Skip to main content

Matrices and Hamming Codes

  • Chapter
  • First Online:
Cryptology and Error Correction
  • 1837 Accesses

Abstract

This chapter introduces two Hamming codes, the first modern examples of error correcting codes. A Hamming code provides a way of transforming pieces (words) of a message so that at a later point, a reader of the message will be able to not just detect an error in a word, but correct the error. In order to understand Hamming codes, the chapter begins by introducing some elementary ideas of matrices and linear algebra: row vectors, column vectors and matrices, operations of addition and scalar multiplication, and matrix multiplication. Chapter 3 introduced vectors in the Extended Euclidean Algorithm to find the coefficients in Bezout’s identity and to find integer solutions of integer linear equations in two variables. The idea there was to work with vectors of coefficients of equations that describe successive remainders in Euclid’s Algorithm for two given numbers a and b as integer linear combinations of the two numbers. Matrices play a similar role in isolating and working efficiently with the coefficients of a system of linear equations in order to find solutions of the system. So they will show up again in Chaps. 15, 17 and 19. The chapter ends with a brief description of Hill cryptography, an historically significant generalization to matrices of the multiplicative Caesar cipher introduced in Chap. 2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lindsay N. Childs .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Childs, L.N. (2019). Matrices and Hamming Codes. In: Cryptology and Error Correction. Springer Undergraduate Texts in Mathematics and Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-15453-0_7

Download citation

Publish with us

Policies and ethics