Wikipedia:Reference desk/Archives/Mathematics/2011 September 19
Mathematics desk | ||
---|---|---|
< September 18 | << Aug | September | Oct >> | September 20 > |
Welcome to the Wikipedia Mathematics Reference Desk Archives |
---|
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
September 19
[edit]Different Types of Integrals and Derivatives
[edit]I understand that there are several different types of integrals like the Riemann integral, Lebesgue integral, Cauchy, Wiener, Feynman, etc. Are there different kinds of derivatives too? What are they? I only know of standard Calc I derivative (with the gradient as a generalization) but can we consider the divergence and the curl as types of derivative too? Any others? 67.40.134.8 (talk) 01:57, 19 September 2011 (UTC)
- Wikipedia has an article on everything—or, in this case, a category. See Category:Generalizations of the derivative. —Bkell (talk) 04:04, 19 September 2011 (UTC)
- Oh, wait, there's an article too: Generalizations of the derivative. —Bkell (talk) 04:06, 19 September 2011 (UTC)
Three person oblivious transfer
[edit]Alice, Bob and Charlie each have a secret. Is there a way for each of them to know all 3 secrets, without any of them knowing which of the two other secrets belong to whom, and without involving an other party? -- Meni Rosenfeld (talk) 08:12, 19 September 2011 (UTC)
- Perhaps you wanted a more computational answer, but real life you could write them down, put them in a bag, shuffle and pull out again, allowing everyone to read all three. Is there an equivalent relevant to the context of your question? Grandiose (me, talk, contribs) 08:35, 19 September 2011 (UTC)
- I am indeed looking for a computational answer, because this is supposed to happen via internet communication without meeting physically. I'm thinking mostly of a protocol where the primitives are sampling random bits and sending messages from one party to another, assuming availability of encryption and digital signatures.
- I've now realized this is possible if we assume availability of an anonymyzation network such as Tor. A sends his secret to C anonymously with a digital signature that could be either A's or B's (I think there are protocols for that). Likewise for all 6 pairs. Then all C has is two messages with two secrets, each of them must be either A's or B's but he doesn't know which is which.
- Is this still possible if we require all messages to be unambiguously digitally signed? -- Meni Rosenfeld (talk) 09:27, 19 September 2011 (UTC)
- Alice picks two private keys for a one-way, commutative encryption technique. She sends one public key to Bob and one to Charlie. They both encrypt their secrets with the public key, then the men exchange encrypted secrets. They both encrypt the received secrets a second time, then Charlie sends Bob's doubly encrypted secret back to Bob. Bob sends both doubly encrypted secrets to Alice, in random order. Alice decrypts both, then sends all three secrets to both men, in random order. Wouldn't this do it?--Antendren (talk) 12:06, 19 September 2011 (UTC)
- That won't work. Alice has two encryption keys. When she gets the messages back, she knows which is which because they use two different keys. If you correct this and use the same key for each one, Bob has both messages encrypted with the same key. Once he gets all the messages, he can encrypt them to see which one comes from who. -- kainaw™ 12:58, 19 September 2011 (UTC)
- The encryption is commutative, so Alice doesn't know if a message was encrypted with key 1 and then key 2 or the other way around. -- Meni Rosenfeld (talk) 14:32, 19 September 2011 (UTC)
- Looks correct to me, thanks. Do you know if this has a name?
- Now for the next problem: Obviously if Alice and Bob collude, they can find out Charlie's secret and there's nothing to do about that. In the n-person case you want ideally that each person will not have any information on which of the n-1 other secrets belongs to whom. If k people collude, in theory they shouldn't which of the n-k secrets belong to whom of the n-k people out of the collusion. But I tried generalizing the 3-people procedure, and in what I came up with it's enough for 2 people to collude in order to find out everyone's secrets. Is there a protocol for the n-person case which achieves the theoretical obliviousness, or something close to it? -- Meni Rosenfeld (talk) 14:32, 19 September 2011 (UTC)
- How's this for an n-person protocol: Each person chooses their own key, and they arrange themselves in a cycle. Each person encrypts their own secret, then passes it along to the next person in the cycle, who encrypts it in turn. Continue until every secret has been encrypted by every key. Then send them all to person one, who removes their own encryption from all, then sends them all to the next person in the cycle, in random order. Continue until the end of the cycle, when one person has all the plain texts, and no one knows the order. Distribute amongst the rest of the group. I think this achieves your goal, although I don't have a very good argument for the failure of collusion.
