Topic 3. Design of Sequences with Low Correlation

Size: px
Start display at page:

Download "Topic 3. Design of Sequences with Low Correlation"

Transcription

1 Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4 Case Study: Examples of Orthogonal Codes 5 Applications in CDMA G. Gong

2 M-sequences and Quadratic Residue Sequences A. M-sequence Generator: Input: - A finite field F = GF(q); n n" - f ( x) = x " cn" x " L" cx " c, ci F, a primitive polynomial over F. Output: a = a, a, a2,l an m-sequence over F of period q n -. Procedure (F, f(x), a): Compute : a quit i n- + n = c ja j+ i, i j= =,, G. Gong 2

3 B. Profile of Randomsess of Binary M-sequences of Degree n Period 2 n Balance Run property 2 n- s and 2 n- - s () For k n-2 runs of s ( s) of length k occurs 2 n-2-k times (2) Zero run of length n- occurs once; no runs of s of length n- (3) Runs of s of length n occurs once As good as it could be Span n property or ideal n-tuple distribution Autocorrelation Linear span and ρ Each nonzero n-tuple occurs once 2-level n, the normalized linear span n " = 2 n Only need to know 2n bits to reconstruct the entire G. Gong 3

4 Property (Binary m-sequences). Let an LFSR have a primitive characteristic polynomial f(x). Then there exists an initial state for the LFSR such that the corresponding output sequence a = {a i }, i.e., an m-sequence, satisfies a i = a 2i, i =,,. In other words, there exists an initial state of the LFSR such that the output sequence is identical to its 2-decimation G. Gong 4

5 C. Quadratic Residue (or Legendre) Sequences Note. Starting from now, we only consider binary sequences. Some concepts in number theory: Quadratic Residue: Let p be an odd prime number. A number i: < i < p is called a quadratic residue modulo p if there is an integer x for which x 2 i mod p. Fact. A set defined by QR = {i 2 mod p < i (p-)/2} contains all quadratic residue modulo p. The Legendre symbol: The Legendre symbol (i/p) is defined as follows: * ( ) i p ' % & # if i is a quadratic residue modulo p = " $ G. Gong 5

6 Quadratic Sequence Generator: Input: A prime number p with p 3 mod 4 Output: a = a, a,... a binary sequence of period p Procedure(p, a): + i ( Compute :) & and set a * p ' a i = and set $ + i (, ) & = * p = ' # + i (, ) & = % " * p ' Return: a G. Gong 6

7 @ G. Gong 7 Example 8. Let p =. Then 2,, = " # $ % & ' = " # $ % & ' = " # $ % & ' p p p 5, 4, 3 = " # $ % & = " # $ % & = " # $ % & p p p 8, 7, 6 = " # $ % & ' = " # $ % & ' = " # $ % & ' p p p, 9 = " # $ % & ' = " # $ % & ' p p So, a has period and a = (). For p = 3, then a = () which has period 3. Verify it for the autocorrelation

8 Profile of Quadratic Residue (or Legendre) Sequences:. Period: p 2. Balance: (p+)/2 's and (p-)/2 's One should know entire 3. 2-level autocorrelation bits to reconstruct the 4. Linear span: (p-)/2 sequence 5. N(QR,p), the number of shift distinct quadratic sequences modulo p, N(QR, p) = 2. Sound randomness However, it cannot be implemented efficiently Compare it with G. Gong 8

9 2 Multiple Trace Term Sequences and WG Sequences A. Three-Term Sequences Construction A: For odd n 5, and n = 2m+ with period N = 2 n, let b = {b i } be an m-sequence of period N with the constant-on-coset property. Assume q = 2 m + and q 2 =2 m + 2 m- +. Define a i = b i + b q i +b q 2 i, i =,, L Then a = {a i } is a binary sequence with 2-level G. Gong 9

