Next Article in Journal
Sparse Multicategory Generalized Distance Weighted Discrimination in Ultra-High Dimensions
Previous Article in Journal
Quantum Finite-Time Thermodynamics: Insight from a Single Qubit Engine
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of Blind Reconstruction of BCH Codes

Department of Electronics and Computer Engineering, Hanyang University, Seoul 04763, Korea
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(11), 1256; https://doi.org/10.3390/e22111256
Submission received: 16 October 2020 / Revised: 2 November 2020 / Accepted: 4 November 2020 / Published: 5 November 2020
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In this paper, the theoretical lower-bound on the success probability of blind reconstruction of Bose–Chaudhuri–Hocquenghem (BCH) codes is derived. In particular, the blind reconstruction method of BCH codes based on the consecutive roots of generator polynomials is mainly analyzed because this method shows the best blind reconstruction performance. In order to derive a performance lower-bound, the theoretical analysis of BCH codes on the aspects of blind reconstruction is performed. Furthermore, the analysis results can be applied not only to the binary BCH codes but also to the non-binary BCH codes including Reed–Solomon (RS) codes. By comparing the derived lower-bound with the simulation results, it is confirmed that the success probability of the blind reconstruction of BCH codes based on the consecutive roots of generator polynomials is well bounded by the proposed lower-bound.

1. Introduction

In order to achieve reliable information transmission through noisy communication channels, the use of error-correcting codes (ECCs) in data-stream is indispensable [1]. By sharing the parameters of ECCs between the transmitter and the receiver, the errors occurred by communication channels can be detected or corrected at the receiver in a cooperative way. However, in a non-cooperative context, it is necessary to decode received (or intercepted) data without the knowledge of parameters of the used ECC. In other words, a blind reconstruction of the parameters of the used ECC should be performed by the receiver.
A blind reconstruction of ECCs has been studied in various ways [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19]. The blind reconstruction schemes of linear block codes are studied in [2,3,4,5,6,7,8,9], the blind reconstruction schemes of Bose–Chaudhuri–Hocquenghem (BCH) codes are studied in [10,11,12,13,14,15], and the blind reconstruction schemes of convolutional codes are studied in [16,17,18,19]. Most of the blind reconstruction schemes of ECCs take the dual code approach to reconstruct the dual code space of the used code by using the received codewords. Valembois [2] proposed a detection and recognition algorithm for binary linear codes by using the dual code property and Cluzeau [3] proposed a blind reconstruction method based on iterative decoding techniques by using the dual code property. Moreover, most of the blind detection methods of BCH codes are also based on the dual code approach. By using the properties of BCH codes, their parity-check matrices can be constructed through applying Galois field Fourier transform (GFFT) on the received codewords and many of the blind reconstruction methods of BCH codes are based on GFFT [10,11,12,13,14,15]. In the same manner, most of the blind reconstruction methods of convolutional codes are also based on the dual code approach [16,17,18,19]. To reconstruct the generator polynomial or generator matrix of convolutional code, its dual code is recognized preferentially.
An analysis of the blind reconstruction of cyclic codes over binary erasure channel (BEC) is performed in [20]. Note that for BEC, the number and the locations of error bits in the received data-stream are known to the receiver. By using this property of BEC, a blind reconstruction scheme of binary cyclic codes is proposed and a lower-bound on the detection probability of this scheme is analyzed in [20]. However, many blind reconstruction schemes consider the binary symmetric channel (BSC) where the number and the locations of error bits in the received data-stream are not unavailable. Therefore, the analysis in [20] is not directly applicable to the blind reconstruction schemes considering the BSC.
In this paper, the blind reconstruction of BCH codes over q-ary symmetric channel is mainly considered because BCH codes are a most widely used class of cyclic codes, especially in communication and storage systems and q-ary symmetric channel is a general form of BSC. Especially, the method in [15] shows the best blind reconstruction performance among the existing blind reconstruction methods of BCH codes, but the theoretical analysis of this method has not been performed yet. Therefore, by analyzing the properties of BCH codes on the aspects of blind reconstruction, a lower-bound on the success probability of the blind reconstruction method in [15] is derived. More specifically, the distribution of GFFT values of the received codewords is analyzed and the blind reconstruction method is formulated by using the conjugacy classes. By comparing the derived lower-bound with the simulation results, it is confirmed that the success probability of the blind reconstruction is well lower-bounded. Furthermore, the analysis of BCH codes on the aspects of blind reconstruction may lay a foundation for an analysis of other blind reconstruction methods of BCH codes based on GFFT.
In Section 2, definitions and properties of BCH codes and GFFT are briefly explained. In Section 3, the theoretic analysis of the properties of BCH codes on the aspects of blind reconstruction is performed. In Section 4, the blind reconstruction method in [15] is explained, and a lower-bound on the success probability of this blind reconstruction method is derived. The simulation results confirm that the success probability of the blind reconstruction method is well-bounded by the derived lower-bound. In Section 5, conclusions are provided.

2. BCH Codes and Galois Field Fourier Transform

In this section, the BCH codes and the Galois field Fourier transform (GFFT) are briefly described.

