Network Coding and Schubert Varieties over Finite Fields

Size: px
Start display at page:

Download "Network Coding and Schubert Varieties over Finite Fields"

Transcription

1 Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky

2 What is this talk about? 1 / 31

3 Overview 1 Overview Network Coding 2 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q (k, n) Schubert Calculus 3 Conclusions and Related Work

4 Overview A little bit of history... Claude Shannon ( ), the Father of Information Theory Channel coding (1948): Noisy-channel coding theorem/shannon capacity (maximum information transfer rate for a given channel and noise level) Compression (1948): Source coding theorem (limits to possible data compression) Cryptography (1949): One-time pad is the only theoretically unbreakable cipher 2 / 31

5 Overview... deals with noisy transmission of information over space (communication) over time (storage) 3 / 31

6 Overview... deals with noisy transmission of information over space (communication) over time (storage) To deal with the noise the data is encoded with added redundancy, the receiver can filter out the noise (decoding) and then recover the sent data. 3 / 31

7 Overview Classical setup (simple channel): 4 / 31

8 Overview Classical setup (simple channel): 4 / 31

9 Overview Classical setup (simple channel): 4 / 31

10 Overview Classical setup (simple channel): codewords are vectors of length n over a finite field F q received word = codeword + error vector (r = c + e F n q ) most likely sent codeword = closest codeword w.r.t. Hamming distance: d H ((u 1,..., u n ), (v 1,..., v n )) := {i u i v i }. 4 / 31

11 Overview Definition A block code is a subset C F n q. The minimum (Hamming) distance of the code is defined as d H (C) := min{d H (u, v) u, v C, u v}. The transmission rate of C is defined as log q ( C )/n. 5 / 31

12 Overview Definition A block code is a subset C F n q. The minimum (Hamming) distance of the code is defined as d H (C) := min{d H (u, v) u, v C, u v}. The transmission rate of C is defined as log q ( C )/n. Theorem For any e F n q with supp(e) (d H (C) 1)/2, d H (c, c + e) < d H (c, c + e) c c C. = the error-correction capability of C is (d H (C) 1)/2 5 / 31

13 Overview Typical questions in channel coding theory: For a given error correction capability, what is the best transmission rate? = packing problem in (F n q, d H ) How can one efficiently encode, decode, recover the messages? = algebraic structure in the code What is the trade-off between the two above? 6 / 31

14 Overview Typical questions in channel coding theory: For a given error correction capability, what is the best transmission rate? = packing problem in (F n q, d H ) How can one efficiently encode, decode, recover the messages? = algebraic structure in the code What is the trade-off between the two above? Typical tools used in classical setup: linear subspaces of F n q polynomials (and their roots) in F q [x] finite projective geometry 6 / 31

15 Network Coding 1 Overview Network Coding 2 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q (k, n) Schubert Calculus 3 Conclusions and Related Work

16 Network Coding Multicast Channel All receivers want to receive the same information. 7 / 31

17 Network Coding Example (Butterfly Network) Linearly combining is better than forwarding: a a a a a R1 b b a b R2 R1 receives only a, R2 receives a and b. Forwarding: need 2 transmissions to transmit a, b to both receivers 8 / 31

18 Network Coding Example (Butterfly Network) Linearly combining is better than forwarding: a a a a+b a+b R1 b b a+b b R2 R1 and R2 can both recover a and b with one operation. Forwarding: need 2 transmissions to transmit a, b to both receivers Linearly combining: need 1 transmission to transmit a, b to both receivers 8 / 31

19 Network Coding It turns out that linear combinations at the inner nodes are sufficient to reach capacity: Theorem One can reach the capacity of a single-source multicast network channel with linear combinations at the inner nodes. 9 / 31

20 Network Coding It turns out that linear combinations at the inner nodes are sufficient to reach capacity: Theorem One can reach the capacity of a single-source multicast network channel with linear combinations at the inner nodes. When we consider large or time-varying networks, we allow the inner nodes to transmit random linear combinations of their incoming vectors. Theorem One can reach the capacity of a single-source multicast network channel with random linear combinations at the inner nodes, provided that the field size is large. 9 / 31

21 Network Coding Problem 1: errors propagate! a b b +e c 10 / 31

22 Network Coding Problem 1: errors propagate! a b b +e c 10 / 31

23 Network Coding Problem 1: errors propagate! a b b +e c Problem 2: receiver does not know the random operations 10 / 31

