Professional Documents
Culture Documents
3, MARCH 2005
where 01
2C
X ;X
. By Lemma 3, item 2
( ) =
01
=0
(e
0 k 0 h 0 i; l 0 k) =
01
=0
(i; l
0 k)
So we have constructed a family of FH sequences with autocorrelation f 0 1 and cross correlation f . We check the conditions under
which it is an optimal pair of FH sequences.
Lemma 6: Let X and Y be two FH sequences of length
p = ef + 1 = (e + 1)(f 0 1) + e 0 f + 2
with frequency set size e+1 and f 2. If e 3f , then H (X; Y ) f .
Proof: According to Theorem 3, the occurrences of symbols in
should be
X and Y
0f +2
f f
f
01
X1 = (1; 1; 2; 3; 3; 0; 4; 9; 4; 5; 1; 7; 5; 0; 10; 2; 5; 8; 6; 0;
2; 11; 8; 4; 6; 11; 1; 7; 11; 10; 3; 10; 6; 9; 9; 8; 7):
It is easy to check that H (X0 ) = H (X1 ) = 2 and then both are
optimal (37; 13; 2)-FH sequences. Also, H (X0 ; X1 ) = 3, and X0 and
X1 are an optimal pair. If we construct all X for 0 i 11, we have
i
111 f f 0 1 111 f 0 1
REFERENCES
0f +2
01
f 0 1 111 f 0 1 f f 111 f :
With some algebraic calculation, we have
H (X; Y ) f 0 3f
2 + 2ef 0 7f + 4
3ef + 1
ef 07f +4
When e 3f and f 2, the fraction 3f +2
is a positive
3ef +1
number smaller than 1. Since H (X; Y ) is an integer, the conclusion
follows.
1141
C0
C1
C2
C3
C4
C5
f1;
f2;
f4;
f8;
f16;
f13;
=
=
=
=
=
=
7;
14;
9;
18;
17;
15;
g
g
6g
12g
5g
10g:
11
3
0 1) + e 0 f + 2 = 7 3 2 + 5
= 37,
= 12,
and
= 3.
I. INTRODUCTION
Example 2: Let
follows:
Construct
X0
as
Golay sequences [1] have found many applications in communications, including peak power control for orthogonal frequency-division
multiplexing (OFDM) signals, channel estimation, and complementary code code-division multiple access (CDMA). Davis and Jedwab
[2], [3] discovered an important link between Golay sequences and
ReedMuller codes. Their method of generating binary and nonbinary
Golay sequences is known as the GDJ construction [4]. Altogether
Manuscript received May 1, 2004; revised November 30, 2004. This work
was supported in part by the R. O. C. National Science Council under Grant
NSC-92-2219-E-155-003.
The authors are with the Communications Engineering Department, Yuan Ze
University, Chungli, Taoyuan 320, Taiwan, R.O.C. (e-mail: eeyli@saturn.yzu.
edu.tw).
Communicated by K. G. Paterson, Associate Editor for Sequences.
Digital Object Identier 10.1109/TIT.2004.842775
1142
2h(m+1) 1 m!=2 Golay sequences over Z2 of length 2m can be generated from the GDJ construction as second-order ReedMuller codewords. These sequences belong to m!=2 nonzero cosets (known as
Golay cosets) of the rst-order ReedMuller codes, each containing
2h(m+1) codewords that are proved to be Golay sequences. Golay se-
16 ( = 4)
( = 2)
4! 2 = 12
2 = 1024
= (
= exp(2
...
1 )
( )=
s t
= +1
1
n01
i=0
a (t)+Hf t
(1)
f
i f is the frequency of the ith subcarrier, f is the
where fi
carrier frequency, f is the inverse of the OFDM symbol time period,
and ai t takes on constant value ai over a symbol period.
The aperiodic autocorrelation function of a at displacement u is
()
( )=
Ca u
n0u01
i=0
a 0a
(2)
a i ; bi
2 ZH
form a Golay complementary pair if the sum of their aperiodic autocorrelation functions is the impulse function, i.e.,
( ) + Cb (u) = 0;
Ca u
=(
( )=n+
Pa t
= 0:
for each u 6
...
u6=0 Ca (u)
0Hu1ft :
(4)
( ) + Pb (t) = 2n;
8 t:
Pa t
(5)
() ()
( ) 2n;
Pa t
( ) 2n;
8 t:
Pb t
(6)
( ) = max
t Pa (t)=E (Pa (t)):
PAPR a
( ( )) = n;
(7)
(3)
8 a:
E Pa t
(8)
...
=2
=2
32
16
( = 2)
!2
32
64 ( = 6)
16 ( = 4)
1143
TABLE I
CHARACTERISTIC dd-SEQUENCES OF 1024 LENGTH 16 NON-GDJ
QUATERNARY GOLAY SEQUENCES
Denition: The d-Sequence, the dd-Sequence: From a codeword sequence a = (a0 ; a1 ; . . . an01 ) where ai 2 ZH , one can obtain its difference sequence (d-sequence) and double difference sequence (dd-sequence) by taking the difference of neighboring terms as follows:
dd
2 H.
Z
= ( a0 ; a 1 ; a 2 ; . . . ; a
n01 ):
There are H 2 different codeword sequences with the same dd-sequence but different initial value combinations (a0 ; da ). The collection
of all codeword sequences can be partitioned into H n02 disjoint sets
of size H 2 , each set corresponding to a particular dd-sequence.
The equivalence of PAPR for codeword variations such as reversal,
adding a constant sequence, or adding a linear sequence has been discussed before [8]. We propose another way to describe these PAPR
equivalence properties through dd-sequences. Any two codewords a,
b whose dd-sequences are equal, or are related by reversal, complement, or reversal plus complement will have the same PAPR. These
relations of dd-sequences can be translated into relations between the
instantaneous envelope power waveforms Pa (t), Pb (t) including time
translation and/or time reversal. None of these variations will change
the PAPR. The proofs and other related results will be given in a forthcoming paper.
Denition: The Characteristic dd-Sequence: Among a dd-sequence
and all its PAPR equivalent reversal and/or complement variations,
take the lexicographically rst dd-sequence as the characteristic dd-sequence.
The PAPR equivalence relations can be summarized into the following property.
The PAPR Equivalence Property: Any two codewords a, b with the
same characteristic dd-sequence will have the same PAPR.
For example, the four quaternary (H = 4) dd-sequences [0; 1],
are related to each other by reversal and/or complement. The characteristic dd-sequence is taken to be [0; 1]. There are
16 codeword sequences associated with each of the four dd-sequences
differing by the initial values (a0 ; d0a ). Altogether 16 3 4 = 64 codeword sequences have characteristic dd-sequence [0; 1] and the same
PAPR = 3:3087 when used for quaternary phase-shift keying (QPSK)
OFDM signals with four subcarriers.
In general, given a quaternary (H = 4) characteristic dd-sequence
of any length, one, two, or four different dd-sequences can be created by reversal and/or complement variations (including the original
one), and exactly 16 different codeword sequences can be reconstructed
[1; 0], [0; 3], [3; 0]
from each of the dd-sequences. The number of quaternary codeword sequences with the same characteristic dd-sequence is thus 16, 32, or 64
for sequences of any length n = 2m . The size of the exhaustive search
can be reduced to between 1=H 2 and 1=(4H 2 ) of the original size if
the search is conducted over all dd-sequences or over all characteristic
dd-sequences.
The 1024 non-GDJ Golay sequences can now be presented in
Table I through 16 characteristic dd-sequences. Each characteristic
dd-sequence in the table corresponds to four different dd-sequences
with reversal/complement variations. For example, characteristic
ddsequence number 2 is associated with the following dd-sequences:
Original
Reversal
Complement
Reversal plus complement
[01200300030001]
[10003000300210]
[03200100010003]
[30001000100230].
1144
Fig. 1.
OFDM power for two quaternary non-GDJ Golay sequences a = [0002002021102330] and b = [0002002003320112].
= [0001323102231231]
= [0203303300211033]:
= [02022001133331];
dd
= [02022023133331]
d0
= [0002002021102330];
PAPR(a) = 1:9619
= [0002002003320112];
PAPR(b) = 2:
1145
Index Terms -error linear complexity, linear complexity, repeatedroot codes, stream cipher.
I. INTRODUCTION
The linear complexity of a sequence (i.e., the length of the shortest
recurrence relation, or linear feedback shift register which generates
the sequence) is a fundamental parameter for virtually all applications
of linearly recurrent sequences.
Manuscript received August 13, 2004; revised November 5, 2004. The material in this correspondence was included in part in a paper presented at the International Symposium on Sequences and Their Applications (SETA04), Seoul,
South Korea, November 2004.
The author is with the Department of Computer Science, Loughborough
University, Loughborough LE11 3TU, Leics. U.K. (e-mail: A.M.Salagean@
lboro.ac.uk).
Communicated by K. G. Paterson, Associate Editor for Sequences.
Digital Object Identier 10.1109/TIT.2004.842769
s
s
k
`
k
`
Computing the linear complexity c( ) of a linearly recurrent sequence over a eld needs in general quadratic time (Berlekamp
Massey algorithm, [1], [2]). For the particular case of binary sequences
with period a power of two, Games and Chan devised an algorithm with
linear time and space bit complexity [3].
The -error linear complexity of a periodic sequence of period is
the minimum linear complexity that can be obtained for by modifying
up to terms in one period (and modifying all other periods in the same
way). This notion was dened in [4] and is closely related to previously
dened notions of sphere complexity [5] and weight complexity [6].
The GamesChan method has been extended by Stamp and Martin
[4] to computing the -error linear complexity of a binary sequence
with period a power of two, still in linear time. Further, Lauder and
Paterson [7] showed that the whole error linear complexity spectrum
(i.e., the -error complexity for each value of ) of a binary sequence
of period = 2n can be computed in O( (log )2 ) time.
An important application of computing the linear complexity and
-error linear complexity appears in cryptography. If a sequence is used
as a keystream in a stream cipher, an opponent intercepting part of the
sequence will want to recover the whole sequence, thus, breaking the
cipher. If this is not possible, they might hope to at least determine a
sequence which coincides with the correct sequence in all but a small
number of positions.
The initial motivation of our work comes from a remark in [7, Introduction], pointing to the fact that all the previously mentioned efcient
algorithms for binary sequences with period a power of two suffer
from the fact that they require as input an entire period of a sequence
to compute c( ), while the BerlekampMassey algorithm only needs
2c( ) bits. Thus, they are not applicable in realistic cryptographic situations.
The results presented in the current correspondence remedy this
situation. Namely, we prove in Section III that by suitably using the
GamesChan algorithm it is possible to compute the linear complexity
of a binary sequence , given only a nite segment of 2c( ) bits
of the sequence, as long as we know that the period is a power of
two (and we do not need to know in advance which power of two it
is). Moreover, by suitably using the StampMartin algorithm we can
compute the linear complexity of a nite sequence of length , viewed
as an initial segment of an innite sequence with period a power of
two, even in the case when is less than twice the complexity. Hence,
for this particular type of sequences we obtain a linear (rather than
quadratic) complexity algorithm with the input and output specications similar to the BerlekampMassey algorithm.
We cannot expect to be able to compute the -error complexity of
an innite periodic sequence when we know less than one period of
the sequence, as we do not know how many of the errors in an error
pattern that minimizes linear complexity will fall outside our known
portion of the sequence. What we can compute instead is an analogue
notion of -error complexity for nite sequences, which we dene in
Section II as being the minimum complexity of any innite sequence
from a given class, whose initial segment coincides with the given nite sequence on all but possibly up to positions. This denition ts
well the cryptographic application mentioned previously, and could be
used for example in looking for sequences of low complexity which
coincide with the correct sequence except for a certain percentage of
the positions in any initial segment.
In Section III, we also show that by suitably using the StampMartin
algorithm, the -error linear complexity of a nite binary sequence,
viewed as an initial segment of a sequence of period a power of two can
be computed in O( ) time, where is the length of the nite sequence.
The error linear complexity spectrum of such a nite sequence can be