Reverse Berlekamp-Massey Decoding

Size: px
Start display at page:

Download "Reverse Berlekamp-Massey Decoding"

Transcription

1 Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland {yu, arxiv: v [cs.it] 17 May 013 Abstract We propose a new algorithm for decoding Reed- Solomon codes up to half the minimum distance and for computing inverses in F [x]/mx. The proposed algorithm is similar in spirit and structure to the Berlekamp-Massey algorithm, but it works naturally for general mx. I. INTRODUCTION In this paper, we propose a new algorithm that solves the following problem. Partial-Inverse Problem: Let bx and mx be nonzero polynomials over some finite field F, with deg bx < deg mx. Find a nonzero polynomial Λx F [x] of the smallest degree such that deg bxλx mod mx < d 1 for fixed d Z, 1 d deg mx. In the special case where d = 1 and gcd bx, mx = 1, the problem reduces to computing the inverse of bx in F [x]/mx. Another special case of the Partial-Inverse Problem is the standard key equation for decoding Reed-Solomon codes [1] [5] see Section II-B. In this case, we have mx = x n k, where n and k are the blocklength and the dimension of the code, respectively. The proposed algorithm then essentially coincides with the Berlekamp-Massey algorithm [], [6] except that it processes the polynomial bx the syndrome in the reverse order. The Partial-Inverse Problem with general mx arises from an alternative key equation that will be discussed in Section IV. This alternative key equation and the corresponding decoding algorithm generalize naturally to polynomial remainder codes [7], [9] [11], which have not been amenable to Berlekamp-Massey decoding. The Partial-Inverse Problem can also be solved by a version of the Euclidean algorithm in the style of [3], [5], [7], [8]. In fact, it has long been known that the Berlekamp-Massey algorithm and the Euclidean algorithm are related [1] [14], and explicit translations were given in [1], [14]. In this respect, the algorithm proposed in this paper allows such a translation that is particularly transparent. However, this topic is not elaborated in the present paper due to lack of space. The paper is structured as follows. Section II comprises a number of remarks on the Partial-Inverse Problem, including its application to the standard key equation. The new algorithm is proposed in Section III and proved in Sections V and VI. Decoding Reed-Solomon codes via the alternative key equation is described in Section IV, and the generalization of this approach to polynomial remainder codes is outlined in the appendix. The following notation will be used. The Hamming weight of e F n will be denoted by w H e. The coefficient of x l of a polynomial bx F [x] will be denoted b l. The leading coefficient i.e., the coefficient of x deg bx of a nonzero polynomial bx will be denoted by lcf bx, and we also define lcf0 = 0. We will use mod both as in rx = bx mod mx the remainder of a division and as in bx rx mod mx a congruence modulo mx. For x R, x is the smallest integer not smaller than x. A. General Remarks II. REMARKS We begin with a number of remarks on the Partial-Inverse Problem as stated in Section I. 1 The stated assumptions imply deg mx 1. For d = deg mx, the problem is solved by Λx = 1. Smaller values of d will normally require a polynomial Λx of higher degree. 3 In the special case where d = 1, we have the following solutions. If gcd bx, mx = 1, then bx has an inverse in F [x]/mx and Λx is that inverse up to a scale factor; otherwise, the solution is Λx = mx/ gcd bx, mx, which yields bxλx mod mx = 0. 4 The previous remark implies that the problem has a solution for any d 1. 5 We will see that the solution Λx of the problem is unique up to a scale factor Proposition in Section V and deg Λx deg mx d by 4 in Section VI. 6 In consequence of, coefficients b l of bx with and coefficients m l of mx with l < d deg mx 3 l < d deg mx are irrelevant for the solution Λx: these coefficients do not affect 1 since bxλx mod mx = bxλx qxmx 5