2.1. BCH Codes

BCH codes is a class of linear block codes for forward error correction. Let G F ( q ) denote the Galois field (or finite field) of q elements and let B C H q ( n , k ) denote the BCH code with length n and dimension k over G F ( q ) . Note that the dimension k is the same as the length of random message which also implies the number of codewords. Then, the generator polynomial of B C H q ( n , k ) is defined as follows:
g ( x ) = L C M [ M α b ( x ) , M α b + 1 ( x ) , , M α b + d 2 ( x ) ]
where L C M denotes the least common multiple function, α is a primitive n-th root of unity in G F ( q m ) , M α i ( x ) is a minimal polynomial of α i over G F ( q ) , b is an arbitrary positive integer smaller than n, and d is a designed distance. Note that m is the smallest integer such that n divides q m 1 . By the definition of generator polynomial g ( x ) , α b , α b + 1 , ⋯, α b + d 2 are the roots of g ( x ) , i.e., g ( α b ) = g ( α b + 1 ) = = g ( α b + d 2 ) = 0 . Let S r be the set of the exponents of all roots of g ( x ) as follows:
S r = i g ( α i ) = 0 , i { 0 , 1 , , n 1 } .
A message can be expressed in polynomial form as m ( x ) = m 0 + m 1 x + + m k 1 x k 1 and in vector form as m = ( m 0 , m 1 , , m k 1 ) , where m i G F ( q ) for i { 0 , 1 , , k 1 } . A codeword of B C H q ( n , k ) can be expressed in polynomial form as c ( x ) = c 0 + c 1 x + + c n 1 x n 1 and in vector form as c = ( c 0 , c 1 , , c n 1 ) , where c i G F ( q ) for i { 0 , 1 , , n 1 } . Then, c ( x ) can be obtained as follows:
c ( x ) = m ( x ) g ( x ) .
Since a codeword c ( x ) has g ( x ) as a factor, all roots of g ( x ) are also roots of c ( x ) , i.e., c ( α i ) = 0 for all i S r . In this paper, the q-ary symmetric channel with error probability ϵ is considered. Channel error can be expressed in polynomial form as e ( x ) = e 0 + e 1 x + + e n 1 x n 1 and in vector form as e = ( e 0 , e 1 , , e n 1 ) , where e i G F ( q ) for i { 0 , 1 , , n 1 } . Note that by the definition of q-ary symmetric channel, Pr ( e i = 0 ) = 1 ϵ and Pr ( e i = x ) = ϵ / ( q 1 ) for i { 0 , 1 , , n 1 } and x G F * ( q ) where G F * ( q ) = G F ( q ) { 0 } . Then, a received codeword at the receiver is expressed in polynomial form as
r ( x ) = c ( x ) + e ( x ) ,
or in vector form as follows:
r = c + e .
Throughout the paper, the polynomial form and the vector form will be used interchangeably.
If there is no error (i.e., e ( x ) = 0 ), r ( α i ) = 0 for all i S r because r ( x ) = c ( x ) . However, if e ( x ) 0 , we may have r ( α i ) 0 for some i S r because it can be e ( α i ) 0 for some i S r .

2.2. Conjugacy Classes and Cyclotomic Cosets

Let U β denote a conjugacy class of β G F ( q m ) . Then, U β consists of β and its conjugates β q , β q 2 , β q 3 , ⋯. Note that the conjugacy classes of the elements in the same conjugacy class are the same. The minimal polynomial of α i G F ( q m ) over G F ( q ) , M α i ( x ) , can be obtained by using the conjugacy classes as follows:
M α i ( x ) = z U α i ( x z ) .
The degree of M α i ( x ) is equal to | U α i | , where | S | is the cardinality of a set S. Note that since M α i ( x ) has all the elements in U α i as its roots, g ( x ) in (1) has all the elements in U α b , U α b + 1 , ⋯, U α b + d 2 as its roots. Let S N denote the null spectrum of the B C H q ( n , k ) which has the generator polynomial in (1). Then S N is obtained as follows:
S N = i = b b + d 2 U α i .
S r in (2) is also expressed as the set of the exponents of the elements in S N such as S r = { i α i S N } . Then, the complement of S r , denoted by S r c , is obtained as follows:
S r c = { i α i G F * ( q m ) S N } .
It is clear that S r c = Z n S r where Z n = { 0 , 1 , , n 1 } .
Let C i denote the cyclotomic coset of i modulo n with respect to G F ( q ) . Then, the exponents of all the elements in U α i make up C i and S r = i = b b + d 2 C i by (2) and (7).

2.3. Galois Field Fourier Transform

The roots of a received codeword r ( x ) can also be obtained by performing the Galois field Fourier transform (GFFT) on r ( x ) . The GFFT of c ( x ) , denoted as C ( X ) , can be expressed in polynomial form as follows:
C ( X ) = c ( α 0 ) + c ( α 1 ) X + + c ( α n 1 ) X n 1 ,
where c ( α i ) G F ( q m ) for i { 0 , 1 , , n 1 } . It is also expressed in vector form as follows:
C = C 0 , C 1 , , C n 1 = c ( α 0 ) , c ( α 1 ) , , c ( α n 1 ) .
The GFFT matrix M G is defined as follows:
M G = α 0 α 0 α 0 α 0 α 0 α 1 α 2 α n 1 α 0 α 2 α 4 α 2 ( n 1 ) α 0 α n 1 α 2 ( n 1 ) α ( n 1 ) 2 .
Then, the GFFT of c is simply obtained by C = c × M G . By the definition of g ( x ) in (1), C b = C b + 1 = = C b + d 2 = 0 .
The GFFT of r ( x ) , denoted as R ( X ) , can be expressed in polynomial form as follows:
R ( X ) = r ( α 0 ) + r ( α 1 ) X + + r ( α n 1 ) X n 1 ,
where r ( α i ) G F ( q m ) for i { 0 , 1 , , n 1 } . The vector form of R ( X ) is expressed as follows:
R = R 0 , R 1 , , R n 1 = r ( α 0 ) , r ( α 1 ) , , r ( α n 1 ) .
By using M G in (11), the GFFT of r is simply obtained by R = r × M G . In the error-free case (i.e., e ( x ) = 0 ), R b = R b + 1 = = R b + d 2 = 0 . However, if e ( x ) 0 , we may have R i 0 for some i { b , b + 1 , , b + d 2 } .
The GFFT of e ( x ) , denoted as E ( X ) , can be expressed in polynomial form as follows:
E ( X ) = e ( α 0 ) + e ( α 1 ) X + + e ( α n 1 ) X n 1 ,
where e ( α i ) G F ( q m ) for i { 0 , 1 , , n 1 } . The vector form of E ( X ) is expressed as follows:
E = E 0 , E 1 , , E n 1 = e ( α 0 ) , e ( α 1 ) , , e ( α n 1 ) .
By using (5), (10) and (13), it is clear that R = C + E = ( c + e ) M G .

3. Theoretical Analysis of BCH Codes on the Aspects of Blind Reconstruction

3.1. GFFT of a Single Symbol Error

In this subsection, the GFFT values of a single symbol error is investigated. Let w t ( a ) denote the Hamming weight of a vector a , i.e., w t ( a ) is the number of non-zero elements in a . Note that a single symbol error e ( x ) satisfies w t ( e ) = 1 .
Lemma 1.
If a received codeword r ( x ) of B C H q ( n , k ) contains a single symbol error, then
r ( α i ) 0 , i S r .
Proof. 
Let e ( x ) = e j x j for some j { 0 , 1 , , n 1 } and e j G F * ( q ) . Since the GFFT value of e ( x ) with respect to α i is E i = e ( α i ) = e j α i j 0 for all i { 0 , 1 , , n 1 } and C i = 0 for i S r , R i = C i + E i 0 for i S r . □
Lemma 1 shows that if r ( x ) contains a single symbol error, any root of g ( x ) cannot be a root of r ( x ) . In the next subsection, the distribution of GFFT values of c ( x ) is analyzed.

3.2. GFFT of Codewords

Let S c ( α i ) denote the set of the GFFT values taken by all the codewords c ( x ) of B C H q ( n , k ) for x = α i as follows:
S c ( α i ) c ( α i ) c ( x ) B C H q ( n , k ) .
Suppose that the minimal polynomial M α ( x ) of a primitive n-th root of unity α G F ( q m ) over G F ( q ) has a degree m where m | m . Then, any α i G F ( q m ) can be expressed by a linear combination of α 0 , α 1 , , α m 1 as follows:
α i = h 0 + h 1 α + + h m 1 α m 1 ,
where h i G F ( q ) for i { 0 , 1 , , m 1 } . Moreover, based on (18), any α i G F ( q m ) can be expressed in vector form, denoted as v α i , as follows:
v α i = ( h 0 , h 1 , , h m 1 ) .
Note that v α i is a row vector. Let V α i G F ( q ) n × m be a matrix with v ( α i ) 0 , v ( α i ) 1 , ⋯, v ( α i ) n 1 as its rows, and r k ( α i ) denote the rank of V α i over G F ( q ) .
Lemma 2.
Suppose that a message m ( x ) is generated uniformly at random, a codeword c ( x ) of B C H q ( n , k ) is encoded by g ( x ) as in (3), and k r k ( α i ) . Then, it is satisfied that
S c ( α i ) = { 0 } , i S r ,
| S c ( α i ) | = q r k ( α i ) , i S r c ,
Pr c ( α i ) = x = 1 | S c ( α i ) | , x S c ( α i ) .
Proof. 
First of all, for any i S r , it is always true that c ( α i ) = 0 due to the definition of S r . Therefore, S c ( α i ) = { 0 } and Pr ( c ( α i ) = 0 ) = 1 / | S c ( α i ) | = 1 for any i S r .
Second, in order to prove (21), let Γ G F ( q ) q k × n denote a matrix having all the q k codewords of B C H q ( n , k ) as its rows. Then, the GFFT values of q k codewords can be expressed in vector form as follows:
Λ = Γ × V α i ,
where Λ G F ( q ) q k × m is a matrix with the vector forms of all GFFT values of q k codewords with respect to α i as its rows. Note that the rank of Γ is k because all the rows of Γ are the codewords of B C H q ( n , k ) , and the rank of V α i is r k ( α i ) by the definition. The matrix Γ can be decomposed as Γ = Δ × G where Δ has all the elements of G F ( q ) k as its rows and G is the generator matrix of B C H q ( n , k ) . Note that the rank of Λ , r a n k ( Λ ) , is equal to r a n k ( Γ × V α i ) = r a n k ( Δ × G × V α i ) . Since the size of Δ is q k × k and r a n k ( Δ ) = k , r a n k ( Δ × G × V α i ) = r a n k ( G × V α i ) . The j-th row of G × V α i is expressed as g j × V α i where g j is the j-th row of G , j { 1 , 2 , , k } . Since g j × V α i 0 for i S r c and j { 1 , 2 , , k } , g 1 , g 2 , , g k are linearly independent, and k r k ( α i ) , it is clear that r a n k ( G × V α i ) is equal to r k ( α i ) . Therefore, the rank of Λ is also equal to r k ( α i ) , which implies that there are q r k ( α i ) distinct rows in Λ and | S c ( α i ) | = q r k ( α i ) for any i S r c .
Lastly, in order to show (22), let x 0 , x 1 , , x n 1 1 G F ( q ) n be all distinct codewords such that x 0 ( α i ) = x 1 ( α i ) = = x n 1 1 ( α i ) = x for given i and x G F ( q m ) . Also, let y 0 , y 1 , , y n 2 1 G F ( q ) n be all distinct codewords such that y 0 ( α i ) = y 1 ( α i ) = = y n 2 1 ( α i ) = y for the same i and y G F ( q m ) . These relations can be expressed in matrix multiplication as follows:
x 0 x 1 x n 1 1 × M G ( i + 1 ) = x x x ,
y 0 y 1 y n 2 1 × M G ( i + 1 ) = y y y ,
where M G ( i + 1 ) is the ( i + 1 ) -st column of M G in (11). In order to show Pr ( c ( α i ) = x ) = 1 / | S c ( α i ) | , it is enough to show n 1 = n 2 . Without loss of generality, suppose that n 1 > n 2 . From (24), we can obtain
x 0 x 0 x 1 x 0 x n 1 1 x 0 × M G ( i + 1 ) = 0 0 0 .
Note that n 1 vectors x i x 0 are all distinct. By adding y 0 to each row of the first matrix in LHS of (26), we obtain
y 0 + x 0 x 0 y 0 + x 1 x 0 y 0 + x n 1 1 x 0 × M G ( i + 1 ) = y y y .
Note that n 1 vectors y 0 + x i x 0 are still all distinct and they are valid codewords. According to (27), the number of codewords which have y as the GFFT value with respect to α i is n 1 , which is a contradiction to the assumption n 1 > n 2 and hence n 1 = n 2 . Therefore, if GFFT is performed on all the codewords of B C H q ( n , k ) with respect to α i , all the elements of S c ( α i ) occur uniformly at random for the random message m ( x ) , which implies Pr ( c ( α i ) = x ) = 1 / | S c ( α i ) | for any i S r c . □
By Lemma 2, it is clear that c ( α i ) = 0 for i S r and c ( α i ) for i S r c takes a value from S c ( α i ) uniformly at random. In the next subsection, the distribution of GFFT values of r ( x ) is analyzed.

