Groebner-bases approach to fast chase decoding of generalized Reed-Solomon codes

Information

  • Patent Grant
  • 10404407
  • Patent Number
    10,404,407
  • Date Filed
    Tuesday, August 22, 2017
    7 years ago
  • Date Issued
    Tuesday, September 3, 2019
    5 years ago
Abstract
An application specific integrated circuit (ASIC) tangibly encodes a program of instructions executable by the integrated circuit to perform a method for fast Chase decoding of generalized Reed-Solomon (GRS) codes. The method includes using outputs of a syndrome-based hard-decision (HD) algorithm to find an initial Groebner basis G for a solution module of a key equation, upon failure of HD decoding of a GRS codeword received by the ASIC from a communication channel; traversing a tree of error patterns on a plurality of unreliable coordinates to adjoin a next weak coordinate, where vertices of the tree of error patterns correspond to error patterns, and edges connect a parent error pattern to a child error pattern having exactly one additional non-zero value, to find a Groebner basis for each adjoining error location; and outputting an estimated transmitted codeword when a correct error vector has been found.
Description
BACKGROUND
Technical Field

Embodiments of the present disclosure are directed to methods of forming error correcting codes.


Discussion of the Related Art

In coding theory, generalized Reed-Solomon (GRS) codes form a class of error-correcting codes (ECCs) that are constructed using finite fields. GRS codes can be defined as follows. Let q be a prime power, and let custom characterq be the finite field of q elements. We will consider a primitive GRS code, C, of length n:=q−1 and designed distance d∈custom character*, d≥2. Note that since the most general GRS code, as defined, e.g., in Section 5.1 of R, M. Roth, Introduction to Coding Theory, Cambridge University Press, 2006, the contents of which are herein incorporated by reference in their entirety, may be obtained by shortening a primitive GRS code, there is no loss of generality in considering only primitive GRS codes. Let ã=(ã0, . . . , ãn−1)∈(custom character*q)n be a vector of non-zero elements. For a vector f=(f0, f1, . . . , fn−1)∈custom characterqn, let f(X):=f0+f1X+ . . . +fn−1Xn−1custom characterq[X]. Now C⊆custom characterqn is defined as the set of all vectors f∈custom characterqn for which ã(X)⊙f(X) has roots 1, α, . . . , αd−2 for some fixed primitive α∈custom characterq, where (-⊙-) stands for coefficient-wise multiplication of polynomials: for f(X)=Σi=0r fiXi and g(X)=Σi=0s giXi, let m:=min{r, s}, and define f(X)⊙g(X):=Σi=0m figiXi. GRS codes allow a precise control over the number of symbol errors and erasures correctable by the code during code design, in particular, it is possible to design GRS codes that can correct multiple symbol errors and erasures. GRS codes can also be easily decoded using an algebraic method known as syndrome decoding. This can simplify the design of the decoder for these codes by using small, low-power electronic hardware.


The syndrome of a received codeword y=x+e, where x is the transmitted codeword and e is an error pattern, is defined in terms of a parity matrix H. A parity check matrix of a linear code C is a generator matrix of the dual code C, which means that a codeword c is ire C iff the matrix-vector product Hc=0. Then, the syndrome of the received word y=x+e is defined as S=Hy=H(x+e)=Hx+He=0+He=He. For GRS codes, it is useful to work with a syndrome that corresponds to a particular parity-check matrix. For j∈{0, . . . , d−2}, let Sj=Sj(y):=(ã⊙y)(αj). The syndrome polynomial associated with y is S(y)(X):=S0+S1X+ . . . +Sd−2Xd−2. By the definition of a GRS code, the same syndrome polynomial is associated with e. In terms of syndromes, the main computation in decoding GRS codes is to determine polynomials ω(X), σ(X)∈custom characterq[X], that satisfy the following equation, known as a key equation:

ω≡Sσ mod(Xd−1),

where S=S(y) is the syndrome polynomial, X is a free variable in the polynomial, ω(X)∈custom characterq[X] is the error evaluator polynomial (EEP), defined by ω(X):=Σi=1εβiαiΠj≠i (1−αjX), σ(X)∈custom character2m[X] is the error locator polynomial (ELP), defined by σ(X):=Πi=1ε(1+αiX), where ε∈{1, . . . , n} is the number of errors, α1, . . . , αεcustom character*q are the error locators, that is, field elements pointing to the location of the errors, β1, . . . , βεcustom character*q are the corresponding error values, and ai:=ãi, for the i′∈{0, . . . , n−1} with αii′.


The Berlekamp-Massey (BM) algorithm is an algorithm for decoding GRS codes that finds an estimated ELP C(X)=1+C1X+C2X2+ . . . +CLXL which results in zero coefficients for Xk in S(X)C(X) for k=L, . . . , d−2 Sk+C1Sk−1+ . . . +CLSk−L=0, where L is the number of errors found by the algorithm, N=d−1 is the total number of syndromes, Si is the coefficient of Xi in the syndrome polynomial S(X) for all i, and k is an index that ranges from L to (N−1). Note that once the decoder has an estimate of the ELP, it can calculate an estimate of the EEP by the key equation. Note also that having both the ELP and the EEP, the decoder can find both the error locators and the error values, and therefore the error vector e itself, in the following way. The error locators are, by definition, the inverses of the roots of the EEP. The error values can be found using Forney's formula:








β
j

=


-


α
j


a
j



·


ω


(

α
j

-
1


)




σ




(

α
j

-
1


)





,

j
=
1

,





,
ɛ
,





where for a polynomial f(X)=Σi=0mγiXl, f′(X):=Σi=1miXi−1 is the formal derivative.


The BM algorithm begins by initializing C(X) to 1, L to zero; B(X) (a copy of the last C(X) since L was updated) to 1, b (a copy of the last discrepancy d since L was updated and initialized) to 1; and m (the number of iterations since L, B(X), and b were updated and initialized) to 1. The algorithm iterates from k=0 to N−1. At each iteration k of the algorithm, a discrepancy d is calculated:

d=Sk+CjSk−1+ . . . +CLSs−L.

If d is zero, C(X) and L are assumed correct for the moment, in is incremented, and the algorithm continues.


If d is not zero and 2L>k, C(X) is adjusted so that a recalculation of d would be zero;

C(X)=C(X)−(d/b)XmB(X).


The Xm term shifts B(X) to follow the syndromes corresponding to b. If the previous update of L occurred on iteration j, then m=k−j, and a recalculated discrepancy would be:

d=Sk+C1Sk−1+ . . . −(d/b)(Sj+B1Sj−1+ . . . ).

This would change a recalculated discrepancy to: d=d−(d/b)b=d−d=0. Then, m is incremented, and the algorithm continues.


On the other hand, if d is not zero and 2L≤n, a copy of C is saved in vector T, C(X) is adjusted as above, B is updated from T, L is reset to (k+1−L), the discrepancy d is saved as b, in is reset to 1, and the algorithm continues.


A Chien search is an algorithm for determining roots of polynomials over a finite field, such as ELPs encountered in decoding GRS codes. Let a be a primitive element of a finite field. Chien's search tests the non-zero elements in the field in the generator's order α0, α1, α2, . . . . In this way, every non-zero field element is checked. If at any stage the resultant polynomial evaluates to zero, then the associated element is a root.


Hard information for a received symbol in Fq is the estimated symbol value, i.e., one of 0, 1, α, . . . , αq−2, while “soft information” includes both an estimated value and the reliability of this estimation. This reliability may take many forms, but one common form is the probability, or an estimation of this probability, that the estimation is correct, possibly plus a subset of Fq of the most probable alternative estimates for the received symbol. For example, if symbols of the GRS code are mapped to Quadrature Amplitude Modulation (QAM) symbols and transmitted through an Additive White Gaussian Noise (AWGN) channel, then the typical hard information may be obtained from the closest QAM symbol to the received coordinate, while for soft information, the reliability can be obtained by some decreasing function of the distance between the received coordinate and the closest QAM symbol, and the subset of Fq of the most probable alternative estimates may be, e.g., the symbols corresponding to the 2nd, 3rd, . . . , M-th (for some M≤q), closest QAM symbols to the received coordinate.


In hard-decision (HD) decoding, the hard-information vector (per-coordinate symbol estimates) is used as the input of an error-correcting code (ECC) decoder, while in soft-decision (SD) decoding, a soft information vector, e.g., per-coordinate reliability vector and, for each coordinate that is considered unreliable, a subset of Fq consisting of the most probable alternative estimates, on top of the hard-information vector, is used as the input of the ECC decoder.


As another example, in generalized concatenated coding schemes that may be employed in flash-memory controllers, decoders of per-row binary codes may return estimated symbols for GRS codes that work between different rows. In such a case, each per row binary decoder may output a single estimated GRS symbol or an indication of erasure in case of HD decoding, while SD decoding of the per-row binary codes may result in SD information for the inter-row GRS codes. In the case of a single-level cell (SLC) flash memory, in which each cell stores a single bit, hard information for the per-row binary codes is obtained with a single read (single threshold), while increasingly refined soft information is obtained from additional reads.


Symbols with a high enough reliability may be considered “strong”, while the remaining symbols may be considered “weak”.


Chase decoding is a simple and general method for SD decoding for both binary and non-binary codes. See D. Chase, “A Class of Algorithms for Decoding Block Codes With Channel Measurement Information”, IEEE Trans, inform. Theory, Vol. IT-18, pp. 170-182, January 1972, the contents of which are herein incorporated by reference in their entirety. In its simplest form, in case of HD decoding failure, “soft” reliability information is used to distinguish between reliable and non-reliable coordinates of a received word. The decoder then tries to replace the symbols on the weak coordinates by the symbol-vectors in some pre-defined list. For each such replacement, the decoder performs HD decoding. If the number of errors on the reliable coordinates is not above the HD decoding radius of the code and the hypothesized replacement vector is close enough to the transmitted vector on the non-reliable coordinates, in terms of Hamming distance, then HD decoding will succeed.


Consider now two replacement vectors that differ on a single coordinate. In a naïve application of Chase decoding, the similarity between these two replacement vectors is ignored, and two applications of HD decoding are required. In fast Chase decoding, intermediate results from the HD decoding of the first pattern are saved, and used to significantly reduce the complexity of HD decoding of the second, almost identical, pattern.


Recently, Wu, “Fast Chase decoding algorithms and architectures for Reed-Solomon codes”, IEEE Trans. Inform. Theory, vol. 58, no. 1, pp. 109-129, January 2012, the contents of which are herein incorporated by reference in their entirety, hereinafter Wu2012, introduced a new fast Chase decoding algorithm for Reed-Solomon (RS) codes for the case where the HD decoder is based on the Berlekamp-Massey (BM) algorithm. The basic form of Wu's algorithm enables avoiding multiple applications of the BM algorithm, but still requires an exhaustive root search, such as a Chien search, for each replacement vector. To avoid also unnecessary Chien searches, Wu suggests a stopping criterion for significantly reducing the probability of an unnecessary Chien search, while never missing the required Chien search, at the cost of slightly degrading the performance. However, Wu's method is conceptually complicated. There are 8 distinct cases to consider, and a considerable modification is required for working in the frequency domain, as an alternative method for avoiding Chien searches, etc. In addition, Wu's method is not capable of handling the case where the total number of errors is larger than d−1.


SUMMARY

Exemplary embodiments of the disclosure provide a new fast Chase algorithm for generalized RS (GRS) codes for syndrome-based HD decoders. The new decoder is conceptually simpler than Wu's, and is based on two applications of Koetter's algorithm for each additional modified symbol. Also, the new decoder is automatically suitable for application in the frequency domain, by tracking evaluation vectors of both a polynomial and its formal derivative, Embodiments of the disclosure also provide a new stopping criterion for avoiding unnecessary Chien searches in a fast Chase algorithm according to an embodiment. An embodiment of an algorithm is somewhat more complicated than Wu's algorithm, but, as opposed to Wu's algorithm, is capable of working when the total number of errors is strictly larger than d−1, where d is the minimum distance of the decoded GRS code. Another embodiment of an algorithm works when the total number of errors is smaller than d−1 and has a complexity similar to that of Wu's algorithm”.


According to an embodiment of the disclosure, there is provided an application specific integrated circuit (ASIC) tangibly encoding a program of instructions executable by the integrated circuit to perform a method for fast Chase decoding of generalized Reed-Solomon (GRS) codes. The method includes using outputs of a syndrome-based hard-decision (HD) algorithm to find an initial Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for a solution module of a key equation, upon failure of RD decoding of a GRS codeword received by the ASIC from a communication channel; traversing a tree of error patterns in







E

i
1


×

×

E

i

n
0








on a plurality of unreliable coordinates to adjoin a next weak coordinate wherein n0 is a number of the unreliable coordinates, i1, . . . , in0 are the unreliable coordinates, vertices of the tree of error patterns correspond to error patterns, and edges connect a parent error pattern to a child error pattern having exactly one additional non-zero value, to find a Groebner basis G+ for each adjoining error location; and outputting an estimated transmitted codeword {circumflex over (x)}:=y+ê when correct error vector ê has been found.


According to a further embodiment of the disclosure, the syndrome-based HD algorithm is selected from a group that includes the Berlekamp-Massey (BM) algorithm and Fitzpatrick's algorithm.


According to a further embodiment of the disclosure, finding an initial Groebner basis G includes defining polynomials b1:=(Sσ mod Xd−1, σ), and b2 (SXmB mod Xd−1, XmB), wherein S is the syndrome polynomial, σ is the estimated ELP output by the BM algorithm, m is the number of iterations since the last linear feedback shift register (LFSR) length change in the BM algorithm, and B is a polynomial output from the BM algorithm that is a copy of the last estimated ELP σ before the LFSR length L was updated; and outputting one of (1) c{b1, b2} as the Groebner basis when leading monomials of b1 and b2 contain distinct unit vectors, for a non-zero constant c; (2) {d(b1−cX1b2), db2} as the Groebner basis when the leading monomials contain a same unit vector and the leading monomial of b1 is at least as large as that of b2, wherein c∈K* and l∈N are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant, or (3) {db1, d(b2−cX1b1)} as the Groebner basis when the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, wherein c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant.


According to a further embodiment of the disclosure, traversing a tree of error patterns to find a Groebner basis G+ for each adjoining error location includes calculating a root discrepancy Δjrt:=gj1r−1) for j=0 and 1, wherein g0=(g00(X), g01(X)) and g1=(g10(X), g11(X)) constitute a current Groebner basis and αr is a next error location and r is a number of error locations; setting, when a set







J
:=


{


j


{

0
,
1

}


|


Δ
j
rt


0


}





,


g
j
+

:=

c


(


g
j

-



Δ
j
rt


Δ

j
*

rt




g

j
*




)








when (j≠j*), wherein j*∈J is such that a leading monomial of gj* is a minimum leading monomial of (gj) for all j∈J and c is a non-zero constant, or g+j:=c(X−αr−1)gj* when j=j*, wherein X is a free variable; setting gj:=g+j for j=0 and 1; calculating a derivative discrepancy Δjder:=βrαrg′j1r−1)+αrgj0r) for j=0 and 1, wherein βr is a value of location αr, and g′j1(X) is a formal derivative of gj1(X); setting, when a set







J
:=


{


j


{

0
,
1

}


|


Δ
j
der


0


}





,


g
j
+

:=

c


(


g
j

-



Δ
j
der


Δ

j
*

der




g

j
*




)








when (j≠j), wherein j*∈J is such that a leading monomial of M(gj*)=a minimum leading monomial of (gj) for j∈J and c is a non-zero constant, or g+j:=c(X−αr−1)gj* when j=j*.


According to a further embodiment of the disclosure, the method includes, when set J:={j∈{0, 1}|Δjrt≠0}=Ø or when set J:={j∈{0, 1}Δjder≠0}=Ø, setting g+j:=gj for j=0, 1, where g+0=(g+00, g+01) and g+1=(g+10, g+11) is a Groebner basis G+ for the next error locator.


According to a further embodiment of the disclosure, the method includes determining whether a root discrepancy is zero for j=1 and a derivative discrepancy is zero for j=1, and stopping setting of g+j, if it is determined that both the root discrepancy and the derivative discrepancy are zero for j=1.


According to a further embodiment of the disclosure, the method includes tracking a degree of Groebner basis function g00 with a variable d0 by increasing d0 by 1 whenever j*=0.


According to a further embodiment of the disclosure, the method includes tracking two polynomials g01(X), g11(X); and calculating, gj0r−1) by using the key equation for j=0, 1.


According to a further embodiment of the disclosure, calculating gj0r−1) includes calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1r−1. {tilde over (B)}k−(gj1)2t−1−k and result=result+Sk+1{tilde over (B)}k+1, wherein δ:=deg(gj1), {tilde over (B)}k is initialized to 0, (gj1)m is a coefficient of Xm in gj1, result is initialized to 0, and Sk+1 is a coefficient of the syndrome polynomial; updating result=result·(αr−1)2t; and outputting result. The steps of calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1 and result, updating result and outputting result are performed while adjoining the next weak coordinate αr.


According to a further embodiment of the disclosure, the method includes calculating and storing (αm−1)2t for all weak coordinates αm, wherein t=└(d−1)/2┘ is an error correction radius of a GRS code of designed distance d.


According to another embodiment of the disclosure, there is provided a non-transitory program storage device readable by a computer, tangibly embodying a program of instructions executed by the computer to perform the method steps for fast Chase decoding of generalized Reed-Solomon (GRS) codes.





DESCRIPTION OF THE DRAWINGS


FIG. 1 is a flowchart of Koetter's iterative algorithm for adjoining error locations, according to embodiments of the disclosure.



FIG. 2 is a flowchart of an algorithm for fast chase decoding of generalized Reed-Solomon codes according to embodiments of the disclosure.



FIG. 3 is a block diagram of a system for fast chase decoding of generalized Reed-Solomon codes, according to an embodiment of the disclosure.



FIG. 4 is a flow chart of an algorithm for efficiently calculating gj0r−1) when only gj1 is available, according to an embodiment of the disclosure.





DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Exemplary embodiments of the invention as described herein generally provide systems and methods for performing fast Chase decoding of generalized Reed-Solomon codes. While embodiments are susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the invention to the particular forms disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.


I. Overview

Embodiments of the disclosure use a combination of a syndrome-based hard decision algorithm, such as the Berlekamp-Massey algorithm, and Koetter's algorithm for fast Chase decoding of generalized Reed-Solomon codes, and therefore also for fast Chase decoding of their subfield subcodes. Ira case of hard-decision decoding failure, an algorithm according to an embodiment begins by finding a Groebner basis for the solution module of the key equation. This Groebner basis can be obtained from the existing outputs of the Berlekamp-Massey algorithm, or alternatively, the Euclidean algorithm or Fitzpatrick's algorithm (see P. Fitzpatrick, “On the key equation,” IEEE Trans. Inform. Theory, vol. 41, no. 5, pp. 1290-1302, September 1995, the contents of which are herein incorporated by reference in their entirety, hereinafter Fitzpatrick) may be used. Then, the above Groebner basis is used as an initial value in Koetter's algorithm, as described, e.g., in R. J. McEliece, “The Guruswami-Sudan decoding algorithm for Reed-Solomon codes,” IPN Progress Report, vol. 42-153, May 2003, the contents of which are herein incorporated by reference in their entirety. This leads to a tree-based Chase scheduling. Modifying an unmodified coordinate in the received vector amounts to 2 updates in Koetter's algorithm, and does not require updating syndromes. An algorithm according to an embodiment uses the same number of finite-field multiplications per iteration as Wu's algorithm, but it is conceptually simpler.


2. Preliminaries

Let q be a prime power, and let Fq be the finite field q elements. Consider a primitive generalized Reed-Solomon (GRS) code, C, of length n:=q−1 and designed distance d∈N*, d≥2, where N* is the set of positive integers. Since the most general GRS code can be obtained by shortening a primitive GRS code, there is no loss of generality in considering only primitive GRS codes. In detail, let ã=(ã0, . . . , ãn−1)∈(F*q)n be a vector of non-zero elements. For a vector f=(f0, f1, . . . , fn−1)∈Fqn, let f(X):=f0+f1X+ . . . +fn−1Xn−1∈Fqn[X]. Now C⊆Fqn is defined as the set of all vectors f∈Fqn for which ã(X)⊙f(X) has roots 1, α, . . . , αd−2 for some fixed primitive α∈custom characterq, where (-⊙-) stands for coefficient-wise multiplication of polynomials: for f(X)=Σi=0rfiXi and g(X)=Σi=0sgiXi, let m:=min{r, s}, and define f(X)⊙g(X):=Σi=0mfigiXi.


To recall the key equation, suppose that a codeword x∈C is transmitted, and the received word is y:=x+e for some error vector e∈Fqn. For j∈{0, . . . , d−2}, let Sj=Sj(y):=(ã⊙y)(αj). The syndrome polynomial associated with y is S(y)(X):=S0+S1X+ . . . +Sd−2Xd−2. By the definition of the GRS code, the same syndrome polynomial is associated with e.


If v∈Fqn is such that v(X)=Xi for some i∈{0, . . . , n−1}, then Sj(v)=(ã⊙v)(αj)=ãii)j, so that









S

(
v
)




(
X
)


=




a
~

i



(

1
+


α
i


X

+

+



(

α
i

)


d
-
2




X

d
-
2




)







a
~

i


1
-


α
i


X





mod


(

X

d
-
1


)





,





So, if the error locators are some distinct elements α1, . . . , αεcustom character*q, where ε∈{1, . . . , n} is the number of errors, and the corresponding error values are β1, . . . , βεcustom character*q, then












S

(
y
)




(
X
)







i
=
1

ɛ










β
i



a
i



1
-


α
i


X





mod


(

X

d
-
1


)





,




(
1
)








where αi:={tilde over (α)}i, for the i′∈{0, . . . , n−1} with αii′.


Defining the error locator polynomial, σ(X)∈Fq[X], by

σ(X):=Πi=1ε(1−αiX),

and the error evaluator polynomial, ω(X)∈Fq[X], by

ω(X):=Σi=1εαiβiΠj≠i(1−αjX),

it follows from EQ. (1) that

ω≡S(y)σ mod(Xd−1).  (2)

EQ. (2) is the so-called key equation.


Let

M0=M0(S(y)):={(u,v)∈Fq[X]2|u≡S(y)v mod(Xd−1)}.

be the solution module of the key equation. Next, recall that if the number of errors in y is up to t:=└(d−1)/2┘, then (ω, σ) is a minimal element in M0 for an appropriate monomial ordering on Fq[X]2, in fact, it is the unique minimal element (u,v)∈M0 with v(0)=1—see ahead for details. The monomial ordering of the following definition is the special case of the ordering <r corresponding to r=−1 of Fitzpatrick. If a pair (f(X), g(X)) is regarded as the bivariate polynomial f(X)+Yg(X), then this ordering is also the (1, −1)-weighted-lex ordering with Y>X

  • Definition 2.1: Define the following monomial ordering, <, on Fq[X]2:

    (Xi,0)<(Xj,0)iff i<j;(0,Xi)<(0,Xj)iff i<j;(Xi,0)<(0,Xj)iff i≤j−1.


The following proposition is a special case of Thm. 3.2 of Fitzpatrick. Its proof is included herein for completeness. Unless noted otherwise, LM(u,v) will stand for the leading monomial of (u,v) with respect to the above monomial ordering, <, and a “Groebner basis” will stand for a Groebner basis with respect to <. Note that in the following proposition, dH(y,x) represents the Hamming distance between vectors y and x.

  • Proposition 2.2: Using the above notation, suppose that dH(y,x)≤t. Let (u,v)∈M0(S(y))\{(0, 0)} satisfy LM(u,v)≤LM(ω, σ). Then there exists some scalar c∈F*q such that (u,v)=c·(ω,σ)=(c·ω(X), c·σ(X)). Hence, (ω, σ) is the unique minimal element (u,v) in M0 with v(1)=1.
  • Proof. First, note that if there exist (ũ, {tilde over (v)}), (u,v)∈M0(S(y)) and d1, d2∈N with d1+d2<d−1, gcd(ũ, {tilde over (v)})=1, deg(u), deg(ũ)≤d1, and deg(v), deg({tilde over (v)})≤d2, then there exists a polynomial f∈custom characterq[X] such that (u,v)=f·(ũ, {tilde over (v)}). To see this, note that from u≡S(y)v mod (Xd−1) and ũ≡S(y){tilde over (v)} mod(Xd−1), it follows that u{tilde over (v)}≡ũv mod(Xd−1). In view of the above degree constraints, the last congruence implies u{tilde over (v)}=ũx. Since gcd(ũ, {tilde over (v)})=1, it follows that ũ|u, {tilde over (v)}|v, and u/ũ=v/{tilde over (v)}. This establishes the claim.


Now let (u,v)∈M0(S(y)), and note that gcd(ω, σ)−1. If deg(v)>t≥deg(σ), then clearly LM(u,v)>LM(ω, σ)=(0, Xdeg(σ)). Similarly, if deg(u)>t−1≤deg(σ)−1, then LM(u,v)>LM(ω, σ). Hence, it may be assumed without loss of generality that deg(v)≤t and deg(u)≤t−1. The above claim then shows that (u,v)=f·(ω, σ) for some, F∈Fq[X]. If LM(u,v)≤LM(ω, σ), this must imply that f is a constant, as required. This also shows that LM(u,v)=LM(ω, σ).


It will also be useful to recall that the uniqueness in the previous proposition is an instance of a more general result:

  • Proposition 2.3: For a field K and for l∈N*, let < be any monomial ordering on K[X]l, and let M⊆K[X]l be any K[X]-submodule. Suppose that both f:=(f1(X), . . . , fl(X))∈M\{0} and g:=(g1(X), . . . , gl(X))∈M\{0} have the minimal leading monomial in M\{0}. Then there exists a c∈K* such that f=c·g.
  • Proof Suppose not. Since LM(f)=LM(g), there exists a constant c∈K* such that the leading monomial cancels in h:=f−cg. By assumption, h≠0, and LM(h)<LM(f), which is a contradiction.


3 Main Result

An observation according to an embodiment is that the LFSR minimization task A[σi], disclosed on page 112 of Wu2012, incorporated above, does not define a module, and can be replaced by a module minimization task. The possibility of using Koetter's algorithm as an alternative to Wu's method follows almost immediately from the following theorem.

  • Theorem 3.1: For r∈N, r≤n, for distinct α1, . . . , αr∈F*q, and for β1, . . . , βr∈F*q, let

    Mr=Mr(S(y)1, . . . ,αr1, . . . ,βr)

    be the set of all pairs (u,v)∈Fq[X]2 satisfying the following conditions:
  • 1. u≡S(y)v mod(Xd−1)
  • 2. ∀j∈{1, . . . , r}, v(αj−1)=0 and βjαjv′(αj−1)=−αju(αj−1) with αj:=ãj, for the j′ with αjj′.


    Then
  • 1. Mr is a K[X]-module.
  • 2. If dH(y,x)=t+r, αj, . . . , αr are error locations and β1, . . . , βr are the corresponding error values, then LW(ω,σ)=min {LM(u,v)|(u,v)∈Mr\{0}}.
  • Proof 1. Clearly, Mr is an Fq-vector space. For f(X)∈Fq[X] and (u,v) ∈Mr, it needs to be shown that f·(u,v)∈Mr. Clearly, (fu, fv) satisfies the required congruence, and also fv has the required roots. It remains to verify that for all j, βjαj(fv)′(αj−1)=αj(fu)(αj−1). Now,










(
fv
)





(

α
j

-
1


)


=




(


f



v

)



(

α
j

-
1


)


+


(

fv


)



(

α
j

-
1


)



=



(

fv


)



(

α
j

-
1


)


=




f


(

α
j

-
1


)


·


-

α
j




β
j



a
j






u


(

α
j

-
1


)



=


-


α
j



β
j



a
j






(
fu
)



(

α
j

-
1


)






,
,





where in the second equation v(αj−1)=0 was used, and in the third equation βjαjv′(αj−1)=αju(αj−1) was used (note that βjαj≠0).


2. The proof is by induction on r. For r=0, the assertion is just Proposition 2.2, Suppose that r≥1, and the assertion holds for r−1. Let {tilde over (y)} be obtained from y by subtracting βr from coordinate αr. Let {tilde over (σ)}:=σ/(1−αrX), the error locator for {tilde over (y)}, and let {tilde over (ω)} be the error evaluator for {tilde over (y)}. By the induction hypothesis,

LM({tilde over (ω)},{tilde over (σ)})=min{LM(u,v)|(u,v)∈Mr−1}  (3)
with
Mr−1:=Mr−1(S({tilde over (y)})1, . . . ,αr−11, . . . ,βr−1).

The following lemma will be useful,

  • Lemma: For (u,v)∈Mr, write {tilde over (v)}:=v/(1−αrX) and put h:=u−βrαr {tilde over (v)}. Then (1−αrX)|h(X). Moreover, writing {tilde over (h)}:=h/(1−αrX), the map ψ: (u,v)→({tilde over (h)}, {tilde over (v)}) maps Mr into Mr−1, and satisfies ψ(ω,σ)=({tilde over (ω)}, {tilde over (σ)}).
  • Proof of Lemma. Since v=(1−αrX) {tilde over (v)}, we get v′=−αr{tilde over (v)}+(1−αrX){tilde over (v)}′, and therefore v′(αr−1)=−αr{tilde over (v)}(αr−1). Hence,








h


(

α
r

-
1


)


=



u


(

α
r

-
1


)


-


β
r



a
r




v
~



(

α
r

-
1


)




=




-



β
r



a
r



α
r






v




(

α
r

-
1


)



-


β
r



a
r




v
~



(

α
r

-
1


)




=
0



,





which proves the first assertion.


