General error locator polynomials for binary cyclic codes with t 2 and n < 63

Size: px
Start display at page:

Download "General error locator polynomials for binary cyclic codes with t 2 and n < 63"

Transcription

1 General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it) Department of Mathematics, University of Milan, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland. Abstract. We show that a recently proposed algorithm ([9]) for decoding cyclic codes may be applied efficiently to all binary cyclic codes with t 2 and n < 63. Keywords: Gröbner bases, cyclic codes, decoding procedure. 1 Introduction Cyclic codes form a large class of block linear codes, containing in particular the BCH codes. As regards BCH codes, it is known that they can be decoded efficiently ([5]), but also that their decoding performance degrades as the length increases ([8]). As regards cyclic codes, no efficient decoding algorithm is known (up to their actual distance), but they are not known to suffer from the same distance limitation as the BCH codes (and experimentally they become better and better as the length increases). However, recently a decoding algorithm for cyclic codes has been proposed ([9]), which might be efficient. 1

2 This algorithm depends on the notion of general error locator polynomial and it is efficient for a given code C if and only the relevant polynomial is sparse. At present, there is no known theoretical proof of the sparsity of general error locator polynomials for arbitrary cyclic codes, but there is some experimental evidence, at least in the binary case. Let t be the number of errors a code can correct (the correction capability of a code). In this paper we show that this algorithm may be efficiently applied to all binary cyclic codes with length less than 63 and t 2. Apart from only two cases, where a direct Gröbner basis computation is needed, we show that all these codes may be grouped in a few classes, each allowing a theoretical interpretation. In particular, the general error locator polynomial for all these codes is sparse. This paper is organized as follows: Section 2, we provide the preliminaries that we need for cyclic codes, we recall the notion of general error locator polynomial for linear block codes and we show how it can be applied to decode binary cyclic codes, Section 3, we investigate the case when a binary cyclic code has a defining set of type S = {1, 2i + 1} and t = 2, Section 4, we investigate the case when a binary cyclic code admits S = {1, n 1, l} as a defining set and t = 2, Section 5, we provide general error locator polynomials for all binary cyclic codes with n < 63 and t 1, Section 6, we provide general error locator polynomials for all binary cyclic codes with n < 63 and t = 2, Section 7, we draw some conclusions. 2 Preliminaries Our standard references for classical coding theory are [6] and [10]. In this section n is understood to be an odd number n Some algebraic background and notation We denote by Z 2 the field with two elements. For any m 2, we denote by F 2 m the finite field with 2 m elements. 2

3 Let x n 1 Z 2 [x]. We denote by F the splitting field of x n 1 over Z 2 and by α a primitive n root of unity, that is x n 1 = n 1 (x α i ). i=0 It is well-known that F = F 2 m, for some m 2, and that the powers of α, {α i 0 i n 1}, are distinct. From now on α will be understood. 2.2 Standard notation for cyclic codes Let C be an [n, k, d] binary cyclic code with n odd. Let g Z 2 [x] be the generator polynomial of the code C. It is well-known that g is a polynomial of degree r = n k and that g divides x n 1. Traditionally the complete defining set of C is the set S C = {i g(α i ) = 0, 0 i n 1}. As S C is partitioned into cyclotomic classes, there are some subsets S of S C, any of them sufficient to specify the code unambiguously and we call any such S a defining set. Example 2.1. Let C be the [15, 7, 5] binary BCH code, then S C = {1, 2, 3, 4, 6, 8, 9, 12}, but the code may be unambiguously defined by S = {1, 3} or also by S = {1, 3, 9}, so that both S and S are defining sets for C. 2.3 General error locator polynomials for linear codes Let D be a binary [n, k, d] linear block code and H be one of its parity check matrices. We allow the entries of H to lie in the extension field F. We recall that t = [1/2(d 1)]. If we denote by c = (c 0,..., c n 1 ), v = (v 0,..., v n 1 ) and e = (e 0,..., e n 1 ), respectively, the transmitted codeword, the received vector and the error vector, then we get: Hv T = H(c T + e T ) = Hc T + He T = 0 + He T = s T, where the vector s (F) n k is called the syndrome vector associated to v. Definition 2.2. A correctable syndrome is a syndrome vector s (F) n k corresponding to an error with weight µ t. 3

4 Let e be an error of weight µ t. We denote by L e (z) the corresponding error locator polynomial, i.e. a polynomial of degree µ whose roots represent the error locations. In other words if e = (0,..., 0, 1, 0,..., 0, 1, 0,..., 0, 1, 0,..., 0), }{{} }{{} k 1 1 k1 kl kµ n 1 k µ where k 1,..., k µ are the error components, then L e (z) = µ (z α k l ). l=1 Remark 2.3. Traditionally, the reciprocal of L e (z), with roots the inverses α k l = (α k l) 1, is used as the error locator polynomial. We recall the definition of general error locator polynomial for D: Definition 2.4 ([9]). Let L a polynomial in Z 2 [X, z], where X = (x 1,..., x n k ). Then L is a general error locator polynomial of D if: 1. L(X, z) = z t +a t 1 (X)z t 1 + +a 0 (X), with a j Z 2 [X], 0 j t 1; 2. given a correctable syndrome s = (s 1,..., s n k ), corresponding to an error of weight µ t, if we evaluate the X variables in s, then the t roots of L(s, z) are the µ error locations plus zero counted with multiplicity t µ. Observe that point 2 of Def. 2.4 is equivalent to L(s, z) = z t µ L e (z), where e is the error associated to syndrome s. Given a generic linear code D it is not known whether L exists or not. The main result of [9] is the following: Theorem 2.5 ([9]). Every binary cyclic code possesses a general error locator polynomial. Remark 2.6. In [9] the results are more general, holding for any field and covering also the cases when some erasures occur. 4

