database of weblinks with descriptions. Rather than bookmark them one by one in Safari, make wiki-pages for them and use the Search function to get the desired link.

The first problem is that Wikis take a lot of space and you would like to have it installed under /Library/WebServer/Documents to view it with your inbuild Safari browser by typing something like http://localhost/wiki. To see the problem with this, ssh into your iTouch and issue a df command. You will get something like

# df
Filesystem           1K-blocks      Used Available Use% Mounted on
/dev/disk0s1            307200    297188      6940  98% /
devfs                       15        15         0 100% /dev
/dev/disk0s2          15551928    517904  15034024   4% /private/var

That is, you’ve used up almost all disk space of the partition on which the /Library/WebServer/Documents folder resides. So, we first need to move it to the other partition under /private/var, so why not create a Documents-folder under the root-homefolder and link to it?

cd /Library/WebServer
mv Documents /private/var/root/
ln -s /private/var/root/Documents Documents

Check it with http://localhost/ and you should still see your default Apache-page (though it now comes from another location). The next step is to find a PHP-Wiki hat works on the iTouch and doesn’t require a Mysql-database. I’ve tried at least ten without success and then I turned to the Wiki Engines Page and found QWikiWiki which does seem to work. So download it, rename the folder to something you like such as ‘qwiki’ and upload via SFTP to the /var/root/Documents folder of your iTouch and chmod it recursively to 777. If you ever need to change some of the PHP-variables, copy the php.ini from you mac over to the /opt/iphone/bin folder of the iTouch.

Finally, use a browser on your other computer to access the install file of Qwiki on the iTouch. For example, if the IP of iTouch is 10.0.1.197 then type

http://10.0.1.197/qwiki/install.php

and follow the online instructions. A few moments later you can type in your first wiki-page!

Some things still need to be done like optimizing the CSS for iTouch while serving the normal CSS for usual computers, but that’ll have to wait…

4 Comments

Segal’s formal neighbourhood result

Yesterday, Ed Segal gave a talk at the Arts. His title “Superpotential algebras from 3-fold singularities” didnt look too promising to me. And sure enough it was all there again : stringtheory, D-branes, Calabi-Yaus, superpotentials, all the pseudo-physics babble that spreads virally among the youngest generation of algebraists and geometers.

Fortunately, his talk did contain a general ringtheoretic gem. After a bit of polishing up this gem, contained in his paper The A-infinity Deformation Theory of a Point and the Derived Categories of Local Calabi-Yaus, can be stated as follows.

Let $A $ be a $\mathbb{C} $-algebra and let $M = S_1 \oplus \ldots \oplus S_k $ be a finite dimensional semi-simple representation with distinct simple components. Let $\mathfrak{m} $ be the kernel of the algebra epimorphism $A \rightarrow S $ to the semi-simple algebra $S=End(M) $. Then, the $\mathfrak{m} $-adic completion of $A $ is Morita-equivalent to the completion of a quiver-algebra with relations. The nice thing is that both the quiver and relations come in a canonical way from the $A_{\infty} $-structure on the Ext-algebra $Ext^{\bullet}_A(M,M) $. More precisely, there is an isomorphism

$\hat{A}_{\mathfrak{m}} \simeq \frac{\hat{T}_S(Ext^1_A(M,M)^{\ast})}{(Im(HMC)^{\ast})} $

where the homotopy Maurer-Cartan map comes from the $A_{\infty} $ structure maps

$HMC = \oplus_i m_i~:~T_S(Ext_A^1(M,M)) \rightarrow Ext^2_A(M,M) $

and hence the defining relations of the completion are given by the image of the dual of this map.

For ages, Ive known this result in the trivial case of formally smooth algebras (where $Ext^2_A(M,M)=0 $ and hence there are no relations to divide out) and where it is a consequence of a special case of the Cuntz-Quillen “tubular neighborhood” result. Completions of formally smooth algebras at semi-simples are Morita equivalent to completions of path algebras. This fact motivated all the local-quiver technology that was developed here in Antwerp over the last decade (see my book if you want to know the details).

Also for 3-dimensional Calabi-Yau algebras it states that the completions at semi-simples are Morita equivalent to completions of quotients of path algebras by the relations coming from a superpotential (aka a necklace) by taking partial noncommutative derivatives. Here the essential ingredient is that $Ext^2_A(M,M)^{\ast} \simeq Ext^1_A(M,M) $ in this case.