For the second assertion, note first that








S

(

y
~

)





S

(
y
)


-




β
r



a
r



1
-


α
r


X




mod






(

X

d
-
1


)




,





and therefore










S

(

y
~

)




v
~






S

(
y
)




v
~


-




β
r



a
r



1
-


α
r


X





v
~




=




1

1
-


α
r


X





(



S

(
y
)



v

-


β
r



a
r



v
~



)





1

1
-


α
r


X





(

u
-


β
r



a
r



v
~



)



=

h
~



,





where “≡” stands for congruence modulo Xd−1, which implies that ({tilde over (h)}, {tilde over (v)}) satisfies the required congruence relation in the definition of Mr−1. Also, clearly {tilde over (v)}(αj−1)=0 for all j∈{1, . . . , r−1}. Finally, using v′=αr{tilde over (v)}+(1−αrX){tilde over (v)}′ again, it can be seen that for all j∈{1, . . . , r−1},









v
~





(

α
j

-
1


)


=




v




(

α
j

-
1


)



1
-


α
r



α
j

-
1





=



-


α
j



β
j



a
j




·


u


(

α
j

-
1


)



1
-


α
r



α
j

-
1






=


-


α
j



β
j



a
j




·



h
~



(

α
j

-
1


)


.









This proves that ψ maps Mr into Mr−1.


Finally, ψ(ω, σ)=({tilde over (h)}, {tilde over (σ)}) with {tilde over (h)}=(ω−βrαr{tilde over (σ)})/(1−αrX), and it is straightforward to verify that {tilde over (h)}={tilde over (ω)}. In detail, for ε:=t+r, let α′1, . . . , α′ε∈F*q be some enumeration of the error locators, let β′1, . . . , β′ε∈F*q be the corresponding error values, and let α′1, . . . , α′ε be the corresponding entries of the vector it {tilde over (α)}. Assume without loss of generality that α′εr, and hence β′εr. It follows that










h
~

=


ω
-


β
r



a
r



σ
~




1
-


α
r


X









=


1

1
-


α
ɛ



X





(





i
=
1

ɛ




β
i




a
i








j
=
1

,

j

i


ɛ



(

1
-


α
j



X


)




-


β
ɛ




a
ɛ







j
=
1


ɛ
-
1




(

1
-


α
j



X


)




)








=


1

1
-


α
ɛ



X





(




i
=
1


ɛ
-
1





β
i




a
i








j
=
1

,

j

1


ɛ



(

1
-


α
j



X


)




)








=





i
=
1


ɛ
-
1





β
i




a
i








j
=
1

,

j

1



ɛ
-
1




(

1
-


α
j



X


)




=


ω
~

.










This concludes the proof of the lemma.


Returning to the proof of the theorem, if (u,v)∈Mr and v=c·σ for some c∈F*q, then LM(u,v)≥(0, Xdeg(σ))=LM(ω, σ). Let (u,v)∈Mr\{0} be such that v≠cσ for all c∈F*q. Then, ψ(u,v)≠c({tilde over (ω)}, {tilde over (σ)}) for all c∈F*q, and hence

LM(ψ(u,v))>LM({tilde over (ω)},{tilde over (σ)})=(0,Xdeg(σ)−1),  (4)

where the inequality can be obtained by the induction hypothesis and Proposition 2.3. If the leading monomial of ψ(u,v) is of the form (0, Xj) for some j, then LM(ψ(u,v))=(0, Xdeg(v)−1), and EQ. (4) implies deg(v)>deg(σ), so that certainly LM(u,v)>LM(Ω, σ).


Suppose therefore that LM(ψ(u,v)) is of the form (Xj, 0) for some j, that is, LM(ψ(u,v))=(Xdeg(h)−1, 0). In this case, EQ. (4) implies that deg(h)−1>deg(σ)−2, that is, deg(h)≥deg(σ). But since h=u−βrαr{tilde over (v)}, this implies that at least one of u and {tilde over (v)} must have a degree that is at least as large as deg(σ). Now, if deg(u)≥deg(σ), that is, if deg(u)>deg(σ)−1, then LM(u,v)>LM(ω, σ)=(0, Xdeg(σ))). Similarly, if deg({tilde over (v)})≥deg(σ), then deg(v)>deg(σ), and again LM(u,v)>LM(ω, σ). This completes the proof.


Using the terminology of Theorem 3.1, for a pair (u(X), v(X)∈Mr−1, embodiments define the r-th root condition on (u,v) as v(αr−1)=0, so that the root condition on (u,v) involves only v, and the r-th derivative condition as βrαrv′(αr−1)=−αru(αr−1). The above pair (u,v) is in Mr⊂Mr−1iff it satisfies both the r-th root condition and the r-th derivative condition. When moving from Mj to Mj+1, two additional functionals are zeroed. It was already proved in the theorem that each Mj is a K[X]-module. Also, the intersection of Mj with the set of pairs (u, v) for which v(αj+1−1)=0 is clearly a K[X]-module. Hence, if each “root condition” comes before the corresponding “derivative condition,” two iterations of Koetter's algorithm can be used to move from a Groebner basis for Mj to a Groebner basis for Mj+1.

  • Remark: Note that for all r, Mr is free of rank 2. First, since Mr is a submodule of K[X]2, it is free of rank at most 2, a submodule of a free module over a principle ideal domain. Also, since both (Xd−1(1−αjX) . . . (1−αrX), 0) and (ω, σ) are in Mr, the rank is at least 2.


4 Koetter's Iterations for Chase Updates

A description of Koetter's iteration is presented in Appendix, below. Using the terminology of the appendix, in the current context l=1, and, as already mentioned, there are two types of Koetter iterations: one for a root condition, and the other for a derivative condition. For a fair comparison with Algorithm 1 of Wu2012, the version of Koetter's iteration presented herein does include inversions, in this version, the right-hand sides of the update rules are both divided by Δj*. Recall that multiplication of elements by non-zero constants takes a Groebner basis to a Groebner basis.


In the r-th root iteration, the linear functional D acts on a pair (u,v) as D(u,v)=v(αr−1), and hence on X·(u,v) as D(X·(u,v))=αr−1 D(u,v). In the r-th derivative iteration, which comes after the r-th root iteration,

D(u,v)=βrαrv′(αr−1)+αrur−1),

and therefore also










D


(

X
·

(

u
,
v

)


)


=



β
r





a
r



(
Xv
)






(

α
r

-
1


)


+



a
r



(
Xu
)




(

α
r

-
1


)










=




β
r



a
r



α
r

-
1





v




(

α
r

-
1


)



+

u


(

α
r

-
1


)



=


α
r

-
1




D


(

u
,
v

)





,








where (Xv)′=Xv′+v was used in the second equality and v(αr−1)=0. So, for both types of iterations, root condition and derivative condition, D(X·(u,v))/D(u,v)=αr−1 if D(u,v)≠0. Hence, the iteration corresponding to a single location αr has the following form.


Algorithm A: Koetter's Iteration for Adjoining Error Location αr:



FIG. 1 is a flowchart of Koetter's iterative algorithm for adjoining error locations, according to embodiments of the disclosure.

  • Input: A Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for Mr−1(S(y), α1, . . . , αr−1, β1, . . . , βr−1), with LM(gj) containing the j-th unit vector for j∈{0, 1}


The next error location, αr, and the corresponding error value, βr.

  • Output: A Groebner basis G+{g+0=(g+00, g+01)), (g+10, g+11)} for Mr(S(y), αj, . . . , αr, βj, . . . , βr) with LM(g+j) containing the j-th unit vector for j∈{0, 1}


    Algorithm, with references to the flowchart of FIG. 1:















Initialize stop := true
// Step 101


For type = root, der
// Step 103


 If type = der Then
// Step 105


  For j = 0, 1, set gj := gj+
// initiate with output of root step


 For j = 0, 1, calculate
// Step 107










  
Δj:={gj1(αr-1)iftype=rootβrargj1(αr-1)+αrgj0(αr-1)iftype=der












stop := stop and (Δ1 == 0))
// Step 109







if type == der and stop == true, exit









// Step 111, stopping criteria, described below








Set J := {j ∈ {0, 1}|Δj ≠ 0}
// Step 113


If J = ϕ Then
// Step 115


 For j = 0, 1, set g+j := gj
// Step 117


 Exit and process next error pattern









Let j* ∈ J be such that LM(gj*) = minj∈J{LM(gj)}
// Step 119








For j ∈ J
// Step 121


 If ≠ j* Then











  
Setgj+:=gj-ΔjΔj*gj*












 Else // j = j*



  Set g+j := (X − αr−1)gj*









Regarding the j≠j* part of step 121, note that multiplication by a non-zero constant is possible in other embodiments. For example, an update of the form gj+j*gj−Δjgj* is also allowed.


It should be noted that multiplying all elements of a Groebner basis by (possibly different) non-zero constants results in a Groebner basis. Hence, multiplying the outputs of Algorithm A by non-zero constants again gives a Groebner basis with the required properties. Moreover, in Algorithm A, if each update of the form







g
j
+

:=


g
j

-



Δ
j


Δ

j
*





g

j
*









or g+j*:=(X−αr−1)gj* is replaced by







g
j
+

:=

c


(


g
j

-



Δ
j


Δ

j
*





g

j
*




)







or g+j*:=c′(X−αr−1)gj*, respectively, where c, c′ are non-zero constants that may depend on j, then the output will still he a Groebner basis with the required properties.


A stopping criterion for a Koetter algorithm according to an embodiment for fast Chase decoding, implemented as steps 101, 109, and 111, is as follows. Suppose that (α1, β1), . . . , (αr, βr) are correct pairs of error locations and corresponding error values, and that, as above, r=ε−t, so that an error-locator polynomial is, up to non-zero multiplicative constant, the second coordinate of the output g1+ of the derivative step of Koetter's iteration for adjoining error-locator αr. However, it is expensive to perform a Chien search. However, suppose there exists one more erroneous location, αr+1, within the weak coordinates, with corresponding error value is βr+1. Then, according to embodiments of the disclosure, in Koetter's iteration for adjoining the pair (αr+1, βr+1) to (α1, β1), . . . , (αr, βr). Δ1=0 for both the root step and the derivative step. For the root step, this follows from the fact that αr+1−1 is a root of the ELP σ(X), and for the derivative step it follows from the fact that ω(X), σ(X) satisfy Forney's formula. Thus, checking if Δ1=0 for both the root step and the derivative step can serve as a stopping criterion. However, it is possible that Δ1=0 for both the root step and the derivative step even if there is not a correct error-locator polynomial, i.e., a false positive. The cost of handling a false positive is an increased complexity. However, even if the false positive rate is of the order 1/100, or even 1/10, the overall increase in complexity is negligible, and a Monte Carlo simulation can be used to obtain a reliable estimation in such situations. The cost of a stopping criterion according to an embodiment involves performing one more root step and half a derivative step for the discrepancy calculations for a sphere of radius r+1 when ε−t is only r. This reduces the overall complexity gain over a brute force Chien search. When ε−t=r, r+1 errors are needed in the weak coordinates, which slightly degrades the FER in comparison to a brute force Chien search. It is to be understood that the implementation of a stopping criteria according to an embodiment in steps 101, 109, and 111 is exemplary and non-limiting, and other embodiments of the disclosure can use different implementations to achieve a same result.


Next, according to an embodiment, consider some simplifications. The above scheme has two pairs of polynomials to be maintained, rather than just two polynomials. In the above form, the algorithm will work even if ε≥2t, where ε is the total number of errors. It should be noted that Wu's fast Chase algorithm does not have a version that supports more than 2t−1 errors. However, if ε≤2t−1, as supported by Wu's algorithm, there is no need to maintain the first coordinate of the Groebner basis. For this, two questions should be answered:

    • 1. How can gj0r−1) be calculated efficiently when only gj1 is available?
    • 2. How can LM(g0) be found without maintaining g00 (recall that the leading monomial of g0 is on the left)?


To answer the second question: introduce a variable d0 to track the degree of g00. Whenever j*=0, increase d0 by 1, and in all other cases keep d0 unchanged. Note that when 0∈J but 0≠j*, LM(g+0)=LM(g0), as shown in Appendix A, which justifies keeping d0 unchanged.


Recalling that the algorithm of FIG. 1 is invoked for any adjoined weak coordinate down the path front the root to a leaf, with the previous g1+ becoming the next g1, an implementation according to an embodiment of this answer would involve initializing d0=deg(g00) in the root of the tree, before any invocation of the algorithm of FIG. 1. In the process of executing the tree traversal, the d0 should be saved on vertices with more than one child and used as an initialization for all paths going down from that vertex to a leaf. A step of defining: LM(g0)=(Xdo, 0) would be performed after step 105, and an update step, if j*=0 then ++d0, would be performed after step 119. Note that, in going down a path to a leaf, d0 from a previous application of the algorithm of FIG. 1 should be used as an initial value for the next application of the algorithm.


Turning to the first question, it is known that for all r and all (u,v)∈Mr(S(y), α1, . . . , αr, β1, . . . , βr), then u≡S(y)v mod (X2t), and hence one can calculate u(αr−1) directly from v if deg(u)≤2t−1 (see ahead). So, a first task is to verify that if ε≤2t−1, so that r≤2t−1−t=t−1, then deg(g10)≤2t−1 and deg(g20)≤2t−1 for all Koetter's iterations involved in fast Chase decoding, assuming the hypotheses of Theorem 3.1 hold.


First, however, recall the following proposition, which is just a re-phrasing of Prop. 2 of Beelen, et al., “On Rational Interpolation-Based List-Decoding And List-Decoding Binary Goppa Codes”, IEEE Trans. Inform. Theory, Vol. 59, No. 6, pp. 3269-3281, June 2013 the contents of which are herein incorporated by reference in their entirety. For the sake of completeness, a proof is included in Appendix B. From this point on, a monomial in K[X]2 will be said to be on the left if it contains the unit vector (1, 0), and on the right if it contains the unit vector (0, 1).

  • Proposition 4.1: Let {h0=(h00, h01), h1=(h10, h11)} be a Groebner basis for M0 with respect to the monomial ordering <, and suppose that the leading monomial of h0 is on the left, while the leading monomial of h1 is on the right. Then deg(h00(X))+deg(h11(X))=2t.


With Proposition 4.1, it can be proven that for all iterations of Koetter's algorithm, deg(g10)≤2t−1 and deg(g20)≤2t−1 when ε≤2t−1. Before the proof, it will be useful to introduce some additional notation.


Definition 4.2: For i=1, . . . , r, j∈{0, 1}, and T∈{root, der} write gj(i; T)=(gj0(i; T), gj1(i; T)) and g+j(i; T)=(g+j0(i; T), g+j1(i: T)) for the values in the root step (T=root) or the derivative step (T=der) of Algorithm A corresponding to adjoining error location αj. Explicitly, the notation g0(i; root) and gt(i; root) are the values of the input variables g0 and g1 respectively, during the root iteration of the application of algorithm A for adjoining αi. Similarly, g0(i; der) and g1(i; der) are the values of the input variables g0 and g1, respectively, during the derivative iteration of the application of algorithm A for adjoining αi. By convention, {g0(1; root), g1(1; root)} is a Groebner basis for M0 with LM(g0(1; root)) on the left and LM(g1(1; root)) on the right.

  • Proposition 4.3: Suppose that the condition in part 2 of Theorem 3.1 holds. Then for all i∈{1, . . . , r}, all j∈{0, 1} and all T∈{root, der}, deg(gj0(i; T))≤ε and deg(gj1(i; T))≤ε, where ε=t+r is the total number of errors.
  • Proof. By Theorem 3.1, (ω, σ)=c·g+j(r; der) for some j∈{0, 1} and some c∈F*q, and hence necessarily (ω, σ)=c·g+1(r; der) for some c∈F*q, as the leading monomial of (ω, σ) is on the right. Note that for all i, j, and T, LM(g+j(i; T))≥LM(gj(i; T)) is true, and so for all i and T, LM(g1(i; T))≤LM(ω, σ)=(0, Xc) must be true, in particular, deg(g10(i; T))≤ε−1, and deg(g11(i; T))≤ε.


Turning to g0(i; T), note that for all i, j, and T, LM(g+j(i; T))>LM(gj(i; T)) for at most one j∈{0, 1}. Also, for j∈{0, 1} and for each i and T with LM(g+j (i; T))>LM(gj(i; T)), LM(g+j(i; T))=X LM(gj(i; T)) is true. Since the degree of the second coordinate of gj(i; T), the coordinate containing the leading monomial, must increase from deg(g1j(1; root)) for i=1 and T=root to deg(σ)=ε for i=r and T=der, it follows that

|{(i,T)|LM(g+1(i;T))>LM(g1(i;T))}|=ε−deg(g11(1;root)),

and therefore,







|

{


(

i
,
T

)

|


LM


(


g
0
+



(

i


;






T

)


)


>

LM


(


g
0



(

i


;






T

)


)




}

|




2





r

-

(

ɛ
-

deg


(


g
11



(

1


;






root

)


)



)




=


deg


(


g
11



(

1


;






root

)


)


+
r
-

t
.







Hence, for all i and T,










deg


(


g
00



(

i


;






T

)


)







deg


(


g
00



(

r


;






der

)


)




(


LM


(

on





the





left

)



does





not





decrease

)













deg


(


g
00



(

1


;






root

)


)


+

deg


(


g
11



(

1


;






root

)


)


+
r
-
t







=




t
+
r

=

ɛ







(

by





Proposition





4.1

)

.










Finally, since the leading monomial of g0(i; T) is on the left, it follows that deg(g01(i; T))−1<deg(g00(i; T)≤ε, which proves deg(g01(i; T))≤ε.


Using Proposition 4.3, gj0r−1) can be calculated in Algorithm A while maintaining only the right polynomials gj1(j∈{0, 1}). According to embodiments of the disclosure, an efficient O(t) method for calculating gj0r−1) is as follows.


For a polynomial v(X)∈K[X], assume that δ:=deg(v)≤ε≤2t−1, and write v(X)=v0+v1X+ . . . +v2t−1X2t−1. For short, write S(X)=S0+S1X+ . . . +S2t−1X2t−1:=S(y)(X). Then for β∈Fq, (Sv mod(X2t)) (β) can be expressed as

S0v0+(S0v1+S1v0)β+(S0v2+S1v1+S2v02+ . . . (S0v2t−1+S1v2t−2+S2v2t−3+ . . . +S2t−1v02t−1,  (5)


For j∈{0, . . . , 2t−1}, let Aj(v, β) be the sum over the j-th column of EQ. (5). Then

Aj(v,β)=Sjβj(v0+v1β+ . . . +v2t−1−jβ2t−1−j),

If 2t−1−j≥δ(=deg(v)), then Aj(v, β)=Sjβfv(β). Hence if β is a root of v(X), then

(Sv mod(X2t))(β)=Σj=02t−1Aj(v,β)=Σj=2t−δ2t−1Aj(v,β)  (6)


The sum on the right-hand side of EQ. (6) may be calculated recursively. For this, let

Ãj(v,β):=βjΣi=02t−1−jviβi,

so that Aj(v, β)=SjÃj(v, β). Then Ã2t−δ−1=0, and for all j∈{2t−δ−1, . . . , 2t−2},













A
~


j
+
1




(

υ
,
β

)



β

2





t



=


β
·




A
~

j



(

υ
,
β

)



β

2





t




-


υ


2





t

-
1
-
j


.






(
7
)







Calculating, β2t takes O(log2(2t)) squarings and multiplications. In fact, this can be calculated once, before starting the depth-first search in Wu's tree, for all non-reliable coordinates, not just for those corresponding to a particular leaf. After that, each one of the iterations of EQ. (7) in the calculation of the sum of EQ. (6 requires 2 finite-field multiplications: two for moving from Ãj(v, β)/β2t to Ãj+1(v, β/β2t, and one for multiplying by Sj+1 before adding to an accumulated sum. Then, after the calculation of the accumulated sum, one additional multiplication by β2t is required.



FIG. 4 is a flow chart of an algorithm for an answer to the first question, according to an embodiment of the disclosure. An algorithm according to an embodiment, with references to the steps of FIG. 4, is as follows.


Before starting an algorithm of FIG. 1:















 Calculate and store (αm−1)2t for all weak coordinates αm
// Step 40


Perform algorithm of FIG. 1 for weak coordinate αr−1
//Step 41







When adjoining a next weak coordinate αr, for any choice of the corresponding








error value βr, if type == der, perform the following steps:
//Step 42






InitializeB~2t-δ-1=0//B~jA~j+1(v,β)β2t,wherev=gj1andβ=αr-1;

Step 43





 Initialize resu1t=0



 For k = 2t − δ − 1, . . . , 2t − 2,
//Step 44


  Calculate and store {tilde over (B)}k+1 = αr−1 · {tilde over (B)}k − (gj1)2t−1−k



   // (gj1)m is the coefficient of Xm in gj1



  Update result = result + Sk+1{tilde over (B)}k+1



   //Sk+l is a syndrome polynomial coefficient



 Update result = result · (αr−1)2t



  // (αr−1)2t was pre-calculated once in the first step;
Step 45


 Output result // result is gj0 r−1) for j == 0, 1;
Step 46







Return to step 41 and repeat algorithm of FIG. 1 for next weak coordinate,








until all weak coordinates have been processed.
// Step 47









5. Fast Chase Decoding


FIG. 2 is a flowchart of an algorithm for fast chase decoding of generalized Reed-Solomon codes according to embodiments of the disclosure. As above, consider a primitive generalized Reed-Solomon (GRS) code, C⊆Fqn, of length n:=q−1, q be a prime power, and designed distance d∈N*, d≥2, and Fq be the finite field of q elements Given a received codeword y=x+e, where X∈C is a transmitted GRS codeword, C is a GRS code, and e is an error vector, a decoding algorithm begins at step 20 by calculating the syndrome polynomial S(y)(X) from the Channel output y, wherein S(y)(X):=S0+S1X+ . . . +Sd−2Xd−2 and Sj=Sj(y):=(ã⊙y)(αj), and applying a syndrome-based hard decision algorithm at step 21 to the input S(y)(X) to find the estimated error-locator polynomial (ELP) σ(X):=Πi=1ε(1−αiX). Exemplary syndrome-based hard decision algorithms include, but are not limited to, the Berlekamp-Massey (BM), Fitzpatrick's algorithm and the Euclidean algorithm.


Next, at step 22, check whether the syndrome-based hard decision algorithm succeeded in finding an error vector of weight up to t, where t is the error-correction radius of the GRS code, i.e.,






t
=


[


d
-
1

2

]

.






If the syndrome-based hard decision algorithm is the BM algorithm, then one way of doing this is to let the output of the BM algorithm be a pair ({circumflex over (σ)}, L), where {circumflex over (σ)}={circumflex over (σ)}(X) is the estimated ELP, while L is the LFSR length calculated in the BM algorithm. The decoding is a success if the following condition holds: deg({circumflex over (σ)}(X))=L and {circumflex over (σ)}(X) has L distinct roots in Fq.


If, at step 28, the HD decoding is successful, let the estimated error locations be the inverses of the roots of the estimated ELP {circumflex over (σ)}(X), calculate the error values, and estimate ê for the error vector from the estimated error locations and error values, and output the estimate {circumflex over (x)}:=y+ê for x.


According to embodiments, error values can be calculated by finding the error evaluator polynomial (EEP) ω(X)∈Fq[X], by ω(X):=Σi=1εαiβiΠj≠i(1−αjX), by substituting {circumflex over (σ)}(X) as the ELP in the key equation ω≡S(y)σ mod (Xd−1). According to other embodiments, error values can be calculated using Forney's formula.


Otherwise, if the HD decoding is unsuccessful, the unreliable (“weak”) coordinates and their potential error values are identified at step 24, and an initial Groebner basis G based on the outputs of the syndrome-based hard decision algorithm is found at step 25.


According to embodiment, if the syndrome based hard decision algorithm is the BM algorithm, finding an initial Groebner basis G based on the BM algorithm outputs includes defining b1:=(Sσ mod Xd−1, σ), and b2:=(SXmB mod Xd−1, XmB), where B is a polynomial output from the BM algorithm that is a copy of the last ELP before L was updated, and outputting one of (1) c{b1, b2} as the Groebner basis if the leading monomials of b1 and b2 contain distinct unit vectors, where c is a non-zero constant; (2) d{b1−cXlb2, b2} as the Groebner basis if the leading monomials contain the same unit vector and the leading monomial of b1 is at least as large as that of b2, where c∈K* and l∈N are chosen such that the leading monomial of b1 is canceled, and d is a non-zero constant; or (3) {db1, d(b2−cXlb1)} as the Groebner basis if the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, where c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled, and d is a non-zero constant.


Next, a subset of all possible error patterns








E

i
1


×

×

E

i

n
0




,





on the unreliable coordinates is scanned, where n0 is the number of unreliable coordinates, and i1, . . . , in0 are the unreliable coordinates. The subset of error patterns is formed into a tree, where vertices correspond to error patterns and edges connect a “parent” error pattern to a “child” error pattern having exactly one additional non-zero value.


At step 26, traverse the tree of error patterns until Δ1=0 for both the root and der steps, wherein moving from a vertex corresponding to an error pattern with error locations α1, . . . , αr−1 and corresponding error values β1, . . . , βr−1 to a child with one additional error location αr and corresponding error value βr corresponds to moving from a current Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for Mr−1(S(y), αj, . . . , αr−1, β1, . . . , βr−1), with LM(gj) containing the j-th unit vector for j∈{0, 1} to a Groebner basis G+={g+0=(g+00, g+01)), g+1=(g+10, g+11)} for Mr(S(y), α1, . . . , αr, β1, . . . , βr) with LM(g+j) containing the j-th unit vector for j∈{0, 1}. According to embodiments, Koetter's iteration Algorithm A for adjoining error locations αr can be used to move from the Groebner basis G to the Groebner basis G+.


The correct error pattern is reached if there is a total t+r of erroneous coordinates in y, and if α1, . . . , αr are indeed error locations and β1, . . . , βr are indeed the corresponding error values, and it is guaranteed that the output g1+ of the algorithm satisfies g1+=c·(ω, σ) for some non-zero constant c, where ω is the EEP and σ is the ELP. To use a simplified stopping criterion according to an embodiment, the maximum tree depth should be increased by 1, and a Chien search is performed only in case Δ1=0 for both the root and the derivative iterations. If there is one additional error locator αr+1 in the weak coordinates and the set of potential error patterns for coordinate αr+1 includes the correct error value βr+1 for αr+1, then the stopping criterion will succeed.


If, at step 27, a valid estimated error value ê was found, {circumflex over (x)}=y+ê is output at step 28 as an estimate for the transmitted codeword x. Otherwise, at step 29. If no such ê is found, a decoding failure is output.


According to embodiments, the complexity of an algorithm according to an embodiment can be roughly compared with one iteration of Wu's Algorithm 1, pp. 114-115 of Y. Wu, “Fast Chase Decoding Algorithms and Architectures for Reed-Solomon Codes”, IEEE Trans. Inform. Theory, Vol. 58, No. 1, pp. 109-129, January 2012, incorporated by reference above.


In Wu's iteration, there are 2 substitutions in polynomials of degrees typically growing from t to ε, and two calculations of substitutions of the form (Sf mod X2t)(x) based on the knowledge of f, using Wu's, EQS. (23) and (24). Each of the last two substitutions takes about 2t multiplications, noting that the internal sums of Wu's, EQS. (23) and (24) were already calculated for the first two substitutions.


In an algorithm according to an embodiment, there are 2 substitutions in polynomials of degrees typically growing from t to ε, two calculations of substitutions of the form (Sf mod X2t)(x) based on the knowledge of f using the recursion EQ. (7), each requiring about 2t multiplications, and two substitutions in the derivative g′j1, which, in characteristic 2 has non-zero coefficients only for even powers of X.


In a typical application of Wu's algorithm, there are 3 multiplications of a vector by a scalar, where the vector length typically grows from t to ε. On the other hand, in an algorithm according to an embodiment, there are 4 such multiplications, 2 for each one of the root and der steps. However, this advantage of Wu's algorithm is balanced by the following item.


Wu's method requires a syndrome update step that updates about t syndrome coordinates with a total of about t multiplications, which is completely avoided in an algorithm according to an embodiment.


Considering the above, the complexity of an algorithm according to an embodiment is somewhat higher than that of Wu's iteration. However, it is conceptually simpler. Also, an algorithm according to an embodiment is suitable for working in the so-called transform domain, using evaluation vectors of both the and the formal derivatives of the gj1. Moreover, an algorithm according to an embodiment can work also for the case where the total number of errors is strictly above d−1, by maintaining two pairs of polynomials.


6. System Implementations

It is to be understood that embodiments of the present disclosure can be implemented in various forms of hardware, software, firmware, special purpose processes, or a combination thereof. In one embodiment, the present disclosure can be implemented in hardware as an application-specific integrated circuit (ASIC), or as a field programmable gate array (FPGA). In another embodiment, the present disclosure can be implemented in software as an application program tangible embodied on a computer readable program storage device. The application program can be uploaded to, and executed by, a machine comprising any suitable architecture.



FIG. 3 is a block diagram of a system for fast chase decoding of generalized Reed-Solomon codes, according to an embodiment of the disclosure. Referring now to FIG. 3, a computer system 31 for implementing the present invention can comprise, inter alia, a central processing unit (CPU) 32, a memory 33 and an input/output (I/O) interface 34. The computer system 31 is generally coupled through the I/O interface 34 to a display 35 and various input devices 36 such as a mouse and a keyboard. The support circuits can include circuits such as cache, power supplies, clock circuits, and a communication bus. The memory 33 can include random access memory (RAM), read only memory (ROM), disk drive, tape drive, etc., or a combinations thereof. The present disclosure can be implemented as a routine 37 that is stored in memory 33 and executed by the CPU 32 to process the signal from the signal source 38. As such, the computer system 31 is a general purpose computer system that becomes a specific purpose computer system when executing the routine 37 of the present invention. Alternatively, as described above, embodiments of the present disclosure can be implemented as an ASIC or FPGA 37 that is in signal communication with the CPU 32 to process the signal from the signal source 38.