- I'm sure I'm not the first person to come up with these, but I don't know what they're called.--Antendren (talk) 22:19, 19 September 2011 (UTC)
- This is brilliant, thanks. However, it seems to me there is a collusion attack if we assume attackers can risk getting caught tampering with the protocol for a chance to get information. Assume 4 people and that A and D collude. At the end of the first cycle, each person has his own secret encrypted with all keys. Each sends this item to A, who knows which item contains whose secret based on who send it to her. Then A knows A(ABCD) (A's secret encrypted with all 4 keys), B(ABCD), C(ABCD) and D(ABCD). She is supposed to send to B A(BCD), B(BCD), C(BCD) and D(BCD) in a random order. Instead she sends A(BCD), B(BCD), C(ABCD) and D(BCD). B follows protocol and sends to C A(CD), B(CD), C(ACD), D(CD), and C sends to D A(D), B(D), C(AD), D(D). D doesn't know which of B(D), C(AD) is which, so he decrypts one in random with A's key. He sends to everyone A, D and either {B, C} or {B(A^(-1)), C(A)}. If he guessed right nothing is suspected and A and D know B and C's secrets. If he guessed wrong then B and C complain that their secrets aren't in the published set and abort - in which case their secrets are revealed to A and D, but for my application it does them no good if they abort.
- This is getting a bit specific to my application so I'll try to take it from here. But of course if you happen to come up with something without such an attack (yourself or with a reference) it would be great. -- Meni Rosenfeld (talk) 07:30, 20 September 2011 (UTC)
- Ooh, that's interesting. In fact, I think there's a modification that ensures A and D get away with it: A instead sends B(BCD), C(ABCD), D(BCD) and C(BCD). Then D receives B(D), C(AD), D(D) and C(D). He decrypts them all with A to see which matches up, telling him which is C and which is B. Then he sends A, B, C, D to everyone, because A provided him with her secret. In general, tampering of this nature will always work as long as the conspiracy contains the first and last people, and at least half the people total: A sends two copies of every message the conspiracy doesn't know, one as she's supposed to, one which has been tagged in some way (perhaps by repeated applications of A's encryption). Then D applies the appropriate decryptions to see which are which. I don't see a way around this.--Antendren (talk) 08:07, 20 September 2011 (UTC)
- I came up with all sorts of crazy ideas, some of which I thought for a while would work, but turned out not to. One direction I thought about was recursion - assume it is possible for n, and do something where A has a similar role to the 3-person case and the other n people share information between them obliviously. One of the many problems was that the requirements of the protocol to be suitable to serving in induction hypothesis capacity are stricter than what I need for the original problem. -- Meni Rosenfeld (talk) 14:17, 20 September 2011 (UTC)
- Ooh, that's interesting. In fact, I think there's a modification that ensures A and D get away with it: A instead sends B(BCD), C(ABCD), D(BCD) and C(BCD). Then D receives B(D), C(AD), D(D) and C(D). He decrypts them all with A to see which matches up, telling him which is C and which is B. Then he sends A, B, C, D to everyone, because A provided him with her secret. In general, tampering of this nature will always work as long as the conspiracy contains the first and last people, and at least half the people total: A sends two copies of every message the conspiracy doesn't know, one as she's supposed to, one which has been tagged in some way (perhaps by repeated applications of A's encryption). Then D applies the appropriate decryptions to see which are which. I don't see a way around this.--Antendren (talk) 08:07, 20 September 2011 (UTC)
- That won't work. Alice has two encryption keys. When she gets the messages back, she knows which is which because they use two different keys. If you correct this and use the same key for each one, Bob has both messages encrypted with the same key. Once he gets all the messages, he can encrypt them to see which one comes from who. -- kainaw™ 12:58, 19 September 2011 (UTC)
- Okay, now for a completely different approach, one without encryption. When things begin, each person waits a random amount of time (chosen by some distribution with no smallest possible time), then sends their message to someone else at random. Whenever a person receives a message, they wait a random amount of time and send it off to someone at random. After some large amount of time, everyone who is currently holding a message (has received but not yet sent on) distributes that message to everyone in the group. Now, no one can tell where a message originated from, although you can put a probability distribution on it. After all, the message you just received might have originated with the sender, or they might have gotten it from someone else. So collusion can give you a high confidence that a certain message originated with someone, but never certainty.--Antendren (talk) 09:25, 20 September 2011 (UTC)
- I don't know if this will hold up in practice. People are incentivized to alter what and when they send in order to keep their own secret secure. Committing to a random seed won't help since verifying that they acted according to protocol requires revealing enough information to learn people's secrets (and is difficult anyway due to the unpredictable nature of communication networks).
