Next Article in Journal
Complex Linear Diophantine Fuzzy Sets over AG-Groupoids with Applications in Civil Engineering
Previous Article in Journal
Symmetry in Many-Body Physics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reversible Cyclic Codes over F2+uF2+u2F2

1
Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Mathematics, Aligarh Muslim University, Aligarh 202002, India
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Symmetry 2023, 15(1), 73; https://doi.org/10.3390/sym15010073
Submission received: 26 October 2022 / Revised: 19 December 2022 / Accepted: 24 December 2022 / Published: 27 December 2022
(This article belongs to the Section Mathematics)

Abstract

:
In this article, we investigate the formation of reversible cyclic codes (i.e., its codewords forms a symmetry) over the ring S = F 2 + u F 2 + u 2 F 2 , where u 3 = 0 . We find a unique set of generators for cyclic codes over S and classify reversible cyclic codes to their generators. The dual reversible cyclic codes are studied as well. Moreover, we provide some examples of reversible cyclic codes.

1. Introduction

In the early 1970s, linear codes over finite rings gained much attention in the field of algebraic coding theory after the introduction of Gray maps. In 1994, Hammons et al. [1] calculated non-linear binary codes over Z 4 under the Gray map. The research of linear codes over finite rings has since gained more interest than the binary field, and numerous families of codes have been examined in [2,3,4,5], such as over Z 4 , F 2 + v F 2 , v 2 = v ; F 2 + u F 2 + v F 2 + u v F 2 , u 2 = v 2 = 0 ; Z p r + u Z p r + + u k 1 Z p r , u k = 0 where p is a prime. Observe that cyclic codes are linear block codes in which each codeword’s cyclic shift is again a codeword. Because of their rich algebraic structure, these error-correcting codes are a significant family of linear codes. Numerous findings and new codes were discovered when cyclic codes were investigated across different finite rings in [4,6,7].
A reversible code is a linear code in which its components form a symmetry, i.e., it remains unchanged when the digits of codewords are reversed. By virtue of this symmetry, it is one of the many well-known kinds of cyclic codes. These codes are employed in data storage, retrieval systems, and DNA computing. It is important to note that reversible cyclic codes of length n over a finite field F 2 are closely related to Linear complementary dual codes shortened as LCD codes and can be used for application in cryptography as well when gcd ( n , 2 ) = 1 (see [8,9]). In 1964, James L. Massey [6] first defined the characteristic properties of reversible cyclic codes. After that, the results of the formation of reversible cyclic codes over Z 4 were presented by Siap and Abualrub in [3] in 2007. In 2015, Srinivasulu and Bhaintwal [10] investigated reversible cyclic codes over F 4 + u F 4 , u 2 = 0 and their implications for DNA codes. In 2021, Prakash et al. [11] examined the reversible cyclic codes and their applications over the ring F q + u F q with u 2 = 0 . Motivated by this work, we examine reversible cyclic codes of any length n over F 2 + u F 2 + u 2 F 2 , u 3 = 0 .
The paper is structured as follows: we give some preliminaries in Section 2, while in Section 3, we provide the structure of cyclic codes of arbitrary length n over the ring S . Section 4 has some crucial results on reversible cyclic codes over F 2 + u F 2 + u 2 F 2 . Section 5 discusses the dual of reversible cyclic code. The distance of the code is discussed in Section 6. Finally, Section 7 gives some examples to support our results.

2. Preliminary Results

A code A of length n over S is a non-empty subset of S n , and its element is called a codeword. A code A is linear over S if it is an S -submodule of S n . A linear code A over S is called a cyclic code if for any e = ( e 0 , e 1 , , e n 1 ) A , ( e n 1 , e 0 , e 1 , , e n 2 ) A . Additionally, a cyclic code over S can be viewed as an ideal in S n = S [ ϑ ] / ( ϑ n 1 ) identifying ( e 0 , e 1 , e 2 , , e n 2 , e n 1 ) by e 0 + e 1 ϑ + e 2 ϑ 2 + + e n 2 ϑ n 2 + e n 1 ϑ n 1 .
The number of the nonzero component in e is referred to as the Hamming weight. The Hamming distance between any two codewords e , c is defined such that e c is the number of components in which these codewords differ. We define the Hamming distance of the code A as d H ( A ) = m i n { d H ( e , c ) | e c ; e , c A } .
Every polynomial f ( ϑ ) = f 0 + f 1 ϑ + + f n 1 ϑ n 1 S [ ϑ ] / ( ϑ n 1 ) with f n 1 0 , the reciprocal of f ( ϑ ) is defined to be the poynomial f * ( ϑ ) = ϑ n 1 f ( 1 / ϑ ) = f n 1 + f n 2 ϑ + + f 0 ϑ n 1 . Notice that deg f * ( ϑ ) deg f ( ϑ ) , and if f 0 0 , then deg f * ( ϑ ) = deg f ( ϑ ) . We say that f ( ϑ ) is self reciprocal if and only if f * ( ϑ ) = f ( ϑ ) . Additionally, for any two polynomials f ( ϑ ) , g ( ϑ ) satisfying f ( ϑ ) g ( ϑ ) implies f * ( ϑ ) g * ( ϑ ) .

