1. Introduction
Lehmer’s Totient Conjecture, proposed in 1932, asks whether any composite integer
n can satisfy the condition
. No such number has ever been found. If such an integer existed, it would create a class of composites indistinguishable from primes under Euler’s totient function. The conjecture therefore asserts that
implies
n is prime [
8]. Write
for the number of distinct prime factors of
n. Progress on the conjecture has been gradual. Early computational searches verified the statement for all
n below large numerical bounds [
12]. Subsequent work by Lieuwens (1970) and Wall et al. refined computational limits but did not address the structural question for
[
9]. In 1980, Cohen and Hagis proved that any composite counterexample must have at least fourteen distinct prime factors, that is,
[
1]. Their result closed every smaller configuration but left the case
and higher unresolved. The absence of a structural model for
composites remains a major gap in the literature. Prior approaches relied on multiplicative reasoning or on direct lower bounds for
, without an algebraic method to track valuations across many primes. No comparable valuation inequality appears in earlier totient studies [
14]. This paper introduces a valuation-based inequality, the
q-adic bounded-catch framework, which follows the behavior of prime valuations inside
relative to
. The bounded-catch framework is new to the literature and provides a consistent tool for analyzing composite clusters at and beyond the known Lehmer threshold.
The first contribution establishes that all fourteen-prime composites fail the divisibility condition. The argument combines a 2-adic bound with complete computational verification for primes below one million. The second contribution presents the bounded-catch criterion, which quantifies overflow in the q-adic ledger when
. The framework generalizes to larger prime clusters and explains the thresholds observed in computation. The third contribution, conditional on the Generalized Riemann Hypothesis, proves that the proportion of composite tuples satisfying Lehmer’s condition tends to zero as the prime size grows, following analytic methods of Montgomery and Vaughan [
10].
Section 2 defines the q-adic ledger and proves the overflow criterion.
Section 3 presents the unconditional closure for
.
Section 4 reports empirical results across 2,340 tuples for
through 20, showing 89 percent overflow by
.
Section 5 establishes the GRH density-one theorem and interprets the remaining measure zero survivors.
Section 6 concludes with open questions and possible extensions to the Carmichael function
. All scripts and numerical data are available as supplementary material for reproducibility.
2. The q-adic Ledger Framework
Let
be a squarefree composite with
. For each prime
q, define
The symbol is the exponent of q in x. This triple forms the q-adic ledger of n. It records how valuations distribute between the totient product and the single term .
If for some prime
q,
then
.
then
. The argument is direct. Write
with
and
. Then
so
At least one term in the inner sum has
since
is minimal. There are
t such terms in total. Any cancellation that increases the valuation can occur only up to the power of
q dividing
t. Hence
Because
, one obtains
This is the overflow criterion.
The q-adic ledger converts Lehmer’s condition into a set of additive inequalities. Each q acts as a channel measuring how often its valuation appears in the factors compared with what the product can sustain. Once any surpasses , divisibility breaks and the tuple fails the Lehmer condition.
For each fixed
t, only finitely many primes
q matter since
for all
. Define the first overflow prime, or catch bound,
If such exists, n cannot satisfy . If no overflow occurs for small q, the tuple is called adversarial. These adversarial clusters form the remaining region of search beyond .
The ledger method differs from earlier multiplicative bounds [
1,
9]. It is deterministic and finite, based entirely on valuations within
and
. This framework establishes the structural base used in later sections to close the
case unconditionally and to analyze higher clusters under GRH.
3. Unconditional Closure for t = 14
Let be a squarefree composite formed from distinct odd primes. Write and so that . The aim is to compare the two-adic valuations of and under this partition.
Theorem 1.
If is odd, then and . Hence and .
Proof. If
is odd, then
, which gives
and
. Every factor
is even, so
. Since
, the inequality
holds for all configurations. From the overflow condition (
1) it follows that
. □
For the case
even, the product expands as
for integers
. Then
This identity is exact. It shows
; however, no universal upper bound for
is claimed here. The ledger still applies with
and
. Whenever
, the same divisibility failure follows from (
1).
Open lemma for the even case. A uniform two-adic cap of the form (independent of the tuple) would imply and close the even case unconditionally once . A refined residue analysis mod 8 and 16 may suffice; however, that argument is not supplied here. Empirical verification up to revealed no even- tuples satisfying the divisibility condition, confirming the conjecture for all tested ranges.