- If there is a way to implement this where only a small amount of information is leaked, though, it will be acceptable. -- Meni Rosenfeld (talk) 14:17, 20 September 2011 (UTC)
- Okay, now for a completely different approach, one without encryption. When things begin, each person waits a random amount of time (chosen by some distribution with no smallest possible time), then sends their message to someone else at random. Whenever a person receives a message, they wait a random amount of time and send it off to someone at random. After some large amount of time, everyone who is currently holding a message (has received but not yet sent on) distributes that message to everyone in the group. Now, no one can tell where a message originated from, although you can put a probability distribution on it. After all, the message you just received might have originated with the sender, or they might have gotten it from someone else. So collusion can give you a high confidence that a certain message originated with someone, but never certainty.--Antendren (talk) 09:25, 20 September 2011 (UTC)
- Also note... The "put them in a bag" solution won't work. The bag is a third party, which the question states cannot be used. I do not believe this is solvable. At some point, someone has to send something to someone. As soon as the initial transfer takes place, one person knows his or her own message and the message received. So, anonymity is removed. -- kainaw™ 14:20, 19 September 2011 (UTC)
- Yes, the bag is kind of a third party. But more specifically what I want to restrict is a third party that could publish the secrets. A bag can't do that.
- Your proof of impossibility assumes that from the first message it is possible to deduce the sender's secret, but with encryption and randomization that's not at all guaranteed. Cryptography is very powerful stuff. -- Meni Rosenfeld (talk) 14:39, 19 September 2011 (UTC)
- Also note... The "put them in a bag" solution won't work. The bag is a third party, which the question states cannot be used. I do not believe this is solvable. At some point, someone has to send something to someone. As soon as the initial transfer takes place, one person knows his or her own message and the message received. So, anonymity is removed. -- kainaw™ 14:20, 19 September 2011 (UTC)
- Cryptography can be useful, but it usually isn't all it is cracked up to be - especially when each person knows both the encrypted message and the plain text message. So, I have three messages. One is mine - I know that. The other two belong to two other people. I also have two encrypted messages that match up to those plain text messages. I know the method of encryption used. I also see some key info passing around. With a little fiddling, I quickly re-encrypt the plain text messages and I know who sent what. -- kainaw™ 14:49, 19 September 2011 (UTC)
- I think you should reread Antendren's protocol. -- Meni Rosenfeld (talk) 15:14, 19 September 2011 (UTC)
- Cryptography can be useful, but it usually isn't all it is cracked up to be - especially when each person knows both the encrypted message and the plain text message. So, I have three messages. One is mine - I know that. The other two belong to two other people. I also have two encrypted messages that match up to those plain text messages. I know the method of encryption used. I also see some key info passing around. With a little fiddling, I quickly re-encrypt the plain text messages and I know who sent what. -- kainaw™ 14:49, 19 September 2011 (UTC)
- The limitation is that given a protocol, an encrypted message, and two plain text messages, it is not difficult to identify which plain text message is the encrypted one. You don't need to completely encrypt/decrypt anything. You just need to do a little of it to get a correlation. Of course, you could say that you are going to use a protocol that doesn't currently exist that avoids this problem. Perhaps you plan to use quantum encryption. But, if that exists, quantum hacking should exist also - which makes it even easier to guess the key used in the process. -- kainaw™ 16:20, 19 September 2011 (UTC)
- I don't understand this objection. You're Bob. You have two plain texts, one of which is Alice's and one of which is Charlie's, but you don't know which is which. You also have cypher text that you know is Charlie's secret, but you don't know the public key used in the encryption (`public key' is unfortunate terminology here). How do you determine which is Charlie's plain text?--Antendren (talk) 22:19, 19 September 2011 (UTC)
- The limitation is that given a protocol, an encrypted message, and two plain text messages, it is not difficult to identify which plain text message is the encrypted one. You don't need to completely encrypt/decrypt anything. You just need to do a little of it to get a correlation. Of course, you could say that you are going to use a protocol that doesn't currently exist that avoids this problem. Perhaps you plan to use quantum encryption. But, if that exists, quantum hacking should exist also - which makes it even easier to guess the key used in the process. -- kainaw™ 16:20, 19 September 2011 (UTC)
- Just try it. Pick a protocol. Encrypt two plain texts with two different keys. Then, try it again with, say, 25% of the key correct. Take note of how you can detect similarities between the cypher text using the whole key and the cypher text with part of the key correct. Then, consider this scenario again. You are sharing encrypted text, public keys, and complete plain texts. -- kainaw™ 12:36, 20 September 2011 (UTC)
- For those who don't want to do it, here's an example: I have two texts:
- This is the first plain text.
- Nothing in this text is anything like the first text.
- In encrypt the first with AES (Rijndael) 256-bit key encryption using the key "password".
- I then encrypt both files using the same scheme, but the password "pass1234".
