Codes, Curves and Cryptography: Informal Notes. I
Codes, Curves and Cryptography: Informal Notes. I
Codes, Curves and Cryptography: Informal Notes. I
Informal Notes. I
Leopold Kronecker
Viet Nguyen-Khac
1
Galois Fields
A – an alphabet, usually A = Fq
An := A × · · · × A, (n times)
Hamming distance:
(Fn
q , d) – a finite metric (Fq -vector) space
2
The ISBN-Code: a1-a2a3a4 − a5a6a7a8a9-a10
A code C = a subset of Fn
q
Codewords = elements of C
Fact.
The [n, k, d]q-code
C can correct t : =
d−1 d
and detect errors
2 2
4
The Code Domain
k
R(C) := – the information rate
n
dmin
δ(C) := – the relative minimum distance
n
decoding = D : Fn
q → C s.t. D(a) = a, ∀a ∈ C
(a retract)
6
The Main Problem of Coding Theory.
Find good codes, i.e. with both R, δ large
(efficiency + high capability to correct errors)
ϕ : Fkq → Fn
q ←→ G – generator k × n-matrix
ψ : Fn
q → Fq
n−k ←→ H – parity check (n−k)×n-
matrix
C := {u . G : u ∈ Fkq } (Im ϕ)
C := {x ∈ Fn
q : H . tx = 0} (Ker ψ)
11
The Hamming [n, n − r, 3]2-code Hr :
14
The Reed-Solomon code
RS(q, n, k) := ev(Lk−1)
is an M DS code with parameters [n, k, n−k+1]q
16
Examples: The ideal x−1 = {f : f (1) = 0} ↔
the parity check code. In the other extreme
case, the ideal g(x) : = 1 + x + · · · + xn−1 =
{scalar multiples of g} ↔ the repetition code.
n−k
The RS code with n|q − 1 ←→ (x − αj )
j=1
17
Asymptotic Bounds
• αq (δ) ≤ 1 − Hq θ − θ(θ − δ) (Bassalygo-
Elias bound),
(g − 1) 1
Sq (X) := # , Sq := lim Sq (X) ≥ √
X(Fq ) − 1 g>0 [2 q]