Fields: Defns “Closed”: a,b in F  a+b, a.b in F Properties: – Commutative: a+b=b+a, a.b=b.a – Associative: a+(b+c)=(a+b)+c, a.(b.c) = (a.b).c – Distributive:

Slides:



Advertisements
Similar presentations
296.3Page :Algorithms in the Real World Error Correcting Codes II – Cyclic Codes – Reed-Solomon Codes.
Advertisements

1. 2 Overview Review of some basic math Review of some basic math Error correcting codes Error correcting codes Low degree polynomials Low degree polynomials.
15-853:Algorithms in the Real World
Information and Coding Theory
1 Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Presentation by Adi Akavia.
Information and Coding Theory Finite fields. Juris Viksna, 2015.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Slides by Adi Akavia.
6/20/2015List Decoding Of RS Codes 1 Barak Pinhas ECC Seminar Tel-Aviv University.
K. -C. Yang and J. -L. Lin National Tsing Hua University
Chapter 11 Algebraic Coding Theory. Single Error Detection M = (1, 1, …, 1) is the m  1 parity check matrix for single error detection. If c = (0, 1,
Introduction Polynomials
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
1. 2 Overview Some basic math Error correcting codes Low degree polynomials Introduction to consistent readers and consistency tests H.W.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Finite fields.
5. Similarity I.Complex Vector Spaces II.Similarity III.Nilpotence IV.Jordan Form Topics Goal: Given H = h B → B, find D s.t. K = h D → D has a simple.
INDR 262 INTRODUCTION TO OPTIMIZATION METHODS LINEAR ALGEBRA INDR 262 Metin Türkay 1.
FINITE FIELDS 7/30 陳柏誠.
Polynomials Algebra Polynomial ideals
Cyclic codes 1 CHAPTER 3: Cyclic and convolution codes Cyclic codes are of interest and importance because They posses rich algebraic structure that can.
CPSC 3730 Cryptography and Network Security
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Great Theoretical Ideas in Computer Science.
Polynomials. Intro An algebraic expression in which variables involved have only non-negative integral powers is called a polynomial. E.g.- (a) 2x 3 –4x.
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
A brief adventure in C++ by Michael Cotton. Bounded distance decodingList decoding.
15-853Page :Algorithms in the Real World Error Correcting Codes II – Cyclic Codes – Reed-Solomon Codes.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Great Theoretical Ideas in Computer Science.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 5.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
7.3 Products and Factors of Polynomials Objectives: Multiply polynomials, and divide one polynomial by another by using long division and synthetic division.
1 © 2010 Pearson Education, Inc. All rights reserved © 2010 Pearson Education, Inc. All rights reserved Chapter 3 Polynomial and Rational Functions.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
1 Asymptotically good binary code with efficient encoding & Justesen code Tomer Levinboim Error Correcting Codes Seminar (2008)
Linear Algebra Chapter 2 Matrices.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Cryptography and Network Security Chapter 4 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Applied Symbolic Computation1 Applied Symbolic Computation (CS 567) The Fast Fourier Transform (FFT) and Convolution Jeremy R. Johnson TexPoint fonts used.
Reed-Solomon Codes Rong-Jaye Chen.
6.6 Rings and fields Rings  Definition 21: A ring is an Abelian group [R, +] with an additional associative binary operation (denoted ·) such that.
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cyclic Linear Codes. p2. OUTLINE  [1] Polynomials and words  [2] Introduction to cyclic codes  [3] Generating and parity check matrices for cyclic.
Advanced Algorithms Analysis and Design By Dr. Nazir Ahmad Zafar Dr Nazir A. Zafar Advanced Algorithms Analysis and Design.
Class Report 林格名 : Reed Solomon Encoder. Reed-Solomom Error Correction When a codeword is decoded, there are three possible outcomes –If 2s + r < 2t (s.
Chapter 1. Linear equations Review of matrix theory Fields System of linear equations Row-reduced echelon form Invertible matrices.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
Information and Coding Theory
Sec. 4-3: Matrix Multiplication 8/24/17
Cyclic Codes 1. Definition Linear:
Polynomials.
Great Theoretical Ideas in Computer Science
15-853:Algorithms in the Real World
Polynomial Let R be a ring. A polynomial over R is an expression of the form: f (x) = a0 + a1x + a2x2 +…+ anxn where the ai  R called the coefficients.
Polynomials, Secret Sharing, And Error-Correcting Codes
Fundamental Theorem of Algebra
Deciding Primality is in P
Finite Fields Rong-Jaye Chen.
I. Finite Field Algebra.
Chapter 1. Linear equations
CHAPTER 3: Cyclic and convolution codes
296.3:Algorithms in the Real World
Presentation transcript:

Fields: Defns “Closed”: a,b in F  a+b, a.b in F Properties: – Commutative: a+b=b+a, a.b=b.a – Associative: a+(b+c)=(a+b)+c, a.(b.c) = (a.b).c – Distributive: a.(b+c)=a.b+a.c – a+0=0+a=a, a.1=1.a=a – a+(-a)=0, a.a -1 =1

Facts about fields Examples: Q, R, C, P(x)/Q(x) if P(x),Q(x) in F(x),… Non-examples: Z, P(x) in F(x), … Algebraically closed: C – roots of P(x) in C(x) must be in C (Fundamental theorem of algebra) Not algebraically closed: C – roots of P(x) in R(x) may not be in C

Q1. “Useful facts” about finite F Characteristic: – Finite (else infinite field) – Prime (else exist non-zero a,b s.t. a.b = 0) Closed set under + and scalar., other props “Must be” n copies of set of characteristic p. Let the set (“group”) generated by powers of a be H. Then all sets of the form aH have the same size and are disjoint (bijection). Hence |H| divides |F|. Hence… Eg: 3 in F 7, but not 2.

Q2. Prime-order fields (a+b)mod(p), (a.b)mod(p) … -a = p-a, a -1 = a |F|-1 (why?) Hint: Binomial theorem, mod p,… Keep dividing P(x) by (x-r i ). Not closed eg: x 2 +x+1 over F 2

Q2. Prime-order fields (contd.) a±b  (a±b)mod(p), cost O(log(p)) a.b  (a.b)mod(p), cost O(log 2 (p)) (why?) a b  (a b )mod(p), cost O(log 3 (p)) (generate a, a 2,a 4,… in time O(log 3 (p)), then multiply subset also in time O(log 3 (p)) ) log a b  HARD (brute force, O(p.poly(log(p)) a/b  a. b -1 – mb+np=1 (Euclid’s algorithm, find m) O(…?) – b |F|-1, cost O(log 3 (p))

Q3.Prime-power-order fields Analogue – a ≅ a(x) (with coeffs from F p ) – p ≅ p(x) (prime ≅ “irreducible” (no factors)) … If p(x) irreducible, consider F(x)(mod p(x))… – Eg: x 2 +1 no solutions over R, but over C=R(x)/(x 2 +1)… Bits…

Q4. Linear algebra over finite fields Yes No. Example: (1 1) over F 2. No. Yes

S-Z Lemma (easy case) If P(x) has degree d, then at most n roots. – Pr a in F (P(a) = 0) ≤d/q If P(x 1,x 2,…,x k ) has degree d, then – Pr a1,a2,…,ak in F (P(a1,a2,…,ak) = 0) ≤d/q (Proof by Induction) – degree(x 2 y 5 +x 4 y 4 ) = 8 by definition

Q5. Rank of random matrices m/q – mxm matrix M=(x ij ). – Det(M) polynomial of degree m (1-q -n ) (1-q -n+1 )…(1-q -n+m+1 )≥(1-q -n+m+1 ) m ≥1-mq -n+m+1 If n>(1+ε)m, ≈1-mq -mε

Q6. BEC(p) Prev question, q=2, R=…? Approx pn bits erased Complexity – Encoding time = O(n 2 ) (Why?) – Decoding time = O(n 3 ) (Why?) – Storage O(n 2 ) – Design time O(n 2 )

Q7. Prop. of Linear codes x=Gm, 0=Hx – No. GT and T’H, for any invertible T, T’ – [G -I].[H T I T ] T =[0] x,y in C means (x-y) in C (why?) Complexity: – Encoding: O(n 2 ) – BSC(p) decoding: O(exp(n)) (naïve)

Q8. Linear GV codes Let x i be codeword with “low” weight d= d min. # codewords of weight at most d ~2 nH(d) Pr G (Gx≠0 for all x of low wt) < (2 nH(d). 2 -n ). 2 -nR Probabilistic method…

Q9. Singleton Bound n n-d+1 d-1 q n-d+1 ≤q nR

Q10. Reed-Solomon encoding nR (m-m’)(x-x’) = n-nR=d min nR=n-d min 0 m=m’ Determinant(Vandermonde matrix) = r i distinct, q≥n.

11. q-BSC(p) Say q=2 m, – Append (say) m’ = m 1/2 zeroes to each packet. – Detect errors (w.p. ~ 2m’). – Use erasure code to decode. Random vs. worst-case noise Naïve: O(n 2 ), O(n 3 ), O(n), O(n) – (Can “cleverly” do O(n.log(n)), O(n.log(n)), O(1), O(1) – how?)

12. Reed-Solomon decoding Note – x i = M(r i ). – Define “error-locator polynomial” E(r i )= – Define q(r,y) = E(r)(y-M(r)) – q(r i,y i )=0 (why?) – E(r i )y i =E(r i )M(r i )=T(r i ) (definition) – T(.) of degree k+t-1 in r, and E(r i ) of degree t, hence # unknown coefficients k+2t+1 ≤ n, linear transform – Not unique (null-space), but only interested in T(r)/E(r). – This unique since T(r i )E’(r i )y i =T’(r i )E(r i )y i. If y i = 0, then T(r i )=T’(r i ) If y i ≠ 0, then T(r i )/E(r i )=T’(r i )/E’(r i ) Degree of M(r) = T(t)/E(r) at most k-1, hence must be equal.