- The bit-by-bit comparison of the first text using "pass1234" to the first text using "password" is an 88% match. The bit-by-bit comparison of the second text using "pass1234" to the first text using "password" is a 78% match. Of note: There is still a 10% discrepancy between the two if you use "pass" instead of "pass1234". -- kainaw™ 12:50, 20 September 2011 (UTC)
- For those who don't want to do it, here's an example: I have two texts:
- I'm not very familiar with cryptography (-ology?), so this is probably wrong, but couldn't Alice create a public and private key and give it to Bob and Charlie. Bob and Charlie create a public and private key that they both share, and use that to sign both secrets? (Repeat for both Bob and Charlie). KyuubiSeal (talk) 15:43, 19 September 2011 (UTC)
- Can you be more specific? How will Bob and Charlie sign their two secrets without one of them learning the other's secret? -- Meni Rosenfeld (talk) 17:44, 19 September 2011 (UTC)
- If they both know their shared private key, isn't that all they need? Then once they're encrypted, have them send either their own, or each other's, (selected randomly). They're using the public key Alice sent for encryption, so they can't decrypt each other's. (There's six sets of keys, three known by only one person, used for encryption, and three known by pairs, used for signing. Probably really really inefficient, but again, I don't have any experience. :\ ) KyuubiSeal (talk) 01:04, 20 September 2011 (UTC)
Yeah, looks like that will work. Unless I'm missing something, this is similar to Anendren's first suggestion, but simpler.Thanks. -- Meni Rosenfeld (talk) 07:30, 20 September 2011 (UTC)- Wait, no, that won't work. Once the secrets are known, Bob will try to encrypt all 3 with Alice's public key until he finds one that matches Charlie's encrypted secret. Then he knows this secret is Charlie's. -- Meni Rosenfeld (talk) 14:17, 20 September 2011 (UTC)
- If they both know their shared private key, isn't that all they need? Then once they're encrypted, have them send either their own, or each other's, (selected randomly). They're using the public key Alice sent for encryption, so they can't decrypt each other's. (There's six sets of keys, three known by only one person, used for encryption, and three known by pairs, used for signing. Probably really really inefficient, but again, I don't have any experience. :\ ) KyuubiSeal (talk) 01:04, 20 September 2011 (UTC)
- Can you be more specific? How will Bob and Charlie sign their two secrets without one of them learning the other's secret? -- Meni Rosenfeld (talk) 17:44, 19 September 2011 (UTC)
- It took a bit of searching and I finally found what you want in a student's paper from a class a while back. First, you need a secure encryption function that allows you to encrypt and decrypt with multiple keys out of order. For example, if I encrypt with key A and then add text to it and encrypt with key B, I can decrypt the first part of the message by decrypting both with key A (somehow, this will do nothing to the second part which was never encrypted with key A - which is why I didn't give this paper a high grade). Assuming that works, here goes: Alice encrypts her message and sends it to Bob. Bob adds his before or after hers (randomly). He encrypts the whole thing and sends it to Charlie. Charlie adds his to the beginning or end (randomly) and encrypts the whole thing. He sends it to Alice. She decrypts it with her key, which only partially decrypts her message. She sends it to Bob. He decrypts with his key which partially decrypts Alice and Bob's message. He sends it to Charlie who decrypts it with his key and gets all plain text messages. He doesn't know the order of Alice and Bob's messages. All he knows is they are before or after his. He sends all three plain text messages to Alice. She doesn't know the order of the messages either. She sends them to Bob. He doesn't know the order of the messages. I noted at the end a situation. Alice sends to Bob. Bob adds his to the bottom. He sends to Charlie. Charlie adds his to the bottom. When it comes back, Bob sees his in the middle, he knows Alice's is on top and Charlies is on bottom. The student apparently suggested that Charlie and Alice randomize the order when sending the plain text messages around. -- kainaw™ 19:23, 19 September 2011 (UTC)
Distribution of charge in 1,2,3 dimensions on symmetrical bodies
[edit]Hi. See Wikipedia:Reference_desk/Science#Surface_charge_on_a_conductor .. Having botched an answer, and then discovered that my maths skills probably aren't up to integrating to get the potential/field inside/outside a circular ring of charge (in 2dimensions) I though I should leave a note here where someone is more likely to be able to properly answer the original question.
As an aside (that I can only hope someone can answer) - it strikes me as odd, or possibly even fortuitous that only (?) in 3 dimensional euclidean space (which I inhabit) is the field inside a spherical shell of stuff exhibiting an inverse square law of field strength constant and zero. (eg Shell theorem, Gauss etc) (This must affect a lot of physics). I haven't considered the 4D case and am not requesting an answer.. Does anyone know of any philosophers/scientist etc or the like that have considered this coincidence- ie that a "3D" universe and inverse square law fields (in combination) are favoured have 'unusual propeties' in combination, over other variations .. a la the Anthropic principle. (Did that make a dot of sense to anyone??) Thanks Imgaril (talk) 13:20, 19 September 2011 (UTC)
- I think that in a 4D universe the same would hold for an inverse cube law. So it's not that 3D is special, just that 2=3-1. -- Meni Rosenfeld (talk) 14:42, 19 September 2011 (UTC)
- Thanks - it later occured to me that in inverse square law is probably a consequence of surface area increasing with r2 in 3 dimensional space (as it states at Inverse-square_law#Justification). Similarly this would mean in 1D space intensity is proportional to distance0 (like a laser) which also gives a net field of zero in between equal 'charges'.