One Comment

The M(13)-groupoid (2)

Conway’s puzzle M(13) involves the 13 points and 13 lines of $\mathbb{P}^2(\mathbb{F}_3) $. On all but one point numbered counters are placed holding the numbers 1,…,12 and a move involves interchanging one counter and the ‘hole’ (the unique point having no counter) and interchanging the counters on the two other points of the line determined by the first two points. In the picture on the left, the lines are respresented by dashes around the circle in between two counters and the points lying on this line are those that connect to the dash either via a direct line or directly via the circle. In the first part we saw that the group of all reachable positions in Conway’s M(13) puzzle having the hole at the top positions contains the sporadic simple Mathieu group $M_{12} $ as a subgroup. To see the reverse inclusion we have to recall the definition of the ternary Golay code named in honour of the Swiss engineer Marcel Golay who discovered in 1949 the binary Golay code that we will encounter _later on_.

The ternary Golay code $\mathcal{C}_{12} $ is a six-dimenional subspace in $\mathbb{F}_3^{\oplus 12} $ and is spanned by its codewords of weight six (the Hamming distance of $\mathcal{C}_{12} $ whence it is a two-error correcting code). There are $264 = 2 \times 132 $ weight six codewords and they can be obtained from the 132 hexads, we encountered before as the winning positions of Mathieu’s blackjack, by replacing the stars by signs + or – using the following rules. By a tet (from tetracodeword) we mean a 3×4 array having 4 +-signs indicating the row-positions of a tetracodeword. For example

$~\begin{array}{|c|ccc|} \hline & + & & \\ + & & + & \\ & & & + \\ \hline + & 0 & + & – \end{array} $ is the tet corresponding to the bottom-tetracodeword. $\begin{array}{|c|ccc|} \hline & + & & \\ & + & & \\ & + & & \\ \hline & & & \end{array} $ A col is an array having +-signs along one of the four columns. The signed hexads will now be the hexads that can be written as $\mathbb{F}_3 $ vectors as (depending on the column-distributions of the stars in the hexad indicated between brackets)

$col-col~(3^20^2)\qquad \pm(col+tet)~(31^3) \qquad tet-tet~(2^30) \qquad \pm(col+col-tet)~(2^21^2) $

For example, the hexad on the right has column-distribution $2^30 $ so its signed versions are of the form tet-tet. The two tetracodewords must have the same digit (-) at place four (so that they cancel and leave an empty column). It is then easy to determine these two tetracodewords giving the signed hexad (together with its negative, obtained by replacing the order of the two codewords)

$\begin{array}{|c|ccc|} \hline \ast & \ast & & \\ \ast & & \ast & \\ & \ast & \ast & \\ \hline – & + & 0 & – \end{array} $ signed as
$\begin{array}{|c|ccc|} \hline + & & & \\ & & & \\ & + & + & + \\ \hline 0 & – & – & – \end{array} – \begin{array}{|c|ccc|} \hline & + & & \\ + & & + & \\ & & & + \\ \hline + & 0 & + & – \end{array} = \begin{array}{|c|ccc|} \hline + & – & & \\ – & & – & \\ & + & + & \\ \hline – & + & 0 & – \end{array} $

and similarly for the other cases. As Conway&Sloane remark ‘This is one of many cases when the process is easier performed than described’.

We have an order two operation mapping a signed hexad to its negative and as these codewords span the Golay code, this determines an order two automorphism of $\mathcal{C}_{12} $. Further, forgetting about signs, we get the Steiner-system S(5,6,12) of hexads for which the automorphism group is $M_{12} $ hence the automorphism group op the ternary Golay code is $2.M_{12} $, the unique nonsplit central extension of $M_{12} $.

Right, but what is the connection between the Golay code and Conway’s M(13)-puzzle which is played with points and lines in the projective plane $\mathbb{P}^2(\mathbb{F}_3) $? There are 13 points $\mathcal{P} $ so let us consider a 13-dimensional vectorspace $X=\mathbb{F}_3^{\oplus 13} $ with basis $x_p~:~p \in \mathcal{P} $. That is a vector in X is of the form $\vec{v}=\sum_p v_px_p $ and consider the ‘usual’ scalar product $\vec{v}.\vec{w} = \sum_p v_pw_p $ on X. Next, we bring in the lines in $\mathbb{P}^2(\mathbb{F}_3) $.