24 Network Coding Problem 1: errors propagate! a b b +e c Problem 2: receiver does not know the random operations Solution: Use a metric space such that 1 # of errors is reflected in the distance between points, and 2 the points are invariant under linear combinations. 10 / 31

25 Network Coding Lucky us / 31

26 Network Coding Lucky us... such a space exists! 11 / 31

27 Network Coding Definition Grassmannian: G q (k, n) := {U F n q dim(u) = k} projective geometry: P q (n) := n k=1 G q(k, n) subspace distance: d S (U, V) := dim(u + V) dim(u V) Theorem P q (n) (or G q (k, n)) equipped with d S is a metric space. Hermann Graßmann ( ) 12 / 31

28 Network Coding For simplicity we stick to G q (k, n). Definition A (constant dimension) subspace code is a subset of G q (k, n). The minimum distance of the code C G q (k, n) is defined as d S (C) := min{d S (U, V) U, V C, U V}. 13 / 31

29 Network Coding For simplicity we stick to G q (k, n). Definition A (constant dimension) subspace code is a subset of G q (k, n). The minimum distance of the code C G q (k, n) is defined as Type of errors: d S (C) := min{d S (U, V) U, V C, U V}. deletions decrease in dimension of codeword insertions increase in dimension of codeword 13 / 31

30 Network Coding For simplicity we stick to G q (k, n). Definition A (constant dimension) subspace code is a subset of G q (k, n). The minimum distance of the code C G q (k, n) is defined as Type of errors: d S (C) := min{d S (U, V) U, V C, U V}. deletions decrease in dimension of codeword insertions increase in dimension of codeword Code parameters: error-correction capability is (d S (C) 1)/2 transmission rate is log q ( C )/(kn) 13 / 31

31 Network Coding Example in G 2 (2, 4) C = { ( rs ) ( , rs )}, d S (C) = No errors: receive a (different) basis of the same vector space 14 / 31

32 Network Coding Example in G 2 (2, 4) C = { ( rs ) ( , rs )}, d S (C) = Deletion in R 1 : d S (received, sent) = 1, d S (received, other) = 3 14 / 31

33 Network Coding Example in G 2 (2, 4) C = { ( rs ) ( , rs )}, d S (C) = Deletion + insertion in R 1 and R 2 : d S (received, sent) = 2, d S (received, other) = 4 14 / 31

34 Network Coding Research goals Find good packings in G q (k, n) with a given maximal intersection of the subspaces. = best transmission rate for given error correction capability Find good packings in G q (k, n) with algebraic structure. = good encoding/decoding algorithms 15 / 31

35 Network Coding Research goals Find good packings in G q (k, n) with a given maximal intersection of the subspaces. = best transmission rate for given error correction capability Find good packings in G q (k, n) with algebraic structure. = good encoding/decoding algorithms Typical tools linearized polynomials in F q [x] Singer cycles, difference sets (partial) spreads 15 / 31

36 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) 1 Overview Network Coding 2 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q (k, n) Schubert Calculus 3 Conclusions and Related Work

37 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Definition The Grassmannian G q (k, n) can be embedded into projective space using the Plücker embedding: ψ : G q (k, n) P (n k) 1 (F q ) rs(u k n ) [x U 1,...,k : xu 1,...,k 1,k+1 : : xu n k+1,...,n ] where x U i 1,...,i k = det(u[i 1,..., i k ]). Julius Plücker ( ) 16 / 31

38 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Theorem The image of ψ is the solution set of the shuffle relations sgn(σ j )x i1,...,i k+1 \jx j,ik+2,...,i 2k = 0. j {i 1,...,i k+1 } Example The shuffle relations of G q (2, 5) are x 12 x 34 x 13 x 24 + x 14 x 23 = 0, x 12 x 35 x 13 x 25 + x 15 x 23 = 0, x 12 x 45 x 14 x 25 + x 15 x 24 = 0, x 13 x 45 x 14 x 35 + x 15 x 34 = 0, x 23 x 45 x 24 x 35 + x 25 x 34 = / 31

39 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] / 31

40 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] Inverse: ( [0 : 0 : 0 : 1 : 2 : 1] rs ) 18 / 31