- I think I will have another attempt at the integral of the ring in 2D space using a 1/r law (length of perimeter, rather than area of shell) - I suspect that this should be the same as the 3D and 1D cases - though it's not immediately apparent to me why.. I may be back in a few days asking for help... :)
- Thanks again.Imgaril (talk) 16:33, 19 September 2011 (UTC)
- The Newtonian potential (which governs classical fields in n dimensions) is the potential associated to a point charge. Mathematically, it is the fundamental solution of the Laplace equation. It is C/r^{n-1} in n dimensions (C log r in 1 dimension). There's nothing particularly special about 3 dimensions. Harmonic functions have similar properties in all dimenstionas. Sławomir Biały (talk) 17:24, 19 September 2011 (UTC)
- I tried again the integral around the ring in 2d using a 1/r function and (got lucky this time finding it simplied to the integral of sin(x) between 0 and pi)Assuming I got it right it does indeed seem to be zero for 2D (inside the ring). That makes me feel a lot better, having one less thing to worry about. Thanks. Imgaril (talk) 21:07, 19 September 2011 (UTC)
- Actually it looks like I made a schoolboy error in the integral - I'll ask a separate question.Imgaril (talk) 10:16, 20 September 2011 (UTC)
I keep coming back to this question, and it never makes sense to me.
[edit]It seems that humans are the only thing in nature that produces extremely complex abstract systems (mathematics) representing things that don't ever exist or represent our universe. Humans are also a part of our universe. And yet, somehow, the entire body of mathematics, which is huge, all is consistent. Even though no mathematical axiom comes from the physical universe, and we can never know whether any axioms are true in a physical sense, still, people imagine an axiomatic system, and then it makes sense (is consistent with itself, you can prove things within it, etc). Where does this higher order come from? I've asked many times what would happen if mathematics itself were inconsistent, such that any, even trivial, axiomatic systems turned out to be such that you could prove both statements and their opposites, but the answer I've always gotten is that this is simply not possible: that there is no way that mathematics -- even though it does not come from the physical universe -- is itself inconsistent.
There's more. I've asked about parallel worlds in which every single physical law is radically different. And yet, mathematics in that world functions exactly the same. If pi is 3.14159... here, then it is 3.14159... there, no matter how different that universe is. It is not possible for it to be so different that pi is 3.24159... Of course, pi could turn out to describe nothing physical in either our universe or any other universe, and yet pi remains fixed at 3.14159...
so where does this order and sense, which doesn't actually describe anything physical come from? Is it a window into heaven, where things can be proven and are perfect and consistent? If not "heaven" then in what realm is "math" which transcends even our very Universe?? 82.234.207.120 (talk) 22:51, 19 September 2011 (UTC)
- This is the big question, yes. From my point of view as a mathematical realist, yes, it's a window into the Platonic heaven. Not everyone agrees. --Trovatore (talk) 22:54, 19 September 2011 (UTC)
- what other perspective or explanation comes close to fitting the facts? I really don't like this explanation if for no other reason than that it seems several thousand years old. Come on. 82.234.207.120 (talk) 23:08, 19 September 2011 (UTC)
- Well, the observed consistency could be a brute fact, with no particular reason for it. I don't find that convincing. On the other side of the coin, though, some would argue that the Platonic existence of mathematical objects might imply the observed consistency but doesn't cause it, so it doesn't really explain what causes us to observe the consistency. --Trovatore (talk) 23:13, 19 September 2011 (UTC)
- I've asked a follow-up question below. 82.234.207.120 (talk) 23:16, 19 September 2011 (UTC)
- (Out of curiosity, why do you feel that an explanation being old is an argument against it? --Trovatore (talk) 23:16, 19 September 2011 (UTC) )
- Yes, due to prior probability. What are the chances that the ancients, who were a lot dumber, stumbled on the truth? 82.234.207.120 (talk) 23:22, 19 September 2011 (UTC)
- Well, 2+2 has been 4 for a long, long time. Probability doesn't really enter into it; if something is correct, it's correct, however unlikely the source. -GTBacchus(talk) 23:25, 19 September 2011 (UTC)
- "The ancients were a lot dumber." I'm starting to think it's a bad idea to contribute to this thread. --Trovatore (talk) 00:01, 20 September 2011 (UTC)
