-
Higher weight spectra of ternary codes associated to the quadratic Veronese $3$-fold
Authors:
Krishna Kaipa,
Puspendu Pradhan
Abstract:
The problem studied in this work is to determine the higher weight spectra of the Projective Reed-Muller codes associated to the Veronese $3$-fold $\mathcal V$ in $PG(9,q)$, which is the image of the quadratic Veronese embedding of $PG(3,q)$ in $PG(9,q)$. We reduce the problem to the following combinatorial problem in finite geometry: For each subset $S$ of $\mathcal V$, determine the dimension of…
▽ More
The problem studied in this work is to determine the higher weight spectra of the Projective Reed-Muller codes associated to the Veronese $3$-fold $\mathcal V$ in $PG(9,q)$, which is the image of the quadratic Veronese embedding of $PG(3,q)$ in $PG(9,q)$. We reduce the problem to the following combinatorial problem in finite geometry: For each subset $S$ of $\mathcal V$, determine the dimension of the linear subspace of $PG(9,q)$ generated by $S$. We develop a systematic method to solve the latter problem. We implement the method for $q=3$, and use it to obtain the higher weight spectra of the associated code. The case of a general finite field $\mathbb F_q$ will be treated in a future work.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)
Authors:
Kumar Saurabh,
Deepak Gajjala,
Krishna Kaipa,
Ranjana Vyas,
O. P. Vyas,
Rahamatullah Khondoker
Abstract:
Industrial cyber-physical systems (ICPS) are gradually integrating information technology and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deploy secure Industrial Control and Production Systems (ICPS) in smart factories, cyber threats and risks must be addressed. To identify all possible threats, Threat Modeling is a promising solution.…
▽ More
Industrial cyber-physical systems (ICPS) are gradually integrating information technology and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deploy secure Industrial Control and Production Systems (ICPS) in smart factories, cyber threats and risks must be addressed. To identify all possible threats, Threat Modeling is a promising solution. Despite the existence of numerous methodological solutions for threat modeling in cyber-physical systems (CPS), current approaches are ad hoc and inefficient in providing clear insights to researchers and organizations involved in IIoT technologies. These approaches lack a comprehensive analysis of cyber threats and fail to facilitate effective path analysis across the ICPS lifecycle, incorporating smart manufacturing technologies and tools. To address these gaps, a novel quantitative threat modeling approach is proposed, aiming to identify probable attack vectors, assess the path of attacks, and evaluate the magnitude of each vector. This paper also explains the execution of the proposed approach with two case studies, namely the industrial manufacturing line, i.e., the Internet of Manufacturing (IoM), and the power and industry, i.e., the Internet of Production (IoP).
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
On the $PGL_2(q)$-orbits of lines of $PG(3,q)$ and binary quartic forms
Authors:
Krishna Kaipa,
Nupur Patanker,
Puspendu Pradhan
Abstract:
We study the problem of classifying the lines of the projective $3$-space $PG(3,q)$ over a finite field $GF(q)$ into orbits of the group $G=PGL(2,q)$ of linear symmetries of the twisted cubic $C$. A generic line neither intersects $C$ nor lies in any of its osculating planes. While the non-generic lines have been classified into $G$-orbits in literature, it has been an open problem to classify the…
▽ More
We study the problem of classifying the lines of the projective $3$-space $PG(3,q)$ over a finite field $GF(q)$ into orbits of the group $G=PGL(2,q)$ of linear symmetries of the twisted cubic $C$. A generic line neither intersects $C$ nor lies in any of its osculating planes. While the non-generic lines have been classified into $G$-orbits in literature, it has been an open problem to classify the generic lines into $G$-orbits. For a general field $F$ of characteristic different from $2$ and $3$, the twisted cubic determines a symplectic polarity on $\mathbb P^3$. In the Klein representation of lines of $\mathbb P^3$, the tangent lines of $C$ are represented by a degree $4$ rational normal curve in a hyperplane $\mathcal H$ of the second exterior power $\mathbb P^5$ of $\mathbb P^3$. Atiyah studied the lines of $\mathbb P^3$ with respect to $C$, in terms of the geometries of these two curves. Polar duality of lines on $\mathbb P^3$ corresponds to Hodge duality on $\mathbb P^5$, and $\mathcal H$ is the hyperplane of Hodge self-dual elements of $\mathbb P^5$. We show that $\mathcal H$ can be identified in a $PGL_2$-equivariant way with the space of binary quartic forms over $F$, and that pairs of polar dual lines of $\mathbb P^3$ correspond to binary quartic forms whose apolar invariant is a square. We first solve the open problem of classifying binary quartic forms over $GF(q)$ into $G$-orbits, and then use it to solve the main problem.