For each of the 13 lines l consider the vector $\vec{l} = \sum_{p \in l} x_p $ with support the four points lying on l and let $\mathcal{C} $ be the subspace (code) of X spanned by the thirteen vectors $\vec{l} $. Vectors $\vec{c},\vec{d} \in \mathcal{C} $ satisfy the remarkable identity $\vec{c}.\vec{d} = (\sum_p c_p)(\sum_p d_p) $. Indeed, both sides are bilinear in $\vec{c},\vec{d} $ so it suffices to check teh identity for two line-vectors $\vec{l},\vec{m} $. The right hand side is then 4.4=16=1 mod 3 which equals the left hand side as two lines either intersect in one point or are equal (and hence have 4 points in common). The identity applied to $\vec{c}=\vec{d} $ gives us (note that the squares in $\mathbb{F}_3 $ are {0,1}) information about the weight (that is, the number of non-zero digits) of codewords in $\mathcal{C} $

$wt(\vec{c})~mod(3) = \sum_p c_p^2 = (\sum_p c_p)^2 \in \{ 0,1 \} $

Let $\mathcal{C}’ $ be the collection of $\vec{c} \in \mathcal{C} $ of weight zero (modulo 3) then one can verify that $\mathcal{C}’ $ is the orthogonal complement of $\mathcal{C} $ with respect to the scalar product and that the dimension of $\mathcal{C} $ is seven whereas that of $\mathcal{C}’ $ is six.
Now, let for a point p be $\mathcal{G}_p $ the restriction of

$\mathcal{C}_p = \{ c \in \mathcal{C}~|~c_p = – \sum_{q \in \mathcal{P}} c_q \} $

to the coordinates of $\mathcal{P} – \{ p \} $, then $\mathcal{G}_p $ is clearly a six dimensional code in a 12-dimensional space. A bit more work shows that $\mathcal{G}_p $ is a self-dual code with minimal weight greater or equal to six, whence it must be the ternary Golay code! Now we are nearly done. _Next time_ we will introduce a reversi-version of M(13) and use the above facts to deduce that the basic group of the Mathieu-groupoid indeed is the sporadic simple group $M_{12} $.

References

Robert L. Griess, “Twelve sporadic groups” chp. 7 ‘The ternary Golay code and $2.M_{12} $’

John H. Conway and N. J.A. Sloane, “Sphere packings, lattices and groups” chp 11 ‘The Golay codes and the Mathieu groups’

John H. Conway, Noam D. Elkies and Jeremy L. Martin, ‘The Mathieu group $M_{12} $ and its pseudogroup extension $M_{13} $’ arXiv:math.GR/0508630

Leave a Comment

Hexagonal Moonshine (2)

Delving into finite dimensional representations of the modular group $\Gamma = PSL_2(\mathbb{Z}) $ it is perhaps not too surprising to discover numerical connections with modular functions. Here, one such strange observation and a possible explanation.

Using the _fact_ that the modular group $\Gamma = PSL_2(\mathbb{Z}) $ is the free group product $C_2 \ast C_3 $ it is fairly easy to see that the variety of all n-dimensional representations $\mathbf{rep}_n~\Gamma $ is smooth (though it contains several connected components). Some of these components will contain simple representations, some will not. Anyway, we are not interested in all n-dimensional representations but in the isomorphism classes of such representations. The best algebraic approximation to this problem is by studying the quotient varieties

$\mathbf{iss}_n~\Gamma = \mathbf{rep}_n~\Gamma // GL(n) $

under the action of $GL(n) $ by basechange. Geometric invariant theory tells us that the points of this quotient variety correspond to isoclasses of semi-simple n-dimensional representations (whence the notation $\mathbf{iss}_n $). Again, these quotient varieties split into several connected components, some of which will have an open subset of points corresponding to simple representations.