3. Construction of Cyclic Codes over S

Throughout this paper, we assume that S = F 2 + u F 2 + u 2 F 2 where u 3 = 0 . The structure of the generators of the cyclic codes over S depends on the ring T = F 2 + u F 2 = { 0 , 1 , u , 1 + u } where u 2 = 0 .
Now, let A 1 be a cyclic code in S . Define ψ 1 : S T by ψ 1 ( a ) = a , ψ 1 is a ring homomorphism that can be extended to a homomorphism η 1 : A 1 T defined by
η 1 ( e 0 + e 1 ϑ + e 2 ϑ 2 + + e n 2 ϑ n 2 + e n 1 ϑ n 1 ) = ψ 1 ( e 0 ) + ψ 1 ( e 1 ) ϑ + + ψ 1 ( e n 1 ) ϑ n 1 .
where
ker η 1 = { u 2 r ( ϑ ) : r ( ϑ ) F 2 [ ϑ ] } .
Let J = { r ( ϑ ) : u 2 r ( ϑ ) ker η 1 } . Notice that J is a cyclic code in F 2 [ ϑ ] / ϑ n 1 since it is an ideal in F 2 [ ϑ ] / ϑ n 1 . So, J = α 2 ( ϑ ) and ker η 1 = u 2 α 2 ( ϑ ) with α 2 ( ϑ ) ( ϑ n 1 ) , i.e., α 2 ( ϑ ) divides ( ϑ n 1 ) .
Further, let A 2 be a cyclic code in T n . Define ψ 2 : T F 2 by ψ 2 ( a ) = a 2 , ψ 2 is a ring homomorphism. Extend ψ 2 to a homomorphism η 2 : A 2 F 2 [ ϑ ] / ϑ n 1 defined by
η 2 ( e 0 + e 1 ϑ + e 2 ϑ 2 + + e n 2 ϑ n 2 + e n 1 ϑ n 1 ) = ψ 2 ( e 0 ) + ψ 2 ( e 1 ) ϑ + + ψ 2 ( e n 1 ) ϑ n 1
where
ker η 2 = { u r ( ϑ ) : r ( ϑ ) F 2 [ ϑ ] } = u α 1 ( ϑ )
with α 1 ( ϑ ) ( ϑ n 1 ) , i.e., α 1 ( ϑ ) divides ( ϑ n 1 ) . The image of η 2 is also an ideal and hence a binary cyclic code generated by g ( ϑ ) with g ( ϑ ) ( ϑ n 1 ) . So, A = g ( ϑ ) + u p ( ϑ ) , u α 1 ( ϑ ) for some binary polynomial p ( ϑ ) .
Note that α 1 p ϑ n 1 g because η 2 ϑ n 1 g g + u p = η 2 u p ϑ n 1 g = 0 implies u p ϑ n 1 g ker η 2 = u α 1 ( ϑ ) . Since u g ker η 2 α 1 ( ϑ ) g ( ϑ ) .
In the rest of the article, we use g ( ϑ ) , p ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) as mentioned above.
Abualrub and Siap [3], in their paper, classify all of the cyclic codes in S n as follows.
Theorem 1 
([3], Theorem 2). Let A be a cyclic code in S n = S [ ϑ ] / ϑ n 1 , S = F 2 + u F 2 + u 2 F 2 = { 0 , 1 , u , 1 + u , u 2 , 1 + u 2 , 1 + u + u 2 , u + u 2 } where u 3 = 0 .
(1)
If n is odd, then S n is a principal ideal ring and A = g , u α 1 , u 2 α 2 = g + u α 1 + u 2 α 2 where g ( ϑ ) , α 1 ( ϑ ) , α 2 ( ϑ ) are binary polynomials with α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) , i.e., α 2 ( ϑ ) α 1 ( ϑ ) , α 1 ( ϑ ) g ( ϑ ) and g ( ϑ ) ( ϑ n 1 ) .
(2)
If n is not odd, then
(a) 
A = g + u p 1 + u 2 p 2 where α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) , ( g + u p ) ( ϑ n 1 ) in T and ( g + u p 1 + u 2 p 2 ) ( ϑ n 1 ) in S and deg p 2 < deg p 1 . Or,
(b) 
A = g + u p 1 + u 2 p 2 , u 2 α 2 where α 2 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) , ( g + u p ) ( ϑ n 1 ) in T, g ( ϑ ) p 1 ( ϑ ) ϑ n 1 g ( ϑ ) , α 2 divides p 1 ( ϑ ) ϑ n 1 g ( ϑ ) and p 2 ( ϑ ) ϑ n 1 g ( ϑ ) ϑ n 1 α 1 ( ϑ ) and deg p 2 < deg α 2 . Or,
(c) 
A = g + u p 1 + u 2 p 2 , u α 1 + u 2 q 1 , u 2 α 2 with α 2 α 1 g ( ϑ n 1 ) , α 1 ( ϑ ) p 1 ( ϑ ) ϑ n 1 g ( ϑ ) and α 2 ( ϑ ) q 1 ( ϑ ) ϑ n 1 α 1 ( ϑ ) and p 2 ( ϑ ) ϑ n 1 g ( ϑ ) ϑ n 1 α 1 ( ϑ ) . Moreover, deg p 2 < deg α 2 , deg q 1 < deg α 2 and deg p 1 < deg α 1 .

