Professional Documents
Culture Documents
Structure Page
7.1 Introduction 5
Objectives
7.2 Examples 5
7.3 Complete Reducibility and Maschke’s Theorem 10
7.4 Summary 14
7.5 Solutions/Answers 14
7.1 INTRODUCTION
The representation theory of finite groups has its origins in the correspondence
that took place between two mathematicians, R. Dedekind and F.G. Frobenius
in the year 1898. This theory helps us understand theory of finite groups by
translating problems related to finite groups to problems related to a particular
family of finite groups, namely, finite subgroups of GLn (C) . Once we make Fig.1: F. G. Frobenius
(1849-1917)
this translation, we can apply tools and techniques from both Linear Algebra
and from the theory of finite groups to solve the problems. This approach has
proved very successful and has been useful in proving deep theorems in Group
Theory which would have been impossible or difficult to prove otherwise. To
give an example, representation theory has contributed to the solution of the
classification problem of finite simple groups.
In this unit, we shall help you study some basics about representations of finite
groups, irreducible representations and Maschke’s theorem on complete
reducibility of representations over C .
Objectives
7.2 EXAMPLES
5
Study Guide-II Remark: Regarding Page 308, Lines 5 and 6, starting with `It is also easy to
write down…’, the case of D n is explained further on Page 315, fourth
paragraph, starting with `For example, consider …’.
( ) φ(x ) ( )
j1 j2 jn
or −1 . We say φ respects r, if φ x i1 i2 L φ xin = 1 in G ′ .
6
) ) ) )
( ) φ(x ) ( )
j1 j2 jn Representation of Groups
φ(r) = φ x i1 i2 L φ xin
)
= φ( x ) φ(x ) Lφ ( x )
j1 j2 jn
i1 i2 in (Q φ is an extension of φ)
= 1(Q φ respects r )
)
It follows that ri ,1 ≤ i ≤ k, are in N′. So, N', the kernel of φ, contains N, the
kernel of π . We have the following situation:
)
φ
F G′
π
G
Fig. 2
π ψ
G
Fig. 3
Example 2: Consider the Klein 4-group given by
V4 = x, y; xyxy, x 2 , y 2 .
Obtain a non-trivial representation of V4 .
7
studying characters later in the book and this block. For now, let us look at Representation of Groups
some examples.
Example 6: Show that the representations ρ and ρ′, defined in Example 5, are
irreducible.
11
Study Guide-II ⎡1⎤ ⎡1⎤ ⎡1 ⎤
If ⎢ ⎥ ∈ W, then B⎢ ⎥ = ⎢ ⎥ ∈ W , so that dim C W = 2 , and hence W = V .
⎣1⎦ ⎣1⎦ ⎣− 1⎦
⎡1⎤ ⎡1⎤
Similarly, if ⎢ ⎥ ∈ W, so does ⎢ ⎥ ∈ W, and W = V.
⎣ −1⎦ ⎣1⎦
Therefore, ρ is irreducible.
***
⎪ ⎢⎣1⎥⎦ ⎪
⎩ ⎭
be the orthogonal complement of W under the standard inner product on C 3 .
Now
⎡1⎤ ⎡α ⎤
⎢ ⎥
v, ⎢1⎥ = α + β + γ , where v = ⎢⎢β ⎥⎥ .
⎢⎣1⎥⎦ ⎢⎣ γ ⎥⎦
So,
W ⊥ = {(α, β, γ) α + β + γ = 0}.
Check that,
⎡1 ⎤ ⎡0 ⎤
W is generated by ⎢ − 1⎥ and ⎢⎢1 ⎥⎥ .
⊥ ⎢ ⎥
⎢⎣0 ⎥⎦ ⎢⎣ −1⎥⎦
⎡1⎤ ⎧ ⎡α ⎤ ⎫
⎢1⎥ ⎪⎢ ⎥ ⎪
Solution: Let W = = e1 + e 2 + e 3 = ⎨ ⎢α ⎥ α ∈ C ⎬
⎢⎥
⎢⎣1⎥⎦ ⎪ ⎢α ⎥ ⎪
⎩⎣ ⎦ ⎭
where Β = {e1 , e 2 , e3 } is the standard basis of C 3 . Note that, σ and τ act on the
basis B as follows:
σ ⋅ e1 = e 2 , σ ⋅ e 2 = e 3 , σ ⋅ e 3 = e1 , τ ⋅ e1 = e 2 , τ ⋅ e 2 = e1 , τ ⋅ e 3 = e 3 .
13
Study Guide-II β = α − β. Solving, we get α = 0, β = 0. But, this contradicts our assumption
that u ≠ 0. So, ρ2 is irreducible.
***
E2) Let G be a group of order n, which acts on a set X = {x1 ,K, x m }. Let V
be an m-dimensional vector space with basis B = {e xi i = 1 ,K, m}. Define
ρ : G → GL (V) by ρ (g) (Σ αi e xi ) = Σ αi egxi . Show that ρ is a representation
i i
of G. (This is called the permutation representation associated with
X.)
7.4 SUMMARY
4) The proof, and applications, of Maschke’s theorem, which says that every
representation of a finite group is a direct sum of irreducible
representations.
14
Representation of Groups
7.5 SOLUTIONS/ANSWERS
Remark: Q4, and the solution above, remains the same if S5 is replaced
by Sn .
15
N ⊆ Ker ρ′ , then ρ : G N → GL ( V ) , defined by ρ ( gN ) = ρ′ ( g ) , is a Representation of Groups
representation of G N .
-----------------------------------------------------------------------------------------------
Q1) a) X, Y = X* BY
Let C3 = {1, g, g 2 } , with g 3 = 1. Then
ρ : C 3 → GL 2 (C) : ρ(1) = 1, ρ(g ) = A , and extend it to form a
homomorphism. Here A 3 = I.
Then {ρ (g)X, ρ (g)Y} = {AX,AY} = ( AX ) BAY
*
⎩⎪ ⎣ ⎦
0 ⎣ ⎦ ⎭⎪
1
2 2
we see that e1 = and e1 , e 2 = . So, an orthonormal basis is
3 3
⎧⎪ 3 ⎡1 ⎤ ⎡ − 1 ⎤ ⎫⎪
⎨e1′ = ⎢0⎥ , e ′2 = ⎢
2 ⎥ ⎬ for this new form.
⎪⎩ 2 ⎣ ⎦ ⎢⎣1 ⎥⎦ ⎪⎭
⎡ 3 −1 ⎤
The change of basis matrix P is ⎢ 2 2⎥
⎢⎣ 0 1 ⎥⎦
⎡ −1 − 3 ⎤
So P AP = ⎢⎢ 2
−1 2 ⎥.
3 −1 ⎥
⎢⎣ 2 2 ⎥⎦
Q2) Do this on the same lines as the proof of Th. 2.2, based on Th. 2.6,
Chapter 9.
17
Study Guide-II ⎛ cos θ − sin θ ⎞
⎜ ⎟ a cos θ + i sin θ.
⎝ sin θ cos θ ⎠
( )
So, G′ = φ Pρ(g)P −1 ⊆ S1.
But, any finite subgroup of S1 is cyclic. To see this, note that, every
element of a group of order n contained in S1 will satisfy x n − 1 = 0 . So,
any finite group of order n is contained in
2 πi
{ 1 n
}
C n = z ∈ S z − 1 = 0 = μ n where μ n = e n
.
Since C n is cyclic and any subgroup of a cyclic group is cyclic, it follows
that any finite subgroup of S1 is cyclic.
So, G ′ is also cyclic.
Since G ′ is an isomorphic copy of G, G is also cyclic.
Q6) You can check that the unitary operators form a subgroup.
Now suppose ρ (g) ∈ U (V)∀g ∈ G.
Then ρ (g)v, ρ (g)w = v, w ∀v, w ∈ V
Conversely, let < , > be G-invariant.
Then ρ (g)v, ρ (g)w = v, w ∀g ∈ G, so that ρ (g) ∈ U (V).
1
a) Define {v, w} = Σ ρ (g) v, ρ (g) w
G g∈G
Then you can check that { , } will be G -invariant & skew-
symmetric.
b) By Ch. 7, Th. 8.5 of the book, there is a basis B of V such that the
⎡0 I⎤
matrix of the form with respect to B is J 2n = ⎢ ⎥.
⎣ -I 0⎦
Then, as in the proof of Th. 2.2, Chapter 9, any finite subgroup of
GL (V), where V = C 2n lies in the symplectic group SP2 n (C) .