2 with deg qx < deg Λx deg mx d. Such irrelevant coefficients may be set to zero without affecting the solution Λx. B. Application to the Standard Key Equation The standard key equation for decoding Reed-Solomon codes [] [5], [13] is SxΛx Γx mod x n k, 6 where n and k are the blocklength and the dimension of the code, respectively, and where Sx is a given syndrome polynomial with deg Sx < n k. The desired solution is a pair Γx and Λx 0 such that deg Γx < deg Λx n k/. The problem of finding such a pair Γx and Λx translates into a Partial-Inverse Problem with bx = Sx, mx = x n k, and d = n k/. Because of, the resulting Λx deg Λx n k/, and we have Γx = SxΛx mod x n k. If the number of errors does not exceed n k/, the condition deg Γx < deg Λx will then be satisfied automatically. III. THE ALGORITHM The Partial-Inverse Problem as stated in Section I can be solved by the following algorithm. Proposed Algorithm: Input: bx, mx, and d as in the problem statement. Output: Λx as in the problem statement. 1 if deg bx < d begin return Λx := 1 3 end 4 Λ 1 x := 0, d 1 := deg mx, κ 1 := lcf mx 5 Λ x := 1, d := deg bx, κ := lcf bx 6 loop begin 7 Λ 1 x := κ Λ 1 x κ 1 x d1 d Λ x 8 d 1 := deg bxλ 1 x mod mx 9 if d 1 < d begin 10 return Λx := Λ 1 x 11 end 1 κ 1 := lcf bxλ 1 x mod mx 13 if d 1 < d begin 14 Λ 1 x, Λ x := Λ x, Λ 1 x 15 d 1, d := d, d 1 16 κ 1, κ := κ, κ 1 17 end 18 end Note that lines simply swap Λ 1 x with Λ x, d 1 with d, and κ 1 with κ. The only actual computations are in lines 7 and 8. The correctness of this algorithm will be proved in Section VI. In particular, we will see that the value of d 1 is reduced in every execution of line 8. Note that lines 8 and 1 do not require the computation of the entire polynomial bxλ 1 x mod mx. Indeed, lines 8 1 can be replaced by the following loop: Equivalent Alternative to Lines 8 1: 31 repeat 3 d 1 := d if d 1 < d begin 34 return Λx := Λ 1 x 35 end 36 κ 1 := coefficient of x d1 in bxλ 1 x mod mx 37 until κ 1 0 In the special case where mx = x ν, line 36 amounts to 41 κ 1 := b d1 Λ b d1 1Λ b d1 τ Λ 1 τ with τ = deg Λ 1 x and where b l = 0 for l < 0. In the other special case where mx = x n 1 as in 10 below, line 36 becomes 51 κ 1 := b d1 Λ b [d1 1]Λ b [d1 τ]λ 1 τ with b [l] = b l mod n. In both cases, the proposed algorithm looks very much like, and is as efficient as, the Berlekamp- Massey algorithm [6]. IV. DECODING REED-SOLOMON CODES VIA AN ALTERNATIVE KEY EQUATION Decoding Reed-Solomon codes up to half the minimum distance can be reduced rather directly to the Partial-Inverse Problem of Section I as follows. Let F be a finite field, let β 0,..., β n 1 be n different elements of F, let mx = n 1 l=0 x β l, let F [x]/mx be the ring of polynomials modulo mx, and let ψ be the evaluation mapping ψ : F [x]/mx F n : ax aβ 0,..., aβ n 1, 7 which is a ring isomorphism. A Reed-Solomon code with blocklength n and dimension k may be defined as {c = c 0,..., c n F n : deg ψ 1 c < k}, 8 usually with the additional condition that β l = α l for l = 0,..., n 1, 9 where α F is a primitive n-th root of unity. The condition 9 implies mx = x n 1 10 and turns ψ into a discrete Fourier transform [4]. However, 9 and 10 will not be required below. Let y = y 0,..., y n 1 F n be the received word, which we wish to decompose into y = c + e 11 where c C is a codeword and where the Hamming weight of e = e 0,..., e n 1 F n is as small as possible.