41 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] Inverse: ( 1 0 [0 : 0 : 0 : 1 : 2 : 1] rs 0 1 ) 18 / 31

42 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] Inverse: ( [0 : 0 : 0 : 1 : 2 : 1] rs ) 18 / 31

43 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] Inverse: ( [0 : 0 : 0 : 1 : 2 : 1] rs ) 18 / 31

44 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 3 (2, 4) Shuffle relation: x 12 x 34 x 13 x 24 + x 14 x 23 = 0 Embedding: ( ) rs [1 : 0 : 1 : 1 : 2 : 1] Inverse: ( [0 : 0 : 0 : 1 : 2 : 1] rs ) 18 / 31

45 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Definition Let F = {0} V 1 V n 1 V n = F n q a complete flag and v = (v 1,..., v k ) a set of strictly increasing integers from [n]. A Schubert variety is defined as S(v; F) := {U G q (k, n) dim(u V vi ) i}. Hermann Schubert ( ) 19 / 31

46 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Bruhat order: (i 1,..., i k ) (j 1,..., j k ) i l j l l Theorem Let F = {0} e 1 e 1, e 2 F n q the standard flag and v = (v 1,..., v k ) a set of strictly increasing integers from [n]. In the Plücker embedding of G q (k, n) we have S(v; F) = {[x 1,...,k : : x n k+1,...,n ] x i1,...,i k = 0 (i 1,..., i k ) v}. = Schubert varieties are linear varieties in the Plücker embedding. 20 / 31

47 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example Let F be the flag {0} V 1 = e 1 V 2 = e 1, e 2 V 3 = e 1, e 2, e 3 V 4 = F 4 q. S((2, 4); F) = {U G q (2, 4) dim(u V 2 ) 1 and dim(u V 4 ) 2} = {U G q (2, 4) x i1,i 2 = 0 (i 1, i 2 ) (2, 4)} = {U G q (2, 4) x 34 = 0} 21 / 31

48 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example Let F be the flag {0} V 1 = e 1 V 2 = e 1, e 2 V 3 = e 1, e 2, e 3 V 4 = F 4 q. S((2, 4); F) = {U G q (2, 4) dim(u V 2 ) 1 and dim(u V 4 ) 2} = {U G q (2, 4) x i1,i 2 = 0 (i 1, i 2 ) (2, 4)} = {U G q (2, 4) x 34 = 0} ( rs 0 1 ) ( 1 0 0, rs ( rs ) ( , rs ) ( , rs 0 1 ) ) 21 / 31

49 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Connection to network coding theory Theorem The balls B 2t (U) w.r.t.t. subspace metric are Schubert varieties, with ordered index set v = (t + 1,..., k, n t + 1,..., n) and flag Corollary {0} U F n q. In the Plücker embedding, if U = e 1, e 2,..., e k, B 2t (U) = {[x 1,...,k : : x n k+1,...,n ] x i1,...,i k = 0 if i k t k+1}. For other U G q (k, n) we get a similar results by basis change. = Schubert varieties play a role in code constructions, decoding algorithms. 22 / 31

50 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Decoding based on Schubert varieties Assume the code C is a linear variety in the Plücker embedding and we have a received R G q (k, n). Solve system of linear equations from B 2t (R) and the code equations. Intersect the solution space with the algebraic variety of the shuffle relations. Output: all codewords within radius 2t around R. 23 / 31

51 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Decoding based on Schubert varieties Assume the code C is a linear variety in the Plücker embedding and we have a received R G q (k, n). Solve system of linear equations from B 2t (R) and the code equations. Intersect the solution space with the algebraic variety of the shuffle relations. Output: all codewords within radius 2t around R. Problem: Too many variables and bilinear equations! 23 / 31

52 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Decoding based on Schubert varieties Assume the code C is a linear variety in the Plücker embedding and we have a received R G q (k, n). Solve system of linear equations from B 2t (R) and the code equations. Intersect the solution space with the algebraic variety of the shuffle relations. Output: all codewords within radius 2t around R. Problem: Too many variables and bilinear equations! But: For certain codes and parameter sets we can reduce the number of variables and get a feasible decoder. 23 / 31

53 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 2 (2, 4) shuffle relation: x 12 x 34 + x 13 x 24 + x 14 x 23 = 0 code equations: x 13 + x 14 + x 24 = 0, x 14 + x 23 = 0 = spread code with C = 5 and d S (C) = 4 24 / 31