- I might have been colloquial, but the sentiment comes from bertrand russell: he writes that they didn't even properly "prove" any of their geometric proofs. not to mention things like investigative science, everything from chemistry to computers was completely unknown to them. and yet, somehow, they would have the correct conception of metaphysics? (without the scientific method to aid them in finding it). I find that exceedingly unlikely. 82.234.207.120 (talk) 00:05, 20 September 2011 (UTC)
- I suggest you study the ancients directly. We can still learn a lot from them. Don't ask me what I mean until you've read Euclid, Plato, Aristotle, Ptolemy - the originals. -GTBacchus(talk) 02:55, 20 September 2011 (UTC)
- I might have been colloquial, but the sentiment comes from bertrand russell: he writes that they didn't even properly "prove" any of their geometric proofs. not to mention things like investigative science, everything from chemistry to computers was completely unknown to them. and yet, somehow, they would have the correct conception of metaphysics? (without the scientific method to aid them in finding it). I find that exceedingly unlikely. 82.234.207.120 (talk) 00:05, 20 September 2011 (UTC)
- Yes, due to prior probability. What are the chances that the ancients, who were a lot dumber, stumbled on the truth? 82.234.207.120 (talk) 23:22, 19 September 2011 (UTC)
- Well, the observed consistency could be a brute fact, with no particular reason for it. I don't find that convincing. On the other side of the coin, though, some would argue that the Platonic existence of mathematical objects might imply the observed consistency but doesn't cause it, so it doesn't really explain what causes us to observe the consistency. --Trovatore (talk) 23:13, 19 September 2011 (UTC)
- what other perspective or explanation comes close to fitting the facts? I really don't like this explanation if for no other reason than that it seems several thousand years old. Come on. 82.234.207.120 (talk) 23:08, 19 September 2011 (UTC)
There isn't any evidence that there exists a physical universe (apart from a purely mathematical one). So, it could be that we are just algorithms that exist in the sense of pure math only. There exists an ensemble of all possible algorithms, one of these happens to describe precisely that algorithm your brain is executing right now when you read this posting. Count Iblis (talk) 15:07, 20 September 2011 (UTC)
- (Note: The following is a reply to the original question, not a reply to the outdented statement directly above that isn't following standard indentation standards -- kainaw™ 16:02, 20 September 2011 (UTC))
- I do not understand the claim that nothing in mathematics comes from the physical universe. Try very trivial mathematics, such as the definition of 1. If you have some object from the physical universe, such as an apple, and it is the only one you have, you can claim that you have one apple - using the mathematical term 1. You cannot claim that you have 2 or 3 or 74i apples. You have 1. Continue to counting, which is very trivial mathematics, and you can see that if you add 1 apple to 1 apple, you get 2 apples, not 3 or 8 or -5473. Everything else expands on counting. It doesn't matter how complex mathematics gets, it all goes back to counting from 1 (not zero, that came after counting). Counting comes from observations of things in the physical universe. -- kainaw™ 15:32, 20 September 2011 (UTC)
- … but what is an apple on a subatomic, quantum level? It could be argued that the notion of an apple is a man made construct. — Fly by Night (talk) 15:47, 20 September 2011 (UTC)
- Then assume that math does come from a "physical universe". It is then still the case that everything you know about math and everything else is represented by your brain state. Your brain doesn't contain any apples, but the information stored in the brain my contain descriptions of apples and then the description of integers may be given in terms of the description of apples. However, the "apple part" of the description of integers is redundant. To extract the integers from your brain, you would have to throw that part away.
- In fact, to define what you really are, you would have to extract the algorithm that your brain is running from the physical brain, so in the end you are abstract math yourself. That then casts doubt on the very premise that a physical universe exists. Count Iblis (talk) 15:47, 20 September 2011 (UTC)
- I do not read this question as asking the age-old philosophical question of "what is reality?". I see it as asking us to accept that absolutely nothing from mathematics is based on anything at all in the physical universe and then asking a question. I don't agree with the claim that absolutely nothing from mathematics is based on anything at all in the physical universe. -- kainaw™ 16:01, 20 September 2011 (UTC)
how would mathematicians react if math had human, contemporary meaning?
