Lattices for Communication Engineers

Size: px
Start display at page:

Download "Lattices for Communication Engineers"

Transcription

1 Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, Nanyang Technological University - SPMS

2 Part I Introduction

3 Signal Space The transmission problem Link between signal space and transmitted analog signal through an orthogonal basis of signals 3 / 41

4 Signal Space The transmission problem Link between signal space and transmitted analog signal through an orthogonal basis of signals Standard serial transmission Transmitted signal is x(t) = x k h(t kt) k where x k are the transmitted complex symbols and {h(t kt)} k is a family of orthogonal signals (h is a Nyquist root). 3 / 41

5 Signal Space The transmission problem Link between signal space and transmitted analog signal through an orthogonal basis of signals Standard serial transmission Transmitted signal is x(t) = x k h(t kt) k where x k are the transmitted complex symbols and {h(t kt)} k is a family of orthogonal signals (h is a Nyquist root). OFDM transmission Transmitted signal is N/2 x(t) = k q= N/2 x k,q h(t kt)e i 2πk N+1 ft where x k,q are the transmitted complex symbols and { } h(t kt)e i N+1 2πk ft is a doubly indexed family of k,q orthogonal signals (for instance, h(t) = rect T (t) with f = 1 T ). 3 / 41

6 Signal Space Complex symbols and Signal Space We define vector x = (x 1,x 2,...,x m) as a vector living in a m dimensional complex space or a n dimensional real space (n = 2m). Complex symbols used in practice are QAM symbols, components of vector x. We need to introduce coding structure the QAM symbols. xk 64 QAM Figure: Symbol from a 64 QAM 4 / 41

7 Lattices Definition and properties Definition A Euclidean Z lattice is a discrete additive subgroup with rank p, p n of the Euclidean space R n. We restrict to the case p = n in the sequel. 5 / 41

8 Lattices Definition and properties Definition A Euclidean Z lattice is a discrete additive subgroup with rank p, p n of the Euclidean space R n. We restrict to the case p = n in the sequel. A lattice Λ is a Z module generated by vectors v 1,v 2,...,v n of R n. An element v of Λ can be written as : v = a 1 v 1 + a 2 v a n v n, a 1,a 2,...,a n Z 5 / 41

9 Lattices Definition and properties Definition A Euclidean Z lattice is a discrete additive subgroup with rank p, p n of the Euclidean space R n. We restrict to the case p = n in the sequel. A lattice Λ is a Z module generated by vectors v 1,v 2,...,v n of R n. An element v of Λ can be written as : v = a 1 v 1 + a 2 v a n v n, a 1,a 2,...,a n Z The lattice Λ can be defined as : { } n Λ = a i v i a i Z i=1 5 / 41

10 Lattices Lattices : Generator matrix The set of vectors v 1,v 2,...,v n is a lattice basis. Definition Matrix M whose columns are vectors v 1,v 2,...,v n is a generator matrix of the lattice denoted Λ M. 6 / 41

11 Lattices Lattices : Generator matrix The set of vectors v 1,v 2,...,v n is a lattice basis. Definition Matrix M whose columns are vectors v 1,v 2,...,v n is a generator matrix of the lattice denoted Λ M. Each vector x = (x 1,x 2,...,x n) in Λ M, can be written as, x = M z where z = (z 1,z 2,...,z n) Z n. Lattice Λ M may be seen as the result of a linear transform applied to lattice Z n (cubic lattice). 6 / 41

12 Lattices Lattices : Elementary Properties (I) Let Q M n (R), such that Q Q = I n be an isometry. The two lattices Λ M and Λ Q M are said equivalent. Lattice Λ Q M is a rotated version of Λ M if detq = 1. 7 / 41

13 Lattices Lattices : Elementary Properties (I) Let Q M n (R), such that Q Q = I n be an isometry. The two lattices Λ M and Λ Q M are said equivalent. Lattice Λ Q M is a rotated version of Λ M if detq = 1. If T M n (Z) and dett ±1, then lattice Λ M T is a sublattice of Λ M. We will often consider sublattices of Z n. 7 / 41

14 Lattices Lattices : Elementary Properties (II) The generator matrix M describes the lattice Λ M, but it is not unique. All matrices M T with T M n (Z) and dett = ±1 are generator matrices of Λ M. T is called a unimodular matrix. G = M M is the Gram matrix of the lattice. M is also a generator matrix of the dual of Λ M. We define then gemetric parameters.

15 Lattices Lattices : Elementary Properties (II) The generator matrix M describes the lattice Λ M, but it is not unique. All matrices M T with T M n (Z) and dett = ±1 are generator matrices of Λ M. T is called a unimodular matrix. G = M M is the Gram matrix of the lattice. M is also a generator matrix of the dual of Λ M. We define then gemetric parameters. Definitions The fundamental parallelotope of Λ M is the region, P = { x R n x = a 1 v 1 + a 2 v a n v n, 0 a i < 1, i = 1...n } The fundamental volume is the volume of the fundamental parallelotope. It is denoted vol ( Λ M ). The fundamental volume of the lattice is vol ( Λ M ) = det(m), which is det(g) either. 8 / 41

16 Lattices Lattices : Elementary Properties (III) Definition The Voronoï cell of a point u belonging to the lattice Λ is the region V Λ (u) = { x R n x u x y, y Λ } All Voronoï cells of a lattice are translated versions of the Voronoï cell of the zero point. This cell is called Voronoï cell of the lattice. The fundamental volume of a lattice is equal to the volume of its Voronoï cell. 9 / 41

17 Lattices The Z 2 -lattice v2 v1 Z 2 lattice (v1, v2) Lattice Point Lattice Basis Fundamental Parallelotope Voronoi region A QAM constellation is a finite part of Z / 41

18 Lattices The A 2 lattice v 2 v 1 The A 2 lattice (v 1, v 2) Lattice point Lattice basis Fundamental parallelotope Voronoi region An HEX constellation is a finite part of A 2, the hexagonal lattice. 11 / 41