5 2.4 General error locator polynomials for cyclic codes Form now on, we shorten binary linear code to code. Let C be an [n, k, d] code, we now recall briefly how to obtain the general error locator polynomial of C. Let S C = {i 1,..., i n k } be the complete defining set of C. We need a few definitions. Definition 2.7. Let n N be odd. We denote by p(n, x, y) Z 2 [x, y] the following polynomial: p(n, x, y) = xn y n x y x i y n 1 i. = n 1 i=0 We are going to define an ideal in Z 2 [X, Z], where X = (x 1,..., x n k ) and Z = (z 1,..., z t ). The x variables play the role of syndromes and the z variables play the role of error locations. Definition 2.8 ([9]). With the above notation, we denote by I C the ideal in Z 2 [X, Z] generated by the following polynomials: { t } x j 1 j n k} {x 2m j x j 1 j n k l=1 z i j l { z n+1 i z i 1 i t } { z l z l p(n, z l, z l ) 1 l } < l t. The ideal I C is called the syndrome ideal of C. Let G be the (completely) reduced Gröbner basis of I C, w.r.t. the lexicographical order x 1 < x 2 < < x n k < z t < < z 1. We denote by G X and G XZ the following subsets of G: G X = G Z 2 [X], G XZ = G (Z 2 [X, Z] \ Z 2 [X]), G = G X G XZ. The elements of G XZ can be collected into blocks {G i } 1 i t, where, for any i, G i Z 2 [X, z t,..., z i+1 ][z i ] \ Z 2 [X, z t,..., z i+1 ], so that G XZ = t i=1 G i. On the other hand, any G i, 1 i t, can be decomposed into blocks of polynomials according to their degree with respect to the variable z i : G i = i δ=1 G iδ. 5

6 In this way, if g G iδ, we have: g Z 2 [X, z t,..., z i+1 ][z i ] \ Z 2 [X, z t,..., z i+1 ], deg zi (g) = δ, i.e. g = az δ i + and a Z 2 [X, z t,..., z i+1 ]. Let N iδ be the number of elements of G iδ. We name the elements of the set G iδ = {g iδj, 1 j N iδ } after their order: h < j Lt(g iδh ) < Lt(g iδj ). The following theorem is a direct consequence of results from [9]. Theorem 2.9 ([9]). Let I C be the syndrome ideal associated to C and let G be as above. Then: 1. G i = i δ=1 G iδ and G iδ, for 1 i t and 1 δ i; 2. G ii = {g ii1 }, for 1 i t, i.e. exactly one polynomial exists with degree i w.r.t. the variable z i in G i. Moreover, its leading term and leading polynomial are Lt(g ii1 ) = z i i, Lp(g ii1 ) = 1 The polynomial g tt1 G t may be shown to satisfy all proprieties needed by a general error locator polynomial. So, if we want to compute L for a given cyclic code C, we first compute G from I C and then we take g tt1 from G: L(X, z) = g tt1 (x 1,..., x n k, z). Remark In order to write I C, we do not need to use the complete defining set S C of C: we may use any other defining set S of C. For example, if {1, 2} S C, we have both t l=1 z1 l = x 1 and t l=1 z2 l = x 2, which means x 2 = x 2 1, so that we may remove x 2 (and its corresponding equation). Once we have computed L for a code C, the decoding algorithm is straightforward: Input s = (s 1,..., s n k ) µ = t While a t µ (s 1,..., s n k ) = 0 do µ := µ 1; Output µ, L(z) 6

7 so that (1) L e (z) = L(z) z t µ. Remark If t = 1, the definition of L requires a polynomial in Z 2 [X, z] with deg z (L) = 1 and leading coefficient 1. This means that L is of type L(X, z) = z + a(x), a Z 2 [X]. If t = 2, the definition of L requires a polynomial in Z 2 [X, z] with degree deg z (L) = 2 and leading coefficient 1. This means that L is of type L(X, z) = z 2 + a(x)z + b(x), a, b Z 2 [X]. Remark Suppose that t = 2, so that L is as in Remark Suppose that we need only a two component syndrome vector s = ( x 1, x 2 ) to identify a correctable error e. Let z 1 and z 2 be the two roots of L( s, z) (the error locations). Then there are only three (mutually exclusive) cases: either the weight of e is 2, which happens if and only if z 1 0 and z 2 0 (and in this case z 1 z 2 ), or the weight of e is 1, which happens if and only if z 1 0 and z 2 = 0 (or if z 1 = 0, z 2 0), or e = 0, which happens if and only if z 1 = z 2 = 0. 3 Case (1, 2i + 1) and t = 2 In this section we consider only codes with a defining set S = {1, 2i + 1}, for some i 1, and t = 2 (with an odd length). From Def. 2.8, we get: (2) z 1 + z 2 = x 1, (3) z 2i z 2i+1 2 = x 2. The general error locator polynomial associated to C is (Remark 2.11) L C (x 1, x 2, z) = z 2 + a(x 1, x 2 )z + b(x 1, x 2 ). 7