4. Reversible Cyclic Code over S

In this part, we focus on reversible codes for arbitrary lengths and identify the necessary and sufficient criteria for the reversibility of cyclic codes A over S . Some cases for even length have been discussed in [12]. For any codeword e = ( e 0 , e 1 , , e n 2 , e n 1 ) A , the reverse of the codeword (symmetry of the codeword) is represented by e r , where e r = ( e n 1 , e n 2 , , e 0 ) .
Definition 1. 
A linear code A of length n over a ring S is said to be reversible if the symmetry of each codeword is in A , i.e., e r A , for all e A .
In [6], Massey-characterized cyclic codes tend to be reversible over the finite field, as follows:
Theorem 2 
([6] Theorem 1). The cyclic code over F q generated by the monic polynomial g ( ϑ ) is reversible if and only if g ( ϑ ) is self-reciprocal.
We mention some of the results of Mostafanasab, and of Yousefian Darani [12], which are necessary to prove our results.
Lemma 1 
([12] Propsition 2.5). Let A be a cyclic code of length n over a commutative ring S and f ( ϑ ) S [ ϑ ] / ( ϑ n 1 ) . Then, f ( ϑ ) r A if and only if f * ( ϑ ) A .
Lemma 2 
([12] Corollary 2.6). Let A be a linear code. Then, A is reversible if and only if f * ( ϑ ) A for all f ( ϑ ) A .
Lemma 3 
([12] Lemma 2.7). Let f i ( ϑ ) , g i ( ϑ ) F 2 [ ϑ ] for i = 1 , 2 , 3 . If
f 1 ( ϑ ) + u f 2 ( ϑ ) + u 2 f 3 ( ϑ ) = g 1 ( ϑ ) + u g 2 ( ϑ ) + u 2 g 3 ( ϑ ) ,
then f i ( ϑ ) = g i ( ϑ ) for i = 1 , 2 , 3 .
Lemma 4 
([12] Lemma 2.11). Let f i ( ϑ ) F 2 [ ϑ ] for i = 1 , 2 , 3 . Suppose that deg ( f 1 ( ϑ ) ) = r , deg ( f 2 ( ϑ ) ) = s and deg ( f 3 ( ϑ ) ) = t where r > m a x { s , t } . Then,
( f 1 ( ϑ ) + u f 2 ( ϑ ) + u 2 f 3 ( ϑ ) ) * = f 1 * ( ϑ ) + u ϑ r s f 2 * ( ϑ ) + u 2 ϑ r t f 3 * ( ϑ ) .
Lemma 5. 
A reversible cyclic code A of length n over the ring S under the homomorphism η : A F 2 [ ϑ ] / ϑ n 1 (as defined in the Section 3) is also reversible.
Proof. 
Let η ( c ) η ( A ) , where e = ( e 0 , e 1 , , e n 1 ) A . Hence, η ( e ) = ( e 0 2 , e 1 2 , , e n 1 2 ) η ( A ) . Now as A is a reversible cyclic code, we have e r = ( e n 1 , e n 2 , , e 0 ) A . Now, consider
η ( e ) r = ( e 0 2 , e 1 2 , , e n 1 2 ) r = ( e n 1 2 , e n 2 2 , , e 0 2 ) = η ( e n 1 , e n 2 , , e 0 ) η ( A ) .
so η ( A ) is reversible. □
Lemma 6. 
For any reversible cyclic code A over S , the generated polymials g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are also reversible cyclic codes over F 2 .
Proof. 
We know that from Section 3, η ( A ) = g ( ϑ ) and using Lemma 5, η ( A ) is reversible code over F 2 . Hence, g ( ϑ ) is reversible cyclic code over F 2 .
As ker η 1 = { u 2 r ( ϑ ) r ( ϑ ) A } and J 1 = { r ( ϑ ) u 2 r ( ϑ ) ker η 1 } = α 2 ( ϑ ) , it is sufficient to show that J 1 is reversible.
Let r ( ϑ ) = r 0 + r 1 ϑ + + r n 1 ϑ n 1 J 1 . Then, r ( ϑ ) F 2 [ ϑ ] is a polynomial in A , which gives r * ( ϑ ) A ( by the reversibility of cyclic code A ) . Moreover, u 2 r * ( ϑ ) ker η 1 i.e., r * ( ϑ ) J 1 . Hence, α 2 ( ϑ ) is a reversible cyclic code.
In a similar way, ker η 2 = { u 2 t ( ϑ ) t ( ϑ ) is a polynomial in A with coefficient in F 2 } and J 2 = { t ( ϑ ) u 2 t ( ϑ ) ker η 2 } = α 1 ( ϑ ) ; it is sufficient to show that J 2 is reversible.
Let t ( ϑ ) = t 0 + t 1 ϑ + + t n 1 ϑ n 1 J 2 be arbitrary. Then, t ( ϑ ) F 2 [ ϑ ] is a polynomial in A . Since A is reversible cyclic code in S , t * ( ϑ ) is also in A . Thus, u 2 t * ( ϑ ) ker η 2 , i.e., t * ( ϑ ) J 2 . As a consequence, we obtain the desired outcome. □
Theorem 3. 
Let A = g ( ϑ ) , u α 1 ( ϑ ) , u 2 α 2 ( ϑ ) = g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) be a linear cyclic code of odd length n over S , where g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are binary polynomials with α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) . Then, A is reversible if and only if g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are self reciprocal.
Proof. 
Assume that A is a reversible cyclic code over S . By using Lemma 6, we have that g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are self reciprocal.
For the remaining part, we assume that g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are binary self-reciprocal polynomials. Let e ( ϑ ) A , i.e., e ( ϑ ) = g ( ϑ ) n 1 ( ϑ ) + u α 1 ( ϑ ) n 2 ( ϑ ) + u 2 α 2 ( ϑ ) n 3 ( ϑ ) for some polynomials n 1 ( ϑ ) , n 2 ( ϑ ) , and n 3 ( ϑ ) over S . A is reversible if and only if c * ( ϑ ) A .
For this consider
e * ( ϑ ) = ( g ( ϑ ) n 1 ( ϑ ) + u α 1 ( ϑ ) n 2 ( ϑ ) + u 2 α 2 ( ϑ ) n 3 ( ϑ ) ) * = ( g * ( ϑ ) n 1 * ( ϑ ) + u ϑ i α 1 * ( ϑ ) n 2 * ( ϑ ) + u 2 ϑ j α 2 * ( ϑ ) n 3 * ( ϑ ) ) = ( g ( ϑ ) n 1 * ( ϑ ) + u α 1 ( ϑ ) ϑ i n 2 * ( ϑ ) + u 2 α 2 ( ϑ ) ϑ j n 3 * ( ϑ ) )
where n 1 * ( ϑ ) , n 2 * ( ϑ ) , and n 3 * ( ϑ ) are polynomials over S . Therefore,
e * ( ϑ ) g ( ϑ ) , u α 1 ( ϑ ) , u 2 α 2 ( ϑ ) .
Thus, A is a reversible cyclic code over S . □
Theorem 4. 
For A = g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) , u α 1 ( ϑ ) + u 2 q ( ϑ ) , u 2 α 2 ( ϑ ) , where A is a cyclic code of length n over S such that n is even with α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) with deg ( p 1 ( ϑ ) ) < deg α 1 ( ϑ ) , deg ( p 2 ( ϑ ) ) < deg ( α 2 ( ϑ ) ) , and deg q ( ϑ ) < deg α 2 ( ϑ ) . Then, A is reversible if and only if
(1)
g ( ϑ ) and α 2 ( ϑ ) are self reciprocal.
(2)
 
