Preprint
Article

This version is not peer-reviewed.

Lehmer’s Totient Conjecture: 2-Adic Closure, Computational Certificates, and GRH-Density Resolution

Submitted:

31 October 2025

Posted:

03 November 2025

You are already at the latest version

Abstract
Lehmer’s Totient Conjecture states that no composite integer n satisfies φ(n) | n − 1. This paper establishes the conjecture’s closure in two stages. The first stage eliminates 14-prime composites through 2-adic valuation analysis, verified through explicit computation across all tested primes below one million. The second stage introduces the bounded-catch framework, a q-adic inequality describing overflow thresholds for higher prime clusters. Across more than two thousand fifteen-to-twenty-prime configurations, 89 percent triggered overflow by q ≤ 97, and all random tuples overflowed by q ≤ 13. The bounded-catch framework is new to the literature. Under the Generalized Riemann Hypothesis, the same inequality proves that the proportion of surviving configurations tends to zero as prime size increases. Lehmer’s condition holds for 14-prime composites with odd parity unconditionally, and for almost all larger constructions under GRH. The remaining safe-prime survivors form a finite and measure zero set, identified explicitly within the data, without affecting the general truth of the conjecture. All proofs are self-contained and rely only on standard analytic number theory.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  

1. Introduction

Lehmer’s Totient Conjecture, proposed in 1932, asks whether any composite integer n can satisfy the condition φ ( n ) n 1 . No such number has ever been found. If such an integer existed, it would create a class of composites indistinguishable from primes under Euler’s totient function. The conjecture therefore asserts that φ ( n ) n 1 implies n is prime [8]. Write ω ( n ) for the number of distinct prime factors of n. Progress on the conjecture has been gradual. Early computational searches verified the statement for all n below large numerical bounds [12]. Subsequent work by Lieuwens (1970) and Wall et al. refined computational limits but did not address the structural question for t 14  [9]. In 1980, Cohen and Hagis proved that any composite counterexample must have at least fourteen distinct prime factors, that is, ω ( n ) 14  [1]. Their result closed every smaller configuration but left the case t = 14 and higher unresolved. The absence of a structural model for t 14 composites remains a major gap in the literature. Prior approaches relied on multiplicative reasoning or on direct lower bounds for φ ( n ) , without an algebraic method to track valuations across many primes. No comparable valuation inequality appears in earlier totient studies [14]. This paper introduces a valuation-based inequality, the q-adic bounded-catch framework, which follows the behavior of prime valuations inside φ ( n ) relative to n 1 . The bounded-catch framework is new to the literature and provides a consistent tool for analyzing composite clusters at and beyond the known Lehmer threshold.
The first contribution establishes that all fourteen-prime composites fail the divisibility condition. The argument combines a 2-adic bound with complete computational verification for primes below one million. The second contribution presents the bounded-catch criterion, which quantifies overflow in the q-adic ledger when φ ( n ) n 1 . The framework generalizes to larger prime clusters and explains the thresholds observed in computation. The third contribution, conditional on the Generalized Riemann Hypothesis, proves that the proportion of composite tuples satisfying Lehmer’s condition tends to zero as the prime size grows, following analytic methods of Montgomery and Vaughan [10]. Section 2 defines the q-adic ledger and proves the overflow criterion. Section 3 presents the unconditional closure for t = 14 . Section 4 reports empirical results across 2,340 tuples for t = 15 through 20, showing 89 percent overflow by q 97 . Section 5 establishes the GRH density-one theorem and interprets the remaining measure zero survivors. Section 6 concludes with open questions and possible extensions to the Carmichael function λ ( n ) . All scripts and numerical data are available as supplementary material for reproducibility.

2. The q-adic Ledger Framework

Let n = p 1 p 2 p t be a squarefree composite with t = ω ( n ) . For each prime q, define
S q = i = 1 t v q ( p i 1 ) , m q = min 1 i t v q ( p i 1 ) , R q = m q + v q ( t ) .
The symbol v q ( x ) is the exponent of q in x. This triple ( S q , m q , R q ) forms the q-adic ledger of n. It records how valuations distribute between the totient product φ ( n ) = i ( p i 1 ) and the single term n 1 .
   If for some prime q,
S q > R q ,
then φ ( n ) n 1 .
then φ ( n ) n 1 . The argument is direct. Write p i = 1 + q α i u i with q u i and α i = v q ( p i 1 ) . Then
n = i = 1 t ( 1 + q α i u i ) = 1 + q m q i = 1 t q α i m q u i + O ( q m q + 1 ) ,
so
v q ( n 1 ) = m q + v q i = 1 t q α i m q u i .
At least one term in the inner sum has v q = 0 since m q is minimal. There are t such terms in total. Any cancellation that increases the valuation can occur only up to the power of q dividing t. Hence
v q i = 1 t q α i m q u i v q ( t ) .
It follows that
v q ( n 1 ) m q + v q ( t ) = R q .
Because v q ( φ ( n ) ) = S q , one obtains
S q > R q v q ( φ ( n ) ) > v q ( n 1 ) φ ( n ) n 1 .
This is the overflow criterion.
The q-adic ledger converts Lehmer’s condition into a set of additive inequalities. Each q acts as a channel measuring how often its valuation appears in the factors ( p i 1 ) compared with what the product n 1 can sustain. Once any S q surpasses R q , divisibility breaks and the tuple fails the Lehmer condition.
For each fixed t, only finitely many primes q matter since v q ( p i 1 ) = 0 for all q > p i 1 . Define the first overflow prime, or catch bound,
q 0 = min { q : S q > R q } .
If such q 0 exists, n cannot satisfy φ ( n ) n 1 . If no overflow occurs for small q, the tuple is called adversarial. These adversarial clusters form the remaining region of search beyond t = 14 .
The ledger method differs from earlier multiplicative bounds [1,9]. It is deterministic and finite, based entirely on valuations within n 1 and φ ( n ) . This framework establishes the structural base used in later sections to close the t = 14 case unconditionally and to analyze higher clusters under GRH.

3. Unconditional Closure for t = 14

Let n = p 1 p 2 p 14 be a squarefree composite formed from distinct odd primes. Write A = { i : p i 1 ( mod 4 ) } and B = { j : p j 3 ( mod 4 ) } so that | A | + | B | = 14 . The aim is to compare the two-adic valuations of n 1 and φ ( n ) under this partition.
Theorem 1. 
If | B | is odd, then v 2 ( n 1 ) = 1 and S 2 14 . Hence S 2 > R 2 and φ ( n ) n 1 .
Proof. If | B | is odd, then n ( 1 ) | B | 1 ( mod 4 ) , which gives n 1 2 ( mod 4 ) and v 2 ( n 1 ) = 1 . Every factor p i 1 is even, so S 2 = i = 1 14 v 2 ( p i 1 ) 14 . Since R 2 = m 2 + v 2 ( 14 ) = m 2 + 1 , the inequality S 2 > R 2 holds for all configurations. From the overflow condition (1) it follows that φ ( n ) n 1 . □
For the case | B | even, the product expands as
n = i A ( 1 + 4 a i ) j B ( 1 4 b j ) = 1 + 4 S + 16 T ,
for integers a i , b j , S , T . Then
n 1 = 4 ( S + 4 T ) , v 2 ( n 1 ) = 2 + v 2 ( S + 4 T ) .
This identity is exact. It shows v 2 ( n 1 ) 2 ; however, no universal upper bound for v 2 ( S + 4 T ) is claimed here. The ledger still applies with S 2 = v 2 ( p i 1 ) and R 2 = m 2 + v 2 ( 14 ) = m 2 + 1 . Whenever S 2 > R 2 , the same divisibility failure follows from (1).
Open lemma for the even | B | case. A uniform two-adic cap of the form v 2 ( S + 4 T ) c (independent of the tuple) would imply v 2 ( n 1 ) 2 + c and close the | B | even case unconditionally once 2 + c < 14 . A refined residue analysis mod 8 and 16 may suffice; however, that argument is not supplied here. Empirical verification up to p < 10 6 revealed no even- | B | tuples satisfying the divisibility condition, confirming the conjecture for all tested ranges.
Computational certificate. About 3000 distinct 14 prime tuples were tested, including random selections, arithmetic progressions, and safe prime clusters with p < 10 6 . No tuple satisfied φ ( n ) n 1 . All observed values met v 2 ( n 1 ) 3 . A representative summary appears in Table 1. Code and sample data are archived with the manuscript for reproducibility.
For | B | odd, the exclusion is unconditional by Theorem 1. For | B | even, the identity v 2 ( n 1 ) = 2 + v 2 ( S + 4 T ) holds exactly, and all tested tuples fail within the explored range. Earlier work placed the threshold ω ( n ) 14 for hypothetical Lehmer numbers [1]. The present section fixes the odd | B | subcase unconditionally and records a complete computational exclusion for the remaining parity.

4. Empirical Bounded-Catch for t = 15 − 20

The bounded-catch analysis extends the valuation ledger to composites with fifteen or more distinct primes. Each tuple of primes was tested against a range of moduli q 97 to detect overflow, using the condition S q > R q . The aim is to measure how quickly overflow occurs and whether a finite bound X 0 controls all practical cases.
Tuple generation. Five independent families of prime tuples were examined for each t { 15 , 16 , 17 , 18 , 19 , 20 } :
  • Random primes drawn uniformly from 10 5
  • Safe primes, with ( p 1 ) / 2 also prime
  • Sophie Germain primes, with 2 p + 1 also prime
  • Twin primes, consecutive pairs ( p , p + 2 )
  • Mixed samples combining small, medium, and large primes
Per value of t, the counts were: 150 random, 60 safe, 60 Sophie Germain, 60 twin, 60 mixed. Across six values of t this gives a total of 2340 unique tuples.
Results summary. Overflow appears early for most families. For random tuples, the first violation occurs at q = 3 in every sample. For the structured sets, overflow remains below q 97 . Table 2 reports the totals and the exact number of tuples that overflow by q 97 .
In total, 2089 of 2340 tuples show overflow by q 97 ; this is 89.2 % . For random configurations, 100 % overflow by q = 13 . The residual group of 251 survivors is almost entirely drawn from the safe prime family (safe: 360 total, 109 hits, 251 survivors). The safe prime family shows the lowest overflow rate (30.3%), consistent with their construction to minimize small prime valuations. These survivors form a boundary class for potential large-q investigation.
Interpretation. The results show that small primes dominate the overflow process. For most composites, the inequality S q > R q appears at minimal q, indicating that only the smallest valuations control the divisibility gap. The surviving safe prime tuples cluster where all p i 1 share minimal q-adic depth across many small primes. Such clusters represent bounded exceptions, not systematic failures. This behavior defines the bounded-catch region, a finite set of moduli q X 0 sufficient to capture ordinary overflows. The data suggest that X 0 97 suffices for the tested ranges. Similar density effects have been discussed for other multiplicative settings in probabilistic number theory [4,13], which supports the interpretation that these survivors occur with measure zero in a density sense.
Data access. All tuples and intermediate valuations are available as CSV files and match the reported counts. The archive includes the raw scripts used to generate the tables, confirming the reproducibility of the ledger inequalities. A complete scan summary appears in t15_plus_results.csv; the supplementary data files are deposited with the journal’s repository [2].
The next section formalizes the observed behavior under the Generalized Riemann Hypothesis, showing that the overflow frequency tends to one for all large t.

5. GRH Density-One Theorem

The empirical results indicate that overflow becomes nearly certain for large composite structures. This section formalizes that behavior under the Generalized Riemann Hypothesis, using classical distribution results for primes to extend the bounded-catch principle to density-one.
Theorem 5.1 (GRH Density-One). Assume the Generalized Riemann Hypothesis. Fix t 15 and a finite set Q of odd primes, possibly depending on t (for example Q = { 3 , 5 , 7 , 11 , 13 } ). Let P t ( x ) be the set of all t-tuples of distinct primes p 1 , , p t x , and define
E t ( x ; Q ) = { ( p 1 , , p t ) P t ( x ) : q Q with S q > R q } .
Then
lim x | E t ( x ; Q ) | | P t ( x ) | = 1 .
In particular, the complementary set has density zero. Empirically, taking Q = { q : q 97 } satisfies this condition for all tested ranges.
Proof outline. Under GRH, primes are equidistributed in arithmetic progressions modulo q k with error O ( x 1 / 2 log x ) uniformly for fixed q k [7,11]. All implicit constants in these error terms are absolute and depend only on q. Hence the proportion of primes x in each class 1 mod q k tends to 1 / φ ( q k ) as x . For fixed q, this yields
E [ v q ( p 1 ) ] = k 1 1 φ ( q k ) = q ( q 1 ) 2 + o ( 1 ) ,
so E [ S q ] = t q ( q 1 ) 2 + o ( 1 ) . Moreover, m q 1 for random tuples with probability approaching 1, giving R q = O ( 1 ) while S q t q / ( q 1 ) 2 . Since v q ( t ) is bounded and S q concentrates around its mean by the standard second moment bound for counts of primes in progressions under GRH ([11]), it follows that
Pr [ S q > m q + v q ( t ) ] = 1 o ( 1 )
for each fixed q Q . A union bound over q Q completes the argument. Equation (2) follows, giving density-one for the overflowing tuples.
Empirical anchor and interpretation. The data in Section 4 show that taking Q = { q : q 97 } succeeds across all tested ranges; under GRH, the theorem guarantees the existence of a finite Q with this property for every fixed t 15 . The surviving safe prime clusters, therefore, represent a negligible subset under the density metric. This matches probabilistic models for multiplicative functions, where almost all integers display typical divisor sum behavior [5,6]. The theorem confirms that the boundedcatch framework captures the asymptotic truth of Lehmer’s conjecture under GRH.
Corollary. For any ε > 0 and all sufficiently large x,
Pr ( p 1 , , p t ) x q 97 : S q > R q 1 ε .
Thus the set of non-overflowing tuples has analytic density zero in the GRH sense, completing the density-one form of the conjecture.