3 Let Cx = ψ 1 c, and analogously Ex = ψ 1 e and Y x = ψ 1 y. Clearly, we have deg Cx < k and deg Ex < deg mx = n. For any e F n, we define the error locator polynomial Λ e x = x β l. 1 l {0,..., n 1} e l 0 Clearly, deg Λ e x = w H e and ExΛ e x mod mx = Theorem 1 Alternative Key Equation. If w H e n k, then the error locator polynomial Λ e x deg Y xλ e x mod mx < n n k 14 Conversely, for any y and e F n and t R with w H e t n k, 15 if some nonzero Λx F [x] with deg Λx t deg Y xλx mod mx < n t, 16 then Λx is a multiple of Λ e x. The proof is not difficult, but omitted due to lack of space. We thus arrive at the following decoding procedure: 1 Compute Y x = ψ 1 y. Run the algorithm of Section III with bx = Y x and d = n+k. If w He n k, then the polynomial Λx returned by the algorithm equals Λ e x up to a scale factor. 3 Complete decoding by any standard method [4] or by means of Proposition 1 below. Note that in Step, because of 3, coefficients Y l of Y x with { k, if n k is even l < l min = 17 k + 1, if n k is odd are irrelevant for finding Λx and can be set to zero. The remaining coefficients Y l are syndromes since C l = 0 and Y l = E l for l l min. As mentioned, decoding can be completed by the following proposition: Proposition 1. If Λx is a nonzero multiple of Λ e x with deg Λx n k, then Cx = Y xλx mod mx Λx Proof: If Λx has the stated properties, then Y xλx mod mx 18 = CxΛx mod mx + ExΛx mod mx 19 = CxΛx, 0 where the second term in 19 vanishes because of 13. Note that computing the numerator of 18 may be viewed as continuing the algorithm of Section III line 36 with frozen Λ 1 x = Λx. V. KEY ELEMENTS OF THE PROOF We now turn to the proof of the algorithm proposed in Section III. In this section, we discuss some key elements of the proof; the actual proof will then be given in Section VI. The pivotal part of the algorithm is line 7, which is explained by the following simple lemma. The corresponding statement for the Berlekamp-Massey algorithm is the twowrongs-make-a-right lemma, so called by J. L. Massey. Lemma 1. Let mx be a polynomial over F with deg mx 1. For further polynomials bx, Λ 1 x, Λ x F [x], let r 1 x = bxλ 1 x mod mx, 1 r x = bxλ x mod mx, d 1 = deg r 1 x, κ 1 = lcf r 1 x, d = deg r x, κ = lcf r x, and assume d 1 d 0. Then Λx = κ Λ 1 x κ 1 x d1 d Λ x 3 deg bxλx mod mx < d 1. 4 Proof: From 3, we obtain rx = bxλx mod mx 5 = κ r 1 x κ 1 x d1 d r x 6 by the natural ring homomorphism F [x] F [x]/mx. It is then obvious from 6 that deg rx < deg r 1 x = d 1. A similar argument proves Proposition Uniqueness of Solution. The solution Λx of the Partial-Inverse Problem of Section I is unique up to a scale factor. Proof: Let Λ 1 x and Λ x be two solutions of the problem, which implies deg Λ 1 x = deg Λ x 0. Define r 1 x and r x as in 1 and and consider Λx = lcf Λ x Λ 1 x lcf Λ 1 x Λ x. 7 Then rx = bxλx mod mx 8 = lcf Λ x r 1 x lcf Λ 1 x r x, 9 which implies that Λx also 1. But 7 implies deg Λx < deg Λ 1 x, which is a contradiction unless Λx = 0. Thus Λx = 0, which means that Λ 1 x and Λ x are equal up to a scale factor. Definition Minimal Partial Inverse: For fixed nonzero bx and mx F [x] with deg bx < deg mx, a nonzero polynomial Λx F [x] is a minimal partial inverse of bx if deg bxλ 1 x mod mx deg bxλx mod mx 30 with Λ 1 x 0 implies deg Λ 1 x deg Λx.