19 Lattices Construction A (binary) Construction A for a Z lattice Let q be an integer. Then, Z/qZ is a finite field if q is a prime and a finite ring otherwise. For a linear code C of length n defined on Z/qZ, lattice Λ is given by Λ = qz n + C ( qz n ) + x. x C 12 / 41

20 Lattices Construction A (binary) Construction A for a Z lattice Let q be an integer. Then, Z/qZ is a finite field if q is a prime and a finite ring otherwise. For a linear code C of length n defined on Z/qZ, lattice Λ is given by Λ = qz n + C ( qz n ) + x. x C Construction of D 4 D 4 is obtained as D 4 = 2Z 4 + (4,3) F2 where (4,3) F2 is a binary parity-check code. 12 / 41

21 Lattices Construction A (binary) Construction A for a Z lattice Let q be an integer. Then, Z/qZ is a finite field if q is a prime and a finite ring otherwise. For a linear code C of length n defined on Z/qZ, lattice Λ is given by Λ = qz n + C ( qz n ) + x. x C Construction of D 4 D 4 is obtained as D 4 = 2Z 4 + (4,3) F2 where (4,3) F2 is a binary parity-check code. Construction of E 8 E 8 is obtained as 2E 8 = 2Z 8 + (8,4) F2 where (8,4) F2 is the extended binary Hamming code (7,4). 12 / 41

22 Lattices Construction A (quaternary) Construction A of the Leech lattice The Leech lattice can be obtained as 2Λ 24 = 2Z 24 + (24,12) Z4 where (24,12) Z4 is the quaternary self-dual code obtained by extending the quaternary cyclic Golay code over Z / 41

23 Lattices Construction A (quaternary) Construction A of the Leech lattice The Leech lattice can be obtained as 2Λ 24 = 2Z 24 + (24,12) Z4 where (24,12) Z4 is the quaternary self-dual code obtained by extending the quaternary cyclic Golay code over Z 4. Other constructions Construction A can be generalized. Constructions B or D for instance. But one can show that all these constructions are equivalent to construction A with a suitable alphabet (for the code). 13 / 41

24 Lattices Construction D: Barnes-Wall A family of lattices of dimension 2 m+1,m 2 can be constructed by construction D. Barnes-Wall Lattices Constructed as Z[i] lattices, BW m = (1 + i) m m 1 Z[i] 2m + (1 + i) r RM(m,r) r=0 where RM(m,r) is a Reed-Müller code (binary) of length n = 2 m, dimension k = ( r m ) l=0 l and minimum Hamming distance d = 2 m r. BW m is a Z lattice of dimension 2 m / 41

25 Lattices Construction D: Barnes-Wall A family of lattices of dimension 2 m+1,m 2 can be constructed by construction D. Barnes-Wall Lattices Constructed as Z[i] lattices, BW m = (1 + i) m m 1 Z[i] 2m + (1 + i) r RM(m,r) r=0 where RM(m,r) is a Reed-Müller code (binary) of length n = 2 m, dimension k = ( r m ) l=0 l and minimum Hamming distance d = 2 m r. BW m is a Z lattice of dimension 2 m+1. Another construction of E 8 We have 2E 8 = (1 + i) 2 Z[i] 4 + (1 + i)(4,3,2) + (4,1,4) which can also be considered as a construction A on the ring R = F 2 + u F 2,u 2 = 0 by using the linear code of generator matrix G = u 0 u 0 0 u u. 14 / 41

26 Part II Coding for the Gaussian Channel

27 Separation: Coding Gain and Shaping Gain What are Lattice Codes? An example Toy example: the 4 QAM A code with 4 codewords Figure: The 4 codewords are in red. Structure is Z 2/ 2Z / 41

28 Separation: Coding Gain and Shaping Gain What are Lattice Codes? An example Toy example: the 4 QAM A code with 4 codewords Figure: The 4 codewords are in red. Structure is Z 2/ 2Z 2. Centers of the squares are shifted points of a sublattice. 16 / 41

29 Separation: Coding Gain and Shaping Gain What are Lattice Codes? The general case Take a lattice Λ c and a sublattice Λ s Λ c of finite index M. Each point x Λ c + c can be written as x = x s + x q + c where x s Λ s and x q is the representative of x in Λ c /Λ s, of smallest Euclidean norm. c is a constant vector which ensures that the overall finite constellation has zero mean. 17 / 41

30 Separation: Coding Gain and Shaping Gain What are Lattice Codes? The general case Take a lattice Λ c and a sublattice Λ s Λ c of finite index M. Each point x Λ c + c can be written as x = x s + x q + c where x s Λ s and x q is the representative of x in Λ c /Λ s, of smallest Euclidean norm. c is a constant vector which ensures that the overall finite constellation has zero mean. Lattice Codes Lattice codes are the representatives of the quotient group Λ c /Λ s, with smallest Euclidean norm, shifted so that the overall constellation has zero mean. 17 / 41

31 Separation: Coding Gain and Shaping Gain What are Lattice Codes? The general case Take a lattice Λ c and a sublattice Λ s Λ c of finite index M. Each point x Λ c + c can be written as x = x s + x q + c where x s Λ s and x q is the representative of x in Λ c /Λ s, of smallest Euclidean norm. c is a constant vector which ensures that the overall finite constellation has zero mean. Lattice Codes Lattice codes are the representatives of the quotient group Λ c /Λ s, with smallest Euclidean norm, shifted so that the overall constellation has zero mean. Performance of lattice codes Lattice codes will be compared to the uncoded 2 m QAM constellation which is Z n /2 m 2 Z n. Vector c is the all-1/2 vector. 17 / 41

32 Separation: Coding Gain and Shaping Gain Coding: Minimum distance of Λ c The Coding Lattice Λ c We want to characterize the performance of Λ c. Suppose that Λ s is a scaled version of Z n (separation). On the Gaussian channel, error probability is dominated by minimum pairwise error probability ( ) ( ) x t minx,t C max P (x t) = max Q x,t C x,t C 2 x t = Q N 0 2 N 0 where Q(x) is the error function ˆ + 1 Q(x) = e u2 2 du x 2π and N 0 is the power spectrum density of the noise. 18 / 41

33 Separation: Coding Gain and Shaping Gain Coding: Minimum distance of Λ c The Coding Lattice Λ c We want to characterize the performance of Λ c. Suppose that Λ s is a scaled version of Z n (separation). On the Gaussian channel, error probability is dominated by minimum pairwise error probability ( ) ( ) x t minx,t C max P (x t) = max Q x,t C x,t C 2 x t = Q N 0 2 N 0 where Q(x) is the error function ˆ + 1 Q(x) = e u2 2 du x 2π and N 0 is the power spectrum density of the noise. Minimum distance We define the minimum distance of the lattice Λ as d min (Λ) = min x x Λ\{0} 18 / 41

34 Separation: Coding Gain and Shaping Gain Energetic considerations Communication engineers express error probability as a function of E b N 0 where E b is the required energy to transmit one bit and N 0 is the power spectrum density of the noise. Compare lattice codes (cubic shaping) with uncoded QAM with same spectral efficiency (same number of points) αz n with a carefully chosen α.

35 Separation: Coding Gain and Shaping Gain Energetic considerations Communication engineers express error probability as a function of E b N 0 where E b is the required energy to transmit one bit and N 0 is the power spectrum density of the noise. Compare lattice codes (cubic shaping) with uncoded QAM with same spectral efficiency (same number of points) αz n with a carefully chosen α. Dominant term of the error probability is ( ) minx,t C x t Q 2 d = Q m min 2 Eb N 0 E s N 0 m being the spectral efficiency and E s the energy per symbol. Compare d2 min of the lattice code with Es the one of αz n. 19 / 41

36 Separation: Coding Gain and Shaping Gain Energetic considerations Communication engineers express error probability as a function of E b N 0 where E b is the required energy to transmit one bit and N 0 is the power spectrum density of the noise. Compare lattice codes (cubic shaping) with uncoded QAM with same spectral efficiency (same number of points) αz n with a carefully chosen α. Dominant term of the error probability is ( ) minx,t C x t Q 2 d = Q m min 2 Eb N 0 E s N 0 m being the spectral efficiency and E s the energy per symbol. Compare d2 min of the lattice code with Es the one of αz n. Fundamental Volume and coding gain The obtained gain (called the Coding Gain ) is γ c (Λ) = d2 min vol(λ) n 2 19 / 41

37 Separation: Coding Gain and Shaping Gain Coding Gain: Examples Dimension 4 The checkerboard lattice D 4 has generator matrix M D4 = with det ( M D4 ) = 2 and d 2 min = 2. Coding gain is γ c (D 4 ) = d2 min vol(d 4 ) 1 2 = 2 2 = / 41

38 Separation: Coding Gain and Shaping Gain Coding Gain: Examples Dimension 8 The Gosset lattice E 8 has generator matrix M E8 = with det ( M E8 ) = 1 and d 2 min = 2. Coding gain is /2 1/2 1/2 1/2 1/2 1/2 1/2 1/2 γ c (E 8 ) = d2 min vol(e 8 ) 1 4 = / 41

39 Separation: Coding Gain and Shaping Gain Normalized Second Order Moment Energy Performance of Λ s is related to the energy minimization of the lattice code. All points of the lattice code are in the Voronoï region of 0 of Λ s. For high rates, we assume points of Λ c uniformly distributed in the Voronoï region, so the energy per dimension of the lattice code becomes E = 1 ( n E x 2) = 1 ˆ 1 n V Λs (0) vol(λ s ) x 2 dx 21 / 41

40 Separation: Coding Gain and Shaping Gain Normalized Second Order Moment Energy Performance of Λ s is related to the energy minimization of the lattice code. All points of the lattice code are in the Voronoï region of 0 of Λ s. For high rates, we assume points of Λ c uniformly distributed in the Voronoï region, so the energy per dimension of the lattice code becomes E = 1 ( n E x 2) = 1 ˆ 1 n V Λs (0) vol(λ s ) x 2 dx Normalized Second Order Moment The parameter ( 1 V G (Λ) = Λ (0) x 2 ) dx vol(λ) n 2 n vol(λ) is called the normalized second order moment of the lattice. It has to be minimized. 21 / 41

41 Separation: Coding Gain and Shaping Gain Normalized Second Order Moment Energy Performance of Λ s is related to the energy minimization of the lattice code. All points of the lattice code are in the Voronoï region of 0 of Λ s. For high rates, we assume points of Λ c uniformly distributed in the Voronoï region, so the energy per dimension of the lattice code becomes E = 1 ( n E x 2) = 1 ˆ 1 n V Λs (0) vol(λ s ) x 2 dx Normalized Second Order Moment The parameter ( 1 V G (Λ) = Λ (0) x 2 ) dx vol(λ) n 2 n vol(λ) is called the normalized second order moment of the lattice. It has to be minimized. Shaping Gain The ratio γ s (Λ) = G ( Z n) G (Λ) = 1 12 G (Λ) 1 is called the shaping gain of Λ. Its value is upperbounded by the shaping gain of the n dimensional sphere which tends to πe 6 when n. 21 / 41

42 Separation: Coding Gain and Shaping Gain Coding Gain and Shaping Gain Dominant term of the Error Probability The error probability of a lattice code using Λ c as the coding lattice and Λ s as the shaping lattice is dominated by the term Q ( ) 3mE b γ c (Λ c ) γ s (Λ s ) N 0 22 / 41

43 Part III Nested Lattices and the Secrecy Gain

44 The Gaussian Wiretap Channel N0 A B N1 E Figure: The Gaussian Wiretap Channel model 24 / 41

45 Encoder Design The problem of Wiretap is a problem of labelling transmitted symbols with data bits 25 / 41

46 Encoder Design The problem of Wiretap is a problem of labelling transmitted symbols with data bits +2 mod (4) Channel We suppose the alphabet Z 4 and a channel Alice Eve that outputs y = x + 2 with probability 1/2 and x with same probability. The symbol error probability is 1/2. 25 / 41

47 Encoder Design The problem of Wiretap is a problem of labelling transmitted symbols with data bits +2 mod (4) Channel We suppose the alphabet Z 4 and a channel Alice Eve that outputs y = x + 2 with probability 1/2 and x with same probability. The symbol error probability is 1/2. Symbol to Bits Labelling x = 2b 1 + b 0 Bit b 1 experiences error probability 1/2 while bit b 0 experiences error probability / 41

48 Encoder Design The problem of Wiretap is a problem of labelling transmitted symbols with data bits +2 mod (4) Channel We suppose the alphabet Z 4 and a channel Alice Eve that outputs y = x + 2 with probability 1/2 and x with same probability. The symbol error probability is 1/2. Symbol to Bits Labelling x = 2b 1 + b 0 Bit b 1 experiences error probability 1/2 while bit b 0 experiences error probability 0. Confidential data must be encoded through b 1. On b 0, put random bits. 25 / 41

49 Uniform Noise Assume that Alice Eve channel is corrupted by an additive uniform noise Label points with data + pseudo random bits Transmitted point Figure: Constellation corrupted by uniform noise

50 Uniform Noise Assume that Alice Eve channel is corrupted by an additive uniform noise Label points with pseudo random bits Transmitted point Figure: Points can be decoded error free: label with pseudo-random symbols

51 Uniform Noise Assume that Alice Eve channel is corrupted by an additive uniform noise Label points with data Transmitted point Figure: Points are not distinguishable: label with data

52 Uniform Noise Label points with data Transmitted point Label points with pseudo random bits Transmitted point Figure: Constellation corrupted by uniform noise 26 / 41

53 Uniform Noise Error Probability Pseudo-random symbols are perfectly decoded by Eve when data error probability will be high. unfortunately not valid for Gaussian noise. Label points with data Transmitted point Label points with pseudo random bits Transmitted point Figure: Constellation corrupted by uniform noise 26 / 41

54 Coset Coding with Integers Label points with data + pseudo random bits Transmitted point Figure: Constellation corrupted by uniform noise 27 / 41

55 Coset Coding with Integers Example Suppose that points x are in Z. Euclidean division x = 3q + r q carries the pseudo-random symbols while r carries the data or pseudo-random symbols label points in 3Z while data label elements of Z/3Z. Label points with data + pseudo random bits Transmitted point Figure: Constellation corrupted by uniform noise 27 / 41

56 Lattice Coset Coding Gaussian noise is not bounded: it needs a n dimensional approach (then let n for sphere hardening). 1 dimensional n dimensional Transmitted lattice Z Fine lattice Λ b Pseudo-random symbols mz Z Coarse lattice Λ e Λ b Data Z/mZ Cosets Λ b /Λ e Table: From the example to the general scheme 28 / 41

57 Lattice Coset Coding Gaussian noise is not bounded: it needs a n dimensional approach (then let n for sphere hardening). points of Λ b Voronoi region of Λe Figure: Example of coset coding 28 / 41

58 Part IV The Secrecy Gain

59 The secrecy gain Eve s Probability of Correct Decision (data) 30 / 41

60 The secrecy gain Eve s Probability of Correct Decision (data) Can Eve decode the data? Figure: Eve correctly decodes when finding another coset representative 30 / 41

61 The secrecy gain Eve s Probability of Correct Decision (data) Can Eve decode the data? Eve s Probability of correct decision P c,e ( ) 1 n Vol ( ) Λ b e r 2 2N 1 2πN1 r Λ e ( ) 1 n Vol ( ( ) 1 Λ b ΘΛe 2πN1 2πN 1 ) where Figure: Eve correctly decodes when finding another coset representative Θ Λ (y) = q x 2, q = e πy, y > 0 x Λ is the theta series of Λ. 30 / 41

62 The secrecy gain Eve s Probability of Correct Decision (data) Can Eve decode the data? Eve s Probability of correct decision P c,e ( ) 1 n Vol ( ) Λ b e r 2 2N 1 2πN1 r Λ e ( ) 1 n Vol ( ( ) 1 Λ b ΘΛe 2πN1 2πN 1 ) where Figure: Eve correctly decodes when finding another coset representative Θ Λ (y) = q x 2, q = e πy, y > 0 x Λ is the theta series of Λ. Problem Minimize Θ Λ (y) for some y. 30 / 41

63 The secrecy gain Secrecy function Definition Let Λ be a n dimensional lattice with volume λ n. Its secrecy function is defined as, Ξ Λ (y) Θ λz n (y) Θ Λ (y) ϑ n 3 (e ) π λy = Θ Λ (y) where ϑ 3 (q) = + n= q n2 (Jacobi theta function) and y > 0.

64 The secrecy gain Secrecy function Definition Let Λ be a n dimensional lattice with volume λ n. Its secrecy function is defined as, Ξ Λ (y) Θ λz n (y) Θ Λ (y) ϑ n 3 (e ) π λy = Θ Λ (y) where ϑ 3 (q) = + n= q n2 (Jacobi theta function) and y > 0. Examples E8 y y y db y db Figure: Secrecy functions of E 8 and Λ / 41

65 The secrecy gain Secrecy Gain Definition The strong secrecy gain of a lattice Λ is χ s Λ supξ Λ (y) y>0

66 The secrecy gain Secrecy Gain Definition The strong secrecy gain of a lattice Λ is χ s Λ supξ Λ (y) y>0 Definition For a lattice Λ equivalent to its dual and of determinant d (Λ) (determinant of the Gram matrix), we define the weak secrecy gain, χ Λ Ξ Λ (d (Λ) n 1 ) 32 / 41

67 The secrecy gain Secrecy Gain Definition The strong secrecy gain of a lattice Λ is χ s Λ supξ Λ (y) y>0 Definition For a lattice Λ equivalent to its dual and of determinant d (Λ) (determinant of the Gram matrix), we define the weak secrecy gain, χ Λ Ξ Λ (d (Λ) n 1 ) A lattice equivalent to its dual has a theta series with a multiplicative symmetry point at d (Λ) n 1 (Poisson-Jacobi s formula), Ξ Λ (d (Λ) n 1 ) y = Ξ Λ d (Λ) n 1 y 32 / 41

68 The secrecy gain First conjecture Conjecture If Λ is a lattice equivalent to its dual, then the strong and the weak secrecy gains coincide. Corollary The strong secrecy gain of a unimodular lattice Λ is χ s Λ Ξ Λ(1) 33 / 41

69 The secrecy gain First conjecture Conjecture If Λ is a lattice equivalent to its dual, then the strong and the weak secrecy gains coincide. Corollary The strong secrecy gain of a unimodular lattice Λ is χ s Λ Ξ Λ(1) Calculation of E 8 secrecy gain From E 8 theta series, 1 Ξ E8 (1) = = 1 ( 2 ϑ2 (e π ) 8 + ϑ 3 (e π ) 8 + ϑ 4 (e π ) 8) ϑ 3 (e π ) 8 3 (since ϑ ( 2 e π ) 4 ϑ 3 (e π ) = ϑ ( 4 e π ) ϑ 3 (e π ) = 4 1 ) 2 so we get χ E8 = Ξ E8 (1) = / 41

70 The secrecy gain Asymptotic behavior for unimodular lattices Want to study the behavior of even unimodular lattices when n. Question How does the optimal secrecy gain behaves when n? 34 / 41

71 The secrecy gain Asymptotic behavior for unimodular lattices Want to study the behavior of even unimodular lattices when n. Question How does the optimal secrecy gain behaves when n? First answer Apply the Siegel-Weil formula, where Θ Λ (q) ( Λ Ω Aut(Λ) = M n E k q 2) n M n = 1 Λ Ω Aut(Λ) n and E k is the Eisenstein series with weight k = n 2. Ω n is the set of all inequivalent n dimensional, even unimodular lattices. We get Θ n,opt ( e π ) E k ( e 2π) 34 / 41

72 The secrecy gain Asymptotic behavior (II) Maximal Secrecy gain For a given dimension n, multiple of 8, there exists an even unimodular lattice whose secrecy gain is ( χ n ϑn 3 e π ) ( E k e 2π ) 1 π 1 n 4 ( ) 1.086n 2 Γ / 41

73 The secrecy gain Asymptotic behavior (II) Maximal Secrecy gain For a given dimension n, multiple of 8, there exists an even unimodular lattice whose secrecy gain is ( χ n ϑn 3 e π ) ( E k e 2π ) 1 π 1 n 4 ( ) 1.086n 2 Γ 34 2 Behavior of Eisenstein Series We have ( E k e 2π) = 1 + 2k + m k 1 Bk m=1 e 2πm 1 B k being the Bernoulli numbers. For k a multiple of 4, then E k ( e 2π ) fastly converges to 2 (k ). 35 / 41

74 The secrecy gain Asymptotic behavior (II) Maximal Secrecy gain For a given dimension n, multiple of 8, there exists an even unimodular lattice whose secrecy gain is Bound from Siegel-Weil Formula vs. Extremal lattices ( χ n ϑn 3 e π ) ( E k e 2π ) 1 π 1 n 4 ( ) 1.086n 2 Γ 34 2 Behavior of Eisenstein Series We have ( E k e 2π) = 1 + 2k + m k 1 Bk m=1 e 2πm 1 B k being the Bernoulli numbers. For k a multiple of 4, then E k ( e 2π ) fastly converges to 2 (k ). Figure: Lower bound of the minimal secrecy gain as a function of n from Siegel-Weil formula. 35 / 41

75 Part V Wireless Channels - Other Lattices

76 Block Fading Channel Design Criterion Assume a wireless communication system transmitting on q subcarriers sufficiently spaced and during n channel uses. Assume Rayleigh fadings and 2 codewords X and T such that x 11 x 12 x 1n x 21 x 22 x 2n X = x q1 x q2 x qn T = t 11 t 12 t 1n t 21 t 22 t 2n t q1 t q2 t qn. 37 / 41

77 Block Fading Channel Design Criterion Assume a wireless communication system transmitting on q subcarriers sufficiently spaced and during n channel uses. Assume Rayleigh fadings and 2 codewords X and T such that x 11 x 12 x 1n x 21 x 22 x 2n X = x q1 x q2 x qn Pairwise Error Probability Error probability will be dominated by T = ( ) max P (X T) q = max xi t 2 Γ n i X,T X,T i=1 4 t 11 t 12 t 1n t 21 t 22 t 2n t q1 t q2 t qn where Γ is the average signal to noise ratio and x i (resp. t i ) is the i th row of X (resp. T). This equality is valid if, for any i, x i t i. Hence, one has to find a code which maximizes min X,T µ(x,t) = min X,T q xi t 2 i i=1. 37 / 41

78 Block Fading Channel Lattice formulation over number fields Control the product in µ(x,t) The product q xi t 2 q i=1 i which becomes µ(x ) = xi 2 i=1 by linearity can be controled by introducing the algebraic norm in a well-chosen algebraic Galois extension K of degree q. Let ( σ 1,σ 2,...,σ q ) be the Galois group of K. Use the canonical embedding so that X = σ 1 (x 1 ) σ 1 (x 2 ) σ 1 (x n) σ 2 (x 1 ) σ 2 (x 2 ) σ 2 (x n) σ q (x 1 ) σ q (x 2 ) σ q (x n) 38 / 41

79 Block Fading Channel Lattice formulation over number fields Control the product in µ(x,t) The product q xi t 2 q i=1 i which becomes µ(x ) = xi 2 i=1 by linearity can be controled by introducing the algebraic norm in a well-chosen algebraic Galois extension K of degree q. Let ( σ 1,σ 2,...,σ q ) be the Galois group of K. Use the canonical embedding so that X = σ 1 (x 1 ) σ 1 (x 2 ) σ 1 (x n) σ 2 (x 1 ) σ 2 (x 2 ) σ 2 (x n) σ q (x 1 ) σ q (x 2 ) σ q (x n) Metric and Norm Then metric µ(x ) can be written as ( ) ( n µ(x ) = N x 2) = N xi 2 i=1 where N is for the algebraic norm and x = (x 1,x 2,...,x n ). 38 / 41

80 Block Fading Channel Construction of O K lattices A construction A for O K lattices where O K is the ring of integers of K can be given where a O K lattice is a O K module. 39 / 41

81 Block Fading Channel Construction of O K lattices A construction A for O K lattices where O K is the ring of integers of K can be given where a O K lattice is a O K module. Construction A (binary) over O K Take, for instance q = 2, K = Q ( 2 ). So, we have O K = Z[ 2]. Consider the principal ideal I = 2 Z[ 2]. As N (I ) = 2, then Z[ 2] / I = F 2. So, we can construct O K lattices in that way, where C is a binary linear code of length n. Λ = I n + C 39 / 41

82 Block Fading Channel Construction of O K lattices A construction A for O K lattices where O K is the ring of integers of K can be given where a O K lattice is a O K module. Construction A (binary) over O K Take, for instance q = 2, K = Q ( 2 ). So, we have O K = Z[ 2]. Consider the principal ideal I = 2 Z[ 2]. As N (I ) = 2, then Z[ 2] / I = F 2. So, we can construct O K lattices in that way, where C is a binary linear code of length n. Λ = I n + C Construction A (quaternary) over O K Here, take q = 2, K = Q ( 5 ). So, we have O K = Z[φ] where φ = Consider the ideal I = 2 Z[ φ]. As N (I ) = 4 and I is prime, then Z[ φ] / I = F 4. So, we have where C is a linear code of length n over F 4. Λ = I n + C 39 / 41

83 Perspectives Perspectives O lattices where O is a maximal order of some division algebra for the MIMO case Nested lattices for other applications in which 2 or more data streams must be constructed Han and Kobayashi Wyner-Ziv... Nested exotic lattices on other Dedekind domains? 40 / 41

84 Thank You!!

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Probability Bounds for Two-Dimensional Algebraic Lattice Codes David Karpuk Aalto University April 16, 2013 (Joint work with C. Hollanti and E. Viterbo) David Karpuk (Aalto University) Probability Bounds

More information

L interférence dans les réseaux non filaires

L interférence dans les réseaux non filaires L interférence dans les réseaux non filaires Du contrôle de puissance au codage et alignement Jean-Claude Belfiore Télécom ParisTech 7 mars 2013 Séminaire Comelec Parts Part 1 Part 2 Part 3 Part 4 Part

More information

Codes and Rings: Theory and Practice

Codes and Rings: Theory and Practice Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R

More information

Leech Constellations of Construction-A Lattices

Leech Constellations of Construction-A Lattices Leech Constellations of Construction-A Lattices Joseph J. Boutros Talk at Nokia Bell Labs, Stuttgart Texas A&M University at Qatar In collaboration with Nicola di Pietro. March 7, 2017 Thanks Many Thanks

More information

Lattices and Lattice Codes

Lattices and Lattice Codes Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad

More information

Golden Space-Time Block Coded Modulation

Golden Space-Time Block Coded Modulation Golden Space-Time Block Coded Modulation Laura Luzzi Ghaya Rekaya-Ben Othman Jean-Claude Belfiore and Emanuele Viterbo Télécom ParisTech- École Nationale Supérieure des Télécommunications 46 Rue Barrault

More information

Construction of Barnes-Wall Lattices from Linear Codes over Rings

Construction of Barnes-Wall Lattices from Linear Codes over Rings 01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia Email:harshanjagadeesh@monhedu

More information

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow,

More information

FULL rate and full diversity codes for the coherent

FULL rate and full diversity codes for the coherent 1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,

More information

Applications of the Golden Code

Applications of the Golden Code Applications of the Golden Code Emanuele Viterbo DEIS - Università della Calabria via P. Bucci, Cubo 42C 87036 Rende (CS) - ITALY viterbo@deis.unical.it Yi Hong Institute for Telecom. Research University

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

Algebraic Methods for Wireless Coding

Algebraic Methods for Wireless Coding Algebraic Methods for Wireless Coding Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology UC Davis, Mathematics Department, January 31st 2007 Outline The Rayleigh fading

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University 20-09-2013 Summary Basic concepts in wireless channels Arithmetic Fuchsian groups: the rational case Arithmetic Fuchsian groups: the general case Fundamental domains and point reduction Fuchsian codes

More information

Applications of Lattices in Telecommunications

Applications of Lattices in Telecommunications Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations

More information

Extremal lattices. Gabriele Nebe. Oberwolfach August Lehrstuhl D für Mathematik

Extremal lattices. Gabriele Nebe. Oberwolfach August Lehrstuhl D für Mathematik Extremal lattices Gabriele Nebe Lehrstuhl D für Mathematik Oberwolfach August 22 Lattices and sphere packings Hexagonal Circle Packing θ = + 6q + 6q 3 + 6q 4 + 2q 7 + 6q 9 +.... Even unimodular lattices

More information

Lattices. SUMS lecture, October 19, 2009; Winter School lecture, January 8, Eyal Z. Goren, McGill University

Lattices. SUMS lecture, October 19, 2009; Winter School lecture, January 8, Eyal Z. Goren, McGill University Lattices SUMS lecture, October 19, 2009; Winter School lecture, January 8, 2010. Eyal Z. Goren, McGill University Lattices A lattice L in R n is L = {a 1 v 1 + + a n v n : a 1,..., a n Z}, where the v

More information

Codes from Barnes-Wall Lattices

Codes from Barnes-Wall Lattices Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices J. Harshan*, Emanuele Viterbo*, and Jean-Claude Belfiore 1 arxiv:1203.3282v3 [cs.it] 8 Jan 2013 Abstract In this paper, we

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

EXERCISES IN MODULAR FORMS I (MATH 726) (2) Prove that a lattice L is integral if and only if its Gram matrix has integer coefficients.

EXERCISES IN MODULAR FORMS I (MATH 726) (2) Prove that a lattice L is integral if and only if its Gram matrix has integer coefficients. EXERCISES IN MODULAR FORMS I (MATH 726) EYAL GOREN, MCGILL UNIVERSITY, FALL 2007 (1) We define a (full) lattice L in R n to be a discrete subgroup of R n that contains a basis for R n. Prove that L is

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Self-Dual Codes and Invariant Theory

Self-Dual Codes and Invariant Theory Gabriele Nebe Eric M. Rains Neil J.A. Sloane Self-Dual Codes and Invariant Theory With 10 Figures and 34 Tables 4y Springer Preface List of Symbols List of Tables List of Figures v xiv xxv xxvii 1 The

More information

Perfect Space Time Block Codes

Perfect Space Time Block Codes Perfect Space Time Block Codes Frédérique Oggier, Ghaya Rekaya, Student Member IEEE, Jean-Claude Belfiore, Member IEEE and Emanuele Viterbo, Member IEEE Abstract arxiv:cs/0604093v1 [cs.it] 24 Apr 2006

More information

New Trellis Codes Based on Lattices and Cosets *

New Trellis Codes Based on Lattices and Cosets * New Trellis Codes Based on Lattices and Cosets * A. R. Calderbank and N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 ABSTRACT A new technique is proposed

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Performance of small signal sets

Performance of small signal sets 42 Chapter 5 Performance of small signal sets In this chapter, we show how to estimate the performance of small-to-moderate-sized signal constellations on the discrete-time AWGN channel. With equiprobable

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

Introduction to binary block codes

Introduction to binary block codes 58 Chapter 6 Introduction to binary block codes In this chapter we begin to study binary signal constellations, which are the Euclidean-space images of binary block codes. Such constellations have nominal

More information

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations TUTORIAL ON DIGITAL MODULATIONS Part 8a: Error probability A [2011-01-07] 07] Roberto Garello, Politecnico di Torino Free download (for personal use only) at: www.tlc.polito.it/garello 1 Part 8a: Error

More information

Some Goodness Properties of LDA Lattices

Some Goodness Properties of LDA Lattices Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop

More information

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE 4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Construction of quasi-cyclic self-dual codes

Construction of quasi-cyclic self-dual codes Construction of quasi-cyclic self-dual codes Sunghyu Han, Jon-Lark Kim, Heisook Lee, and Yoonjin Lee December 17, 2011 Abstract There is a one-to-one correspondence between l-quasi-cyclic codes over a

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless

More information

Codes and invariant theory.

Codes and invariant theory. odes and invariant theory. Gabriele Nebe Lehrstuhl D für Mathematik, RWTH Aachen, 5056 Aachen, Germany, nebe@math.rwth-aachen.de 1 Summary. There is a beautiful analogy between most of the notions for

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1

Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1 Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1 Mahmoud Taherzadeh, Amin Mobasher, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical & Computer

More information

On the Use of Division Algebras for Wireless Communication

On the Use of Division Algebras for Wireless Communication On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Augmented Lattice Reduction for MIMO decoding

Augmented Lattice Reduction for MIMO decoding Augmented Lattice Reduction for MIMO decoding LAURA LUZZI joint work with G. Rekaya-Ben Othman and J.-C. Belfiore at Télécom-ParisTech NANYANG TECHNOLOGICAL UNIVERSITY SEPTEMBER 15, 2010 Laura Luzzi Augmented

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

On the diversity of the Naive Lattice Decoder

On the diversity of the Naive Lattice Decoder On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan ICC 2011 IEEE International Conference on Communications

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

Error control of line codes generated by finite Coxeter groups

Error control of line codes generated by finite Coxeter groups Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia

More information

A First Course in Digital Communications

A First Course in Digital Communications A First Course in Digital Communications Ha H. Nguyen and E. Shwedyk February 9 A First Course in Digital Communications 1/46 Introduction There are benefits to be gained when M-ary (M = 4 signaling methods

More information

Properties of the Leech Lattice

Properties of the Leech Lattice Properties of the Leech Lattice Austin Roberts University of Puget Sound April 4, 2006 Abstract This paper catalogues and describes the properties of the Leech lattice and gives a basic introduction to

More information

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Huan Yao Lincoln Laboratory Massachusetts Institute of Technology Lexington, MA 02420 yaohuan@ll.mit.edu Gregory

More information

The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani

The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 5, MAY 2009 2037 The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani Abstract The capacity

More information

Modular numbers and Error Correcting Codes. Introduction. Modular Arithmetic.

Modular numbers and Error Correcting Codes. Introduction. Modular Arithmetic. Modular numbers and Error Correcting Codes Introduction Modular Arithmetic Finite fields n-space over a finite field Error correcting codes Exercises Introduction. Data transmission is not normally perfect;

More information

ELEC-E7240 Coding Methods L (5 cr)

ELEC-E7240 Coding Methods L (5 cr) Introduction ELEC-E7240 Coding Methods L (5 cr) Patric Östergård Department of Communications and Networking Aalto University School of Electrical Engineering Spring 2017 Patric Östergård (Aalto) ELEC-E7240

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Lattice Coding I: From Theory To Application

Lattice Coding I: From Theory To Application Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Motivation 2 Preliminaries s Three examples 3 Problems Sphere Packing Problem Covering Problem Quantization

More information

The Aladdin-Pythagoras Space-Time Code

The Aladdin-Pythagoras Space-Time Code The Aladdin-Pythagoras Space-Time Code Joseph J Boutros Texas A&M University Department of Electrical Engineering Education City Doha Qatar boutros@tamuedu Hugues Randriambololona TELECOM ParisTech / LTCI

More information

Embedded Rank Distance Codes for ISI channels

Embedded Rank Distance Codes for ISI channels Embedded Rank Distance Codes for ISI channels S Dusad S N Diggavi A R Calderbank October 17, 2007 arxiv:07074311v1 [csit] 29 Jul 2007 Abstract Designs for transmit alphabet constrained space-time codes

More information

CSE 206A: Lattice Algorithms and Applications Winter The dual lattice. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Winter The dual lattice. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Winter 2016 The dual lattice Instructor: Daniele Micciancio UCSD CSE 1 Dual Lattice and Dual Basis Definition 1 The dual of a lattice Λ is the set ˆΛ of all

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Jin Soo Choi, Chang Kyung Sung, Sung Hyun Moon, and Inkyu Lee School of Electrical Engineering Korea University Seoul, Korea Email:jinsoo@wireless.korea.ac.kr,

More information

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1 Combinatória e Teoria de Códigos Exercises from the notes Chapter 1 1.1. The following binary word 01111000000?001110000?00110011001010111000000000?01110 encodes a date. The encoding method used consisted

More information

Coding Theory and Applications. Linear Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Linear Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Linear Codes Enes Pasalic University of Primorska Koper, 2013 2 Contents 1 Preface 5 2 Shannon theory and coding 7 3 Coding theory 31 4 Decoding of linear codes and MacWilliams

More information

Demixing Radio Waves in MIMO Spatial Multiplexing: Geometry-based Receivers Francisco A. T. B. N. Monteiro

Demixing Radio Waves in MIMO Spatial Multiplexing: Geometry-based Receivers Francisco A. T. B. N. Monteiro Demixing Radio Waves in MIMO Spatial Multiplexing: Geometry-based Receivers Francisco A. T. B. N. Monteiro 005, it - instituto de telecomunicações. Todos os direitos reservados. Demixing Radio Waves in

More information

Statistics for scientists and engineers

Statistics for scientists and engineers Statistics for scientists and engineers February 0, 006 Contents Introduction. Motivation - why study statistics?................................... Examples..................................................3

More information

Cyclic Division Algebras: A Tool for Space Time Coding

Cyclic Division Algebras: A Tool for Space Time Coding Foundations and Trends R in Communications and Information Theory Vol. 4, No. 1 (2007) 1 95 c 2007 F. Oggier, J.-C. Belfiore and E. Viterbo DOI: 10.1561/0100000016 Cyclic Division Algebras: A Tool for

More information

Efficient Bounded Distance Decoders for Barnes-Wall Lattices

Efficient Bounded Distance Decoders for Barnes-Wall Lattices Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms

More information

ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS.

ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS. 17th European Signal Processing Conference (EUSIPCO 009) Glasgow, Scotland, August 4-8, 009 ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS. Sandra Roger, Alberto Gonzalez,

More information

Representing Group Codes as Permutation Codes

Representing Group Codes as Permutation Codes Representing Group Codes as Permutation Codes Ezio Biglieri John K. Karlof Emanuele Viterbo November 19, 001 Abstract Given an abstract group G, an N dimensional orthogonal matrix representation G of G,

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set

More information

Algebra Exam Topics. Updated August 2017

Algebra Exam Topics. Updated August 2017 Algebra Exam Topics Updated August 2017 Starting Fall 2017, the Masters Algebra Exam will have 14 questions. Of these students will answer the first 8 questions from Topics 1, 2, and 3. They then have

More information

Lecture 7 September 24

Lecture 7 September 24 EECS 11: Coding for Digital Communication and Beyond Fall 013 Lecture 7 September 4 Lecturer: Anant Sahai Scribe: Ankush Gupta 7.1 Overview This lecture introduces affine and linear codes. Orthogonal signalling

More information

Q(X) Q (X) Q(X) X Q(X)-Q (X) Origin Q(X)-Q (X) Origin

Q(X) Q (X) Q(X) X Q(X)-Q (X) Origin Q(X)-Q (X) Origin Lattice Quantization with Side Information Sergio D. Servetto Laboratoire de Communications Audiovisuelles Ecole Polytechnique Fédérale de Lausanne, CH-1015 Lausanne, Switzerland. URL: http://lcavwww.epfl.ch/~servetto/

More information

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,

More information

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

On Random Rotations Diversity. Motorola Semiconductors Toulouse, France. ENST, 46 rue Barrault Paris, France. November 19, 1999.

On Random Rotations Diversity. Motorola Semiconductors Toulouse, France. ENST, 46 rue Barrault Paris, France. November 19, 1999. On Random Rotations Diversity and Minimum MSE Decoding of Lattices Catherine LAMY y - Joseph BOUTROS z y Motorola Semiconductors Toulouse, France z ENST, 46 rue Barrault 75013 Paris, France lamyc@enst.fr,

More information

On the Robustness of Algebraic STBCs to Coefficient Quantization

On the Robustness of Algebraic STBCs to Coefficient Quantization 212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,

More information

MINKOWSKI THEORY AND THE CLASS NUMBER

MINKOWSKI THEORY AND THE CLASS NUMBER MINKOWSKI THEORY AND THE CLASS NUMBER BROOKE ULLERY Abstract. This paper gives a basic introduction to Minkowski Theory and the class group, leading up to a proof that the class number (the order of the

More information

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example. Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for

More information

11 Minimal Distance and the Parity Check Matrix

11 Minimal Distance and the Parity Check Matrix MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

THE CLASSICAL noiseless index coding problem

THE CLASSICAL noiseless index coding problem IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO., DECEMBER 05 6505 Lattice Index Coding Lakshmi Natarajan, Yi Hong, Senior Member, IEEE, and Emanuele Viterbo, Fellow, IEEE Abstract The index coding

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems Aids Allowed: 2 8 1/2 X11 crib sheets, calculator DATE: Tuesday

More information

MMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02

MMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02 MMSE estimation and lattice encoding/decoding for linear Gaussian channels Todd P. Coleman 6.454 9/22/02 Background: the AWGN Channel Y = X + N where N N ( 0, σ 2 N ), 1 n ni=1 X 2 i P X. Shannon: capacity

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Projects on elliptic curves and modular forms

Projects on elliptic curves and modular forms Projects on elliptic curves and modular forms Math 480, Spring 2010 In the following are 11 projects for this course. Some of the projects are rather ambitious and may very well be the topic of a master

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information