[edit]for a book I'm writing, what is the probable reaction of the mathematical community if it turned out that math had obvious human, contemporary meaning? For example, if you calculated pi in a certain base and just interpreted the results as unicode, it would magically be perfect English prose, just an endless tome as long as you wanted to calculate it. "Couldn't God communicate with us this way?" Well, no, because not even God can change the value of pi. But that doesn't make sense to me -- because "obviously" a hypothetical Creator has control over the value of Pi. But isn't it the case that it is simply MEANINGLESS to talk of "control" over the value of pi? It doesn't "mean anything" to change it. And yet, there it is, a certain specific value... I find it irreconcilable that it has a certain specific value while having to believe that it could not be another way. Pi is not a round enough value that it "could not be any other value". And yet that is exactly what math holds: that it could not possibly be any other value -- not even God himself could create a universe in which pi was otherwise. This is so strange. But, back to the question: what would the mathematical community's likely reaction be to having an obvious, human-readable meaning in Pi that was directly relevant to contemporary humanity, and readable as prose? --- note, you might have to use your imagination for hte mechanism, as pi has certain characteristics that would make it impossible for it to literally be encoded text...but if the encoding were complex enough (not just "interpreted in a certain base as unicode") it should still be possible.... thanks for your perspective. 82.234.207.120 (talk) 23:15, 19 September 2011 (UTC)
- But π, when encoded in base 64, does contain readable prose! We just haven't written down enough digits yet. 108.3.68.183 (talk) 23:37, 19 September 2011 (UTC)
- That might be true if the digits of pi were truly random. Dbfirs 22:35, 20 September 2011 (UTC)
- The digits are certainly not literally random. It would be astonishing, though, if they weren't random enough to make 108's claim true. --Trovatore (talk) 22:37, 20 September 2011 (UTC)
- Although almost all numbers on the number line are Normal numbers, almost all of the ones in everyday use are not. It has not yet been possible to determine whether or not pi is normal. Dbfirs 07:09, 25 September 2011 (UTC)
- The digits are certainly not literally random. It would be astonishing, though, if they weren't random enough to make 108's claim true. --Trovatore (talk) 22:37, 20 September 2011 (UTC)
- That might be true if the digits of pi were truly random. Dbfirs 22:35, 20 September 2011 (UTC)
- Right - and what I'm saying is, that if that readable prose started at, say, precisely the trillionth digit, and then continued uninterrupted indefiitely, as uninterrupted English prose -- well, every mathematician in the world would simultaneously shit themselves. That much is clear. But then what? What would their intellectual reaction be afterward? You're all mathematicians here: how would you react? 82.234.207.120 (talk) 23:43, 19 September 2011 (UTC)
- Dick Feynman has a useful quote related to this, from The Meaning of It All. "I had the most remarkable experience this evening. While coming in here I saw license plate ANZ 912. Calculate for me, please, the odds that of all the license plates in the state of Washington I should happen to see ANZ 912." The odds! They're nearly impossible! Nimur (talk) 23:53, 19 September 2011 (UTC)
- Yeah, I think you're not getting the question. 82.234.207.120 (talk) 23:59, 19 September 2011 (UTC)
- I think you're placing arbitrary meaning on a random string of numbers, and expecting the rest of the world to share your arbitrary teleology. You might be surprised to know that lots of people do this: numerology exists because people don't understand numbers, so they mysticize them. Famous scientists like Feynman got asked questions like yours so often... that they wrote entire books about it. There's no meaning in random strings of numbers, other than the meaning you place on it. Nimur (talk) 00:03, 20 September 2011 (UTC)
- That reminds me of a joke: One probabilist throws a dart at a board, and turns to a second probabilist, who is a Bayesian, and asks "What's the probability that the dart would have hit that point?" To which the second probabilist responds: "One." 108.3.68.183 (talk) 00:05, 20 September 2011 (UTC)
- Yeah, I think you're not getting the question. 82.234.207.120 (talk) 23:59, 19 September 2011 (UTC)
clarification of question
[edit]I don't mean that you can somehow interpret the numbers in some forced way. I mean, like this: http://xkcd.com/10/ except instead of "help I'm stuck in a universe factory" you have a hundred page book, and then a thousand page book, and then a million page book... as long as you continue decoding you get more and more and more nonrepeating, perfectly rendered English text. Obviously that is not numerology. And just as obviously that would never actually happen...but what if it did? what would the reaction be then? 82.234.207.120 (talk) 00:12, 20 September 2011 (UTC)
- Well first everyone would think you are just selecting random noise (e.g. infinite monkeys). If you can convince people that isn't true, then it would certainly be surprising (the digits of pi are not random?!?!). Many people would suddenly be very interested in computing more digits of pi than ever before. Beyond that it would obviously depend on what the message is. But in general, I suspect theologians and similar types would be more excited than mathematicians. Dragons flight (talk) 00:31, 20 September 2011 (UTC)
- I'm telling you there is no selection going on. It would be sequential, someone would discover that using such and such an encoding, arbitrary amounts of SEQUENTIAL message appear, all perfectly rendered English. 82.234.207.120 (talk) 01:10, 20 September 2011 (UTC)
