Proof Technique PI Proving Identities
Many theorems have conclusions that say two objects are equal. Perhaps one object is hard to compute or understand, while the other is easy to compute or understand. This would make for a pleasing theorem. Whether the result is pleasing or not, we take the same approach to formulate a proof. Sometimes we need to employ specialized notions of equality, such as Definition SE or Definition CVE, but in other cases we can string together a list of equalities.
The wrong way to prove an identity is to begin by writing it down and then beating on it until it reduces to an obvious identity. The first flaw is that you would be writing down the statement you wish to prove, as if you already believed it to be true. But more dangerous is the possibility that some of your maneuvers are not reversible. Here is an example. Let us prove that \(3=-3\text{.}\)
So because \(0=0\) is a true statement, does it follow that \(3=-3\) is a true statement? Nope. Of course, we did not really expect a legitimate proof of \(3=-3\text{,}\) but this attempt should illustrate the dangers of this (incorrect) approach.
What you have just seen in the proof of Theorem VSPCV, and what you will see consistently throughout this text, is proofs of the following form. To prove that \(A=D\) we write
In your scratch work exploring possible approaches to proving a theorem you may massage a variety of expressions, sometimes making connections to various bits and pieces, while some parts get abandoned. Once you see a line of attack, rewrite your proof carefully mimicking this style.