-----------------------------------------------------------------------------------------------
⎡a ⎤
Q1) Let W be a G - invariant subspace of V and v = ⎢⎢ b ⎥⎥ ≠ 0 be in W.
⎢⎣ c ⎥⎦
⎡a ⎤ ⎡ a ⎤ ⎡ −a ⎤ ⎡ c ⎤ ⎡ −a ⎤
Then R y1 ⎢ b ⎥ = ⎢ −b ⎥ ∈ W. Similarly, ⎢⎢ − b ⎥⎥ , ⎢⎢ a ⎥⎥ , ⎢⎢ b ⎥⎥ ∈ W.
⎢ ⎥ ⎢ ⎥
⎢⎣ c ⎥⎦ ⎢⎣ −c ⎥⎦ ⎢⎣ c ⎥⎦ ⎢⎣ b ⎥⎦ ⎢⎣ −c ⎥⎦
⎡1 ⎤ ⎡0⎤ ⎡0⎤
So, ⎢⎢0 ⎥⎥ , ⎢⎢0 ⎥⎥ , ⎢⎢1 ⎥⎥ ∈ W. ∴W = V
⎢⎣ 0 ⎥⎦ ⎢⎣1 ⎥⎦ ⎢⎣ 0⎥⎦
∴ R is irreducible.
1
Q4) a) Let v = Σ ( ρ (g) v ) . Then, by reasoning as in the proof of
G g∈G
Lemma 2.8, Chapter 9, g.v = v ∀g ∈ G.
Q5) w = Σ ρ (h) v
h∈H
Then ρ(g)w = Σ ρ(gh) v
h∈H
19
Study Guide-II
UNIT 8 CHARACTERS
Structure Page
8.1 Introduction 20
Objectives
8.2 Examples 20
8.3 Schur’s Lemma 24
8.4 Summary 25
8.5 Solutions/Answers to Exercises 26
8.1 INTRODUCTION
Objectives
8.2 EXAMPLES
Read Sections 5 and 6, Chapter 9, Pages 316 - 321 of the textbook, along
with the notes below.
T
V ∼ V′
↓ → ↓
ρg ↑ T
∼ ↑ ρg′
V → V′
i.e., T o ρg = ρ′g o T .
20
Characters
2) χ : G → is well-defined because if B1 and B2 are two ordered bases of V,
where ρ : G → GL (V), then by (1) above ⎡⎣ρg ⎤⎦ B and ⎡⎣ρg ⎤⎦ B′ are similar
matrices. Therefore, their traces are the same. Thus, the definition of the
character χ of ρ is independent of the ordered basis chosen.
Conjugacy classes
C1 C2 L Cr ← order of the conjugacy class
g1 g2 L gr ← representative elements
χ1 χ1 ( g1 ) χ1 ( g 2 ) L χ1 ( g r )
χ2 χ 2 (g1 ) χ2 (g 2 ) L χ 2 ( g r )
irreducible
characters M M M L M
χr χ r (g1 ) χr ( g 2 ) L χ r ( g r )
In the textbook you will find the character tables of the symmetric group
S3 (isomorphic to D3 ), the cyclic group of order 3 and the tetrahedral group.
Let us look at some other examples.
21
Study Guide-II
ii) ρ 2 : D 4 → GL1 ( ) = * : ρ 2 ( x ) = 1, ρ 2 ( y) = −1 .
iii) ρ 3 : D 4 → GL 1 ( ) = * : ρ 3 ( x ) = −1, ρ 3 ( y) = 1
⎡ 0 1⎤ ⎡1 0 ⎤
v) ρ5 : D 4 → GL 2 ( ) : ρ 5 ( x ) = ⎢ ⎥ , ρ 5 ( y) = ⎢ ⎥ . (This is the
⎣ − 1 0 ⎦ ⎣ 0 − 1⎦
representation ρ defined in Example 2, Unit 7.)
1 2 1 2 2
2
1 x x y xy
χ1 1 1 1 1 1
χ2 1 1 1 −1 −1
χ3 1 −1 1 1 −1
χ4 1 −1 1 −1 1
χ5 2 0 −2 0 0
***
Solution: K 4 = x × y , where x 2 = e = y 2 .
Since K 4 is abelian, all its representations are one-dimensional, and their
characters will be homomorphisms. So the table is
1 1 1 1
1 x y xy
χ1 1 1 1 1
χ 2 1 −1 1 −1
χ3 1 1 −1 −1
χ 4 1 −1 −1 1
***
22
is a unitary matrix. Since the conjugate transpose of a unitary matrix is also Characters
unitary, it follows that the columns of the matrix are also orthonormal. Writing
out the orthonormality relations for the columns we get
k | Ci | | C j |
∑
m =1 N
χ m (g i )χ m (g j ) = δij
k
N
or, ∑
m =1
χ m (g i ) χ m ( g j ) =
| Ci | | C j |
δij .
In particular, if i ≠ j
k
∑χ
m =1
m ( g i ) χ m (g j ) = 0
Example 3: Determine the last row of the following character table of a group
G of order 12 which has 4 conjugacy classes.
1 3 4 4
x1 x2 x3 x4
χ1 1 1 1 1
What you will get is the
χ2 1 1 ω ω2 table for A4.
χ3 1 1 ω2 ω
χ4
where ω is a primitive cube root of unity.
Next, using the column orthogonality relation in the note above, we have
χ1 (x1 ) χ1 (x 2 ) + χ 2 (x1 ) χ 2 (x 2 ) + χ3 (x1 ) χ3 (x 2 ) + χ 4 (x1 ) χ4 (x 2 ) = 0
⇒ 3 + 3 χ4 (x 2 ) = 0 ⇒ χ 4 (x 2 ) = −1.
Similarly, we get χ 4 (x 3 ) = 0 and χ 4 (x 4 ) = 0, since 1 + ω + ω2 = 0.
Thus, the missing row is [3 −1 0 0].
***
Remark: This could also have been done using Theorem 5.9 (a), Chapter 9, of
the textbook. But, while writing the equation down, you must also include the
number of conjugates, i.e., Cxi . So, for example,
χ 4 , χ1 = 0 ⇒ χ 4 (x1 ) ⋅ 1 ⋅ Cx1 + χ4 (x 2 ) ⋅ 1 ⋅ Cx 2 + χ 4 (x 3 ) ⋅ 1 ⋅ C x3 + χ 4 (x 4 ) ⋅ 1 ⋅ C x 4 = 0
⇒ χ 4 (x1 ) + 3 χ4 (x 2 ) + 4χ 4 (x 3 ) + 4χ 4 (x 4 ) = 0
In this way χ 4 , χ 2 = 0 = χ 4 , χ3 give two other equations. The required values
of the row can be obtained from solving these three equations.
We will now discuss some theorems which will help us obtain characters of a
group G, if we know the characters of G N , where N Δ G.
23
Study Guide-II we can define a character χ of G with χ (g) = χ% (Ng) ∀ g ∈ G with the dimension
of χ being the same as the dimension of χ% .
We now use Theorem 1 to state a useful result, the proof of which is left as an
exercise for you.
On Page 321, to obtain the irreducible representations of T, you see the use of
Theorem 2 for lifting the representations of T H , which is cyclic.
a) either T is an isomorphism or T = 0.
b) Further, if V′ = V and ρ′ = ρ , then T = λI for some scalar λ ∈ . In fact,
this scalar λ is an eigenvalue of T.
24
Let ρ : G → GL(V ) be an irreducible complex representation of Characters
a finite group G .
Let
D = EndG (V ) = {T : V → V | T is a G - invariant linear transformation}.
Then D is a division ring, which is finite-dimensional over the
field .
3) If ρ : G → GL F ( V ) is a finite-dimensional irreducible
representation over a finite field F , then D = End G ( V ) is a finite-
dimensional division algebra over a finite field F . Thus D is a
finite division ring. But finite division rings are (commutative)
fields. Hence D = End G ( V ) is a finite field.
With this we come to the end of this unit. Let us briefly review the points
covered in it.
8.4 SUMMARY
4) The proof of Schur’s Lemma, and some of its applications in the context
of irreducible representations.
25
Study Guide-II
8.5 SOLUTIONS/ANSWERS TO EXERCISES
26
Study Guide-II (1) (1) (2) (2) (2)
1 −1 i j ij
χ1 1 1 1 1 1
Note that D4 and Q8 are
not isomorphic groups. χ2 1 1 1 −1 −1
Yet they have the same χ3 1 1 −1 1 −1
character table.
