Skip to main content
Log in

Intersection of Hamming codes avoiding Hamming subcodes

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

An Erratum to this article was published on 25 September 2014

Abstract

We prove that given a binary Hamming code \({{\mathcal{H}}^n}\) of length n = 2m − 1, m ≥ 3, or equivalently a projective geometry PG(m − 1, 2), there exist permutations \({\pi \in \mathcal{S}_n}\) , such that \({{\mathcal{H}}^n}\) and \({\pi({\mathcal{H}}^n)}\) do not have any Hamming subcode with the same support, or equivalently the corresponding projective geometries do not have any common flat. The introduced permutations are called AF permutations. We study some properties of these permutations and their relation with the well known APN functions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Assmus E.F., Mattson H.F.: On tactical configurations and error correcting codes. J. Comb. Theory 2, 243–257 (1967)

    Article  MathSciNet  MATH  Google Scholar 

  • Berger T.P., Canteaut A., Charpin P., Laigle-Chapuy Y.: On almost perfect nonlinear functions over \({{\mathbb{F}}^n_2}\) . IEEE Trans. Inform. Theory 52(9), 4160–4170 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  • Brinkmann M., Leander G.: On the classification of APN functions up to dimension 5. Des. Codes Cryptogr. 49, 273–288 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  • Browning K.A., Dillon J.F., Kibler R.E., Mcquistan M.T.: APN polynomials and related codes. J. Comb. Inform. Syst. Sci. 34(1–4), 135–159 (2009)

    Google Scholar 

  • Browning K.A., Dillon J.F., McQuistan M.T., Wolfe A.J.: An APN permutation in dimension six. Contemp. Math. 518, 33–42 (2010)

    MathSciNet  Google Scholar 

  • Calderbank A.R.: Covering radius and chromatic numbers of Kneser graphs. J. Combin. Theory 54(A), 129–131 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  • Cannon, J.J., Bosma, W. (eds): Handbook of Magma Functions. 2.13 edn. University of Sydney, Sydney (2006)

    Google Scholar 

  • Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125–156 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  • Dodunekov S.M., Zinoviev V.A.: A note on preparata codes. In: Proceedings of the Sixth International Symposium on Information Theory, Moscow—Tashkent Part 2, pp. 78–80 (1984).

  • Hou X.-D.: On the covering radius of subcodes of a code. IEEE Trans. Inform. Theory 37(6), 1706–1707 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  • Hou X.-D.: Affinity of permutations of \({{\mathbb{F}}_2^n}\) . In: Proceedings of the Workshop on Coding and Cryptography, pp. 273–280 (2003).

  • Kurlyandchik Ya M.: On logariphm asysmptotic of length of maximal sparce cycle r > 2. Methody Discretnogo Analiza 19, 48–55 (1971) (in Russian)

    Google Scholar 

  • MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland Publishing Company, New York (1977)

    MATH  Google Scholar 

  • Nyberg K.: Perfect non-linear S-boxes. In: Proceedings of EUROCRYPT’ 91. Lecture Notes in Computer Science, vol. 547, pp. 378–386 (1992).

  • Rifà J., Solov’eva F.I., Villanueva M.: Hamming codes avoiding Hamming subcodes. In: Proceedings of the 12th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT’2010), Novosibirsk (Russia), September 5–11, pp. 256–261 (2010).

  • Vasil’ev Y.L.: On nongroup close-packed codes. Probl. Cybern. 8, 375–378 (1962)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Rifà.

Additional information

Communicated by S. Ball.

An erratum to this article is available at http://dx.doi.org/10.1007/s10623-014-0011-0.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rifà, J., Solov’eva, F.I. & Villanueva, M. Intersection of Hamming codes avoiding Hamming subcodes. Des. Codes Cryptogr. 62, 209–223 (2012). https://doi.org/10.1007/s10623-011-9506-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-011-9506-0

Keywords

Mathematics Subject Classification (2000)

Navigation