Advertisement

Designs, Codes and Cryptography

, Volume 63, Issue 3, pp 425–445 | Cite as

Divisibility of polynomials over finite fields and combinatorial applications

  • Daniel Panario
  • Olga Sosnovski
  • Brett Stevens
  • Qiang Wang
Article

Abstract

Consider a maximum-length shift-register sequence generated by a primitive polynomial f over a finite field. The set of its subintervals is a linear code whose dual code is formed by all polynomials divisible by f. Since the minimum weight of dual codes is directly related to the strength of the corresponding orthogonal arrays, we can produce orthogonal arrays by studying divisibility of polynomials. Munemasa (Finite Fields Appl 4(3):252–260, 1998) uses trinomials over \({\mathbb{F}_2}\) to construct orthogonal arrays of guaranteed strength 2 (and almost strength 3). That result was extended by Dewar et al. (Des Codes Cryptogr 45:1–17, 2007) to construct orthogonal arrays of guaranteed strength 3 by considering divisibility of trinomials by pentanomials over \({\mathbb{F}_2}\) . Here we first simplify the requirement in Munemasa’s approach that the characteristic polynomial of the sequence must be primitive: we show that the method applies even to the much broader class of polynomials with no repeated roots. Then we give characterizations of divisibility for binomials and trinomials over \({\mathbb{F}_3}\) . Some of our results apply to any finite field \({\mathbb{F}_q}\) with q elements.

Keywords

Polynomials over finite fields Divisibility of polynomials Orthogonal arrays 

Mathematics Subject Classification (2000)

12E20 94A55 05B15 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aumasson J.Ph., Finiasz M., Meier W., Vaudenay S.: TCHo: A hardware-oriented trapdoor Cipher. In: Proceedings ACISP’07, LNCS, vol. 4586, pp. 184–199. Springer, Heidelberg (2007).Google Scholar
  2. 2.
    Bose R.C.: On some connections between the design of experiments and information theory. Bull. Inst. Internat. Statist. 38, 257–271 (1961)MathSciNetMATHGoogle Scholar
  3. 3.
    Cheng C.T.: The test suite generation problem: optimal instances and their implications. Discrete Appl. Math. 155, 1943–1957 (2007)MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Cohen M.B., Colbourn C.J., Collofello J.S., Gibbons P.B., Mugridge W.B.: Variable strength interaction testing of components. In: Proceedings 27th International Computer Software and Applications, pp. 413–418 (2003).Google Scholar
  5. 5.
    Colbourn C.J.: Covering arrays. In: Handbook of Combinatorial Designs, Chapter VI10, pp. 361–364. CRC Press, Boca Raton (2007).Google Scholar
  6. 6.
    Delsarte P.: Four fundamental parameters of a code and their significance. Inform. Control 23, 407–438 (1973)MathSciNetMATHCrossRefGoogle Scholar
  7. 7.
    Dewar M., Moura L., Panario D., Stevens B., Wang Q.: Division of trinomials by pentanomials and orthogonal arrays. Designs Codes Cryptogr 45, 1–17 (2007)MathSciNetMATHCrossRefGoogle Scholar
  8. 8.
    Golomb S.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1982)Google Scholar
  9. 9.
    Golomb S., Gong G.: Signal Design for Good Correlation. Cambridge University Press, Cambridge (2005)MATHCrossRefGoogle Scholar
  10. 10.
    Gupta K.C., Maitra S.: Multiples of primitive polynomials over GF(2). In: Progress in Cryptology—INDOCRYPT 2001 (Chennai). Lecture Notes in Computer Science, vol. 2247, pp. 62–72. Springer, Berlin (2001).Google Scholar
  11. 11.
    Herrmann M., Leander G.: A practical key recovery attack on basic TCHo. In: Proceedings PKC 2009, LNCS, vol. 5443, pp. 411–424. Springer, Berlin (2009).Google Scholar
  12. 12.
    Jambunathan K.: On choice of connection-polynomials for LFSR-based stream ciphers. In: Progress in cryptology—INDOCRYPT 2000 (Calcutta). Lecture Notes in Computer Science, vol. 1977, pp. 9–18. Springer, Berlin (2000).Google Scholar
  13. 13.
    Jordan H.F., Wood D.C.M.: On the distribution of sums of successive bits of shift-register sequences. IEEE Trans. Comput C-22, 400–408 (1973)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Lidl R., Niederreiter H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1994)MATHGoogle Scholar
  15. 15.
    Lindholm J.H.: An analysis of the pseudo-randomness properties of subsequences of long m-sequences. IEEE Trans. Inform. Theory IT-14, 569–576 (1968)CrossRefGoogle Scholar
  16. 16.
    Maitra S., Gupta K.C., Venkateswarlu A.: Results on multiples of primitive polynomials and their products over GF(2). Theor. Comput. Sci 341(1–3), 311–343 (2005)MathSciNetMATHCrossRefGoogle Scholar
  17. 17.
    Martin W.J.: (t, m, s)-nets. In: Handbook of Combinatorial Designs. Chapter VI.59, pp. 361–364. CRC Press, Boca Raton (2007).Google Scholar
  18. 18.
    Meagher K., Stevens B.: Covering arrays on graphs. J. Comb. Theory Ser. B 95, 134–151 (2005)MathSciNetMATHCrossRefGoogle Scholar
  19. 19.
    Meagher K., Moura L., Zekaoui L.: Mixed covering arrays on graphs. J. Comb. Designs 15, 393–404 (2007)MathSciNetMATHCrossRefGoogle Scholar
  20. 20.
    Mullen G.L., Panario D. (eds.): Handbook of Finite Fields. Discrete Mathematics and its Applications. Chapman & Hall/CRC, Boca Raton (to appear)Google Scholar
  21. 21.
    Munemasa A.: Orthogonal arrays, primitive trinomials, and shift-register sequences. Finite Fields Their Appl. 4(3), 252–260 (1998)MathSciNetMATHCrossRefGoogle Scholar
  22. 22.
    Sadjadpour H., Sloane N., Salehi M., Nebe G.: Interleaver design for turbo codes. IEEE J. Selected Areas Commun 19(5), 831–837 (2001)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Daniel Panario
    • 1
  • Olga Sosnovski
    • 1
  • Brett Stevens
    • 1
  • Qiang Wang
    • 1
  1. 1.School of Mathematics and StatisticsCarleton UniversityOttawaUK

Personalised recommendations