χ4 1 1 −1 −1 1
χ5 2 −2 0 0 0
-----------------------------------------------------------------------------------------------
28
Hence each ρk is irreducible. Characters
29
Study Guide-II
UNIT 9 FIELDS
Structure Page
9.1 Introduction 30
Objectives
9.2 Field Extensions 30
9.3 Finite Fields 34
9.4 Summary 34
9.5 Solutions/Answers 35
9.1 INTRODUCTION
In this unit, we shall help you study some concepts about fields and field
extensions. We will also be discussing different kinds of elements that extend
fields, and when two extensions are isomorphic. You would be familiar with
some of this, but taking a re-look will help set the tone for further study of
Galois theory.
Objectives
In your undergraduate studies you have come across fields like Q, R and C .
Also Q ⊆ R ⊆ C . Thus, as you can see from Section 1, Chapter 13, C is an
extension field of R as well as of Q . For more on this
E1) Let R denote an integral domain and F its field of quotients. What is EXERCISES
the characteristic of R [x 1 , x 2 , K , x n ] and of F[x 1 , x 2 , K , x n ] ?
Now read Section 2, Chapter 13. While reading it, note the following
points.
ii) The irreducible polynomial for α over F is unique, and is also called the
minimal polynomial of α over F .
Regarding (2.3), there is yet another description of the field F(α) . Let
F denote the collection of all subfields L of K that contain F and α .
F ≠ φ as K itself is a member of F . Also F(α) ∈ F .
Next, the intersection T of all such subfields is a subfield of K that
contains F and α , and therefore contains F(α) . Consequently,
T = F(α) .
So, F(α) = ∩{L | L is a field extension of F, α ∈ L}.
iv) F(α) = F [α] iff α is algebraic over the field F. To see this, note that
F[α] is an integral domain and it is enough to show that every element
in F[α] has an inverse. Let g( α) ∈ F[α] , g(α) ≠ 0 . Then, the
irreducible polynomial of α over F , does not divide g . Also, since f
is irreducible over F , (g, f ) = 1 . So there are polynomials
p(x), q(x) ∈ F[x] such that g( x )p( x ) + f ( x )q ( x ) = 1 . Substituting α for
x and noting that f (α) = 0 , we get g(α )p(α ) = 1. So,
[g(α)]−1 = p(α) ∈ F[α] .
31
Study Guide-II v) Regarding (2.8), note that [F(α) : F] = [F(β) : F] does not imply
~ F(β) . e.g., consider Q [i] and Q [ 2 ] . Both have degree 2
F(α) −
over Q but are not isomporphic.
NOTE Now read Section 3 of Chapter 13 of the textbook. While reading it note
the following points.
i) The term ‘invariant’ in the first paragraph of the section indicates that
given any two F -isomorphic field extensions, their degree is the same.
ii) In Proposition 3.3, where have we used the fact that char F ≠ 2 ? Not to
show that K = F [α] , where the irreducible polynomial of α over F is of
degree 2, but to show that K = F [δ] , where δ 2 ∈ F . Therefore, even if
char F = 2 , and [K : F] = 2 , then K = F[α] for some α satisfying an
irreducible polynomial x 2 + bx + c ∈ F[ x ] . However, in characteristic 2,
we may not be able to ‘complete the square’ and assume that ∃ δ ∈ F s.t.
f ( x ) = x 2 − δ . For example, F22 cannot be generated by δ over F2 for
any δ ∈ F2 , because δ = δ for any δ ∈ F2 .
iii) Corollary (to Corollary 3.6 of the textbook): Every extension of finite
degree of a field F is an algebraic extension.
Note that the converse of this corollary need not be true, as the following
example shows.
Thus, K / Q is algebraic.
Since the number of primes is infinite, [K : Q] cannot be finite.
***
We will now focus our attention on fields with finitely many elements only.
33
Study Guide-II
9.3 FINITE FIELDS
NOTE While doing so, please read the following notes too.
i) (6.18) is a more general statement than (6.4) (c). Thus, (6.4) (c) is
proved as a particular case of (6.18), where H = F* .
ii) To prove H is cyclic in (6.18) you use the Structure Theorem (see Unit
4, Section 4.4 of Study Guide-I).
iii) The essence of this section is the following result.
Sketch of Proof: Firstly, assume F is finite. Then, from (6.4) (c) and (d)
n
of Section 6 of the textbook, you see that F is a splitting field of x p − x
over Fp .
n
Conversely, if F is a splitting field of f ( x ) = x p − x over Fp , it is of the
form Fp (α1 , K , α r ) , where α i are the distinct roots of f ( x ) . Use
Proposition (5.7) of Section 5, Chapter 13, now to note that r = p n .
Now, Proposition (6.19) (b) tells us that {α1 , K , α p n } is a field. Thus,
F = {α1 , K , α pn } . So F is a field with p n elements.
iv) Proposition (6.4) (b) tells us that any two fields of order p n are
isomorphic.
With this we come to the end of this unit. In the next unit you will be using the
facts studied here. For now, let us summarise the points taken up in this unit.
9.4 SUMMARY
n
8. F is a finite field iff it is a splitting field of x p − x ∈ p [x ] over p for
some prime p and some integer n ≥ 1 .
9.5 SOLUTIONS/ANSWERS
35
Study Guide-II E3) A polynomial f is reducible if f = gh , where deg g. deg h ≥ 1 .
If deg f = 2 , this can happen if deg g = 1 = deg h , i.e.,
f = (ar + b) (cr + d ) , i.e., if f has roots in F .
If deg f = 3, f can be reducible if f = gh with either deg g = 1 or
deg h = 1 . Accordingly, f has a root in F .
For the example, take f = ( x 2 + 1) ( x 2 + 2) ∈ Q [ x ] . f is reducible over
Q , but has no root in Q .
invertible.
If α 0 = 0 , we can find the first non-zero α i , say α k and use a similar
argument to obtain an inverse of a k , and hence an inverse of a.
Thus, each non-zero element of R is invertible, and hence R is a field.
Q2) Show that the given set is linearly independent over F using the fact that
the polynomial over F of least degree satisfied by α is of degree n.
Here we assume f ( x ) = a n x n + a n −1 x n −1 + L + a 0 , with f (α) = 0 .
36
To show that the set {1, α, α 2 , K, α n −1} spans F[α] , consider any Fields
Q3) Let α = 3 + 5 .
(a) A polynomial over Q that has α as a root, also has
3 − 5 , − 3 + 5 and − 3 − 5 as its roots. Thus,
(x − ( 3+ 5 )) (x + ( 3+ 5 )) (x − ( 3− 5 )) (x + ( 3− 5 ))
= x − 16 x + 4 is the irreducible polynomial of α over Q .
4 2
( )
(b) As F = Q 5 , 5 ∈ F . Therefore, if z = α − 5 = 3 , then
z = 3 , i.e., α 2 − 2 5α + 5 = 3 . So x 2 − 2 5x + 2 is the irreducible
2
polynomial of α over F.
(c) Check that this will be the same as the polynomial over Q , since any
polynomial of lesser degree will have 5 or 15 as coefficients.
37
Study Guide-II Solutions to Exercises 1, 2, 5, 7, 8, 9, 10, 14 of Section 3, at the end of
Chapter 13 of the textbook.
Q2) (
ξ satisfies x 7 − 1 = (x − 1) x 6 + x 5 + x 4 + x 3 + x 2 + 1 over Q , ξ ≠ 1 )
and x + x + L + 1 is irreducible over Q .
6 5
Q7) ( )
i) Now if i ∈ Q − 2 , then Q(i) = Q − 2 , so that ( )
i 2 ∈ Q(i) ⇒ i 2 = α + β i , where α, β ∈ Q .
This is a contradiction. Hence i ∉ Q − 2 . ( )
ii) Next, suppose i ∈ Q (− 2 ) [ 1/ 4
]. Then [Q[(− 2) ]: Q[i]] = 2 , since
1/ 4
38
Also deg β over F(α) is at most n, since it is at most n over F. So Fields
{ }
Q14) You can prove that α i β j | 0 ≤ i ≤ d − 1, 0 ≤ j ≤ e − 1 spans F[α, β] over
F.
If degree of β over F[α] is e, this set will be linearly independent.
Otherwise, it need not be linearly independent, and hence it won’t form a
basis over F .
e.g., ω(= e 2πi / 3 ) and ω2 are algebraic over Q , both of degree 3.