The computer system 31 also includes an operating system and micro instruction code. The various processes and functions described herein can either be part of the micro instruction code or part of the application program (or combination thereof) which is executed via the operating system. In addition, various other peripheral devices can be connected to the computer platform such as an additional data storage device and a printing device.


It is to be further understood that, because some of the constituent system components and method steps depicted in the accompanying figures can be implemented in software, the actual connections between the systems components (or the process steps) may differ depending upon the manner in which the present invention is programmed. Given the teachings of the present invention provided herein, one of ordinary skill in the related art will be able to contemplate these and similar implementations or configurations of the present invention.


While the present invention has been described in detail with reference to exemplary embodiments, those skilled in the art will appreciate that various modifications and substitutions can be made thereto without departing from the spirit and scope of the invention as set forth in the appended claims.


A. Koetter's Algorithm


For completeness, a self-contained presentation of Koetter's algorithm is presented hereinbelow, taken from Sect. VII.C of R. J. McEliece, “The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes”, IPN Progress Report, Vol. 42-453, May 2003, the contents of which are herein incorporated by reference in their entirety. For convenience, the current presentation of the algorithm is stated in the language of Groebner bases.


Let K be a field. Fork l∈N* and for a K[X]-submodule M of K[X]l+1 with rank(M)=l+1, suppose that there is a Groebner basis G={g0, . . . , gl} for M with respect to some monomial ordering < on K[X]l+1. In such a case, the leading monomials of the gj must contain distinct unit vectors, as otherwise, the leading monomial of two basis vectors would contain the same unit vector, so that the leading monomial of one vector divides the leading monomial of the other vector. In such a case, one of the basis vectors may be discarded which leaves a Groebner basis, which is, in particular, a set of less than l+1 generators for a free module of rank l+1, which is a contradiction. Thus, according to an embodiment, it may be assumed without loss of generality that the leading monomial of gj contains the j-th unit vector, for all j∈{0, . . . , l}, where coordinates of vectors are indexed by 0, . . . , l.


From this point on, according to an embodiment, < will stand for an arbitrary monomial ordering on K[X]l+1.


Now let D: K[X]l+1→K be a non-zero linear functional that satisfies the following property:

MOD M+:=M∩ker(D) is a K[X]-module,


Before proceeding, it may be useful to note that, as a consequence of the proof of validity of Koetter's algorithm appearing ahead, it holds that moving from M to M+ does not decrease the rank. The purpose of Koetter's algorithm is to convert the (l+1)-element Groebner basis G of M to an (l+1)-element Groebner basis G+−{g+0, . . . , g+l} of M+, while maintaining the property that LM(g+j) contains the f-th unit vector for all j∈{0, . . . , l}. From this point on, “Groebner basis” will mean a Groebner basis with respect to a fixed monomial ordering <.


Now, it can be proved that a single iteration of Koetter's algorithm has the required properties.


Koetter's Iteration without Inversions:




  • Input: A Groebner basis G={g0, . . . , gl} for the submodule M⊆Fql+1, with LM(gj) containing the j-th unit vector for all j.

  • Output: A Groebner basis G+={g+0, . . . , g+l} for M+ with LM(g+j) containing the j-th unit vector for all j, assuming MOD holds.

  • Algorithm:

















For j = 0, ..., l, calculate Δj := D(gj)



Set J := {j ∈ {0, ..., l}|Δj ≠ 0 }



If J = Ø, Then



   For j = 0, ..., l, set g+j := gj



   Exit



Let j* ∈ J be such that LM(gj*) = minj∈J{LM(gj)}



   /* the leading monomials are distinct, and so j* is unique */



For j ∈ J



   If j ≠ j*



      Set g+j := Δj*gj − Δjgj*



   Else /* j = j**/



      Set g+j*:= Δj*Xgj*− D(X gj*) gj*



      /* = ( Δj*X − D(X gj*)) gj**/









  • Proposition A.2: At the end of Koetter's iteration, it holds that G+={g+0, . . . , g+l} is a Groebner basis for M+ and for all j, LM(g+j) contains the j-th unit vector.

  • Proof: First note that by the linearity of D, at the end of Koetter's iteration, g+j∈M+ for all j. It will be proven that for all j,

  • LM(g+j)=min {LM(f)|f∈M+ and LM(f) contains the j-th unit vector}.


    This show that, since modules according to embodiments are over K[X], the leading monomial of every element in M+ is divisible by the leading monomial of some element from G+, and hence G+ is a Groebner basis.



For j∈{0, . . . l}, write

    • Mj:={f∈M\{0}|LM(f) contains the j-th unit vector}


      and
    • M+j:={f∈M+\{0}|LM(f) contains the j-th unit vector}.


      Note that since M+⊆M, it also holds that M+j⊆Mj for all j.


Take some j∈{0, . . . , l}. If j∈J, then since g+j=gj and LM(gj) is minimal in LM(Mj) ⊆LM(M+j), then certainly LM(g+j) is minimal in LM(M+j). This minimality follows from the assumptions on G. Similarly, if j∈J and j≠j*, then

LM(g+j)=LMj*gj−Δjgj*)=LM(gj),

and again, LM(g+j) is minimal in LM(M+j).


It remains to verify that if J≠Ø, then LM(g+j*)=min(LM(M+j*)). Note first that because < is a monomial ordering, LM(Xgj*)=X LM(gj*), and X LM(gj*)>LM(gj*). Hence, LM(g+j*)=X LM(gj*). In addition, X LM(gj*) is the immediate successor of LM(gj*) in LM(Mj*).


Suppose that there exists some hj*∈M+j* with LM(hj*)<LM(g+j*). It will be proven that this implies an infinite decreasing chain, and hence a contradiction. Because hj* is also in Mj*, then LM(hj*)≥LM(gj*) must be true, and therefore LM(gj*)≤LM(hj*)<LM(g+j*). But LM(g+j*) is the immediate successor of LM(gj*) in LM(Mj*), and therefore LM(hj*)=LM(gj*) must be true.


Let c∈K* be such that LM(gj*−chj*) is strictly smaller than LM(hj*)=LM(gj*) and set δ0:=gj*−chj*. Note that since gj*∉M+ while hj*∈M+, then δ0∉M+, and, in particular, δ0≠=0. Suppose that LM(δ0) contains the j0-th unit vector for some j0∈{0, . . . l}.


If j0∈J, then LM(δ0)<LM(gj*)≤LM(gj0), where the first inequality follows from the construction of δ0, and the second from the definition of j*. Since δ0∈Mj0, this contradicts the assumption on gj0.


It follows that j0∉J. By the minimality of LM(gj0) in LM(Mj0), there exists some d≥0 such that LM(δ0)=XdLM(gj0). Choose c∈K* such that the leading monomial cancels in δ1:=δ0−cXdgj0. Note that δ1∉M+, because δ0∉M+, while gj0∈M+ since j0∉J. Then by construction, δ1≠0, and LM(δ1)<LM(δ0)).


Suppose that LM(δ1) contains the j1-th unit vector. If j1∈J, then LM(δ1)<LM(δ0)<LM(gj*)≤LM(gj1), a contradiction, since δ1∈Mj1. Hence j1∉J. Continuing this way, an infinite strictly decreasing chain can be obtained, which is a contradiction.


B. Proof of Proposition 4.1


Since (S(y), 1) is in the Fq[X]-span of {h0, h1}, it follows that I∈(h01, h11), and hence that h01 and h11 are relatively prime. Now suppose that α(X), β(X)∈Fq[X] are such that α(X)h0−β(X)hj=(?, 0). Then α(X)h01(X)=β(X)h11(X), and because gcd(h01, h11)=1, this implies that h11(X)|α(X), h01(X)|β(X),









α


(
X
)




h
11



(
X
)



=


β


(
X
)




h
01



(
X
)




,





and these two equal rational functions are in fact a polynomial in Fq[X]. Write r(X)∈Fq[X] for this polynomial. Let π0: Fq[X]2→Fq[X] be the projection to the first coordinate. Now, the second coordinate of the vector

f:=h11(X)h0−h01(X)h1∈M0

is 0, and for α(X), β(X) as above, it follows from the above explanation that

α(X)h0−β(X)h1=r(X)f.

This shows that π0(f) has the lowest degree in π0 (M0∩{(?, 0)}). Now, as M0 is generated as an Fq[X]-module by {(X2t, 0), (S(y)(X), 1)}, this lowest degree is 2t. Hence deg(π0(f)) 2t. Now,










deg


(


π
0



(
f
)


)


=



deg


(




h
11



(
X
)





h
00



(
X
)



-



h
01



(
X
)





h
10



(
X
)




)









=



deg


(



h
11



(
X
)





h
00



(
X
)



)



,








because by assumption deg(h11)≥deg(h10)+1 and deg(h00)>deg(h01)−1, so that

deg(h11h00)>deg(h01h10).

This concludes the proof.