(a)
ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and α 2 ( ϑ ) ϑ j p 2 * ( ϑ ) + p 2 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) . or
(b)
ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and
α 2 ( ϑ ) ϑ j p 2 * ( ϑ ) + p 2 ( ϑ ) + p 1 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) .
Proof. 
We know that A is an S [ ϑ ] -module. First, we consider A reversible. Then, using Lemma 4 gives
( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) * = g * ( ϑ ) + u ϑ i p 1 * ( ϑ ) + u 2 ϑ j p 2 * ( ϑ ) = s ( ϑ ) ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + t ( ϑ ) ( ( u α 1 ( ϑ ) + u 2 q ( ϑ ) ) + w ( ϑ ) ( u 2 α 2 ( ϑ ) ) A .
For s ( ϑ ) , t ( ϑ ) , w ( ϑ ) S [ ϑ ] . Let s ( ϑ ) = s 0 ( ϑ ) + u s 1 ( ϑ ) + u 2 s 2 ( ϑ ) and t ( ϑ ) = t 0 + u t 1 ( ϑ ) + u 2 t 2 ( ϑ ) where s i ( ϑ ) , t i ( ϑ ) F 2 [ ϑ ] . Then,
( g * ( ϑ ) + u ϑ i p 1 * ( ϑ ) + u 2 ϑ j p 2 * ( ϑ ) = ( s 0 ( ϑ ) + u s 1 ( ϑ ) + u 2 s 2 ( ϑ ) ) ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + ( t 0 ( ϑ ) + u t 1 ( ϑ ) + u 2 t 2 ( ϑ ) ) ( u α 1 ( ϑ ) + u 2 q ( ϑ ) ) + w ( ϑ ) ( u 2 α 2 ( ϑ ) ) = s 0 ( ϑ ) g ( ϑ ) + s 0 ( ϑ ) u p 1 ( ϑ ) + s 0 ( ϑ ) u 2 p 2 ( ϑ ) + u s 1 ( ϑ ) g ( ϑ ) + u 2 s 1 ( ϑ ) p 1 ( ϑ ) + u 2 s 2 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) u α 1 ( ϑ ) + t 0 ( ϑ ) u 2 q ( ϑ ) + u 2 t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) u 2 α 2 ( ϑ ) = s 0 ( ϑ ) g ( ϑ ) + u ( s 0 ( ϑ ) p 1 ( ϑ ) + s 1 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) ) + u 2 ( s 0 ( ϑ ) p 2 ( ϑ ) + s 1 ( ϑ ) p 1 ( ϑ ) + s 2 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) a 2 ( ϑ ) ) .
The application of Lemma 3 implies that g * ( ϑ ) = s 0 ( ϑ ) g ( ϑ ) , ϑ i p 1 * ( ϑ ) = s 0 ( ϑ ) p 1 ( ϑ ) + s 1 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = s 0 ( ϑ ) p 2 ( ϑ ) + s 1 ( ϑ ) p 1 ( ϑ ) + s 2 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) . Now since g * ( ϑ ) = s 0 ( ϑ ) g ( ϑ ) and d ( g * ( ϑ ) ) d ( g ( ϑ ) ) , where d ( g ( ϑ ) ) denotes degree of g ( ϑ ) , which implies s 0 ( ϑ ) = 1 ; hence, g ( ϑ ) is self-reciprocal. Now, ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + s 1 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) ; equating the degrees on both sides gives that s 1 ( ϑ ) is either 0 or 1. In a similar manner, ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) + s 1 ( ϑ ) p 1 ( ϑ ) + s 2 ( ϑ ) g ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) . Similarly, equating the degrees on both sides gives that s 2 ( ϑ ) is either 0 or 1; hence, the following four cases arise:
Case 1. 
If s 1 ( ϑ ) = s 2 ( ϑ ) = 0 , then ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) .
Case 2. 
If s 1 ( ϑ ) = 0 and s 2 ( ϑ ) = 1 , then ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) .
Case 3. 
If s 1 ( ϑ ) = 1 and s 2 ( ϑ ) = 0 , then ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) + p 1 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) .
Case 4. 
If s 1 ( ϑ ) = 1 and s 2 ( ϑ ) = 1 , then ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) + p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + t 1 ( ϑ ) α 1 ( ϑ ) + w ( ϑ ) α 2 ( ϑ ) .
By assumption, we have α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) . so ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and α 2 ( ϑ ) ϑ j p 2 * ( ϑ ) + p 2 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) . Similarly, ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) and α 2 ( ϑ ) ϑ j p 2 * ( ϑ ) + p 2 ( ϑ ) + p 1 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) .
Moreover, u 2 α 2 * ( ϑ ) A . Then, the polynomials λ 0 , λ 1 , λ 2 , μ 1 , μ 2 S [ ϑ ] , and δ F 2 [ ϑ ] exist such that
u 2 α 2 * ( ϑ ) = λ 0 ( ϑ ) g ( ϑ ) + u ( λ 0 ( ϑ ) p 1 ( ϑ ) + λ 1 ( ϑ ) g ( ϑ ) + μ 0 ( ϑ ) α 1 ( ϑ ) ) + u 2 ( λ 0 ( ϑ ) p 2 ( ϑ ) + λ 1 ( ϑ ) p 1 ( ϑ ) + λ 2 ( ϑ ) g ( ϑ ) + μ 0 ( ϑ ) q ( ϑ ) + μ 1 ( ϑ ) α 1 ( ϑ ) + δ ( ϑ ) α 2 ( ϑ ) ) .
Therefore, λ 0 ( ϑ ) = λ 1 ( ϑ ) = μ 0 ( ϑ ) = 0 and α 2 * ( ϑ ) = λ 2 ( ϑ ) g ( ϑ ) + μ 1 ( ϑ ) α 1 ( ϑ ) + δ ( ϑ ) α 2 ( ϑ ) . Since α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) , we have α 2 ( ϑ ) α 2 * ( ϑ ) and so α 2 * ( ϑ ) = α 2 ( ϑ ) , i.e., α 2 ( ϑ ) is self reciprocal.
For the converse part, we are using only ( 1 ) and condition ( b ) of ( 2 ) holds.
( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) * = g * ( ϑ ) + u ϑ i p 1 * ( ϑ ) + u 2 ϑ j p 2 * ( ϑ ) = g ( ϑ ) + u ( p 1 ( ϑ ) + g ( ϑ ) + t 0 ( ϑ ) α 1 ( ϑ ) ) + u 2 ( p 1 ( ϑ ) + p 2 ( ϑ ) + t 0 ( ϑ ) q ( ϑ ) + λ ( ϑ ) α 2 ( ϑ ) ) for some λ ( ϑ ) F 2 [ ϑ ] . = g ( ϑ ) + u p 1 ( ϑ ) + u g ( ϑ ) + u t 0 ( ϑ ) α 1 ( ϑ ) + u 2 p 1 ( ϑ ) + u 2 p 2 ( ϑ ) + u 2 t 0 ( ϑ ) q ( ϑ ) + u 2 λ ( ϑ ) α 2 ( ϑ ) = ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + u ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + u 2 t 0 ( ϑ ) q ( ϑ ) + u t 0 ( ϑ ) α 1 ( ϑ ) + u 2 λ ( ϑ ) α 2 ( ϑ ) = ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + u ( g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) ) + t 0 ( ϑ ) ( u α 1 ( ϑ ) + u 2 q ( ϑ ) ) + λ ( ϑ ) ( u 2 α 2 ( ϑ ) ) A .
where t 0 ( ϑ ) , λ ( ϑ ) F 2 [ ϑ ] . Hence, A is reversible. □