But Q[ω, ω 2 ] = Q[ω] has degree 3 over Q .
3
Q5) Any irreducible polynomial of deg 3 over F3 must divide x 3 − x , by
Theorem 6.4 (e). So all its roots are in F27 .
Since 3 is prime, every α ∈ F27 \ F3 satisfies an irreducible polynomial.
There are 24 such elements. Since each irreducible polynomial has 3
24
distinct roots, there are = 8 distinct cubic polynomials over F3 .
3
Q7) i) x 9 − x = x (x − 1) (x + 1) (x 2 + 1) ( x 4 + 1)
= x ( x − 1) ( x + 1) ( x 2 + 1) ( x 2 − x − 1) (x 2 + x − 1) .
You can check that each of these factors is irreducible over F3 .
−1
= ∏ (x − α i ) .
n
Q10) Let | K | = p n . Then x p
α i ∈K
40
Galois Theory
UNIT 10 GALOIS THEORY
Structure Page
10.1 Introduction 41
Objectives 42
10.2 Some Types of Extensions
Separable Extensions
Normal Extensions
Galois Extensions
10.3 The Fundamental Theorem of Galois Theory 47
10.4 Summary 47
10.5 Solutions/Answers 48
10.1 INTRODUCTION
In the previous unit you studied about finite extensions. You found that any
such extension is algebraic. Here we will consider finite extensions that are
splitting fields of polynomials. The main focus of this unit is the Fundamental
Theorem of Galois Theory. This theorem is a very important tool, as it allows
us to study various aspects of finite extensions by considering equivalent
problems given in terms of groups, which are sometimes easier to solve.
Galois Theory has its origin in a classical problem in the theory of equations,
namely, “can the roots of a polynomial equation of degree ≥ 5 be obtained by
radicals and the basic arithmetic operations only?” This is named after the
French mathematician Galois, who studied symmetrics of roots of polynomials,
and published three papers that laid the foundations for Galois theory.
Fig.1: Evariste Galois
The approach to Galois theory, through the use of automorphisms of field (1811-1832)
extensions, is largely developed by Dedekind, Kronecker and Emil Artin. We
will be focusing on this approach in this unit.
In the next unit you would be studying some applications of this theory.
Objectives
41
Study Guide-II
10.2 SOME TYPES OF EXTENSIONS
In the previous unit you studied that every polynomial has a splitting field. In
fact, upto K-isomorphism, this field is unique for a given polynomial over a
field K. This is a corollary of the following theorem, which we shall only state.
∃η
K ~ K
1 2 Theorem 1: Let F1 and F2 be fields, σ : F1 → F2 a field isomorphism and
f ( x ) ∈ F1 [x ] . Let K 1 and K 2 be splitting fields of f and σ (f ) over F1 and
F2 , respectively. Then there exists an isomorphism η : K 1 → K 2 such that
U σ U
F
~ F η | F1 = σ . Further, the number of such isomorphisms is at most [K1 : F1 ] .
1 2
Fig.2: A commutative
diagram representing the
Let us now consider a related definition.
situation in Theorem 1.
Definition: A finite field extension K / F is called a normal extension if it is a
splitting field of some polynomial over F.
Proof: We will prove they are equivalent by showing (i) ⇒ (ii ) ⇒ (iii ) ⇒ (i) .
42
Then, by Theorem 1, φ can be extended to an F-isomorphism Galois Theory
~ L . So, σ | : K → L is an F-homomorphism, and
σ : L ⎯⎯→ K
hence, by our hypothesis, σ(K ) = K . Thus, σ(α) = φ(α) = β ∈ K .
Note: A version of Theorem 2 also holds true for any algebraic extension NOTE
K / F . The difference is only that the definition of a normal extension changes
to ‘ K / F is normal if it is a splitting field of a set of polynomials.’ For more
on this you can refer to Section 3, Chapter 5 of ‘Algebra’ by Hungerford, for
example.
E2) If ξ is a primitive nth root of unity, then show that Q (ξ) / Q is a normal
extension.
43
Study Guide-II
For example, i is separable over Q (or R ). Note that x 2 + 1 is separable over
R , but not over F2 , since it has 1 as a multiple root in F2 .
Sometimes it is not easy to find all the roots of a polynomial, and hence to
decide if it is separable or not. One tool to help us is its derivative, which you
can now study about.
Read the matter from (5.5) in Section 5 of Chapter 13 till the end of the
section.
Proof: Any finite extension is of the form F(α1 , K , α n ) . Let us first prove
the result for K = F (α, β) , then the general result will follow by induction.
Now, study the proof of Theorem 4.1, and Example 4.3, Section 4, Chapter
14 of the textbook.
E7) a) Let K be a field. Then show that the set of all automorphisms of K
forms a group G with respect to composition of maps. We
denote G by Aut K.
44
b) Let K / F be a field extension. Then show that the set of all Galois Theory
F-automorphisms of K forms a group under the composition of
maps, and this is a subgroup of Aut K.
Now we shall discuss, field extensions that are the focus of Galois theory.
We introduce you to a particular kind of finite field extension now, named after
Galois.
Study Section 1, Chapter 14, of the textbook from the beginning upto the
point before (1.10).
NOTE
While studying it, note the following:
i) If α and β are the roots of an irreducible quadratic polynomial over F,
then F(α) = F(β) = K, say.
σ : K → K : σ(a + bα) = a + bβ is an F-automorphism.
Suppose φ is any other F-automorphism of K, then
φ(a ) = σ(a ) ∀ a ∈ F.
Also, φ(α) is a root of the irreducible polynomial of α . Thus,
φ(α) = β. Hence, φ = σ. So, G (K / F) = {I, σ} .
ii) What is done in this section for fields of characteristic ‘zero’ also holds
for fields of characteristic p. The proofs require suitable modifications.
iii) In the book, a Galois extension is only defined for fields of
characteristic zero. However, the same definition holds for all fields.
iv) If K = F, G (K / F) = {I} . However, the converse is not true (see
Example 1 below).
v) Let K / F be a field extension and α ∈ K be algebraic over F, with
irreducible polynomial of degree n. Then any σ ∈ G (F(α) / F) is
completely determined by its action on α , since {1, α, K , α n −1 } is a
basis of F(α) over F. Also, since σ(α) is a root of
f ( x ) ∀σ ∈ G (F(α) / F) , | G (F(α) / F) | = m ≤ n , where m is the number
of distinct roots of f ( x ) in F(α) .
45
Study Guide-II Example 1: Give an example where | G (F(α) / F) | < [F(α) : F] .
Now, in the textbook you have seen that a finite field extension K / F is called
a Galois extension if | G (K / F) | = [K : F] . The following theorem gives you an
equivalent definition.
46
For example, by E1, you know that any finite extension of a field of Galois Theory
characteristic zero is separable. So, in this case, K/F is Galois iff K/F is
normal iff K is a splitting field of a polynomial in F [ x ] .
Now study Section 1, Chapter 14, from Theorem (1.11) till the end of the
section.
Let us now go back a bit and focus on the main theorem of Galois Theory.
In Theorem (1.15), Section 1, Chapter 14, of the textbook, you read that given
a Galois extension K / F , there is a 1-to-1 correspondence between the
intermediate extensions and the subgroups of G (K / F) . Let us see why this is
so.
Let us note down the stages required for understanding the proof of Theorem
(1.15).
With this we come to the end of our discussion on Galois Theory. Let us
summarise what you studied in this unit.
10.4 SUMMARY
10.5 SOLUTIONS/ANSWERS
b) ( ) ( )
This is not true. Let F = Q , K = Q 2 , L = Q 4 2 . Then
L and K are normal because they are quadratic extensions.
K F
However, L is not normal because L contains only the real
F
root of x − 2 .
4
48
Then p | f ′( x ) . Hence f ′( x ) ≡ 0 , so that f has multiple roots. Thus, f Galois Theory
is not separable. So, f is separable implies that f is not of the form
g( x p ) .
Conversely, suppose irreducible f is not of the form g( x p ) , then one
of the terms in f will be of the form ax q where p /| q and p /| a . Then
f ′ will contain aqx q −1 , so that f ′ ≡/ 0 . Then, as in Proposition (5.8),
Chapter 13, if f and f ′ have common roots, f | f ′ , which is not
possible. Hence, f is separable.
n
E8) Let α ∈ Fp n . The irreducible polynomial of α , say f , divides x p − x
n
(by Theorem (6.4), Chapter 13 of the textbook). Since x p − x doesn’t
have multiple roots, neither can f . Hence Fpn / Fp is separable.
49
Study Guide-II Also define K-homomorphisms (and hence F-homomorphisms)
τ j : L = K (β) → N : τ j (β) = β j .
Then define mn distinct F-homomorphism φ ij : L → N by
φ ij (α) = σ ′i (α ) and φ ij (β) = τ j (β) ∀ i = 1, K , n , j = 1, K , m .
Thus, By E9, L / F is separable.
Q1) See the portion following the proof of Proposition (4.4), Chapter 14, of
the textbook.
Q6) a) Check that the splitting field over Q is Q(i) . So, the degree
is 2.
1 1 1
b) The roots of x − 2 are
3
23 , ω.2 3 , ω 2
.2 3 , where ω is a cube
⎛ 1 ⎞
⎜
root of unity. Thus, the splitting field over Q is Q ω, 2 3 ⎟.
⎜ ⎟
⎝ ⎠
⎧⎪ 1 1 2 2 ⎫⎪
Its basis over Q is ⎨1, ω, 2 3 , 2 3 ω, 2 3 , 2 3 ω⎬ .
⎪⎩ ⎪⎭
∴ its degree over Q is 6 .
50
Q10) As shown in the case of a biquadratic extension, show that Galois Theory
G (K / F) = H 1 × H 2 × H 3 , where H i = {I, σ i } ,
σ1 : K → K : σ1 ( 2 ) = − 2 , σ1 ( 3 ) = 3 , σ1 ( 5 ) = 5
σ 2 : K → K : σ 2 ( 3 ) = − 3, σ 2 ( 2 ) = 2 , σ 2 ( 5 ) = 5
σ 3 : K → K : σ 3 ( 5 ) = − 5, σ 3 ( 2 ) = 2 , σ 3 ( 3 ) = 3
{
Also [K : F] = 8 , a basis being 1, 2 , 3 , 6 , 5 , 10 , 15 , }
30 .
Thus, | G (K / F) | = [K : F] , so that K / F is Galois.
Q12) a) αp − α − a = 0 .
Now (α + 1) p = α p + 1 . ∴ f (α + 1) = 0 .
51
UNIT 11 APPLICATIONS OF FINITE
FIELDS
11.1 INTRODUCTION
The goal of this unit is to share with you some applications of the algebra you
have studied so far. We will see how to apply our knowledge of finite fields in
areas like designs, error correcting codes and cryptogaphy. In Sec. 11.2, we will
introduce you to combinatorial designs. In Sec. 11.3, we will introduce you to
error correcting codes. In the last section, Sec. 11.4, we will discuss LFSRs
which are used to generate pseudorandom numbers and are useful in
cryptography.
Objectives
After studying this unit you should be able to:
• define a design, and give examples of designs;
• define and give examples of a generator matrix and a parity check matrix of an
error correcting code;
• explain what LFSRs are and how they are useful in cryptography.
In the early part of the 20th century, R. A. Fisher used block designs in design of
agricultural experiments. Since then statisticians and engineers have applied
block designs in studying many industrial processes. (If you want to know more
about the applications of block designs, you may consult books on design of
experiments.) Indian Mathematicians like R.C. Bose and S. S. Shrikande have
also made important contributions to the study of block designs and Latin
squares.
Let us call the set of aspirants X. Then, we have to take all the possible subsets of
size four from the set X, rank the performances of the teams corresponding to the
sets and select the best team. But, this is not practical if X is large. For example,
if |X| = 16, i.e. there are 16 aspirants, we will need C(16, 4) = 12!4!
16!
= 1820
trials. Note that we denote the
number of ways of
So, we are forced to choose the teams in such a way that the number of trials is choosing r elements from
manageable while ensuring that all the aspirants get a ‘fair’ chance. To ensure a set of n elements by
fairness, we have to make sure that every aspirant takes part in the same number C(n, r). Many nauthors
use
of trials, i.e., she is a part of the same number of teams. Also, it will be unfair to a the notation r .
good rower to be always grouped with bad partners because it can affect her
chances of selection. So, every rower has to be grouped with every other player
equally often.
Let us formulate the problem in mathematical terms. In the set X of size 16, we
have to find a collection B of subsets of size four of X such that:
1) There is a number r such that each x ∈ X is in exactly r subsets of B.
Those designs where ν = k are called complete designs because B = X for all
B ∈ B. If ν < k we call our design an incomplete design. When t = 2, any pair
of elements in B is in exactly λ blocks. We call such a design a balanced design.
So, in the special case where t = 2 and ν < k, (X, B) is called a balanced,
incomplete, block design.
Also, for the third condition in Definition 1 to hold true, we should have k ≥ t. 53
Study Guide-II In the definition the word ‘simple’ means that we do not allow repetition of
blocks. In more general definition of designs, repetition of blocks are allowed, i.e.
B is a collection rather than a set.
In the case of our problem of designing trials for the selection of rowing team, we
need a design with ν = 16, t = 2 and k = 4. Of course, we would like b to be as
small as possible so that the number of trials is the minimum possible.
To quote [6], a t-(ν, k, λ ) design is ‘... a collection of committees chosen out of ν
people, each committee containing k persons, and such that any t persons serve
together on exactly λ committees.’
Remark 1: We have X = ∪B∈B B. Since B ⊂ X ∀B ∈ B , ∪B∈B B ⊂ X. So, we
need to show that X ⊂ ∪B∈B B. Let x ∈ X. Consider the set
T = {x1 = x, x2 , x3 , . . . , xt }
where x2 , x3 , . . ., xt are arbitrary elements of X. By definition, T ⊂ B for at least
one B ∈ B since we have assumed that λ ≥ 1. In particular, x1 = x will be in this
B. So, X ⊂ ∪B∈B B. Thus, X = ∪B∈B B.
Let us look at a simple example of a design.
Example 1: Create a 2-(9, 3, 1) design on X = {1, 2, 3, 4, 5, 6, 7, 8, 9}.
Solution: Let
B = {{1, 2, 3}, {4, 5, 6}, {7, 8, 9}, {1, 4, 7}, {2, 5, 8}, {3, 6, 9},
(1)
{1, 5, 9}, {2, 6, 7}, {3, 4, 8}, {1, 6, 8}, {2, 4, 9}, {3, 5, 7}}.
Here X has 9 elements so ν = 9. Further every subset in B has three elements so
k = 3.
Notice that any pair of elements of X are in exactly one subset in B. For example
the elements 1 and 2 are there only in the first subset {1, 2, 3} and in no other
subset. If you like you can check this for every pair of elements in X. (There are
only C(7, 2) = 21 pairs in all!) So, t = 2 and λ = 1. This is a 2-(7,3,1) design.
∗∗∗
One important class of designs are the projective planes. To construct these
designs, we fix a vector space V of dimension 3 over a finite field Fq and take X
to be set of all one dimensional subspaces of V. The blocks correspond to two
dimensional subspaces of V. Then, we get a 2-(q2 + q + 1, q + 1, 1) design. A
detailed discussion of these designs is beyond the scope of this unit. In the next
example, we discuss a particular case of projective planes where q = 2. The
block design we get is called called the Fano plane.
Example 2: Construct the Fano plane.
Solution: Let F be a finite field with 2 elements. Let V = F3 and X be the set
of all one dimensional subspaces of V. In general any vector space of dimension
n over the finite field Fq has qn elements. So, the underlying set of any one
dimensional vector space over F2 has exactly two elements, zero element being
one of them. For example {(0, 0, 0), (1, 0, 0)} is a vector space of dimension one
over F2 . Let us now list all the vector spaces of dimension 1 over F2 , giving each
of them a name for easy reference. We have,
⎫
A = {(0, 0, 0), (0, 1, 0)}, B = {(0, 0, 0), (1, 0, 1)},⎪
⎪
⎪
C = {(0, 0, 0), (0, 0, 1)}, D = {(0, 0, 0), (1, 1, 1), ⎬
(2)
E = {(0, 0, 0), (0, 1, 1)}, F = {(0, 0, 0), (1, 0, 0)} ⎪
⎪
⎪
⎭
54 G = {(0, 0, 0), (1, 1, 0)}
So, Applications of Finite Fields
X = {A, B, C, D, E, F, G}.
