Lattices, Linear Codes, and Invariants, Part II Noam D

Lattices, Linear Codes, and Invariants, Part II Noam D

fea-elkies-2.qxp 10/19/00 2:44 PM Page 1382 Lattices, Linear Codes, and Invariants, Part II Noam D. Elkies n Part I of this article we introduced “lattices” As was true of Part I, there is little if any of the L Rn and described some of their relations mathematics described herein for whose discov- with other branches of mathematics, focus- ery I can claim credit. The one possible exception ing on “theta functions”. Those ideas have a is the use of theta functions near the end to relate natural combinatorial analogue in the theory the occurrences of the groups SL2(Z/pZ) and Iof “linear codes”. This theory, though much more SL (Z) in the functional equations for weight enu- 2 recent than the study of lattices, is more accessi- merators and lattices respectively; I know of no ble, and its numerous applications include the published statement of this observation, though construction and analysis of many important lat- it may well be common knowledge in some circles. tices. All other results and ideas I have attributed when A lattice L is a special kind of subgroup of the their source is known to me, and I apologize in ad- additive group Rn; in Part I we associated to L a vance for any mis- or missing attribution. theta function, which is a generating function for the lengths of the vectors of L. A linear code C, to Sphere Packing in Hamming Space: Error- be defined below, is a subgroup of a finite addi- correcting Codes tive group Fn. Analogous to the theta functions of Most of the problems and ideas concerning sphere lattices are “weight enumerators” of codes, which packing have natural, and often more tractable, dis- are generating functions for the coordinates of el- crete analogues in the theory of error-correcting ements of C. We shall see how most of the uses codes (ECCs). Though easier in many ways than the and properties of theta functions that we described sphere-packing problem, the theory of ECCs is in Part I have counterparts in the setting of weight much more recent: its systematic development enumerators. In particular, just as the theta func- began only with R. W. Hamming’s 1947 paper.1 In tion L() associated to a “self-dual lattice” L is in- our digital age, ECCs are ubiquitous wherever there variant under certain fractional linear transfor- is information to reliably store or transmit; appli- mations of the variable , we shall encounter cations range from the familiar compact disc in “self-dual codes” C with weight enumerators in- one’s computer or stereo to close-up photographs variant under certain linear transformations of of Jovian moons sent back to Earth with a trans- the variables. This invariance yields much infor- mitter too weak to power a lightbulb. The theo- mation about C, and about an associated self-dual retical study of ECCs has also led to surprisingly lattice LC and its theta function. varied and deep mathematics, including for in- stance orthogonal polynomials and arithmetic Noam D. Elkies is professor of mathematics at Harvard algebraic geometry. In the present exposition we University. His e-mail address is elkies@math. concentrate on the connections with sphere pack- harvard.edu. ings, particularly as regards theta functions and Part I of this article—concerning lattices, lattice packings their discrete analogues. of spheres, theta functions, and modular forms—appeared in the November 2000 issue of the Notices, pages 1Hamming’s work is discussed in the memorial article 1238–1245. about him in the September 1998 Notices. 1382 NOTICES OF THE AMS VOLUME 47, NUMBER 11 fea-elkies-2.qxp 10/19/00 2:44 PM Page 1383 P n To see ECCs as discrete sphere packings, we number of 1’s (equivalently, such that i=1 ai is must specify the metric space containing our even; here =2). A more interesting example is the n spheres. The space will be F , i.e., the set of ordered extended Hamming code H8, in which F = {0, 1} n-tuples of elements of a finite set F, for some again, n =8, and H8 consists of the words choice of F and n. In the ECC context, such n-tuples are often called words of length n, with 00000000, 00001111, 00110011, 00111100, letters drawn from an alphabet F. To assure that 01010101, 01011010, 01100110, 01101001, |Fn| > 1 (so that a word contains some informa- and their ones’ complements tion), we assume |F| > 1 and n>0. The set Fn itself is called Hamming space and is given a met- 11111111, 11110000, 11001100, 11000011, ric structure by the Hamming distance d( , ) de- 10101010, 10100101, 10011001, 10010110. fined thus: The distance between words a =(a1,... ,an) and b =(b1,... ,bn) is Thus |H8| =16, and one may check that =4. All these codes are known to have maximal size for d(a, b):=#{i | 1 i n, ai =6 bi}. their respective F, n, and . We shall again en- counter each of these important codes, and espe- That is, d(a, b) is the number of single-letter cially H8, several times. changes (“errors”) one must make to get from a n to b. A code is then just a nonempty subset CF . Linear Codes The minimal (nonzero) distance of a code is The discrete analogue of a lattice is a linear code. (C) := min d(a, b). A linear code is a vector subspace of Hamming a,b∈C space Fn. For Fn to have the structure of a vector 6 a=b space, F must be a (finite) field, such as Z/pZ for 2 In the degenerate case |C| =1, we set (C)=n +1. some prime p. For instance, if in the previous In the standard application to error-resistant paragraph F is always chosen to be a field (so that { } Z Z { } data storage or transmission, the words that can in particular 0, 1 is identified with /2 ), and 0 be stored or transmitted are those in C, rather is chosen for the single-word code, then each of than arbitrary words in Fn. A code C with minimal the codes in that paragraph is linear. Henceforth distance is then said to detect 1 errors, and F will denote a finite field. to correct b( 1)/2c errors. This is because if The powerful framework of linear algebra makes some information is stored or sent as a word of C, it possible to work with codes much larger than and this word is changed in at most 1 coordi- would be accessible otherwise, since a linear code | |k nates, the resulting word cannot be in C, and thus of size F can be specified by only k basis words. cannot be the word originally intended; moreover, The minimal distance also simplifies somewhat: ∈ n if at most b( 1)/2c letters were changed, then the for any a, b F , we have d(a, b)=d(a b, 0) ; if original word is still uniquely determined, else by a, b are in a linear code, then so is a b, whence ∈C the triangle inequality C would contain two words is the minimum of d(c,0) over all nonzero c . n at distance at most 1. Equivalently, an e-error- For any c ∈ F , the distance d(c,0) is the number correcting code is a code C such that the (closed) of nonzero coordinates of c, a number known as n Hamming spheres Be(a):={x ∈ F | d(a, x) e} of the Hamming weight of c and denoted by wt(c). common radius e about the codewords a ∈Care Thus for a linear code is the minimum (nonzero pairwise disjoint. Such a code detects 2e errors and Hamming) weight. The basic problem for linear has minimal distance at least 2e +1. ECCs thus becomes: what is the maximum dimen- The basic problem of error-correcting codes is: sion of a linear code if its length, the size of the al- what is the maximum size of a code if its length, phabet, and a lower bound on the minimum weight the size of the alphabet, and a lower bound on the are given? minimal distance are given? That is, how efficiently As is the case for sphere packings, for most val- can we encode information while detecting or cor- ues of (|F|,n,) one cannot at present hope to recting a given number of errors? This is also a nat- solve the problem exactly or even asymptotically, ural mathematical problem, asking how many only to give upper and lower bounds. Many of the points can be packed into Fn without any two com- bounds for codes are analogous to sphere-packing ing closer than to each other. Naturally, the smaller is, the larger C can get, and conversely. 2It is a fundamental theorem of E. H. Moore that a set of At the extreme ends are C = Fn itself (maximal ef- q>1 elements can be given the structure of a field if and only if q is a power of a prime; in the vast majority of “real- ficiency but no error correction), and |C| =1(max- world” applications of ECCs, q is a power of 2, often ei- imal but no information). Other simple examples ther 2 itself or 256 = 28, but other choices of q are also | | are the repetition code, consisting of the F words important in the mathematical theory. A finite field of q all of whose letters are the same (with = n), and elements is often called “GF(q)”; the “GF” stands for the parity check code, for which F is {0, 1} and C “Galois field” , in tribute to Galois who first studied finite consists of the 2n 1 words a with an even fields in this generality.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us