8 Remark 3.1. In the z variable, polynomial L C has degree two, so we can express its coefficients in term of its roots (see Remark 2.12): z 1 + z 2 = a( x 1, x 2 ), z 1 z 2 = b( x 1, x 2 ). From (2) we immediately obtain: a(x 1, x 2 ) = x 1. The main result of this section is the following. Theorem 3.2. Let C be a code with t = 2 and defining set S = {1, 2i + 1}, for some i 1 (and odd length). Let s= ( x 1, x 2 ) be a correctable syndrome. Let z 1 and z 2 be the corresponding error locations. Let b = z 1 z 2. Then there is a polynomial P Z 2 [y 1, y 2, y 3 ] such that P ( x 1, x 2, b) = 0, deg y3 (P ) i. Moreover, P does not depend on s but only on i. Theorem 3.2 is an easy consequence of Theorem 3.7. To prove Theorem 3.7, we need a few simple lemmas. Lemma 3.3. Let D be a commutative ring with identity 1 D. Let l be a natural number, l 1. Then there are some a [l] h D, for 1 h l, such that for any d 1 and d 2 in D we have d 2l d 2l+1 2 = (d 1 + d 2 ) 2l+1 + l h=1 a [l] h (d 1d 2 ) h (d 2(l h) d 2(l h)+1 2 ). Proof. Let 1 D be the multiplicative identity in D. Since the binomial theorem holds for any commutative ring, we have 2l+1 (d 1 + d 2 ) 2l+1 = d j j 1d 2l+1 j 2. j=0 Since 2l + 2 is even, we can break the right hand side of the former equation into two sums with the same number of addenda: (4) l ( 2l + 1 j=0 j 2l+1 d j j 1d 2l+1 j 2 = j=0 ) d j 1d 2l+1 j 2 + 2l+1 j=l+1 d j j 1d 2l+1 j 2. 8

9 By two index substitutions, h = j 1 l and m = l h, we get 2l+1 j=l+1 d j j 1d 2l+1 j 2 = l m=0 l h=0 d 2l+1 m 1 d m 2. 2l + 1 m d h+l+1 1 d l h 2 = h + l + 1 But then we can collect powers of (d 1 d 2 ) in (4), getting l (d 1 d 2 ) j d 2l+1 2j 2 + j j=0 l (d 1 d 2 ) m d 2l+1 2m 1 m m=0 (we have used the obvious fact ( ) ( 2l+1 2l+1 m = 2l+1 ) m ), i.e. (5) 2l+1 d j j 1d 2l+1 j 2 = j=0 l (d 1 d 2 ) j (d 2l+1 2m 1 + d 2l+1 2j 2 ). j j=0 From (5), our desired result readily follows by setting ( ) a [l] 2l + 1 h = 1 D. h Note that the a [l] h s in Lemma 3.3 do not depend on d 1 or d 2 and that some of the a [l] h s may be 0 D, depending solely on the characteristic of D. We define inductively a sequence of polynomials. Definition 3.4. For any σ 0, let L σ Z 2 [y 1, y 2 ] be such that: L 0 = y 1 L σ = y 2σ σ h=1 a[σ] h yh 2 L σ h where the {a [σ] h } are the same as Lemma 3.3, when D = Z 2. Lemma 3.5. Given L σ as in the above definition, σ 0, we have deg y2 (L σ ) σ. 9

10 Proof. By induction on σ. If σ = 0 we have L 0 = y 1. By induction we assume that, for any 1 h < σ, deg y2 (L σ h ) σ h. By definition, we have L σ = y1 2σ+1 + σ h=1 a[σ] h yh 2 L σ h, so that deg y2 L σ = deg y2 ( σ h=1 a [σ] h yh 2 L σ h ) h + σ h = σ. Lemma 3.6. Let l 1. For any z 1, z 2 Z 2, we have z 1 2l+1 + z 2 2l+1 = L l ( z 1 + z 2, z 1 z 2 ) Proof. It follows immediately from Lemma 3.3. Theorem 3.7. Let l 1. Let z 1, z 2 Z 2. Let x 1, x 2, b Z 2 be such that x 1 = z 1 + z 2, x 2 = z 1 2l+1 + z 2 2l+1 and b = z 1 z 2. Then there is P Z 2 [y 1, y 2, y 3 ] such that: P ( x 1, x 2, B) = 0, deg y3 P l. Moreover, P does not depend on the choice of z 1 or z 2. Proof. Set P (y 1, y 2, y 3 ) = L l (y 1, y 3 ) y 2 and apply Lemma 3.6. Example 3.8. Let C an [n, k, d] code with S = {1, 3}, n odd and t = 2. We have z 1 + z 2 = x 1, z z 3 2 = x 2 and L C = z 2 + x 1 z + B. Then: z z 3 2 = (z 1 + z 2 ) 3 + z 1 z 2 (z 1 + z 2 ), that is, Bx 1 + x 2 + x 3 1 = 0. Note that C in Example 3.8 is a BCH code and so this particular case can be deduced also from [3], [4]. Example 3.9. Let C an [n, k, d] code with S = {1, 5}, n odd and t = 2. We have z 1 + z 2 = x 1, z z 5 2 = x 2 and We get: i.e. L C = z 2 + x 1 z + B. z z 5 2 = (z 1 + z 2 ) 5 + z 1 z 2 (z z 3 2), z z 5 2 = (z 1 + z 2 ) 5 + z 1 z 2 ((z 1 + z 2 ) 3 + z 1 z 2 (z 1 + z 2 )) B 2 x 1 + Bx x 2 + x 5 1 = 0. 10