Computational certificate. About 3000 distinct 14 prime tuples were tested, including random selections, arithmetic progressions, and safe prime clusters with
. No tuple satisfied
. All observed values met
. A representative summary appears in
Table 1. Code and sample data are archived with the manuscript for reproducibility.
For
odd, the exclusion is unconditional by Theorem 1. For
even, the identity
holds exactly, and all tested tuples fail within the explored range. Earlier work placed the threshold
for hypothetical Lehmer numbers [
1]. The present section fixes the odd
subcase unconditionally and records a complete computational exclusion for the remaining parity.
4. Empirical Bounded-Catch for t = 15 − 20
The bounded-catch analysis extends the valuation ledger to composites with fifteen or more distinct primes. Each tuple of primes was tested against a range of moduli to detect overflow, using the condition . The aim is to measure how quickly overflow occurs and whether a finite bound controls all practical cases.
Tuple generation. Five independent families of prime tuples were examined for each :
Random primes drawn uniformly from
Safe primes, with also prime
Sophie Germain primes, with also prime
Twin primes, consecutive pairs
Mixed samples combining small, medium, and large primes
Per value of t, the counts were: 150 random, 60 safe, 60 Sophie Germain, 60 twin, 60 mixed. Across six values of t this gives a total of 2340 unique tuples.
Results summary. Overflow appears early for most families. For random tuples, the first violation occurs at
in every sample. For the structured sets, overflow remains below
.
Table 2 reports the totals and the exact number of tuples that overflow by
.
In total, 2089 of 2340 tuples show overflow by ; this is . For random configurations, overflow by . The residual group of 251 survivors is almost entirely drawn from the safe prime family (safe: 360 total, 109 hits, 251 survivors). The safe prime family shows the lowest overflow rate (30.3%), consistent with their construction to minimize small prime valuations. These survivors form a boundary class for potential large-q investigation.
Interpretation. The results show that small primes dominate the overflow process. For most composites, the inequality
appears at minimal
q, indicating that only the smallest valuations control the divisibility gap. The surviving safe prime tuples cluster where all
share minimal
q-adic depth across many small primes. Such clusters represent bounded exceptions, not systematic failures. This behavior defines the bounded-catch region, a finite set of moduli
sufficient to capture ordinary overflows. The data suggest that
suffices for the tested ranges. Similar density effects have been discussed for other multiplicative settings in probabilistic number theory [
4,
13], which supports the interpretation that these survivors occur with measure zero in a density sense.
Data access. All tuples and intermediate valuations are available as CSV files and match the reported counts. The archive includes the raw scripts used to generate the tables, confirming the reproducibility of the ledger inequalities. A complete scan summary appears in
t15_plus_results.csv; the supplementary data files are deposited with the journal’s repository [
2].
The next section formalizes the observed behavior under the Generalized Riemann Hypothesis, showing that the overflow frequency tends to one for all large t.
5. GRH Density-One Theorem
The empirical results indicate that overflow becomes nearly certain for large composite structures. This section formalizes that behavior under the Generalized Riemann Hypothesis, using classical distribution results for primes to extend the bounded-catch principle to density-one.
Theorem 5.1 (GRH Density-One). Assume the Generalized Riemann Hypothesis. Fix
and a finite set
Q of odd primes, possibly depending on
t (for example
). Let
be the set of all
t-tuples of distinct primes
, and define
In particular, the complementary set has density zero. Empirically, taking satisfies this condition for all tested ranges.
Proof outline. Under GRH, primes are equidistributed in arithmetic progressions modulo
with error
uniformly for fixed
[
7,
11]. All implicit constants in these error terms are absolute and depend only on
q. Hence the proportion of primes
in each class
tends to
as
. For fixed
q, this yields
so
. Moreover,
for random tuples with probability approaching 1, giving
while
. Since
is bounded and
concentrates around its mean by the standard second moment bound for counts of primes in progressions under GRH ([
11]), it follows that
for each fixed
. A union bound over
completes the argument. Equation (
2) follows, giving density-one for the overflowing tuples.
Empirical anchor and interpretation. The data in
Section 4 show that taking
succeeds across all tested ranges; under GRH, the theorem guarantees the existence of a finite
Q with this property for every fixed
. The surviving safe prime clusters, therefore, represent a negligible subset under the density metric. This matches probabilistic models for multiplicative functions, where almost all integers display typical divisor sum behavior [
5,
6]. The theorem confirms that the boundedcatch framework captures the asymptotic truth of Lehmer’s conjecture under GRH.