Let us denote the one-dimensional subspace generated by the vector (a, b, c),
(a, b, c) = 0, by [a : b : c]. For example we denote the one-dimensional vector
space {(0, 0, 0), (0, 0, 1)} by [0 : 0 : 1].
As you can see in Eqn. (2), there are exactly 7 one-dimensional subspaces,
namely, [1, 0, 0], [0 : 1 : 0], [0 : 0 : 1], [1 : 1 : 0], [0 : 1 : 1], [1 : 0 : 1] and [1 : 1 : 1].
Note that every two-dimensional vector space over F has four elements and there
are seven two-dimensional subspaces of F3 . They are
{(0, 0, 0), (0, 0, 1), (1, 0, 0), (1, 0, 1)}, {(0, 0, 0), (1, 0, 1), (1, 1, 1), (0, 1, 0)}
{(0, 0, 0), (0, 1, 0), (0, 1, 1), (0, 0, 1)}, {(0, 0, 0), (1, 0, 0), (1, 1, 0), (0, 1, 0)}
{(0, 0, 0), (1, 0, 1), (1, 1, 0), (0, 1, 1)}, {(0, 0, 0), (1, 1, 1), (1, 1, 0), (0, 0, 1)},
and {(0, 0, 0), (0, 1, 1), (1, 1, 1), (1, 0, 0)}.
Let us now define the blocks of our design as follows: For each two-dimensional
subspace W of V, we define a block BW as follows:
For example, if we take W0 = {(0, 0, 0), (0, 0, 1), (1, 0, 0), (1, 0, 1)}, then
S ∩ W = (0, 0, 0) for the one dimensional subspaces
So,
BW0 = {{(0, 0, 0), (0, 0, 1)}, {(0.0, 0), (1, 0, 0)}, {(0, 0, 0), (1, 0, 1)}} (3)
= {[0 : 0 : 1], [1 : 0 : 0], [1 : 0 : 1]} = {B, C, F} (4)
We can represent the system as in Fig. 1. The points in the figure represent the
points in the design and the lines represent the blocks in the design. Note that the
[0 : 0 : 1] C
[0 : 1 : 1] E F [1 : 0 : 0]
G[1 : 1 : 0]
D
[0 : 1 : 0] A B[1 : 0 : 1]
[1 : 1 : 1]
B = {S ⊂ X||S| = 4},
be the set of all subsets of X with four elements. There are C(6, 4) = 15 subsets
of X of size 4. We can take any value of t, t ≤ 4. Our λ will depend on the value
of t. Suppose t = 4. From Eqn. (5), we get
λ = C(6 − 4, 6 − 4) = 1
so, any set of 4 elements in contained in exactly one set of 4 elements, which is a
self evident statement.
λ = C(6 − 3, 6 − 4) = C(3, 2) = 3.
λ = C(6 − 2, 6 − 4) = C(4, 2) = 6.
So, any pair of elements in X are in exactly six subsets in B. So, (X, B) is a
2-(6,4,6) trivial design.
∗∗∗
Here is an exercise to check your understanding of the discussion so far.
E1) Let X = {1, 2, 3, 4, 5, 6, 7} and B be the set of subsets of X with five EXERCISES
elements. Find the value of λ for (X, B) considered as a 4 design and a 3
design.
We will now see some methods for constructing new designs from existing
designs. We begin with a simple construction.
Theorem 1: Suppose X is a t-(ν, k, λ ) design. Let 0 ≤ i ≤ t and suppose I ⊂ X,
|I| = i for some t-(ν, k, λ ) design. The number of blocks B such that I ⊂ B is
C(ν − i, t − i)
λi = λ (6)
C(k − i, t − i)
In other words, every t-(ν, k, λ ) is also also an i-(ν, k, λi ) design for i ≤ t. 57
Study Guide-II Proof: Let us fix a set I with i elements and suppose there are λi sets B that
contain I. So, λi may be depend on I. We will see later in the proof that this is not
so.
Note that, the expression for λi depends only on λ , ν, k, t and i and not on the
particular set I ⊂ X we have chosen. So, Eqn. (8) is true for any I ⊂ X of size
i.
There is an interesting corollary that follows from the result just proved. This
corollary relates various parameters associated with a design. So, it helps us
sometimes in deciding whether it is possible to construct a design with a given set
of parameters.
Corollary 1: 1) Given a t-(ν, k, λ ) design, the parameters b, ν, λ and k satisfy
the relation
C(ν, t)
b=λ (9)
C(k, t)
Of course, the fact that the parameter values satisfy Eqn. (9) doesn’t guarantee
that a 2-(16, 4, 1) design exists. Eqn. (9) is only a necessary condition. So, we
now describe a design with b = 20 without showing its construction.
No. ν r k b λ
1 7 3 3 7 1
2 12 3 3 4 1
In the next proposition, we state some methods of constructing new designs from
existing designs.
Proposition 1: Let D = (X, B) be a t-(ν, k, λ ) design.
1) Let
B
= {B ⊂ X||B| = k, B ∈ B} .
In other words, choose all the subsets of X with k elements which are not in
B as blocks. Then (X, B
) is a t-(ν, k, C(ν − t, k − t) − λ ) design. This is
called the complementary design of D.
3) Let
B
= { X \ B| B ∈ B} .
i.e., choose as blocks the complements of the blocks of B, i.e. X \ B,
B ∈ B. Then, (X, B
) is a t-(ν, ν − k, λ
) design where λ
= λ C(ν−k,t)
C(k,t) .
This is called the supplementary design of D.
3) We have to show that, any subset of t elements of X are in the same number
of blocks in B
. Let T be a subset with t elements. Note that, the number of
blocks B
∈ B
that contain T is the same as the number of blocks in B
with B ∩ T = φ . This is because, if T ⊂ B
, B
∈ B
then, T ∩ B = φ for the
block B = X \ B
where B ∈ B by definition. By Eqn. (14), the number of
subsets of blocks that do not intersect T is
C(ν − t, k)
λ .
60 C(ν − t, k − t)
Check that, Applications of Finite Fields
C(ν − t, k) C(ν − k, t)
λ =λ
C(ν − t, k − t) C(k, t)
Let us look at an example that illustrates the use of Proposition 1.
Example 7: Consider the Fano plane, which is a S(2, 3, 7) steiner system.
1) Construct its complementary design.
In this section, we will discuss error correcting codes, often called simply as
codes. We can think of codes as a means of expressing the messages in a form
that is suitable for our method of communication. We usually use various
symbols with each symbol standing for a particular message. For example traffic
signals convey three different messages using three different colours, Green,
Orange and Red. Other examples are the traffic signs we see on the roads.(See
Fig. 2.) Instead of pictures, we use words also to convey specific messages. They
are called codewords. For example, ‘MAYDAY’ is the standard distress signal
sent by an aircraft or a ship which needs to be rescued from a dangerous situation.
and use the symbols in such a way that we can achieve these goals. In this
section, we will focus on codes that help us to communicate digitally with
minimum possible errors. Fig. 3 shows a communication channel without error
Noise
M M
Sender Receiver
correction facilities. Here, the message M sent by the sender gets distorted into
M
due to some disturbance in the media. For example, signals from satellites are
transmitted using radio waves and this could be affected by Sun’s radiation. The
recipient may not be able to make out whether there is a mistake in the message.
On the other hand, we can see in Fig. 4 a channel with error correction facilities.
In this, instead of sending the message M itself, the encoder replaces the message
M by the corresponding codeword C. (We will clarify what a codeword is in the
context of error correction codes later.) The noise in the channel distorts C to C
.
The codewords are so designed that the decoder can recover the correct code
word C from the distorted codeword C
subject to certain conditions. The decoder
corrects the error and finds the correct transmitted codeword and recovers the
original message M. In this section, we are interested in such encoding processes
Noise
M C C M
Sender Encoder Decoder Recipient
Suppose we transmit the ASCII value of B in binary and the last bit changes from
1 to 0 because of the noise in the transmitting medium. The recipient will receive
A instead of B. To handle such errors, the recipient should be able to detect the
error and take corrective measures. Explain how adding an extra bit will help in
detecting errors. Also, explain why the set of codewords in your message forms a
vector subspace of Fn for some n, i.e. the code is a linear code.
So, we send eight bits instead of seven bits and the recipient checks whether there
are even number of 1’s. If there isn’t, she will know that an error has occurred
She can then ask the sender to send that part of the message again.
When we added the parity bit, we modified the message by adding some bits
which are not part of the message. We call the extra bits the redundant bits. The
process of adding extra bits for error correction is called encoding the message.
Once the recipient receives, say, 10000010, she can extract the message ‘A’ from
this codeword by discarding the last bit of the codeword after checking for error.
This process is called decoding the message.
Note that, if we add all the eight bits of a codeword, treating them as elements of
F, we will get zero since any codeword always has even number of 1’s.
Conversely, if the sum of the digits is zero, the number of 1s has to be even. So,
C = x1 x2 · · · x8 ∈ F8 |x1 + x2 + · · · + x8 = 0
Note that, C is the kernel of the linear map F8 → F, given by
x1 x2 · · · x8 → x1 + x2 + · · · + x8 . 63
Study Guide-II We leave it to you to check, using the rank-nullity theorem, that C is a seven
dimensional subspace of F8 . So, C is an [8, 7]-code.
∗∗∗
Let us look at another example of a code in which we can correct some of the
errors instead of merely detecting the errors.
Example 9: Suppose we want to transmit the 128 characters in the ASCII table.
Explain how to construct a code that uses repetition of the message for encoding
it. Explain why your code is a linear code. Also, explain how you can correct
some of the errors.
We decode the messages in this code is as follows: We check the positions which
should be equal and take whichever among the two symbols, 0 and 1, that occurs
more times. For example, suppose we receive 1000001 0100001 1000001. (We
have introduced spaces for convenience.) For convenience, we split this into
chunks of seven and write the three chunks one below the other:
1 0 0 0 0 0 1
0 1 0 0 0 0 1
1 0 0 0 0 0 1
1 0 0 0 0 0 1
The fourth line in the above table gives the decoded message. We examine each
column and see which symbol occurs most frequently in that column and write
down that symbol under that column. For example, in the first column from the
left, there are two ones and one zero. So, we take the left most bit in the decoded
message to be one.
We can always correct one error using this code. For example, suppose we
receive the string 1010001 1000001 1000001 and we see that the third bit is 1
but the tenth and seventeenth bits are 0. If we assume that there is at most one
error, we infer that the error is in the third bit and correct it.
We may not be always to able to correct two errors although we can detect two
errors. Suppose we receive that string 1100001 1100001 1000001. We see that
the second, ninth are 1 and the sixteenth bit is 0. If we assume that there can be
two or more errors, there are two possibilities. The first possibility is second and
the ninth bits are correct and the sixteenth bit is wrong and therefore there is only
one error. The other possibility is that the second and ninth bits are wrong and the
sixteenth bit is correct, implying that there are two errors. So, we can infer infer
that there are errors in the message. But, we can correct the errors only if there is
only one error. We leave it to you as an exercise to check that C is a [21, 7]-code.
∗∗∗
Here are some exercises for you to check your understanding of the above
64 examples.
Applications of Finite Fields
E6) Again, let us consider the code in Example 9. Suppose you receive the
message 1000111 1000111 1000101. Assuming that the number of errors
is not more than one, find the message.
Note that, since a linear code is a linear subspace of Fn , once we know a basis for
the code, we can reconstruct all the codewords of the code. So, for each linear
code we associate a matrix whose rows are the basis elements of that code. We
call this matrix a generator matrix of the linear code. Let us look at an example
to understand this.
Example 10: Consider the code
C = {0000, 0011, 0101, 0110, 1001, 1010, 1100, 1111}
Find the generator matrix of the code.
Solution: Since the code has 23 = 8 elements, we know that the dimension of
the linear code as a subspace of Fn is 3. So, to find a generator matrix, we have to
find three linearly independent vectors. We can do this by trial and error. We
select any three elements and form a 3 × 4 matrix and check whether it has rank
three. If the matrix has rank three, the row vectors are linearly independent and
so form a basis for the code C .
2) Note that, if we rearrange the rows of a generator matrix of a code, they still
form a basis. More generally, if we perform any of the following row
operations, the resulting matrix will still be a generator matrix.
a) Multiply a row by a nonzero scalar.
b) Multiply a row by a scalar and add it to another row.
c) Interchange rows. 65
Study Guide-II So, a generator matrix of a code is not unique. However, we can use row
reduction to reduce a generator matrix to reduced row echelon form and this
is unique.
We use a generator matrix for encoding the messages, in this case the ASCII
codes. For example, the ASCII code of ‘B’ is 1000001 in binary. To encode this,
we multiply the 1000001 by the matrix G to get the encoded vector:
⎡ ⎤
1 0 0 0 0 0 0 1
⎢0 1 0 0 0 0 0 1⎥
⎢ ⎥
⎢0 0 1 0 0 0 0 1⎥
⎢ ⎥
1000001 ⎢ ⎢0 0 0 1 0 0 0 1⎥ = 10000010
⎥
⎢0 0 0 0 1 0 0 1⎥
⎢ ⎥
⎣0 0 0 0 0 1 0 1⎦
0 0 0 0 0 0 1 1
Note that, first 7 bits of the codewords consists of the original message and the
last bit is the redundant bit we use for parity check. This is true for all the [n, k]
codes for which the generator matrix is in systematic form. The first k bits of the
codeword will consist of the message bits and the remaining n − k bits will be
redundant bits for error correction.
∗∗∗
Here is an exercise for you to check your understanding.
EXERCISES E7) Check that, the generator matrix for the code in Example 9 is [I7 , I7 , I7 ].
For decoding, we first need to know whether we received a valid codeword or not.
One way of checking this is to compare it with all the codewords in the code and
66 see if the message matches any of them. However, this is time consuming. We
can do this quickly by using the parity check matrix of the code. We will discuss Applications of Finite Fields
this in the next example.
Example 12: Write down the parity check matrix for Example 8 again.
Solution: We know that a vector x is a valid codeword if and only if the sum of
all the bits is one. Note that, the sum of all bits in a codeword is simply the dot
product of the codeword with the vector (1, 1, 1, 1, 1, 1, 1, 1). So, if we write
H= 1 1 1 1 1 1 1
then C = x ∈ F8 | xHt = 0 . In other words, the matrix H checks whether the
parity of the number of 1s in the codeword is correct. We call H the parity check
matrix of the code C .
∗∗∗
Here is the formal definition of parity check matrix.
Definition 5: Let C be an [n, k]-code. An (n − k) × n matrix H is called a parity
check matrix for C if
C = x ∈ Fn |xHt = 0 .
We say that H is in systematic form if it is of the form [Q, In−k ] where Q is an
(n − k) × k matrix.
Note that, according to Definition 5, the parity check matrix has the property that
the kernel of the linear map Ht : Fn → Fn−k is precisely the subspace C . We
leave it to you as simple exercise to check using linear algebra that Ht is onto and
its rank is n − k.
We can find the parity check matrix from the generator matrix in systematic form
and vice versa using Proposition 2.
Proposition 2: If G = [Ik , P] is the generator matrix of, a not necessarily binary,
[n, k]-code C in systematic form, then H = [−Pt , In−k ] is a parity check matrix
for C . Conversely, if the parity check matrix of a [n, k]-code is of the form
[Q, In−k ], its generator matrix is of the form [Ik , −Qt ].
Proof: Assume that G = [Ik , P] is the generator matrix of a [n, k] linear code C .
First, we prove that, for v ∈ C , vHt = 0 for all v ∈ C . It follows that C is in the
kernel of H. Also, the rank of H is n − k, so the nullity is k by rank nullity
theorem. So, the kernel of H is precisely C .
EXERCISES E8) Consider the code with the following generator matrix
⎡ ⎤
1 0 0 1 0 0 1 0 0
G = ⎣0 1 0 0 1 0 0 1 0⎦
0 0 1 0 0 1 0 0 1
in standard form. Find the parity check matrix of the code in standard form.
We close our discussion on error correcting codes here. We will discuss this topic
in MMTE-005, which is a full course on error correcting codes. In the next
section, we discuss Linear Feedback Shift Registers (LFSRs).
You are probably wondering what pseudorandom numbers are and why we have
used the adjective ‘pseudo’. Random number sequences are a sequence of
numbers in which it is impossible to predict the next number in the sequence
even if we are given all the earlier numbers in the sequences. Such random
number sequences are generated using natural phenomena like by timing the gap
between successive pairs of radioactive decays detected by a Geiger-Müller
counter or thermal noise from a semiconductor resistor or tossing a coin.