11 4 Case (1, n 1, l) and t = 2 Let C be an [n, k, d] code with S = {0, 1, n 1}, n odd and t = 2. In this case we can consider three syndromes {x 1, x 2, x 3 } such that (6) z 1 + z 2 = x 1 (7) z n z n 1 2 = x 2 (8) z l 1 + z l 2 = x 3 We know also that z n+1 1 = z 1, z n+1 2 = z 2. The general error locator polynomial of C is of type (Remark 2.11): L = z 2 + a(x 1, x 2, x 3 )z + b(x 1, x 2, x 3 ). Thanks to Remark 2.12 and 3.1, we have L = z 2 + x 1 z + b(x 1, x 2, x 3 ), b( x 1, x 2, x 3 ) = z 1 z 2. To study the case when there are exactly two errors (µ = 2), we need only the first two syndromes. This is done in Subsection 4.1. To extend to the case when there is an error (µ = 1), we need also the third syndrome. This is done in Subsection 4.2 and 4.3. All these cases are summarized in Subsection µ = 2 We suppose there are exactly two errors. This is equivalent to z 1 0 and z 2 0 Under these assumptions, from (6) and (7) we have (x 1 x 2 ) = (z 1 + z 2 )(z n z n 1 2 ) = z 1 z 2 (z n z n 2 2 ) and so that x 2 2 = (z n z n 1 2 ) 2 = z 2n z 2n 2 2 = z n z n 2 2, (x 1 x 2 ) = z 1 z 2 x 2 2, i.e. b = z 1 z 2 = x 1x 2 x 2 2 = x 1 x 2. 11

12 We have a special case when also S = {0, 1} is a defining set. In this case we have, for some 1 δ n 1, 1 2 δ mod (n) and z 1 = z1 n+1 = z1 n 2δ = (z1 n 2δ )(z1 n ) 2δ 1 = z n2δ 2 δ 1 = z (n 1)2δ 1, which means x 2δ 2 = (z n z n 1 2 ) 2δ = z 1 + z 2 = x 1, so that b = x 2δ µ = 1 and l = 0 There is only one error if and only if exactly one of {z 1, z 2 } is zero. In particular, if there is only one error the product z 1 z 2 reduces to 0. Unfortunately the ratio x 1 x 2 becomes z 1 z 1 1 = z2 1, and so it cannot be used as b in this case. To take into consideration also the case when µ = 1, we may multiply by a polynomial h Z 2 [x 1, x 2, x 3 ] s.t. h( x 1, x 2, x 3 ) = 1, if ( x 1, x 2, x 3 ) corresponds to two errors, h( x 1, x 2, x 3 ) = 0, if ( x 1, x 2, x 3 ) corresponds to one error. Such an h will ensure that the product x 1 x 2 h(x 1, x 2, x 3 ) takes the value z 1 z 2 both when µ = 2 and when µ = 1. Moreover, since x 1 2 is in practice replaced by x n 1 2, said product will be 0 when µ = 0, which is what we expect from b even in the case µ = 0. To construct such an h, we use the third syndrome. When l = 0 we may rewrite (8) as (9) z n 1 + z n 2 = x 3 Since z n 1 = 1 if and only if z 1 is non-zero, we have that: z n 1 + z n 2 = = 0, if µ = 2, z n 1 + z n 2 = 1, if µ = 1, z n 1 + z n 2 = = 0, if µ = 0. In other words, we can take h = (1 + x 3 ). 12

13 4.3 µ = 1 and l = n/3 We argument analogously to the previous case. The only difference is that l = n/3 now and so the h will be different. From z n/3 1 + z n/3 2 = x 3, we have x 3 3 = (z n/3 1 + z n/3 2 ) 3 = z n 1 + z n 2 + z n/3 1 z n/3 2 (z n/3 1 + z n/3 2 ) = z n 1 + z n 2 + B n/3 x 3 and this formula is true for any µ. If µ = 2 we have (10) x 3 3 = B n/3 x 3 = ( x 1 If µ = 1 we have x 1 2 ) n/3 x 3 = x n/3 1 x 2/3n 2 x 3. (11) x 3 3 = (z n/3 1 ) 3 = z n 1 = 1. Thanks to (10) and (11) it is now clear that the following h satisfies our requirements x h = x n/3 1 x 2/3n 2 x Summary We summarize our results in the following theorem. Theorem 4.1. Let C be an [n, k, d] code, with t = 2 and n odd. Suppose S admits a defining set S = {1, n 1, l}. Then where h is a function s.t. L = z 2 + x 1 z + x 1 x 2 h(x 1, x 2, x 3 ), h( x 1, x 2, x 3 ) = 1, if ( x 1, x 2, x 3 ) corresponds to two errors, h( x 1, x 2, x 3 ) = 0, if ( x 1, x 2, x 3 ) corresponds to one error. In particular, if l = 0, h = 1 + x 3, if l = n/3, h = x x n/3 1 x 2/3n 2 x 3 +1 Moreover, if C admits also S = {0, 1} as a defining set, then L = z 2 + x 1 z + x 2δ 1 2 h(x 1, x 2, x 3 ), where 1 δ n 1 is such that 1 2 δ 13 mod (n).

14 5 Codes with t 1 and n < 63 In this section we consider codes, with t 1 and n < 63, n odd. The case t = 0 is trivial. If t = 1 and n < 63 then we can distinguish the following cases. 1) S = {m}, with (n, m) = 1. In this case the code C is equivalent to the BCH code with t = 1 and S = {1}. Since z1 m = x 1, z1 n+1 = z 1 and (n, m) = 1, we may apply Bezout s Lemma and obtain an integer k such that: mk 1 mod (n). This means (z1 m ) k = z 1 = x k 1 = z 1. In other words, we can say that L C = z 1 + x k 1. 2) S = {m, h}, with (m, h) = 1. We have that z1 m = x 1 and z1 h = x 2. From Bezout s Lemma, there are integers m and h such that mm + hh = 1, hence (z m 1 ) m (z h 1 ) h = z 1, x m 1 x h 2 = z 1, L C = z 1 + x m 1 x h 2. 3) The code C is a sub-code of a code C of type 1) or 2). In this case it is possible to decode C using the general error locator polynomial of C. In fact, if s is correctable syndrome for C, then s is a correctable syndrome also for C. By evaluating L of C in s, we find the error locations. 4) The code C is equivalent to a code C of type 1), 2) or 3). Again, it is possible to decode using the general error locator polynomial of C, as follows. Let φ : (Z 2 ) n (Z 2 ) n be the coordinate permutation function providing the code equivalence, i.e. φ(c ) = C. Let e be a correctable error for C. We have that e = φ 1 (e) is a correctable error for C (φ is distance invariant).let s be the syndrome corresponding to e. By evaluating L of C in s, we find e and hence e, since e = φ(e ). 14

15 6 Codes with t = 2 and n < 63 In this section we consider all binary cyclic codes with t = 2, n < 63 and n odd, summarizing all the cases we have discussed. By a direct inspection the following theorem is easily established. Theorem 6.1. Let C be an [n, k, d] binary cyclic code with d {5, 6} and 7 n < 63 (n odd). Then there are only five cases: 1. C admits a defining set of type 2. C admits a defining set of type S = {1, 2i + 1}, i 1. S = {1, n 1, l}. 3. C is one of the following two codes: a) n = 39, S = {0, 1}, b) n = 51, S = {0, 1, 5}. 4. C is a sub-code of one of the codes of the above cases. 5. C is equivalent to one of the codes of the above cases. For all the codes in points 1) and 2) of Theorem 6.1, the general error locator polynomial is of type L = z 2 + a(x 1, x 2, x 3 )z + b(x 1, x 2, x 3 ), with a = x 1 (Section 3 and 4). It is interesting to note that also for the codes in point 3) of Theorem 6.1 a direct computation shows that a = x 1. Since the codes of points 4) and 5) of Theorem 6.1 can be decoded using the polynomials for the other three cases, we need only exhibit b for codes covered by points 1), 2) and 3). Moreover, we need provide b only for one code in any equivalence class. The results are presented in the following table. They are grouped according to the length. Within one group, all codes that may be decoded with a polynomial L are on the right of L. Among these codes, the one in bold corresponds to the code actually used to compute L. The value in the third column, case, explains which point of Theorem 6.1 has been used to describe the corresponding code family in the last column. Observe that some times a code family might be described with either point 1 or point 2. 15

16 n B case codes 9 x {0, 1} 15 x 2 x x2 1 1 {1, 3}, {3, 7}, {1, 3, 7}, {0, 1, 3} x 1 x x 1x 14 2 x 3 2 {0, 1, 7} 17 x x x x {1}, {3}, {0, 1} 21 {1, 3}, {5, 9}, x 2 x x2 1 1 {1, 3, 7}, {3, 5, 9} {5, 7, 9}, {1, 3, 9}, {0, 1, 3}, {0, 1, 3, 9} x 1 x x 1x 62 2 x 3 2 {0, 1, 5}, {0, 1, 5, 7} 25 x x {1} 27 x x x 3 2 {0, 1} x 2 x x {1, 9}, {0, 1, 9} 31 x 13 2 x x12 2 x8 1 + x10 2 x7 1 + x6 2 x5 1 1 {1, 15}, {3, 7}, {5, 11} {1, 5}, {1, 7}, {3, 11} {5, 7}, {1, 11, 15} x 8 2 x x2 2 x {1, 15}, {3, 15} {0, 1, 5}, {0, 1, 7} {1, 5, 15}, {1, 7, 15} {1, 3}, {7, 15}, {7, 11}, {1, 11}, {3, 5}, {5, 15} x 2 x x2 1 1 {1, 3, 7}, {0, 1, 3, 7} {3, 7, 11}, {1, 5, 11} {3, 5, 7}, {5, 11, 15} {1, 3, 15}, {3, 7, 15} {5, 7, 11}, {3, 5, 11} continued on the next page 16

17 continued from the previous page n B case codes 33 x x2 1 x 3 2 {0, 1}, {0, 1, 5} {0, 1, 11}, {0, 1, 5, 11} 35 {1, 5}, {3, 15} x 2 2 x x x x x x {3, 5, 15}, {1, 5, 15} {0, 1, 5}, {0, 1, 5, 15} x x 2 + x {1, 3}, {1, 3, 7} 39 x x x x x {0, 1}, {0, 1, 13} +x x x x x x 2 2 {0, 1, 7}, {0, 1, 7, 13} 43 x x x x x {1}, {0, 1} x x x x x x x {1, 3}, {7, 21} {1, 3, 21}, {3, 7, 21} {1, 3, 9}, {7, 9, 21} {1, 3, 7}, {0, 1, 3} {1, 3, 9, 15}, {1, 3, 15} x x 2 + x {1, 3, 15, 21}, {1, 3, 9, 21} {1, 3, 9, 15, 21}, {0, 1, 3, 9} {0, 1, 3, 15}, {0, 1, 3, 21} {0, 1, 3, 9, 15, 21} {1, 3, 7, 9, 21} {0, 1, 3, 9, 15}, {0, 1, 3, 15, 21} {0, 1, 3, 9, 21} x 4 2 x8 1 + x2 2 x5 1 + x 2x x x {1, 21}, {3, 7} +x x x x x {0, 1, 15, 21}, {0, 1, 21} +x x2 1 {1, 21, 15} {1, 9}, {7, 9} x 2 2 x x x x x x2 1 1 {0, 1, 9, 15}, {0, 1, 9, 21} {0, 1, 5, 7, 9}, {0, 1, 5, 9} x 1 x x 1 x x 3 2 {0, 1, 7}, {0, 1, 7, 9} {0, 1, 5, 7} x 3 x x5 2 x x4 2 x x2 2 x {1, 7, 15}, {1, 5, 7, 15} +x x x x x {0, 1, 7, 15}, {0, 1, 5, 7, 15} +x x x2 1 continued on the next page 17

18 continued from the previous page n B case codes 51 {1, 3}, {5, 9} x 2 x x {3, 19}, {9, 11} {0, 1, 3}, {0, 1, 3, 17}, {1, 3, 17} {1, 9}, {9, 19} x 5 2 x x 4 2 x x4 2 x x3 2 x {3, 11}, {3, 5} +x 3 2 x x2 2 x x 2 2 x x 2x {0, 1, 9}, {0, 1, 9, 17} +x 2 x x 2 x x 2 x x206 1 {1, 9, 19}, {0, 1, 9, 19} {1, 9, 17}, {1, 9, 17, 19} {0, 1, 19}, {0, 1, 17, 19} x 1 x x 1 x x 3 2 {0, 1, 5, 17, 19}, {0, 1, 5, 11, 17, 19} {0, 1, 9, 17, 19} x 5 2 x x 5 2 x x4 2 x x 4 2 x {0, 1, 5} +x 2 2 x x 2 2 x x 2 2 x x2 2 x {0, 1, 5, 17} +x 2 x x 2 x x x x 2 1 {0, 1, 5, 19} 55 x x {1}, {3}, {1, 3} {1, 11}, {3, 11}, {1, 3, 11} 57 x x x 3 2 {0, 1}, {0, 1, 5} {0, 1, 19}, {0, 1, 5, 19} Table 1: Binary cyclic code with t = 2 and n < 63 7 Conclusions and further research In this paper we provide general error locator polynomials for all binary cyclic codes, with t 2 and n < 63. In all these cases our polynomials are sparse, suggesting that any decoding procedure based on the general error locator polynomial of a cyclic code might be efficient. Actually the number of monomials of L apparently grows linearly, since L n. We give some theoretical explanations for the sparsity of our polynomials, in all cases except two. A complete proof for all cases (any n and any t) seems far beyond our means, at present, but we plan to investigate more and more particular cases, hoping sooner or later to get the profound reason behind the sparsity, whose experimental evidence is apparent (at least in the binary case). 18

19 8 Acknowledgments The authors would like to thank P. Fitzpatrick and C. Traverso for their comments on our work. The second author would like to thank the third author (her supervisor). A special thank to M. Giusti, for the use of the computational cluster MEDICIS, and to the Singular team, for their powerful software package. References [1] M. Caboara, T. Mora, The Chen-Reed-Helleseth-Truong Decoding Algorithm and the Gianni-Kalkbrenner Gröbner Shape Theorem, AAECC, n. 13, p , [2] X. Chen, I. S. Reed, T. Helleseth, K. Truong, Use of Gröbner Bases to Decode Binary Cyclic Codes up to the True Minimum Distance, IEEE Trans. on Inf. Th., vol. 40, p , [3] A.B. III Cooper, Direct solution of BCH decoding equations, Comm., Cont. and Sign. Proc., p , [4] A.B. III Cooper, Finding BCH error locator polynomials in one step, Electronic Letters, vol. 27, p , [5] P. Fitzpatrick, On the Key Equation, IEEE Trans. on Inf. Th., vol , 1995 [6] F. J. MacWilliams, N.J.A. Sloane, The Theory of Error-Correcting Codes, North Holland, [7] T. Mora, M. Sala, On the Groebner bases for some symmetric systems and their application to Coding Theory, JSC, n. 35, p , [8] S. Lin and E. J. Weldon, Jr., Long BCH codes are bad, Information and Control, 11(4): , October [9] E. Orsini, M. Sala, Correcting errors and erasures via the syndrome variety, J. Pure Appl. Algebra, accepted for publication. [10] W.W. Peterson, E.J. Weldon, Jr., Error Correcting Codes, MIT Press, [11] M. Sala, Gröbner bases and distance of cyclic codes, AAECC, vol. 13, no. 2, ,

General error locator polynomials for nth-root codes

General error locator polynomials for nth-root codes General error locator polynomials for nth-root codes Marta Giorgetti 1 and Massimiliano Sala 2 1 Department of Mathematics, University of Milano, Italy 2 Boole Centre for Research in Informatics, UCC Cork,

More information

Groebner basis techniques to compute weight distributions of shortened cyclic codes

Groebner basis techniques to compute weight distributions of shortened cyclic codes Groebner basis techniques to compute weight distributions of shortened cyclic codes 2nd February 2007 Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland.

More information

A classification of MDS binary systematic codes

A classification of MDS binary systematic codes A classification of MDS binary systematic codes Eleonora Guerrini (guerrini@science.unitn.it) Department of Mathematics, University of Trento, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre

More information

A commutative algebra approach to linear codes

A commutative algebra approach to linear codes A commutative algebra approach to linear codes Marta Giorgetti (giorge@mat.unimi.it) Department of Mathematics, University of Milano, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Interesting Examples on Maximal Irreducible Goppa Codes

Interesting Examples on Maximal Irreducible Goppa Codes Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES. 1. Introduction

ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES. 1. Introduction Bulletin of the Iranian Mathematical Society Vol 31 No 2 (2005), pp 13-32 ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES MARTA GIORGETTI*, MARTA ROSSI AND MASSIMILIANO SALA Abstract In [30]

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

On the Weight Distribution of N-th Root Codes

On the Weight Distribution of N-th Root Codes Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed

More information

Skew Cyclic Codes Of Arbitrary Length

Skew Cyclic Codes Of Arbitrary Length Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American

More information

A theory for the distance of cyclic codes

A theory for the distance of cyclic codes A theory for the distance of cyclic codes (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland (Part of this work is jointly with E. Betti and F. Ponchio) Workshop D1: Gröbner

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

On formulas for decoding binary cyclic codes

On formulas for decoding binary cyclic codes On formulas for decoding binary cyclic codes Daniel Augot INRIA-Rocquencourt Domaine de Voluceau Le Chesnay, FRANCE Magali Bardet Laboratoire LITIS Université de Rouen Jean-Charles Faugère INRIA Rocquencourt,

More information

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

On the Gröbner basis of a family of quasi-cyclic LDPC codes

On the Gröbner basis of a family of quasi-cyclic LDPC codes On the Gröbner basis of a family of quasi-cyclic LDPC codes July 21, 2005 Marta Giorgetti (giorge@matunimiit) Department of Mathematics, University of Milan, Italy Marta Rossi (martarossi@possodmunipiit)

More information

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Decoding linear codes via systems solving: complexity issues and generalized Newton identities Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

an author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 3-1974 WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

On the Splitting of MO(2) over the Steenrod Algebra. Maurice Shih

On the Splitting of MO(2) over the Steenrod Algebra. Maurice Shih On the Splitting of MO(2) over the Steenrod Algebra Maurice Shih under the direction of John Ullman Massachusetts Institute of Technology Research Science Institute On the Splitting of MO(2) over the Steenrod

More information

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1. Cyclic Codes II Generator Matrix We would now like to consider how the ideas we have previously discussed for linear codes are interpreted in this polynomial version of cyclic codes. Theorem 6: If the

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

1 Fields and vector spaces

1 Fields and vector spaces 1 Fields and vector spaces In this section we revise some algebraic preliminaries and establish notation. 1.1 Division rings and fields A division ring, or skew field, is a structure F with two binary

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Construction of Barnes-Wall Lattices from Linear Codes over Rings

Construction of Barnes-Wall Lattices from Linear Codes over Rings 01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia Email:harshanjagadeesh@monhedu

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

Reed-Muller Codes. Sebastian Raaphorst Carleton University

Reed-Muller Codes. Sebastian Raaphorst Carleton University Reed-Muller Codes Sebastian Raaphorst Carleton University May 9, 2003 Abstract This paper examines the family of codes known as Reed-Muller codes. We begin by briefly introducing the codes and their history

More information

Idempotent Generators of Generalized Residue Codes

Idempotent Generators of Generalized Residue Codes 1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

21073 Hamburg, GERMANY

21073 Hamburg, GERMANY International Journal of Pure and Applied Mathematics Volume 91 No. 2 2014, 155-167 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v91i2.2

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

1 Vandermonde matrices

1 Vandermonde matrices ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Self-Dual Cyclic Codes

Self-Dual Cyclic Codes Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

CYCLIC SIEVING FOR CYCLIC CODES

CYCLIC SIEVING FOR CYCLIC CODES CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show

More information

The Cosets Code. Aubrey Neumann. Summer 2010

The Cosets Code. Aubrey Neumann. Summer 2010 The Cosets Code Aubrey Neumann Summer 2010 1 Introduction This paper will propose a new binary linear code, determine its fundamental properties and explore the effectiveness single iteration voting decoding.

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Computation of the Minimal Associated Primes

Computation of the Minimal Associated Primes Computation of the Minimal Associated Primes Santiago Laplagne Departamento de Matemática, Universidad de Buenos Aires Buenos Aires, Argentina slaplagn@dm.uba.ar Abstract. We propose a new algorithm for

More information

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

The Golay codes. Mario de Boer and Ruud Pellikaan

The Golay codes. Mario de Boer and Ruud Pellikaan The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Repeated-Root Self-Dual Negacyclic Codes over Finite Fields

Repeated-Root Self-Dual Negacyclic Codes over Finite Fields Journal of Mathematical Research with Applications May, 2016, Vol. 36, No. 3, pp. 275 284 DOI:10.3770/j.issn:2095-2651.2016.03.004 Http://jmre.dlut.edu.cn Repeated-Root Self-Dual Negacyclic Codes over

More information

Linear, Cyclic and Constacyclic Codes over S 4 = F 2 + uf 2 + u 2 F 2 + u 3 F 2

Linear, Cyclic and Constacyclic Codes over S 4 = F 2 + uf 2 + u 2 F 2 + u 3 F 2 Filomat 28:5 (2014), 897 906 DOI 10.2298/FIL1405897O Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Linear, Cyclic and Constacyclic

More information

MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions

MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions Basic Questions 1. Give an example of a prime ideal which is not maximal. In the ring Z Z, the ideal {(0,

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

ERRATA. Abstract Algebra, Third Edition by D. Dummit and R. Foote (most recently revised on February 14, 2018)

ERRATA. Abstract Algebra, Third Edition by D. Dummit and R. Foote (most recently revised on February 14, 2018) ERRATA Abstract Algebra, Third Edition by D. Dummit and R. Foote (most recently revised on February 14, 2018) These are errata for the Third Edition of the book. Errata from previous editions have been

More information

ELEC3227/4247 Mid term Quiz2 Solution with explanation

ELEC3227/4247 Mid term Quiz2 Solution with explanation ELEC7/447 Mid term Quiz Solution with explanation Ang Man Shun Department of Electrical and Electronic Engineering, University of Hong Kong Document creation date : 015 1 05 This document explain the solution

More information

Skew cyclic codes: Hamming distance and decoding algorithms 1

Skew cyclic codes: Hamming distance and decoding algorithms 1 Skew cyclic codes: Hamming distance and decoding algorithms 1 J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro Department of Algebra and CITIC, University of Granada Department of Computer Sciences and

More information

Möller s Algorithm. the algorithm developed in [14] was improved in [18] and applied in order to solve the FGLM-problem;

Möller s Algorithm. the algorithm developed in [14] was improved in [18] and applied in order to solve the FGLM-problem; Möller s Algorithm Teo Mora (theomora@disi.unige.it) Duality was introduced in Commutative Algebra in 1982 by the seminal paper [14] but the relevance of this result became clear after the same duality

More information

SF2729 GROUPS AND RINGS LECTURE NOTES

SF2729 GROUPS AND RINGS LECTURE NOTES SF2729 GROUPS AND RINGS LECTURE NOTES 2011-03-01 MATS BOIJ 6. THE SIXTH LECTURE - GROUP ACTIONS In the sixth lecture we study what happens when groups acts on sets. 1 Recall that we have already when looking

More information

CYCLIC SEPARABLE GOPPA CODES

CYCLIC SEPARABLE GOPPA CODES bsv@aanet.ru sna@delfa.net Saint Petersburg State University of Aerospace Instrumentation Russia Algebraic and Combinatorial Coding Theory June 15-21, 2012 Pomorie, Bulgaria Outline Overview of previous

More information

Finite Fields and Error-Correcting Codes

Finite Fields and Error-Correcting Codes Lecture Notes in Mathematics Finite Fields and Error-Correcting Codes Karl-Gustav Andersson (Lund University) (version 1.013-16 September 2015) Translated from Swedish by Sigmundur Gudmundsson Contents

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

CHAPTER 14. Ideals and Factor Rings

CHAPTER 14. Ideals and Factor Rings CHAPTER 14 Ideals and Factor Rings Ideals Definition (Ideal). A subring A of a ring R is called a (two-sided) ideal of R if for every r 2 R and every a 2 A, ra 2 A and ar 2 A. Note. (1) A absorbs elements

More information

A deterministic algorithm for the distance and weight distribution of binary nonlinear codes

A deterministic algorithm for the distance and weight distribution of binary nonlinear codes A deterministic algorithm for the distance and weight distribution of binary nonlinear codes Emanuele Bellini, and Massimiliano Sala. Abstract Given a binary nonlinear code, we provide a deterministic

More information

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named

More information

1. Introduction to commutative rings and fields

1. Introduction to commutative rings and fields 1. Introduction to commutative rings and fields Very informally speaking, a commutative ring is a set in which we can add, subtract and multiply elements so that the usual laws hold. A field is a commutative

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

Finite Fields: An introduction through exercises Jonathan Buss Spring 2014

Finite Fields: An introduction through exercises Jonathan Buss Spring 2014 Finite Fields: An introduction through exercises Jonathan Buss Spring 2014 A typical course in abstract algebra starts with groups, and then moves on to rings, vector spaces, fields, etc. This sequence

More information

MINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS

MINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS MINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS LORENZ HALBEISEN, MARTIN HAMILTON, AND PAVEL RŮŽIČKA Abstract. A subset X of a group (or a ring, or a field) is called generating, if the smallest subgroup

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

9. Integral Ring Extensions

9. Integral Ring Extensions 80 Andreas Gathmann 9. Integral ing Extensions In this chapter we want to discuss a concept in commutative algebra that has its original motivation in algebra, but turns out to have surprisingly many applications

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information