It is a natural idea to compute the codimension of subvariety of proper semi-simples in the component of maximal dimension containing simple representations. _M-geometry_ allows you to reduce such calculation to quiver-problems. Anyway, if one does this for small values of n one obtains the following sequence of codimension-numbers (starting with $n=1 $

0,1,1,1,1,3,1,3,3,3,3,5,3,5,5,5,5,7,5,7,…

which doesnt seem too exciting before you feed it to Sloan’s integer sequences encyclopedia when one discovers that it is precisely sequence A063195 which gives the dimensions of weight 2n _cuspidal newforms_
for $\Gamma_0(6) $…

The optimistic “moonshine”-interpretation of this might be that these newforms can be viewed somehow as functions on the varieties of finite dimensional $\Gamma $-representations having the property that they pick out generic simple representations as their non-zeroes.

Be that as it may (one never knows in these matters), here a more down-to-earth explanation. The sequence A063195 obviously has a 6-periodicity behaviour so it suffices to understand why the codimension-sequence should have a similar feature (modulo computing the first few terms of it and observing the coincidence with the first few terms of A063195).

The modular group has exactly 6 one-dimensional representations and if one calculates their clan as in hexagonal moonshine (1) one obtains the hexagonal quiver

[tex]\xymatrix{& \vtx{S_1} \ar@/^/[dl] \ar@/^/[dr] & \\ \vtx{S_6} \ar@/^/[ur] \ar@/^/[d] & & \vtx{S_2} \ar@/^/[ul] \ar@/^/[d] \\ \vtx{S_5} \ar@/^/[u] \ar@/^/[dr] & & \vtx{S_3} \ar@/^/[u] \ar@/^/[dl] \\ & \vtx{S_4} \ar@/^/[ur] \ar@/^/[ul] & }[/tex]

M-geometry tells us that this clan contains enough information to determine the components of $\mathbf{rep}_n~\Gamma $ that contain simple representations. They correspond to dimension-vectors of this hexagonal quiver, say

$~(a_1,a_2,a_3,a_4,a_5,a_6) $

such that $a_i \leq a_{i-1}+a_{i+1} $. Moreover, the component is of maximal dimension if the components $a_i $ are evenly spread over the six vertices.
This then explains that the codimension sequence we are interested in must satisfy 6-periodicity.

Reference

This post corrects the erroneous statement made in math.AG/0610587 that the codimension sequence are the dimensions of weight 2n modular forms. The day the paper hit the arXiv I informed the author of the mistakes he made and told him how they could be corrected. Having waited 9 months I’ve given up hope that a revision/correction is imminent.

Leave a Comment

The Mathieu groupoid (1)

Conway’s puzzle M(13) is a variation on the 15-puzzle played with the 13 points in the projective plane $\mathbb{P}^2(\mathbb{F}_3) $. The desired position is given on the left where all the counters are placed at at the points having that label (the point corresponding to the hole in the drawing has label 0). A typical move consists in choosing a line in the plane going through the point where the hole is, choose one of the three remaining points on this line and interchange the counter on it for the hole while at the same time interchanging the counters on the other two points. In the drawing on the left, lines correspond to the little-strokes on the circle and edges describe which points lie on which lines. For example, if we want to move counter 5 to the hole we notice that both of them lie on the line represented by the stroke just to the right of the hole and this line contains also the two points with counters 1 and 11, so we have to replace these two counters too in making a move. Today we will describe the groupoid corresponding to this slide-puzzle so if you want to read on, it is best to play a bit with Sebastian Egner’s M(13) Java Applet to see the puzzle in action (and to use it to verify the claims made below). Clicking on a counter performs the move taking the counter to the hole.

2 Comments

Conway’s puzzle M(13)

Recently, I’ve been playing with the idea of writing a book for the general public. Its title is still unclear to me (though an idea might be “The disposable science”, better suggestions are of course wellcome) but I’ve fixed the subtitle as “Mathematics’ puzzling fall from grace”. The book’s concept is simple : I would consider the mathematical puzzles creating an hype over the last three centuries : the 14-15 puzzle for the 19th century, Rubik’s cube for the 20th century and, of course, Sudoku for the present century.

For each puzzle, I would describe its origin, the mathematics involved and how it can be used to solve the puzzle and, finally, what the differing quality of these puzzles tells us about mathematics’ changing standing in society over the period. Needless to say, the subtitle already gives away my point of view. The final part of the book would then be more optimistic. What kind of puzzles should we promote for mathematical thinking to have a fighting chance to survive in the near future?

Leave a Comment