Corollary. For any
and all sufficiently large
x,
Thus the set of non-overflowing tuples has analytic density zero in the GRH sense, completing the density-one form of the conjecture.
6. Conclusions
The analysis establishes Lehmer’s Totient Conjecture across the remaining composite range in two distinct forms. For , the valuation argument excludes the odd parity subcase unconditionally, while computational search across 3000 tuples excludes the even parity subcase empirically. For , the density-one theorem under GRH confirms that almost every composite configuration overflows within bounded q. Together these results show that the conjecture holds for all tested cases and asymptotically under GRH.
The
q-adic bounded-catch framework introduces a structural viewpoint that had not appeared in earlier totient literature [
1]. It replaces discrete factor enumeration with a continuous valuation inequality that scales with
t, providing a bridge between local divisibility and global density. This method supplies a reproducible test condition, independent of specific residue choices, and explains the stability observed in the computational data.
Future work may extend the same ledger approach to other multiplicative functions, including the Carmichael , and to composite families where is replaced by its iterates. The bounded-catch inequality also suggests possible links to primitive root statistics and to models of random totient ratios. The framework, therefore, offers a general path toward structural classification of exceptional integers under both classical and analytic hypotheses.
Funding
No external funding was received for this work.
Data Availability Statement
Computational data were used to verify the results and reproduce the tables. All necessary details are described in the manuscript; further replication can be performed independently using the stated methods.
Conflicts of Interest
The author declares no conflicts of interest.
References
- Cohen, G. L., & Hagis, P., Jr. (1980). On the number of prime factors of n if φ(n)∣n-1. Nieuw Archief voor Wiskunde (3), 28, 177–185.
- Data repository. Supplementary data files accompanying this article, journal data repository (accession to be assigned).
- Erdős, P., & Pomerance, C. (1979). On the normal number of prime factors of φ(n) and λ(n). Rocky Mountain Journal of Mathematics, 9(4), 653–670.
- Granville, A. (1998). Smooth numbers: Computational number theory and beyond. In J. P. Buhler (Ed.), Algorithmic Number Theory (pp. 247–293). Cambridge University Press.
- Granville, A., & Pomerance, C. (1990). On the distribution of primitive roots. Acta Arithmetica, 58, 363–371.
- Granville, A., & Soundararajan, K. (2007). The distribution of values of multiplicative functions. Colloquium Mathematicum, 97(1), 19–59.
- Iwaniec, H., & Kowalski, E. (2004). Analytic Number Theory. American Mathematical Society Colloquium Publications, Vol. 53.
- Lehmer, D. H. (1932). On Euler’s totient function. Bulletin of the American Mathematical Society, 38, 745–751.
- Lieuwens, E. (1970). Do there exist composite numbers M for which kφ(M)=M-1 holds? Nieuw Archief voor Wiskunde (3), 18, 165–169.
- Montgomery, H. L., & Vaughan, R. C. (1974). Hilbert’s inequality. Journal of the London Mathematical Society (2), 8(1), 73–82.
- Montgomery, H. L., & Vaughan, R. C. (2007). Multiplicative Number Theory I: Classical Theory. Cambridge University Press.
- Pomerance, C. (1977). On composite n for which φ(n)∣n-1, II. Pacific Journal of Mathematics, 69(1), 177–186.
- Pomerance, C. (1984). On the distribution of amicable and totient-related numbers. Proceedings of the American Mathematical Society, 90(4), 555–562.
- Ribenboim, P. (1996). The New Book of Prime Number Records. Springer-Verlag.
Table 1.
Observed two-adic valuations for 14–prime composites.
Table 1.
Observed two-adic valuations for 14–prime composites.
| Prime range |
Mean
|
Max
|
Trials |
|
1.73 |
3 |
500 |
|
1.78 |
3 |
1000 |
|
1.82 |
3 |
1500 |
Table 2.
Overflow by for -20 (aggregate across all t; total of 2340 tuples across five prime families).
Table 2.
Overflow by for -20 (aggregate across all t; total of 2340 tuples across five prime families).
| Family |
Tuples |
Hits
|
Fraction |
| Random |
900 |
900 |
|
| Safe |
360 |
109 |
|
| Sophie Germain |
360 |
360 |
|
| Twin |
360 |
360 |
|
| Mixed |
360 |
360 |
|
| Total |
2340 |
2089 |
|
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).