3.3. GFFT of Received Codewords

Consider a received codeword r ( x ) = c ( x ) + e ( x ) having a single symbol error, i.e., e ( x ) = e j x j with e j 0 . Let S e ( α i ) be the set of all GFFT values of a single symbol error e ( x ) with respect to α i as follows:
S e ( α i ) e ( α i ) e ( x ) = e j x j , e j G F * ( q ) , j { 0 , 1 , , n 1 } .
By using Lemma 2, the distribution of GFFT values of r ( x ) with a single symbol error is analyzed as follows.
Corollary 1.
Suppose that a message m ( x ) is generated uniformly at random, a codeword c ( x ) of B C H q ( n , k ) is encoded by g ( x ) as (3), e ( x ) is a single symbol error, and k r k ( α i ) . Then, it is satisfied that
S e ( α i ) S c ( α i ) , i S r c .
Proof. 
By Lemma 2, if k r k ( α i ) , it is clear that | S c ( α i ) | = q r k ( α i ) for i S r c , which means that S c ( α i ) contains all the linear combinations of ( α i ) 0 , ( α i ) 1 , ⋯, ( α i ) n 1 over G F ( q ) . Therefore, S c ( α i ) contains S e ( α i ) for any i S r c and (29) holds. □
Let S r ( α i ) be the set of all GFFT values of r ( x ) with a single symbol error e j x j with respect to α i as follows:
S r ( α i ) r ( α i ) r ( x ) = c ( x ) + e j x j , e j G F * ( q ) , c ( x ) B C H q ( n , k ) , j { 0 , 1 , , n 1 } .
Lemma 3.
Suppose that a message m ( x ) is generated uniformly at random, a codeword c ( x ) of B C H q ( n , k ) is encoded by g ( x ) as (3), e ( x ) is a single symbol error, and k r k ( α i ) . Then, it is satisfied that
S r ( α i ) = S c ( α i ) , i S r c ,
Pr r ( α i ) = x = 1 q r k ( α i ) , x S r ( α i ) , i S r c .
Proof. 
Based on (30), S r ( α i ) can be expressed as follows:
S r ( α i ) = c ( α i ) + e ( α i ) c ( α i ) S c ( α i ) , e ( α i ) S e ( α i ) .
As shown in Corollary 1, if e ( x ) is a single symbol error and k r k ( α i ) , S e ( α i ) S c ( α i ) for any i S r c . Therefore, S r ( α i ) is equal to S c ( α i ) for any i S r c .
The probability in (32) is derived as follows:
Pr r ( α i ) = x = Pr c ( α i ) + e ( α i ) = x = y S e ( α i ) Pr c ( α i ) = x y Pr e ( α i ) = y ( a ) = 1 | S c ( α i ) | y S e ( α i ) Pr e ( α i ) = y = 1 | S c ( α i ) | = 1 q r k ( α i )
for x S r ( α i ) and i S r c . The equality (a) holds by Lemma 2. □
Lemma 3 assumes w t ( e ) = 1 , however, in practice, multiple errors also occur. If w t ( e ) > 1 , Lemma 1 does not hold because r ( α i ) can be 0 for some i S r even though e ( x ) 0 . Note that Pr ( e ( α i ) = 0 , e ( x ) 0 , i S r ) is equal to the undetectable error probability of the BCH code which has { α i i S r } as its null spectrum.
Lemma 4.
Suppose that a message m ( x ) is generated uniformly at random, a codeword c ( x ) of B C H q ( n , k ) is encoded by g ( x ) as (3), e ( x ) is generated by q-ary symmetric channel with error probability ϵ, and k r k ( α i ) . Then, it is satisfied that
S r ( α i ) = S c ( α i ) , i S r c ,
Pr r ( α i ) = x = 1 q r k ( α i ) , x S r ( α i ) , i S r c .
Proof. 
For i S r c , S c ( α i ) contains all the linear combinations of ( α i ) 0 , ( α i ) 1 , ⋯, ( α i ) n 1 over G F ( q ) . Since the error e ( x ) is not a single symbol error anymore, S e ( α i ) is defined as follows:
S e ( α i ) = e ( α i ) e ( x ) = j = 0 n 1 e j x j , e j G F ( q ) .
S e ( α i ) also contains all the linear combinations of ( α i ) 0 , ( α i ) 1 , ⋯, ( α i ) n 1 over G F ( q ) and hence S r ( α i ) = S c ( α i ) for any i S r c because r ( α i ) = c ( α i ) + e ( α i ) .
The probability in (36) is derived as follows:
Pr r ( α i ) = x = Pr c ( α i ) + e ( α i ) = x = y S e ( α i ) Pr c ( α i ) = x y Pr e ( α i ) = y = 1 | S c ( α i ) | y S e ( α i ) Pr e ( α i ) = y = 1 | S c ( α i ) | = 1 q r k ( α i )
for x S r ( α i ) and i S r c . □
As you can see from Lemmas 3 and 4, the conclusions (31) and (32) and (35) and (36) are the same. It implies that if the encoded message m ( x ) is generated uniformly at random, the GFFT of r ( x ) with respect to α i takes a value in S r ( α i ) uniformly at random regardless of the distribution of e ( x ) for i S r c . By Lemma 4, the probability that r ( x ) has α i as its root for i S r c is 1 / q r k ( α i ) . Based on Lemma 4, the performance of blind reconstruction method of BCH codes [15] is analyzed in the next section.