Claims
  • 1. An application specific integrated circuit (ASIC) tangibly encoding a program of instructions executable by the integrated circuit to perform a method for fast Chase decoding of generalized Reed-Solomon (GRS) codes, the method comprising the steps of: receiving, by the ASIC, a GRS codeword y=x+e from a communication channel, wherein where x is a transmitted GRS codeword, and e is an error vector;using outputs of a syndrome-based hard-decision (HD) algorithm to find an initial Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for a solution module of a key equation, upon failure of HD decoding of the GRS codeword;traversing a tree of error patterns in
  • 2. The ASIC of claim 1, wherein the syndrome-based HD algorithm is selected from a group that includes the Berlekamp-Massey (BM) algorithm and Fitzpatrick's algorithm.
  • 3. The ASIC of claim 1, wherein finding an initial Groebner basis G comprises: defining polynomials b1:=(Sσ mod Xd−1, σ), and b2:=(SXmB mod Xd−1, XmB), wherein S is the syndrome polynomial, σ is the estimated ELP output by the BM algorithm, m is the number of iterations since the last linear feedback shift register (LFSR) length change in the BM algorithm, and B is a polynomial output from the BM algorithm that is a copy of the last estimated ELP σ before the LFSR length L was updated; andoutputting one of (1) c{b1, b2} as the Groebner basis when leading monomials of b1 and b2 contain distinct unit vectors, for a non-zero constant c; (2) {d(b1−cXlb2), db2,} as the Groebner basis when the leading monomials contain a same unit vector and the leading monomial of b1 is at least as large as that of b2, wherein c∈K* and l∈N are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant, or (3) {db1, d(b2−cXlb1)} as the Groebner basis when the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, wherein c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant.
  • 4. The ASIC of claim 1, wherein traversing a tree of error patterns to find a Groebner basis G+ for each adjoining error location comprises: calculating a root discrepancy Δjrt:=gj1(αr−1) for j=0 and 1, wherein g0=(g00(X), g01(X)) and g1=(g10(X), g11(X)) constitute a current Groebner basis and αr is a next error location and r is a number of error locations;setting, when a set
  • 5. The ASIC of claim 4, further comprising, when set J:={j∈{0, 1}|Δjre≠0}=Ø or when set J:={j∈{0, 1}|Δjder≠0}=Ø, setting g+j:=gj for j=0, 1, wherein g+0=(g+00, g+01) and g+1=(g+10, g+11) is a Groebner basis G+ for the next error locator.
  • 6. The ASIC of claim 4, the method further comprising determining whether a root discrepancy is zero for j=1 and a derivative discrepancy is zero for j=1, and stopping setting of g+j, if it is determined that both the root discrepancy and the derivative discrepancy are zero for j=1.
  • 7. The ASIC of claim 4, further comprising tracking a degree of Groebner basis function g00 with a variable d0 by increasing d0 by 1 whenever j*=0.
  • 8. The ASIC of claim 4, further comprising: tracking two polynomials g01(X), g11(X); and calculating gj0 (αr−1) by using the key equation for j=0,1.
  • 9. The ASIC of claim 8, wherein calculating gj0(αr−1) comprises: calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1=αr−1·{tilde over (B)}k−(gj1)2t−1−k and result=result+Sk+1{tilde over (B)}k+1, wherein δ:=deg(gj1), {tilde over (B)}k is initialized to 0, (gj1)m is a coefficient of Xm in gj1, result is initialized to 0, and Sk+1 is a coefficient of the syndrome polynomial;updating result=result·(αr−1)2t; andoutputting result,wherein the steps of calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1 and result, updating result and outputting result are performed while adjoining the next weak coordinate αr.
  • 10. The ASIC of claim 9, further comprising calculating and storing (αm−1)2t for all weak coordinates αm, wherein t=└(d−1)/2┘ is an error correction radius of a GRS code of designed distance d.
  • 11. A non-transitory program storage device readable by a computer, tangibly embodying a program of instructions executed by the computer to perform the method steps for fast Chase decoding of generalized Reed-Solomon (GRS) codes, the method comprising the steps of: receiving, by the computer, a GRS codeword y=x+e from a communication channel, wherein where x is a transmitted ORS codeword, and e is an error vector;using outputs of a syndrome-based hard-decision (HD) algorithm to find an initial Groebner basis G={g0=(g00, g01), g1=(g10, g11)} for a solution module of a key equation, upon failure of HD decoding of the GRS codeword;traversing a tree of error patterns in
  • 12. The computer readable program storage device of claim 11, wherein the syndrome-based HD algorithm is selected from a group that includes the Berlekamp-Massey (BM) algorithm and Fitzpatrick's algorithm.
  • 13. The computer readable program storage device of claim 11, wherein finding an initial Groebner basis G comprises: defining polynomials b1:=(Sσ mod Xd−1, σ), and b2:=(SXmB mod Xd−1, XmB), wherein S is the syndrome polynomial, σ is the estimated ELP output by the BM algorithm, m is the number of iterations since the last linear feedback shift register (LFSR) length change in the BM algorithm, and B is a polynomial output from the BM algorithm that is a copy of the last estimated ELP σ before the LFSR length L was updated; andoutputting one of (1) c{b1, b2} as the Groebner basis when leading monomials of b1 and b2 contain distinct unit vectors, for a non-zero constant c; (2) {d(b1−cXlb2), db2} as the Groebner basis when the leading monomials contain a same unit vector and the leading monomial of b1 is at least as large as that of b2, wherein c∈K* and l∈N are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant, or (3) {db1, d(b2−cXlb1)} as the Groebner basis when the leading monomials contain the same unit vector and the leading monomial of b2 is strictly larger than that of b1, wherein c∈K* and l∈N* are chosen such that the leading monomial of b2 is canceled and d is a non-zero constant.
  • 14. The computer readable program storage device of claim 11, wherein traversing a tree of error patterns to find a Groebner basis G+ for each adjoining error location comprises: calculating a root discrepancy Δjrt:=gj1(αr−1) for j=0 and 1, wherein g0=(g00(X), g01(X)) and g1=(g10(X), g11(X)) constitute a current Groebner basis and αr is a next error location and r is a number of error locations;setting, when a set
  • 15. The computer readable program storage device of claim 14, further comprising, when set J:={j∈{0, 1}|Δjrt≠0}=Ø or when set J:={j∈{0, 1}|Δjder≠0}=Ø, setting g+j:=gj for j=0, 1, wherein g+0=(g+00, g+01) and g+1=(g+10, g+11) is a Groebner basis G+ for the next error locator.
  • 16. The computer readable program storage device of claim 14, the method further comprising determining whether a root discrepancy is zero for j=1 and a derivative discrepancy is zero for j=1, and stopping setting of g+j, if it is determined that both the root discrepancy and the derivative discrepancy are zero for j=1.
  • 17. The computer readable program storage device of claim 14, further comprising tracking a degree of Groebner basis function g00 with a variable d0 by increasing d0 by 1 whenever j*=0.
  • 18. The computer readable program storage device of claim 14, further comprising: tracking two polynomials g01(X), g11(X); and calculating gj0(αr−1) by using the key equation for j=0,1.
  • 19. The computer readable program storage device of claim 18, wherein calculating gj0(αr−1) comprises: calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1=αr−1·{tilde over (B)}k−(gj1)2t−1−k and result=result+Sk+1{tilde over (B)}k+1, wherein δ:=deg(gj1), {tilde over (B)}k is initialized to 0, (gj1)m is a coefficient of Xm in gj1, result is initialized to 0, and Sk+1 is a coefficient of the syndrome polynomial;updating result=result·(αr−1)2t; andoutputting result,wherein the steps of calculating and storing, for k=2t−δ−1 to 2t−2, {tilde over (B)}k+1 and result, updating result and outputting result are performed while adjoining the next weak coordinate αr.
  • 20. The computer readable program storage device of claim 19, further comprising calculating and storing (αm−1)2t for all weak coordinates αm, wherein t=└(d−1)/2┘ is an error correction radius of a GRS code of designed distance d.
US Referenced Citations (13)
Number Name Date Kind
7254165 Xie et al. Aug 2007 B2
7900122 Shen et al. Mar 2011 B2
8149925 Goldman et al. Apr 2012 B2
8209590 Shen et al. Jun 2012 B2
8245117 Wu Aug 2012 B1
8327241 Wu et al. Dec 2012 B2
8495448 Shen et al. Jul 2013 B2
8650466 Wu Feb 2014 B2
8674860 Wu Mar 2014 B2
8850298 Wu Sep 2014 B2
8908810 Arambepola et al. Dec 2014 B2
20070153724 Cheon et al. Jul 2007 A1
20160301429 Shany et al. Oct 2016 A1
Non-Patent Literature Citations (11)
Entry
Maria Bras-Amoros, et al., “From the Euclidean Algorithm for Solving a Key Equation for Dual Reed-Solomon Codes to the Berlekamp-Massey Algorithm,” AAECC 2009, LNCS 5527, pp. 32-42, 2009.
Yingquan Wu, “Fast Chase Decoding Algorithms and Architecture for Reed-Solomon Codes,” IEEE Transaction on Information Theory, vol. 56, No. 1, Jan. 2012.
Xinmiao Zhang, “Interpolation-Based Chase BCH Decoder,” Information Theory and Applications Workshop (ITA), 2014, pp. 1-5.
Mostafa El-Khamy, et al., “Iterative Algebraic Soft-Decision List Decoding of Reed-Solomon Codes,”IEEE Journal on Selected Areas in Communications, vol. 24, No. 3, Mar. 2006.
James L. Massey, “Shift-Register Synthesis and BCH Decoding,” IEEE Transactions on Information Theory, vol. IT-15, No. 1, Jan. 1969, pp. 122-127.
Peter Beelen, et al., “On Rational-Interpolation Based List-Decoding and List-Decoding Binary Goppa Codes,” IEEE Transactions on Information Theory ( vol. 59, Issue: 6, Jun. 2013); pp. 1-16.
David Chase, “A Class of Algorithms for Decoding Block Codes With Channel Measurement Information,” IEEE Transaction on Information Theory, vol. IT-18, No. 1, Jan. 1972, pp. 170-182.
Patrick Fitzpatrick, “On the Key Equation.” IEEE Transaction on Information Theory, vol. 41, No. 5 Sep. 1995, pp. 1290-1302.
Rachit Agarwal, “On Computation of Error Locations and Values in Hermitian Codes,”, Proc., IEEE Intl. Symp. Info. Theory, pp. 1-10, Dec. 11, 2007.
Section 5.1 of R. M. Roth, Introduction to Coding Theory, Cambridge University Press, 2006.
R. J. McEliece, “The Guruswami-Sudan decoding algorithm for Reed-Solomon codes,” IPN Progress Report, vol. 42-153, May 2003.
Related Publications (1)
Number Date Country
20190068319 A1 Feb 2019 US