- This is related to the question above, by the way. What I'm interested in, is, how would we explain this metaphysically. 01:11, 20 September 2011 (UTC) — Preceding unsigned comment added by 82.234.207.120 (talk)
- If pi digits are random, then somewhere in it you can almost certainly find a sequential code for the entire King James Bible, but that is simply the nature of randomness and not a message from God. So the first concern will always be showing that the effect is not random. But even assuming there is a non-random message in there, why would mathematicians be the ones to "explain" it? Metaphysics is the realm of theologians and philosophers, not mathematicians. Dragons flight (talk) 01:30, 20 September 2011 (UTC)
- No, you almost certainly CAN'T *actually* find a place with that. Moreover, even if you did have a method for findind an arbitrary text (such as the king's james bible), what followed it would be gibberish. in my scenario, there is a spot that is easy to describe (e..g "trillinoth digit"), and with a certain encoding, starting in that stop it starts making sense and doesn't stop. whether you read a thousand or a million pages, it's all unique and meaningful human text ('from god'). what would a mathematician's metaphysical reaction be to such a turn of events? 82.234.207.120 (talk) 01:44, 20 September 2011 (UTC)
- Yes, if it goes on long enough, and the digits are truly random, it must come up at some point. I believe someone mentioned the infinite monkeys example? What's so special about a trillion? Now, if the text never stopped making sense, that would be something. And as to the question, it depends on the person. You might say "I knew it!", while I might be double checking the digit generation / decoding I used for 'Easter egg'-like things. KyuubiSeal (talk) 03:42, 20 September 2011 (UTC)
- I think 82's point is that, even if that point in the decimal expansion of π exists, you still almost certainly (in the colloquial sense not meaning almost surely) can't "actually find it". That's quite true. --Trovatore (talk) 04:59, 20 September 2011 (UTC)
- But what if frogs really did have wings? What then?!? The answer: you'd have to find another hobby, 82.234.207.120. -GTBacchus(talk) 05:59, 20 September 2011 (UTC)
- I think 82's point is that, even if that point in the decimal expansion of π exists, you still almost certainly (in the colloquial sense not meaning almost surely) can't "actually find it". That's quite true. --Trovatore (talk) 04:59, 20 September 2011 (UTC)
- Yes, if it goes on long enough, and the digits are truly random, it must come up at some point. I believe someone mentioned the infinite monkeys example? What's so special about a trillion? Now, if the text never stopped making sense, that would be something. And as to the question, it depends on the person. You might say "I knew it!", while I might be double checking the digit generation / decoding I used for 'Easter egg'-like things. KyuubiSeal (talk) 03:42, 20 September 2011 (UTC)
- No, you almost certainly CAN'T *actually* find a place with that. Moreover, even if you did have a method for findind an arbitrary text (such as the king's james bible), what followed it would be gibberish. in my scenario, there is a spot that is easy to describe (e..g "trillinoth digit"), and with a certain encoding, starting in that stop it starts making sense and doesn't stop. whether you read a thousand or a million pages, it's all unique and meaningful human text ('from god'). what would a mathematician's metaphysical reaction be to such a turn of events? 82.234.207.120 (talk) 01:44, 20 September 2011 (UTC)
- If pi digits are random, then somewhere in it you can almost certainly find a sequential code for the entire King James Bible, but that is simply the nature of randomness and not a message from God. So the first concern will always be showing that the effect is not random. But even assuming there is a non-random message in there, why would mathematicians be the ones to "explain" it? Metaphysics is the realm of theologians and philosophers, not mathematicians. Dragons flight (talk) 01:30, 20 September 2011 (UTC)
- This discussion reminds me of the segment of Contact (novel) where they discover a pattern deep within Pi. ←Baseball Bugs What's up, Doc? carrots→ 06:16, 20 September 2011 (UTC)
- Here is a more serious response:
- 1. The infinite sequence of pi digits - is an infinite sequence that is mechanically computable.
- 2. The infinite sequenece - which (under Unicode) constitutes the infinite text of King James Bible (followed by itself again and again forever) - is an infinite sequence that is mechanically computable.
- Conclusion: there is a finite code (e.g. a finite formula or a finite computable algorithm) which reflects a one-to-one correspondence - between the infinite sequence of pi digits - and the infinite sequenece which (under Unicode) constitutes the infinite text of King James Bible (followed by itself again and again forever).
- Conclusion: if the digits of pi have any endless human meaning (and they really have), this does not surprise anybody.
- Back to the original question (I'm assuming the "string" found is mathematically very statistically significant in well formed english which I think was the intended question eg not just finding "Hello" in a random series of 4 billion digits..) (You'd have to eliminate the possibility that the structure of the language you were using wasn't susceptible to producing readable text from random digits etc) - I would expect that the mathematical community - like most other sentient beings would take it as proof that an influence external to the universe was leaving messages for us.. - (though a significant percentage of people's heads would explode with the significance of it all..)
- Sherlock_Holmes#Holmesian_deduction has a good quote for this possibility "When you have eliminated the impossible, whatever remains, however improbable, must be the truth" . This hasn't happened yet right?Imgaril (talk) 10:36, 20 September 2011 (UTC)