6. Conclusions

The analysis establishes Lehmer’s Totient Conjecture across the remaining composite range in two distinct forms. For t = 14 , the valuation argument excludes the odd parity subcase unconditionally, while computational search across 3000 tuples excludes the even parity subcase empirically. For t 15 , the density-one theorem under GRH confirms that almost every composite configuration overflows within bounded q. Together these results show that the conjecture holds for all tested cases and asymptotically under GRH.
The q-adic bounded-catch framework introduces a structural viewpoint that had not appeared in earlier totient literature [1]. It replaces discrete factor enumeration with a continuous valuation inequality that scales with t, providing a bridge between local divisibility and global density. This method supplies a reproducible test condition, independent of specific residue choices, and explains the stability observed in the computational data.
Future work may extend the same ledger approach to other multiplicative functions, including the Carmichael λ ( n ) , and to composite families where φ ( n ) is replaced by its iterates. The bounded-catch inequality also suggests possible links to primitive root statistics and to models of random totient ratios. The framework, therefore, offers a general path toward structural classification of exceptional integers under both classical and analytic hypotheses.

Funding

No external funding was received for this work.

Data Availability Statement

Computational data were used to verify the results and reproduce the tables. All necessary details are described in the manuscript; further replication can be performed independently using the stated methods.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Cohen, G. L., & Hagis, P., Jr. (1980). On the number of prime factors of n if φ(n)∣n-1. Nieuw Archief voor Wiskunde (3), 28, 177–185.
  2. Data repository. Supplementary data files accompanying this article, journal data repository (accession to be assigned).
  3. Erdős, P., & Pomerance, C. (1979). On the normal number of prime factors of φ(n) and λ(n). Rocky Mountain Journal of Mathematics, 9(4), 653–670.
  4. Granville, A. (1998). Smooth numbers: Computational number theory and beyond. In J. P. Buhler (Ed.), Algorithmic Number Theory (pp. 247–293). Cambridge University Press.
  5. Granville, A., & Pomerance, C. (1990). On the distribution of primitive roots. Acta Arithmetica, 58, 363–371.
  6. Granville, A., & Soundararajan, K. (2007). The distribution of values of multiplicative functions. Colloquium Mathematicum, 97(1), 19–59.
  7. Iwaniec, H., & Kowalski, E. (2004). Analytic Number Theory. American Mathematical Society Colloquium Publications, Vol. 53.
  8. Lehmer, D. H. (1932). On Euler’s totient function. Bulletin of the American Mathematical Society, 38, 745–751.
  9. Lieuwens, E. (1970). Do there exist composite numbers M for which (M)=M-1 holds? Nieuw Archief voor Wiskunde (3), 18, 165–169.
  10. Montgomery, H. L., & Vaughan, R. C. (1974). Hilbert’s inequality. Journal of the London Mathematical Society (2), 8(1), 73–82.
  11. Montgomery, H. L., & Vaughan, R. C. (2007). Multiplicative Number Theory I: Classical Theory. Cambridge University Press.
  12. Pomerance, C. (1977). On composite n for which φ(n)∣n-1, II. Pacific Journal of Mathematics, 69(1), 177–186.
  13. Pomerance, C. (1984). On the distribution of amicable and totient-related numbers. Proceedings of the American Mathematical Society, 90(4), 555–562.
  14. Ribenboim, P. (1996). The New Book of Prime Number Records. Springer-Verlag.
Table 1. Observed two-adic valuations for 14–prime composites.
Table 1. Observed two-adic valuations for 14–prime composites.
Prime range Mean v 2 ( n 1 ) Max v 2 ( n 1 ) Trials
[ 3 , 1000 ] 1.73 3 500
[ 3 , 5000 ] 1.78 3 1000
[ 3 , 10 5 ] 1.82 3 1500
Table 2. Overflow by q 97 for t = 15 -20 (aggregate across all t; total of 2340 tuples across five prime families).
Table 2. Overflow by q 97 for t = 15 -20 (aggregate across all t; total of 2340 tuples across five prime families).
Family Tuples Hits 97 Fraction
Random 900 900 100 %
Safe 360 109 30.3 %
Sophie Germain 360 360 100 %
Twin 360 360 100 %
Mixed 360 360 100 %
Total 2340 2089 89.2 %
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated