Quadratic residue code

Quadratic residue code

A quadratic residue code is a type of cyclic code.

There is a quadratic residue code of length pover the finite field GF(l) whenever pand l are primes, p is odd andl is a quadratic residue modulo p.Its generator polynomial as a cyclic code is given by:f(x)=prod_{jin Q}(x-zeta^j)where Q is the set of quadratic residues ofp in the set {1,2,ldots,p-1} andzeta is a primitive pth root ofunity in some finite extension field of GF(l).The condition that l is a quadratic residueof p ensures that the coefficients of flie in GF(l). The dimension of the code is(p+1)/2

Replacing zeta by another primitive p-throot of unity zeta^r either results in the same codeor an equivalent code, according to whether or not ris a quadratic residue of p.

An alternative construction avoids roots of unity. Define:g(x)=c+sum_{jin Q}x^jfor a suitable cin GF(l). When l=2choose c to ensure that g(1)=1while if l is odd c=(1+sqrt{p^*})/2where p^*=p or -p according to whetherp is congruent to 1 or 3modulo 4. Then g(x) also generatesa quadratic residue code; more precisely the ideal ofF_l [X] /langle X^p-1 angle generated by g(x)corresponds to the quadratic residue code.

The minimum weight of a quadratic residue code of length pis greater than sqrt{p}; this is the square root bound.

Adding an overall parity-check digit to a quadratic residue codegives an extended quadratic residue code. Whenpequiv 3 (mod 4) an extended quadratic residue code is self-dual; otherwise it is equivalent but notequal to its dual. By a theorem ofGleason and Prange, the automorphism group of an extended quadratic residue code has a subgroup which is isomorphic toeither PSL_2(p) or SL_2(p).

Examples of quadraticresidue codes include the (7,4) Hamming codeover GF(2), the (23,12) binary Golay codeover GF(2) and the (11,6) ternary Golay codeover GF(3).

References

F. J. MacWilliams and N. J. A. Sloane,"The Theory of Error-Correcting Codes",North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Quadratic residue — In number theory, an integer q is called a quadratic residue modulo n if it is congruent to a perfect square modulo n; i.e., if there exists an integer x such that: Otherwise, q is called a quadratic nonresidue modulo n. Originally an abstract… …   Wikipedia

  • Quadratic sieve — The quadratic sieve algorithm (QS) is a modern integer factorization algorithm and, in practice, the second fastest method known (after the general number field sieve). It is still the fastest for integers under 100 decimal digits or so, and is… …   Wikipedia

  • Quadratic equation — This article is about quadratic equations and solutions. For more general information about quadratic functions, see Quadratic function. For more information about quadratic polynomials, see Quadratic polynomial. In mathematics, a quadratic… …   Wikipedia

  • Cyclic code — In coding theory, cyclic codes are linear block error correcting codes that have convenient algebraic structures for efficient error detection and correction. Contents 1 Definition 2 Algebraic structure 3 Examples …   Wikipedia

  • Binary Golay code — In mathematics and computer science, a binary Golay code is a type of error correcting code used in digital communications. The binary Golay code, along with the ternary Golay code, has a particularly deep and interesting connection to the theory …   Wikipedia

  • Ternary Golay code — There are two closely related error correcting codes known as ternary Golay codes. The code generally known simply as the ternary Golay code is a perfect (11, 6, 5) ternary linear code; the extended ternary Golay code is a (12, 6, 6) linear code… …   Wikipedia

  • List of mathematics articles (Q) — NOTOC Q Q analog Q analysis Q derivative Q difference polynomial Q exponential Q factor Q Pochhammer symbol Q Q plot Q statistic Q systems Q test Q theta function Q Vandermonde identity Q.E.D. QED project QR algorithm QR decomposition Quadratic… …   Wikipedia

  • Blum Blum Shub — (B.B.S.) is a pseudorandom number generator proposed in 1986 by Lenore Blum, Manuel Blum and Michael Shub (Blum et al, 1986).Blum Blum Shub takes the form:: x n +1 = ( xn )2 mod M where M=pq is the product of two large primes p and q . At each… …   Wikipedia

  • Rabin cryptosystem — The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization. However the Rabin cryptosystem has the advantage that the problem on which it relies has been proved …   Wikipedia

  • Cayley-Purser algorithm — The Cayley Purser algorithm was a public key cryptography algorithm published in early 1999 by 16 year old Irishwoman Sarah Flannery, based on an unpublished work by Michael Purser, founder of Baltimore Technologies, a Dublin data security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”