4 The following lemma is the counterpart to Theorem 1 of [6]. Lemma Degree Change Lemma. For fixed nonzero bx and mx F [x] with deg bx < deg mx, let Λx be a minimal partial inverse of bx and let If rx = bxλx mod mx. 31 deg Λx deg mx deg rx, 3 then any nonzero polynomial Λ 1 x F [x] such that deg bxλ 1 x mod mx < deg rx 33 deg Λ 1 x deg mx deg rx. 34 The proof is given below. Corollary: Assume everything as in Lemma including 3 and 33. If 34 is satisfied with equality, then Λ 1 x is also a minimal partial inverse of bx. Proof of Lemma : Assume that Λ 1 x is a nonzero polynomial that 33, i.e., the degree of r 1 x = bxλ 1 x mod mx 35 deg r 1 x < deg rx. 36 Multiplying 31 by Λ 1 x and 35 by Λx yields Λ 1 xrx Λxr 1 x mod mx. 37 If we assume both 3 and contrary to 34 then 37 reduces to deg Λ 1 x < deg mx deg rx, 38 Λ 1 xrx = Λxr 1 x. 39 But then 36 implies deg Λ 1 x < deg Λx, which is impossible because Λx is a minimal partial inverse. Thus 3 and 38 cannot hold simultaneously. VI. PROOF OF THE PROPOSED ALGORITHM We now prove the correctness of the algorithm proposed in Section III. To this end, we restate the algorithm with added assertions as follows. Proposed Algorithm Restated: 1 if deg bx < d begin return Λx := 1 3 end 4 Λ 1 x := 0, d 1 := deg mx, κ 1 := lcf mx 5 Λ x := 1, d := deg bx, κ := lcf bx 6 loop begin Assertions: d 1 > d d A.1 deg Λ x = deg mx d 1 A. > deg Λ 1 x A.3 Λ x is a minimal partial inverse A.4 7 repeat 8 Λ 1 x := κ Λ 1 x κ 1 x d1 d Λ x Assertions: degbxλ 1 x mod mx < d 1 A.5 deg Λ 1 x = deg mx d A.6 > deg Λ x A.7 9 d 1 := deg bxλ 1 x mod mx 10 if d 1 < d begin Assertion: Λ 1 x is a min. partial inverse A.8 11 return Λx := Λ 1 x 1 end 13 κ 1 := lcf bxλ 1 x mod mx 14 until d 1 < d Assertion: Λ 1 x is a minimal partial inverse 15 Λ 1 x, Λ x := Λ x, Λ 1 x 16 d 1, d := d, d 1 17 κ 1, κ := κ, κ 1 18 end A.9 Note the added inner repeat loop lines 7 14, which does not change the algorithm but helps to state its proof. Throughout the algorithm except at the very beginning, before the first execution of lines 9 and 13, d 1, d, κ 1, and κ are defined as in Lemma 1, i.e., d 1 = deg r 1 x, κ 1 = lcf r 1 x, d = deg r x, and κ = lcf r x for r 1 x and r x as in 1 and. Assertions A.1 A.4 are easily verified, both from the initialization and from A.6, A.7, and A.9. As for A.5, after the very first execution of line 8, we still have d 1 = deg mx from line 4, which makes A.5 obvious. For all later executions of line 8, A.5 follows from Lemma 1. As for A.6 and A.7, we note that line 8 changes the degree of Λ 1 x as follows: Upon entering the repeat loop, line 8 increases the degree of Λ 1 to deg Λ x + d 1 d = deg mx d 40 > deg Λ x, 41 which follows from A.1 A.3. Subsequent executions of line 8 without leaving the repeat loop i.e., without executing lines do not change the degree of Λ 1 x. This follows from the fact that d 1 is smaller than in the first execution while Λ x, d, and κ 0 remain unchanged.