54 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 2 (2, 4) shuffle relation: x 12 x 34 + x 13 x 24 + x 14 x 23 = 0 code equations: x 13 + x 14 + x 24 = 0, x 14 + x 23 = 0 = spread code with C = 5 and d S (C) = 4 ( ) received R = rs [0 : 0 : 1 : 0 : 0 : 1] = equation for B 2 (R): x 12 + x 23 = 0 24 / 31

55 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q(k, n) Example in G 2 (2, 4) shuffle relation: x 12 x 34 + x 13 x 24 + x 14 x 23 = 0 code equations: x 13 + x 14 + x 24 = 0, x 14 + x 23 = 0 = spread code with C = 5 and d S (C) = 4 ( ) received R = rs [0 : 0 : 1 : 0 : 0 : 1] = equation for B 2 (R): x 12 + x 23 = 0 solutions: [0 : 0 : 0 : 0 : 0 : 1], [1 : 1 : 1 : 1 : 0 : 1], [1 : 0 : 1 : 1 : 1 : 1] = ( rs ) ( , rs ) ( , rs ) 24 / 31

56 Schubert Varieties (over Finite Fields) Schubert Calculus 1 Overview Network Coding 2 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q (k, n) Schubert Calculus 3 Conclusions and Related Work

57 Schubert Varieties (over Finite Fields) Schubert Calculus Hilbert s Problem #15 To establish rigorously and with an exact determination of the limits of their validity those geometrical numbers which Schubert especially has determined on the basis of the so-called principle of special position, or conservation of number, by means of the enumerative calculus developed by him. David Hilbert ( ) 25 / 31

58 Schubert Varieties (over Finite Fields) Schubert Calculus Classical Schubert calculus is defined over C = very well understood Schubert calculus over R has been studied since 1990s = classical techniques partly work Schubert calculus over F q is mostly unknown = classical techniques do not work 26 / 31

59 Schubert Varieties (over Finite Fields) Schubert Calculus Classical Schubert calculus is defined over C = very well understood Schubert calculus over R has been studied since 1990s = classical techniques partly work Schubert calculus over F q is mostly unknown = classical techniques do not work Problem with F q In contrast to C, F q is far from algebraically closed! 26 / 31

60 Schubert Varieties (over Finite Fields) Schubert Calculus Classical question: How many planes in F 4 intersect four given planes in F 4 in general position? if F = C we have 2 if F = R we have 0 or 2 if F = F q we have 0 or 2 (up to multiplicity) 27 / 31

61 Schubert Varieties (over Finite Fields) Schubert Calculus E.g., let the 4 planes be generated by ( ) ( ) ( ,, x 34 = 0 x 12 + x 14 x 23 + x 34 = 0 x 12 x 13 x 23 + x 24 + x 34 = 0 x 12 = 0 x 12 x 34 x 13 x 24 + x 14 x 23 = 0 ) ( , ). x 12 = x 34 = 0, x 14 = x 23, x 24 = x 13 + x 23, x 13 (x 13 + x 23 ) = x 2 23 = x 13 = 1, x 2 23 x 23 1 = 0 has no (non-trivial) solution over F 2, F 3 has two (non-trivial) solutions over F 4 has one (non-trivial) solution over F 5 28 / 31

62 Schubert Varieties (over Finite Fields) Schubert Calculus If we exchange the second plane, we get different solutions: ( ) ( ) ( ) ( ,,, ). x 34 = 0 x 12 x 13 + x 14 + x 24 + x 34 = 0 x 12 x 13 x 23 + x 24 + x 34 = 0 x 12 = 0 x 12 x 34 x 13 x 24 + x 14 x 23 = 0 x 12 = x 34 = 0, x 14 = x 13 x 24, x 23 = x 24 x 13 = x 13 = 1, x 2 24 x = 0 has no (non-trivial) solution over F 2, F 5 has two (non-trivial) solutions over F 4 has one (non-trivial) solution over F 3 29 / 31

63 Conclusions and Related Work 1 Overview Network Coding 2 Schubert Varieties (over Finite Fields) Balls in the Plücker Embedding of G q (k, n) Schubert Calculus 3 Conclusions and Related Work