10 LFSR LFSR 2 + Output LFSR 3 Architecture for Implementation of the 3-Term G. Gong

11 Profile of 3-term sequences. Period: 2 n 2. Balance: 2 n- 's and 2 n- 's 3. 2-level autocorrelation 4. Linear span: 3n 5. N(T3, n), the number of shift distinct 3-term sequences, n N( T3, n) = "(2 ) / G. Gong

12 LFSR + LFSR 2 + Output + LFSR3 + Implementation of 3-term sequences of n = 5: (, 5, G. Gong 2

13 LFSR + LFSR 2 + Output + LFSR3 + Implementation of 3-term sequences of n = 7: (, 9, G. Gong 3

14 5-Term Sequences and WG Transformation Sequences Some property of finite fields Some property of finite G. Gong 4

15 B. 5-Term Sequences and WG Transformation Sequences Some property of finite fields Trace Functions Definition. A trace function Tr (x) of GF(pn ) is a function from GF(p n ) to GF(p) defined as follows Tr( x) = x + x p + L+ x p n n Tr( x) : GF( p ) GF( p) Property. (a) The trace function is a linear function. (b) p p p n ( x + y) = x + y," x, y GF( p ). Primitive Elements of Finite Fields Let the finite field GF(p n ) be defined by a primitive polynomial over GF(p) with degree n. Then the defining element is called a primitive element in GF(p n G. Gong 5

16 5-Term Sequences and WG Transformation G. Gong 6

17 @ G. Gong 7

18 f 2 (x) = f 3 (x) = f 5 (x) = Remark. The initial states of the LFSRs should satisfy the constan-on-coset G. Gong 8

19 There are two methods to implement a WG sequence. For small n, a WG sequence can be implemented by Method, as shown G. Gong 9

20 Remark: WG sequences have important applications in generating key streams in stream ciphers because their good randomness G. Gong 2

21 3. Gold-pair, Kasami Sequences, and Interleaved Sequences Signal Set Let s j = ( s j,, s j,, L, s j, v" ), j < r be r shift-distinct p-ary sequences of period v, S = r { s, s, L, s } Let # = max C, (" ) for any " < v, i, j r, s < i s j " v where if i= j. If " c where c > is a constant, then we say that the set S has low cross-correlation. In this case, we call S a ( v, r, ) signal set. When we consider the cross correlation of two sequences s i, s j in S, we simply write C i, j (τ) for ( ). C si, s G. Gong 2

22 A. Gold-pair Sequences Construction: Let a = {a i } be an m-sequence of degree n odd. Select d as one of the following values: - d =2 k + (Gold exponents), (k, n) =, k < (n + )/2. - d = 2 2k - 2 k + (Kasami Large Set Exponents), (k, n) =, k < (n + )/2. n - d = (the Welch Conjecture Exponent) n For " j < 2, let s j = {s j, i } be a binary sequence whose elements are given by Then s j is called a Gold-pair sequence. s j,i = a i + a j +di, i =,,L,2 n " 2 Let s 2 n " = a and s 2 n = a (d ). Set S = { s j j 2 n }. Then S is called a Gold-pair (signal) set.

23 Note that we can also write s j as a sum of a shift of a and b = a (d), i.e., s j = L j n a + b, " j < 2. Remark. A useful formula for the relationship between the cross correlation and the Hamming weight. Let a and b be two binary sequences with period 2 n -, then the cross correlation between these two sequences can be determined by the Hamming weight of a + L τ b as follows: C a,b n ( ) = 2 " " 2w( a + L ( b)) where w(.) denotes the Hamming weight of the G. Gong 23

24 Profile of the Gold-pair Signal Set: n n ( n+)/ 2. S is a (2, 2 +, + 2 ) -signal set. 2. The cross correlation C i, j (τ) of any two sequences s i and s j in S is three-valued and it takes values: ( n+ )/ 2, ± 2 3. In S, there are 2 n- +2 sequences are balanced, i.e., each has 2 n- 's. Moreover, each sequence in S has its Hamming weight taking one of the three values: n n ( )/ 2 2, 2 ± 2 n 4. b is also an m-sequence, i.e., (d, 2 n - )=. 5. Linear span is either 2n or G. Gong 24

