Abstract
We prove that given a binary Hamming code \({{\mathcal{H}}^n}\) of length n = 2m − 1, m ≥ 3, or equivalently a projective geometry PG(m − 1, 2), there exist permutations \({\pi \in \mathcal{S}_n}\) , such that \({{\mathcal{H}}^n}\) and \({\pi({\mathcal{H}}^n)}\) do not have any Hamming subcode with the same support, or equivalently the corresponding projective geometries do not have any common flat. The introduced permutations are called AF permutations. We study some properties of these permutations and their relation with the well known APN functions.
Similar content being viewed by others
References
Assmus E.F., Mattson H.F.: On tactical configurations and error correcting codes. J. Comb. Theory 2, 243–257 (1967)
Berger T.P., Canteaut A., Charpin P., Laigle-Chapuy Y.: On almost perfect nonlinear functions over \({{\mathbb{F}}^n_2}\) . IEEE Trans. Inform. Theory 52(9), 4160–4170 (2006)
Brinkmann M., Leander G.: On the classification of APN functions up to dimension 5. Des. Codes Cryptogr. 49, 273–288 (2008)
Browning K.A., Dillon J.F., Kibler R.E., Mcquistan M.T.: APN polynomials and related codes. J. Comb. Inform. Syst. Sci. 34(1–4), 135–159 (2009)
Browning K.A., Dillon J.F., McQuistan M.T., Wolfe A.J.: An APN permutation in dimension six. Contemp. Math. 518, 33–42 (2010)
Calderbank A.R.: Covering radius and chromatic numbers of Kneser graphs. J. Combin. Theory 54(A), 129–131 (1990)
Cannon, J.J., Bosma, W. (eds): Handbook of Magma Functions. 2.13 edn. University of Sydney, Sydney (2006)
Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125–156 (1998)
Dodunekov S.M., Zinoviev V.A.: A note on preparata codes. In: Proceedings of the Sixth International Symposium on Information Theory, Moscow—Tashkent Part 2, pp. 78–80 (1984).
Hou X.-D.: On the covering radius of subcodes of a code. IEEE Trans. Inform. Theory 37(6), 1706–1707 (1991)
Hou X.-D.: Affinity of permutations of \({{\mathbb{F}}_2^n}\) . In: Proceedings of the Workshop on Coding and Cryptography, pp. 273–280 (2003).
Kurlyandchik Ya M.: On logariphm asysmptotic of length of maximal sparce cycle r > 2. Methody Discretnogo Analiza 19, 48–55 (1971) (in Russian)
MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland Publishing Company, New York (1977)
Nyberg K.: Perfect non-linear S-boxes. In: Proceedings of EUROCRYPT’ 91. Lecture Notes in Computer Science, vol. 547, pp. 378–386 (1992).
Rifà J., Solov’eva F.I., Villanueva M.: Hamming codes avoiding Hamming subcodes. In: Proceedings of the 12th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT’2010), Novosibirsk (Russia), September 5–11, pp. 256–261 (2010).
Vasil’ev Y.L.: On nongroup close-packed codes. Probl. Cybern. 8, 375–378 (1962)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by S. Ball.
An erratum to this article is available at http://dx.doi.org/10.1007/s10623-014-0011-0.
Rights and permissions
About this article
Cite this article
Rifà, J., Solov’eva, F.I. & Villanueva, M. Intersection of Hamming codes avoiding Hamming subcodes. Des. Codes Cryptogr. 62, 209–223 (2012). https://doi.org/10.1007/s10623-011-9506-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-011-9506-0