64 Conclusions and Related Work Conclusions In channel coding we handle noisy data transmission, where different channel models require different metric spaces for code design. In random network coding this space is the Grassmann variety G q (k, n) with the subspace distance. G q (k, n) is a variety in the Plücker embedding. The balls w.r.t.t. subspace metric are Schubert varieties in the Plücker embedding. Decoding can be done by solving a system of linear equations in the Plücker embedding. 30 / 31

65 Conclusions and Related Work Conclusions In channel coding we handle noisy data transmission, where different channel models require different metric spaces for code design. In random network coding this space is the Grassmann variety G q (k, n) with the subspace distance. G q (k, n) is a variety in the Plücker embedding. The balls w.r.t.t. subspace metric are Schubert varieties in the Plücker embedding. Decoding can be done by solving a system of linear equations in the Plücker embedding. Open problem 1: how to handle the shuffle relations. Open problem 2: derive Schubert-type calculus over F q. 30 / 31

66 Conclusions and Related Work Related Work Network coding is related to distributed storage (big data centers, cloud storage) index coding (communication with side information) Random linear network coding is useful for robustness w.r.t. changes and failures in the network resilience against eavesdropping or data corruption Subspace codes can be used for secure storage of biometrics 31 / 31

67 Conclusions and Related Work Related Work Network coding is related to distributed storage (big data centers, cloud storage) index coding (communication with side information) Random linear network coding is useful for robustness w.r.t. changes and failures in the network resilience against eavesdropping or data corruption Subspace codes can be used for secure storage of biometrics Thank you for your attention! Questions? Remarks? 31 / 31

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x) Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

Algebraic Codes for Error Control

Algebraic Codes for Error Control little -at- mathcs -dot- holycross -dot- edu Department of Mathematics and Computer Science College of the Holy Cross SACNAS National Conference An Abstract Look at Algebra October 16, 2009 Outline Coding

More information

Error-correcting codes and applications

Error-correcting codes and applications Error-correcting codes and applications November 20, 2017 Summary and notation Consider F q : a finite field (if q = 2, then F q are the binary numbers), V = V(F q,n): a vector space over F q of dimension

More information

arxiv: v1 [cs.it] 18 Jan 2012

arxiv: v1 [cs.it] 18 Jan 2012 Noname manuscript No. (will be inserted by the editor) A Complete Characterization of Irreducible Cyclic Orbit Codes and their Plücker Embedding Joachim Rosenthal Anna-Lena Trautmann arxiv:1201.3825v1

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Lattices and Lattice Codes

Lattices and Lattice Codes Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad

More information

The Impact of Network Coding on Mathematics

The Impact of Network Coding on Mathematics The Impact of Network Coding on Mathematics Eimear Byrne University College Dublin DIMACS Workshop on Network Coding: the Next 15 Years Dec 15-17, 2015 Random Network Coding and Designs Over GF (q) COST

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Tara Javidi These lecture notes were originally developed by late Prof. J. K. Wolf. UC San Diego Spring 2014 1 / 8 I

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Secure Sketch for Multi-Sets

Secure Sketch for Multi-Sets Secure Sketch for Multi-Sets Ee-Chien Chang Vadym Fedyukovych Qiming Li March 15, 2006 Abstract Given the original set X where X = s, a sketch P is computed from X and made public. From another set Y where

More information

Lecture 7 September 24

Lecture 7 September 24 EECS 11: Coding for Digital Communication and Beyond Fall 013 Lecture 7 September 4 Lecturer: Anant Sahai Scribe: Ankush Gupta 7.1 Overview This lecture introduces affine and linear codes. Orthogonal signalling

More information

Can You Hear Me Now?

Can You Hear Me Now? Can You Hear Me Now? An Introduction to Coding Theory William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 19 October 2004 W. J. Turner (Wabash College)

More information

Lecture B04 : Linear codes and singleton bound

Lecture B04 : Linear codes and singleton bound IITM-CS6845: Theory Toolkit February 1, 2012 Lecture B04 : Linear codes and singleton bound Lecturer: Jayalal Sarma Scribe: T Devanathan We start by proving a generalization of Hamming Bound, which we

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Noisy channel communication

Noisy channel communication Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 6 Communication channels and Information Some notes on the noisy channel setup: Iain Murray, 2012 School of Informatics, University

More information

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this:

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this: 15-251: Great Theoretical Ideas in Computer Science Lecture 23 Linear Algebra Linear algebra is about vectors. Concretely, vectors look like this: They are arrays of numbers. fig. by Peter Dodds # of numbers,

More information

Coset Decomposition Method for Decoding Linear Codes

Coset Decomposition Method for Decoding Linear Codes International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya

More information

Convolutional Coding LECTURE Overview

Convolutional Coding LECTURE Overview MIT 6.02 DRAFT Lecture Notes Spring 2010 (Last update: March 6, 2010) Comments, questions or bug reports? Please contact 6.02-staff@mit.edu LECTURE 8 Convolutional Coding This lecture introduces a powerful

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Coding for Errors and Erasures in Random Network Coding

Coding for Errors and Erasures in Random Network Coding Coding for Errors and Erasures in Random Network Coding Ralf Koetter Institute for Communications Engineering TU Munich D-80333 Munich ralf.koetter@tum.de Frank R. Kschischang The Edward S. Rogers Sr.

More information

1 Background on Information Theory

1 Background on Information Theory Review of the book Information Theory: Coding Theorems for Discrete Memoryless Systems by Imre Csiszár and János Körner Second Edition Cambridge University Press, 2011 ISBN:978-0-521-19681-9 Review by

More information

Coding for Errors and Erasures in Random Network Coding

Coding for Errors and Erasures in Random Network Coding Coding for Errors and Erasures in Random Network Coding arxiv:cs/0703061v2 [cs.it] 25 Mar 2008 Ralf Kötter Institute for Communications Engineering TU Munich D-80333 Munich ralf.koetter@tum.de Frank R.

More information

CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots.

CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots. CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4 Lecture 14: Schwartz-Zippel Lemma and Intro to Coding Theory Lecturer: Yuan Zhou Scribe: Haoyu Zhang 1 Roots of polynomials Theorem 1. A non-zero, univariate

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

ERROR-CORRECTING CODES AND LATIN SQUARES

ERROR-CORRECTING CODES AND LATIN SQUARES ERROR-CORRECTING CODES AND LATIN SQUARES Ritu Ahuja Department of Mathematics, Khalsa College for Women, Civil Lines, Ludhiana 141001, Punjab, (India) ABSTRACT Data stored and transmitted in digital form

More information

Entropies & Information Theory

Entropies & Information Theory Entropies & Information Theory LECTURE I Nilanjana Datta University of Cambridge,U.K. See lecture notes on: http://www.qi.damtp.cam.ac.uk/node/223 Quantum Information Theory Born out of Classical Information

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Notes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel

Notes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel Introduction to Coding Theory CMU: Spring 2010 Notes 3: Stochastic channels and noisy coding theorem bound January 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami We now turn to the basic

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

1.6: Solutions 17. Solution to exercise 1.6 (p.13).

1.6: Solutions 17. Solution to exercise 1.6 (p.13). 1.6: Solutions 17 A slightly more careful answer (short of explicit computation) goes as follows. Taking the approximation for ( N K) to the next order, we find: ( N N/2 ) 2 N 1 2πN/4. (1.40) This approximation

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

Binary Convolutional Codes

Binary Convolutional Codes Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An

More information

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory 6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser

More information

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes. 5 Binary Codes You have already seen how check digits for bar codes (in Unit 3) and ISBN numbers (Unit 4) are used to detect errors. Here you will look at codes relevant for data transmission, for example,

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

On designs and Steiner systems over finite fields

On designs and Steiner systems over finite fields On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013 Outline

More information

Assume that the follow string of bits constitutes one of the segments we which to transmit.

Assume that the follow string of bits constitutes one of the segments we which to transmit. Cyclic Redundancy Checks( CRC) Cyclic Redundancy Checks fall into a class of codes called Algebraic Codes; more specifically, CRC codes are Polynomial Codes. These are error-detecting codes, not error-correcting

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

Lecture 4 Channel Coding

Lecture 4 Channel Coding Capacity and the Weak Converse Lecture 4 Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 15, 2014 1 / 16 I-Hsiang Wang NIT Lecture 4 Capacity

More information

Cross-Error Correcting Integer Codes over Z 2

Cross-Error Correcting Integer Codes over Z 2 Cross-Error Correcting Integer Codes over Z 2 m Anna-Lena Trautmann Department of Electrical & Computer Systems Eng., Monash University Department of Electrical & Electronic Engineering, University of

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Limits to List Decoding Random Codes

Limits to List Decoding Random Codes Limits to List Decoding Random Codes Atri Rudra Department of Computer Science and Engineering, University at Buffalo, The State University of New York, Buffalo, NY, 14620. atri@cse.buffalo.edu Abstract

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Hybrid Noncoherent Network Coding

Hybrid Noncoherent Network Coding Hybrid Noncoherent Network Coding Vitaly Skachek, Olgica Milenkovic, Angelia Nedić University of Illinois, Urbana-Champaign 1308 W. Main Street, Urbana, IL 61801, USA Abstract We describe a novel extension

More information

New Methods for Cryptanalysis of Stream Ciphers. The Selmer Centre Department of Informatics University of Bergen Norway

New Methods for Cryptanalysis of Stream Ciphers. The Selmer Centre Department of Informatics University of Bergen Norway New Methods for Cryptanalysis of Stream Ciphers Håvard Molland The Selmer Centre Department of Informatics University of Bergen Norway 18th May 2005 Acknowledgments I would like to express my gratitude

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

to mere bit flips) may affect the transmission.

to mere bit flips) may affect the transmission. 5 VII. QUANTUM INFORMATION THEORY to mere bit flips) may affect the transmission. A. Introduction B. A few bits of classical information theory Information theory has developed over the past five or six

More information

A Singleton Bound for Lattice Schemes

A Singleton Bound for Lattice Schemes 1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and

More information

Entropy in Classical and Quantum Information Theory

Entropy in Classical and Quantum Information Theory Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,

More information

Polynomial Codes over Certain Finite Fields

Polynomial Codes over Certain Finite Fields Polynomial Codes over Certain Finite Fields A paper by: Irving Reed and Gustave Solomon presented by Kim Hamilton March 31, 2000 Significance of this paper: Introduced ideas that form the core of current

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

Math 512 Syllabus Spring 2017, LIU Post

Math 512 Syllabus Spring 2017, LIU Post Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30

More information

9 Forward-backward algorithm, sum-product on factor graphs

9 Forward-backward algorithm, sum-product on factor graphs Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous

More information

A Fuzzy Sketch with Trapdoor

A Fuzzy Sketch with Trapdoor A Fuzzy Sketch with Trapdoor Julien Bringer 1, Hervé Chabanne 1, Quoc Dung Do 2 1 SAGEM Défense Sécurité, 2 Ecole Polytechnique, ENST Paris. Abstract In 1999, Juels and Wattenberg introduce an effective

More information

List Decoding of Reed Solomon Codes

List Decoding of Reed Solomon Codes List Decoding of Reed Solomon Codes p. 1/30 List Decoding of Reed Solomon Codes Madhu Sudan MIT CSAIL Background: Reliable Transmission of Information List Decoding of Reed Solomon Codes p. 2/30 List Decoding

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70 Name : Roll No. :.... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/2011-12 2011 CODING & INFORMATION THEORY Time Allotted : 3 Hours Full Marks : 70 The figures in the margin indicate full marks

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Correcting Localized Deletions Using Guess & Check Codes

Correcting Localized Deletions Using Guess & Check Codes 55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

Cambridge University Press The Mathematics of Signal Processing Steven B. Damelin and Willard Miller Excerpt More information

Cambridge University Press The Mathematics of Signal Processing Steven B. Damelin and Willard Miller Excerpt More information Introduction Consider a linear system y = Φx where Φ can be taken as an m n matrix acting on Euclidean space or more generally, a linear operator on a Hilbert space. We call the vector x a signal or input,

More information

Code-based Cryptography

Code-based Cryptography a Hands-On Introduction Daniel Loebenberger Ηράκλειο, September 27, 2018 Post-Quantum Cryptography Various flavours: Lattice-based cryptography Hash-based cryptography Code-based

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

Efficiently decodable codes for the binary deletion channel

Efficiently decodable codes for the binary deletion channel Efficiently decodable codes for the binary deletion channel Venkatesan Guruswami (venkatg@cs.cmu.edu) Ray Li * (rayyli@stanford.edu) Carnegie Mellon University August 18, 2017 V. Guruswami and R. Li (CMU)

More information