25 LFSR Implementation:. Select n odd, f(x), a primitive polynomial of degree n over GF(2), as a characteristic polynomial of LFSR. 2. Select d and compute the characteristic polynomial of the LFSR2, which is the minimal polynomial of d-decimation of a sequence generated by LFSR. 3. We obtain all sequences in S by varying different initial states of the LFSR. LFSR: varying initial state LFSR2: a fixed initial state LFSR implementation of Gold pair G. Gong 25

26 Example. Design of a (3, 33, 9) Gold-pair signal set. Method : LFSR Implementation: 5 3. Select f ( x) = x + x +, a primitive polynomial over GF(2) of degree 5 as the characteristic polynomial of LFSR. 2. Select d = = 5 and compute the minimal polynomial of in GF( 2 5 ), defined by f(α) =. This gives g( x) = x + x + x + x + Use g(x) as the characteristic polynomial of LFSR2. 3. Fixing an initial state of one these two LFSRs and varying another, we get all 33 shift distinct sequences in G. Gong 26

27 Method 2: Software Implementation 5 3. Select f ( x) = x + x +, a primitive polynomial over GF(2) of degree 5 to generate a sequence a: 2. Select d = = 5 and perform 5-desimation on a, we obtain (5), i 5i b = a b = a, i =,,L 3. Generate L i ( a) + b, i < 3 Together with a and b, this gives all 33 sequences in G. Gong 27

28 : : 2: 3: 4: 5: 6: 7: 8: 9: : : 2: 3: 4: G. Gong 28

29 6: 7: 8: 9: 2: 2: 22: 23: 24: 25: 26: 27: 28: 29: G. Gong 29

30 Profile of S Period 3. There are 33 shift distinct sequences in S. The cross correlation of any two sequences in S only takes three values: -, -9, 7. S is a (3, 33, 9)-signal set. There 8 sequences in S are balanced, i.e. each has weight 6. The rest 5 has their weights either 2 or 2. Linear span or G. Gong 3

31 B. Kasami Sequences Construction: Let n = 2m and and a = {a i } be an m-sequence of degree n. Let s j = {s j, i } be a binary sequence whose elements are given by s j,i = a i + a j +di, i =,, L where d = 2 m +. Let s 2 m " = a and S = {s j " j " 2 m #}. Then S is called a Kasami small signal set. In other words, if we write then b = a (d ) s j = a + L j b, " j < 2 m G. Gong 3

32 Profile of the Kasami small signal set. The Kasami small signal set S is a signal set. (2 n, 2,+ 2 n / 2 n / 2 ) 2. The cross correlation C i, j (τ) of any two sequences s i and s j in S is three-valued and it takes values: n / 2, ± 2 3. b is an m-sequence of period 2 n/ Linear span: 3n/2 or G. Gong 32

33 Example 2. Design a (63, 8, 9) Kasami signal set. LFSR Implementation: - Select n = 6 and f(x) = x 6 + x + ; set α be a root of f(x) in GF(2 6 ). - Compute the minimal polynomial of α 9 which gives g(x) = x 3 + x 2 +. c b a a, b, and c are taken as or The correlation values are: -, 7, - G. Gong 33

34 b = a = a + b = Complement the columns corresponding to s in b: Write it row by row from the most left upper corner: s G. Gong 34

35 C. Interleaved Sequences Definition of Interleaved Sequences Constructions of Signal Sets from Interleaved Sequences Profiles of the Interleaved Signal Sets G. Gong 35

36 @ G. Gong 36 Definition of Interleaved Sequences Let be a binary sequence of period st. We can write the elements of the sequence A into a s by t array as follows: ),,, ( = st u u u L u " # $ $ $ $ $ $ % & ' + ' + ' ' ' + + ' + + ' ) ( ) ( ) ( t t s t s t s t t t t t t t t t u u u u u u u u u u u u L M L L L If all these column sequences are phase shifts of a binary sequence, say a, of period s, then we say that u is an (s, t)-interleaved sequence. Let u j denote the jth column of the above array. Then we have where L is the left shift operator and the e j are nonnegative integers with e j <s. t j L i e j < = (a), u

37 Example 3. Let e = (3, 6, 5, 5, 2, 3, 5) and a = (,,,,,, ), a binary m-sequence of period 7. Then a (7, 7) array is as follows: A (7, 7) interleaved sequence u G. Gong 37

38 Procedure : Constructions of (v 2, v+, 2v+3) signal sets. Choose a = (a, a,..., a v- ) and b = (b, b,..., b v- ), two binary sequence of period v with 2-level auto-correlation. 2. Choose e =(e, e,..., e v- ), an integer sequence whose elements taken from Z v, a set consisting of integers modulo v. 3. Construct u = ( u, u, L, u ) v 2, a (v, v) interleaved sequence whose e jth column sequence is given Lby j (a). 4. Set = ( s, s, L, s ), j v whose elements are defined by " s j j, j, 2 < j, v j s j, i = ui + bj+ i, or s = u + L ( b), j < v 5. A signal set S is defined by S = {u, s j : j =,,..., G. Gong 38

39 Example 4. Let v = 7.. Choose a = ( ) and b = ( ), m-sequences of period Choose e = (3, 6, 5, 5, 2, 3, 5). 3. Construct the interleaved sequence u: 4. Construct s j : j =,,..., 6. The column sequences of s can be obtained from the sequence u by complement of columns of u whose indexes correspond to 's in the sequence b; the column sequences of s obtained from u by complement of those in the sequence b with a phase shift, and so on. u = b = s = u + b: s = u + Lb G. Gong 39

40 s = u + b = s = u + b = s 2 = u + L 2 b = s 3 = u +L 3 b = s 4 = u +L 4 b = s 5 = u +L 5 b = s 6 = u +L 6 b = 5. Set S = {u, s, s,..., s 6 G. Gong 4

41 Constructions for (v 2, v+, 2v+3) signal sets (Cont.) Theorem. If the shift sequence e satisfies the following condition, (*) { e j " e j + s j < v " s} = v " s, for all s < v then S is a (v 2, v+, 2v+3) signal set. Moreover, the cross-correlation and out of phase auto-correlation values of any two sequences in S belong to the set {, -v, v+2, 2v+3, -2v-}. * Gong (995) introduced the idea of Procedure for constructing ((2 n -) 2, 2 n, +2 n ) signal sets where v = 2 n - and both a and b are m-sequences of period 2 n -, and proved Theorem. We can verify that the exponent sequence in Example 4 satisfies (*). From Theorem, it is a (49, 8, 7) signal G. Gong 4

42 Shortened M-sequence Construction Procedures for constructing the exponent sequence e which satisfies the condition (*). Construction ( Shortened M-sequence Construction) ((2 n -) 2, 2 n, +2 n+ ) signal set:. Choose a primitive polynomial f(x) over GF(2) of degree 2n as the characteristic polynomial of an LFSR and generate GF(2 2n ) by f(α)=. 2. Generate an m-sequence {w i } of period 2 2n - by the LFSR which satisfies the constant-on-coset property. 3. Arrange {w i } into an (r, v) array where r = 2 n + and v = 2 n -: # w w 2 L w s"2 w s" & % ( w s+ w s+2 L w s+s"2 w 2s" W = % ( % M ( % ( $ w (v")s+ w (v")s+2 L w (v")s+s"2 w vs" G. Gong 42

43 Let U be a matrix obtained from W by deleting the first and the last columns, then U gives an interleaved sequence u of period (2 n -) 2 which has the base sequence a which is r-decimation of b and the exponent sequence satisfied (*). 4. Select b a binary 2-level sequence of period 2 n -. Continue the Procedure, we get the signal set G. Gong 43

44 Example 5. Interleaved Generator (49, 8, 7):. Choose a primitive polynomial f(x) = x 6 +x + for generating m- sequence {w i } with the initial state (,,,,, ) and arrange it into a 9 by 7 array W: Cut Cut 2. By deleting the first and the last columns of W, we have which is the sequence u given in Example G. Gong 44

45 Profile of Randomness of (49, 8, 7). Period: shift distinct sequences 3. The maximal magnitude of the cross correlation: 7 4. The cross correlation takes five values: {, -7, 9, 7, -5} 5. Balance: 25 's and 24 's 6. Linear span: 24 except for u where u has linear span 2. Compare it with the Kasami set with parameters (63, 8, 9) (An example of scarified the correlation for linear G. Gong 45

46 4. Case Study: Examples of Orthogonal Code Design Review for Inner Product Hadamard Matrices Orthogonal Code Design from 2-Level Autocorrelation Sequences G. Gong 46

47 Review for Inner Product: let C be the complex field; F = C (r), contains vectors of dimension r whose elements are taken from C. The inner product of any two vectors in F, say and b c = r is defined by b ( b, b, L, b ) = r ( c, c, L, c ) " c = b c + bc + L+ b r cr If b.c =, then b and c are said to be orthogonal. Example. Let b = (, -, -, ) and c = (-, -,, ). Since b c = (" ) + (" )( " ) + (" ) + = then b and c are orthogonal. Definition. A finite subset M of F is said to be an orthogonal code if any two vectors in M, called codewords, are orthogonal. How to construct a binary orthogonal G. Gong 47

48 Hadamard Matrices: Let H be a m by m matrix whose elements are taken from {, -}. If T HH = mim where I m is the m by m identity matrix, then H is called a Hadamard matrix. The following matrix is a Hadamard matrix: H & $ $ = $ $ % ' ' ' ' # ' ' " Existence of Hadamar matrices: m is a multiple of 4 A set consisting of row vectors of a Hadamard matrix constitutes an orthogonal code, i.e., orthogonal code Hadamard matrix (it is also called a Walsh code in G. Gong 48

49 Orthogonal Code Design from 2-Level Autocorrelation Sequences Construction: Let a = {a i } be a binary 2-level autocorrelation sequence of period m = 2 n and Then is a Hadamard matrix.,,,, ) ( = = m i b i a i L " # $ $ $ $ $ $ % & = ' ' ' 2 2 m m m b b b b b b b b b H L M L L L Question: Which construction of 2-level autocorrelation sequence has a simple implementation? Example. Let a = (), an m-sequence of period 7. Then the following matrix is a Hadamard matrix, so we obtain an orthogonal code from the m- sequence of degree 3.

50 5 Applications to DS-CDMA System System Basics Physical Layer of Forward and Reverse Links Use of Hadamard matrices for orthogonality Forward: Orthogonal CDMA Channels Reverse: Orthogonal Coding Use of cyclic Hadamard matrices for 2-level auto-correlation function property PN Long Code and Short Code Unique Identification Data Scrambling and Authentication Spectrum Spreading

51 The CDMA Cocktail Party This is great stuff Where is she Who called How long will this take Who knows Where is the meeting You know that How can I get there Can I go home? Where is the office

52 Multiple Access Methods

53 CDMA System Design Voice Coding Forward Link Generation CODEC 96 bps 48 bps 24 bps 2 bps R = /2 Convolutional Encoder and Repetition User Address Mask (ESN) Block Interleaver Long Code PN Generator 9.2 ksps.2288 Mcps Decimator 9.2 ksps Power Control Bit Decimator MUX 4 8 Hz Wt.2288 Mcps I PN Q PN Cell VOCODER Power Control Voice Coding Reverse Link Generation I PN CODEC 96 bps 48 bps 24 bps 2 bps R = /3 Convolutional Encoder and Repetition 28.8 ksps Block Interleaver User Address Mask 28.8 ksps Walsh Cover Long Code PN Generator 37.2 khz.2288 Mcps Data Burst Randomizer.2288 Mcps QPN /2 PN Chip Delay D Mobile

54 The CDMA Rate Families IS-95 defines the 96 bps family of rates (Rate Set ) 96, 48, 24, and 2 bps Can select one of the four rates every 2 ms frame 44 bps family of rates (Rate Set 2) 44, 72, 36, and 8 bps Can select one of the four rates every 2 ms frame Extended rates (extended Rate Set ) Adds 92, 384, and 768 bps At most four rates can be active Can select one of the four active rates every 2 ms frame

55 Link Waveform CDMA Forward Link Waveform Pilot Channel Sync Channel Paging Channel Traffic Channel QTSO CDMA REVERSE Link Waveform Access Channel Traffic Channel QTSO

56 Forward CDMA Channel A 64 x 64 Hadamard matrix is used to produce 64 orthogonal channels. Each row of a Hadamard matrix is used to uniquely identify channels from to 63. This is possible since each row (as a binary vector of length 64) of the 64 x 64 Hadamard matrix is orthogonal to any other row. If we call 64 row vectors as W,W,...,W 63, then the waveform for Channel #k is obtained by multiplying W k to the input signal.

57 Forward CDMA Channel FORWARD CDMA CHANNEL (.23 MHz channel transmitted by base station) Pilot Chan W Sync Paging Paging Traffic Ch Chan Up Ch 7 Ch W32 W to W7 W8 Traffic Ch N Traffic Traffic Traffic Ch 25 Up Ch 24 Up Ch 55 to W3 W33 to W63 W = Code Channel Traffic Data Personal Station Power Control Sub-Channel

58 Reverse CDMA Channel A Reverse Channel is uniquely identified by an initial phase of a binary PN sequence (so called, the long code) of length Different initial phases correspond to different shift of the PN sequence, hence they are orthogonal. Only /256 positions of the length are used to address all the users in the system.

59 Reverse Traffic Channel Structure for Rate Set Reverse Traffic Channel Information Bits (72, 8, 4, or 6 bits/frame) 8.6 kbps 4. kbps 2. kbps.8 kbps Add Frame Quality Indicators (2, 8,, or bits/frame) Add 8 bit Encoder Tail 9.6 kbps 4.8 kbps 2.4 kbps.2 kbps Convolutional Encoder r=/3, K=9 Code Symbol 28.8 ksps 4.4 ksps 7.2 ksps 3.6 ksps Symbol Repetition Code Symbol 28.8 ksps Block Interleaver Code Symbol 28.8 ksps I-channel Sequence.2288 Mcps 64-ary Orthogonal Modulator Modulation Symbol (Walsh chip) 4.8 ksps (37.2 kcps) Frame Data Rate Data Burst Randomizer Long Code Generator PN chip.2288 Mcps Q-channel Sequence.2288 Mcps /2 PN chip Delay = 46.9 ns D I Q Baseband Filter Baseband Filter I(t) cos(2"f c t) Q(t) sin(2"f c t) s(t) Long Code Mask

60 Orthogonal Modulation (R. Link) chip pattern of Walsh Code # 35 Symbols Walsh Lookup Table... For every 6 symbols in, 64 Walsh chips are out. Here, 64 Walsh chips are 64 components of a row of the 64 x 64 Hadamard matrix. Note the different role of the same 64 x 64 Hadamard matrix in Reverse Link.

61 PN Long Code Spreading 64 chip pattern of Walsh Code # k... (37.2 khz).2288 Mcps Channel Mask Long Code (2 42 -) PN Generator.2288 Mcps

62 PN Long Code Long Code Maximal Linear Feedback Shift Register Sequence Length (Period) is Unique identifier for: Access and Traffic Channel (R. Link) Paging and Traffic Channel (F. Link) Functions Access, Paging, Traffic Channel spreading DBR on the Reverse Traffic Channel Power Control Bit randomization Data Scrambling (encryption) and Authentication

63 PN Short Codes of length 2 5 I PN.2288 Mcps To Tx Q PN

64 Short Code Short Code (2 5 ) Unique identifier for a Cell or a Sector Repeats every ms Consists of I and Q codes (different polynomials) It is called a Modified Maximal Length Sequence or de bruijn sequence or span-n sequence. It is obtained by adjoining one extra bit after the unique run of of length 4 in the PN sequence of length

65 Summary of Application to DS-CDMA systems Orthogonality -- Channelizing and Coding Scrambling and Authentication Spectrum G. Gong 65

Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment

Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Design of Signal Sets with Low Intraference for CDMA Applications in Networking Environment Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1,

More information

Outline. Criteria of good signal sets. Interleaved structure. The main results. Applications of our results. Current work.

Outline. Criteria of good signal sets. Interleaved structure. The main results. Applications of our results. Current work. Outline Criteria of good signal sets Interleaved structure The main results Applications of our results Current work Future work 2 He Panario Wang Interleaved sequences Criteria of a good signal set We

More information

Aperiodic correlation and the merit factor

Aperiodic correlation and the merit factor Aperiodic correlation and the merit factor Aina Johansen 02.11.2009 Correlation The periodic correlation between two binary sequences {x t } and {y t } of length n at shift τ is defined as n 1 θ x,y (τ)

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes. B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period

More information

Design of Pseudo-Random Spreading Sequences for CDMA Systems

Design of Pseudo-Random Spreading Sequences for CDMA Systems Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

On Welch-Gong Transformation Sequence Generators

On Welch-Gong Transformation Sequence Generators On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Low Correlation Sequences for CDMA

Low Correlation Sequences for CDMA Indian Institute of Science, Bangalore International Networking and Communications Conference Lahore University of Management Sciences Acknowledgement Prof. Zartash Afzal Uzmi, Lahore University of Management

More information

FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory

FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory A. Rajagopal Dept. of E&C, K.L. Sudha Dept.of E&C, Dundi Ajay Dept. of E&C, ABSTRACT Pseudo Noise (PN) sequences are defined

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 m-sequence Binary Random Sequence X -4 X -3 X -2 X - X -0 X X 2 X 3 X 4 Coin-flipping sequence H H T H H T H T T Bernoullitrials/sequence 0 0 0 0 Binary (indp.) random

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The

More information

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences

Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Cryptographic D-morphic Analysis and Fast Implementations of Composited De Bruijn Sequences Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

New Implementations of the WG Stream Cipher

New Implementations of the WG Stream Cipher New Implementations of the WG Stream Cipher Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong Abstract This paper presents two new hardware designs of the WG-28 cipher, one for the multiple output

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Section VI.33. Finite Fields

Section VI.33. Finite Fields VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,

More information

Cryptography Lecture 3. Pseudorandom generators LFSRs

Cryptography Lecture 3. Pseudorandom generators LFSRs Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via

More information

with Good Cross Correlation for Communications and Cryptography

with Good Cross Correlation for Communications and Cryptography m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power) EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them.

Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. ECE 7670 Lecture 5 Cyclic codes Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. Reading: Chapter 5. 1 Cyclic codes Definition

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x), Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are

More information

The Array Structure of Modified Jacobi Sequences

The Array Structure of Modified Jacobi Sequences Journal of Mathematics Research; Vol. 6, No. 1; 2014 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education The Array Structure of Modified Jacobi Sequences Shenghua Li 1,

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

Optical Storage Technology. Error Correction

Optical Storage Technology. Error Correction Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set

More information

Cyclic Codes from the Two-Prime Sequences

Cyclic Codes from the Two-Prime Sequences Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

Clock-Controlled Shift Registers for Key-Stream Generation

Clock-Controlled Shift Registers for Key-Stream Generation Clock-Controlled Shift Registers for Key-Stream Generation Alexander Kholosha Department of athematics and Computer Science Technische Universiteit Eindhoven, PO Box 513, 5600 B Eindhoven, The Netherlands

More information

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering Binary Sequence Pairs with

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek

Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek The Graduate School Yonsei University Department of Electrical and Electronic Engineering Design of Filter

More information

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift

More information

L9: Galois Fields. Reading material

L9: Galois Fields. Reading material L9: Galois Fields Reading material Muzio & Wesselkamper Multiple-valued switching theory, p. 3-5, - 4 Sasao, Switching theory for logic synthesis, pp. 43-44 p. 2 - Advanced Logic Design L9 - Elena Dubrova

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS

CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS Statistica Sinica 24 (2014), 1685-1702 doi:http://dx.doi.org/10.5705/ss.2013.239 CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS Mingyao Ai 1, Bochuan Jiang 1,2

More information

GF(2 m ) arithmetic: summary

GF(2 m ) arithmetic: summary GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

Rings. EE 387, Notes 7, Handout #10

Rings. EE 387, Notes 7, Handout #10 Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation

More information

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Guang Gong Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada Email:

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Some Results on the Arithmetic Correlation of Sequences

Some Results on the Arithmetic Correlation of Sequences Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

Fundamental Theorem of Algebra

Fundamental Theorem of Algebra EE 387, Notes 13, Handout #20 Fundamental Theorem of Algebra Lemma: If f(x) is a polynomial over GF(q) GF(Q), then β is a zero of f(x) if and only if x β is a divisor of f(x). Proof: By the division algorithm,

More information

Some error-correcting codes and their applications

Some error-correcting codes and their applications Chapter 14 Some error-correcting codes and their applications J. D. Key 1 14.1 Introduction In this chapter we describe three types of error-correcting linear codes that have been used in major applications,

More information

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

SNR i = 2E b 6N 3. Where

SNR i = 2E b 6N 3. Where Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA *ZOUHAIR BEN JEMAA, **SAFYA BELGHITH *EPFL DSC LANOS ELE 5, 05 LAUSANNE **LABORATOIRE SYSCOM ENIT, 002 TUNIS

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

How does the computer generate observations from various distributions specified after input analysis?

How does the computer generate observations from various distributions specified after input analysis? 1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

Combinatorics of p-ary Bent Functions

Combinatorics of p-ary Bent Functions Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions

More information

Duadic Codes over Finite Commutative Rings

Duadic Codes over Finite Commutative Rings The Islamic University of Gaza Faculty of Science Department of Mathematics Duadic Codes over Finite Commutative Rings PRESENTED BY Ikhlas Ibraheem Diab Al-Awar SUPERVISED BY Prof. Mohammed Mahmoud AL-Ashker

More information

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8 Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................

More information

ECEN 604: Channel Coding for Communications

ECEN 604: Channel Coding for Communications ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications

More information

Minimal polynomials of the modified de Bruijn sequences

Minimal polynomials of the modified de Bruijn sequences Discrete Applied Mathematics 156 (2008) 1549 1553 www.elsevier.com/locate/dam Minimal polynomials of the modified de Bruijn sequences Gohar M. Kyureghyan Department of Mathematics, Otto-von-Guericke University

More information

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m. Cryptography Univ.-Prof. Dr. rer. nat. Rudolf Mathar 1 2 3 4 15 15 15 15 60 Written Examination Cryptography Tuesday, August 29, 2017, 01:30 p.m. Name: Matr.-No.: Field of study: Please pay attention to

More information

Quasi-reducible Polynomials

Quasi-reducible Polynomials Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let

More information

ECEN 5682 Theory and Practice of Error Control Codes

ECEN 5682 Theory and Practice of Error Control Codes ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the

More information