Important: to view this notebook properly you will need to execute the cell above, which assumes you have an Internet connection. It should already be selected, or place your cursor anywhere above to select. Then press the "Run" button in the menu bar above (the right-pointing arrowhead), or press Shift-Enter on your keyboard.
ParseError: KaTeX parse error: \newcommand{\lt} attempting to redefine \lt; use \renewcommand
With knowledge of polynomial rings and finite fields, it is now possible to derive more sophisticated codes than those of Chapter 8. First let us recall that an (n,k)-block code consists of a one-to-one encoding function E:Z2k→Z2n and a decoding function D:Z2n→Z2k. The code is error-correcting if D is onto. A code is a linear code if it is the null space of a matrix H∈Mk×n(Z2).
We are interested in a class of codes known as cyclic codes. Let ϕ:Z2k→Z2n be a binary (n,k)-block code. Then ϕ is a if for every codeword (a1,a2,…,an), the cyclically shifted n-tuple (an,a1,a2,…,an−1) is also a codeword. Cyclic codes are particularly easy to implement on a computer using shift registers [2, 3].
Example22.14
Consider the (6,3)-linear codes generated by the two matrices
We would like to find an easy method of obtaining cyclic linear codes. To accomplish this, we can use our knowledge of finite fields and polynomial rings over Z2. Any binary n-tuple can be interpreted as a polynomial in Z2[x]. Stated another way, the n-tuple (a0,a1,…,an−1) corresponds to the polynomial
f(x)=a0+a1x+⋯+an−1xn−1,
where the degree of f(x) is at most n−1. For example, the polynomial corresponding to the 5-tuple (10011) is
1+0x+0x2+1x3+1x4=1+x3+x4.
Conversely, with any polynomial f(x)∈Z2[x] with degf(x)<n we can associate a binary n-tuple. The polynomial x+x2+x4 corresponds to the 5-tuple (01101).
Let us fix a nonconstant polynomial g(x) in Z2[x] of degree n−k. We can define an (n,k)-code C in the following manner. If (a0,…,ak−1) is a k-tuple to be encoded, then f(x)=a0+a1x+⋯+ak−1xk−1 is the corresponding polynomial in Z2[x]. To encode f(x), we multiply by g(x). The codewords in C are all those polynomials in Z2[x] of degree less than n that are divisible by g(x). Codes obtained in this manner are called .
Example22.15
If we let g(x)=1+x3, we can define a (6,3)-code C as follows. To encode a 3-tuple (a0,a1,a2), we multiply the corresponding polynomial f(x)=a0+a1x+a2x2 by 1+x3. We are defining a map ϕ:Z23→Z26 by ϕ:f(x)↦g(x)f(x). It is easy to check that this map is a group homomorphism. In fact, if we regard Z2n as a vector space over Z2,ϕ is a linear transformation of vector spaces (see Exercise 20.4.15, Chapter 20). Let us compute the kernel of ϕ. Observe that ϕ(a0,a1,a2)=(000000) exactly when
Since the polynomials over a field form an integral domain, a0+a1x+a2x2 must be the zero polynomial. Therefore, kerϕ={(000)} and ϕ is one-to-one.
To calculate a generator matrix for C, we merely need to examine the way the polynomials 1,x, and x2 are encoded:
(1+x3)⋅1(1+x3)x(1+x3)x2=1+x3=x+x4=x2+x5.
We obtain the code corresponding to the generator matrix G1 in Example 22.14. The parity-check matrix for this code is
H=100010001100010001.
Since the smallest weight of any nonzero codeword is 2, this code has the ability to detect all single errors.
Rings of polynomials have a great deal of structure; therefore, our immediate goal is to establish a link between polynomial codes and ring theory. Recall that xn−1=(x−1)(xn−1+⋯+x+1). The factor ring
Rn=Z2[x]/⟨xn−1⟩
can be considered to be the ring of polynomials of the form
f(t)=a0+a1t+⋯+an−1tn−1
that satisfy the condition tn=1. It is an easy exercise to show that Z2n and Rn are isomorphic as vector spaces. We will often identify elements in Z2n with elements in Z[x]/⟨xn−1⟩. In this manner we can interpret a linear code as a subset of Z[x]/⟨xn−1⟩.
The additional ring structure on polynomial codes is very powerful in describing cyclic codes. A cyclic shift of an n-tuple can be described by polynomial multiplication. If f(t)=a0+a1t+⋯+an−1tn−1 is a code polynomial in Rn, then
tf(t)=an−1+a0t+⋯+an−2tn−1
is the cyclically shifted word obtained from multiplying f(t) by t. The following theorem gives a beautiful classification of cyclic codes in terms of the ideals of Rn.
Theorem22.16
A linear code C in Z2n is cyclic if and only if it is an ideal in Rn=Z[x]/⟨xn−1⟩.
Proof
Let C be a linear cyclic code and suppose that f(t) is in C. Then tf(t) must also be in C. Consequently, tkf(t) is in C for all k∈N. Since C is a linear code, any linear combination of the codewords f(t),tf(t),t2f(t),…,tn−1f(t) is also a codeword; therefore, for every polynomial p(t),p(t)f(t) is in C. Hence, C is an ideal.
Conversely, let C be an ideal in Z2[x]/⟨xn+1⟩. Suppose that f(t)=a0+a1t+⋯+an−1tn−1 is a codeword in C. Then tf(t) is a codeword in C; that is, (a1,…,an−1,a0) is in C.
Theorem 22.16 tells us that knowing the ideals of Rn is equivalent to knowing the linear cyclic codes in Z2n. Fortunately, the ideals in Rn are easy to describe. The natural ring homomorphism ϕ:Z2[x]→Rn defined by ϕ[f(x)]=f(t) is a surjective homomorphism. The kernel of ϕ is the ideal generated by xn−1. By Theorem 16.34, every ideal C in Rn is of the form ϕ(I), where I is an ideal in Z2[x] that contains ⟨xn−1⟩. By Theorem 17.20, we know that every ideal I in Z2[x] is a principal ideal, since Z2 is a field. Therefore, I=⟨g(x)⟩ for some unique monic polynomial in Z2[x]. Since ⟨xn−1⟩ is contained in I, it must be the case that g(x) divides xn−1. Consequently, every ideal C in Rn is of the form
C=⟨g(t)⟩={f(t)g(t):f(t)∈Rn and g(x)∣(xn−1) in Z2[x]}.
The unique monic polynomial of the smallest degree that generates C is called the of C.
Example22.17
If we factor x7−1 into irreducible components, we have
x7−1=(1+x)(1+x+x3)(1+x2+x3).
We see that g(t)=(1+t+t3) generates an ideal C in R7. This code is a (7,4)-block code. As in Example 22.15, it is easy to calculate a generator matrix by examining what g(t) does to the polynomials 1, t,t2, and t3. A generator matrix for C is
G=1101000011010000110100001101.
In general, we can determine a generator matrix for an (n,k)-code C by the manner in which the elements tk are encoded. Let xn−1=g(x)h(x) in Z2[x]. If g(x)=g0+g1x+⋯+gn−kxn−k and h(x)=h0+h1x+⋯+hkxk, then the n×k matrix
We will leave the details of the proof of the following proposition as an exercise.
Proposition22.18
Let C=⟨g(t)⟩ be a cyclic code in Rn and suppose that xn−1=g(x)h(x). Then G and H are generator and parity-check matrices for C, respectively. Furthermore, HG=0.
To determine the error-detecting and error-correcting capabilities of a cyclic code, we need to know something about determinants. If α1,…,αn are elements in a field F, then the n×n matrix
Expanding this determinant by cofactors on the last column, we see that p(x) is a polynomial of at most degree n−1. Moreover, the roots of p(x) are α1,…,αn−1, since the substitution of any one of these elements in the last column will produce a column identical to the last column in the matrix. Remember that the determinant of a matrix is zero if it has two identical columns. Therefore,
If we let x=αn, the result now follows immediately.
The following theorem gives us an estimate on the error detection and correction capabilities for a particular generator polynomial.
Theorem22.21
Let C=⟨g(t)⟩ be a cyclic code in Rn and suppose that ω is a primitive nth root of unity over Z2. If s consecutive powers of ω are roots of g(x), then the minimum distance of C is at least s+1.
Proof
Suppose that
g(ωr)=g(ωr+1)=⋯=g(ωr+s−1)=0.
Let f(x) be some polynomial in C with s or fewer nonzero coefficients. We can assume that
f(x)=ai0xi0+ai1xi1+⋯+ais−1xis−1
be some polynomial in C. It will suffice to show that all of the ai's must be 0. Since
g(ωr)=g(ωr+1)=⋯=g(ωr+s−1)=0
and g(x) divides f(x),
f(ωr)=f(ωr+1)=⋯=f(ωr+s−1)=0.
Equivalently, we have the following system of equations:
can be shown to be nonzero using Lemma 22.20 and the basic properties of determinants (Exercise). Therefore, this solution must be ai0=ai1=⋯=ais−1=0.
Some of the most important codes, discovered independently by A. Hocquenghem in 1959 and by R. C. Bose and D. V. Ray-Chaudhuri in 1960, are BCH codes. The European and transatlantic communication systems both use BCH codes. Information words to be encoded are of length 231, and a polynomial of degree 24 is used to generate the code. Since 231+24=255=28−1, we are dealing with a (255,231)-block code. This BCH code will detect six errors and has a failure rate of 1 in 16 million. One advantage of BCH codes is that efficient error correction algorithms exist for them.
The idea behind BCH codes is to choose a generator polynomial of smallest degree that has the largest error detection and error correction capabilities. Let d=2r+1 for some r≥0. Suppose that ω is a primitive nth root of unity over Z2, and let mi(x) be the minimal polynomial over Z2 of ωi. If
g(x)=lcm[m1(x),m2(x),…,m2r(x)],
then the cyclic code ⟨g(t)⟩ in Rn is called the nd. By Theorem 22.21, the minimum distance of C is at least d.
Theorem22.22
Let C=⟨g(t)⟩ be a cyclic code in Rn. The following statements are equivalent.
The code C is a BCH code whose minimum distance is at least d.
A code polynomial f(t) is in C if and only if f(ωi)=0 for 1≤i<d.
(1) ⇒ (2). If f(t) is in C, then g(x)∣f(x) in Z2[x]. Hence, for i=1,…,2r,f(ωi)=0 since g(ωi)=0. Conversely, suppose that f(ωi)=0 for 1≤i≤d. Then f(x) is divisible by each mi(x), since mi(x) is the minimal polynomial of ωi. Therefore, g(x)∣f(x) by the definition of g(x). Consequently, f(x) is a codeword.
(2) ⇒ (3). Let f(t)=a0+a1t+⋯+an−1vtn−1 be in Rn. The corresponding n-tuple in Z2n is x=(a0a1⋯an−1)t. By (2),
exactly when f(t) is in C. Thus, H is a parity-check matrix for C.
(3) ⇒ (1). By (3), a code polynomial f(t)=a0+a1t+⋯+an−1tn−1 is in C exactly when f(ωi)=0 for i=1,…,2r. The smallest such polynomial is g(t)=lcm[m1(t),…,m2r(t)]. Therefore, C=⟨g(t)⟩.
Example22.23
It is easy to verify that x15−1∈Z2[x] has a factorization
where each of the factors is an irreducible polynomial. Let ω be a root of 1+x+x4. The Galois field GF(24) is
{a0+a1ω+a2ω2+a3ω3:ai∈Z2 and 1+ω+ω4=0}.
By Example 22.8, ω is a primitive 15th root of unity. The minimal polynomial of ω is m1(x)=1+x+x4. It is easy to see that ω2 and ω4 are also roots of m1(x). The minimal polynomial of ω3 is m2(x)=1+x+x2+x3+x4. Therefore,
g(x)=m1(x)m2(x)=1+x4+x6+x7+x8
has roots ω,ω2,ω3,ω4. Since both m1(x) and m2(x) divide x15−1, the BCH code is a (15,7)-code. If x15−1=g(x)h(x), then h(x)=1+x4+x6+x7; therefore, a parity-check matrix for this code is