Skip to main content
Log in

A Hadamard Product of Linear Codes: Algebraic Properties and Algorithms for Calculating It

  • Published:
Moscow University Computational Mathematics and Cybernetics Aims and scope Submit manuscript

Abstract

A study is performed of the algebraic properties of the Hadamard product (Schur product, component-wise product) of linear error-correcting codes. The complexity of constructing a product basis using known multiplier bases is discussed. The concept is introduced of quotient, quasi-quotient, and maximal inclusion quasi-quotient obtained from the Hadamard division of one linear code by another. An explicit form of the maximum Hadamard division quasi-quotient is established. A criterion is proved for the existence of a given code of an inverse code in a semiring formed by linear codes of length \(n\) with the operations of sum and product of Hadamard codes. The explicit form of codes that have a reverse code in this semiring is described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

REFERENCES

  1. J. R. McEliece, ‘‘A public-key cryptosystem based on algebraic coding theory,’’ DSN Progress Report 42–44 (Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, 1978), pp. 114–116.

  2. H. Niederreiter, ‘‘Knapsack type cryptosystems and algebraic coding theory,’’ Probl. Control Inf. Theory 15 (2), 159–166 (1986).

    MathSciNet  Google Scholar 

  3. R. Pellikaan, ‘‘On decoding by error location and dependent sets of error positions,’’ Discrete Math. 106–107, 369–381 (1992). https://doi.org/10.1016/0012-365X(92)90567-Y

    Article  MathSciNet  Google Scholar 

  4. C. Wieschebrink, ‘‘Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes,’’ in Post-Quantum Cryptography, PQCrypto 2010, Ed. by N. Sendrier, Lecture Notes in Computer Science, Vol. 6061 (Springer, Berlin, 2010), pp. 61–72 (2010). https://doi.org/10.1007/978-3-642-12929-2_5

    Book  Google Scholar 

  5. M. A. Borodin and I. V. Chizhov, ‘‘Effective attack on the McEliece cryptosystem based on Reed–Muller codes,’’ Discrete Math. Appl. 24 (5), 273–280 (2014). https://doi.org/10.1515/dma-2014-0024

    Article  MathSciNet  Google Scholar 

  6. A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, and J.-P. Tillich, ‘‘Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes,’’ Des. Codes Cryptogr. 73, 641–666 (2014). https://doi.org/10.1007/s10623-014-9967-z

    Article  MathSciNet  Google Scholar 

  7. A. Couvreur, I. Márquez-Corbella, and R. Pellikaan, ‘‘Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes,’’ in Coding Theory and Applications, Ed. by R. Pinto, P. Rocha Malonek, and P. Vettori, CIM Series in Mathematical Sciences, Vol. 3 (Springer, Cham, 2015), pp. 133–140. https://doi.org/10.1007/978-3-319-17296-5_13

  8. A. Couvreur, A. Otmani, and J.-P. Tillich, ‘‘Polynomial time attack on wild McEliece over quadratic extensions,’’ IEEE Trans. Inf. Theory 63 (1), 404–427 (2017). https://doi.org/10.1109/TIT.2016.2574841

    Article  MathSciNet  Google Scholar 

  9. A. Couvreur, A. Otmani, J.-P. Tillich, and V. Gauthier-Umaña, ‘‘A polynomial-time attack on the BBCRS scheme,’’ in Public-Key Cryptography – PKC 2015, Ed. by J. Katz, Lecture Notes in Computer Science, Vol. 9020 (Springer, Berlin, 2015), pp. 175–193. https://doi.org/10.1007/978-3-662-46447-2_8

    Book  Google Scholar 

  10. A. Otmani and H. Kalachi, ‘‘Square code attack on a modified Sidelnikov cryptosystem,’’ in Codes, Cryptology, and Information Security, C2SI 2015, Ed. by S. El Hajji, A. Nitaj, et al., Lecture Notes in Computer Science, Vol. 9084 (Springer, Cham, 2015), pp. 173–183. https://doi.org/10.1007/978-3-319-18681-8_14

    Book  Google Scholar 

Download references

Funding

This work was supported by ongoing institutional funding. No additional grants to perform or direct our research were obtained.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. V. Chizhov.

Ethics declarations

The author of this work declares that he has no conflicts of interest.

Additional information

Translated by L. Trubitsyna

Publisher’s Note.

Pleiades Publishing remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chizhov, I.V. A Hadamard Product of Linear Codes: Algebraic Properties and Algorithms for Calculating It. MoscowUniv.Comput.Math.Cybern. 47, 239–250 (2023). https://doi.org/10.3103/S0278641923040179

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0278641923040179

Keywords:

Navigation