5. Dual of Reversible Cyclic Code over S

Suppose that l ( ϑ ) = l 0 + l 1 ϑ + + l k ϑ k is a parity check polynomial over a cyclic [ n , k ] -code in A and l ¯ ( ϑ ) = l * ( ϑ ) . Then, for the characterization of A of cyclic code A , we have the following result.
Theorem 5. 
Let A be a cyclic code over F q , and A be its dual. Then, A = < l ¯ ( ϑ ) > is reversible iff l ( ϑ ) A .
Proof. 
Let l ¯ ( ϑ ) = ( l k , l k 1 , , l 0 ) A . Then, ( l ¯ ( ϑ ) ) r = ( l 0 , l 1 , , l k 1 , l k ) = l ( ϑ ) A . Conversely, suppose that l ( ϑ ) A , then l ( ϑ ) = ( l ¯ ( ϑ ) ) r , which means l ¯ ( ϑ ) r = l ( ϑ ) A . Hence, A = < l ¯ ( ϑ ) > is reversible cyclic code. □
Definition 2. 
For any ideal J in S n , the annihilator Q ( J ) of J in S n is defined as
Q ( J ) = { d ( ϑ ) f ( ϑ ) d ( ϑ ) = 0 f ( ϑ ) J } .
Another associated ideal of A of cyclic code A is
Q ( J ) * = { t * ( ϑ ) t ( ϑ ) J } .
Proposition 1. 
Let A be a cyclic code of odd length n over S . Then,
Q ( A ) = ϑ n 1 α 2 ( ϑ ) , u ϑ n 1 α 1 ( ϑ ) , u 2 ϑ n 1 g ( ϑ ) ,
where Q ( A ) is the annihilator of A , where α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) .
Proof. 
It is given that A is a cyclic code of odd length over F 2 + u F 2 + u 2 F 2 ; then,
A = g ( ϑ ) , u α 1 ( ϑ ) , u 2 α 2 ( ϑ ) = g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ,
where α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ n 1 ) . Additionally, n 1 ( ϑ ) , n 2 ( ϑ ) exists and n 3 ( ϑ ) such that g ( ϑ ) = α 1 ( ϑ ) n 1 ( ϑ ) , g ( ϑ ) = α 2 ( ϑ ) n 2 ( ϑ ) , and α 1 ( ϑ ) = α 2 ( ϑ ) n 3 ( ϑ ) . Notice that
ϑ n 1 α 2 ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = ϑ n 1 α 2 ( ϑ ) g ( ϑ ) + u ϑ n 1 α 2 ( ϑ ) α 1 ( ϑ ) + u 2 ϑ n 1 α 2 ( ϑ ) α 2 ( ϑ ) = ϑ n 1 α 2 ( ϑ ) α 2 ( ϑ ) n 2 ( ϑ ) + u ϑ n 1 α 2 ( ϑ ) α 2 ( ϑ ) n 3 ( ϑ ) = 0 ,
and
u ϑ n 1 α 1 ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = u ϑ n 1 α 1 ( ϑ ) g ( ϑ ) + u 2 ϑ n 1 α 1 ( ϑ ) α 1 ( ϑ ) = u ϑ n 1 α 1 ( ϑ ) α 1 ( ϑ ) n 1 ( ϑ ) = 0 .
Similarly,
u 2 ϑ n 1 g ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = 0 .
So,
N = ϑ n 1 α 2 ( ϑ ) , u ϑ n 1 α 1 ( ϑ ) , u 2 ϑ n 1 g ( ϑ ) Q ( A ) .
Now, we prove that Q ( A ) N . Suppose that Q ( A ) = l ( ϑ ) , u j ( ϑ ) , u 2 k ( ϑ ) . Then,
u 2 k ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = 0 .
From here, we conclude that a polynomial b 1 ( ϑ ) F 2 exists such that
k ( ϑ ) = ϑ n 1 g ( ϑ ) b 1 ( ϑ ) N .
Similarly, one can get
u j ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = 0 u j ( ϑ ) g ( ϑ ) + u 2 j ( ϑ ) α 1 ( ϑ ) = 0
Since j ( ϑ ) g ( ϑ ) = 0 , u 2 j ( ϑ ) α 1 ( ϑ ) = 0 and so, there exists polynomial b 2 ( ϑ ) in F 2 such that
j ( ϑ ) = ϑ n 1 α 1 ( ϑ ) b 2 ( ϑ ) .
Additionally,
l ( ϑ ) ( g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) ) = 0 l ( ϑ ) g ( ϑ ) + u l ( ϑ ) α 1 ( ϑ ) + u 2 l ( ϑ ) α 2 ( ϑ ) = 0
which implies l ( ϑ ) = ϑ n 1 α 2 ( ϑ ) b 3 ( ϑ ) for some b 3 ( ϑ ) F 2 .
Hence,
Q ( A ) = l ( ϑ ) , u j ( ϑ ) , u 2 k ( ϑ ) ϑ n 1 α 2 ( ϑ ) , u ϑ n 1 α 1 ( ϑ ) , u 2 ϑ n 1 g ( ϑ ) N .
Therefore, Q ( A ) = ϑ n 1 α 2 ( ϑ ) , u ϑ n 1 α 1 ( ϑ ) , u 2 ϑ n 1 g ( ϑ ) .
The implications of Proposition 1 are as follows.
Theorem 6. 
Let A be a cyclic code of odd length n over S . Then,
A = ϑ n 1 α 2 ( ϑ ) * , u ϑ n 1 α 1 ( ϑ ) * , u 2 ϑ n 1 g ( ϑ ) * .
Theorem 7. 
Let A be a reversible cyclic code of odd length n over S with α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) | ( ϑ n 1 ) and A = ϑ n 1 α 2 ( ϑ ) * , u ϑ n 1 α 1 ( ϑ ) * , u 2 ϑ n 1 g ( ϑ ) * . Then, A is a reversible cyclic code over S .
Proof. 
Assume that A is a reversible cyclic code of odd length n over S . Hence, by Theorem 3, g ( ϑ ) , α 1 ( ϑ ) , and α 2 ( ϑ ) are self reciprocal. Suppose that ϑ n 1 α 2 ( ϑ ) = v 1 ( ϑ ) , ϑ n 1 α 1 ( ϑ ) = v 2 ( ϑ ) , and ϑ n 1 g ( ϑ ) = v 3 ( ϑ ) .
Therefore,
( ϑ n 1 ) * = α 2 * ( ϑ ) v 1 * ( ϑ ) , ( ϑ n 1 ) * = α 1 * ( ϑ ) v 2 * ( ϑ ) ,
and
( ϑ n 1 ) * = g * ( ϑ ) v 3 * ( ϑ ) .
This implies
v 1 * ( ϑ ) = ( ϑ n 1 ) * α 2 * ( ϑ ) = ( ϑ n 1 ) α 2 ( ϑ ) = v 1 ( ϑ ) ,
v 2 * ( ϑ ) = ( ϑ n 1 ) * α 1 * ( ϑ ) = ( ϑ n 1 ) α 1 ( ϑ ) = v 2 ( ϑ ) ,
and
v 3 * ( ϑ ) = ( ϑ n 1 ) * g * ( ϑ ) = ( ϑ n 1 ) g ( ϑ ) = v 3 ( ϑ ) .
Let c ¯ ( ϑ ) A . Then,
( c ¯ ( ϑ ) ) * = ϑ n 1 α 2 ( ϑ ) * d 1 ( ϑ ) + ϑ n 1 α 1 ( ϑ ) * d 2 ( ϑ ) + ϑ n 1 g ( ϑ ) * d 3 ( ϑ ) * = ( v 1 ( ϑ ) d 1 ( ϑ ) v 2 ( ϑ ) d 2 ( ϑ ) v 3 ( ϑ ) d 3 ( ϑ ) ) * = ( v 1 * ( ϑ ) d 1 * ( ϑ ) ϑ i v 2 * ( ϑ ) d 2 * ( ϑ ) ϑ j v 3 * ( ϑ ) d 3 * ( ϑ ) ) = ( v 1 * ( ϑ ) i 1 ( ϑ ) + v 2 * ( ϑ ) i 2 ( ϑ ) + v 3 * ( ϑ ) i 3 ( ϑ ) ) ,
where i 1 ( ϑ ) = d 1 * ( ϑ ) , i 2 ( ϑ ) = ϑ i d 2 * ( ϑ ) , and i 3 ( ϑ ) = ϑ j d 3 * ( ϑ ) , over F 2 + u F 2 + u 2 F 2 . Thus c ( ϑ ) A . Thus, by Theorem 5, A is a reversible cyclic code over F 2 + u F 2 + u 2 F 2 . □

6. Minimum Hamming Distance of a Cyclic Code over S

Here, we determine the minimum Hamming distance of a cyclic code of length n over S . Assume that A = g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) , u α 1 ( ϑ ) + u 2 q 1 ( ϑ ) , u 2 α 2 ( ϑ ) is a cyclic code of length n over S . Define A u 2 = { n ( ϑ ) u 2 n ( ϑ ) A } . Then, A u 2 is a cyclic code of length n over F 2 .
Theorem 8 
([12] Theorem 4.4). If A = g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) , u α 1 ( ϑ ) + u 2 q 1 ( ϑ ) , u 2 α 2 ( ϑ ) is a cyclic code of length n over S . Then, A u 2 = α 2 ( ϑ ) .
Theorem 9 
([12] Theorem 4.4). Let A be a cyclic code of length n over S . Then, d H ( A ) = w H ( A ) = w H ( A u 2 ) = d H ( A u 2 ) , where w H ( A ) is the minimum Hamming weight of cyclic code A .

7. Examples

Example 1. 
Let n = 9 , ϑ 9 1 = ( ϑ + 1 ) ( ϑ 2 + ϑ + 1 ) ( ϑ 6 + ϑ 3 + 1 ) over F 2 with α 2 ( ϑ ) = 1 , α 1 ( ϑ ) = ϑ 6 + ϑ 3 + 1 , and g ( ϑ ) = 1 + ϑ + ϑ 2 + ϑ 3 + ϑ 4 + ϑ 5 + ϑ 6 + ϑ 7 + ϑ 8 . Here, α 2 ( ϑ ) α 1 ( ϑ ) g ( ϑ ) ( ϑ 9 1 ) , then by using Theorem 3, the code generated by g ( ϑ ) + u α 1 ( ϑ ) + u 2 α 2 ( ϑ ) is a reversible cyclic code. Additionally, by using Theorem 9 we find that d H ( A ) = 1 .
Example 2. 
Let ϑ 16 1 = ( ϑ + 1 ) 16 = g 16 over F 2 . Let A = g ( ϑ ) + u p 1 ( ϑ ) + u 2 p 2 ( ϑ ) , where g ( ϑ ) = g 14 , p 1 ( ϑ ) = ϑ + ϑ 5 + ϑ 9 + ϑ 13 and p 2 ( ϑ ) = ϑ 2 + ϑ 4 + ϑ 10 + ϑ 12 . It is easy to check that g ( ϑ ) = ϑ 14 + ϑ 12 + ϑ 10 + ϑ 8 + ϑ 6 + ϑ 4 + ϑ 2 + 1 is self-reciprocal. Additionally, ϑ i p 1 * ( ϑ ) = p 1 ( ϑ ) and ϑ j p 2 * ( ϑ ) = p 2 ( ϑ ) , i = d ( g ( ϑ ) ) d ( p 1 ( ϑ ) ) & j = d ( g ( ϑ ) ) d ( p 2 ( ϑ ) ) , where d ( g ( ϑ ) ) denotes degree of g ( ϑ ) . Therefore, A is a reversible cyclic code with distance d H ( A ) = 4 .

