On Syndrome Decoding of Chinese Remainder Codes
|
|
- Christina Reeves
- 6 years ago
- Views:
Transcription
1 On Syndrome Decoding of Chinese Remainder Codes Wenhui Li Institute of, June 16, 2012 Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2012) Pomorie, Bulgaria Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 1
2 Outline 1 Chinese Remainder Codes Chinese Remainder Theorem Chinese Remainder Codes 2 Decoding Algorithms Error Locator Syndrome 3 Conclusion and Future Work Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 2
3 Outline 1 Chinese Remainder Codes Chinese Remainder Theorem Chinese Remainder Codes 2 Decoding Algorithms Error Locator Syndrome 3 Conclusion and Future Work Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 3
4 Chinese Remainder Theorem Chinese Remainder Theorem (CRT) Let 0 < p 1 < p 2 < < p n be the set P of relatively prime integers. If a 1, a 2,..., a n (0 a i < p i ) is a sequence of integers, then there exists a positive integer x solving [x] p1 = a 1, [x] p2 = a 2,..., [x] pn = a n. [x] 3 = 2 [x] 5 = 3 [x] 7 = 2 x? Denote x a i mod p i by [x] pi = a i. Furthermore, x = n i=1 a i N p i The integer x is unique when x < N = n i=1 p i. [ (N ) ] 1 p i p i. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 4
5 Chinese Remainder Theorem Chinese Remainder Theorem (CRT) Let 0 < p 1 < p 2 < < p n be the set P of relatively prime integers. If a 1, a 2,..., a n (0 a i < p i ) is a sequence of integers, then there exists a positive integer x solving [x] p1 = a 1, [x] p2 = a 2,..., [x] pn = a n. [x] 3 = 2 [x] 5 = 3 [x] 7 = 2 x? Denote x a i mod p i by [x] pi = a i. Furthermore, x = n i=1 a i N p i The integer x is unique when x < N = n i=1 p i. [ (N ) ] 1 p i p i. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 4
6 Chinese Remainder Codes Definition Given P and integer k < n, a Chinese remainder code CR(P; n, k) having cardinality 0 K = k i=1 p i N and length n over alphabets P is defined as follows: CR(P; n, k) = {([C] p1,..., [C] pn ) : C N and C < K}. The Chinese remainder code.... is constructed by the Chinese remainder theorem... is exploited in theoretical computer science... is used for computation reduction. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 5
7 Chinese Remainder Codes Definition Given P and integer k < n, a Chinese remainder code CR(P; n, k) having cardinality 0 K = k i=1 p i N and length n over alphabets P is defined as follows: CR(P; n, k) = {([C] p1,..., [C] pn ) : C N and C < K}. The Chinese remainder code.... is constructed by the Chinese remainder theorem... is exploited in theoretical computer science... is used for computation reduction. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 5
8 Properties Parameters Length: n, Hamming distance: d = n k + 1. Transform Numerical domain: C, E, R = C + E N, and 0 E, R < N Vector form: c, e, r, and r i = [c i + e i ] pi for i = 1,..., n Convolution Property The product of two integer numbers modulo N corresponds to elementwise multiplication of two vectors: a A, b B c i = a i b i mod p i, c C = AB mod N. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 6
9 Outline 1 Chinese Remainder Codes Chinese Remainder Theorem Chinese Remainder Codes 2 Decoding Algorithms Error Locator Syndrome 3 Conclusion and Future Work Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 7
10 Toy Example The word we receive: If r i, r j are erroneous: r = (r 1,..., r i,..., r j,..., r n ) r = (r 1,..., r i,..., r j,..., r n ) Consider the polyalphabetic set P for allocation. Unique representation: Λ = p i p j. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 8
11 Toy Example The word we receive: If r i, r j are erroneous: r = (r 1,..., r i,..., r j,..., r n ) r = (r 1,..., r i,..., r j,..., r n ) Consider the polyalphabetic set P for allocation. Unique representation: Λ = p i p j. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 8
12 Toy Example The word we receive: If r i, r j are erroneous: r = (r 1,..., r i,..., r j,..., r n ) r = (r 1,..., r i,..., r j,..., r n ) Consider the polyalphabetic set P for allocation. Unique representation: Λ = p i p j. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 8
13 Error Locator Let J be the set of error positions (c j r j, j J ), the error locator Λ is defined as follows Λ := j J p j. { Λ λ E e λi = 0, e i 0 if i J, λ i 0, e i = 0 Otherwise. The product of the error locator and the error value is a multiple of N: Λ E 0 mod N The product of the error locator and [E] K is a multiple of K: Λ [E] K 0 mod K Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 9
14 The GRS Decoder An error correction decoder was proposed by Goldreich, Ron and Sudan, given a parameter D < N/(K 1). Algorithm 1: The GRS Decoder for Error Correction Input: The set P, the received word (r 1,..., r n ), N, K, D Output: The message C 1. Using the CRT compute 0 R < N such that r i = [R] pi. 2. Find integers Λ, Ω such that 1 Λ D, 0 Ω < N/D, ΛR Ω mod N. 3. Output Ω/Λ if it is an integer. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 10
15 Properties The GRS decoder gives the transmitted message C directly. The logarithm of the integer parameter D is the error correcting radius in the weighted metric. Decoding Radius N If D = K, log p k+1 t (n k), log p k+1 + log p n or less precisely, log p 1 t (n k). log p 1 + log p n Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 11
16 Syndrome Similar to decoding Reed Solomon codes, we decode the Chinese remainder codes in two steps. Find the error positions, Estimate the error values. Syndrome We define the syndrome S of a received word r R as follows: S = R [R] K. K The syndrome can be also written as where S = E [E] K + δ K (C, E)K K { 0 if 0 [E]K < K C; δ K (C, E) = 1 otherwise. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 12
17 Syndrome Similar to decoding Reed Solomon codes, we decode the Chinese remainder codes in two steps. Find the error positions,(difficult) Estimate the error values.(easy) Syndrome We define the syndrome S of a received word r R as follows: S = R [R] K. K The syndrome can be also written as where S = E [E] K + δ K (C, E)K K { 0 if 0 [E]K < K C; δ K (C, E) = 1 otherwise. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 12
18 Syndrome Similar to decoding Reed Solomon codes, we decode the Chinese remainder codes in two steps. Find the error positions,(difficult) Estimate the error values.(easy) Syndrome We define the syndrome S of a received word r R as follows: S = R [R] K. K The syndrome can be also written as where S = E [E] K + δ K (C, E)K K { 0 if 0 [E]K < K C; δ K (C, E) = 1 otherwise. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 12
19 Key Equation The Syndrome.... of a codeword c is zero... depends only on the error word... reduces computation. The key equation is defined as follows: Key Equation Λ S Ω mod N K with Ω < Λ < N K 1. Given S, N and K, one can solve the key equation and obtain Λ. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 13
20 Decoding Algorithm Algorithm 2: The Syndrome based Decoder for Error Correction Input: The set P, the received word (r 1,..., r n ), N, K Output: The message C 1. Using the CRT compute 0 R < N from r, then compute S. 2. Find integers Λ such that Ω < Λ < N K 1, ΛS Ω mod N K. 3. Factorize Λ to obtain error positions. 4. Reconstruct the massage C from non error positions by CRT. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 14
21 Decoding Radius The key equation and the condition is equivalent to ΛR = ΛC mod N (from Algorithm 1). Same error correcting radius The number of correctable errors t is at most Decoding Radius log p 1 t (n k). log p 1 + log p n Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 15
22 Syndrome based Decoding We can solve the key equation by extended Euclidean algorithm. Algorithm 3: On Syndrome Decoding by Extended Euclidean Algorithm Input: Syndrome S calculated by, N, K Output: Error locator Λ 1. Solve Λ S Ω mod N/K by extended Euclidean algorithm iteratively to find the greatest common divisor of S and N/K, which is Λ i S + t i (N/K) = Ω i ; 2. Stop when Λ i < Ω i and Λ i+1 > Ω i+1 ; 3. Output Λ = Λ i and by factorization Λ we know the error positions and the number of errors. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 16
23 Outline 1 Chinese Remainder Codes Chinese Remainder Theorem Chinese Remainder Codes 2 Decoding Algorithms Error Locator Syndrome 3 Conclusion and Future Work Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 17
24 Conclusion and Future Work Conclusion The error locator and the syndrome for the Chinese remainder codes are introduced. A key equation is derived. An algorithm for solving the key equation is proposed. Future work Analysis of complexity of the decoding algorithm. Extension to interleaved Chinese remainder codes, which allows collaboratively decoding beyond half the minimum distance. Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 18
25 Thank you! Wenhui Li On Syndrome Decoding of Chinese Remainder Codes 19
Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May
Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which
More informationOn Irreducible Polynomial Remainder Codes
2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering
More informationComputing over Z, Q, K[X]
Computing over Z, Q, K[X] Clément PERNET M2-MIA Calcul Exact Outline Introduction Chinese Remainder Theorem Rational reconstruction Problem Statement Algorithms Applications Dense CRT codes Extension to
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationThe security of RSA (part 1) The security of RSA (part 1)
The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More informationNotes on Systems of Linear Congruences
MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the
More informationLow-complexity error correction in LDPC codes with constituent RS codes 1
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationOn the List and Bounded Distance Decodability of Reed-Solomon Codes
On the List and Bounded Distance Decodability of Reed-Solomon Codes Qi Cheng School of Computer Science The University of Oklahoma Norman, OK 73019, USA qcheng@cs.ou.edu Daqing Wan University of California
More informationCross-Error Correcting Integer Codes over Z 2
Cross-Error Correcting Integer Codes over Z 2 m Anna-Lena Trautmann Department of Electrical & Computer Systems Eng., Monash University Department of Electrical & Electronic Engineering, University of
More informationNumbers. Çetin Kaya Koç Winter / 18
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 18 Number Systems and Sets We represent the set of integers as Z = {..., 3, 2, 1,0,1,2,3,...} We denote the set of positive integers modulo n as
More informationError Correction Review
Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols
More informationSkew cyclic codes: Hamming distance and decoding algorithms 1
Skew cyclic codes: Hamming distance and decoding algorithms 1 J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro Department of Algebra and CITIC, University of Granada Department of Computer Sciences and
More informationMathematics of Cryptography
Modulo arithmetic Fermat's Little Theorem If p is prime and 0 < a < p, then a p 1 = 1 mod p Ex: 3 (5 1) = 81 = 1 mod 5 36 (29 1) = 37711171281396032013366321198900157303750656 = 1 mod 29 (see http://gauss.ececs.uc.edu/courses/c472/java/fermat/fermat.html)
More informationOn the minimum distance of LDPC codes based on repetition codes and permutation matrices
On the minimum distance of LDPC codes based on repetition codes and permutation matrices Fedor Ivanov Email: fii@iitp.ru Institute for Information Transmission Problems, Russian Academy of Science XV International
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More information8+4 0 mod (12), mod (12), mod (12), mod (12), mod (12).
Decimal Codes Massoud Malek To make error correcting codes easier to use and analyze, it is necessary to impose some algebraic structure on them. It is especially useful to have an alphabet in which it
More informationCommunications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved
Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming
More informationMATH 145 Algebra, Solutions to Assignment 4
MATH 145 Algebra, Solutions to Assignment 4 1: a) Find the inverse of 178 in Z 365. Solution: We find s and t so that 178s + 365t = 1, and then 178 1 = s. The Euclidean Algorithm gives 365 = 178 + 9 178
More informationNUMBER THEORY AND CODES. Álvaro Pelayo WUSTL
NUMBER THEORY AND CODES Álvaro Pelayo WUSTL Talk Goal To develop codes of the sort can tell the world how to put messages in code (public key cryptography) only you can decode them Structure of Talk Part
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More information1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007
1 Reed Solomon Decoder 6.375 Final Project Group 3 Abhinav Agarwal S Branavan Grant Elliott 14 th May 2007 2 Outline Error Correcting Codes Mathematical Foundation of Reed Solomon Codes Decoder Architecture
More informationCoding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014
Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often
More informationKnow the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].
The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More information[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives
[Part 2] Asymmetric-Key Encipherment Mathematics of Cryptography Forouzan, B.A. Cryptography and Network Security (International Edition). United States: McGraw Hill, 2008. Objectives To introduce prime
More informationMATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.
MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same
More informationAN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION
AN ALGEBRAIC PROOF OF RSA ENCRYPTION AND DECRYPTION Recall that RSA works as follows. A wants B to communicate with A, but without E understanding the transmitted message. To do so: A broadcasts RSA method,
More informationSolutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2)
Solutions or answers to Final exam in Error Control Coding, October, Solution to Problem a) G(D) = ( +D, +D + D ) b) The rate R =/ and ν i = ν = m =. c) Yes, since gcd ( +D, +D + D ) =+D + D D j. d) An
More informationAdaptive decoding for dense and sparse evaluation/interpolation codes
Adaptive decoding for dense and sparse evaluation/interpolation codes Clément PERNET INRIA/LIG-MOAIS, Grenoble Université joint work with M. Comer, E. Kaltofen, J-L. Roch, T. Roche Séminaire Calcul formel
More informationGeneralized Reed-Solomon Codes
Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,
More informationA multiple access system for disjunctive vector channel
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 269 274 A multiple access system for disjunctive vector channel Dmitry Osipov, Alexey
More informationNumber Theory and Group Theoryfor Public-Key Cryptography
Number Theory and Group Theory for Public-Key Cryptography TDA352, DIT250 Wissam Aoudi Chalmers University of Technology November 21, 2017 Wissam Aoudi Number Theory and Group Theoryfor Public-Key Cryptography
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationAlgebra for error control codes
Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22
More informationMoments of orthogonal arrays
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory Moments of orthogonal arrays Peter Boyvalenkov, Hristina Kulina Pomorie, BULGARIA, June 15-21, 2012 Orthogonal arrays H(n,
More informationIterated Encryption and Wiener s attack on RSA
Iterated Encryption Euler s function Euler s function: φ(n) = {1 x n : gcd(x, n) = 1} Theorem (Euler) If n is a positive integer and m is a positive integer coprime to n then m φ(n) mod n = 1. Iterated
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationPhysical Layer and Coding
Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:
More information: Error Correcting Codes. November 2017 Lecture 2
03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial
More informationPMA225 Practice Exam questions and solutions Victor P. Snaith
PMA225 Practice Exam questions and solutions 2005 Victor P. Snaith November 9, 2005 The duration of the PMA225 exam will be 2 HOURS. The rubric for the PMA225 exam will be: Answer any four questions. You
More informationMTH 346: The Chinese Remainder Theorem
MTH 346: The Chinese Remainder Theorem March 3, 2014 1 Introduction In this lab we are studying the Chinese Remainder Theorem. We are going to study how to solve two congruences, find what conditions are
More informationMultiple coverings of the farthest-off points and multiple saturating sets in projective spaces
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in
More informationReverse Berlekamp-Massey Decoding
Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationIntroduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.
Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information
More informationNumber Theory A focused introduction
Number Theory A focused introduction This is an explanation of RSA public key cryptography. We will start from first principles, but only the results that are needed to understand RSA are given. We begin
More informationChapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005
Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each
More informationChapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives
More information2012 IEEE International Symposium on Information Theory Proceedings
Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationA Readable Introduction to Real Mathematics
Solutions to selected problems in the book A Readable Introduction to Real Mathematics D. Rosenthal, D. Rosenthal, P. Rosenthal Chapter 7: The Euclidean Algorithm and Applications 1. Find the greatest
More informationSoft-decision Decoding of Chinese Remainder Codes
Soft-decision Decoding of Chinese Remainder Codes Venkatesan Guruswami Amit Sahai Ý Madhu Sudan Þ Abstract Given Ò relatively prime integers Ô Ô Ò and an integer Ò, the Chinese Remainder Code, ÊÌ É ÔÔÒ,
More informationHamming Codes 11/17/04
Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but
More information} has dimension = k rank A > 0 over F. For any vector b!
FINAL EXAM Math 115B, UCSB, Winter 2009 - SOLUTIONS Due in SH6518 or as an email attachment at 12:00pm, March 16, 2009. You are to work on your own, and may only consult your notes, text and the class
More informationOn the minimum distance of LDPC codes based on repetition codes and permutation matrices 1
Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationMathematics of Cryptography Part I
CHAPTER 2 Mathematics of Crptograph Part I (Solution to Practice Set) Review Questions 1. The set of integers is Z. It contains all integral numbers from negative infinit to positive infinit. The set of
More informationBerlekamp-Massey decoding of RS code
IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture
More informationNumber Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.
CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,
More informationModular numbers and Error Correcting Codes. Introduction. Modular Arithmetic.
Modular numbers and Error Correcting Codes Introduction Modular Arithmetic Finite fields n-space over a finite field Error correcting codes Exercises Introduction. Data transmission is not normally perfect;
More information2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.
CHAPTER 2 INTRODUCTION TO NUMBER THEORY ANSWERS TO QUESTIONS 2.1 A nonzero b is a divisor of a if a = mb for some m, where a, b, and m are integers. That is, b is a divisor of a if there is no remainder
More informationHomework #2 solutions Due: June 15, 2012
All of the following exercises are based on the material in the handout on integers found on the class website. 1. Find d = gcd(475, 385) and express it as a linear combination of 475 and 385. That is
More informationChuck Garner, Ph.D. May 25, 2009 / Georgia ARML Practice
Some Chuck, Ph.D. Department of Mathematics Rockdale Magnet School for Science Technology May 25, 2009 / Georgia ARML Practice Outline 1 2 3 4 Outline 1 2 3 4 Warm-Up Problem Problem Find all positive
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationLattices and Lattice Codes
Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad
More informationError Correction Methods
Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.
More informationECEN 604: Channel Coding for Communications
ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications
More informationIntroduction to Convolutional Codes, Part 1
Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes
More informationECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes
Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier
More informationToday. Wrapup of Polynomials...and modular arithmetic. Coutability and Uncountability.
Today. Wrapup of Polynomials...and modular arithmetic. Coutability and Uncountability. Reed-Solomon code. Problem: Communicate n packets m 1,...,m n on noisy channel that corrupts k packets. Reed-Solomon
More informationMATH 433 Applied Algebra Lecture 22: Review for Exam 2.
MATH 433 Applied Algebra Lecture 22: Review for Exam 2. Topics for Exam 2 Permutations Cycles, transpositions Cycle decomposition of a permutation Order of a permutation Sign of a permutation Symmetric
More informationDefinition For a set F, a polynomial over F with variable x is of the form
*6. Polynomials Definition For a set F, a polynomial over F with variable x is of the form a n x n + a n 1 x n 1 + a n 2 x n 2 +... + a 1 x + a 0, where a n, a n 1,..., a 1, a 0 F. The a i, 0 i n are the
More informationDoubleSparseCompressedSensingProblem 1
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 181 185 DoubleSparseCompressedSensingProblem 1 Grigory
More informationA list-decodable code with local encoding and decoding
A list-decodable code with local encoding and decoding Marius Zimand Towson University Department of Computer and Information Sciences Baltimore, MD http://triton.towson.edu/ mzimand Abstract For arbitrary
More informationOptical Storage Technology. Error Correction
Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event
More information4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE
4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,
More informationELEC 405/ELEC 511 Error Control Coding and Sequences. Hamming Codes and the Hamming Bound
ELEC 45/ELEC 5 Error Control Coding and Sequences Hamming Codes and the Hamming Bound Single Error Correcting Codes ELEC 45 2 Hamming Codes One form of the (7,4,3) Hamming code is generated by This is
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More information10 Problem 1. The following assertions may be true or false, depending on the choice of the integers a, b 0. a "
Math 4161 Dr. Franz Rothe December 9, 2013 13FALL\4161_fall13f.tex Name: Use the back pages for extra space Final 70 70 Problem 1. The following assertions may be true or false, depending on the choice
More informationCOMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635
COMP239: Mathematics for Computer Science II Prof. Chadi Assi assi@ciise.concordia.ca EV7.635 The Euclidean Algorithm The Euclidean Algorithm Finding the GCD of two numbers using prime factorization is
More informationComputing Error Distance of Reed-Solomon Codes
Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics
More informationChinese Remainder Theorem
Chinese Remainder Theorem Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 16 The Chinese Remainder Theorem Some cryptographic algorithms work with two (such as RSA) or more
More informationAnd for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)
Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials
More informationAlgebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,
More informationthen the hard copy will not be correct whenever your instructor modifies the assignments.
Assignments for Math 2030 then the hard copy will not be correct whenever your instructor modifies the assignments. exams, but working through the problems is a good way to prepare for the exams. It is
More informationReed-Solomon Error-correcting Codes
The Deep Hole Problem Matt Keti (Advisor: Professor Daqing Wan) Department of Mathematics University of California, Irvine November 8, 2012 Humble Beginnings Preview of Topics 1 Humble Beginnings Problems
More informationAnswers and Solutions to (Even Numbered) Suggested Exercises in Sections of Grimaldi s Discrete and Combinatorial Mathematics
Answers and Solutions to (Even Numbered) Suggested Exercises in Sections 6.5-6.9 of Grimaldi s Discrete and Combinatorial Mathematics Section 6.5 6.5.2. a. r = = + = c + e. So the error pattern is e =.
More informationNonexistence of (9, 112, 4) and (10, 224, 5) binary orthogonal arrays
Nonexistence of (9, 112, 4) and (10, 224, 5) binary orthogonal arrays Tanya Marinova, Maya Stoyanova Faculty of Mathematics and Informatics, Sofia University St. Kliment Ohridski, Sofia, Bulgaria 15 th
More informationThe Golay codes. Mario de Boer and Ruud Pellikaan
The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after
More informationInformation redundancy
Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationA Lifting Decoding Scheme and its Application to Interleaved Linear Codes
Author manuscript, published in "International Symposium on Information Theory (2012) 96-100" DOI : 10.1109/ISIT.2012.6284707 A Lifting Decoding Scheme and its Application to Interleaved Linear Codes Guillaume
More informationELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes
ELEC 405/ELEC 511 Error Control Coding Hamming Codes and Bounds on Codes Single Error Correcting Codes (3,1,3) code (5,2,3) code (6,3,3) code G = rate R=1/3 n-k=2 [ 1 1 1] rate R=2/5 n-k=3 1 0 1 1 0 G
More informationChapter 7: Channel coding:convolutional codes
Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication
More informationOptimum Soft Decision Decoding of Linear Block Codes
Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is
More information