Hadamard ideals and Hadamard matrices with two circulant cores
نویسندگان
چکیده
We apply Computational Algebra methods to the construction of Hadamard matrices with two circulant cores, given by Fletcher, Gysin and Seberry. We introduce the concept of Hadamard ideal for this construction to systematize the application of Computational Algebra methods. Our approach yields an exhaustive search construction of Hadamard matrices with two circulant cores for this construction for the ten first admissible values 3, 5, 7, 9, 11, 13, 15, 17, 19, 21. For each of these ten parameter values, the number of non-equivalent such Hadamard matrices is proportional to the square of the parameter.
منابع مشابه
Hadamard ideals and Hadamard matrices with circulant core
Computational Algebra methods have been used successfully in various problems in many fields of Mathematics. Computational Algebra encompasses a set of powerful algorithms for studying ideals in polynomial rings and solving systems of nonlinear polynomial equations efficiently. The theory of Gröbner bases is a cornerstone of Computational Algebra, since it provides us with a constructive way of...
متن کاملHeuristic algorithms for Hadamard matrices with two circulant cores
We design heuristic algorithms to construct Hadamard matrices with two circulant cores. This hard combinatorial problem can be formulated in terms of objective functions of several binary variables, so that heuristic methodologies can be used. Our algorithms are based on local and tabu search and they use information on the geometry of the objective function landscapes. In addition, we use the ...
متن کاملEncryption Schemes based on Hadamard Matrices with Circulant Cores
In this paper, we propose two encryption schemes based on Hadamard matrices with one and two circulant cores, which are classes of combinatorial designs. A cryptanalysis of the proposed schemes against some popular attacks, brute force, plaintext attacks and ciphertext attacks is explored and our study shows that these attacks does not compromise the security of the system. Furthermore, we make...
متن کاملWeaknesses in Hadamard Based Symmetric Key Encryption Schemes
In this paper security aspects of the existing symmetric key encryption schemes based on Hadamard matrices are examined. Hadamard matrices itself have symmetries like one circulant core or two circulant core. Here, we are exploiting the inherent symmetries of Hadamard matrices and are able to perform attacks on these encryption schemes. It is found that entire key can be obtained by observing t...
متن کاملA Note on the Circulant Hadamard Conjecture
This note reports work in progress in connection with Ryser’s conjecture on circulant Hadamard matrices.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Eur. J. Comb.
دوره 27 شماره
صفحات -
تاریخ انتشار 2006