4. Analysis of Blind Reconstruction Method of BCH Codes

4.1. Blind Reconstruction Method of BCH Codes

In this subsection, the blind reconstruction method of BCH codes based on consecutive roots of generator polynomials [15] is described. In order to perform this method, it is assumed that the codeword synchronization is perfectly done and the code length n is known to the receiver. Suppose that M codewords are received. The j-th received codeword is expressed in polynomial form as r j ( x ) = r j , 0 + r j , 1 x + + r j , n 1 x n 1 and in vector form as r j = ( r j , 0 , r j , 1 , , r j , n 1 ) for j { 1 , 2 , , M } . Let L j denote the set of pairs consisting of the length l of the consecutive roots and the starting value s of these consecutive roots of r j ( x ) defined as follows:
L j ( s , l ) s { 1 , 2 , , n 1 } , 2 l N , r j ( α i ) = 0 , i C s l ,
where C s l i = s s + l 1 C i . For example, if r j = ( 0 , 0 , 1 , 0 , 1 , 1 , 0 ) is received, then the GFFT of r j is R j = ( 1 , 0 , 0 , 1 , 0 , 1 , 1 ) , and therefore L j = { ( 5 , 2 ) } . Note that 0 < s < n and 2 l of the elements in L j . By using (39), for r j ( x ) , the maximum length of consecutive roots (MLCR) l j m a x and the corresponding starting value of consecutive roots (SVCR) s j m a x are obtained as follows:
( s j m a x , l j m a x ) = arg max ( s j , l j ) L j l j .
Let S m a x denote the set of ( s j m a x , l j m a x ) for j { 1 , 2 , , M } as follows:
S m a x ( s j m a x , l j m a x ) j { 1 , 2 , , M }
The blind reconstruction method of BCH codes in [15] has two-stage processes.
  • First stage: The most frequent s j m a x in S m a x is selected and called a reference SVCR (R-SVCR), denoted as s r e f .
  • Second stage: The most frequent l j m a x among the pairs having s j m a x = s r e f in S m a x is selected and called a reference MLCR (R-MLCR), denoted as l r e f .
By setting b = s r e f and d = l r e f + 1 in (1), the generator polynomial of the used BCH code is reconstructed.