8. Conclusions and Future Work

The reversible cyclic codes of any length n over the ring S = F 2 + u F 2 + u 2 F 2 , where u 3 = 0 , were examined in this article. As ideals for the ring S n = S [ ϑ ] / ( ϑ n 1 ) , we have created a unique set of generators for these codes. Additionally, in Section 5, we set certain restrictions on the situations in which a reversible cyclic code’s dual is reversible. Finally, we provided helpful examples to support our results. As an application of our research work, we can use these reversible cyclic codes to obtain linear complementary dual codes, which are used in cryptography, in particular, to secure information from so-called, “side-channel assaults (SCA)” or “fault non-invasive attacks”. Further, for future work, we can also find reversible cyclic codes over more general rings such as F q + u F q + u 2 F q + + u k 1 F q .

Author Contributions

Conceptualization, A.S.A., M.A. and N.u.R.; methodology, M.A. and N.u.R.; software, M.A.; validation, N.u.R.; formal analysis, A.S.A. and M.A.; investigation, M.A. and N.u.R.; resources, A.S.A.; data curation, M.A.; writing—original draft preparation, M.A.; writing—review and editing, A.S.A. and N.u.R.; visualization, M.A. and N.u.R.; supervision, N.u.R.; project administration, A.S.A. and N.u.R.; funding acquisition, A.S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All data required for this paper are included within this paper.

Acknowledgments

The authors are greatly indebted to the referee for his/her valuable suggestions, which immensely improved the article. The authors extend their appreciation to Princess Nourah bint Abdulrahman University for funding this research under Researchers Supporting Project number (PNURSP2022R231), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hammons, A.; Kumar, P.; Calderbank, A.R.; Sloane, N.J.A.; Solé, P. The Z 4 -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 1994, 40, 301–319. [Google Scholar] [CrossRef]
  2. Abualrub, T.; Oehmke, R. On the generators of Z 4 cyclic codes of length 2e. IEEE Trans. Inf. Theory 2003, 49, 2126–2133. [Google Scholar] [CrossRef]
  3. Abualrub, T.; Siap, I. Cyclic codes over the ring Z 2 + u Z 2 and Z 2 + u Z 2 + u 2 Z 2 . Des. Codes Cryptogr. 2007, 42, 273–287. [Google Scholar] [CrossRef]
  4. Abualrub, T.; Siap, I. On the construction of cyclic codes over the ring Z 2 + u Z 2 . In Proceedings of the 9th WSEAS International Conference on Applied Mathematics, Istanbul, Turkey, 27–29 May 2006; pp. 430–435. [Google Scholar]
  5. Ping, L.; Shixin, Z. Cyclic codes of arbitrary lengths over the ring F q + u F q . J. Univ. Sci. Technol. China 2008, 38, 1392–1396. [Google Scholar]
  6. Massey, J.L. Reversible codes. Inf. Control 1964, 7, 369–380. [Google Scholar] [CrossRef] [Green Version]
  7. Tzeng, K.; Hartmann, C. On the minimum distance of certain reversible cyclic codes. IEEE Trans. Inf. Theory 1970, 16, 644–646. [Google Scholar] [CrossRef]
  8. Islam, H.; Prakash, O. New quantum and LCD codes over the finite field of even characteristic. Int. J. Theor. Phys. 2020, 60, 2322–2332. [Google Scholar] [CrossRef]
  9. Islam, H.; Prakash, O. Construction of LCD and new quantum codes from cyclic codes over a finite non-chain ring. Cryptogr. Commun. 2021, 14, 59–73. [Google Scholar] [CrossRef]
  10. Srinivasulu, B.; Bhaintwal, M. Reversible cyclic codes over F 4 + u F 4 and their applications to DNA codes. In Proceedings of the 7th International Conference on Information Technology and Electrical Engineering, Malang, Indonesia, 2 October 2015; pp. 101–105. [Google Scholar]
  11. Prakash, O.; Patel, S.; Yadav, S. Reversible cyclic codes over F q + u F q . Comput. Appl. Math. 2021, 40, 1–17. [Google Scholar]
  12. Mostafanasab, H.; Yousefian Darani, A. On Cyclic DNA Codes Over F 2 + u F 2 + u 2 F 2 . Commun. Math. Stat. 2019, 9, 39–52. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alali, A.S.; Azmi, M.; ur Rehman, N. Reversible Cyclic Codes over F2+uF2+u2F2. Symmetry 2023, 15, 73. https://doi.org/10.3390/sym15010073

AMA Style

Alali AS, Azmi M, ur Rehman N. Reversible Cyclic Codes over F2+uF2+u2F2. Symmetry. 2023; 15(1):73. https://doi.org/10.3390/sym15010073

Chicago/Turabian Style

Alali, Amal S., Mohd Azmi, and Nadeem ur Rehman. 2023. "Reversible Cyclic Codes over F2+uF2+u2F2" Symmetry 15, no. 1: 73. https://doi.org/10.3390/sym15010073

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop