Warning: foreach() argument must be of type array|object, bool given in /var/www/html/web/app/themes/studypress-core-theme/template-parts/header/mobile-offcanvas.php on line 20

The Fibonacci numbers F0,F1,...are given by the recurrenceFn+1=Fn+Fn-1,F0=0,F1=1. Show that for anyn1,gcd(Fn+1,Fn)=1.

Short Answer

Expert verified

For any n1,gcd(Fn+1,Fn)=1

Step by step solution

01

Explain Fibonacci Series

Fibonacci Series is defined as every element of the series is the sum of two previous number of the series. Series starts from 0 and 1.

Fn+1=Fn+Fn-1forn=1Here,FnisthenthFibonaccinumberF0=0F1=F2=1

02

Calculate the gcd by two methods

GCDfortheFibonacciseries,gcd(F1,F0)=gcd(1,0)=1Letthegcdbecorrectforn=k,thatisgcd(Fk,Fk-1)=1Provethatthegcdisalsocorrectforn=k+1,i.e.gcd(Fk+1,Fk)=1gcd(Fk+1,Fk)=gcd(Fk+Fk-1,Fk)=1So,gcd(Fk,Fk-1)=1

Letgcd(p,q)=1andletgcd(p+q,q)=x.Provethatx=1gcd(p+q,q)=x=x|p+qÙx|q=x|(p+q)-q=x|pandsincex|q=x|1=x=1gcd(p+q,q)=1

Thus, gcd(Fn+1,Fn)=1. Hence proved.

Unlock Step-by-Step Solutions & Ace Your Exams!

  • Full Textbook Solutions

    Get detailed explanations and key concepts

  • Unlimited Al creation

    Al flashcards, explanations, exams and more...

  • Ads-free access

    To over 500 millions flashcards

  • Money-back guarantee

    We refund you if you fail your exam.

Over 30 million students worldwide already upgrade their learning with Vaia!

One App. One Place for Learning.

All the tools & learning materials you need for study success - in one app.

Get started for free

Most popular questions from this chapter

What is 222006(mod3)?

Digital signatures, continued.Consider the signature scheme of Exercise 1.45.

(a) Signing involves decryption, and is therefore risky. Show that if Bob agrees to sign anything he is asked to, Eve can take advantage of this and decrypt any message sent by Alice to Bob.

(b) Suppose that Bob is more careful, and refuses to sign messages if their signatures look suspiciously like text. (We assume that a randomly chosen messagethat is, a random number in the range{1,...,N-1} is very unlikely to look like text.) Describe a way in which Eve can nevertheless still decrypt messages from Alice to Bob, by getting Bob to sign messages whose signatures look random.

Consider the problem of computing x y for given integers x and y: we want the whole answer, not modulo a third integer. We know two algorithms for doing this: the iterative algorithm which performs y − 1 multiplications by x; and the recursive algorithm based on the binary expansion of y. Compare the time requirements of these two algorithms, assuming that the time to multiply an n-bit number by an m-bit number is O(mn).

Show that if ab(modN)and if M Divides Nthenab(modM)

Unlike a decreasing geometric series, the sum of the1,12,13,14,15,..... diverges; that is,i=1n1i=

It turns out that, for large n , the sum of the first n terms of this series can be well approximated as

i=1n1iInn+y

where is natural logarithm (log base e=2.718...) and y is a particular constant 0.57721...... Show that

i=1n1i=θ(logn)

(Hint: To show an upper bound, decrease each denominator to the next power of two. For a lower bound, increase each denominator to the next power of 2 .)

See all solutions

Recommended explanations on Computer Science Textbooks

View all explanations

What do you think about this solution?

We value your feedback to improve our textbook solutions.

Study anywhere. Anytime. Across all devices.

Sign-up for free