5 Assertion A.9 follows from the Corollary to Lemma with Λx = Λ x and deg rx = d, which applies because d 1 < d and A.6. Because of A.1, the same argument applies also to A.8. Finally, A.1 and A.6 imply that the polynomial Λx returned by the algorithm deg Λx deg mx d. 4 VII. CONCLUSION We have proposed a new algorithm for decoding Reed- Solomon codes and polynomial remainder codes, and for computing inverses in F [x]/mx. In the special case where mx = x ν or mx = x n 1, the proposed algorithm almost coincides with the Berlekamp-Massey algorithm, except that it processes the syndrome in reverse order. APPENDIX: EXTENSION TO POLYNOMIAL REMAINDER CODES Polynomial remainder codes [7], [9] [11] are a class of codes that include Reed-Solomon codes as a special case. We briefly outline how decoding via the alternative key equation of Section IV generalizes to polynomial remainder codes, which can thus be decoded by the algorithm of Section III. Let m 0 x,..., m n 1 x F [x] be relatively prime and let mx = n 1 l=0 m lx. Let R m = F [x]/mx denote the ring of polynomials modulo mx and let R ml = F [x]/m l x. The mapping 7 is generalized to the ring isomorphism ψ : R m R m0... R mn 1 : ax ψa = ψ 0 a,..., ψ n 1 a 43 with ψ l a = ax mod m l x. Following [11], a polynomial remainder code may be defined as {c = c 0,..., c n 1 R m0... R mn 1 : deg ψ 1 c < K} 44 where k 1 K = deg m l x 45 l=0 for some fixed k, 0 < k < n. We also define n 1 N = deg mx = deg m l x. 46 l=0 As in Section IV, let y = c + e be the received word with c C, and let Cx = ψ 1 c, Ex = ψ 1 e, and Y x = ψ 1 y. Clearly, deg Cx < K and deg Ex < N. For such codes, the error locator polynomial Λ e x = m l x 47 l {0,..., n 1} e l 0 and the error factor polynomial [11] Λ f x = mx/ gcd Ex, mx 48 do not, in general, coincide. However, if all moduli m l x are irreducible, then Λ f x = Λ e x. We then have the following generalization of Theorem 1: Theorem. For given y and e with deg Λ f x t N K, assume that some nonzero polynomial Λx with deg Λx t deg Y xλx mod mx < N t. 49 Then Λx is a multiple of Λ f x. Conversely, Λx = Λ f x is a polynomial of the smallest degree that 49. It follows that the decoding procedure of Section IV works also for polynomial remainder codes, except that n, k, and Λ e x are replaced by N, K, and Λ f x, respectively. Moreover, Cx can still be recovered from Λx by means of 18 [11]. REFERENCES [1] I. S. Reed and G. Solomon, Polynominal codes over certain finite fields, J. SIAM, vol. 8, pp , Oct [] E. R. Berlekamp, Algebraic Coding Theory. New York: McGraw-Hill, [3] Y. Sugiyama, M. Kasahara, S. Hirasawa, and T. Namekawa, A method for solving key equation for decoding Goppa codes, Information and Control, vol. 7, pp , [4] R. E. Blahut, Algebraic Codes for Data Transmission. Cambridge University Press, Cambridge, UK, 003. [5] R. M. Roth, Introduction to Coding Theory. New York: Cambridge University Press, 006. [6] J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Information Theory, vol. 15, pp. 1-17, May [7] A. Shiozaki, Decoding of redundant residue polynomial codes using Euclid s algorithm, IEEE Trans. Information Theory, vol. 34, pp , Sep [8] S. Gao, A new algorithm for decoding Reed-Solomon codes, in Communications, Information and Network Security, V. Bhargava, H. V. Poor, V. Tarokh, and S.Yoon, Eds. Norwell, MA: Kluwer, 003, vol. 71, pp [9] J. J. Stone, Multiple-burst error correction with the Chinese Remainder Theorem, J. SIAM, vol. 11, pp , Mar [10] J.-H. Yu and H.-A. Loeliger, On irreducible polynomial remainder codes, IEEE Int. Symp. on Information Theory, Saint Petersburg, Russia, July 31 Aug. 5, 011. [11] J.-H. Yu and H.-A. Loeliger, On polynomial remainder codes, [1] J. L. Dornstetter, On the equivalence between Berlekamps s and Euclids s algorithms, IEEE Trans. Information Theory, vol. 33, pp , May [13] P. Fitzpatrick, On the key equation, IEEE Trans. Information Theory, vol. 41, pp , Sep [14] A. E. Heydtmann and J. M. Jensen, On the equivalence of the Berlekamp-Massey and Euclidean algorithms for decoding, IEEE Trans. Information Theory, vol. 46, pp , Nov. 000.

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

Polynomials. Chapter 4

Polynomials. Chapter 4 Chapter 4 Polynomials In this Chapter we shall see that everything we did with integers in the last Chapter we can also do with polynomials. Fix a field F (e.g. F = Q, R, C or Z/(p) for a prime p). Notation

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Journal of ELECTRICAL ENGINEERING, VOL. 54, NO. -2, 2003, 305 30 ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Sergey Egorov Garik Markarian A modification of Blahut procedure

More information

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University

More information

REED-SOLOMON codes are powerful techniques for

REED-SOLOMON codes are powerful techniques for 1 Efficient algorithms for decoding Reed-Solomon codes with erasures Todd Mateer Abstract In this paper, we present a new algorithm for decoding Reed-Solomon codes with both errors and erasures. The algorithm

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x), Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift

More information

Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors

Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors 1 Robust Polynomial Reconstruction via Chinese Remainder Theorem in the Presence of Small Degree Residue Errors Li Xiao and Xiang-Gen Xia arxiv:1703.07907v1 [cs.it] 23 Mar 2017 Abstract Based on unique

More information

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which

More information

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1. Cyclic Codes II Generator Matrix We would now like to consider how the ideas we have previously discussed for linear codes are interpreted in this polynomial version of cyclic codes. Theorem 6: If the

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under

More information

Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields

Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields Self-dual Repeated Root Cyclic and Negacyclic Codes over Finite Fields K. Guenda Faculty of Mathematics USTHB University of Sciences and Technology of Algiers B.P. 32 El Alia, Bab Ezzouar, Algiers, Algeria

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem Chapter 5 The Chinese Remainder Theorem 5.1 Coprime moduli Theorem 5.1. Suppose m, n N, and gcd(m, n) = 1. Given any remainders r mod m and s mod n we can find N such that N r mod m and N s mod n. Moreover,

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2, 4-4 (29) VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code HUANG-CHI CHEN,2, YU-WEN CHANG 3 AND REY-CHUE HWANG Deaprtment of Electrical

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Modified Euclidean Algorithms for Decoding Reed-Solomon Codes

Modified Euclidean Algorithms for Decoding Reed-Solomon Codes Modified Euclidean Algorithms for Decoding Reed-Solomon Codes Dilip V. Sarwate Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

ECEN 604: Channel Coding for Communications

ECEN 604: Channel Coding for Communications ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications

More information

1/30: Polynomials over Z/n.

1/30: Polynomials over Z/n. 1/30: Polynomials over Z/n. Last time to establish the existence of primitive roots we rely on the following key lemma: Lemma 6.1. Let s > 0 be an integer with s p 1, then we have #{α Z/pZ α s = 1} = s.

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Part V. Chapter 19. Congruence of integers

Part V. Chapter 19. Congruence of integers Part V. Chapter 19. Congruence of integers Congruence modulo m Let m be a positive integer. Definition. Integers a and b are congruent modulo m if and only if a b is divisible by m. For example, 1. 277

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

The Golay codes. Mario de Boer and Ruud Pellikaan

The Golay codes. Mario de Boer and Ruud Pellikaan The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after

More information

Complexity Analysis of Reed Solomon Decoding over GF(2 m ) Without Using Syndromes

Complexity Analysis of Reed Solomon Decoding over GF(2 m ) Without Using Syndromes 1 Complexity Analysis of Reed Solomon Decoding over GF( m ) Without Using Syndromes Ning Chen and Zhiyuan Yan Department of Electrical and Computer Engineering Lehigh University, Bethlehem, Pennsylvania

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

Factorization in Polynomial Rings

Factorization in Polynomial Rings Factorization in Polynomial Rings Throughout these notes, F denotes a field. 1 Long division with remainder We begin with some basic definitions. Definition 1.1. Let f, g F [x]. We say that f divides g,

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

Math 312/ AMS 351 (Fall 17) Sample Questions for Final

Math 312/ AMS 351 (Fall 17) Sample Questions for Final Math 312/ AMS 351 (Fall 17) Sample Questions for Final 1. Solve the system of equations 2x 1 mod 3 x 2 mod 7 x 7 mod 8 First note that the inverse of 2 is 2 mod 3. Thus, the first equation becomes (multiply

More information

A CONSTRUCTION FOR ABSOLUTE VALUES IN POLYNOMIAL RINGS. than define a second approximation V 0

A CONSTRUCTION FOR ABSOLUTE VALUES IN POLYNOMIAL RINGS. than define a second approximation V 0 A CONSTRUCTION FOR ABSOLUTE VALUES IN POLYNOMIAL RINGS by SAUNDERS MacLANE 1. Introduction. An absolute value of a ring is a function b which has some of the formal properties of the ordinary absolute

More information

Wilson s Theorem and Fermat s Little Theorem

Wilson s Theorem and Fermat s Little Theorem Wilson s Theorem and Fermat s Little Theorem Wilson stheorem THEOREM 1 (Wilson s Theorem): (p 1)! 1 (mod p) if and only if p is prime. EXAMPLE: We have (2 1)!+1 = 2 (3 1)!+1 = 3 (4 1)!+1 = 7 (5 1)!+1 =

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

The Berlekamp-Massey Algorithm revisited

The Berlekamp-Massey Algorithm revisited The Berlekamp-Massey Algorithm revisited Nadia Ben Atti ( ), Gema M Diaz Toca ( ) Henri Lombardi ( ) Abstract We propose a slight modification of the Berlekamp-Massey Algorithm for obtaining the minimal

More information

Chinese Remainder Theorem

Chinese Remainder Theorem Chinese Remainder Theorem Theorem Let R be a Euclidean domain with m 1, m 2,..., m k R. If gcd(m i, m j ) = 1 for 1 i < j k then m = m 1 m 2 m k = lcm(m 1, m 2,..., m k ) and R/m = R/m 1 R/m 2 R/m k ;

More information

Notes on Systems of Linear Congruences

Notes on Systems of Linear Congruences MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

HOMEWORK 11 MATH 4753

HOMEWORK 11 MATH 4753 HOMEWORK 11 MATH 4753 Recall that R = Z[x]/(x N 1) where N > 1. For p > 1 any modulus (not necessarily prime), R p = (Z/pZ)[x]/(x N 1). We do not assume p, q are prime below unless otherwise stated. Question

More information

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series.

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series. 6 Polynomial Rings We introduce a class of rings called the polynomial rings, describing computation, factorization and divisibility in such rings For the case where the coefficients come from an integral

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Homework 10 M 373K by Mark Lindberg (mal4549)

Homework 10 M 373K by Mark Lindberg (mal4549) Homework 10 M 373K by Mark Lindberg (mal4549) 1. Artin, Chapter 11, Exercise 1.1. Prove that 7 + 3 2 and 3 + 5 are algebraic numbers. To do this, we must provide a polynomial with integer coefficients

More information

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION

MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION 1. Polynomial rings (review) Definition 1. A polynomial f(x) with coefficients in a ring R is n f(x) = a i x i = a 0 + a 1 x + a 2 x 2 + + a n x n i=0

More information

Favorite Topics from Complex Arithmetic, Analysis and Related Algebra

Favorite Topics from Complex Arithmetic, Analysis and Related Algebra Favorite Topics from Complex Arithmetic, Analysis and Related Algebra construction at 09FALL/complex.tex Franz Rothe Department of Mathematics University of North Carolina at Charlotte Charlotte, NC 3

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d 10. Linear congruences In general we are going to be interested in the problem of solving polynomial equations modulo an integer m. Following Gauss, we can work in the ring Z m and find all solutions to

More information

An algorithm for computing minimal bidirectional linear recurrence relations

An algorithm for computing minimal bidirectional linear recurrence relations Loughborough University Institutional Repository An algorithm for computing minimal bidirectional linear recurrence relations This item was submitted to Loughborough University's Institutional Repository

More information

A connection between number theory and linear algebra

A connection between number theory and linear algebra A connection between number theory and linear algebra Mark Steinberger Contents 1. Some basics 1 2. Rational canonical form 2 3. Prime factorization in F[x] 4 4. Units and order 5 5. Finite fields 7 6.

More information

A Fresh Look at the Berlekamp-Massey Algorithm with Application to Low Power BCH decoding Ishai Ilani, Western Digital

A Fresh Look at the Berlekamp-Massey Algorithm with Application to Low Power BCH decoding Ishai Ilani, Western Digital A Fresh ook at the Berlekamp-Massey Algorithm with Application to ow Power BCH decoding Ishai Ilani, Western Digital Abstract BCH codes are gaining renewed attention lately as new applications based on

More information

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

be any ring homomorphism and let s S be any element of S. Then there is a unique ring homomorphism

be any ring homomorphism and let s S be any element of S. Then there is a unique ring homomorphism 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UFD. Therefore

More information

Computing Error Distance of Reed-Solomon Codes

Computing Error Distance of Reed-Solomon Codes Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

MATH 310: Homework 7

MATH 310: Homework 7 1 MATH 310: Homework 7 Due Thursday, 12/1 in class Reading: Davenport III.1, III.2, III.3, III.4, III.5 1. Show that x is a root of unity modulo m if and only if (x, m 1. (Hint: Use Euler s theorem and

More information

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn

Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Homework 7 solutions M328K by Mark Lindberg/Marie-Amelie Lawn Problem 1: 4.4 # 2:x 3 + 8x 2 x 1 0 (mod 1331). a) x 3 + 8x 2 x 1 0 (mod 11). This does not break down, so trial and error gives: x = 0 : f(0)

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

Homework 8 Solutions to Selected Problems

Homework 8 Solutions to Selected Problems Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x

More information

Parity of the Number of Irreducible Factors for Composite Polynomials

Parity of the Number of Irreducible Factors for Composite Polynomials Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

arxiv: v3 [math.nt] 4 Nov 2015

arxiv: v3 [math.nt] 4 Nov 2015 FUNCTION FIELD ANALOGUES OF BANG ZSIGMONDY S THEOREM AND FEIT S THEOREM arxiv:1502.06725v3 [math.nt] 4 Nov 2015 NGUYEN NGOC DONG QUAN Contents 1. Introduction 1 1.1. A Carlitz module analogue of Bang Zsigmondy

More information

Classification of Finite Fields

Classification of Finite Fields Classification of Finite Fields In these notes we use the properties of the polynomial x pd x to classify finite fields. The importance of this polynomial is explained by the following basic proposition.

More information

MODEL ANSWERS TO HWK #10

MODEL ANSWERS TO HWK #10 MODEL ANSWERS TO HWK #10 1. (i) As x + 4 has degree one, either it divides x 3 6x + 7 or these two polynomials are coprime. But if x + 4 divides x 3 6x + 7 then x = 4 is a root of x 3 6x + 7, which it

More information

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990)

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990) (Reprint of pp. 154-159 in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept. 16-22, 1990) SYSTEMATICITY AND ROTATIONAL INVARIANCE OF CONVOLUTIONAL CODES OVER RINGS

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

Chapter 14: Divisibility and factorization

Chapter 14: Divisibility and factorization Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

The converse is clear, since

The converse is clear, since 14. The minimal polynomial For an example of a matrix which cannot be diagonalised, consider the matrix ( ) 0 1 A =. 0 0 The characteristic polynomial is λ 2 = 0 so that the only eigenvalue is λ = 0. The

More information

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,

More information

Math 120 HW 9 Solutions

Math 120 HW 9 Solutions Math 120 HW 9 Solutions June 8, 2018 Question 1 Write down a ring homomorphism (no proof required) f from R = Z[ 11] = {a + b 11 a, b Z} to S = Z/35Z. The main difficulty is to find an element x Z/35Z

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS

LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS 1. The Chinese Remainder Theorem We now seek to analyse the solubility of congruences by reinterpreting their solutions modulo a composite

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

Rings in Coding Theory

Rings in Coding Theory Rings in Coding Theory Steven T. Dougherty July 3, 2013 Cyclic Codes Cyclic Codes were first studied by Prange in 1957. Prange, E. Cyclic error-correcting codes in two symbols. Technical Note TN-57-103,

More information

4 Powers of an Element; Cyclic Groups

4 Powers of an Element; Cyclic Groups 4 Powers of an Element; Cyclic Groups Notation When considering an abstract group (G, ), we will often simplify notation as follows x y will be expressed as xy (x y) z will be expressed as xyz x (y z)

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

DONG QUAN NGOC NGUYEN

DONG QUAN NGOC NGUYEN REPRESENTATION OF UNITS IN CYCLOTOMIC FUNCTION FIELDS DONG QUAN NGOC NGUYEN Contents 1 Introduction 1 2 Some basic notions 3 21 The Galois group Gal(K /k) 3 22 Representation of integers in O, and the

More information

Fast Polynomial Multiplication

Fast Polynomial Multiplication Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution

More information

TC10 / 3. Finite fields S. Xambó

TC10 / 3. Finite fields S. Xambó TC10 / 3. Finite fields S. Xambó The ring Construction of finite fields The Frobenius automorphism Splitting field of a polynomial Structure of the multiplicative group of a finite field Structure of the

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x) Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials

More information

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department

More information

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 3-1974 WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

More information

NOTES ON SIMPLE NUMBER THEORY

NOTES ON SIMPLE NUMBER THEORY NOTES ON SIMPLE NUMBER THEORY DAMIEN PITMAN 1. Definitions & Theorems Definition: We say d divides m iff d is positive integer and m is an integer and there is an integer q such that m = dq. In this case,

More information

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers ALGEBRA CHRISTIAN REMLING 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers by Z = {..., 2, 1, 0, 1,...}. Given a, b Z, we write a b if b = ac for some

More information