△ Less
Submitted 7 March, 2024; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Deep Holes of Projective Reed-Solomon Codes
Authors:
Jun Zhang,
Daqing Wan,
Krishna Kaipa
Abstract:
Projective Reed-Solomon (PRS) codes are Reed-Solomon codes of the maximum possible length q+1. The classification of deep holes --received words with maximum possible error distance-- for PRS codes is an important and difficult problem. In this paper, we use algebraic methods to explicitly construct three classes of deep holes for PRS codes. We show that these three classes completely classify all…
▽ More
Projective Reed-Solomon (PRS) codes are Reed-Solomon codes of the maximum possible length q+1. The classification of deep holes --received words with maximum possible error distance-- for PRS codes is an important and difficult problem. In this paper, we use algebraic methods to explicitly construct three classes of deep holes for PRS codes. We show that these three classes completely classify all deep holes of PRS codes with redundancy at most four. Previously, the deep hole classification was only known for PRS codes with redundancy at most three in work arXiv:1612.05447
△ Less
Submitted 3 September, 2019; v1 submitted 16 January, 2019;
originally announced January 2019.
-
An improvement of the asymptotic Elias bound for non-binary codes
Authors:
Krishna Kaipa
Abstract:
For non-binary codes the Elias bound is a good upper bound for the asymptotic information rate at low relative minimum distance, where as the Plotkin bound is better at high relative minimum distance. In this work, we obtain a hybrid of these bounds which improves both. This in turn is based on the anticode bound which is a hybrid of the Hamming and Singleton bounds and improves both bounds.
The…
▽ More
For non-binary codes the Elias bound is a good upper bound for the asymptotic information rate at low relative minimum distance, where as the Plotkin bound is better at high relative minimum distance. In this work, we obtain a hybrid of these bounds which improves both. This in turn is based on the anticode bound which is a hybrid of the Hamming and Singleton bounds and improves both bounds.
The question of convexity of the asymptotic rate function is an important open question. We conjecture a much weaker form of the convexity, and we show that our bounds follow immediately if we assume the conjecture.
△ Less
Submitted 27 February, 2018; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Deep holes and MDS extensions of Reed-Solomon codes
Authors:
Krishna Kaipa
Abstract:
We study the problem of classifying deep holes of Reed-Solomon codes. We show that this problem is equivalent to the problem of classifying MDS extensions of Reed-Solomon codes by one digit. This equivalence allows us to improve recent results on the former problem. In particular, we classify deep holes of Reed-Solomon codes of dimension greater than half the alphabet size.
We also give a comple…
▽ More
We study the problem of classifying deep holes of Reed-Solomon codes. We show that this problem is equivalent to the problem of classifying MDS extensions of Reed-Solomon codes by one digit. This equivalence allows us to improve recent results on the former problem. In particular, we classify deep holes of Reed-Solomon codes of dimension greater than half the alphabet size.
We also give a complete classification of deep holes of Reed Solomon codes with redundancy three in all dimensions.
△ Less
Submitted 16 December, 2016;
originally announced December 2016.
-
Counting generalized Reed-Solomon codes
Authors:
Peter Beelen,
David Glynn,
Tom Høholdt,
Krishna Kaipa
Abstract:
In this article we count the number of generalized Reed-Solomon (GRS) codes of dimension k and length n, including the codes coming from a non-degenerate conic plus nucleus. We compare our results with known formulae for the number of 3-dimensional MDS codes of length n=6,7,8,9.
In this article we count the number of generalized Reed-Solomon (GRS) codes of dimension k and length n, including the codes coming from a non-degenerate conic plus nucleus. We compare our results with known formulae for the number of 3-dimensional MDS codes of length n=6,7,8,9.
△ Less
Submitted 14 November, 2016;
originally announced November 2016.
-
An asymptotic formula in q for the number of [n,k] q-ary MDS codes
Authors:
Krishna Kaipa
Abstract:
We obtain an asymptotic formula in q for the number of MDS codes of length n and dimension k over a finite field with q elements.
We obtain an asymptotic formula in q for the number of MDS codes of length n and dimension k over a finite field with q elements.
△ Less
Submitted 3 November, 2013;
originally announced November 2013.
-
Automorphism groups of Grassmann codes
Authors:
Sudhir R. Ghorpade,
Krishna V. Kaipa
Abstract:
We use a theorem of Chow (1949) on line-preserving bijections of Grassmannians to determine the automorphism group of Grassmann codes. Further, we analyze the automorphisms of the big cell of a Grassmannian and then use it to settle an open question of Beelen et al. (2010) concerning the permutation automorphism groups of affine Grassmann codes. Finally, we prove an analogue of Chow's theorem for…
▽ More
We use a theorem of Chow (1949) on line-preserving bijections of Grassmannians to determine the automorphism group of Grassmann codes. Further, we analyze the automorphisms of the big cell of a Grassmannian and then use it to settle an open question of Beelen et al. (2010) concerning the permutation automorphism groups of affine Grassmann codes. Finally, we prove an analogue of Chow's theorem for the case of Schubert divisors in Grassmannians and then use it to determine the automorphism group of linear codes associated to such Schubert divisors. In the course of this work, we also give an alternative short proof of MacWilliams theorem concerning the equivalence of linear codes and a characterization of maximal linear subspaces of Schubert divisors in Grassmannians.
△ Less
Submitted 20 May, 2013; v1 submitted 24 April, 2012;
originally announced April 2012.
-
Weight spectrum of codes associated with the Grassmannian G(3,7)
Authors:
K. V. Kaipa,
H. Pillai
Abstract:
In this paper we consider the problem of determining the weight spectrum of q-ary codes C(3,m) associated with Grassmann varieties G(3,m). For m=6 this was done by Nogin. We derive a formula for the weight of a codeword of C(3,m), in terms of certain varieties associated with alternating trilinear forms on (F_q)^m. The classification of such forms under the action of the general linear group GL(m,…
▽ More
In this paper we consider the problem of determining the weight spectrum of q-ary codes C(3,m) associated with Grassmann varieties G(3,m). For m=6 this was done by Nogin. We derive a formula for the weight of a codeword of C(3,m), in terms of certain varieties associated with alternating trilinear forms on (F_q)^m. The classification of such forms under the action of the general linear group GL(m,F_q) is the other component that is required to calculate the spectrum of C(3,m). For m=7, we explicitly determine the varieties mentioned above. The classification problem for alternating 3-forms on (F_q)^7 was solved by Cohen and Helminck, which we then use to determine the spectrum of C(3,7).
△ Less
Submitted 26 March, 2012; v1 submitted 1 March, 2012;
originally announced March 2012.
-
Multiscale limit for finite-gap Sine-Gordon Solutions and Calculation of Topological Charge using Theta-functional Formulae
Authors:
P. G. Grinevich,
K. V. Kaipa
Abstract:
In this paper, we introduce the so-called multiscale limit for spectral curves, associated with real finite-gap Sine-Gordon solutions. This technique allows to solve the old problem of calculating the density of topological charge for real finite-gap Sine-Gordon solutions directly from the $θ$-functional formulas.
In this paper, we introduce the so-called multiscale limit for spectral curves, associated with real finite-gap Sine-Gordon solutions. This technique allows to solve the old problem of calculating the density of topological charge for real finite-gap Sine-Gordon solutions directly from the $θ$-functional formulas.
△ Less
Submitted 28 April, 2009;
originally announced April 2009.
-
Calculation of Topological Charge of Real Finite-Gap sine-Gordon solutions using Theta-functional formulae
Authors:
P. G. Grinevich,
K. V. Kaipa
Abstract:
The most basic characteristic of x-quasiperiodic solutions u(x,t) of the sine-Gordon equation u_{tt}-u_{xx}+\sin u=0 is the topological charge density denoted $\bar n$. The real finite-gap solutions u(x,t) are expressed in terms of the Riemann theta-functions of a non-singular hyperelliptic curve $Γ$ and a positive generic divisor D of degree g on $Γ$, where the spectral data $(Γ, D)$ must satis…
▽ More
The most basic characteristic of x-quasiperiodic solutions u(x,t) of the sine-Gordon equation u_{tt}-u_{xx}+\sin u=0 is the topological charge density denoted $\bar n$. The real finite-gap solutions u(x,t) are expressed in terms of the Riemann theta-functions of a non-singular hyperelliptic curve $Γ$ and a positive generic divisor D of degree g on $Γ$, where the spectral data $(Γ, D)$ must satisfy some reality conditions. The problem addressed in note is: to calculate $\bar n$ directly from the theta-functional expressions for the solution u(x,t). The problem is solved here by introducing what we call the multiscale or elliptic limit of real finite-gap sine-Gordon solutions. We deform the spectral curve to a singular curve, for which the calculation of topological charges reduces to two special easier cases.
△ Less
Submitted 23 April, 2009; v1 submitted 12 December, 2008;
originally announced December 2008.