Next Article in Journal
Estimating the Highest Time-Step in Numerical Methods to Enhance the Optimization of Chaotic Oscillators
Previous Article in Journal
Partial Differential Equations and Quantum States in Curved Spacetimes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Relationships between the Chicken McNugget Problem, Mutations of Brauer Configuration Algebras and the Advanced Encryption Standard

by
Agustín Moreno Cañadas
*,†,
Isaías David Marín Gaviria
and
Juan David Camacho Vega
Departamento de Matemáticas, Universidad Nacional de Colombia, Kra 30 No 45-03, Bogotá 11001000, Colombia
*
Author to whom correspondence should be addressed.
Authors contributed equally to this work.
Mathematics 2021, 9(16), 1937; https://doi.org/10.3390/math9161937
Submission received: 25 April 2021 / Revised: 30 June 2021 / Accepted: 20 July 2021 / Published: 13 August 2021

Abstract

:
Mutations on Brauer configurations are introduced and associated with some suitable automata to solve generalizations of the Chicken McNugget problem. Additionally, based on marked order polytopes, the new Diophantine equations called Gelfand–Tsetlin equations are also solved. The approach allows algebraic descriptions of some properties of the AES key schedule via some Brauer configuration algebras and suitable non-deterministic finite automata (NFA).

1. Introduction

Chicken McNuggets are one of the most sold products of the international fast-food restaurant chain McDonald’s. Shortly after their introduction in 1979, they began to be sold in packs of 6, 9, and 20 pieces. Nowadays, several choices of this product can be ordered, which naturally generates different types of Diophantine equations. For instance, the first three types of packs give rise to the following problem [1]:
Problem 1.
What numbers of chicken McNuggets can be ordered using only packs with 6, 9, or 20 pieces?
Problem 1 is currently called the chicken McNugget problem (CMP), which defines the following Diophantine equation:
6 x + 9 y + 20 z = n
where n is the number of ordered pieces.
CMP is a version of the postage stamp problem or Frobenius coin problem or knapsack problem, which can be defined as follows:
Problem 2.
Given a set of k objects with predetermined values n 1 , n 2 , , n k , what possible values of n can be had from combinations of these objects?
Positive integers satisfying the CMP are known as McNugget numbers. Sequence A065003 in the OEIS is the list of not McNugget numbers. Actually, regarding these numbers, the following proposition holds:
Proposition 1
([1], Proposition 1.1). Any positive integer x > 43 is a McNugget number.
CMP deals with a more wide kind of problems based on the number of lattice points in a convex polytope P, i.e., to determine ϕ A ( b ) = | P = { x A x = b , x integral } | , where A = ( a ( i , j ) ) is a m × n integral matrix and b = [ b 1 b 2 b m ] t is an integral m-vector. For instance, if H = [ 3 5 17 ] then ϕ H ( 58 ) = 9 , ϕ H ( 101 ) = 25 , ϕ H ( 1110 ) = 2471 [2]. Actually,
n = 0 ϕ H ( n ) t n = 1 ( 1 t 3 ) ( 1 t 5 ) ( 1 t 17 )
The number of solutions of equations with the form i = 1 n a i x i = b was studied by Sylvester [3] who called denumerant the function d ( b ; a 1 , a 2 , , a n ) , which counts the number of non-negative representations of b by a 1 , a 2 , , a n . Notice that, d ( b ; a 1 , a 2 , , a n ) is actually the number of partitions of b whose summands or parts are taken (repetitions allowed) from the sequence a 1 , a 2 , , a n . Recall that a partition of a positive integer n is a finite non-increasing sequence of positive integers λ 1 , λ 2 , , λ r , such that i = 1 r λ i .
Sylvester proved that the generating function f ( t ) of d ( b ; a 1 , a 2 , , a n ) is given by the identity [3,4]
f ( t ) = 1 ( 1 t a 1 ) ( 1 t a 2 ) ( 1 t a n ) .
As Ramírez-Alfonsín pointed out in [4] finding formulas for denumerants is very difficult since even the problem of determining if d ( b ; a 1 , a 2 , , a n ) > 0 is an N P -complete problem.
It is worth noting that Euler [4,5,6] pointed out that the generating function of the number of non-negative solutions of a system of linear equations with the form A x = b is equal to the coefficient of x 1 b 1 x m b m in the expansion of
R ( x 1 , , x m ) = 1 ( 1 ( x 1 a 11 x n a m 1 ) ) ( 1 ( x 1 a 1 n x n a m n ) ) .
Gelfand–Tsetlin polytopes (or GT-polytopes) are another kind of polytopes whose enumeration gives rise to interesting problems in combinatorics, Diophantine analysis, and many other fields. We recall that a triangular integer array T = ( t ( i , j ) ) with the shape:
T = t ( n , 1 ) t ( n , 2 ) t ( n , 3 ) t ( n , n ) t ( n 1 , 1 ) t ( n 1 , 2 ) t ( n 1 , n 1 ) t ( 1 , 1 )
is said to be a standard Gelfand–Tsetlin pattern (GT pattern or Gelfand–Tsetlin tableau) if its entries satisfy the following interlacing conditions [7]:
t ( i + 1 , j ) t ( i , j ) 0 , t ( i , j ) t ( i + 1 , j + 1 ) > 0 .
Given λ , μ Z n , the Gelfand–Tsetlin polytope GT ( λ , μ ) is the convex polytope of GT patterns ( t ( i , j ) ) 1 i j n satisfying in addition that
t ( 1 , 1 ) = μ 1 , j i = 1 t ( i , j ) j 1 i = 1 t ( i , j 1 ) = μ j , 2 j n .
It is worth noting that much of the theory of representation of the general linear Lie algebra g l n C (which consists of complex n × n matrices with the usual matrix commutator) is based on a result of Gelfand and Tsetlin related with the enumeration of lattice points in GT-polytopes [7,8]. Actually, it is known that if U is the subspace of an irreducible representation V of g l n C with highest weight λ and d = dim C U then d is given by the number of integral points in GT ( λ , μ ) .

Contributions

The main contribution of this paper is the introduction of the novel notion of the mutation of a Brauer configuration and its properties. Such mutations and their specializations allow solving different types of Diophantine problems. For instance, specializations of some mutations can be used to find out the Frobenius number of variations of some Diophantine equations called Gelfand–Tsetlin equations of the form i = 1 n 3 a i x i + 2 + a n 2 x n = d , with suitable positive integers a i , for each 1 i n 2 . For these particular equations, we prove that there exists a solution if the constant term d is the number of Gelfand–Tsetlin patterns of a given type. To achieve that, we define some marked posets whose points are in bijective correspondence with some classes of Gelfand–Tsetlin patterns.
Specializations of mutations and suitable automata are also used to solve Diophantine problems of type D ( n 1 , n 2 , K m ) , which arise from the research of generalizations of denumerants. Such a problem is defined as follows:
Find out positive integers λ 1 , λ 2 , , λ m such that for positive integers n 1 16 and n 2 , it holds that
m i = 1 λ i = n 1 , m j = 1 k j λ j = n 2 .
where K m = { k 1 , k 2 , , k m } is a fixed set of positive integers.
As an application, we note that the AES key schedule is nothing but the specialization of a mutation. Thus, the algebraic properties of the corresponding Brauer configuration algebra allow the description of some characteristics of an AES key. It is worth noting that the use of Brauer configuration algebras to analyze the structure of an AES key does not appear in the literature, neither focused on the theory of representation of algebras nor focused on cryptography.
The following diagram (7) shows a way that some of the main results presented in this paper are related. In this case, Th(i), Cl(i) and Pr(i) denote Theorem i, Corollary i, and Proposition i, respectively.
This paper is organized as follows; basic notation and definitions to be used throughout the paper are given in Section 2. In particular, we introduce an algorithm to build Brauer configuration algebras. The notion of mutation associated with Brauer configurations is also introduced in Section 2.3.2. In Section 3, we prove results regarding Gelfand–Tsetlin patterns. Gelfand–Tsetlin equations, and Gelfand–Tsetlin numbers are introduced in this section as well. In Section 4, we give properties of some Diophantine equations whose solutions are given by mutations of some Brauer configurations. In this section properties of the AES key schedule are described in terms of specializations of mutations of suitable Brauer configurations. Conclusions are given in Section 5.
Mathematics 09 01937 i001

2. Preliminaries

In this section, we introduce basic definitions and notation to be used throughout the paper. Henceforth, we will use the customary symbols N , Z , and R to denote the set of natural numbers, integers, and real numbers, respectively.

2.1. On the Frobenius Number

If n 1 , n 2 , , n k are positive integers then the set S of all integers which can be presented in the form [1]:
n = k i = 1 n i λ i , λ 1 , λ 2 , , λ k N
is a submonoid of ( N , + ) . We let n 1 , n 2 , , n k denote the set S = { i = 1 k n i λ i λ i N , 1 i k } , numbers n i are said to be generators of S, which is called a numerical monoid, e.g., 6 , 9 , 20 is the chicken McNugget monoid generated by 6, 9, and 20. S is said to be a numerical semigroup if | N S | < .
The following result regards numerical semi-groups.
Theorem 1
([9], p. 7). If n 1 , n 2 , , n k are positive integers, then they generate a numerical semigroup if, and only if, ( n 1 , n 2 , , n k ) = 1 .
If n 1 , n 2 , , n k are positive integers, then the Frobenius number of n 1 , n 2 , , n k denoted F ( n 1 , n 2 , , n k ) is the largest positive integer n, such that n n 1 , n 2 , , n k . For instance, F ( 6 , 9 , 20 , ) = 43 , (see Proposition 1).
The following result is a version of Ramírez-Alfonsín [4] of a theorem given by Roberts [10] regarding Frobenius numbers.
Theorem 2
([4], Theorem 3.3.2). Let a , d , and s be positive integers with ( a , d ) = 1 . Then
F ( a , a + d , , a + s d ) = ( a 2 s + 1 ) a + ( d 1 ) ( a 1 ) 1 .
where x is the largest integer less than or equal to x.
In the general case, there is no known formula for the Frobenius number of the k-generated numerical semigroup S, but for k fixed, there is an algorithm that computes the Frobenius number in polynomial time. Actually, Ramírez-Alfonsín proved that the knapsack problem can be reduced to the Frobenius problem in polynomial time [11].
Let x , y n 1 , n 2 , , n k , we say that x divides y in n 1 , n 2 , , n k if there exists z n 1 , n 2 , , n k , such that y = x + z .
We call a non-zero element x n 1 , n 2 , , n k irreducible if whenever x = y + z , either y = 0 or z = 0 (hence, x is irreducible if its only proper divisors are only 0 or itself).
The following result determines which elements are irreducible in a numerical monoid.
Proposition 2
([1], Proposition 3.1). If n 1 , n 2 , , n k is a numerical monoid, then its irreducible elements are precisely n 1 , n 2 , , n k .
Corollary 1
([1], Corollary 3.2). The irreducible elements of the McNugget monoid are 6, 9, and 20.

2.2. Path Algebras

In this section, we give a brief discussion on quivers, path algebras, and their ideals based on the work of Assem et al. [12].
A quiver  Q = ( Q 0 , Q 1 ) is a quadruple consisting of two sets: Q 0 (whose elements are called points or vertices) and Q 1 (whose elements are called arrows), and two maps s , t : Q 1 Q 0 which associate to each arrow α Q 1 its source s ( α ) Q 0 and its target t ( α ) Q 0 , respectively. Note that, under these circumstances, a quiver is nothing but an oriented graph without any restrictions as to the number of arrows between two points, to the existence of oriented cycles or loops.
An arrow α Q 1 of source a = s ( α ) and target b = t ( α ) is usually denoted by α : a b . A quiver Q = ( Q 0 , Q 1 , s , t ) is usually denoted by Q = ( Q 0 , Q 1 ) or even simply by Q.
A path of length l 1 with source a and target b (or more briefly, from a to b) is a sequence ( a | α 1 , α 2 , , α l | b ) where α k Q 1 for all 1 k l , and t ( α l ) = b . Such a path is denoted by α 1 α 2 α l .
We let L e n g t h ( P ) ( Q l ) denote the length of a path P (the set of all paths P for which L e n g t h ( P ) = l ). We also agree to associate to each point a Q 0 a path of length 0, called the trivial or stationary path at a, and denoted by e a = a | | a . If X is a set of paths in a quiver Q then L e n g t h ( X ) = x X L e n g t h ( x ) .
Example 1.
The following is an example of a quiver Q with three vertices a 1 , a 2 , and a 3 and two arrows α 1 and α 2 . Note that, Q 1 = { α 1 , α 2 } , and Q 2 = { α 1 α 2 } . Thus, L e n g t h ( Q 1 ) = L e n g t h ( Q 2 ) = 2 .
Mathematics 09 01937 i002
If F is an algebraically closed field then the path algebra F Q of Q is the F -algebra whose underlying F -vector space has, as its basis, the set of all paths of length l 0 in Q and such that the product of two basis vectors is given by the usual concatenation of paths. For instance, B = { e a 1 , e a 2 , e a 3 , α 1 , α 2 , α 1 α 2 } is a basis of the algebra F Q , where Q is the quiver given in (10).
Let Q be a finite and connected quiver. The two-sided ideal R Q of the path algebra F Q generated (as an ideal) by the arrows of Q is called the arrow ideal of F Q . A two-sided ideal I of F Q is said to be admissible if there exists m 2 , such that R Q m I R Q 2 .
If I is an admissible ideal of F Q , the pair ( Q , I ) is said to be a bound quiver. The quotient algebra F Q / I is said to be the algebra of the bound quiver ( Q , I ) or, simply, a bound quiver algebra.
Let Q be a quiver. A relation in Q with coefficients in F is a F -linear combination of paths of length at least two having the same source and target. Thus, a relation ρ is an element of F Q , such that
ρ = m i = 1 λ i p i
where the λ i are scalars (not all zero) and the p i are paths in Q of length at least 2 such that, if i j , then the source (or the target, respectively) of p i coincides with that of p j .
If m = 1 , the preceding relation is called a zero relation or a monomial relation. If it is of the form p 1 p 2 (where p 1 and p 2 are two paths), it is called a commutativity relation.
If ( ρ j ) j J is a set of relations for a quiver Q such that the ideal they generate ρ j j J is admissible, we say that the quiver Q is bound by the relation ( ρ j ) j J or by the relations ρ j = 0 [12].
Henceforth, we let rad Λ denote the radical of a path algebra Λ = F Q , which is the intersection of all maximal ideals. Actually, if I is an admissible ideal of Λ , it holds that rad ( F Q / I ) = R Q / I .
If ≺ is an admissible well-ordering on the set of paths, i.e., ≺ is a well-ordering such that
  • If a , b , u , v Q where u a v and u b v are both not-zero a u a v or a = u a v ;
  • if a b then u a v u b v .
Then the tip  T i p ( x ) = w of an element x F Q is the maximal path w with respect to ≺, such that w has a non-zero coefficient in x when it is writing as a linear combination of the elements of a fixed basis of F Q . T i p ( X ) = { T i p ( x ) x X } is the set of tips of elements of elements in X [13].
Let I be an ideal in a path algebra F Q and let G I . If T i p ( G ) = T i p ( I ) then G is a Gröbner basis for I with respect to ≺.

2.3. Brauer Configuration Algebras

Brauer configuration algebras are multi-serial path algebras introduced recently by Green and Schroll in [14]. These algebras constitute a generalization of Brauer graph algebras, which have as one of their properties that its representation theory is encoded by some combinatorial data based on graphs.
The following is a description of the structure of Brauer configuration algebras as the first author and Espinosa and Green and Schroll present in [14,15], respectively.
A Brauer configuration  Γ is a quadruple of the form Γ = ( Γ 0 , Γ 1 , μ , O ) , where
  • Γ 0 is a set whose elements are called vertices, | Γ 0 | > 1 ;
  • Γ 1 is a finite collection of multisets called polygons, such that if V Γ 1 then | V | > 1 ;
  • μ is an integer valued map, μ : Γ 0 N { 0 } (i.e., for each vertex α Γ 0 , it holds that μ ( α ) > 1 ) called the multiplicity function;
  • O is a well-ordering < defined on Γ 1 . Such that for each vertex α Γ 0 , the collection S α = { V α , 1 ( α 1 ) , V α , 2 ( α 2 ) , , V α , t ( α t ) α i 1 denotes the frequency of α in V α , i } consisting of all polygons of Γ 1 where α occurs (counting repetitions) is ordered in the form V α , 1 ( α 1 ) < V α , 2 ( α 2 ) < < V α , t ( α t ) ( V α , i < V α , i , for 1 i t ). Where, V α , i ( α i ) is a sequence of the form V α , i < V α , i < < V α , i α i times . If it is assumed that V α , 1 = min S α and V α , t = max S α then a new circular relation R α = { V α , t < V α , 1 } is added. S α is called the successor sequence at the vertex α and C α = S α R α ;
  • occ ( α , V ) denotes the number of times that a vertex α occurs in a polygon V and the sum V Γ 1 occ ( α , V ) is said to be the valency of α , denoted v a l ( α ) .;
  • A vertex α Γ 0 is truncated if μ ( α ) v a l ( α ) = 1 , it is non-truncated if μ ( α ) v a l ( α ) > 1 . Vertices are either truncated or non-truncated (i.e., Γ 0 = T Γ . N T Γ , where T Γ ( N T Γ ) is the set of truncated (non-truncated) vertices), if U Γ 1 then U N T Γ . A Brauer configuration Γ without truncated vertices is reduced, these types of configurations are used to construct suitable quivers called Brauer quivers [14].
Following the Green and Schroll ideas [14], Algorithm 1 builds the Brauer quiver Q Γ and the Brauer configuration algebra Λ Γ = F Q Γ / I Γ induced by the Brauer configuration Γ , where I Γ is an admissible ideal (see Remark 2).
Algorithm 1: Construction of a Brauer configuration algebra
  • Input A reduced Brauer configuration Γ = ( Γ 0 , Γ 1 , μ , O ) .
  • Output The Brauer configuration algebra Λ Γ = F Q Γ / I Γ
  • Construct the quiver Q Γ of the Brauer configuration Γ , Q Γ = ( ( Q Γ ) 0 , ( Q Γ ) 1 , s : ( Q Γ ) 1 ( Q Γ ) 0 , t : ( Q Γ ) 1 ( Q Γ ) 0 ) ,
    (a)
    ( Q Γ ) 0 = Γ 1 ,
    (b)
    For each cover V i < V i + 1 Γ 1 define an arrow a ( Q Γ ) 1 , such that s ( a ) = V i and t ( a ) = V i + 1 ,
    (c)
    Each relation V i < V i defines a loop in Q Γ ,
    (d)
    Each ordered set C α defines a cycle in Q Γ called a special cycle.
  • Define the path algebra F Q Γ ,
  • Construct the ideal I Γ , which is generated by the following relations:
    (a)
    If α i , α j U , U Γ 1 , and C α i , C α j are corresponding special cycles then C α i μ ( α i ) C α j μ ( α j ) = 0 ,
    (b)
    If C α i is a special cycle associated with the vertex α i then C μ ( α i ) a = 0 , if a is the first arrow of C α i ,
    (c)
    If α , α Γ 0 , α α , a , b ( Q Γ ) 1 , a b , a b C α for any α Γ 0 then a b = 0 , if a C α , b C α and a b F Q Γ ,
    (d)
    If a is a loop associated with a vertex α with v a l ( α ) = 1 and μ ( α ) > 1 then a μ ( α ) + 1 = 0 .
  • Λ Γ = F Q Γ / I Γ is the Brauer configuration algebra.
  • For the construction of a basis of Λ Γ follow the next steps:
    (a)
    For each V Γ 1 choose a non-truncated vertex α V and exactly one special α -cycle C α V at V,
    (b)
    Define:
    A = { p ¯ p i s a p r o p e r p r e f i x o f s o m e C α μ ( α ) } , B = { C α V μ ( α ) ¯ V Γ 1 } .
    (c)
    A B is an F -basis of Λ Γ .
Remark 1.
In the last few years, the computational aspects of the theory of representation of quivers have been extensively studied. For instance, Struble [13] gave results regarding the complexity of algorithms based on Gröbner bases used to construct path algebras and their dimensions.
Struble proved that if I is an ideal of a path algebra F Q and G is a Gröbner basis for I under some admissible ordering ≺. Then there exist algorithms to determine whether F Q / I is finite-dimensional in O ( L e n g t h ( T i p ( G ) ) ) time, to compute dim F F Q / I in O ( L e n g t h ( T i p ( G ) ) ) time. Additionally, Haugland [16] proved that if X is the matrix, which simultaneously encodes all the constraints imposed on any homomorphism between two representations R M and R N of a quiver Q, then there is an algorithm, which computes a basis of Hom F Q ( R M , R N ) in O ( r 3 + r c 2 + | Q 0 | r ) , where r (c) is the number of rows (columns) of the matrix X.
The complexity of algorithms used to compute the center of an associative algebra has been also studied by Strubel who described an algorithm, which finds the center Z ( F Q ) of a path algebra F Q with dimension d and h generators in O ( d 4 h t ( < Q ) + d 3 h t ( ) + t ( F ) + t ( = F ) + t ( r e d u c e ) ) . Where, d 4 h t ( < Q ) means that up to d 4 h elements in Q have non-zero coefficients, the algorithm develops d 3 h t ( ) multiplications in Q, t ( F ) and t ( = F ) denote the time that the algorithm takes making scalar multiplications and comparisons to determine if a given element is 0 in the field F , t ( r e d u c e ) is the running time that a specialized algorithm reduces an element of the basis of F Q to a normal form.
Several up-to-date software packages have been designed to develop basic operations and testing conjectures on path algebras and representation of quivers. For instance, the GAP package QPA [17] extends the GAP functionality for computations with finite-dimensional quotient path algebras, whereas King et al. have been working on the implementation of Sage packages [18] with the same purposes as QPA.
Remark 2.
Let Λ = F Q Γ / I be the Brauer configuration algebra associated with a reduced Brauer configuration Γ (i.e., truncated vertices α Γ 0 occur only in polygons with two vertices). Denote by π : F Q Γ Λ the canonical surjection then π ( x ) is denoted by x ¯ , for x F Q Γ .
Henceforth, if no confusion arises, we will assume notations Q, I, and Λ instead of Q Γ , I Γ and Λ Γ , for a quiver, an admissible ideal, and the Brauer configuration algebra induced by a fixed Brauer configuration Γ .
Example 2.
As an example of the application of Algorithm 1, consider the following reduced Brauer configuration:
Γ = ( Γ 0 , Γ 1 , μ , O ) , Γ 0 = { 0 , 1 } , Γ 1 = { V 1 = { 0 , 1 , 1 } , V 2 = { 0 , 1 } } , S 0 = V 1 < V 2 , C 0 = V 1 < V 2 < V 1 , S 1 = V 1 < V 1 < V 2 , C 1 = V 1 < V 1 < V 2 < V 1 , v a l ( 0 ) = 2 , v a l ( 1 ) = 3 , μ ( 0 ) = μ ( 1 ) = 1 .
Mathematics 09 01937 i003
The following is a list of special cycles:
C 0 , V 1 1 = α 0 1 α 0 2 , C 0 , V 2 1 = α 0 2 α 0 1 , C 1 , V 1 1 = l 1 3 β 1 1 β 1 2 , C 1 , V 1 2 = β 1 1 β 1 2 l 1 3 , C 1 , V 2 1 = β 1 2 l 1 3 β 1 1 .
The admissible ideal I Γ is generated by the following relations:
C i , V j k = C i , V j k , f o r a l l p o s s i b l e v a l u e s o f i , j , k , i , j , k , C i , V j k a = 0 , w h e r e a i s t h e f i r s t a r r o w o f t h e s p e c i a l c y c l e C i , V j k , l 1 3 α 0 1 = 0 , β 1 1 α 0 2 = 0 , α 0 2 l 1 3 = 0 , α 0 2 β 1 1 = 0 , β 1 2 α 0 1 = 0 , ( l 1 3 ) 2 = 0 .
The next result regards the dimension of a Brauer configuration algebra.
Proposition 3
([14], Proposition 3.13). Let Λ be a Brauer configuration algebra associated with the Brauer configuration Γ and let C = { C 1 , , C t } be a full set of equivalence class representatives of special cycles. Assume that for i = 1 , , t , C i is a special α i -cycle where α i is a non-truncated vertex in Γ. Then
dim F Λ = 2 | Q 0 | + C i C | C i | ( n i | C i | 1 ) ,
where | Q 0 | denotes the number of vertices of Q, | C i | denotes the number of arrows in the α i -cycle C i and n i = μ ( α i ) .
Proposition 4
([14], Proposition 3.6). Let Λ be the Brauer configuration algebra associated with a connected Brauer configuration Γ. The algebra Λ has a length grading induced from the path algebra F Q if, and only if, there is an N Z > 0 such that for each non-truncated vertex α Γ 0 v a l ( α ) μ ( α ) = N .
The following result regards the center of a Brauer configuration algebra.
Theorem 3
([19], Theorem 4.9). Let Γ be a reduced and connected Brauer configuration and let Q be its induced quiver and let Λ be the induced Brauer configuration algebra such that rad 2 Λ 0 then the dimension of the center of Λ denoted dim F Z ( Λ ) is given by the formula:
dim F Z ( Λ ) = 1 + α Γ 0 μ ( α ) + | Γ 1 | | Γ 0 | + # ( L o o p s Q ) | C Γ | .
where | C Γ | = { α Γ 0 v a l ( α ) = 1 , a n d μ ( α ) > 1 } .
Example 3.
The dimension of the algebra Λ Γ = F Q Γ / I Γ defined by (12) and (13) is given by the following identity:
dim F Λ Γ = 2 ( 2 ) + 2 ( 1 ) + 3 ( 2 ) = 12 .
Note that,
dim F Z ( Λ Γ ) = 1 + 2 + 1 = 4 .

2.3.1. The Message of a Brauer Configuration

The notion of labeled Brauer configurations and the message of a Brauer configuration were introduced by Fernández et al. to define suitable specializations of some Brauer configuration algebras [15,20]. According to them, since polygons in a Brauer configuration Γ = ( Γ 0 , Γ 1 , μ , O ) are multisets, it is possible to assume that any polygon U Γ 1 is given by a word w ( U ) of the form
w ( U ) = α 1 s 1 α 2 s 2 α t 1 s t 1 α t s t
where for each i, 1 i t , s i = occ ( α i , U ) .
The message is, in fact, an element of an algebra of words W Γ associated with a fixed Brauer configuration such that for a given field F the word algebra W Γ consists of formal sums of words with the form α i F U Γ 1 α i w ( U ) , 0 w ( U ) = ε is the empty word, and 1 w ( U ) = w ( U ) for any U Γ 1 . The usual word concatenation gives the product in this case. The formal product (or word product)
M ( Γ ) = U Γ 1 w ( U )
is said to be the message of the Brauer configuration Γ.

2.3.2. Mutations

Define a seed  ( Γ , X ) , where X = ( x 0 , x 1 , , x l 1 ) with x i = ( x i , 0 , x i , 1 , , x i , s 1 ) F s , s 1 , l > 1 , and a field F = Z 2 [ x ] / p ( x ) for a suitable irreducible polynomial p ( x ) of degree n 1.
Γ = { Γ 0 , Γ 1 , μ , O } is a Brauer configuration for which;
Γ 0 = { 0 , 1 } , Γ 1 = { w ( 0 ) , w ( 1 ) , , w ( l 1 ) as vector w ( i ) Z 2 n s , 0 i l 1 } , w ( i ) = ( w i , 0 , w i , 1 , , w i , s 1 ) , w i , j is the binary expansion of x i , j , μ ( 0 ) = μ ( 1 ) = 1 .
For the orientation O in successor sequences, it is considered the order w ( 0 ) < w ( 1 ) < < w ( l 1 ) .
A mutation  M ( Γ , X ) = ( Γ , X ) is given by a Brauer configuration M ( Γ ) = Γ = ( Γ 0 , Γ 1 , μ , O ) and a vector X = ( x 0 , x 1 , , x l 1 ) with x i F s , 0 i l 1 , such that:
Γ 0 = { 0 , 1 } , Γ 1 = { w ( 0 ) , w ( 1 ) , , w ( l 1 ) w ( i ) Z 2 n s } , ( w ( i ) ) i , j = ( M ( x i ) ) i , j = ( ( w ( i ) ) i , j + ( w ( i 1 ) ) i , j , if i 0 , ( w ( 0 ) ) 0 , j = ( w ( i ) ) 0 , j + ( H ( w ( s 1 ) ) ) 0 , j , 0 j s 1 , μ ( 0 ) = μ ( 1 ) = 1 .
Note that, if the indices of the original seed are considered then polygons in Γ 1 can be written as follows:
Γ 1 = { w ( l ) , w ( l + 1 ) , , w ( 2 l 1 ) w ( l + i ) Z 2 n s } .
H ( x 0 , x 1 , , x l 1 ) = ( τ ( x 0 ) , τ ( x 1 ) , , τ ( x l 1 ) ) with τ ( x j ) = λ j x j + v j , 0 , for some suitable, λ j , v j , 0 F m , and m 1 . We let v 0 denote the shift vector such that v 0 = ( v 1 , 0 , , v l , 0 ) .
For successor sequences, the orientation O is defined in such a way that,
w ( 0 ) < w ( 1 ) < < w ( l 1 )
It turns out that according to the indices assumed for the original seed, the ith mutation M i has the form:
M i = { w ( i ( l 1 ) + 1 ) , w ( i ( l 1 ) + 2 ) , , w ( i ( l 1 ) + l ) w ( i ) Z 2 n s } .
Brauer configurations obtained from mutations are said to be Brauer clusters. Polygons are called cluster polygons.
For a fixed positive integer m 0 , the m 0 -Brauer cluster, Φ m 0 is a Brauer configuration,
Φ m 0 = ( Φ 0 m 0 , Φ 1 m 0 , μ , O )
such that:
  • Φ 0 m 0 = { 0 , 1 } ;
  • Φ 1 m 0 consists of messages of the Brauer clusters M i , i 0 ;
  • μ ( 0 ) = μ ( 1 ) = 1 ;
  • If M ( i ) denotes the message associated with the ith Brauer cluster then for successor sequences, it is assumed the order M ( 0 ) < M ( 1 ) < < M ( m 0 ) .
Example 4.
As an example, in the sequel we describe mutations of the following seed ( Γ , X = { 1 , x } ) , where F = Z 2 [ x ] / x 2 + x + 1 .
Γ = ( Γ 0 , Γ 1 , μ , O ) , Γ 0 = { 0 , 1 } , Γ 1 = { 1 = 01 , x = 10 } , μ ( 0 ) = μ ( 1 ) = 1 , v 1 , 0 = 1 , λ 1 = x ,
Successor sequences at 0 and 1 are defined as follows:
0 : 1 < x , 1 : 1 < x .
The first mutation M ( Γ ) = ( Γ , X = { x , x + 1 } ) is defined as follows:
Γ = ( Γ 0 , Γ 1 , μ , O ) , Γ 0 = { 0 , 1 } , Γ 1 = { x = 10 , x + 1 = 11 } , μ ( 0 ) = μ ( 1 ) = 1 , v 2 , 0 = 1 , λ 2 = x .
In this case 1 is the only non-truncated vertex with a successor sequence of the form:
1 : x < x + 1 < x + 1 .
The second mutation M 2 = ( Γ , X = { x , 1 } ) is described as follows:
Γ = ( Γ 0 , Γ 1 , μ , O ) , Γ 0 = { 0 , 1 } , Γ 1 = { x = 10 , 1 = 01 } , μ ( 0 ) = μ ( 1 ) = 1 .
In this case, the successor sequences at 0 and 1 are
0 : x < 1 , 1 : x < 1 .
The 2-Brauer cluster Φ 2 = ( Φ 0 2 , Φ 1 2 , μ , O ) has the following form:
Φ 0 2 = { 0 , 1 } , Φ 1 2 = { M ( 0 ) = 0110 , M ( 1 ) = 1011 , M ( 2 ) = 1001 } , μ ( 0 ) = μ ( 1 ) = 1 .
For successor sequences, it holds that:
M ( 0 ) < M ( 1 ) < M ( 2 ) .
The following Q Γ , Q Γ , Q Γ , and Q Φ 2 are the Brauer quivers of all these mutations and of the 2-Brauer cluster Φ 2 .
Mathematics 09 01937 i004
The admissible ideal I in the Brauer configuration algebra Λ ( Φ n , X ) is generated by the following relations:
  • ( l j i ) 2 , l 0 i l 1 j , for all possible values of i and j;
  • α 1 i β 0 r , α 1 i l 0 r , l 1 r α 1 i , for all possible values of i and r;
  • β 0 r α 1 i , β 0 r l 1 s , l j s β 0 r , for all possible values of i , r , and s.
Theorem 4.
For m 0 > 1 the Brauer configuration algebra Λ Φ m 0 induced by the Brauer configuration Φ m 0 (see (20)) is connected and reduced.
Proof. 
Since each polygon M ( i ) Φ 1 m 0 contains at least one 0 and at least one 1, we conclude that Φ m 0 does not contain truncated vertices. The result follows provided that m 0 i = 0 M ( i ) . □
Theorem 5.
If F is a finite field then the set M Φ of m 0 -Brauer clusters obtained by mutation is finite, and the special cycle of maximal length has one of the two shapes (26) or (27). Moreover, there exists m N , such that ( Γ , X ) = ( Γ m + 1 , X m + 1 ) for a given initial seed ( Γ , X ) .
Mathematics 09 01937 i005
Mathematics 09 01937 i006
where β m β m + 1 0 .
Proof. 
Every mutation ( Γ i , X i ) is uniquely determined by X i . Since, X i F l for any i N then | M Φ | | F l | . Note that, since the set M of mutations is finite, there exist integers m and n, such that M m ( Γ , X ) = M m + n ( Γ , X ) . If M = { m N M m ( Γ , X ) = M m + n ( Γ , X ) } and min M = 0 then the maximal special cycle of the quiver Q Γ n obtained after n mutations has the form (26), otherwise the special cycle of the quiver Q Γ m + n after m + n mutations has the form (27). We are done. □
Remark 3.
For m 0 > 1 and a fixed seed, the dimension of an algebra Λ Φ m 0 and its center Z ( Λ Φ m 0 ) can be estimated by using some statistical methods. For instance, we use a sample of 10 6 random seeds to obtain confidence intervals for these values. Such samples allow us to infer that if m 0 = 10 , then
P r ( 7499 dim F Λ Φ m 0 8067 ) 0 , 99 and P r ( 199 dim F Z ( Λ Φ m 0 ) 221 ) 0 , 99 .
where P r ( X ) denotes the probability of an event X.
Remark 4.
For the sake of applicability, the definition of mutation of a Brauer configuration has been given by taking into account that elements X constituting a seed are elements of finite products of finite fields. However, it can be extended to arbitrary rings, in such a case, if R 1 and R 2 are rings then any map τ : X R 1 k X R 2 s , r , s 1 can be used to transform a given seed ( Γ , X ) into a Brauer cluster of the form ( Γ , X ) .

2.4. Deterministic and Non-Deterministic Automata

In this section, we recall definitions of deterministic and non-deterministic automata as Rutten et al. present in [21]. We use these definitions to interpret Brauer configuration algebras as automata with acceptance language given by relations generating suitable admissible ideals.
Given an alphabet A, a deterministic automaton is a pair ( X , α ) consisting of a (possibly infinite) set X of states and a transition function α : X X A . The following is an illustration of this kind of transitions, where α ( x ) ( a ) = y = x a [21].
Mathematics 09 01937 i007
If ε denotes the empty word then x ε = x , for any x X and x w a = α ( x w ) ( a ) with w A * .
A deterministic automaton can be decorated by means of a coloring function c : X 2 = { 0 , 1 } , such that c ( x ) = 1 if x is an accepting (or final) state, c ( x ) = 0 , if x is a non-accepting state. A triple ( X , c , α ) is said to be a deterministic colored automaton. In the following diagram, an accepting state is denoted with a double circle, x is an accepting state, whereas y is a non-accepting state.
Mathematics 09 01937 i008
Given a deterministic colored automaton ( X , c , α ) and a state x X , the set
O c ( x ) = { w A * c ( x w ) = 1 }
is called the language accepted or recognized by the automaton ( X , c , α ) starting from the state x. A deterministic automaton can also has an initial state x X represented by a function x : 1 = { 0 } X . The triple ( X , x , α ) is said to be a deterministic pointed automaton.
A non-deterministic automaton is a pair ( X , α ) consisting of a set X (possibly infinite) of states and a transition function α : X P w ( X ) A , that assigns to each letter and to each state a finite set of states [21]. If to each state it is assigned a single new state, the definition of a deterministic automaton is recovered. As in the deterministic case, a state x in a non-deterministic automaton can be either accepting ( c ( x ) = 1 ) or non-accepting ( c ( x ) = 0 ); and x ε = { x } , x w a = { y a y x w } . A triple ( X , c , α ) is called a colored non-deterministic automaton.
If the set of states X is finite then the automaton is said to be a deterministic (non-deterministic) finite automaton, denoted DFA (NFA), respectively.
A regular language associated with a Brauer configuration algebra
Automata associated with path algebras have been studied by Rees [22], who introduced some automata associated with some string algebras, such automata were used by her to describe indecomposable representations over these types of algebras, she points out that the set of strings defining representations of string algebras, and many other bounded path algebras, constitute a regular set. In this section, we follow Rees ideas to describe an automaton associated with a Brauer configuration algebra.
Values of the map c : Q 1 2 can be obtained by endowing to the successor sequences a length-lexicographic order, in this case, both Γ 0 and Γ 1 are well-ordered sets with partial orders ≺ and <, respectively. In such a way that initial states in the corresponding automaton are given by minimal successor sequences (see Algorithm 1). Note that, if S a , U denotes a successor sequence starting in a polygon U with a U , and if | S α , V 1 | = | S α , V 1 | = | S α , V 2 | = | S α , V 2 | , α , α V 1 V 2 and α α , then c ( S α , V 1 ) = 1 and c ( S α , V 1 ) = c ( S α , V 2 ) = c ( S α , V 2 ) = 0 .
A Brauer configuration algebra Λ Γ induced by a Brauer configuration Γ = ( Γ 0 , Γ 1 , μ , O ) has associated a regular language L Γ = A Γ * / , where the alphabet A Γ = { x α i α Γ 0 , 1 i v a l ( α ) } , each letter x α i corresponds to a unique arrow in ( Q Γ ) 1 . Each path P Q Γ corresponds to a word w L Γ .
Two words w , w L Γ are equivalent (i.e., w w ) if their corresponding paths are equivalent as elements of the Brauer configuration algebra. In this case, if S α is a successor sequence associated with the vertex α Γ 0 , then w S α denotes the word associated with the corresponding special cycle up to equivalence. If min S α = U Γ 1 then w S α O c ( U ) (final vertices of special cycles are final states up to equivalence).
In the associated automaton of a Brauer configuration algebra, polygons are states. Actually, all states we represent are accepted states. The transition between states is given by the order <, in other words, if x i α is the letter associated with an arrow U i < U i + 1 , that is, U i x α i U i + 1 ( Q Γ ) 1 then x α i is a transition from U i to U i + 1 . Note that, if x α i x α j belongs to the admissible ideal I, with Λ Γ = k Q Γ / I then it is not accepted as a word in L Γ if α α .
Note that, according to the automaton associated with the Brauer configuration defined by (12) and (13), it holds that V 1 is the initial and final state and
c ( C i , V j k ) = 0 , if , i 0 , j 1 , k 1 . c ( C i , V j k a ) = 0 , if a is the first arrow of C i , V j k for all possible values of i , j and k . c ( α j i β j i ) = c ( β j i α j i ) = 0 , for all the possible values of i , j , i , j .

2.5. Enumeration of Gelfand–Tsetlin Patterns

In this section, we recall some well-known results regarding the enumeration of GT patterns. Furthermore, we introduce the notion of the heart of a GT pattern which allows us to define posets and marked order polytopes associated with the number of some GT patterns [2,7,8,23,24].
If λ = ( λ ( n , 1 ) , λ ( n , 2 ) , λ ( n , 3 ) , , λ ( n , n ) ) is an integer partition and V ( λ ) is a finite-dimensional irreducible representation of gl n C with highest weight λ then a basis of V ( λ ) is parametrized by GT patterns T = T ( ( n , 1 ) , ( n , n ) , ( 1 , 1 ) ) associated with λ . These are arrays of integer row vectors with the shape:
T = λ ( n , 1 ) λ ( n , 2 ) λ ( n , 3 ) λ ( n , n ) λ ( n 1 , 1 ) λ ( n 1 , 2 ) λ ( n 1 , n 1 ) λ ( 1 , 1 )
such that the upper row coincides with λ and the following conditions hold:
λ ( k , i ) λ ( k 1 , j ) , λ ( k 1 , i ) > λ ( k , i + 1 ) .
This setting together with terms of the form l ( k , i ) = λ ( k , i ) i + 1 allow establishing the existence of a basis of V ( λ ) parametrized by T , such that the action of generators of gl n C are given by some Gelfand–Tsetlin formulas [7,8].
A GT pattern with first row of the form 1 , 2 , , n is called a monotone triangle of length n. It is also known that there is a bijection between GT patterns with first row λ n λ n 1 λ 1 and column-strict plane partitions of type λ = ( λ 1 , λ 2 , , λ n ) ( λ i parts in row i) and largest part n [23,24].
The following theorem regarding monotone triangles was given by Zeilberger in 1996.
Theorem 6
([25], Main Theorem). The number of monotone triangles of length n with bottom entry a ( n , n ) = r is equal to
2 n 2 n 1 n + r 2 n 1 2 n r n 1 A n 1 , with A n = n 1 i = 0 ( 3 i + 1 ) ! ( n + 1 ) ! .
Note that, A n ( x ) = T x s ( T ) , where s ( T ) denotes the number of standard elements of T such that t ( i 1 , j 1 ) < t ( i , j ) < t ( i 1 , j ) , for 2 i j n . In particular, A n ( 2 ) = 2 n 2 .

3. Gelfand–Tsetlin Equations and Diophantine Equations of Type D ( n 1 , n 2 , K m )

In this section, Gelfand–Tsetlin equations and Gelfand–Tsetlin numbers are introduced. Solutions of this kind of equations are proposed via some order marked polytopes. Whereas, solutions of Diophantine equations of type D ( n 1 , n 2 , K m ) are obtained by using some suitable non-deterministic automata associated with mutations of Brauer configurations.

3.1. The Heart of a GT Pattern

For n 4 , a subarray T ( ( n 1 , 1 ) , ( n 1 , n 2 ) , ( 2 , 1 ) ) of T ( ( n , 1 ) , ( n , n ) , ( 1 , 1 ) ) is said to be the heart or GT-heart of T ( ( n , 1 ) , ( n , n ) , ( 1 , 1 ) ) denoted H n ( T ) .
For n 4 fixed, it is possible to define an order ⊴ on the set of GT-hearts over gl n C (associated with GT patterns with fixed first row) whose covers are defined as follows:
H n ( T ) H n ( T ) if H n ( Λ ) { t ( i , j ) } = H n ( Λ ) { t ( i , j ) } ) and t ( i , j ) = t ( i , j ) + a , with a { 0 , 1 } , for some i , j .
If T ( H n ) denotes the set of Gelfand–Tsetlin arrays with H n as heart, then two hearts H n and H n are said to be equivalent denoted H n H n , provided that | T ( H n ) | = | T ( H n ) | . Thus, H ( n , r ) is a poset endowed with an equivalence relation.
We let ( H ( n , r ) , ) or simply H ( n , r ) denote the poset of hearts associated with a given Gelfand–Tsetlin pattern with a weight λ = ( λ ( n , 1 ) , , λ ( n , n ) ) of length n, such that | λ ( n , i ) λ ( n , i 1 ) | = r .
Example 5.
If λ = ( λ ( 4 , 1 ) = m , λ ( 4 , 2 ) = m 3 , λ ( 4 , 3 ) = m 6 , λ ( 4 , 4 ) = m 9 ) is a suitable weight for n = 4 , then the following is a three-point chain of H ( 4 , 3 ) :
Mathematics 09 01937 i009
We have the following result for GT patterns with first row of the form:
w = ( n , n r , n 2 r , , n r ( n 1 ) ) .
Theorem 7.
The number g ( n , r ) of GT patterns over gl n C defined by a weight vector of the form w = ( n , n r , n 2 r , , n r ( n 1 ) ) is given by the formula g ( n , r ) = ( r + 1 ) n 2 .
Proof. 
It suffices to observe that for n > 2 , it holds that g ( n , r ) = g ( n 1 , r ) 2 ( r + 1 ) g ( n 2 , r ) . □
If | H n ( T ) | denotes the number of Gelfand–Tsetlin patterns T ( ( n , 1 ) , ( n , n ) , ( 1 , 1 ) ) with the same heart H n then the following result holds.
Proposition 5.
If n = 4 , r > 1 , and H n , H n H ( n , r ) are such that λ ( n 1 , 2 ) = λ ( n 1 , 2 ) and λ ( n 2 , 1 ) = λ ( n 2 , 1 ) then | H n ( T ) | = | H n ( T ) | .
Proof. 
If the different Gelfand–Tsetlin patterns are obtained by keeping the heart without changes and reducing one entry in one unit only λ ( j , j ) then the number of such Gelfand–Tsetlin arrays are given by adding some suitable integers in the form:
S g t ( n 1 , r ) = n 1 q 1 + q 2 + + q ( 2 r ) + q ( 2 r + 1 ) = n 1 q 1 + 2 r + 1 j = 1 q j
in particular, q ( 2 r ) = 3 and q ( 2 r + 1 ) = 1 . In the case, λ ( 2 , 2 ) = λ ( 2 , 2 ) = r 1 = max ( λ ( 2 , 2 ) ) , 1 n 1 r + 1 , and
q 1 = [ ( 2 r + 1 ) + r ( r + 1 ) + t ( r 1 ) ] , q 2 = [ 2 r + r 2 + t ( r 1 ) ] , q 3 = [ ( 2 r 1 ) + r ( r 1 ) + t ( r 1 ) ] , = , q r = [ ( 2 r + 1 ) r + 1 + 2 r + t ( r 1 ) ] = [ 3 r + t ( r 1 ) + 2 ] , q ( r + 1 ) = t ( r + 1 ) , q ( r + 2 ) = t r , = , q 2 r = t 2 , q ( 2 r + 1 ) = t 1 = 1 .
For arrays with λ ( 2 , 2 ) = r 2 then 1 n 1 n 1 + 1 , q 1 = [ 2 r + r ( r ) + t ( r 1 ) ] , q 2 = [ ( 2 r 1 ) + r ( r 1 ) + t ( r 1 ) ] and the construction of the remain q i ’s goes on until reaching all arrays for 1 λ ( 2 , 2 ) r 1 . If λ ( 2 , 2 ) = 1 then we have 2 r + 1 sums of the form n 1 t ( r + 1 ) + j = 1 r t r , 1 n 1 2 r + 1 , n 1 = 2 r + 1 if in the heart λ ( 3 , 1 ) = 2 r , n 2 = 2 r , if in the heart λ ( 3 , 1 ) = 2 r 1 , and so on until the case for which λ ( 3 , 1 ) = 0 and n 1 = 1 . □

3.1.1. Marked Posets and Marked Polytopes

In this section, we describe a special class of marked posets and marked polytopes introduced by Fourier in [26]. We also prove that some posets of type H ( n , r ) are marked by the number of some suitable Gelfand–Tsetlin arrays.
Let ( P , ) be a finite poset and a subset A of P containing at least all maximal and all minimal elements of P , we set:
Q A = { λ Z 0 A λ a λ b if a b }
and call the triple ( P , A , λ ) a marked poset. Then the marked chain polytope associated with λ Q A is defined:
C ( P , A ) = { s R 0 P A s x 1 + s x 2 + + s x n λ b λ a for all chains a x 1 x n b }
while the marked order polytope is defined as
O ( P , A ) λ = { s R 0 P A s x s y , λ a s x λ b , for all a x b , x y }
where a , b A , x i , x , y P A (the definition of marked order polytope is also valid if in R is considered the usual order ≤ and the order ⪯ in P is reversed).
The marked poset ( P , A , λ ) is regular if for all a b in A, λ a λ b , and there are no obviously redundant relations.
If a , b P , then a chain c ( a , b ) = { x 0 = a x 1 x 2 x n 1 b = x n } P is said to be saturated, if for each i, 0 i n 1 , the relation x i x i + 1 is a cover (i.e., if there exists z P , such that x i z x i + 1 , then either z = x i or z = x i + 1 ).
Let ( P , A , λ ) be a regular marked poset then the number of facets in the marked order polytope is equal to the number of cover relations in P .
If c ( a , b ) denotes the number of saturated chains a x 1 x 2 x p b , x i P A , then the number of facets in the marked chain polytope is equal to | P A | + a b c ( a , b ) .
If sl n is the Lie algebra of n × n matrices with trace zero and the usual Lie bracket. Then, for each n and λ = ( λ 1 λ n ) , let ( P , A , λ ) be the following marked poset P sl n = { x ( i , j ) 0 i n , 1 j n + 1 i } with cover relations x ( i 1 , j + 1 ) x ( i , j ) x ( i 1 , j ) [26].
Mathematics 09 01937 i010
Let λ = ( λ 1 λ 2 λ n λ n + 1 = 0 ) and let x ( 0 , j ) be marked with λ j , then:
| { facets in the marked order polytope } | = n ( n + 1 ) , | { facets in the marked chain order polytope } | = n ( n 1 ) 2 + n i = 1 i C n i ,
where C n i is the corresponding Catalan number.
The associated marked order polytope is known as the Gelfand–Tsetlin polytope associated with the partition λ .
The following result regards posets of type ( H ( n , r ) , ) .
Proposition 6.
For n = 4 , and r > 1 , If Q denote the set of numbers q i ’s given by identities (29) and (30). Then Q Q H ( n , r ) (see (31)).
Proof. 
Consider the following relation defined by hearts H 4 H 4 associated with suitable Gelfand–Tsetlin arrays.
Mathematics 09 01937 i011
Then, if x = x , y = y , z = z 1 or x = x , y = y + 1 , z = z and the number of Gelfand–Tsetlin arrays is given by a sequence with the form S g t ( n 1 , r ) = n 1 q 1 + j = 2 2 r + 1 q j then H 4 covers H 4 , and the associated sum to H 4 has the form S g t ( n 1 , r ) = n 1 q 1 + j = 2 2 r + 1 q j with n 1 = n 1 1 . Note that, if H 4 and H 4 are incomparable then x x . □
The next diagram illustrates poset ( H ( 4 , 1 ) , ) , where points with the same color are equivalent:
Mathematics 09 01937 i012
Corollary 2.
For r 2 and n = 4 , the number of facets F ( n , r ) in the marked order polytope Q H ( n , r ) associated with H ( n , r ) is r ( r + 1 ) ( 3 r + 2 ) .
Proof. 
If y 0 is the largest integer associated with the hearts x y 0 z of H ( n , r ) then subposet H ( n , r , x 0 ) , which contains all the hearts with this shape is equal to the poset P sl r . Thus, the number of facets F ( n , r , x 0 ) in the corresponding order polytope equals r ( r + 1 ) . Note that, H ( n , r ) = r j = 1 H ( n , r , y 0 j ) , H ( n , r , s ) H ( n , r , t ) = , if s t , and F ( n , r , y 0 j ) = r ( r + 1 ) + t j + r + t r t j 1 . Therefore F ( n , r ) = j = 0 r F ( n , r , y 0 j ) + the number of covers C ( y , y + 1 ) of the form x y z x y + 1 z since C ( y , y + 1 ) = r ( r + 1 ) ( 2 r + 1 ) 2 then F ( n , r ) = r ( r + 1 ) ( 4 r + 3 ) 2 + r ( r + 1 ) ( 2 r + 1 ) 2 , where t i denotes the ith triangular number. Therefore, F ( n , r ) = r ( r + 1 ) ( 3 r + 2 ) as desired. □

3.1.2. Gelfand–Tsetlin Equations

Gelfand–Tsetlin equations are Diophantine equations of the form:
g t ( 3 ) = 4 x 1 + 12 x 2 + 8 x 3 = c , g t ( n ) = n 3 i = 1 ( s ( n + i ) t ( n 2 ) ) x ( i + 2 ) + ( t ( 2 n 3 ) t ( n 2 ) ) x n = d , if n 4 ,
where c and d are positive integers and s m ( t m ) denotes the mth square (triangular) number. Note that, if c = 64 then x 1 = 5 , x 2 = 3 , and x 3 = 1 are solutions of g t ( 3 ) , such numbers x i give the number of some standard Gelfand–Tsetlin arrays, for which n = 4 and r = 1 (see Theorem 7). Numbers d, which correspond to solutions of a given equation g t ( r ) are said to be Gelfand–Tsetlin numbers of type ( 4 , r ) . Note that, there is not a Frobenius number associated with the equation g t ( 3 ) .
Corollary 3.
For r > 1 and n = 4 sums S g t ( n 1 , r ) (see identities (29) and (30)) associated with points H n ( H ( n , r ) , ) are Gelfand–Tsetlin numbers of type ( n , r ) .
Proof. 
If d r = ( r + 1 ) 6 then Propositions 7, 5, and 6 allow us to establish identities of type x i = q i , for 1 i 2 n + 1 . Thus, g t ( r ) = d r (see Equation (35)). □
The following table shows Frobenius numbers associated with some Gelfand–Tsetlin equations:
Gelfand–Tsetlin EquationFrobenius Number
gt(4)33
gt(5)56
gt(6)133
gt(7)179
gt(8)181
gt(9)299
gt(10)394
gt(11)535
gt(12)
We let H ( 4 , r , y 0 ) denote the subposet of ( H ( 4 , r ) , ) consisting of hearts with a fixed entry λ ( 3 , 2 ) = y 0 , with the shape x y 0 z , the corresponding equivalence classes have associated a unique number of the form S g t ( n 1 , j ) . If it is assumed that n 1 = 1 for any of these numbers, then the following result holds:
Theorem 8.
Numbers S g t ( n 1 , r ) with n 1 = 1 associated with equivalence classes of points of the subposet H ( 4 , r , y 0 ) define a Brauer configuration algebra Λ Γ g t with length grading induced from the path algebra F Q Γ g t .
Proof. 
If n 1 = 1 for any number S g t ( n 1 , r ) then such an assignation defines the Brauer configuration Γ g t = ( Γ g t 0 , Γ g t 1 , μ , O ) , such that:
Γ g t 0 = { q 1 , q 2 , , q 2 r + 1 } , ( see identities ( 29 ) a n d ( 30 ) ) , Γ g t 1 = { w ( P 1 ) = q 1 ( 1 ) q 2 ( 1 ) q 2 r + 1 ( 1 ) = w ( P j ) , 2 j 2 r + 1 } , μ ( q i ) = 1 , 1 i 2 r + 1 , P i < P i + 1 , 1 i 2 r ( for the construction of successor sequences ) ,
where w ( P i ) denotes the word associated with the polygon P i (see (15)). In this case the Brauer quiver has the form:
Mathematics 09 01937 i013
The admissible ideal is generated via equivalence of special cycles, products of the form α q j i α q j i + 1 with i j , j = 1 2 r + 1 α q s j α q s 2 r + 2 α q s 1 , where j = 1 2 r + 1 α q s j α q s 2 r + 2 is a special cycle and α q s 2 r + 2 is an arrow connecting polygons P 2 r + 1 and P 1 . Since μ ( q i ) v a l ( q i ) = 2 r + 1 , for any q i Γ g t 0 , the result follows as a consequence of Theorem 4. □

3.2. A Relationship between Brauer Configuration Algebras and Gelfand–Tsetlin Equations

For k 5 , let us consider a seed ( Γ k , X k ) , such that X k = ( y 1 , y 2 , , y k 1 ) R 1 k 1 where R 1 = C [ x 1 , x 2 , x 3 ] is the ring of polynomials over C in variables x 1 , x 2 , and x 3 .
Γ k = ( Γ 0 , k , Γ 1 , k , μ k , O k ) is a Brauer configuration such that:
  • Γ 0 , k = { x 1 , x 2 , x 3 } ;
  • Γ 1 , k = { U 1 , U 2 , , U k 1 } ;
  • For j 1 , the word w ( U j ) associated with the polygon U j is defined as follows:
    w ( U j ) = ( x 1 ) ( 2 ) ( x 2 ) ( 1 ) , if j = 1 , ( x 1 ) ( 1 ) ( x 2 ) ( j ) ( x 3 ) t j 1 , if j = 1 , a n d t j 1 = ( j 1 ) j 2 ,
  • The successor sequences S x i at vertices x 1 , x 2 , and x 3 have the following forms:
    S x 1 = U 1 < U 1 < U 2 < U 3 < < U k 2 < U k 1 , S x 2 = U 1 ( 1 ) < U 2 ( 2 ) < U 3 ( 3 ) < < U k 2 ( k 2 ) < U k 1 ( k 1 ) , S x 3 = U 1 ( t 1 ) < U 2 ( t 2 ) < U 3 ( t 3 ) < < U k 2 ( t k 2 ) < U k 1 ( t k 1 ) .
    where, U j ( i ) denotes a sequence of the form U j < U j < < U j i times and t i = i ( i + 1 ) 2 ;
  • For any k 5 , it holds that, μ k ( x 1 ) = μ k ( x 2 ) = μ k ( x 3 ) = 1 ;
  • y j = 2 x 1 + x 2 , if j = 1 , x 1 + j x 2 + t j 1 x 3 , if j > 1 , a n d t j 1 = ( j 1 ) j 2 ,
The following is the Brauer quiver Q Γ 5 defined by the Brauer configuration Γ 5 .
Mathematics 09 01937 i014
For k 5 fixed, the ideal I k of the Brauer configuration algebra Λ Γ k = F Q Γ k / I is generated by the following relations:
  • Special cycles C x i associated with vertices x i , i { 1 , 2 , 3 } are equivalent;
  • If a is the first arrow of a special cycle C x i then C x i a = 0 ;
  • δ x i j δ x j h = 0 , if i j and δ { α , β , γ } ;
  • δ x i j δ x i j + 1 = 0 , for all the possible products of α x 1 j , β x 2 j , and γ x 3 j ;
  • δ x i j l x s h = 0 , for all the possible values of i , j , h and s, l x s h denotes a suitable loop;
  • ( l x s h ) 2 = 0 .
For k 5 , the mutation M ( Γ k , X k ) = ( Γ , X k ) of a seed ( Γ k , X k ) is defined as follows:
  • X k = ( y 1 , y 2 ) R 2 k 1 = C [ x 1 , x 2 ] ;
  • y i = x 1 y i x 1 + x 2 y i x 2 , i { 1 , 2 } ;
  • The Brauer configuration Γ k = ( Γ 0 , k , Γ 1 , k , μ k , O k ) is defined in such a way that:
    (a)
    Γ 0 , k = { x 1 , x 2 } ;
    (b)
    Γ 1 , k = { U 1 , U 2 , , U k 1 } ;
    (c)
    For j 1 , the word w ( U j ) associated with the polygon U j is given by the following identities:
    (d)
    w ( U j ) = ( x 1 ) ( y j x 1 ) ( x 2 ) ( y i x 2 ) , if j 1 ;
    (e)
    The successor sequences at x 1 and x 2 are defined by the following chains:
    S x 1 = U 1 < U 1 < U 2 < U 3 < < U k 2 < U k 1 , S x 2 = U 1 ( 1 ) < U 2 ( 2 ) < U 3 ( 3 ) < < U k 2 ( k 2 ) < U k 1 ( k 1 ) .
    (f)
    For any k 5 , it holds that, μ k ( x 1 ) = μ k ( x 2 ) = 1 .
The following is the Brauer quiver Q Γ 5 defined by the Brauer configuration Γ 5 .
Mathematics 09 01937 i015
The Brauer configuration algebra Λ Γ k = F Q Γ k / I is bounded by the ideal I I , whose relations are obtained by restricting to x 1 and x 2 the relations contained in I.
The following results regards algebras Λ Γ k and their corresponding mutations Λ Γ k for k 5 fixed.
Theorem 9.
For k 5 fixed, it holds that
dim F Λ Γ k = 2 ( k 1 + t k 1 + t t k 1 + t ρ k 1 ) , dim F Λ Γ k = k 2 + k 2 + 2 t t k 1 1 , dim F Z ( Λ Γ k ) = k 2 3 k + 5 , dim F Z ( Λ Γ k ) = t k + 1 1 .
where t h = h ( h + 1 ) 2 and ρ k 1 = k ( k 1 ) ( k + 1 ) 6 .
Proof. 
dim F Λ k = 2 ( k 1 ) + i = 1 3 v a l ( x i ) ( v a l ( x i ) 1 ) . Since v a l ( x 1 ) = k , v a l ( x 2 = t k 1 ) , and v a l ( x 3 ) = j = 1 k 2 t j , the first identity follows.
The second identity holds provided that in Γ k , v a l ( x 1 ) = k , and v a l ( x 2 ) = t k 1 .
The third identity is obtained by taking into account that the number of loops in Q Γ k = t k .
Since dim F Z ( Λ Γ k ) = 1 + k 1 + i = 1 3 # ( l o o p s a s s o c i a t e d w i t h x i ) . Thus, dim F Z ( Λ Γ k ) = k + 1 + t k 2 + t k 3 = k + 1 + ( k 2 ) 2 = k 2 3 k + 5 . We are done. □
If we specialize the message M ( Γ k ) ( M ( Γ k ) ) of the Brauer configuration Γ k ( Γ k ) by taking x 1 = t k , x 2 = 2 k + 1 , and x 3 = 2 then the corresponding specialized message M e ( Γ k ) ( M e ( Γ k ) ) gives rise to a vector v = ( v 0 , v 1 , , v k 1 ) ( v e = ( v 0 , v 1 , , v k 1 ) ), such that:
v i e = t k , if i = 0 , t k + j = 1 i 2 ( j + k ) 1 , if 1 i k 1 ,
v i e = t k , if i = 0 , t k + i ( 2 k + 1 ) , if 1 i k 1 ,
The following theorem establishes a relationship between Gelfand–Tsetlin equations, Frobenius numbers, and specialized messages of Brauer configurations Γ k and Γ k .
Theorem 10.
For k 5 , a ( k + 1 ) -tuple λ = ( λ 0 , λ 2 , , λ k 1 , λ k ) is solution of the Gelfand–Tsetlin equation g t ( k ) (35) if, and only if, λ is a solution of the equation
v 0 e x 1 + v 1 e x 2 + + v k 1 e x k + p k 1 5 x k + 1 = d .
where p s 5 = s ( 3 s 1 ) 2 . Moreover, the Frobenius number F ( v 0 e , v 1 e , , v k 1 e ) satisfies the following identity:
F ( v 0 e , v 1 e , , v k 1 e ) = ( t k 2 k 1 + 1 ) t k + 2 k ( t k 1 ) 1 .
Proof. 
The result follows provided that v h + 1 e = ( k h ) 2 t k 2 , if 1 h k 3 , and t 2 k 3 t k 2 = p k 1 5 . Since ( t k , 2 k + 1 ) = 1 then identity (46) is obtained from Theorem 2 by taking a = t k , d = 2 k + 1 , and s = k 1 . □

4. On Diophantine Equations of Type D ( n 1 , n 2 , K m )

In this section, we give criteria to solve equations of type D ( n 1 , n 2 , K m ) , i.e., Diophantine equations of the form:
m i = 1 λ i = n 1 , m j = 1 k j λ j = n 2
with fixed k 1 , k 2 , , k m , n 1 , and n 2 .
Regarding equations of type (45), we have the following results:
Theorem 11.
If λ 1 , λ 2 , , λ m is solution of D ( n 1 , n 2 , m = { 1 , 2 , , m } ) and k i = i , then ( λ m , λ m 1 , , λ 1 ) is solution of the Diophantine equation D ( n 1 , ( m + 1 ) n 1 n 2 , m ) .
Proof. 
If ( λ 1 , λ 2 , , λ m ) is solution of D ( n 1 , n 2 , m ) then i = 1 m λ i = n 1 and i = 1 m i λ i = n 2 . Thus,
( m + 1 ) n 1 n 2 = ( m + 1 ) m i = 1 λ i m i = 1 i λ i = m i = 1 ( m + 1 i ) λ i = m i = 1 i λ m + 1 i .
Therefore, ( λ m , λ m 1 , , λ 1 ) is solution of the desired equation.
Conversely, if ( λ m , λ m 1 , , λ 1 ) is solution of D ( n 1 , ( m + 1 ) n 1 n 2 , m ) then the result holds provided that ( m + 1 ) n 1 n 2 = n 2 , if n 2 = ( m + 1 ) n 1 n 2 . □
Theorem 12.
An equation of type D ( n 1 , n 2 , m ) with k i = i has at least one solution if, and only if, n 1 + m ( m 1 ) 2 n 2 m n 1 n ( n 1 ) 2 .
Proof. 
If x = ( λ 1 , λ 2 , , λ m ) N m and λ i < λ j for i < j then for
x = ( λ 1 , , λ j , , λ i , , λ m )
it holds that i = 1 m i x i < i = 1 m i x i , where x i ( x i ) denotes the ith coordinate of the vector x i ( x i ), in general i = 1 m x i λ i i = 1 m x i λ i , if λ 1 λ 2 λ m . Therefore, the minimum value of n 2 for which equation D ( n 1 , n 2 , m ) has a solution is attained at x = ( n 1 m + 1 , 1 , 1 , , 1 ) , whereas the maximum value of n 2 satisfying the condition is attained at x = ( 1 , 1 , , 1 , n 1 m + 1 ) . Thus equation D ( n 1 , n 2 , m ) has a solution if the following conditions for n 1 and n 2 hold:
m i = 1 i x i n 2 m i = 1 i x i , n 1 m + m i = 1 i n 2 m 1 i = 1 i + m ( n 1 m ) .
Therefore,
n 1 m + m ( m + 1 ) 2 n 2 m 1 i = 1 i + m ( n 1 m ) .
Additionally,
n 1 + m ( m 1 ) 2 n 2 m n 1 n ( n 1 ) 2 .
Theorem 13.
For a fixed positive integer m 0 , n 2 , and a fixed seed ( Γ , X ) (see (17) and (18)), the Brauer configuration algebra Λ Φ m 0 induced by the Brauer configuration
Φ m 0 = ( Φ 0 m 0 , Φ 1 m 0 , μ , O ) ( s e e ( 20 ) )
has associated a finite non-deterministic automaton whose states are given by solutions of a problem of type D ( n 1 , l 2 2 n 2 , K m i ) with n 1 16 , and
K m i = { occ ( T ( α ) , T ( M i ) ) T ( α ) T ( Φ 0 m 0 ) , T ( M i ) T ( Φ 1 m 0 ) , α Φ 0 m 0 , M i Φ 1 m 0 }
where T ( Φ m 0 ) = ( ( T ( Φ 0 m 0 ) , T ( Φ 1 m 0 ) , T ( μ ) , T ( O ) ) is a suitable transformation between Brauer configurations.
Proof. 
Since the length of the message | M ( Φ m 0 ) | = l 2 2 n then it consists of l 2 2 n 2 lists of four bits. We let A = { α 1 , α 2 , , α l 2 2 n 2 } denote this set of lists. Define a map T : A H e x , such that T ( α i ) = α i H e x , where H e x is a notation for the hexadecimal numbering system H e x = { 0 , 1 , 2 , , 9 , A , B , C , , F } . In this case, T ( α i α i + 1 ) = α i α i + 1 H e x * if α i , α i + 1 A .
The map T defines a new Brauer configuration T ( Φ m 0 ) = ( Img T , T ( Φ 1 m 0 ) , μ , O ) , which we assume reduced without loss of generality. Each polygon T ( M i ) consists of elements of the form α j with α j M i . Actually, if M ( M i ) = α 1 α 2 α r i is the message of M i then α 1 α 2 α r i A * is the message of T ( M i ) . Additionally, if M i < M i + 1 in Φ m 0 then T ( M i ) < T ( M i + 1 ) in T ( Φ m 0 ) ; and μ ( α i ) = 1 for any α i Img T . Thus, the message M ( T ( Φ m 0 ) ) A * is a l 2 2 n 2 word whose letters α j can be grouped according to its valency. Thus, M ( T ( Φ m 0 ) ) has the form:
M ( T ( Φ m 0 ) ) = A i 1 A i 2 A i m ,
where A i s is a multiset with | A i s | = L i s and A i x A i y = . Note that A i s consists of all letters α i , such that v a l ( α i ) = v i s , i.e, the message M ( A i s ) associated with A i s can be written as
M ( A i s ) = ( α i s 1 α i s 2 α L i s ) v i s .
Therefore,
m h = 1 L i h = n 1 16 , m g = 1 L i g v i g = l 2 2 n 2 .
Then terms L i h give a solution of a Diophantine equation of type
D ( n 1 , l 2 2 n 2 , K m = { v i 1 , , v i m } ) .
Since any Brauer configuration algebra defines a regular language, whose associated automaton uses arrows of the Brauer quiver as transitions between states given by polygons, which, in this case, are obtained by mutation. Then the probability P r ( M ) that a given message M or Diophantine equation occurs after applying a mutation to a fixed seed is such that 0 < P r ( M ) < 1 (see Remark 3), we conclude that the associated automaton is non-deterministic. □
Example 6.
Suppose that a seed ( Γ , X ) is defined by the polynomial p ( x ) = x 8 + x 4 + x 3 + 1 , and that we use set H e x = { 0 = 0000 , 1 = 0001 , 2 = 0010 , , A = 1010 , , F = 1111 } to denote polynomials. Then X = ( x 1 , x 2 , x 3 , x 4 ) can be denoted as follows:
x 1 = ( A F , C 0 , 13 , 10 ) , x 2 = ( D 0 , B 3 , 8 A , F 2 ) , x 3 = ( C E , C 4 , 62 , 3 D ) , x 4 = ( A 2 , 74 , 79 , 7 D ) .
Γ = ( Γ 0 , Γ 1 , μ , O ) , Γ 0 = { 0 , 1 } , Γ 1 = { w ( 0 ) = { 10101111 00010000 } , w ( 1 ) = { 11010000 11110010 } , } , μ ( 0 ) = μ ( 1 ) = 1 , w ( 0 ) < w ( 1 ) < w ( 2 ) < w ( 3 ) ,
Then
M ( Γ ) = ( A C 03 D 27 ) ( 3 ) ( F 14 ) ( 2 ) ( B 8 E 69 ) ( 1 )
which builds a solution of the Diophantine equation D ( 15 , 32 , { 3 , 2 , 1 } ) with the form:
λ 1 + λ 2 + λ 3 = 15 , 3 λ 1 + 2 λ 2 + λ 3 = 32 .
For a given a polynomial p ( x ) = w ( i ) = a 0 + a 1 x + a 2 x 2 + a 3 x 3 + a 4 x 4 + a 5 x 5 + a 6 x 6 + a 7 x 7 F the map τ ( p ( x ) ) = τ ( x i ) associated with a mutation of the seed ( Γ , X ) is defined in such a way that
τ ( x i ) = 7 s = 0 b s x s + v i / 4 , 0 , b j = a j + a j + 4 + a j + 5 + a j + 6 + a j + 7 + c j , ( c 0 , c 1 , c 2 , c 3 , c 4 , c 5 , c 6 , c 7 ) = ( 1 , 1 , 0 , 0 , 0 , 1 , 1 , 0 ) , H ( x 1 , x 2 , x 3 , x 4 ) = ( τ ( x 2 ) , τ ( x 3 ) , τ ( x 4 ) , τ ( x 1 ) ) , m 0 = 10 .
The following is the list of vectors v j , 0 , 1 j 10 .
v 1 , 0 01000000 v 2 , 0 02000000 v 3 , 0 04000000 v 4 , 0 08000000 v 5 , 0 10000000 v 6 , 0 20000000 v 7 , 0 41000000 v 8 , 0 81000000 v 9 , 0 1 B 000000 v 10 , 0 36000000
For 1 j 10 and l = 4 , an element X = ( w ( 4 j ) , w ( 1 + 4 j ) , w ( 2 + 4 j ) , w ( 3 + 4 j ) ) of a mutation ( Γ , X ) is obtained from a seed ( Γ , X ) with
X = ( w ( 4 ( j 1 ) ) , w ( 1 + 4 ( j 1 ) ) , w ( 2 + 4 ( j 1 ) ) , w ( 3 + 4 ( j 1 ) ) )
by applying the following identities taking into account that for any t, w ( t ) is a 4 × 4 matrix:
( w ( h + 4 j ) ) r , j = ( w ( h 1 + 4 j ) ) r , j + ( w ( h + 4 ( j 1 ) ) ) r , j , if h 0 mod 4 , ( w ( h + 4 j ) ) r , j = ( w ( h + 4 ( j 1 ) ) ) r , j + ( H ( w ( h 1 + 4 j ) ) ) r , j , if h 0 mod 4 .
For m 0 = 10 , any mutation of this seed gives rise to a solution of a Diophantine equation of type ( n 1 16 , 32 , K m ) with K m being a set of the form:
K m = { 1 , 2 , 3 } , K m = { 1 , 2 , 3 , 4 } , K m = { 1 , 2 , 3 , 4 , 5 } , K m = { 1 , 2 , 3 , 4 , 7 } , K m = { 1 , 2 , 3 , 4 , 7 } , K m = { 1 , 2 , 3 , 4 , 8 } .
A cryptographic application
In this section, we give some properties of the AES key schedule based on the fact that such schedule arises from Brauer configurations, as described in (51) and its mutations are given by identities (52)–(54).
AES is a symmetric block cypher also considered as a substitution-permutation network, which was adopted in 2001 by the US government as the current standard cryptographic [27]. It is considered secure against different types of attacks. It requires keys of 128 bits (for 10 rounds), 192 bits (for 12 rounds), and 256 bits (for 14 rounds). Encryption and decryption algorithms are carried out via polynomials defined over suitable Galois fields. Many routers provide protocols WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options to ensure Wi-Fi security. The new protocol WPA3 uses keys of 128 bits (CCMP-128), 192 bits (WPA3-Enterprise mode) to secure wireless computer networks.
In the cryptosystem AES, a plaintext, also called a state, is a sequence of 16 bytes, the encryption process also generates a 16-bytes sequence by using keys of 128, 192, or 256 bits. Such length depends on the number of rounds developed in the encryption process, 10, 12, or 14, respectively.
Each round in an encryption process requires 4 different transformations:
  • SubBytes;
  • ShiftRows;
  • MixColumns;
  • AddRoundKey.
For the last round the function MixColumns is not executed.
The next table gives all the possible outputs of the transformation SubBytes, whose operations are made modulo the polynomial p ( x ) = x 8 + x 4 + x 3 + 1 as described in identities (52) and (53) [27]:
0123456789ABCDEF
0637C777BF26B6FC53001672BFED7AB76
1CA82C97DFA5947F0ADD4A2AF9CA472C0
2B7FD9326363FF7CC34A5E5F171D83115
304C723C31896059A071280E2EB27B275
409832C1A1B6E5AA0523BD6B329E32F84
553D100ED20FCB15B6ACBBE394A4C58CF
6D0EFAAFB434D338545F9027F503C9FA8
751A3408F929D38F5BCB6DA2110FFF3D2
8CD0C13EC5F974417C4A77E3D645D1973
960814FDC222A908846EEB814DE5E0BDB
AE0323A0A4906245CC2D3AC629195E479
BE7C8376D8DD54EA96C56F4EA657AAE08
CBA78252E1CA6B4C6E8DD741F4BBD8B8A
D703EB5664803F60E613557B986C11D9E
EE1F8981169D98E949B1E87E9CE5528DF
F8CA1890DBFE6426841992D0FB054BB16
The key schedule is the process for which all the keys to be used in the encryption process are generated. Such keys are called subkeys. For keys of 128 bits (or 16 bytes) of length, the process generates 11 subkeys, the initial key, the nine main rounds and the final round.
The expanded key can be seen as an array of 32-bit words numbered from 0 to 43 (0 for the initial key, which is the message of a Brauer configuration Γ associated with an initial seed ( Γ , X ) . Γ and X are described as in Example 6. Identities (51)–(54) are used to generate the schedule of the initial seed-key in terms of mutations of Brauer configurations), words that are a multiple 4 ( w 4 , w 8 , , w 40 ) are calculated as follows:
  • Applying the RotWord and SuBytes transformation to the previous word w i 1 , (SubBytes (RotWord ( x 1 , x 2 , x 3 , x 4 ) ) = SuBytes ( x 2 , x 3 , x 4 , x 1 ) ) . In this case, the transformation RotWord is defined in such a way that RotWord ( x 1 , x 2 , x 3 , x 4 ) = ( x 2 , x 3 , x 4 , x 1 ) . Note that, SubBytes ( Rotword ( x 1 , x 2 , x 3 , x 4 ) ) is given by the transformation H ( x 1 , x 2 , x 3 , x 4 ) defined by the identities (52);
  • Adding (XOR) this result to the word 4 positions earlier w i 4 plus a round constant called RCON. Such constants are given by identities (53);
  • The remaining 32-bit words w i (i.e., those for which the index i is not a multiple of 4) are calculated by adding (XOR) the previous word w i 1 , with the word four positions earlier. These operations correspond to the mutations of the Brauer configuration defined by formulas (52)–(54).
We let K n , a denote the nth subkey of an AES schedule, where the original key K = K 0 , a has 128 bits. Additionally, S n ( K 0 , a ) = K n + 1 , a is the result of the AES schedule after the nth round.
Corollary 4.
There exists an integer N for which S N 1 ( K 0 , a ) = K M , a , for some 0 M < N .
Proof. 
For l = 4 , p ( x ) = x 8 + x 4 + x 3 + 1 and vectors RCON given in (53), it holds that the set of polygons Φ 1 m 0 (see (20)) of Φ m 0 is obtained by applying the mutation rules (54) to the seed ( Γ , X = ( x 1 , x 2 , x 3 , x 4 ) ) defined by K 0 , a , which is the message M ( Γ ) described as in identities (51). Thus, the message M ( Φ m 0 ) is the expanded key with subkeys given by messages of Brauer clusters obtained by mutation. That is, for a fixed j, it holds that K j , a = M ( M j ( ( Γ , X ) ) ) . Since F = Z 2 [ x ] / p ( x ) is finite the result holds as a direct consequence of Theorem 5. □

5. Conclusions

Mutations of Brauer configurations are a useful tool for solving Diophantine problems. They allow solving variations of Gelfand–Tsetlin equations and problems of type D ( n 1 , n 2 , K m ) via suitable specializations. The AES key schedule is also a specialization of mutations of some Brauer configurations. Therefore, some properties of these types of procedures can be described in terms of the structure of the associated Brauer configuration algebra.
In what follows, we give a brief description of some of the main results of this paper.
  • Theorem 4 establishes that the Brauer configuration algebra associated with a mutation process is connected and reduced;
  • Theorem 5 gives properties of the cycles of a maximal length of Brauer quivers obtained by mutation;
  • Theorem 7 gives a formula for the number of Gelfand–Tsetlin arrays with a weight vector of the form w = ( n , n r , n 2 r , , n r ( n 1 ) ) ;
  • Proposition 5 establishes that equivalent triangular arrays of numbers called hearts have associated the same number S g t ( n 1 , r ) of suitable Gelfand–Tsetlin arrays;
  • Proposition 6 establishes that numbers given by identities (29) and (30) (which are parts of partitions of numbers S g t ( n 1 , r ) ) constitute a marked poset. Corollary 2 gives the number of facets in this poset, whereas in Corollary 3, it is stated that if in Equation (35) it holds that d = S g t ( n 1 , r ) then (35) has a solution based on the number of some Gelfand–Tsetlin patterns;
  • Theorems 9 and 10 give properties of some Brauer configuration algebras and their mutations dealing with Gelfand–Tsetlin equations and some suitable variations;
  • Theorem 13 describes the way that mutations of Brauer configuration algebras can be used to solve Diophantine problems of type D ( n 1 , n 2 , K m ) ;
  • As a consequence of Theorem 5, Corollary 4 describes some properties of the AES key schedule in terms of mutations of Brauer configurations.

Author Contributions

Investigation, A.M.C., I.D.M.G. and J.D.C.V.; Writing–review–editing, A.M.C. and I.D.M.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
D ( n 1 , n 2 , K m ) Diophantine problem
dim F Λ Γ dimension of a Brauer configuration algebra
dim F Z ( Λ Γ ) dimension of the center of a Brauer configuration algebra
F Q path algebra
F ( n 1 , n 2 , , n k ) Frobenius number
gl n C general linear Lie algebra
g t ( n ) Gefand–Tsetlin equation
H ( n , r ) hearts poset
Γ 0 vertices in a Brauer configuration Γ
( Γ , X ) seed of a mutation
M ( Γ ) message of a Brauer configuration
occ ( α , V ) number of occurrences of a vertex α in a polygon V
Q A marked poset
rad Λ radical of an algebra Λ
S g t ( n 1 , r ) Gelfand–Tsetlin numbers
T Γ truncated vertices
V i ( α ) ordered sequence of polygons
v a l ( α ) valency of a vertex α
w ( U ) word associated with a polygon of a Brauer configuration
AESAdvanced encryption standard
CMPChicken McNugget problem
CCMPCounter mode with CBC message authentication code protocol
DFADeterministic finite automaton
GTGelfand–Tsetlin
NFANon-deterministic finite automaton
PSKPre-shared key
TKIPTemporal key integrity protocol
WPAWi-Fi protected access

References

  1. Chapman, S.T.; O’Neill, C. Factoring in the Chicken McNugget monoid. Math. Mag. 2018, 91, 323–336. [Google Scholar] [CrossRef] [Green Version]
  2. De Loera, J. The many aspects of counting lattice points in polytopes. Math. Semesterber. 2005, 52, 175–195. [Google Scholar] [CrossRef]
  3. Sylvester, J.J. On the partition of numbers. Quart. J. Pure Appl. Math. 1857, 1, 141–152. [Google Scholar]
  4. Ramírez-Alfonsín, J.L. The Diophantine Frobenius Problem; Oxford Univ Press: New York, NY, USA, 2005; Volume 30. [Google Scholar]
  5. Euler, L. Introductio in Analysin Infinitorium; Krazer, A., Rudio, F., Eds.; Springer: Berlin/Heidelberg, Germany, 1748. [Google Scholar]
  6. Euler, L. De partitione numerorum in partes tam numero quam specie dates. Novi Comentarii Academiae Scientiarum Imperialis Petropolitanae 1770, 14, 168–187. [Google Scholar]
  7. Futorny, V.; Grantcharov, D.; Ramirez, L.E. Irreducible Generic Gelfand-Tsetlin Modules of gl(n). Symmetry Integr. Geom. Methods Appl. SIGMA 2015, 11, 13. [Google Scholar] [CrossRef] [Green Version]
  8. Ramirez, L.E. Combinatorics of irreducible Gelfand-Tsetlin sl(3)-modules. Algebra Discret. Math. 2012, 14, 276–296. [Google Scholar]
  9. Rosales, J.C.; García-Sánchez, P.A. Numerical Semigroups; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009; Volume 20. [Google Scholar]
  10. Roberts, J.B. Note on linear forms. Proc. Am. Soc. 1956, 7, 465–469. [Google Scholar] [CrossRef]
  11. Ramírez-Alfonsín, J.L. Complexity of the Frobenius problem. Combinatorica 1996, 16, 143–147. [Google Scholar] [CrossRef]
  12. Assem, I.; Simson, D.; Skowronski, A. Elements of the Representation Theory of Associative Algebras: Techniques of Representation Theory; Cambridge University Press: Cambridge, UK, 2006; Volume 1. [Google Scholar]
  13. Struble, C. Analysis and Implementation of Algorithms for Noncommutative Algebra. Ph.D. Thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA, 2000. [Google Scholar]
  14. Green, E.L.; Schroll, S. Brauer configuration algebras: A generalization of Brauer graph algebras. Bull. Sci. Math. 2017, 141, 539–572. [Google Scholar] [CrossRef] [Green Version]
  15. Cañadas, A.M.; Espinosa, P.F.F. Homological ideals as Integer specializations of some Brauer configuration algebras. arXiv 2021, arXiv:2104.00050v1. [Google Scholar]
  16. Haugland, T. Decomposition of Modules over Finite-Dimensional Algebras. Master’s Thesis, NTNU, Trondheim, Norway, 2018. [Google Scholar]
  17. GAP. Mathematical Software. Available online: https://www.gap-system.org/Manuals/pkg/qpa/doc/chap4.html (accessed on 1 June 2021).
  18. SAGE. Mathematical Software. Available online: https://doc.sagemath.org/html/en/reference/quivers/sage/quivers/algebra.html (accessed on 1 June 2021).
  19. Sierra, A. The dimension of the center of a Brauer configuration algebra. J. Algebra 2018, 510, 289–318. [Google Scholar] [CrossRef]
  20. Espinosa, P.F.F. Categorification of Integer Sequences and Its Applications. Ph.D. Thesis, Universidad Nacional de Colombia, Bogotá, Colombia, 2020. [Google Scholar]
  21. Rutten, J.; Ballester-Bolinches, A.; Llópez, E.C. Varieties and covarieties of languages. ENTCS 2013, 298, 7–28. [Google Scholar]
  22. Rees, S. The Automata that define Representations of monomial algebras. Algebr. Represent. Theory 2008, 11, 207–214. [Google Scholar] [CrossRef]
  23. Fischer, I. Refined enumerations of alternating sign matrices: Monotone (d,m)-trapezoids with prescribed top and bottom row. J. Algebr. Comb. 2011, 33, 239–257. [Google Scholar] [CrossRef] [Green Version]
  24. Fisher, I. Sequences of labeled trees related to Gelfand-Tsetlin patterns. Adv. Appl. Math. 2012, 49, 165–195. [Google Scholar] [CrossRef] [Green Version]
  25. Zeilberger, D. Proof of the refined alternating sign matrix conjecture. N. Y. J. Math. 1996, 2, 59–68. [Google Scholar]
  26. Fourier, G. Marked poset polytopes: Minkowski sums, indecomposables, and unimodular equivalence. J. Pure Appl. Algebra 2016, 220, 606–620. [Google Scholar] [CrossRef] [Green Version]
  27. Stinson, D.R.; Paterson, M.B. Cryptography: Theory and Practice, 4th ed.; Chapman and Hall/CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cañadas, A.M.; Gaviria, I.D.M.; Vega, J.D.C. Relationships between the Chicken McNugget Problem, Mutations of Brauer Configuration Algebras and the Advanced Encryption Standard. Mathematics 2021, 9, 1937. https://doi.org/10.3390/math9161937

AMA Style

Cañadas AM, Gaviria IDM, Vega JDC. Relationships between the Chicken McNugget Problem, Mutations of Brauer Configuration Algebras and the Advanced Encryption Standard. Mathematics. 2021; 9(16):1937. https://doi.org/10.3390/math9161937

Chicago/Turabian Style

Cañadas, Agustín Moreno, Isaías David Marín Gaviria, and Juan David Camacho Vega. 2021. "Relationships between the Chicken McNugget Problem, Mutations of Brauer Configuration Algebras and the Advanced Encryption Standard" Mathematics 9, no. 16: 1937. https://doi.org/10.3390/math9161937

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop