Cryptography Reference
In-Depth Information
disadvantage maybe overcome byusing a larger message space. For instance,
if we want to look at binary15-arycodes, we need onlygo to linear codes over
F
1
2
, and omit all codewords containing some fixed value.
Given that there are manyequivalent matrices, we need a canonical choice.
It can be shown that two
k
×
n
matrices generate equivalent linear [
n,k
]-codes
F
q
if and onlyif one can be obtained from the other bya sequence of the
following operations.
over
R1. A permutation of the rows.
R2. Multiplication of a row bya nonzero scalar.
R3. Addition of a scalar multiple of one row to another.
C1. A permutation of the columns.
C2. Multiplication of a column bya nonzero scalar.
Furthermore, if
G
is a generator matrix for an [
n,k
]-code, then operations
R1-R3 and C1-C2 can transform
G
into standard form,
10
···
0
m
1
,k
+1
···
m
1
,n
01
···
0
m
2
,k
+1
···
m
2
,n
[
I
k
|
M
k,n
−
k
]=
,
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
00
···
1
m
k,k
+1
···
m
k,n
where
I
k
is the
k
×
k
identitymatrix and
M
k,n
−
k
is a
k
×
(
n
−
k
) matrix.
Therefore, [
I
k
|
M
k,n
−
k
] has the first
k
columns to provide the codewords and the
−
remaining
n
k
columns to add redundancy. Note that the generator matrix
G
must have rows that are a basis for a
k
-dimensional subspace of the space
of all vectors of length
n
, namely, our linear code
C
. Hence, everycodeword is
uniquelyexpressible as a linear combination of the rows of
G
, which must be
linearlyindependent.
The first
k
bits are called the
information symbols
and the last
n
k
bits are
the
check symbols
. This means, as the above example shows, that in the encod-
ing, the information symbols appear in the clear. Any code that satisfies this
propertyis said to be
systematic
. Moreover, the redundancyin the remaining
n
−
−
k
columns can be employed to do a parity check in the following fashion.
Given a generating matrix
G
=[
I
k
,M
k,n
−
k
], set
P
=[
M
k,n
−
k
|
I
n
−
k
]
,
where
M
k,n
−
k
is the transpose of
M
k,n
−
k
. Then
P
is called a
parity-check matrix
.
Indeed, anymatrix
M
that, given any
c
−
F
n
, satisfies
cM
t
=
0 if and onlyif
∈
C
is called a parity-check matrix for
C
.
11.8
Thus, anyerrors in transmission
c
∈
11.8
Note that when
C
is an [
n, k
]-code over
F
q
with parity-checkmatrix
P
, then
d
(
C
)isthe
smallest number of columns of
P
that are linearly dependent. It follows that if every subset
of 2
t
or fewer columns of
P
is linearly independent, then
C
is capable of correcting all errors
of weight up to size
t
.If
q
= 2, this implies that when all possible linear combinations of no
more than
t
columns of
P
are distinct, then
d
(
C
)
≥
2
t
+ 1, whence
C
can correct all errors
up to weight
t
.
Search WWH ::
Custom Search