4.2. Performance Analysis of Blind Reconstruction Method of BCH Codes

In this subsection, the performance of blind reconstruction method in [15] is analyzed. Suppose that B C H q ( n , k ) is used and M codewords are received. The generator polynomial g 0 ( x ) is set as in (1) with b = s 0 and d = l 0 + 1 . In order to succeed in blind reconstruction of this BCH code, s r e f and l r e f should be correctly determined as s r e f = s 0 and l r e f = l 0 . Define the sets of received codewords, M ( s , l ) , M m ( s , l ) , M * ( s , l ) , and M e ( s , l ) as follows:
M ( s , l ) = r j ( x ) ( s , l ) L j ,
M m ( s , l ) = r j ( x ) ( s j m a x , l j m a x ) = ( s , l ) ,
M * ( s , l ) = r j ( x ) r j ( x ) M m ( s , l ) , r j ( α i ) 0 , i { 1 , 2 , , n 1 } C s l ,
M e ( s , l ) = r j ( x ) e j ( x ) 0 , r j ( x ) M ( s , l ) .
Note that M * ( s , l ) M m ( s , l ) M ( s , l ) . In order to succeed in the first stage of the blind reconstruction method, the following relation should be satisfied,
l = 2 n 1 | M m ( s 0 , l ) | > l = 2 n 1 | M m ( s , l ) | , s s 0 .
The relation (46) can be simplified as in the following Lemma 5.
Lemma 5.
If the following inequality is satisfied, then the first stage of the blind reconstruction of BCH codes in [15] always succeeds,
| M * ( s 0 , l 0 ) | > | M ( s , 2 ) | , s s 0 ,
and the success probability of the first stage is lower-bounded as
Pr l = 2 n 1 | M m ( s 0 , l ) | > l = 2 n 1 | M m ( s , l ) | , s s 0 Pr | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | , s s 0 .
Proof. 
In order to succeed in the first stage of the blind reconstruction method in [15], the relation (46) should be satisfied. The LHS in (46) satisfies the following inequalities,
l = 2 n 1 | M m ( s 0 , l ) | ( a ) l = 2 n 1 | M * ( s 0 , l ) | ( b ) | M * ( s 0 , l 0 ) | .
The first inequality (a) is derived by using M * ( s 0 , l ) M m ( s 0 , l ) , and the second inequality (b) is trivial. The RHS in (46) satisfies the following inequality,
l = 2 n 1 | M m ( s , l ) | ( a ) = | l = 2 n 1 M m ( s , l ) | ( b ) | l = 2 n 1 M ( s , l ) | ( c ) = | M ( s , 2 ) | .
The first equality (a) in (50) is derived by using M m ( s , l ) M m ( s , l ) = for all l l . The second inequality (b) is derived by using M m ( s , l ) M ( s , l ) . The third equality (c) is derived by using M ( s , l ) M ( s , l ) for all l > l .
Therefore, if | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | for any s s 0 , the first stage of the blind reconstruction method of BCH codes in [15] always succeeds. Furthermore, by the Equations (49) and (50), the inequality (48) clearly holds. □
If the first stage succeeds, in order for the second stage to succeed, the following relation should be satisfied,
| M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | , l l 0 .
The relation (51) can be simplified as in the following Lemma 6.
Lemma 6.
If | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | , s s 0 , holds and the following inequality is satisfied, then the second stage of the blind reconstruction of BCH codes in [15] always succeeds,
| M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | ,
and the success probability of the second stage is lower-bounded as
Pr | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | , l l 0 Pr | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | ,
where, for better readability, the given condition that | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | , s s 0 , is omitted in the probability.
Proof. 
Since | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | for any s s 0 , | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | holds for l > l 0 as follows:
| M m ( s 0 , l ) | ( a ) | M ( s 0 + 1 , l 1 ) | ( b ) < | M * ( s 0 , l 0 ) | ( c ) | M m ( s 0 , l 0 ) | .
The inequality (a) in (54) is derived by using M m ( s 0 , l ) M ( s 0 + 1 , l 1 ) . The inequality (b) is derived by using | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | for s s 0 and | M ( s 0 + 1 , 2 ) | | M ( s 0 + 1 , l 1 ) | . The inequality (c) is derived by using M * ( s 0 , l 0 ) M m ( s 0 , l 0 ) . Therefore, it remains to prove that our assumption implies | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | for l < l 0 .
If the j-th received codeword r j ( x ) is error-free (i.e., e j ( x ) = 0 ), then r j ( x ) M m ( s 0 , l ) for all l < l 0 because r j ( x ) M ( s 0 , l 0 ) always holds. Therefore, e j ( x ) 0 for r j ( x ) M m ( s 0 , l ) , l < l 0 and then, the relation (51) can be simplified as | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) { r j ( x ) e j ( x ) 0 } | for l < l 0 . Since it is always satisfied that | M m ( s 0 , l ) { r j ( x ) e j ( x ) 0 } | | M ( s 0 , l ) { r j ( x ) e j ( x ) 0 } | = | M e ( s 0 , l ) | , if | M m ( s 0 , l 0 ) | > | M e ( s 0 , l ) | for l < l 0 , the second stage succeeds. Furthermore, since | M e ( s 0 , l ) | > | M e ( s 0 , l ) | for l < l , if | M m ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | is satisfied, then the second stage also succeeds. Note that the LHS in (51) satisfies that | M m ( s 0 , l 0 ) | | M * ( s 0 , l 0 ) | . Therefore, if | M * ( s 0 , l 0 ) | | M e ( s 0 , 2 ) | is satisfied, then the second stage always succeeds.
The lower-bound on the success probability of the second stage is derived as follows:
Pr | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | , l l 0 = Pr | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) | , l l 0 = Pr | M m ( s 0 , l 0 ) | > | M m ( s 0 , l ) { r j ( x ) e j ( x ) 0 } | , l l 0 Pr | M m ( s 0 , l 0 ) | > | M ( s 0 , l ) { r j ( x ) e j ( x ) 0 } | , l l 0 = Pr | M m ( s 0 , l 0 ) | > | M e ( s 0 , l ) | , l l 0 = Pr | M m ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | Pr | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | .
Note that, for better readability, the given condition that | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | , s s 0 , is omitted in the probability. □
By Lemmas 5 and 6, if | M * ( s 0 , l 0 ) | > max s s 0 | M ( s , 2 ) | and | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | , then the blind reconstruction method of BCH code in [15] always succeeds. Moreover, the success probability of the blind reconstruction method of BCH code in [15] is lower-bounded, as in the following Theorem 1.
Theorem 1.
Suppose that randomly generated M codewords of B C H q ( n , k ) , which uses the generator polynomial g ( x ) as in (1) with b = s 0 and d = l 0 + 1 , are received after passing through q-ary symmetric channel with error probability ϵ. Then, the success probability of the blind reconstruction method of BCH codes in [15], denoted as P s , is lower-bounded as follows:
P s x = 1 M B ( M , x , p 0 ) C i C s 0 l 0 c y = 0 x 1 B M , y , 1 q r k ( α i ) C j C s 0 l 0 y = 0 x 1 B M , y , P u e C j ,
where B ( M , x , p ) = M x p x ( 1 p ) M x , p 0 = { ( 1 ϵ ) n + P u e ( C s 0 l 0 ) } z C s 0 l 0 c 1 1 / q r k ( α z ) , C s 0 l 0 c = { 1 , 2 , , n 1 } C s 0 l 0 , and P u e ( C ) is the undetectable error probability of BCH code having { α i i C } as its null spectrum.
Proof. 
