Low Correlation Sequences for CDMA
|
|
- Eugenia Jacobs
- 5 years ago
- Views:
Transcription
1 Indian Institute of Science, Bangalore International Networking and Communications Conference Lahore University of Management Sciences
2 Acknowledgement Prof. Zartash Afzal Uzmi, Lahore University of Management Sciences Indian Institute of Science, Bangalore
3 Outline Motivation Binary Sequences Quaternary Sequences
4 Motivation There are a large number of problems in communications that require sets of signals with one or both of the following two properties: each signal in the set is easy to distinguish from a time-shifted version of itself ranging systems, radar systems each signal in the set is easy to distinguish from (a possibly time-shifted version of) every other signal in the set code-division multiple-access (CDMA) communication systems
5 Mean-Squared Difference 1 T Assume the signals to be periodic with common time period T We want to distinguish between a(t) and b(t) We also want to distinguish between a(t) and b(t) Measure of distinguishability is T 0 [b(t) ± a(t)] 2 dt = 1 T { T [b 2 (t) + a 2 (t)] dt ± 2 0 T 0 } a(t)b(t) dt energy in b(t) + energy in a(t) r
6 Cross-correlation function 1/2 r a,b (τ) := T 0 a(t)b(t + τ) dt If a(t) = b(t), we want r a,b (τ) to be small for τ (0, T ) If a(t) b(t), we want r a,b (τ) to be small for τ [0, T ] For complex signals, we replace b(t + τ) by its complex conjugate Assume a(t) and b(t) to be periodic signals, which consist of sequences of elemental time-limited pulses. a(t) := n= x(n)ϕ(t nt c ) where ϕ(t) is the basic pulse waveform and T c is the time duration of this pulse and T c T sequence {x(n)} is periodic
7 Cross-correlation function 2/2 Let N = T /T c. Then, period of {x(n)} divides N. b(t) := y(n)ϕ(t nt c ) n= If τ = mt c N 1 r a,b (τ) = λ x(n) y(n + m) n=0 where the constant λ = Tc 0 ϕ 2 (t) dt
8 Periodic and Aperiodic Correlation Let {u(t)} and {v(t)} be complex valued sequences of period N. Periodic correlation between them: θ u, v (τ) = N 1 t=0 Aperiodic correlation between them: ρ u, v (τ) = min{n 1, N 1 τ} t=max{0, τ} u(t + τ)v (t), 0 τ N 1 u(t + τ)v (t), (N 1) τ N 1
9 An example Let N = 3. θ u,v (0) = u(0)v (0) + u(1)v (1) + u(2)v (2) θ u,v (1) = u(1)v (0) + u(2)v (1) + u(0)v (2) θ u,v (2) = u(2)v (0) + u(0)v (1) + u(1)v (2) ρ u,v ( 2) = u(0)v (2) ρ u,v ( 1) = u(0)v (1) + u(1)v (2) ρ u,v (0) = u(0)v (0) + u(1)v (1) + u(2)v (2) ρ u,v (1) = u(1)v (0) + u(2)v (1) ρ u,v (2) = u(2)v (0)
10 Binary sequences Binary m-sequences Finite Fields Gold sequences
11 Binary m-sequence of Period 7 Let α be a root of x 3 + x + 1 = 0 Let {s(t)} have characteristic polynomial x 3 + x + 1, i.e., s(t + 3) + s(t + 1) + s(t) = 0 i.e., s(t + 3) = s(t + 1) + s(t) Then s(t) = is an m-sequence Periodic autocorrelation 6 θ s (τ) = ( 1) s(t+τ) s(t) = t=0 { 7 τ = 0 (mod 7) 1 else
12 Binary m-sequences 1/2 An irreducible binary polynomial f (x) is said to be primitive if the smallest positive exponent k for which f (x) x k 1 is k = 2 m 1. Let f (x) be a primitive binary polynomial of degree m. For example, when m = 3, the polynomial f (x) = x 3 + x + 1 is primitive since f (x) divides x 7 1 but does not divide x k 1 for any 1 k 6. Let f (x) = m i=0 f i x i and let {s(t)} be a binary sequence satisfying the recursion m f i s(t + i) = 0 i=0 {s(t)} can be generated using an m-bit linear feedback shift register (LFSR). t
13 Binary m-sequences 2/2 f (x) is a primitive polynomial {s(t)} has period 2 m 1. Such a sequence is called a maximum-length LFSR sequence, i.e., an m-sequence. For example, when f (x) = x 3 + x + 1, {s(t)} satisfies the recursion s(t + 3) + s(t + 1) + s(t) = 0 + s(t+3) s(t+2) s(t+1) s(t)
14 Properties of binary m-sequences Periodic autocorrelation function θ s of a binary {0, 1} sequence {s(t)} of period N is defined by N 1 θ s (τ) = ( 1) s(t+τ) s(t) 0 τ N 1 t=0 An m-sequence of period N = 2 m 1 has the following properties: 1. Balance property: In each period of the m-sequence, there are 2 m 1 ones and 2 m 1 1 zeroes. 2. Run property: Every nonzero binary s-tuple, s m occurs 2 m s times and the all-zero tuple occurs 2 m s 1 times. 3. Two-level autocorrelation function: { N τ = 0 θ s (τ) = 1 τ 0
15 Sketch of the proof Property 1 and 2 can be proved using the fact that every m-sequence occurs precisely once in each period of the m-sequence. For Property 3, when τ 0, consider the difference sequence {s(t + τ) s(t)}. 1. This sequence is not the all zero sequence. 2. It satisfies the same recursion as the sequence{s(t)} {s(t + τ) s(t)} {s(t + τ )} for some 0 τ N 1, i.e., it is a different cyclic shift of the m-sequence {s(t)}. 3. Balance property of {s(t + τ )} proves Property 3.
16 Field Axioms Field Axioms Two operations addition and multiplication that satisfy The field axioms are generally written in additive and multiplicative pairs. Name Addition Multiplication Commutativity Associativity Distributivity Identity Inverses SEE ALSO: Algebra, Field Weisstein, Eric W. Field Axioms. From MathWorld A Wolfram Web Resource. REFERENCES:
17 A Finite and an Infinite Field The set R of all real numbers The set F 2 = {0, 1} We shall call this the binary field. 1 1 = = 1 Check that all the field axioms are satisfied.
18 The Field of Complex Numbers Introduce an imaginary element ı such that ı 2 = 1 C = {a + ıb a, b R} (a + ıb)(c + ıd) = (ac + ı(ad + bc) + ı 2 bd) = (ac bd) + ı(ad + bc) Check that all the field axioms are satisfied.
19 The Finite Field of 4 Elements F 4 Introduce an imaginary element α such that α 2 = α 1 F 4 = {a αb a, b F 2 } = {0, 1, α, 1 + α} (a αb)(c αd) = ac α(ad bc) α 2 (bd) = (ac bd) α(ad bc bd) (1 α)(1 α) = (1 1) α(1 1 1) = α (1 α) α = 1 α(1 1) = 1
20 Learn your Tables! addition 0 1 α 1 + α α 1 + α α α α α 1 + α α 1 + α α 1 0 multiplication 0 1 α 1 + α α 1 + α α 0 α 1 + α α α 1 α
21 Representation as powers Since α 2 = 1 + α, we replace (1 + α) by α 2 addition 0 1 α α α α α 2 α α α α α 2 α 2 α 1 0 multiplication 0 1 α α α α 2 α 0 α α 2 1 α 2 0 α 2 1 α
22 Best of both Addition table in terms of 1 + α Multiplication table in terms of α 2 addition 0 1 α 1 + α α 1 + α α α α α 1 + α α 1 + α α 1 0 multiplication 0 1 α α α α 2 α 0 α α 2 1 α 2 0 α 2 1 α
23 The Finite Field of 8 Elements F 8 F 8 = { 0, 1, α, α 2,, α 6} binary addition = 0 α i + α i = 0 α satisfies α 3 + α + 1 = 0 We also have α 7 = 1 Multiplication α 3 α 6 = α 9 = α 2 Addition α 3 + α 6 = (α + 1) + (α 2 + 1) = α 2 + α = α(α + 1) = α 1+3 = α 4
24 The Finite Field of 2 m Elements F 2 m Let f (x) be a binary primitive polynomial of degree m and let α satisfy f (α) = 0. F 2 m = { m 1 i=0 c i α i c i {0, 1} } = {0} { α i 0 i 2 m 2 } In F 2 m, f (x) has one zero, viz. α. F 2 m has the remaining m 1 zeroes of f (x) as well. { } α 2j j = 1, 2,..., m 1
25 Binary m-sequence in terms of the trace function Power series expansion gives us that the m-sequence {s(t)} has a unique expression of the form s(t) = m 1 i=0 c i α 2i t = m 1 i=0 ( c0 α t) 2 i = tr(c 0 α t ) where tr( ) : F 2 m F 2 is the trace function given by tr(x) = m 1 It turns out that every m-sequence {b(t)} of period 2 m 1 can be expressed in the form i=0 x 2i b(t) = tr(aα dt ) where a F 2 m and 1 d 2 m 2 is an integer such that (d, 2 m 1) = 1.
26 Trace Function over F 8 maps from F 8 {0, 1} tr(x) = x + x 2 + x 4 tr(α) = α + α 2 + α 4 = (α + α 2 ) + α(1 + α) = (α + α 2 ) + (α + α 2 ) = 0 {tr(α t )} 6 t=0 = is m-sequence s(t) { tr(α 3t ) } 6 t=0 = is another m-sequence u(t) Periodic crosscorrelation θ s,u (τ) = 6 ( 1) s(t+τ) u(t) { 5, 1, 3} t=0
27 Family of Gold Sequences Contains the 9 sequences F = {s(t)} {u(t)} {u(t + τ) + s(t) 0 τ 6} θmax = max { θ a,b (τ) a, b F either a b or τ 0} = 5 General parameters Family Period Size θmax Gold 2 n 1, n odd 2 n n+1 Gold sequences have been employed in GPS satellites
28 General case Let {u(t)} be an m-sequence of period 2 m 1, m odd. Let {v(t)} = {u(dt)}, where d = 2 k + 1 for some k such that (k, m) = 1. Then G is a family of 2 m + 1 cyclically distinct sequences {g i (t)}, 0 i 2 m given by g i (t) = tr(α t + α i α dt ), 0 i 2 m 2, g 2 m 1(t) = tr(α t ), g 2 m(t) = tr(α dt ).
29 Correlation properties The cross correlation of sequences in G assumes values from the set { 1, 1 ± 2 m+1 } It can be shown that the Gold family G is optimal in the sense of having the lowest value of θmax possible for a family of binary sequences for the given length N = 2 m 1 and family size M = 2 m + 1.
30 Quaternary Sequences Galois Rings Family A
31 A Polynomial with Z 4 coefficients Z 4 = Z/4Z = {0, 1, 2, 3} = integers (modulo 4) Let f (x) = x 3 + x + 1 F 2 [x] g(x 2 ) = ( 1)f (x)f ( x) (mod 4) = ( 1)(x 3 + x + 1)( x 3 x + 1) = x 6 + 2x 4 + x g(x) = x 3 + 2x 2 + x + 3 g(x) = x 3 + x + 1 = f (x) (mod 2) So g(x) is irreducible (mod 2) and therefore irreducible (mod 4).
32 Sequence Family Generated by g(x) Let A be the family of all nonzero sequences having characteristic polynomial g(x) = x 3 + 2x 2 + x + 3, i.e., A = {s(t) s(t + 3) + 2s(t + 2) + s(t + 1) + 3s(t) = 0 (mod 4)} Turns out A contains 9 sequences of period 7: + X X s(t+3) s(t+2) s(t+1) s(t)
33 Better than Gold! Periodic (quaternary) correlations of family A defined by 6 θ s,u (τ) = (i) s(t+τ) u(t), i = 1. t=0 are better than those of Gold sequences! Family Period Size θmax Gold 2 n 1 2 n n+1 n odd Z 4 Family A 2 n 1 2 n n any n (Of course, A uses a larger alphabet)
34 Galois Ring of 64 elements GR(4, 3) Let β be a root of g(x), i.e., β 3 + 2β 2 + β + 3 = 0 (mod 4) β has multiplicative order 7 since g(x 2 ) = ( 1)f (x)f ( x). { 2 } GR(4, 3) = c i β i c i Z 4 i=0 An alternate description: GR(4, 3) = {x + 2y x, y T } where T = {0} {1, β, β 2,..., β 6 } is the set of Teichmuller representatives. T F 8 under (mod 2) arithmetic
35 Addition in the Galois Ring GR(4, 3) = { x + 2y x, y T = {0, 1, β,..., β 6 } } Let z 1 + 2z 2 = (x 1 + 2y 1 ) + (x 2 + 2y 2 ) z 1 = x 1 + x 2 (mod 2) and z 2 = y 1 + y 2 + x 1 x 2 (mod 2) Eg. z 1 + 2z 2 = (β 3 + 2β 2 ) + (β 6 + 2β 5 ) z 1 = β 3 + β 6 (mod 2) = α 3 + α 6 (mod 2) = α 4 z 1 = β 4 z 2 = β 2 + β 5 + β 9 (mod 2) = α 2 + α 5 + α (mod 2) = 1 (mod 2) z 2 = 1 Thus, (β 3 + 2β 2 ) + (β 6 + 2β 5 ) = β (Multiplication (x 1 + 2y 1 ) (x 2 + 2y 2 ) is now straightforward)
36 Family A and the Trace Function The trace function on GR(4, 3) maps GR(4, 3) Z 4 T (x + 2y) = (x + x 2 + x 4 ) + 2(y + y 2 + y 4 ) x T (x) β 4 β 2 β 2 β 5 β 6 β 3 1 t T (β t ) Trace description of Family A: A = {T (β t )} { T ([1 + 2δ]β t ) δ T }
37 Galois Ring GR(4, m) 1/2 Let f (x) be a primitive polynomial over F 2 of degree m. Let g(x 2 ) = ( 1) m f (x) f ( x) GR(4, m) = Z 4 [x]/ (f (x)) GR(4, m) = Z 4 [ζ] where ζ belongs to some extension ring of Z 4 and satisfies f (ζ) = 0
38 Galois Ring GR(4, m) 2/2 Set T = {0} {1, ζ, ζ 2,..., ζ N 1 } where N = 2 m 1 is the order of ζ in GR(4, m). The trace function T ( ) : GR(4, m) Z 4 is defined by T (x + 2y) = m 1 i=0 ( x 2i + 2y 2i ), x, y T
39 Family A 1/2 Let T = {γ i i = 1, 2,..., 2 m } be a labeling of the elements in T. Let s i (t) = T ([1 + 2γ i ]ζ t ), 1 i 2 m, s 2 m +1(t) = 2T (ζ t ). Then the sequences {s i (t)} are a set of cyclically distinct representatives for Family A.
40 Family A 2/2 If i j or τ 0, the correlation values of sequences in Family A belong to the set } θ ij (τ) { 1, 1 ± 2 m 1 2 ± ı2 m 1 2, m odd or θ ij (τ) } { 1, 1 ± 2 m m 2, 1 ± ı2 2, m even θ max m As compared to the binary family of Gold sequences, Family A offers a lower value of θ max for the same period and family size.
41 Further Reading D. V. Sarwate and M. B. Pursley, Crosscorrelation properties of pseudorandom and related sequences, Proc. IEEE, vol. 68, pp , May T. Helleseth and P.V. Kumar, Sequences with low correlation, in Handbook of Coding Theory, V.S. Pless and W.C. Huffman, Eds., Amsterdam: Elsevier, 1998.
Helleseth, T. & Kumar, P.V. Pseudonoise Sequences Mobile Communications Handbook Ed. Suthan S. Suthersan Boca Raton: CRC Press LLC, 1999
Helleseth, T. & Kumar, P.V. Pseudonoise Sequences Mobile Communications Handbook Ed. Suthan S. Suthersan Boca Raton: CRC Press LLC, 1999 c 1999byCRCPressLLC Pseudonoise Sequences Tor Helleseth University
More informationCorrelation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields
Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Zilong Wang and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,
More informationOn the Correlation Distribution of Delsarte Goethals Sequences
On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set
More informationIEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography
IEEE P1363 / D13 (Draft Version 13). Standard Specifications for Public Key Cryptography Annex A (Informative). Number-Theoretic Background. Copyright 1999 by the Institute of Electrical and Electronics
More information50 Years of Crosscorrelation of m-sequences
50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation
More information17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8
Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................
More informationTopic 3. Design of Sequences with Low Correlation
Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4
More informationSome Results on the Arithmetic Correlation of Sequences
Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are
More informationIEEE P1363 / D9 (Draft Version 9). Standard Specifications for Public Key Cryptography
IEEE P1363 / D9 (Draft Version 9) Standard Specifications for Public Key Cryptography Annex A (informative) Number-Theoretic Background Copyright 1997,1998,1999 by the Institute of Electrical and Electronics
More informationRings. EE 387, Notes 7, Handout #10
Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationDesign of Pseudo-Random Spreading Sequences for CDMA Systems
Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationCryptography Lecture 3. Pseudorandom generators LFSRs
Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationTrace Representation of Legendre Sequences
C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and
More informationGalois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.
Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationECEN 5682 Theory and Practice of Error Control Codes
ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the
More informationChapter 4 Finite Fields
Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number
More informationOn a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code
680 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 [13] B. R. McDonald, Finite Rings with Identity. New York: Marcel Dekker, 1974. [14] F. J. MacWilliams and N. J. A. Sloane, The Theory
More informationCommutative Rings and Fields
Commutative Rings and Fields 1-22-2017 Different algebraic systems are used in linear algebra. The most important are commutative rings with identity and fields. Definition. A ring is a set R with two
More informationHomework Problems, Math 134, Spring 2007 (Robert Boltje)
Homework Problems, Math 134, Spring 2007 (Robert Boltje) 1. Write a computer program that uses the Euclidean Algorithm to compute the greatest common divisor d of two natural numbers a and b and also integers
More informationGalois Theory TCU Graduate Student Seminar George Gilbert October 2015
Galois Theory TCU Graduate Student Seminar George Gilbert October 201 The coefficients of a polynomial are symmetric functions of the roots {α i }: fx) = x n s 1 x n 1 + s 2 x n 2 + + 1) n s n, where s
More informationDesign of Signal Sets with Low Intraference for CDMA Applications in Networking Environment
Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1,
More informationSinger and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few
New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationOn the Primitivity of some Trinomials over Finite Fields
On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationCyclic Codes from the Two-Prime Sequences
Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes
More informationFault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes
Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More information10.1 Complex Arithmetic Argand Diagrams and the Polar Form The Exponential Form of a Complex Number De Moivre s Theorem 29
10 Contents Complex Numbers 10.1 Complex Arithmetic 2 10.2 Argand Diagrams and the Polar Form 12 10.3 The Exponential Form of a Complex Number 20 10.4 De Moivre s Theorem 29 Learning outcomes In this Workbook
More informationCodes and Rings: Theory and Practice
Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R
More informationChapter 4 Mathematics of Cryptography
Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept
More informationOn the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin
On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period
More informationarxiv: v1 [cs.it] 31 May 2013
Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date
More informationChapter 3. Rings. The basic commutative rings in mathematics are the integers Z, the. Examples
Chapter 3 Rings Rings are additive abelian groups with a second operation called multiplication. The connection between the two operations is provided by the distributive law. Assuming the results of Chapter
More informationLinear Feedback Shift Registers
Linear Feedback Shift Registers Pseudo-Random Sequences A pseudo-random sequence is a periodic sequence of numbers with a very long period. Golomb's Principles G1: The # of zeros and ones should be as
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationCyclic codes. I give an example of a shift register with four storage elements and two binary adders.
Good afternoon, gentleman! Today I give you a lecture about cyclic codes. This lecture consists of three parts: I Origin and definition of cyclic codes ;? how to find cyclic codes: The Generator Polynomial
More informationDirect-Sequence Spread-Spectrum
Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.
More informationAlgebraic structures I
MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-13 Recap Divisibility Prime Number Theorem Euclid s Lemma Fundamental Theorem of Arithmetic Euclidean Algorithm Basic Notions - Section
More informationSerge Ballif January 18, 2008
ballif@math.psu.edu The Pennsylvania State University January 18, 2008 Outline Rings Division Rings Noncommutative Rings s Roots of Rings Definition A ring R is a set toger with two binary operations +
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationAlgebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.
Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for
More informationInteger Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform
Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationFoundations of Cryptography
Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 7 1 of 18 Cosets Definition 2.12 Let G be a
More informationGroups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002
Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary
More informationContinuing discussion of CRC s, especially looking at two-bit errors
Continuing discussion of CRC s, especially looking at two-bit errors The definition of primitive binary polynomials Brute force checking for primitivity A theorem giving a better test for primitivity Fast
More informationAlgebra SEP Solutions
Algebra SEP Solutions 17 July 2017 1. (January 2017 problem 1) For example: (a) G = Z/4Z, N = Z/2Z. More generally, G = Z/p n Z, N = Z/pZ, p any prime number, n 2. Also G = Z, N = nz for any n 2, since
More informationNonlinear Cyclic Codes over Z 4 whose Nechaev-Gray Images are Binary Linear Cyclic Codes
International Mathematical Forum, 1, 2006, no. 17, 809-821 Nonlinear Cyclic Codes over Z 4 whose Nechaev-Gray Images are Binary Linear Cyclic Codes Gerardo Vega Dirección General de Servicios de Cómputo
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationHomework problem: Find all digits to the repeating decimal 1/19 = using a calculator.
MAE 501 March 3, 2009 Homework problem: Find all digits to the repeating decimal 1/19 = 0.052631578947368421 using a calculator. Katie s way On calculator, we find the multiples of 1/19: 1/19 0.0526315789
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access 4.4 m-sequence Binary Random Sequence X -4 X -3 X -2 X - X -0 X X 2 X 3 X 4 Coin-flipping sequence H H T H H T H T T Bernoullitrials/sequence 0 0 0 0 Binary (indp.) random
More informationAlgebra Review. Instructor: Laszlo Babai Notes by Vincent Lucarelli and the instructor. June 15, 2001
Algebra Review Instructor: Laszlo Babai Notes by Vincent Lucarelli and the instructor June 15, 2001 1 Groups Definition 1.1 A semigroup (G, ) is a set G with a binary operation such that: Axiom 1 ( a,
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationNonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY
Nonlinear Shi, Registers: A Survey and Open Problems Tor Helleseth University of Bergen NORWAY Outline ntroduc9on Nonlinear Shi> Registers (NLFSRs) Some basic theory De Bruijn Graph De Bruijn graph Golomb
More informationPractice problems for first midterm, Spring 98
Practice problems for first midterm, Spring 98 midterm to be held Wednesday, February 25, 1998, in class Dave Bayer, Modern Algebra All rings are assumed to be commutative with identity, as in our text.
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationCSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function
CSCE 564, Fall 2001 Notes 6 Page 1 13 Random Numbers The great metaphysical truth in the generation of random numbers is this: If you want a function that is reasonably random in behavior, then take any
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation
More informationProblem 4 (Wed Jan 29) Let G be a finite abelian group. Prove that the following are equivalent
Last revised: May 16, 2014 A.Miller M542 www.math.wisc.edu/ miller/ Problem 1 (Fri Jan 24) (a) Find an integer x such that x = 6 mod 10 and x = 15 mod 21 and 0 x 210. (b) Find the smallest positive integer
More informationObjective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them.
ECE 7670 Lecture 5 Cyclic codes Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. Reading: Chapter 5. 1 Cyclic codes Definition
More informationD-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.
D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial
More informationAperiodic correlation and the merit factor
Aperiodic correlation and the merit factor Aina Johansen 02.11.2009 Correlation The periodic correlation between two binary sequences {x t } and {y t } of length n at shift τ is defined as n 1 θ x,y (τ)
More informationKevin James. MTHSC 412 Section 3.1 Definition and Examples of Rings
MTHSC 412 Section 3.1 Definition and Examples of Rings A ring R is a nonempty set R together with two binary operations (usually written as addition and multiplication) that satisfy the following axioms.
More informationFields in Cryptography. Çetin Kaya Koç Winter / 30
Fields in Cryptography http://koclab.org Çetin Kaya Koç Winter 2017 1 / 30 Field Axioms Fields in Cryptography A field F consists of a set S and two operations which we will call addition and multiplication,
More informationTHE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - SPRING SESSION ADVANCED ALGEBRA II.
THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - SPRING SESSION 2006 110.402 - ADVANCED ALGEBRA II. Examiner: Professor C. Consani Duration: 3 HOURS (9am-12:00pm), May 15, 2006. No
More informationNumber Axioms. P. Danziger. A Group is a set S together with a binary operation (*) on S, denoted a b such that for all a, b. a b S.
Appendix A Number Axioms P. Danziger 1 Number Axioms 1.1 Groups Definition 1 A Group is a set S together with a binary operation (*) on S, denoted a b such that for all a, b and c S 0. (Closure) 1. (Associativity)
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationGALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)
GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over
More information1, for s = σ + it where σ, t R and σ > 1
DIRICHLET L-FUNCTIONS AND DEDEKIND ζ-functions FRIMPONG A. BAIDOO Abstract. We begin by introducing Dirichlet L-functions which we use to prove Dirichlet s theorem on arithmetic progressions. From there,
More informationNew chaotic binary sequences with good correlation property using logistic maps
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735. Volume 5, Issue 3 (Mar. - Apr. 013), PP 59-64 New chaotic binary with good correlation property using
More informationIntroduction to Information Security
Introduction to Information Security Lecture 5: Number Theory 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Information and Communications University Contents 1. Number Theory Divisibility
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationMT5836 Galois Theory MRQ
MT5836 Galois Theory MRQ May 3, 2017 Contents Introduction 3 Structure of the lecture course............................... 4 Recommended texts..................................... 4 1 Rings, Fields and
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues
More informationMath /Foundations of Algebra/Fall 2017 Foundations of the Foundations: Proofs
Math 4030-001/Foundations of Algebra/Fall 017 Foundations of the Foundations: Proofs A proof is a demonstration of the truth of a mathematical statement. We already know what a mathematical statement is.
More informationSolutions of exercise sheet 11
D-MATH Algebra I HS 14 Prof Emmanuel Kowalski Solutions of exercise sheet 11 The content of the marked exercises (*) should be known for the exam 1 For the following values of α C, find the minimal polynomial
More informationFinite fields: some applications Michel Waldschmidt 1
Ho Chi Minh University of Science HCMUS Update: 16/09/2013 Finite fields: some applications Michel Waldschmidt 1 Exercises We fix an algebraic closure F p of the prime field F p of characteristic p. When
More informationChapter XI Novanion rings
Chapter XI Novanion rings 11.1 Introduction. In this chapter we continue to provide general structures for theories in physics. J. F. Adams proved in 1960 that the only possible division algebras are at
More informationIntroduction to finite fields
Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in
More informationTomáš Madaras Congruence classes
Congruence classes For given integer m 2, the congruence relation modulo m at the set Z is the equivalence relation, thus, it provides a corresponding partition of Z into mutually disjoint sets. Definition
More information2 so Q[ 2] is closed under both additive and multiplicative inverses. a 2 2b 2 + b
. FINITE-DIMENSIONAL VECTOR SPACES.. Fields By now you ll have acquired a fair knowledge of matrices. These are a concrete embodiment of something rather more abstract. Sometimes it is easier to use matrices,
More informationComputer Algebra for Computer Engineers
p.1/23 Computer Algebra for Computer Engineers Galois Fields: GF(2 m ) Priyank Kalla Department of Electrical and Computer Engineering University of Utah, Salt Lake City p.2/23 Galois Fields A Galois Field
More informationEssential idempotents in group algebras and in Coding Theory
in group algebras and in Coding Theory César Polcino Milies Universidade de São Paulo and Universidade Federal do ABC NON COMMUTATIVE RINGS AND APPLICATIONS IV, LENS, 2015 Definition A linear code C F
More informationAlgebra Homework, Edition 2 9 September 2010
Algebra Homework, Edition 2 9 September 2010 Problem 6. (1) Let I and J be ideals of a commutative ring R with I + J = R. Prove that IJ = I J. (2) Let I, J, and K be ideals of a principal ideal domain.
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationSample algebra qualifying exam
Sample algebra qualifying exam University of Hawai i at Mānoa Spring 2016 2 Part I 1. Group theory In this section, D n and C n denote, respectively, the symmetry group of the regular n-gon (of order 2n)
More informationMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography
More informationFIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS
FIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS LINDSAY N. CHILDS Abstract. Let G = F q β be the semidirect product of the additive group of the field of q = p n elements and the cyclic
More information