However, such random numbers are difficult to generate in large quantities. So,
we often settle for pseudorandom sequences which are sequences generated
using some mathematical function based on an input called a seed. These
sequences satisfy all the statistical properties that are satisfied by random
numbers. However, anyone who knows the function and the seed used can
reconstruct the entire sequences. But, this is not possible to do so for random
number sequences constructed by tossing a coin or other such means.
Pseudo random numbers are useful in testing algorithms. For example, suppose
you have invented a new algorithm for sorting numbers in ascending order. You
can test how well it performs by generating data sets of numbers using a
pseudorandom generator and testing your algorithm on this data. We will see
later how pseudorandom numbers are useful in cryptography.
Consider
V = s∞ = (s0 , s1 , . . . , )| s0 , s1 , . . . ∈ Fq , s∞ satisfies Eqn. (16) (21)
Check that V is vector space over Fq under pointwise addition and scalar
multiplication. Further, S is a linear operator on V and it satisfies the equation
Sn − cn−1 Sn−1 − cn−2 Sn−2 − . . . − c1 S − c0 I = 0 (22)
Finite fields have the remarkable property that every nonzero element is a root of
unity. Using this we can see that if f(x) ∈ Fq [x] is such that f(0) = 0, then f(x)
divides x − 1 for some e ∈ N. In fact, as we show below, e can be so chosen that
e
e ≤ qm − 1, where m = deg(f(x)).
Lemma 1: Let f(x) ∈ Fq [x] be a polynomial of degree m ≥ 1 with f(0) = 0.
Then, there exists e ∈ N with e ≤ q − 1 such that f(x) divides x − 1.
m e
If the period of an LFSR is large, a large number of terms of the LFSR is non
repeating. So, we are interested in finding the period of an LFSR. We begin with
the following definiton.
Definition 7: An LFSR of order n over Fq is primitive if for any choice of a
nonzero initial state, the sequence generated by that LFSR is periodic of period
qn − 1.
Definition 8: Let f(x) ∈ Fq [x] be such that f(0) = 0. The smallest positive integer
e such that f(x) | xe − 1 is called the order of f(x). Suppose f(0) = 0 and h ∈ N
is such that xh | f(x) and xh+1 f(x). Writing f(x) = xh g(x), we define the order
of f(x) to be the order of g(x). We write ord(f(x)) or ord(f) for the order of f(x).
The terms exponent and period are also used in the literature instead of order.
Note that, if f(x) ∈ Fq [x] is irreducible of degree m then it has a root in Fqm .
Indeed, Fq [x]/f(x) is a field with qm elements and hence isomorphic to Fqm . In
m
fact, since Fqm is a normal extension of Fq (being the splitting field of xq − x
over Fq ), f(x) has all its roots in Fqm . We can relate the order of f(x) to the order
of its roots in F∗qm , provided f(0) = 0.
Proposition 4: Let f ∈ Fq [x] be irreducible of degree m and with f(0) = 0, and
let α ∈ Fqm be a root of f(x). Then, α = 0 and the order of f(x) is the order of α
in the multiplicative group F∗qm . 71
Study Guide-II Proof: Since f(0) = 0, we see that α = 0. Since f(x) is irreducible, it has the
least degree among all polynomials in Fq [x] having α as a root. So, if g(α) = 0
for any g(x) ∈ Fq [x], then f(x) | g(x). Thus for any d ≥ 1,
α d = 1 ⇔ α is a root of xd − 1 ⇔ f(x)|xd − 1
This implies that
{d ∈ N | f(x) divides xd − 1} = {d ∈ N|α d = 1}.
∴ min{d ∈ N | f(x) divides xd − 1} = min{d ∈ N|α d = 1}.
In other words, ord(f) is the order of α in F∗qm .
∗
Since Fqm is cyclic of order q − 1, it follows from Proposition 4 that there exist
m
We leave the proof of this lemma to you as an exercise. (See E 11).) Let us now
look at some examples.
Example 16: Check that, the polynomial f(x) = x4 + x + 1 ∈ F2 [x] is irreducible.
Find the order of the polynomial f(x).
Solution:
= 0 and f(1)
Since f(0) = 0, f(x) has no linear factors. Suppose
f(x) = x2 + ax + b x2 + cx + d , a, b, c, d ∈ F2 . We have
f(x) = x4 + (a + c)x3 + (ac + b + d)x2 + (ad + bc)x + bd = x4 + x + 1
So,
a+c = 0 (23)
ac + b + d = 0 (24)
ad + bc = 1 (25)
bd = 1 (26)
From Eqn. (26), it follows that b = d = 1. So, from Eqn. (24) it follows that
a = 0 or c = 0. But, from Eqn. (23) it follows that a = c, so a = c = 0. In this
case Eqn. (25) will not be satisfied, so f(x) is irreducible over F2 . We have
72 L F2 [x]/f(x)
Let α = x + f(x). Then, α is a root of f(x) in F24 F2 [x]/f(x). Let us find Applications of Finite Fields
the order of α. We have |L∗ | = 15 = 3 · 5. Comparing with Lemma 2, here k = 2,
p1 = 3, p2 = 5, e1 = 1, e2 = 1. So, t1 = 153 = 5 and t2 = 5 = 3. Also,
15
E9) If f(x) ∈ Fq [x] has degree m and order m, then show that f(0) = 0. EXERCISES
E11) Find the order of the following polynomials. Check whether they are
primitive:
i) x4 + x3 + x2 + x + 1 ∈ F2 [x] ii) x2 + x + 2 ∈ F3 [x]
iii) x3 + x2 + 1 ∈ F2 [x]
We conclude this Unit by giving a summary of the Unit in the next section.
11.5 SUMMARY
11.6 SOLUTIONS/ANSWERS
E4) The first set of parameters satisfy Eqn. (12) and Eqn. (13). So, there could
be a design with these parameters. Indeed, these are the parameters of the
Fano Plane. The second set of parameters do not satisfy Eqn. (13). So, there
can’t be a block design with these parameters.
E5) In this exercise, we will slightly deviate from our standard notation and
write codewords as tuples rather than strings. Consider the map from F21 to
F14 given by
(a1 , a2 , . . . , a21 ) → (a1 − a8 , a1 − a15 , a2 − a9 , a2 − a16 , . . . , a7 − a14 , . . . , a7 − a21 )
Check that the kernel of this map is precisely the code in Example 9.
Further, check that this map is surjective. Then, use rank-nullity theorem to
show that C is a seven dimensional subspace of F21 .
E6) For convenience, let us split the string we received into three chunks of
length seven and write them one below another and decode as in Example 9.
Only in the sixth column, there are 1s in the first two rows and there is a 0
in the third row. Since we assume that there is at most one error, the error 75
Study Guide-II must be in third row, sixth column and we decode the sixth bit as 1.
1 0 0 0 1 1 1
1 0 0 0 1 1 1
1 0 0 0 1 0 1
1 0 0 0 1 1 1
E7) Note that, all the rwo vectors satisfy the condition xi = xj if i ≡ j (mod 7),
so all the rows are valid codewords. Also, the generator matrix contains a
7 × 7 identity matrix, so it has rank 7.
E8) Note that, this is the generator matrix of the repetition codedefined over F9 .
I
This is of the form [I3 , I3 , I3 ]. Here P = [I3 , I3 ]. So, −Pt = 3 = Q(say).
I3
So, the parity check matrix is
⎡ ⎤
1 0 0 1 0 0 0 0 0
⎢0 1 0 0 1 0 0 0 0⎥
⎢ ⎥
⎢0 0 1 0 0 1 0 0 0⎥
H = [Q, I6 ] = ⎢⎢ ⎥
1 0 0 0 0 0 1 0 0⎥
⎢ ⎥
⎣0 1 0 0 0 0 0 1 0⎦
0 0 1 0 0 0 0 0 1
E9) Suppose f(0) = 0. Then, f(x) = xi g(x) where i ≥ 1 and g(x) has degree
strictly greater than one and g(0) = 0. By the definition of order, we have
ord(f) = ord(g). Since the degree of g(x) is less than m and the order of
g(x) is at most the degree of g(x), if follows that ord(f) < m, a
contradiction.
E13) We have
s 4 = s1 + s0 = 1 s5 = s2 + s1 = 0 s6 = s3 + s2 = 1
s7 = s4 + s3 = 0 s8 = s5 + s4 = 1 s9 = s6 + s5 = 1
s10 = s7 + s6 = 1
We use the string we generated to encrypt the given text as follows:
(plaintext) 1010110011
(key) + 1001010111
(ciphertext) 0011100100
78
FURTHER READING Applications of Finite Fields
79