By Lemmas 5 and 6, if | M * ( s 0 , l 0 ) | > max s s 0 | M ( s , 2 ) | and | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | , then the blind reconstruction of BCH codes in [15] always succeeds. In order to calculate the probability that | M * ( s 0 , l 0 ) | > max s s 0 | M ( s , 2 ) | and | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | , the probabilities that r j ( x ) M * ( s 0 , l 0 ) , r j ( x ) M ( s , 2 ) , and r j ( x ) M e ( s 0 , 2 ) should be calculated, respectively.
If the j-th received codeword r j ( x ) is error-free or has an undetectable error, it is always true that r j ( x ) M ( s 0 , l 0 ) . Furthermore, if r j ( α i ) 0 for i C s 0 l 0 c , it is also true that r j ( x ) M * ( s 0 , l 0 ) , where C s 0 l 0 c = { 1 , 2 , , n 1 } C s 0 l 0 . Then, Pr r j ( x ) M * ( s 0 , l 0 ) is derived as follows:
Pr r j ( x ) M * ( s 0 , l 0 ) = Pr r j ( α i ) = 0 , i C s 0 l 0 , r j ( α z ) 0 , z C s 0 l 0 c ( a ) = Pr r j ( α i ) = 0 , i C s 0 l 0 z C s 0 l 0 c Pr r j ( α z ) 0 ( b ) = ( 1 ϵ ) n + P u e C s 0 l 0 z C s 0 l 0 c 1 1 q r k α z p 0 ,
where P u e ( C s 0 l 0 ) is the undetectable error probability of BCH code having { α i i C s 0 l 0 } as its null spectrum. In the equality (a) in (57), r j ( α i ) for i C s 0 l 0 c occurs uniformly at random because the message is generated uniformly at random. Therefore, the event that r j ( α i ) = 0 for any i C s 0 l 0 and the event that r j ( α z ) = 0 for any z C s 0 l 0 c are independent and hence the equality (a) holds. The equality (b) is derived by using Pr ( r j ( α i ) = 0 , i C s 0 l 0 ) = { ( 1 ϵ ) n + P u e ( C s 0 l 0 ) } and Lemma 4.
The probability that r j ( x ) M ( s , 2 ) for s s 0 is calculated by using Lemma 4 as follows:
Pr r j ( x ) M ( s , 2 ) = Pr r j ( α i ) = 0 , i C s 2 = Pr r j ( α i ) = 0 , i C s 2 C s 0 l 0 Pr r j ( α z ) = 0 , z C s 2 C s 0 l 0 = Pr r j ( α i ) = 0 , i C s 2 C s 0 l 0 z C s 2 C s 0 l 0 Pr r j ( α z ) = 0 = P u e C s 2 C s 0 l 0 z C s 2 C s 0 l 0 1 q r k ( α z ) .
For better readability, s s 0 is omitted in the probability.
Let M 1 ( C i ) be { r j ( x ) r j ( α z ) = 0 , z C i } and M 2 ( C i ) be { r j ( x ) r j ( α z ) = c j ( α z ) + e j ( α z ) = 0 , z C i , e j ( x ) 0 } . If | M * ( s 0 , l 0 ) | is greater than | M 1 ( C i ) | for any C i C s 0 l 0 c and also greater than | M 2 ( C i ) | for any C i C s 0 l 0 , it is also satisfied that | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | for any s s 0 . It is because if there exists C i C s 2 such that C i C s 0 l 0 c , it is true that | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | due to | M * ( s 0 , l 0 ) | > | M 1 ( C i ) | | M ( s , 2 ) | for any C i C s 0 l 0 c . Furthermore, if there exists C i C s 2 such that C i C s 0 l 0 , then it is also true that | M * ( s 0 , l 0 ) | > | M ( s , 2 ) | due to | M * ( s 0 , l 0 ) | > | M 2 ( C i ) | | M ( s , 2 ) | for any C i C s 0 l 0 . Then, the condition for the success of the first stage of blind reconstruction method is simplified as follows:
| M * ( s 0 , l 0 ) | > | M 1 ( C i ) | , | M * ( s 0 , l 0 ) | > | M 2 ( C j ) | , C i C s 0 l 0 c , C j C s 0 l 0 .
Moreover, Pr ( r j ( α z ) = 0 , z C i ) for C i C s 0 l 0 c is simplified as follows:
Pr r j ( α z ) = 0 , z C i C s 0 l 0 c = Pr r j ( x ) M ( i , 1 ) , C i C s 0 l 0 c ( a ) = P u e C i C s 0 l 0 C j C i C s 0 l 0 1 q r k ( α j ) ( b ) = 1 q r k ( α i ) .
The equality (a) is derived by using (58) and (b) is derived by using C i C s 0 l 0 = and C i C s 0 l 0 = C i . Furthermore, Pr ( r j ( α z ) = 0 , z C i , e j ( x ) 0 ) for C i C s 0 l 0 , is also simplified as follows:
Pr r j ( α z ) = 0 , z C i C s 0 l 0 , e j ( x ) 0 = Pr r j ( x ) M ( i , 1 ) , C i C s 0 l 0 = P u e C i C s 0 l 0 C j C i C s 0 l 0 1 q r k ( α j ) ( a ) = P u e C i .
The equality (a) is derived by using C i C s 0 l 0 = C i and C i C s 0 l 0 =
The probability that r j ( x ) M e ( s 0 , 2 ) is the same as the undetectable error probability of a BCH code having { α i i C s 0 2 } as its null spectrum as follows:
Pr ( r j ( x ) M e ( s 0 , 2 ) ) = P u e C s 0 2 .
If | M * ( s 0 , l 0 ) | > | M 2 ( C i ) | for C i C s 0 2 , then the second stage of the blind reconstruction method succeeds. Therefore, Pr ( | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | ) Pr ( | M * ( s 0 , l 0 ) | > | M 2 ( C i ) | ) for C i C s 0 2 .
Finally, by using (57)–(62), P s is lower-bounded as
P s Pr | M * ( s 0 , l 0 ) | > max s s 0 | M ( s , 2 ) | , | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | = x = 1 M Pr | M * ( s 0 , l 0 ) | = x Pr max s s 0 | M ( s , 2 ) | < x , | M e ( s 0 , 2 ) | < x | M * ( s 0 , l 0 ) | = x ( a ) x = 1 M Pr | M * ( s 0 , l 0 ) | = x C i C s 0 l 0 c Pr | M 1 ( C i ) | < x C j C s 0 l 0 Pr | M 2 ( C j ) | < x = x = 1 M B ( M , x , p 0 ) C i C s 0 l 0 c y = 0 x 1 B M , y , 1 q r k ( α i ) C j C s 0 l 0 y = 0 x 1 B M , y , P u e C j .
The inequality (a) in (63) is derived by using Pr ( | M * ( s 0 , l 0 ) | > | M e ( s 0 , 2 ) | ) Pr ( | M * ( s 0 , l 0 ) | > | M 2 ( C i ) | ) for C i C s 0 2 . Note that the event of | M z ( C i ) | < x is independent with the event of | M z ( C j ) | < x for i j and z { 1 , 2 } because C i C j = for i j . Furthermore, the event of | M 1 ( C i ) | < x and the event of | M 2 ( C j ) | < x for i j are also independent because C i C j = for i j . □
In Theorem 1, a lower-bound on the success probability of the blind reconstruction method of BCH codes in [15] is obtained. In order to confirm the validity of this lower-bound, simulations are performed by using the following BCH codes.
  • B C H 2 ( 31 , 21 ) , B C H 2 ( 63 , 51 ) , B C H 2 ( 127 , 113 ) : These are binary BCH codes having { α i i C 1 4 } as their null spectrum.
  • B C H 32 ( 31 , 29 ) , B C H 64 ( 63 , 59 ) : These are Reed–Solomon (RS) codes having { α i i C 1 4 } as their null spectrum.
As you can see from Figure 1, the success probability of the blind reconstruction of binary BCH codes is well bounded by the lower-bound in (56). However, for B C H 2 ( 63 , 51 ) , the gap between the simulation result and the lower-bound is larger than the others because B C H 2 ( 63 , 51 ) has a cyclotomic coset of cardinality 2, while all the cyclotomic cosets of B C H 2 ( 31 , 21 ) and B C H 2 ( 127 , 113 ) have the cardinality 5 and 7, respectively. In (56), if a cyclotomic coset C i C s 0 l 0 c has small cardinality, 1 / q r k ( α i ) becomes bigger and then, B ( M , y , 1 / q r k ( α i ) ) becomes smaller. Therefore, the lower-bounds of the blind reconstruction performance of B C H 2 ( 31 , 21 ) and B C H 2 ( 127 , 113 ) is much tighter than B C H 2 ( 63 , 51 ) .
As you can see from Figure 2, the success probability of the blind reconstruction of RS codes is also well bounded by the lower-bound in (56). Moreover, as the code length increase, the proposed lower-bound of RS codes becomes tighter and therefore this lower-bound can be a good estimation of blind reconstruction performance for practical RS codes. Furthermore, since the proposed lower-bound can estimate the blind reconstruction performance without the extensive simulation, the proposed lower-bound is suitable for practical use.

