
First, we will go through the theory behind the Eisenstein field (EF) and its extension field. In contrast, we provide a detailed framework for building BCH codes over the EF in the second stage. BCH codes over the EF are decoded using the Berlekamp-Massey algorithm (BMA) in this article. We investigate the error-correcting capabilities of these codes and provide expressions for minimal distance. We provide researchers and engineers creating and implementing robust error-correcting codes for digital communication systems with detailed information on building, decoding and performance assessment.
Citation: Muhammad Sajjad, Tariq Shah, Qin Xin, Bander Almutairi. Eisenstein field BCH codes construction and decoding[J]. AIMS Mathematics, 2023, 8(12): 29453-29473. doi: 10.3934/math.20231508
[1] | Sami Alabiad, Yousef Alkhamees . On classification of finite commutative chain rings. AIMS Mathematics, 2022, 7(2): 1742-1757. doi: 10.3934/math.2022100 |
[2] | H. C. Vidya, B. A. Rao . Utilization of Ramanujan-type Eisenstein series in the generation of differential equations. AIMS Mathematics, 2024, 9(10): 28955-28969. doi: 10.3934/math.20241405 |
[3] | Yousef Alkhamees, Badr Alhajouj . Structure of a chain ring as a ring of matrices over a Galois ring. AIMS Mathematics, 2022, 7(9): 15824-15833. doi: 10.3934/math.2022866 |
[4] | Guanghui Zhang, Shuhua Liang . On the construction of constacyclically permutable codes from constacyclic codes. AIMS Mathematics, 2024, 9(5): 12852-12869. doi: 10.3934/math.2024628 |
[5] | Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464 |
[6] | Xiaofan Xu, Yongchao Xu, Shaofang Hong . Some results on ordinary words of standard Reed-Solomon codes. AIMS Mathematics, 2019, 4(5): 1336-1347. doi: 10.3934/math.2019.5.1336 |
[7] | Hatoon Shoaib . Double circulant complementary dual codes over $ \mathbb{F}_4 $. AIMS Mathematics, 2023, 8(9): 21636-21643. doi: 10.3934/math.20231103 |
[8] | Wei Qi . The polycyclic codes over the finite field $ \mathbb{F}_q $. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439 |
[9] | Yang Yan, Hanning Chen, Jianming Wang, Gang Wang . A new construction of asymptotically optimal codebooks. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471 |
[10] | Boran Kim, Chang Heon Kim, Soonhak Kwon, Yeong-Wook Kwon . Jacobi forms over number fields from linear codes. AIMS Mathematics, 2022, 7(5): 8235-8249. doi: 10.3934/math.2022459 |
First, we will go through the theory behind the Eisenstein field (EF) and its extension field. In contrast, we provide a detailed framework for building BCH codes over the EF in the second stage. BCH codes over the EF are decoded using the Berlekamp-Massey algorithm (BMA) in this article. We investigate the error-correcting capabilities of these codes and provide expressions for minimal distance. We provide researchers and engineers creating and implementing robust error-correcting codes for digital communication systems with detailed information on building, decoding and performance assessment.
Algebraic coding theory is a subset of coding theory that uses algebraic structures, especially finite fields, and linear algebra to make error-correcting codes and study how they work. The theory is based on linear codes, in which code words are shown as linear combinations of a given set of vectors called "basis vectors". These codes' minimal distance and error correction capabilities may be studied and enhanced using algebraic methods. The field is important for telephony, data storage and information security, which makes it a key part of current code theory. "Algebraic Codes for Data Transmission" by Richard [1] is a complete introduction to algebraic coding theory. It covers the basics of finite fields, linear codes and decoding methods. It is good for both newbies and more experiencecoders who want to learn more about algebra. "Modern Coding Theory" by Tom and Urbanke [2] is a book about advanced topics in coding theory, such as algebraic codes and iterative decoding methods. It shows how mathematical methods and current ways of coding are related, which makes it an important resource for experts in the field. Algebraic coding theory is a key part of designing and analyzing error-correcting codes, which makes it possible to make communication systems that work well and are reliable. Using algebraic structures, researchers can come up with strong coding schemes and build the theoretical frameworks needed for error correction in channels that are busy and not very reliable.
Ring-linear coding theory employs finite rings or modules as the basic alphabet. This field has grown tremendously. Assmus and Mattson (1963) [3] were among the first to suggest using ring elements for linear codes in their landmark book. An excellent starting point for learning about linear and cyclic codes-based fields is Augot et al. [4]. The Ring-linear coding theory was advanced by Blake [5,6]. He started linear codes based on some special rings and moved on to the main integer residue rings. Blake also introduced Hamming, Reed-Solomon and BCH code analogs. Using group algebra, Spiegel [7,8] linear codes over the integer ring modulo n. With the use of the Chinese Remainder Theorem, Blake was able to use these rings for BCH. In 1958, BCH codes over Galois fields existed. Shah et al. [9] utilized the semigroup ring to encode. In [10,11,12], the authors introduced DNA cyclic codes over F2[u]/(u4−1). Kim et al. In [13], the authors defined quasi-cyclic self-orthogonal codes that can go on forever. Recently, Zullo [14] developed another type of cyclic code. The fundamental binary and ternary BCH code hulls were investigated by Lei et al. [15]. In [16], Liu et al. constructed 2m+1 binary BCH codes.
Eisenstein integers, named after the German mathematician Ferdinand Eisenstein [17], are a special subset of complex numbers that have a significant impact on algebraic number theory. They are expressed as a+bω, where a and b are integers, and ω is a complex number known as the cube root of unity. The cube root of unity, ω, satisfies the equation ω3=1. Eisenstein integers exhibit intriguing properties, including a hexagonal lattice structure when represented on the complex plane. They are closely related to triangular numbers and have applications in various mathematical areas, such as elliptic curves and modular forms. The unique factorization of Eisenstein integers is also of great interest in algebraic number theory, making them a crucial element in studying and understanding number theory concepts.
Error-correcting codes are an essential component of today's sophisticated communication systems because they enable the detection and correction of errors that may occur while data is being sent. BCH codes, which are circular codes, have been studied extensively and are used in real life. BCH codes are made to handle random errors, which makes them good for busy lines of communication. Research on BCH codes has usually been about making and studying codes over limited Galois fields [18]. The authors have created codes using Vectorial Algebra and have also utilized these codes in cryptography [19,20,21,22,23]. Huber [24] presented a two-dimensional modular distance and associated codes. These codes, known as consta-cyclic codes, feature simple constructions and can be classified as a subset of Ⅰ-cyclic (Ideal cyclic) codes. Notably, Ⅰ-cyclic codes include error-correcting Mannheim codes. In addition, Eisenstein fields offer a generalized concept of finite Galois fields with a more intricate structure. Eisenstein's fields have numerous applications, including cryptography, error-correcting codes, communications, etc.
BCH codes are extremely valuable for securing data and providing efficient error correction capabilities. Important ideas for decoding BCH codes center on the polynomials used to find errors and evaluate their severity, as well as the critical key equation that these polynomials meet. There are numerous methods for solving the key equation, each of which provides a decoding algorithm. The Euclidean algorithm [25], BMA [26] and Sugiyama's algorithm (SA) [27] are three of the most effective algorithms. Authors in [28,29,30,31] defined some algebraic structures and its applications in algebraic coding theory and algebraic cryptography. Sajjad et al. [32], constructed Gaussian field-based BCH codes decoding. In this situation, we will use a tweaked version of the Berlekamp-Massey method to fix errors in BCH codes. Due to their superior performance, the EF-based BCH is an area of study.
We have dual objectives. To answer the question, what is Eisenstein's field? To construct BCH codes that operate over the Eisenstein field. BMA-modified BCH codes decoding over the Eisenstein field. Then, we compare the BCH codes' Eisenstein and Galois field findings.
Let ω be the cube root of unity (ω3=1) and 1+ω+ω2=0. Let Z[ω]={u+vω:u,v∈Z} be the Euclidean domain (ED) of the Eisenstein integers (EI) [17, Section 1]. Accordingly, Zp[ω]={u+vω:u,v∈Zp} is a commutative ring with identity. Zp[ω] is the Eisenstein field (EF) if p≡2(mod3) [17, Corollary 14].
Illustration 1. Let Z2[ω]={0,1,ω,1+ω} be the Eisenstein field because every nonzero element of Z2[ω] is a unit element and the cardinality of Z2[ω] is 22=4. Elements of Z2[ω] are given in Figure 1.
Illustration 2. Let
Z5[ω]={0,1,2,3,4,4ω,4+ω,ω,2ω,3ω,1+2ω,1+3ω,1+ω,1+4ω,2+ω,2+2ω,2+4ω,2+3ω,3+ω,3+2ω,3+3ω,3+4ω,4+2ω,4+3ω,4+4ω} |
be an Eisenstein field, because every nonzero element of Z5[ω] is unit element and the cardinality of Z5[ω] is 52=25. Elements of Z5[ω] are shown in Figure 2.
Remark 1. Zp[ω] has p2 elements if p≡2(mod3).
Remark 2. Let Zp[ω]∗ denote the units in Zp[ω] if p≡2(mod3) with cardinality p2−1.
Let Z2[ω] be the Eisenstein field . While Z2[ω][x] is an ED.
For the extension of EF Z2[ω]2, the quotient ring (QR)
Z2[ω][x]/<H(x)>≅GF(24), |
where <H(x)> is the maximal ideal generated by an irreducible polynomial (IP) H(x) of degree 2 in Z2[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Z2[ω]2={u0+u1γ:∀u0,u1∈Z2[ω]}. |
Hence Z2[ω]2 is a 2-degree extension field of the EF Z2[ω], and Z2[ω]∗2=Z2[ω]2∖{0} is a cyclic group (CG) of order 24−1=15.
Illustration 3. Let the ideal
Z2[ω][x]/<x2+x+ω>={u0+u1x:∀u0,u1∈Z2[ω]} |
generated by the primitive IP H(x)=x2+x+ω over Z2[ω] and γ be the root of H(x) in extension field Z2[ω][x], then H(γ)=0 as γ2+γ+ω=0. Thus ,γ2=γ+ω and Z2[ω]∗2=Z2[ω]2∖{0} is a CG of order 22(2)−1=15 in Table 1.
i | γi |
1 | γ |
2 | γ+ω |
3 | γ+ω+γω |
4 | γ+1 |
5 | ω |
6 | γω |
7 | γω+1+ω |
8 | 1+γ+ω |
9 | ω+γω |
10 | 1+ω |
11 | γ+γω |
12 | 1+γ+γω |
13 | 1+γω |
14 | 1+γ+ω+γω |
15 | 1 |
For the extension of EF Z2[ω]3, the QR
Z2[ω][x]/<H(x)>≅GF(26), |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree 3 in Z2[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Z2[ω]3={u0+u1γ+u2γ2:∀u0,u1,u2∈Z2[ω]}. |
Hence Z2[ω]3 is a 3-degree extension field of the EF Z2[ω], and Z2[ω]∗3=Z2[ω]3∖{0} is a CG of order 26−1=63.
Illustration 4. Let the ideal
Z2[ω][x]/<x3+x2+x+ω>={u0+u1x+u2x2:∀u0,u1,u2∈Z2[ω]} |
generated by the primitive IP H(x)=x3+x2+x+ω over Z2[ω] and γ be the root of H(x) in extension field Z2[ω][x], then H(γ)=0 as γ3+γ2+γ+ω=0. Thus, γ3=γ2+γ+ω and Z2[ω]∗3=Z2[ω]3∖{0} is a CG of order 26−1=63 in Table 2.
s | γs | s | γs |
1 | γ | 33 | ωγ2+1+γ+γ2 |
2 | γ2 | 34 | ωγ2+ωγ+1 |
3 | γ2+ω+γ | 35 | ωγ+1+ω+γ |
4 | ω+γ+ωγ | 36 | ωγ2+ωγ+γ+γ2 |
5 | γ2+ωγ+γ2ω | 37 | ωγ+1+γ |
6 | γ2+ωγ+γ+1 | 38 | ωγ2+γ+γ2 |
7 | ω+ωγ2 | 39 | ωγ2+ωγ+1+γ |
8 | ωγ2+ω+1 | 40 | ωγ+1+ω+γ+γ2 |
9 | ωγ2+ω+γ+1 | 41 | ωγ2+ωγ+ω |
10 | ω+γ+1+ωγ2+γ2 | 42 | ω+1 |
11 | 1+γ2ω | 43 | ωγ+γ |
12 | γ+1+ωγ2+ω+ωγ | 44 | ωγ2+γ2 |
13 | γ2+ω+1+γ | 45 | ωγ+1+ωγ2+γ+γ2 |
14 | ωγ+ω | 46 | ωγ+1 |
15 | ωγ+ωγ2 | 47 | ωγ2+γ |
16 | ωγ+1+ω | 48 | γ2+ωγ2+ωγ+1+ω |
17 | ωγ2+ωγ+γ | 49 | γ2+1 |
18 | ωγ+1+ω+γ2 | 50 | γ2+ω |
19 | ωγ2+ωγ+γ2+ω | 51 | ωγ+ω+γ+γ2 |
20 | γ2+γ+1 | 52 | ω+γ+ωγ+ωγ2 |
21 | ω | 53 | γ2+1+ω |
22 | ωγ | 54 | ωγ+ω+γ2 |
23 | ωγ2 | 55 | γ2+ω+γ+ωγ+ωγ2 |
24 | ωγ2+ωγ+1+ω | 56 | 1+γ |
25 | ω+γ+1 | 57 | γ2+γ |
26 | ωγ+γ2+γ | 58 | ω+γ |
27 | ωγ2+ω+γ | 59 | ωγ+γ2 |
28 | ωγ2+1+ω+γ2 | 60 | γ2+γ+ω+ωγ2 |
29 | ωγ2+1+γ2 | 61 | γ+ωγ2+1 |
30 | ωγ+ωγ2+1+γ2 | 62 | γ2+ωγ2+ωγ+1+ω+γ |
31 | ωγ+1+γ2 | 63 | 1 |
32 | ωγ2+ω+γ2 |
For the extension of EF Z2[ω]m, the QR
Z2[ω][x]/<H(x)>≅GF(22m), |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree m in Z2[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Z2[ω]m={u0+u1γ+u2γ2+⋯+um−1γm−1:∀u0,u1,u2,…,um−1∈Z2[ω]}. |
Z2[ω]m is a m degree extension field of the EF Z2[ω], and Z2[ω]∗m=Z2[ω]m∖{0} is a cyclic group of order 22m−1.
Furthermore, let Z5[ω] be an Eisenstein field. In fact, Z5[ω][x] is an ED and the EF extension is given below.
For the extension of EF Z5[ω]2, the QR
Z5[ω][x]/<H(x)>≅GF(54), |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree 2 in Z5[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and Z5[ω]2={u0+u1γ:∀u0,u1∈Z5[ω]}. Hence Z5[ω]2 is a 2-degree extension field of the EF Z5[ω], and Z5[ω]∗2=Z5[ω]2∖{0} is a CG of order 54−1=624.
For the extension of EF Z5[ω]3, the QR
Z5[ω][x]/<H(x)>≅GF(56) |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree 3 in Z5[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Z5[ω]3={u0+u1γ+u2γ2:∀u0,u1,u2∈Z5[ω]}. |
Hence, Z5[ω]3 is a 3-degree extension field of the EF Z5[ω], and Z5[ω]∗3=Z5[ω]3∖{0} is a CG of order 56−1=15625.
For the extension of EF Z5[ω]m, the QR
Z5[ω][x]/<H(x)>≅GF(52m) |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree m in Z5[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Z5[ω]m={u0+u1γ+u2γ2+⋯+um−1γm−1:∀u0,u1,u2,…,um−1∈Z5[ω]}. |
Hence, Z5[ω]m is a m-degree extension field of the EF Z5[ω], and Z5[ω]∗m=Z5[ω]m∖{0} is a CG of order 52m−1.
In a similar way, Eisenstein field extension Zp[ω], if p≡2(mod3) is given below.
For the extension of EF Zp[ω]2, the QR
Zp[ω][x]/<H(x)>≅GF(p4) |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree 2 in Zp[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Zp[ω]2={u0+u1γ:∀u0,u1∈Zp[ω]}. |
Hence, Zp[ω]2 is a 2-degree extension field of the EF Zp[ω], and Zp[ω]∗2=Zp[ω]2∖{0} is a CG of order p4−1.
For the extension of EF Zp[ω]3, the QR
Zp[ω][x]/<H(x)>≅GF(p6), |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree 3 in Zp[ω][x]. Let γ is the coset x+(H(x)), then H(γ)=0 and
Zp[ω]3={u0+u1γ+u2γ2:∀u0,u1,u2∈Zp[ω]}. |
Hence, Zp[ω]3 is a 3-degree extension field of the EF Zp[ω], and Zp[ω]∗3=Zp[ω]3∖{0} is a CG of order p6−1.
For the extension of EF Zp[ω]m, the QR
Zp[ω][x]/<H(x)>≅GF(p2m) |
where <H(x)> is the maximal ideal generated by an IP H(x) of degree m in Zp[ω][x]. Let γ be the coset x+(H(x)), then H(γ)=0 and
Zp[ω]m={u0+u1γ+u2γ2+⋯+um−1γm−1:∀u0,u1,u2,…,um−1∈Zp[ω]}. |
Zp[ω]m is an m-degree extension field of the EF Zp[ω], and Zp[ω]∗m=Zp[ω]m∖{0} is a CG of order p2m−1.
Remark 3. The cardinality of Zp[ω]mis p2m.
Theorem 1. Let γ be the element of the extension field Zp[ω]m if p≡2(mod3), then γ,γp2,γp4,…, have the same minimal polynomial over the EF Zp[ω].
Proof. Straightforward [18, Theorem 4.4.2].
In this section, we will construct BCH codes over the EF by following [16, Section 4.4].
Let c,n,q,d>0, such that q is a some prime power, 2≤d≤n−1, and gcd(n,q)=1. Let a least positive integer m such that p2m≡1(modn) [By Euler's theorem, p2φ(n)≡1(modn), then m divides φ(n)]. Thus n divides p2m−1.
Let γ be the element of the extension field Zp[ω]m. Consider the minimal polynomials mi(X)∈Zp[ω][X] of γi. The least common multiple (lcm) of all distinict minimal polynomials mi(X),i=c,c+1,...,c+d−2 is known as the generator polynomial g(X) that is,
g(X)=lcm{mi(X)|i=c,c+1,…,c+d−2}. |
Since all minimal polynomials divides Xn−1, So generator polynomial divides Xn−1. Let C be the cyclic code generated by g(X) in the ring Zp[ω][X]n. Then C is called a BCH code of length n over EF Zp[ω] with designed distance d.
Remark 4. If the code is full length n=p2m−1 then it is primitive.
Remark 5. If the code is narrow sense, then c=1.
Remark 6. The cardinality of the code C over EF is p2k.
Illustration 5. Construct a (15,k,3) BCH code over the EF Z2[ω].
Let γ∈Z2[ω]2 then by Theorem 1, γ,γ22 have the same minimal polynomial
m1(X)=X2+X+ω=f(X). |
Let γ2∈Z2[ω]2 then m2(X) can be found by γ2,γ8,
m2(X)=(X−γ2)(X−γ8)=X2−(γ2+γ8)X+γ10=X2+X+(1+ω). |
The generator polynomial g(X) is,
g(X)=m1(X).m2(X)=(X2+X+ω)(X2+X+(1+ω))=X4+X+1. |
The degree of g(X) is 4, and the dimension k is 11. Hence, we get (15,11,3) BCH code over EF Z2[ω].
Illustration 6. Construct a (15,k,5) BCH code over the EF Z2[ω].
Let γ∈Z2[ω]2 then by Theorem 1, γ,γ22 have the same minimal polynomial
m1(X)=X2+X+ω=f(X). |
Let γ2∈Z2[ω]2 then m2(X) can be found by γ2 and γ8,
m2(X)=(X−γ2)(X−γ8)=X2−(γ2+γ8)X+γ10=X2+X+(1+ω). |
Let γ3∈Z2[ω]2 then m3(X) can be found by γ3 and γ12,
m3(X)=(X−γ3)(X−γ12)=X2−(γ3+γ12)X+α15=X2+(1+ω)X+1. |
Let γ4∈Z2[ω]2 then m4(X) can be found by γ4 and γ1,
m4(X)=(X−γ4)(X−γ)=X2+X+ω=m1(X). |
The generator polynomial g(X) is,
g(X)=m1(X).m2(X).m3(X) |
=(X2+X+ω)(X2+X+(1+ω))(X2+(1+ω)X+1) |
=X6+(1+ω)X5+X4+X3+ωX2+ωX+1. |
The degree of g(X) is 6, and the dimension k is 9. Hence, we get (15,9,5) BCH codes over EF Z2[ω].
Illustration 7. Construct a (15,k,7) BCH code over the EF Z2[ω].
Let γ∈Z2[ω]2 then by Theorem 1, γ,γ22 have the same minimal polynomial
m1(X)=X2+X+ω=f(X). |
Let γ2∈Z2[ω]2 then m2(X) can be found by γ2 and γ8,
m2(X)=(X−γ2)(X−γ8)=X2−(γ2+γ8)X+γ10=X2+X+(1+ω). |
Let γ3∈Z2[ω]2 then m3(X) can be found by γ3 and γ12,
m3(X)=(X−γ3)(X−γ12)=X2−(γ3+γ12)X+α15=X2+(1+ω)X+1. |
Let γ4∈Z2[ω]2 then m4(X) can be found by γ4 and γ1,
m4(X)=(X−γ4)(X−γ)=X2+X+ω=m1(X). |
Let γ5∈Z2[ω]2 then m5(X) can be found by γ5,
m5(X)=X−γ5=X+ω. |
Let γ6∈Z2[ω]2 then m6(X) can be found by γ6 and γ9,
m6(X)=(X−γ6)(X−γ9)=X2−(γ6+γ9)X+α15=X2+ωX+1. |
The generator polynomial g(X) is,
g(X)=m1(X).m2(X).m3(X).m5(X).m6(X) |
=(X2+X+ω)(X2+X+(1+ω))(X2+(1+ω)X+1)(X+ω)(X2+ωX+1) |
=X9+(1+ω)X8+ω2X7+ωX6+X5+ωX4+X+ω. |
The degree of g(X) is 9, and the dimension k is 6. Hence, we get (15,6,7) BCH codes over EF Z2[ω].
Illustration 8. Construct a (15,k,9) BCH code over the EF Z2[ω].
Let γ∈Z2[ω]2 then by Theorem 1, γ,γ22 have the same minimal polynomial
m1(X)=X2+X+ω=f(X). |
Let γ2∈Z2[ω]2 then m2(X) can be found by γ2 and γ8,
m2(X)=(X−γ2)(X−γ8)=X2−(γ2+γ8)X+γ10=X2+X+(1+ω). |
Let γ3∈Z2[ω]2 then m3(X) can be found by γ3 and γ12,
m3(X)=(X−γ3)(X−γ12)=X2−(γ3+γ12)X+α15=X2+(1+ω)X+1. |
Let γ4∈Z2[ω]2 then m4(X) can be found by γ4 and γ1,
m4(X)=(X−γ4)(X−γ)=X2+X+ω=m1(X). |
Let γ5∈Z2[ω]2 then m5(X) can be found by γ5,
m5(X)=X−γ5=X+ω. |
Let γ6∈Z2[ω]2 then m6(X) can be found by γ6 and γ9,
m6(X)=(X−γ6)(X−γ9)=X2−(γ6+γ9)X+α15=X2+ωX+1. |
Let γ7∈Z2[ω]2 then m7(X) can be found by γ7 and γ13,
m7(X)=(x−γ7)(x−γ13)=x2−(γ7+γ13)x+γ20=x2+γx+ω. |
Let γ8∈Z2[ω]2 then m8(X) can be found by γ8 and γ2,
m8(X)=(X−γ2)(X−γ8)=X2−(γ2+γ8)X+γ10=X2+X+(1+ω)=m2(X). |
The generator polynomial g(X) is,
g(X)=m1(X).m2(X).m3(X).m5(X).m6(X).m7(X) |
=(x2+x+ω)(x2+x+(1+ω))(x2+(1+ω)x+1)(x+ω)(x2+ωx+1)(x2+γx+ω) |
=x11+(1+γ+ω)x10+(1+γ+γω)x9+(1+γ+ω+γω)x8+γωx7+(1+γ)x6+(ω+γω)x5+(1+ω)x4+x3+(γ+ω)x2+(ω+γω)x+(1+ω). |
The degree of g(X) is 11, and the dimension k is 4. Hence, we get (15,4,9) BCH codes over EF Z2[ω].
This section is for the comprehensive decoding procedure of BCH codes based that are superimposed on an EF with length n using modified BMA.
The subsequent theorem is a merely restatement of [27, Section V, Theorem 2].
Theorem 2. Let C be a n length BCH code that is superimposed over a GF Zp[ω] if (p≡2)(mod3) with a distance d that has been created. Then the code C is the null space of the matrix H.
H=(1γcγ2c⋯γ(n−1)c⋮⋱⋮1γc+d−2γ2(c+d−2)⋯γ(n−1)(c+d−2)). | (1) |
Proof. Straightforward [28].
Let c be a code word of the (n,k,d) narrow sense BCH code, received word r and design distance d. Then the error corrections of the BCH codes have the following steps.
Step 1: Let Si for i=c,c+1,…,c+d−2 be the syndromes with the help of H and r as;
Si=rHT(modp)=(ScSc+1...Sc+d−2). |
OR Si=r(γi)=a0+a1γi+⋯+an−1γ(n−1)i for i=c,c+1,…,c+d−2.
If all Si are zeros then c=r. However, if at least one Si is nonzero then the error occurs. So, we will move to the next step.
Step 2: Apply modified BMP to find Δn(y).
Iterations | Δn(y) | ϑn | un | n−un |
−1 | 1 | 1 | 0 | −1 |
0 | 1 | First non-zero syndrome | 0 | 0 |
1 | ||||
⋮ | ||||
2t |
Where ϑn is the discrepancy, degree (Δn(y))=un and t is the upper bound of the number of errors. There are two cases for Δn(y);
Case 1: If ϑn=0, then Δn+1(y)=Δn(y) and un=un+1.
Case 2: If ϑn≠0,then for m≤n−1 and n−um have the largest value in n−un. So, from ϑn−zϑm=0, we get z. Thus, Δn+1(y)=Δn(y)−zyn−mΔm(y). Then,
ϑn+1=Sn+2+Δ(n+1)1(y)Sn+1+Δ(n+1)2(y)Sn+...+Δ(n+1)un+1(y)Sn+2−un+1. |
Step 3: Find the reciprocal function g(y) of Δn(y), then yj represents the roots of g(y). Let xj=ρj are error locations if it satisfies the (xj−yj)=0, where 1≤j≤n−1.
Step 4: Find an elementary symmetric function (ESF) for the possible errors that occur in the received word.
(y−x1)(y−x2)...(y−xv)=Δ0yv+Δ1yv−1+⋯+Δv, |
where xj, j=1,2,…,v and v is the total number of the roots of g(y).
Step 5: The magnitude of the errors can be found by Forney's procedure [29] as;
zi=∑v−1l=0Δi,jSv−l∑v−1l=0δi,jxv−li. |
Start with Δ0=Δi,0=1. Where Δi,j=Δj+xi.Δi,j−1;j=1,2,3,…,v−1 and i=1,2,…,v.
Step 6: The cord word c can be corrected by c=r−e, where e is the error vector.
Illustration 9. Let (15,11,3) BCH code over the EF Z2[ω] and the received vector r=(0,0,ω,…,0)1×15. Find the corrected cord word if possible.
Let
S=rHT=(00ω…0)(1γγ2⋯γ141γ2γ4⋯γ28)T=(ωγ2ωγ4)=(1+ω+γωω+γω)=(γ7γ9). |
Where S1=γ7 and S2=γ9 are two syndromes. Find Δ2(y) by modified BMA by the following iterations.
Iteration 1. The first nonzero syndrome is 1+ω+γω. Apply step 2 (case Ⅱ) of the BMA because ϑ0≠0, −1=−1, and 0−u−1=0 is the higher value of the last column. Then, ϑ0−zϑ−1=0, then
z=ϑ0ϑ−1=1+ω+γω1=1+ω+γω. |
So the polynomial
Δ1(y)=Δ0(y)−(1+ω+γω)y0+1Δ−1(y) |
=1+(1+ω+γω)y=1+(1+ω+γω)y=1+γ7y. |
ϑ1=S2+Δ(1)1(y)S1=ω+γω+(1+ω+γω)(1+ω+γω)=1+γ=γ4. |
Iteration 2. ϑ1≠0 in Iteration 1, 0=1−1 and 1−u0=1−0=1 is the higher value of the last column. Thus, ϑ1−zϑ0=0, then
z=ϑ1ϑ0=1+γ1+ω+γω=1+γ+γω=γ12. |
So, the polynomial
Δ2(y)=Δ1(y)−(1+γ+γω)y1−0Δ0(y) |
=1+γ7y+(1+γ+γω)y(1) |
=1+(γ+ω)y=1+γ2y. |
The results of the iterations are given in Table 4.
Iterations | Δn(y) | ϑn | un | n−un |
−1 | 1 | 1 | 0 | −1 |
0 | 1 | γ7=1+ω+γω | 0 | 0 |
1 | 1+γ7y | γ4=1+γ | 1 | 0 |
2 | 1+γ2y |
The reciprocal function of Δ2(y)=1+γ2y is g(y)=γ2+y.γ2 is the root of g(y). Hence y1=γ2, so an error occurred in second place of r.Δ0yv+Δ1=y−γ2 is an ESF. The error magnitude is
z1=Δ1,0S1Δ1,0x1=S1x1=1+ω+γωω+γ=γ7γ2=γ5=ω, |
where Δ0=1,Δ1=γ2 and v=1. Corrected code word c=a−e=(0,0,0,…,0)1×15. Hence c is the corrected code word of the (15,11,3) BCH code C.
Illustration 10. Let (15,11,3) BCH code over the EF Z2[ω] and the received vector r=r=(1,1,ω,0,1,0,…,0)1×15. Find the corrected cord word if possible.
Let
S=rHT=(1,1,ω,0,1,0,…,0)(1γγ2⋯γ141γ2γ4⋯γ28)T=(ωγ2ωγ4)=(1+ω+γωω+γω)=(γ7γ9). |
Where S1=γ7 and S2=γ9 are two syndromes. Find Δ2(y) by modified BMA by the following iterations.
Iteration 1. The first nonzero syndrome is 1+ω+γω. Apply step 2 (case Ⅱ) of the BMA because ϑ0≠0, −1=−1 and 0−u−1=0 is the higher value of the last column. Thus, ϑ0−zϑ−1=0, then
z=ϑ0ϑ−1=1+ω+γω1=1+ω+γω. |
So, the polynomial
Δ1(y)=Δ0(y)−(1+ω+γω)y0+1Δ−1(y) |
=1+(1+ω+γω)y=1+(1+ω+γω)y=1+γ7y. |
ϑ1=S2+Δ(1)1(y)S1=ω+γω+(1+ω+γω)(1+ω+γω)=1+γ=γ4. |
Iteration 2. ϑ1≠0 in Iteration 1, 0=1−1 and 1−u0=1−0=1 is the higher value of the last column. Thus, ϑ1−zϑ0=0, then z=ϑ1ϑ0=1+γ1+ω+γω=1+γ+γω=γ12. So, the polynomial
Δ2(y)=Δ1(y)−(1+γ+γω)y1−0Δ0(y) |
=1+γ7y+(1+γ+γω)y(1)=1+(γ+ω)y=1+γ2y. |
The results of the iterations are given in Table 5.
Iterations | Δn(y) | ϑn | un | n−un |
−1 | 1 | 1 | 0 | −1 |
0 | 1 | γ7=1+ω+γω | 0 | 0 |
1 | 1+γ7y | γ4=1+γ | 1 | 0 |
2 | 1+γ2y |
The reciprocal function of Δ2(y)=1+γ2y is g(y)=γ2+y.γ2 is the root of g(y). Hence y1=γ2, so an error occurred in second place of r.Δ0yv+Δ1=y−γ2 is an ESF. The error magnitude is
z1=Δ1,0S1Δ1,0x1=S1x1=1+ω+γωω+γ=γ7γ2=γ5=ω, |
where Δ0=1,Δ1=γ2 and v=1. Corrected code word c=a−e=(0,0,0,…,0)1×15. Hence c is the corrected code word of the (15,11,3) BCH code C.
Illustration 10. Let (15,11,5) BCH code over the EF Z2[ω] and the received vector r=(1ωω1100…0)1×15. Find the corrected cord word if possible.
Let
S=rHT=(1ωω1100…0)(1γγ2⋯γ141γ2γ4⋯γ281γ3γ6⋯γ421γ4γ8⋯γ56)T |
=(1+γ+γω1+γ+ω+γω1+γ+γω1+ω+γω)=(γ12γ14γ12γ7)=(S1S2S3S4). |
Let S1=1+γ+γω=γ12,S2=1+γ+ω+γω=γ14,S3=1+γ+γω=γ12 and S4=1+ω+γω=γ7. Find Δ4(y) by modified BMA by the following iterations.
Iteration 1. The first nonzero syndrome is 1+γ+γω. Apply step 2 (case Ⅱ) of the BMA because ϑ0≠0, −1=−1 and 0−u−1=0 is the higher value of the last column. Thus, ϑ0−zϑ−1=0, then
z=ϑ0ϑ−1=1+γ+γω1=1+γ+γω=γ12. |
So, the polynomial
Δ1(y)=Δ0(y)−(1+γ+γω)y0+1Δ−1(y)=1+(1+γ+γω)y=1+γ12y. |
ϑ1=S2+Δ(1)1(y)S1=(1+γ+ω+γω)+(1+γ+γω)(1+γ+γω)=1+γ=γ4. |
Iteration 2. ϑ1≠0 in Iteration 1, 0=1−1 and 1−u0=1−0=1 is the higher value of the last column. Thus, ϑ1−zϑ0=0, then
z=ϑ1ϑ0=1+γ1+γ+γω=γω+1+ω=γ7. |
So, the polynomial
Δ2(y)=Δ1(y)−(γω+1+ω)y1−0Δ0(y) |
=1+γ7y+(1+γ+γω)y(1)=1+(γ+ω)y=1+γ2y. |
ϑ2=S3+S2Δ(2)1(y)+Δ(2)2(y)S1 |
=(1+γ+γω)+(γ+ω)(1+γ+ω+γω)+0=1+γω=γ13. |
Iteration 3. ϑ2≠0 in Iteration 2, 1=2−1 and 2−u1=2−1=1 is the higher value of the last column. Thus, ϑ2−zϑ1=0, then
z=ϑ2ϑ1=1+γω1+γ=γω+ω=γ9. |
So, the polynomial
Δ3(y)=Δ2(y)−(γω+ω)y2−1Δ1(y)=1+γ2y+(ω+γω)y(1+γ12y) |
=1+(γ+γω)y+(γω)y2=1+γ11y+γ6y2. |
ϑ3=S4+S3Δ(3)1(y)+Δ(3)2(y)S2+Δ(3)3(y)S1 |
=(1+ω+γω)+(γ+γω)(1+γ+γω)+(γω)(1+γ+ω+γω)+0 |
=γ+ω+γω=γ3. |
Iteration 4. ϑ3≠0 in Iteration 3, 2=3−1 and 3−u2=3−1=2 is the higher value of the last column. Thus, ϑ3−zϑ2=0, then z=ϑ3ϑ2=γ+ω+γω1+γω=ω=γ5. So, the polynomial
Δ4(y)=Δ3(y)−(ω)y3−2Δ2(y)=1+γ11y+γ6y2+(ω)y(1+γ2y) |
=1+(γ+ω+γω)y+(1+ω)y2=1+γ3y+γ10y2. |
The results of the iterations are given in Table 6.
Iterations | Δn(y) | ϑn | un | n−un |
−1 | 1 | 1 | 0 | −1 |
0 | 1 | 1+γ+γω=γ12 | 0 | 0 |
1 | 1+{\gamma }^{12}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y | {\gamma }^{13}=1+\gamma \omega | 1 | 1 |
3 | 1+{\gamma }^{11}y+{\gamma }^{6}{y}^{2} | {\gamma }^{3}=\gamma +\omega +\gamma \omega | 2 | 1 |
4 | 1+{\gamma }^{3}y+{\gamma }^{10}{y}^{2} |
The reciprocal function of {\Delta }^{4}\left(y\right) = 1+{\gamma }^{3}y+{\mathrm{\gamma }}^{10}{y}^{2} is g\left(y\right) = {y}^{2}+{\mathrm{\gamma }}^{3}y+{\mathrm{\gamma }}^{10}.\mathrm{\gamma } and {\gamma }^{9} are the roots of g\left(y\right). Hence {y}_{1} = \mathrm{\gamma } and {y}_{2} = {\mathrm{\gamma }}^{9} , so the errors appeared in first and ninth place in
r.{\Delta }_{0}{\mathrm{y}}^{2}+{\Delta }_{1}\mathrm{y}+{\Delta }_{2} = \left(\mathrm{y}-\gamma \right)\left(y-{\gamma }^{9}\right) = {y}^{2}+{\gamma }^{3}y+{\gamma }^{10} |
is an ESF. The error magnitudes are as;
{\mathrm{z}}_{1} = \frac{{\Delta }_{\mathrm{1, 0}}.{\mathrm{S}}_{2}+{\Delta }_{\mathrm{1, 1}}.{\mathrm{S}}_{1}}{{\Delta }_{\mathrm{1, 0}}.{\mathrm{z}}_{1}^{2}+{\Delta }_{\mathrm{1, 1}}.{\mathrm{x}}_{1}} = 1+\mathrm{\gamma } = {\mathrm{\gamma }}^{4}. |
As {\Delta }_{\mathrm{1, 1}} = {{\Delta }_{1}+\Delta }_{\mathrm{1, 0}}.{y}_{1} = {\mathrm{\gamma }}^{9}, therefore
{\Delta }_{\mathrm{2, 1}} = {\Delta }_{1}+{\Delta }_{\mathrm{2, 0}}.{y}_{2} = \mathrm{\gamma }. |
{\mathrm{z}}_{2} = \frac{{\Delta }_{\mathrm{2, 0}}.{\mathrm{S}}_{2}+{\Delta }_{\mathrm{2, 1}}.{\mathrm{S}}_{1}}{{\Delta }_{\mathrm{2, 0}}.{\mathrm{y}}_{2}^{2}+{\Delta }_{\mathrm{2, 1}}.{\mathrm{y}}_{2}} = \mathrm{\gamma }\omega = {\mathrm{\gamma }}^{6}. |
Corrected code word
c = a-e = {\left(1, 1+\omega +\mathrm{\gamma }, 0, 0, 0, 0, 0, 0, 0, \mathrm{\gamma }\omega , 0, 0, 0, 0, 0\right)}_{1\times 15}. |
Hence c is the corrected code word of the (15, 11, 5) BCH code C.
We compare the narrow sense BCH code and decoding method on a GF and an EF. BCH-codes base GF\left({p}^{m}\right) are defined with detail in [7, Section 4.4], including their length (n = {p}^{m}-1) , design distances \left(d\right) , dimension \left({k}_{1}\right) , code rates ({R}_{1} = {k}_{1}/({p}^{m}-1) and words of C \left({p}^{{k}_{1}}\right) . Here, the authors provide BCH codes of length (n = {p}^{2m}-1) , design distance \left(d\right) , dimension {k}_{2} , code rate ({R}_{2} = {k}_{2}/({p}^{2m}-1) and the words of C over the EF {\mathbb{Z}}_{p}\left[\omega \right] are {p}^{2{k}_{2}} , and their decoding technique. Comparisons between BCH codes based on GF and EF are given in Tables 7 and 8.
n | d | {k}_{1} | {R}_{1} | {p}^{{k}_{1}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 7 | 0.4667 | {2}^{7} |
15 | 7 | 5 | 0.3333 | {2}^{5} |
15 | 9 | 1 | 0.0667 | {2}^{1} |
n | d | {k}_{2} | {R}_{2} | {q}^{{k}_{2}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 9 | 0.6 | {2}^{9} |
15 | 7 | 6 | 0.4 | {2}^{6} |
15 | 9 | 4 | 0.2667 | {2}^{4} |
For comparison we take a one GF and one EF. Based on the results of [9, Exercise 4.4 (10)], length of the code n is {p}^{m}-1 = {2}^{4}-1, design distance d , dimension {k}_{1} , coding rate {R}_{1} and the code words {p}^{{k}_{1}} are given in Table 7.
In a similar way, the length of the code n = {p}^{2m}-1 = {2}^{4}-1 = 15 , dimension {k}_{2}, designed distance d , code rate {R}_{2} and the words of C are {p}^{2{k}_{2}} over the EF {\mathbb{Z}}_{p}\left[\omega \right] = {\mathbb{Z}}_{2}\left[\omega \right] given in Table 8.
Figure 3 shows the BCH coding rate {R}_{1} over a Galois field (GF) and {R}_{2} over the Eisenstein field with designed distance d from Tables 7 and 8. Figure 4 shows the BCH code dimension {k}_{1} over a Galois field and {k}_{2} over an Eisenstein field with designed distance d .
When the BCH codes-based GF and their decoding algorithm are compared with the EF and their decoding method for the same length and designed distance, the following observations are achieved. In the Eisenstein field, the code rates and dimensions are greater than in the Galois field. The BCH code over the Eisenstein field has a lot number of code words than the Galois field. The decoding algorithm over the GF is a specific algorithm for error correction, whereas the Eisenstein field decoding algorithm is a general algorithm for error correction.
The Eisenstein field and its extension are covered in this article. Additionally, the construction of BCH codes based on the EF {\mathbb{Z}}_{p}\left[\omega \right] , for p\equiv 2\left(mod3\right) has been provided. Furthermore, a slightly modified version of the BMA was used to decode these codes. It has been demonstrated that the performance of the BCH codes over the EF {\mathbb{Z}}_{p}\left[\omega \right] for p\equiv 2\left(mod3\right) and their decoding technique is superior to that of the BCH codes over the GF\left({p}^{m}\right) .
In future directions, BCH codes based on EF {\mathbb{Z}}_{p}\left[\omega \right] and its decoding technique may extend across Eisenstein local rings {\mathbb{Z}}_{{p}^{k}}\left[\omega \right] , for p\equiv 2\left(mod3\right) , which may improve performance of the BCH codes using symbols from {\mathbb{Z}}_{p}\left[\omega \right] .
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Researchers Supporting Project number: RSPD 2023R650, King Saud University, Riyadh, Saudi Arabia.
The authors declared that they had no conflicts of interest.
[1] | R. E. Blahut, Algebraic codes for data transmission, Cambridge University Press, 2003. https://doi.org/10.1017/CBO9780511800467 |
[2] | T. Richardson, R. Urbanke, Modern coding theory, Cambridge University Press, 2008. https://doi.org/10.1017/CBO9780511791338 |
[3] |
J. E. F. Assmus, H. F. Mattson, Error-correcting codes: an axiomatic approach, Inf. Control, 6 (1963), 315–330. https://doi.org/10.1016/S0019-9958(63)80010-8 doi: 10.1016/S0019-9958(63)80010-8
![]() |
[4] | D. Augot, E. Betti, E. Orsini, An introduction to linear and cyclic codes, In: M. Sala, S. Sakata, T. Mora, C. Traverso, L. Perret, Gröbner bases, coding, and cryptography, Springer, 2009, 47–68. https://doi.org/10.1007/978-3-540-93806-4_4 |
[5] |
I. F. Blake, Codes over certain rings, Inf. Control, 20 (1972), 396–404. https://doi.org/10.1016/S0019-9958(72)90223-9 doi: 10.1016/S0019-9958(72)90223-9
![]() |
[6] |
I. F. Blake, Codes over integer residue rings, Inf. Control, 29 (1975), 295–300. https://doi.org/10.1016/S0019-9958(75)80001-5 doi: 10.1016/S0019-9958(75)80001-5
![]() |
[7] |
E. Spiegel, Codes over \mathbb{Z}m, Inf. Control, 35 (1977), 48–51. https://doi.org/10.1016/S0019-9958(77)90526-5 doi: 10.1016/S0019-9958(77)90526-5
![]() |
[8] |
E. Spiegel, Codes over \mathbb{Z}m, revisited, Inf. Control, 37 (1978), 100–104. https://doi.org/10.1016/S0019-9958(78)90461-8 doi: 10.1016/S0019-9958(78)90461-8
![]() |
[9] |
T. Shah, A. Khan, A. A. de Andrade, Constructions of codes through the semigroup ring B[X; \frac{1}{2^2} \quad \mathbb{Z}_0] and encoding, Comput. Math. Appl., 62 (2011), 1645–1654. https://doi.org/10.1016/j.camwa.2011.05.056 doi: 10.1016/j.camwa.2011.05.056
![]() |
[10] |
B. Yildiz, I. Siap, Cyclic codes over F2[u]/(u4−1) and applications to DNA codes, Comput. Math. Appl., 63 (2012), 1169–1176. https://doi.org/10.1016/j.camwa.2011.12.029 doi: 10.1016/j.camwa.2011.12.029
![]() |
[11] |
G. Weil, K. Heus, T. Faraut, J. Demongeot, The cyclic genetic code as a constraint satisfaction problem, Theor. Comput. Sci., 322 (2004), 313–334. https://doi.org/10.1016/j.tcs.2004.03.015 doi: 10.1016/j.tcs.2004.03.015
![]() |
[12] |
H. Q. Dinh, A. K. Singh, S. Pattanayak, S. Sriboonchitta, Construction of cyclic DNA codes over the ring \mathbb{Z}_4[u]/ < u2−1 > based on the deletion distance, Theor. Comput. Sci., 773 (2019), 27–42. https://doi.org/10.1016/j.tcs.2018.06.002 doi: 10.1016/j.tcs.2018.06.002
![]() |
[13] |
B. Kim, Y. Lee, J. Yoo, An infinite family of Griesmer quasi-cyclic self-orthogonal codes, Finite Fields Appl., 76 (2021), 1019–1023. https://doi.org/10.1016/j.ffa.2021.101923 doi: 10.1016/j.ffa.2021.101923
![]() |
[14] |
F. Zullo, Multi-orbit cyclic subspace codes and linear sets, Finite Fields Appl., 87 (2023), 102153. https://doi.org/10.1016/j.ffa.2022.102153 doi: 10.1016/j.ffa.2022.102153
![]() |
[15] |
Y. Lei, C. Li, Y. Wu, P. Zeng, More results on hulls of some primitive binary and ternary BCH codes, Finite Fields Appl., 82 (2022), 102066. https://doi.org/10.1016/j.ffa.2022.102066 doi: 10.1016/j.ffa.2022.102066
![]() |
[16] |
Y. Liu, R. Li, Q. Fu, L. Lu, Y. Rao, Some binary BCH codes with length n = 2m+1, Finite Fields Appl., 55 (2019), 109–133. https://doi.org/10.1016/j.ffa.2018.09.005 doi: 10.1016/j.ffa.2018.09.005
![]() |
[17] | O. Alkam, E. A. Osba, On Eisenstein integers modulo n, Int. Math. Forum, 5 (2010), 1075–1082. |
[18] | S. R. Nagpaul, S. K. Jain, Topics in applied abstract algebra, American Mathematical Society, 2005. |
[19] |
M. Sajjad, T. Shah, R. J. Serna, Designing pair of nonlinear components of a block cipher over Gaussian integers, Comput. Mater. Cont., 75 (2023), 5287–5305. https://doi.org/10.32604/cmc.2023.035347 doi: 10.32604/cmc.2023.035347
![]() |
[20] |
M. Sajjad, T. Shah, R. J. Serna, A. Z. E. Suarez, O. S. Delgado, Fundamental results of cyclic codes over octonion integers and their decoding algorithm, Computation, 10 (2022), 219. https://doi.org/10.3390/computation10120219 doi: 10.3390/computation10120219
![]() |
[21] |
M. Sajjad, T. Shah, M. M. Hazzazi, A. R. Alharbi, I. Hussain, Quaternion integers based higher length cyclic codes and their decoding algorithm, Comput. Mater. Cont., 73 (2022), 1177–1194. https://doi.org/10.32604/cmc.2022.025245 doi: 10.32604/cmc.2022.025245
![]() |
[22] |
M. Sajjad, T. Shah, M. Alammari, H. Alsaud, Construction and decoding of BCH-codes over the Gaussian field, IEEE Access, 11 (2023), 71972–71980. https://doi.org/10.1109/ACCESS.2023.3293007 doi: 10.1109/ACCESS.2023.3293007
![]() |
[23] |
M. Sajjad, T. Shah, H. Alsaud, M. Alammari, Designing pair of nonlinear components of a block cipher over quaternion integers, AIMS Math., 8 (2023), 21089–21105. https://doi.org/10.3934/math.20231074 doi: 10.3934/math.20231074
![]() |
[24] |
K. Huber, Codes over Eisenstein-Jacobi integers, Contemp. Math., 168 (1994), 165–179. https://doi.org/10.1090/conm/168/01696 doi: 10.1090/conm/168/01696
![]() |
[25] |
J. H, Baek, M. H. Sunwoo, New degree computationless modified Euclid algorithm and architecture for Reed-Solomon decoder, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 14 (2006), 915–920. https://doi.org/10.1109/TVLSI.2006.878484 doi: 10.1109/TVLSI.2006.878484
![]() |
[26] | A. A. D. Andrade, T. Shah, A. Khan, Decoding procedure for BCH, alternant and Goppa codes defined over semigroup ring, TEMA, 12 (2011), 8–14. |
[27] | M. Eiglsperger, M. Siebenhaller, M. Kaufmann, An efficient implementation of Sugiyama's algorithm for layered graph drawing, In: J. Pach, Graph Drawing, GD 2004. Lecture Notes in Computer Science, Springer, 3383 (2004), 155–166. https://doi.org/10.1007/978-3-540-31843-9_17 |
[28] |
M. Sajjad, T. Shah, M. Alammari, H. Alsaud, Construction and decoding of BCH-codes over the Gaussian field, IEEE Access, 11 (2023), 71972–71981. https://doi.org/10.1109/ACCESS.2023.3293007 doi: 10.1109/ACCESS.2023.3293007
![]() |
[29] |
G. Forney, On decoding BCH codes, IEEE Trans. Inf. Theory, 11 (1965), 549–557. https://doi.org/10.1109/TIT.1965.1053825 doi: 10.1109/TIT.1965.1053825
![]() |
[30] | T. Shah, A note on ascend and descend of factorization properties, Bull. Korean Math. Soc., 43 (2006), 419–424. |
[31] |
A. C. Canto, M. M. Kermani, R. Azarderakhsh, Reliable architectures for composite-field-oriented constructions of McEliece post-quantum cryptography on FPGA, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., 40 (2020), 999–1003. https://doi.org/10.1109/TCAD.2020.3019987 doi: 10.1109/TCAD.2020.3019987
![]() |
[32] |
A. C. Canto, M. M. Kermani, R. Azarderakhsh, Reliable CRC-based error detection constructions for finite field multipliers with applications in cryptography, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 29 (2020), 232–236. https://doi.org/10.1109/TVLSI.2020.3031170 doi: 10.1109/TVLSI.2020.3031170
![]() |
1. | Muhammad Sajjad, Tariq Shah, Muhammad Abbas, Maha Alammari, Robinson-Julian Serna, The impact of alternant codes over Eisenstein integers on modern technology, 2025, 44, 2238-3603, 10.1007/s40314-024-03057-y |
i | {\gamma }^{i} |
1 | \gamma |
2 | \gamma +\omega |
3 | \gamma +\omega +\gamma \omega |
4 | \gamma +1 |
5 | \omega |
6 | \gamma \omega |
7 | \gamma \omega +1+\omega |
8 | 1+\gamma +\omega |
9 | \omega +\gamma \omega |
10 | 1+\omega |
11 | \gamma +\gamma \omega |
12 | 1+\gamma +\gamma \omega |
13 | 1+\gamma \omega |
14 | 1+\gamma +\omega +\gamma \omega |
15 | 1 |
s | {\gamma }^{s} | s | {\gamma }^{s} |
1 | \gamma | 33 | \omega {\gamma }^{2}+1+\gamma +{\gamma }^{2} |
2 | {\gamma }^{2} | 34 | \omega {\gamma }^{2}+\omega \gamma +1 |
3 | {\gamma }^{2}+\omega +\gamma | 35 | \omega \gamma +1+\omega +\gamma |
4 | \omega +\gamma +\omega \gamma | 36 | \omega {\gamma }^{2}+\omega \gamma +\gamma +{\gamma }^{2} |
5 | {\gamma }^{2}+\omega \gamma +{\gamma }^{2}\omega | 37 | \omega \gamma +1+\gamma |
6 | {\gamma }^{2}+\omega \gamma +\gamma +1 | 38 | \omega {\gamma }^{2}+\gamma +{\gamma }^{2} |
7 | \omega +\omega {\gamma }^{2} | 39 | \omega {\gamma }^{2}+\omega \gamma +1+\gamma |
8 | \omega {\gamma }^{2}+\omega +1 | 40 | \omega \gamma +1+\omega +\gamma +{\gamma }^{2} |
9 | \omega {\gamma }^{2}+\omega +\gamma +1 | 41 | \omega {\gamma }^{2}+\omega \gamma +\omega |
10 | \omega +\gamma +1+\omega {\gamma }^{2}+{\gamma }^{2} | 42 | \omega +1 |
11 | 1+{\gamma }^{2}\omega | 43 | \omega \gamma +\gamma |
12 | \gamma +1+\omega {\gamma }^{2}+\omega +\omega \gamma | 44 | \omega {\gamma }^{2}+{\gamma }^{2} |
13 | {\gamma }^{2}+\omega +1+\gamma | 45 | \omega \gamma +1+\omega {\gamma }^{2}+\gamma +{\gamma }^{2} |
14 | \omega \gamma +\omega | 46 | \omega \gamma +1 |
15 | \omega \gamma +\omega {\gamma }^{2} | 47 | \omega {\gamma }^{2}+\gamma |
16 | \omega \gamma +1+\omega | 48 | {\gamma }^{2}+\omega {\gamma }^{2}+\omega \gamma +1+\omega |
17 | \omega {\gamma }^{2}+\omega \gamma +\gamma | 49 | {\gamma }^{2}+1 |
18 | \omega \gamma +1+\omega +{\gamma }^{2} | 50 | {\gamma }^{2}+\omega |
19 | \omega {\gamma }^{2}+\omega \gamma +{\gamma }^{2}+\omega | 51 | \omega \gamma +\omega +\gamma +{\gamma }^{2} |
20 | {\gamma }^{2}+\gamma +1 | 52 | \omega +\gamma +\omega \gamma +\omega {\gamma }^{2} |
21 | \omega | 53 | {\gamma }^{2}+1+\omega |
22 | \omega \gamma | 54 | \omega \gamma +\omega +{\gamma }^{2} |
23 | \omega {\gamma }^{2} | 55 | {\gamma }^{2}+\omega +\gamma +\omega \gamma +\omega {\gamma }^{2} |
24 | \omega {\gamma }^{2}+\omega \gamma +1+\omega | 56 | 1+\gamma |
25 | \omega +\gamma +1 | 57 | {\gamma }^{2}+\gamma |
26 | \omega \gamma +{\gamma }^{2}+\gamma | 58 | \omega +\gamma |
27 | \omega {\gamma }^{2}+\omega +\gamma | 59 | \omega \gamma +{\gamma }^{2} |
28 | \omega {\gamma }^{2}+1+\omega +{\gamma }^{2} | 60 | {\gamma }^{2}+\gamma +\omega +\omega {\gamma }^{2} |
29 | \omega {\gamma }^{2}+1+{\gamma }^{2} | 61 | \gamma +\omega {\gamma }^{2}+1 |
30 | \omega \gamma +\omega {\gamma }^{2}+1+{\gamma }^{2} | 62 | {\gamma }^{2}+\omega {\gamma }^{2}+\omega \gamma +1+\omega +\gamma |
31 | \omega \gamma +1+{\gamma }^{2} | 63 | 1 |
32 | \omega {\gamma }^{2}+\omega +{\gamma }^{2} |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | First non-zero syndrome | 0 | 0 |
1 | ||||
\vdots | ||||
2t |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | {\gamma }^{7}=1+\omega +\gamma \omega | 0 | 0 |
1 | 1+{\gamma }^{7}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | {\gamma }^{7}=1+\omega +\gamma \omega | 0 | 0 |
1 | 1+{\gamma }^{7}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | 1+\gamma +\gamma \omega ={\gamma }^{12} | 0 | 0 |
1 | 1+{\gamma }^{12}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y | {\gamma }^{13}=1+\gamma \omega | 1 | 1 |
3 | 1+{\gamma }^{11}y+{\gamma }^{6}{y}^{2} | {\gamma }^{3}=\gamma +\omega +\gamma \omega | 2 | 1 |
4 | 1+{\gamma }^{3}y+{\gamma }^{10}{y}^{2} |
n | d | {k}_{1} | {R}_{1} | {p}^{{k}_{1}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 7 | 0.4667 | {2}^{7} |
15 | 7 | 5 | 0.3333 | {2}^{5} |
15 | 9 | 1 | 0.0667 | {2}^{1} |
n | d | {k}_{2} | {R}_{2} | {q}^{{k}_{2}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 9 | 0.6 | {2}^{9} |
15 | 7 | 6 | 0.4 | {2}^{6} |
15 | 9 | 4 | 0.2667 | {2}^{4} |
i | {\gamma }^{i} |
1 | \gamma |
2 | \gamma +\omega |
3 | \gamma +\omega +\gamma \omega |
4 | \gamma +1 |
5 | \omega |
6 | \gamma \omega |
7 | \gamma \omega +1+\omega |
8 | 1+\gamma +\omega |
9 | \omega +\gamma \omega |
10 | 1+\omega |
11 | \gamma +\gamma \omega |
12 | 1+\gamma +\gamma \omega |
13 | 1+\gamma \omega |
14 | 1+\gamma +\omega +\gamma \omega |
15 | 1 |
s | {\gamma }^{s} | s | {\gamma }^{s} |
1 | \gamma | 33 | \omega {\gamma }^{2}+1+\gamma +{\gamma }^{2} |
2 | {\gamma }^{2} | 34 | \omega {\gamma }^{2}+\omega \gamma +1 |
3 | {\gamma }^{2}+\omega +\gamma | 35 | \omega \gamma +1+\omega +\gamma |
4 | \omega +\gamma +\omega \gamma | 36 | \omega {\gamma }^{2}+\omega \gamma +\gamma +{\gamma }^{2} |
5 | {\gamma }^{2}+\omega \gamma +{\gamma }^{2}\omega | 37 | \omega \gamma +1+\gamma |
6 | {\gamma }^{2}+\omega \gamma +\gamma +1 | 38 | \omega {\gamma }^{2}+\gamma +{\gamma }^{2} |
7 | \omega +\omega {\gamma }^{2} | 39 | \omega {\gamma }^{2}+\omega \gamma +1+\gamma |
8 | \omega {\gamma }^{2}+\omega +1 | 40 | \omega \gamma +1+\omega +\gamma +{\gamma }^{2} |
9 | \omega {\gamma }^{2}+\omega +\gamma +1 | 41 | \omega {\gamma }^{2}+\omega \gamma +\omega |
10 | \omega +\gamma +1+\omega {\gamma }^{2}+{\gamma }^{2} | 42 | \omega +1 |
11 | 1+{\gamma }^{2}\omega | 43 | \omega \gamma +\gamma |
12 | \gamma +1+\omega {\gamma }^{2}+\omega +\omega \gamma | 44 | \omega {\gamma }^{2}+{\gamma }^{2} |
13 | {\gamma }^{2}+\omega +1+\gamma | 45 | \omega \gamma +1+\omega {\gamma }^{2}+\gamma +{\gamma }^{2} |
14 | \omega \gamma +\omega | 46 | \omega \gamma +1 |
15 | \omega \gamma +\omega {\gamma }^{2} | 47 | \omega {\gamma }^{2}+\gamma |
16 | \omega \gamma +1+\omega | 48 | {\gamma }^{2}+\omega {\gamma }^{2}+\omega \gamma +1+\omega |
17 | \omega {\gamma }^{2}+\omega \gamma +\gamma | 49 | {\gamma }^{2}+1 |
18 | \omega \gamma +1+\omega +{\gamma }^{2} | 50 | {\gamma }^{2}+\omega |
19 | \omega {\gamma }^{2}+\omega \gamma +{\gamma }^{2}+\omega | 51 | \omega \gamma +\omega +\gamma +{\gamma }^{2} |
20 | {\gamma }^{2}+\gamma +1 | 52 | \omega +\gamma +\omega \gamma +\omega {\gamma }^{2} |
21 | \omega | 53 | {\gamma }^{2}+1+\omega |
22 | \omega \gamma | 54 | \omega \gamma +\omega +{\gamma }^{2} |
23 | \omega {\gamma }^{2} | 55 | {\gamma }^{2}+\omega +\gamma +\omega \gamma +\omega {\gamma }^{2} |
24 | \omega {\gamma }^{2}+\omega \gamma +1+\omega | 56 | 1+\gamma |
25 | \omega +\gamma +1 | 57 | {\gamma }^{2}+\gamma |
26 | \omega \gamma +{\gamma }^{2}+\gamma | 58 | \omega +\gamma |
27 | \omega {\gamma }^{2}+\omega +\gamma | 59 | \omega \gamma +{\gamma }^{2} |
28 | \omega {\gamma }^{2}+1+\omega +{\gamma }^{2} | 60 | {\gamma }^{2}+\gamma +\omega +\omega {\gamma }^{2} |
29 | \omega {\gamma }^{2}+1+{\gamma }^{2} | 61 | \gamma +\omega {\gamma }^{2}+1 |
30 | \omega \gamma +\omega {\gamma }^{2}+1+{\gamma }^{2} | 62 | {\gamma }^{2}+\omega {\gamma }^{2}+\omega \gamma +1+\omega +\gamma |
31 | \omega \gamma +1+{\gamma }^{2} | 63 | 1 |
32 | \omega {\gamma }^{2}+\omega +{\gamma }^{2} |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | First non-zero syndrome | 0 | 0 |
1 | ||||
\vdots | ||||
2t |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | {\gamma }^{7}=1+\omega +\gamma \omega | 0 | 0 |
1 | 1+{\gamma }^{7}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | {\gamma }^{7}=1+\omega +\gamma \omega | 0 | 0 |
1 | 1+{\gamma }^{7}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y |
Iterations | {\Delta }^{n}\left(y\right) | {\vartheta }_{n} | {u}_{n} | n-{u}_{n} |
-1 | 1 | 1 | 0 | -1 |
0 | 1 | 1+\gamma +\gamma \omega ={\gamma }^{12} | 0 | 0 |
1 | 1+{\gamma }^{12}y | {\gamma }^{4}=1+\gamma | 1 | 0 |
2 | 1+{\gamma }^{2}y | {\gamma }^{13}=1+\gamma \omega | 1 | 1 |
3 | 1+{\gamma }^{11}y+{\gamma }^{6}{y}^{2} | {\gamma }^{3}=\gamma +\omega +\gamma \omega | 2 | 1 |
4 | 1+{\gamma }^{3}y+{\gamma }^{10}{y}^{2} |
n | d | {k}_{1} | {R}_{1} | {p}^{{k}_{1}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 7 | 0.4667 | {2}^{7} |
15 | 7 | 5 | 0.3333 | {2}^{5} |
15 | 9 | 1 | 0.0667 | {2}^{1} |
n | d | {k}_{2} | {R}_{2} | {q}^{{k}_{2}} |
15 | 3 | 11 | 0.7333 | {2}^{11} |
15 | 5 | 9 | 0.6 | {2}^{9} |
15 | 7 | 6 | 0.4 | {2}^{6} |
15 | 9 | 4 | 0.2667 | {2}^{4} |