5. Conclusions

The blind reconstruction method of BCH codes in [15] shows the best performance, but the theoretical analysis of this method has not been performed. In this paper, by analyzing the properties of BCH codes on the aspects of blind reconstruction, a lower-bound on the success probability of the blind reconstruction method in [15] is derived. Especially, the distribution of GFFT values of the received codewords are analyzed and the blind reconstruction method is formalized based on the conjugacy classes. Furthermore, the analysis results can be applied not only to the binary BCH codes, but also to the non-binary BCH codes, including RS codes. By comparing the derived lower-bound with the simulation results, it is confirmed that the success probability of the blind reconstruction is well bounded by the proposed lower-bound.

Author Contributions

S.K. and D.-J.S. developed the main idea, conducted simulations and wrote the manuscript. S.K. played a leading role in the analysis and simulation and D.-J.S. played a leading role in fixing research direction and procedures. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the research fund of Signal Intelligence Research Center supervised by Defense Acquisition Program Administration and Agency for Defense Development of Korea.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. Wicker, S. Error control coding for digital communication systems In Error Control Systems for Digital Communication and Storage; Prentice-Hall: Englewood Cliffs, NJ, USA, 1995; pp. 1–16. [Google Scholar]
  2. Valembois, A. Detection and recognition of a binary linear code. Discret. Appl. Math. 2001, 111, 199–218. [Google Scholar] [CrossRef]
  3. Cluzeau, M. Block code reconstruction using iterative decoding techniques. In Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), Seattle, DC, USA, 9–14 July 2006; pp. 2269–2273. [Google Scholar]
  4. Burel, G.; Gautier, R. Blind estimation of encoder and interleaver characteristics in a non cooperative context. In Proceedings of the IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, USA, 17–19 November 2003. [Google Scholar]
  5. Moosavi, R.; Larsson, E. Fast blind recognition of channel codes. IEEE Trans. Commun. 2014, 62, 1393–1405. [Google Scholar] [CrossRef] [Green Version]
  6. Chabot, C. Recognition of a code in a noisy environment. In Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT 2007), Nice, France, 24–29 June 2007; pp. 2211–2215. [Google Scholar]
  7. Yardi, A.; Kumar, A.; Vijayakumaran, S. Channel-code detection by a third-party receiver via the likelihood ratio test. In Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA, 24 June–4 July 2014; pp. 1051–1055. [Google Scholar]
  8. Yardi, A.; Vijayakumaran, S.; Kumar, A. Blind reconstruction of binary cyclic codes. In Proceedings of the 20th European Wireless Conference, Barcelona, Spain, 14–16 May 2014; pp. 849–854. [Google Scholar]
  9. Yardi, A.; Vijayakumaran, S.; Kumar, A. Blind reconstruction of binary cyclic codes from unsynchronized bitstream. IEEE Trans. Commun. 2016, 64, 2693–2706. [Google Scholar] [CrossRef]
  10. Wu, G.; Zhang, B.; Wen, X.; Guo, D. Blind recognition of BCH code based on Galois field Fourier transform. In Proceedings of the 2015 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 15–17 October 2015; pp. 1–4. [Google Scholar]
  11. Wang, J.; Yue, Y.; Yao, J. Statistical recognition method of binary BCH code. Commun. Netw. 2011, 3, 17–22. [Google Scholar] [CrossRef] [Green Version]
  12. Jing, Z.; Zhiping, H. Blind recognition of binary BCH codes for cognitive radios. Math. Probl. Eng. 2016, 2016, 1–6. [Google Scholar]
  13. Lee, H.; Park, C.; Lee, J.; Song, Y. Reconstruction of BCH codes using probability compensation. In Proceedings of the 18th Asia-Pacific Conference on Communications (APCC), Jeju, Korea, 15–17 October 2012; pp. 591–594. [Google Scholar]
  14. Li, C.; Zhang, T.; Lin, Y. Blind recognition of RS codes based on Galois field columns Gaussian elimination. In Proceedings of the 7th International Congress on Image and Signal Processing, Dalian, China, 14–16 October 2014; pp. 836–841. [Google Scholar]
  15. Jo, D.; Kwon, S.; Shin, D. Blind reconstruction of BCH codes based on consecutive roots of generator polynomials. IEEE Commun. Lett. 2018, 22, 894–897. [Google Scholar] [CrossRef]
  16. Filiol, E. Reconstruction of convolutional encoders over GF(q). In IMA International Conference on Cryptography and Coding; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1355, pp. 101–109. [Google Scholar] [CrossRef]
  17. Lu, P.; Li, S.; Luo, X.; Zou, Y. Blind recognition of punctured convolutional codes. In Proceedings of the 2004 International Symposium on Information Theory (ISIT 2004), Chicago, IL, USA, 27 June–2 July 2004; p. 457. [Google Scholar]
  18. Barbier, J. Reconstruction of turbo-code encoder. In Digital Wireless Communications VII and Space Communication Technologies; International Society for Optics and Photonics: Bellingham, WA, USA, 2005; pp. 463–473. [Google Scholar]
  19. Marazin, M.; Gautier, R.; Burel, G. Blind recovery of k/n rate convolutional encoders in a noisy environment. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 1–9. [Google Scholar] [CrossRef]
  20. Yardi, A. Blind reconstruction of binary cyclic codes over binary erasure channel. In Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA), Singapore, 28–31 October 2018; pp. 301–305. [Google Scholar]
Figure 1. Comparison of the correct reconstruction probability with the proposed lower-bound for binary Bose–Chaudhuri–Hocquenghem (BCH) codes.
Figure 1. Comparison of the correct reconstruction probability with the proposed lower-bound for binary Bose–Chaudhuri–Hocquenghem (BCH) codes.
Entropy 22 01256 g001
Figure 2. Comparison of the correct reconstruction probability with the proposed lower-bound for Reed–Solomon (RS) codes.
Figure 2. Comparison of the correct reconstruction probability with the proposed lower-bound for Reed–Solomon (RS) codes.
Entropy 22 01256 g002
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kwon, S.; Shin, D.-J. Analysis of Blind Reconstruction of BCH Codes. Entropy 2020, 22, 1256. https://doi.org/10.3390/e22111256

AMA Style

Kwon S, Shin D-J. Analysis of Blind Reconstruction of BCH Codes. Entropy. 2020; 22(11):1256. https://doi.org/10.3390/e22111256

Chicago/Turabian Style

Kwon, Soonhee, and Dong-Joon Shin. 2020. "Analysis of Blind Reconstruction of BCH Codes" Entropy 22, no. 11: 1256. https://doi.org/10.3390/e22111256

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop