Algebraic generators of sequences for communication signals
09813181 ยท 2017-11-07
Assignee
Inventors
Cpc classification
H04B1/7136
ELECTRICITY
International classification
Abstract
A device for modulating communication signals comprises a transceiver for receiving and transmitting the signal, a storage medium storing computer implemented programme code components to generate sequences and a processor in communication with the storage medium and transceiver. The processor executes computer implemented programme code components to generate a family of shift sequences or arrays using exponential, logarithmic or index functions and a polynomial or a rational function polynomial in i.sub.p1 for a finite field
.sub.p of prime p. Multiple columns of the arrays are substituted with pseudo-noise sequences or other suitable good correlation sequences in a cyclic shift equal to the shift sequence for the respective column to generate a substituted array. The substituted array, or a sequence unfolded using the CRT from the array when the array dimensions are relatively prime, is applied to a carrier wave of the communication signal to generate a modulated communication signal.
Claims
1. A method of modulating a communication signal including: generating a family of shift sequences having lengths relatively prime using exponential, logarithmic or index functions and a polynomial or a rational function polynomial in i.sub.p1 for a finite field
.sub.p of prime p; substituting multiple columns of arrays having a relatively prime size with pseudo-noise sequences in a cyclic shift equal to the shift sequence for the respective column of the arrays to generate a substituted array; unfolding sequences from the arrays using Chinese Remainder Theorem; and applying the unfolded sequences to a carrier wave of the communication signal to generate a phase modulated communication signal; wherein the family of shift sequences includes at least one of: a (p1) p array having (p1) columns each of length p; a p(p1) array with p columns, each of length (p1) where the index function is used; a p(p+1) array with p columns, each of length (p+1): the family of shift sequences using a quadratic exponential map of Construction A1 or A2: or the family of shift sequences using a quadratic discrete logarithm map as an inverse of Construction A1 or A2.
2. The method of claim 1 wherein a shift sequence of the family has the form: s.sub.i=Ag.sup.2i+Bg.sup.i+C where g is a primitive root (generator) of Z.sub.p and i ranges from 1 to p1 where A, B, C are elements of the base field Z.sub.p.
3. The method of claim 1, wherein the step of generating the family of shift sequences includes one of the following: using full cycles generated by a rational function map, producing p (p +1) arrays with p columns, each of length (p+1), wherein the rational function map is the Family B rational function map; using known frequency hopping patterns, time hopping patterns or optical orthogonal codes; transforming known CDMA families into shift sequences, wherein the known CDMA families are one of the following: small Kasami sequences; large Kasami sequences; No-Kumar sequences.
4. The method of claim 1, wherein the pseudo-noise sequence is over any alphabet and can be one of the following: a binary or almost binary Legendre sequence; a ternary or polyphase Legendre sequence; a binary or polyphase m-sequence; a GMW sequence; a twin prime sequence; a Hall sequence; a Sidelnikov sequence; another low off-peak auto-correlation sequence.
5. The method of claim 1, wherein the substituted array is in the form of, or used for the modulation of one of the following: a bi-phase array for modulation of a CDMA signal; a multi-target tracking radar signal; a multi-target tracking sonar signal; an ultrasound signal; an optical orthogonal code array for modulation of an optical CDMA signal.
6. The method of claim 1, including substituting at least one column of the arrays with a constant column such that the substituted array is balanced and has symmetric auto-correlation values, optionally including substituting blank columns in the shift sequence to balance a CDMA sequence.
7. The method of claim 1, including substituting multiple rows of the arrays with an array comprising a maximum of one dot per row.
8. The method of claim 1, including constructing groups of families of sequences or arrays by applying invariance operations to parent arrays and unfolding the parent or the transformed arrays using the Chinese Remainder Theorem.
9. The method of claim 8, including assigning different groups of users different families of sequences or arrays.
10. The method of claim 1, wherein the shift sequences are used in their own right for one of the following: frequency hopping patterns; time hopping patterns; optical orthogonal codes; sonar sequences.
11. The method of claim 1 including increasing linear complexity by using a shift sequence and a column sequence in composition, optionally including unfolding the composition into a long sequence using the Chinese Remainder Theorem, so that the resulting multidimensional array can be used in image, audio, video or multimedia watermarking.
12. The method of claim 1 including generating a family of multidimensional arrays using a composition of a family of shift sequences or frequency hop patterns and a column sequence and modulating the phase of a multiplicity of orthogonal carriers and optionally dual polarization.
13. The method of claim 1, wherein the unfolded sequences are used as one of the following: an error correcting code; a cryptographic code.
14. The method of claim 1 including converting a column solitary sequence with low off-peak autocorrelation into a family of longer sequences or arrays with low off-peak autocorrelation and cross-correlation.
15. The method of claim 1 including unfolding a solitary array from Construction A1 or A2 using a degree one polynomial using Chinese Remainder Theorem, and substituting rows in a larger array used to produce Family B with commensurate row length with the unfolded solitary array, resulting in a family of even larger arrays with good correlation and high linear complexity.
16. The method of claim 15, wherein the substitution is performed as a cascade or the process is performed recursively.
17. The method of claim 1, wherein the family of sequences produced by using the shift sequence to construct arrays which are then unfolded using Chinese Remainder Theorem has a linear complexity greater than 45% of the sequence length, regardless of the sequence length.
18. The method of claim 1, wherein the shift sequence is obtained from an m-sequence, and the substitution column is a ternary or other non-binary pseudo-noise sequence, resulting in a new long pseudo-noise sequence obtained by Chinese Remainder Theorem from the array.
19. The method of claim 1, wherein a family of shift sequences is obtained by a combination of trace map and discrete logarithm from a singly or doubly periodic shift sequence produced by an m-sequence.
20. The method of claim 19, where the family thus produced is the small Kasami set, or the No-Kumar set.
21. A device for modulating a communication signal, the device comprising: a transceiver for receiving and transmitting the signal; a storage medium storing computer implemented programme code components to generate sequences; and a processor in communication with the storage medium and the transceiver to execute at least some of the computer implemented programme code components to cause: generating a family of shift sequences or arrays using exponential, logarithmic or index functions and a polynomial or a rational function polynomial in i .sub.p1 for a finite field
.sub.p of prime p; substituting multiple columns of the arrays with pseudo-noise sequences in a cyclic shift equal to the shift sequence for the respective column to generate a substituted array; and applying the substituted array, or a sequence unfolded from the array when the array dimensions are relatively prime, to a carrier wave of the communication signal to generate a modulated communication signal.
22. A device for modulating a communication signal, the device comprising: a transceiver for receiving and transmitting the signal; a storage medium storing computer implemented programme code components to generate sequences; and a processor in communication with the storage medium and the transceiver to execute at least some of the computer implemented programme code components to cause: generating a family of shift sequences having lengths relatively prime using exponential, logarithmic or index functions and a polynomial or a rational function polynomial in i .sub.p1 for a finite field
.sub.p of prime p; substituting multiple columns of arrays having a relatively prime size with pseudo-noise sequences in a cyclic shift equal to the shift sequence for the respective column of the arrays to generate a substituted array; unfolding sequences from the arrays using Chinese Remainder Theorem; applying the unfolded sequences to a carrier wave of the communication signal to generate a phase modulated communication signal; wherein the family of shift sequences includes at least one of: a (p1) p array having (p1) columns each of length p; a p(p1) array with p columns, each of length (p1) where the index function is used; a p(p+1) array with p columns, each of length (p+1): the family of shift sequences using a quadratic exponential map of Construction A1 or A2: or the family of shift sequences using a quadratic discrete logarithm map as an inverse of Construction A1 or A2.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) In order that the invention may be readily understood and put into practical effect, reference will now be made to preferred embodiments of the present invention with reference to the accompanying drawings, wherein like reference numbers refer to identical elements. The drawings are provided by way of example only, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16) Skilled addressees will appreciate that elements in the drawings are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, drawings may be schematic and the relative dimensions of some of the elements in the drawings may be distorted to help improve understanding of embodiments of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
(17) The present invention includes a new construction of codes for applications such as, but not limited to communications, mobile communications, radar, sonar, ultrasound and cryptography. In particular, the present invention includes a new construction of frequency hopping codes and methods of converting them into CDMA codes, which complement existing CDMA codes, and are superior in performance. One family of the new sequences is nearly optimal in terms of the Welch bound, whilst another is optimal, i.e. no better families can exist. It should be noted that these are the first such sequence families since Kasami (1966) and Gold (1967) announced their constructions, and since Welch (1974) discovered the bound.
(18) Performance criteria for communications, such as wireless CDMA, include the following seven criteria:
(19) 1. Off-peak autocorrelationa low bound is desirable;
(20) 2. Cross-correlationa low bound is desirable;
(21) 3. The largest family size is desirable. For binary sequences of a given length, this is constrained by the Welch bound;
(22) 4. Code length is usually dictated by the data rate and by the required family size;
(23) 5. Alphabet. Binary is preferred. Zeros (absence of carrier) are best avoided to maintain high efficiency;
(24) 6. Balance. The sequence should have equal number of +1's and 1's over a complete period. This is desirable so that the spectrum is flat and the residual carrier power is low for efficiency and low probability of intercept; and
(25) 7. Linear Complexity (LC). This is a measure of the minimum size of a shift register which could be used to generate the sequence, or the degree of a recursion polynomial to achieve the same. This should be as high as possible. The Berlekamp-Massey algorithm can determine the polynomial from 2LC terms of the sequence. Therefore, even an unsophisticated attacker can decode the sequence given 2LC terms received without error. Therefore, LC is a measure of the security of the sequence. A useful measure is the linear complexity expressed as a fraction of the sequence length, i.e. Normalized Linear Complexity (NLC). In CDMA, radar, watermarking and cryptography it is desirable to use long sequences with high NLC. All known constructions of families of sequences with low off-peak autocorrelation and low cross-correlation have NLC which asymptotes to zero as the sequence length increases. The constructions in accordance with the present invention are the first to produce families of sequences with NLC that does not asymptote to zero. In fact, many of the sequences have NLC between 0.5 and 0.9 and even higher, regardless of length. In watermarking applications, two-dimensional or multi-dimensional arrays are embedded in host data such as image, audio, or video. The methods described herein can be used to construct arrays with high multi-dimensional complexity which can be used as watermarks. Such watermarks are more secure because an attacker who manages to detect a part of the watermark cannot deduce the rest of the watermark from that information. For NLC=0.5 or greater, the attacker needs to detect the whole array.
(26) The present invention makes use of algebraic techniques applied to Finite (Galois) Fields. Embodiments of the present invention are based on families of patterns with low off-peak auto-correlation and low cross-correlation.
(27) With reference to
(28) Execution of at least some of the computer implemented programme code components includes generating a family of shift sequences or arrays using exponential, logarithmic or index functions and a polynomial in I .sub.p1 for a finite field
.sub.p of prime p.
(29) Execution of at least some of the computer implemented programme code components includes substituting multiple columns of the arrays with pseudo-noise sequences in a cyclic shift equal to the shift sequence for the respective column to generate a substituted array.
(30) Execution of at least some of the computer implemented programme code components includes applying the substituted array, or a sequence unfolded from the array when the array dimensions are relatively prime, to a carrier wave of the communication signal to generate a modulated communication signal 18.
(31) According to some embodiments, the sequence generator to produce the sequence sets of the present invention can be implemented in memory for relatively short sequences. For example, the sequences can be constructed off-line, using higher level packages, such as Mathematica, Maple, Matlab or Magma, and then stored in RAM and read out at a suitable clock rate. This method is limited by RAM capacity. For systems which already use this method of sequence generation, existing sequences can be replaced by sequences of the present invention without changes in firmware or software. According to other embodiments, longer sequences can be constructed on the fly using FPGA logic cells and shift registers. One block is used to construct a shift sequence and one block to construct a column sequence. The two results are combined into an array, which is read out sequentially as described herein.
(32) Generation of the families of shift sequences or arrays will now be described in detail followed by examples with reference to
(33) A base field is chosen and a multiplicative group associated with it. For, .sub.p this can be the group
.sub.p/{0}, which is of cardinality (p1) and has a generator (primitive root) g. Alternatively, it can be the set of all rationals Q i.e. quotients of any pair of members of
.sub.p, including 0. The cardinality of this group is (p+1) and its generator is a transformation mapping discovered and analyzed by O. Moreno in the 1970's. Henceforth, constructions based on this map are referred to as rational constructions. Every member of such groups can be expressed as a power of its generator. Therefore, the first construction defines an exponential mapping between the integers
.sub.p1 and
.sub.p/{0} and the second construction between
.sub.p+1 and {
.sub.pU}. An inverse (logarithmic) mapping is also possible. It is also envisaged that there are other mappings which possess the required properties.
(34) In accordance with embodiments of the present invention, a family of shift sequences or arrays is constructed using a polynomial or a rational function polynomial in i.sub.p1, e.g. the quadratic Ag.sup.2i+g.sup.i, where A is an arbitrary non-zero constant. In such a family of p1 shift sequences, the auto and cross hit values are bounded by 2. For higher degree polynomials, the bound is the degree of the polynomial. In accordance with embodiments of the present invention, these shift sequences can be used to encode communication signals. For example, the shift sequences can be used as new frequency hopping patterns with bounded correlation.
(35) In accordance with embodiments of the method of the present invention, the columns of the arrays can be substituted by different types of pseudo-noise sequences in a cyclic shift equal to the value of the shift sequence for the respective column of the array. Generally, if the substitution sequence is over +1 and 1, or higher roots of unity, and possibly includes a limited number of zeros, the resulting array can be applied to, for example, wireless CDMA. If the substitution sequence is over 1, 0 the resulting array can be used in, for example, optical CDMA or multi-tone frequency hopping.
(36) The arrays constructed in the example described above have sides p and p1 or p and p+1. These sizes are relatively prime and therefore these arrays can be unfolded using the Chinese Remainder Theorem into long sequences of length p(p1) or p(p+1).
(37) Patent application WO 2011/050390 by the present inventors, which is incorporated herein by reference, discloses the following construction D2 (Quadratic GeneralizationFamily of Arrays):
f.sub.A,B,C(i)=A(.sup.i).sup.2+B.sup.i+C, f:Z.sub.pm.sub.1.fwdarw.Z.sub.p.sup.m{0}
where A, B, C are elements of the finite field GF(p.sup.m). Any two arrays in this family of arrays which are multidimensional cyclic shifts of one another are called equivalent. The autocorrelation of such arrays and the cross-correlation between any non-equivalent arrays is bounded by two. This construction is listed in the section covering constructions in three dimensions and higher. However, for m=1 it can be used to generate two dimensional arrays, which can also be unfolded into one dimensional sequences.
(38) Consider a shift sequence:
s.sub.i=Ag.sup.2i+Bg.sup.i+C
where g is a primitive root of Z.sub.p and i ranges from 1 to p1. This is a shift sequence which generates a (p1) p array having (p1) columns each of length p.
(39) Vertical shifts of s.sub.i yield equivalent arrays (s.sub.i+vs.sub.i). A representative of the vertical shift equivalence class is selected by putting C=0:
s.sub.i=Ag.sup.2i+Bg.sup.i
(40) Horizontal shifts of s.sub.i yield equivalent arrays (s.sub.i+hs.sub.i):
s.sub.i+h=Ag.sup.2(i+h)+Bg.sup.i+h=Ag.sup.2(i+h)+(Bg.sup.h)g.sup.i
(41) As h runs through all values from 0 to p2, g.sup.h takes on all non-zero values in Z.sub.p including the multiplicative inverse of B. Therefore, a representative of the equivalence class of horizontal shifts can be taken as:
s.sub.i=Ag.sup.2i+g.sup.i
(42) There are p choices of A (including A=0, the exponential Welch construction), so there are p arrays in the family.
(43) Consider two such arrays s.sub.i=Ag.sup.2i+g.sup.i and s.sub.i=Ag.sup.2i+g and examine the cross-correlation between them. An array produced by s.sub.i is shifted horizontally by h and vertically by v:
=s.sub.is.sub.i+hv=A.sup.rg.sup.
=(Ag.sup.2hA)g.sup.2i+(g.sup.h1)g.sup.iv
This is a quadratic in g.sup.i. Hence there are at most 2 columns which can match in cyclic shift between the two arrays. This is also true for auto-correlation, where A=A. The array columns of the arrays are of length p, so they can be substituted by binary or almost binary Legendre sequences. For p=4k+1, the leading term of the Legendre sequence must be 0, whilst for p4k1, the leading term can be set to +1. The peak autocorrelation for a column is p1 for p=4k+1 and p for p=4k1. Hence, the array auto-correlation and cross-correlation values are as shown in TABLE 1 below:
(44) TABLE-US-00001 TABLE 1 Prime Autocorrelation Peak 0 Match 1 Match 2 Match 4k + 1 (p 1).sup.2 p + 1 1 p + 1 4k 1 p (p 1) p + 1 2 p + 3
(45) The arrays described above can be unfolded to yield sequences of length (p1)p. This is because gcd[(p1),p]=1. Therefore, the Chinese Remainder Theorem (CRT) can be employed. The process is equivalent to diagonal unfolding of the array. Clearly, the exponential construction is superior.
(46) With further reference to patent application WO 2011/050390, two matrices s.sub.i produced by mapping polynomials over finite fields using a logarithmic function are as follows:
(47) Construction A1
s.sub.i=log.sub.(A.sup.2i+B.sup.i+C)
(48) Construction A2
s.sub.i=log.sub.(A.sub.n.sup.ni+A.sub.n1.sup.(n1)i+ . . . +A.sub.k.sup.ki . . . A.sub.0)
(49) is a primitive element of Z.sub.p(p) and n is any positive integer, including 1. i is an index taking on the values 0, 1, 2, . . . , p2. s.sub.i takes on the values 0, 1, 2, . . . , p2, , where results from the argument of the log function being equal to 0. A, B, C and any of the A.sub.k are suitably chosen entries from Z.sub.p
(50) 1. Z.sub.p={0, .sup.1, .sup.2, . . . , .sup.p1}. In this context log refers to log.sub.x=j implies that x=.sup.j.
(51) 2. Construction A2 is a generalization of A1, where the family size is larger, but the auto and cross-correlations are also larger.
(52) 3. A matrix S is produced by placing an entry of 1 in the horizontal position i and vertical position s.sub.i and 0 elsewhere.
(53) 4. Note that the log mapping is 1:1, i.e. there is a single value of s.sub.i for each i.
(54) The matrices from A1 have the following property: for any non-zero doubly periodic shift of such a matrix, its auto correlation is equal to or less than 2. Some of the matrices generated are shifts of each other, and hence have bad correlation. There is an equivalence relation which makes (p1).sup.2 choices of A, B or C redundant, and hence there are approximately p inequivalent matrices in the family. It can be shown that all inequivalent quadratics can be represented by p choices of C in: s.sub.i=log.sub.(x.sup.2+x+C).
(55) Each of these matrices from A1 can be assigned to a different user. A doubly periodic cross-correlation between any pair of such matrices is also equal to or less than 2.
(56) Columns with in them can be replaced by a string of 0's. This reduces the peak autocorrelation by p1, but has almost no effect on the off-peak autocorrelation, or the cross-correlation. Where there is only one column with a , the column can be replaced by a string of constant values, including +1 or 1. The autocorrelation is even better than when the constant is 0 whilst the cross-correlation can increase by p1. When there are two or more entries with , the best option is to replace them by a string of 0's. This reduces the peak autocorrelation even further, and makes such arrays less desirable.
(57) For Construction A1, may occur 0,1, or 2 times, depending on the choice of A, B and C. 0 occurs if the polynomial is irreducible, 2 if it is reducible with two factors and 1 if it is a square.
(58) Therefore it is desirable for the quadratic in A1 to be irreducible. Quadratics of the form x.sup.2+x+C yield arrays, which are not related by two dimensional cyclic shifts, and are hence inequivalent. It can be shown that for odd p,
(59)
results in an irreducible quadratic, whilst for even p, a choice of C such that Tr.sub.p.sup.p.sup.
(60) With reference to
(61) 1,1,1,1,1, 1,1,1,1, 1,1,1,1,1,1,1,1,1, 1, 1, 1,1, 1,1, 1, 1, 1,1, 1, 1,1,1,1, 1,1, 1, 1, 1, 1, 1, 1,1.
(62) In binary format, this translates to:
(63) 0,0,0,0,0,1,0,0,0,1,0,0,0,0,0,0,0,0,1,1,1,0,1,0,1,1,1,0,1,1,0,0,0,1,0,1,1,1,1,1,1,0
(64) The auto-correlation values are as shown in TABLE 2.
(65) TABLE-US-00002 TABLE 2 Autocorrelation Value 6 +2 +10 +42 Frequency of Occurrence 19 14 8 1
(66) With reference to
(67)
where ADBC and A, B, C, DF.sub.p.sub.
(68)
gives a cycle or length p.sup.m+1. It is assumed now that the cycle given by
(69)
begins with 0 and ends with , and since 0.fwdarw., it goes 0.fwdarw., . . . , .fwdarw..
(70) The eighth column would normally be left blank, but in this embodiment, the method includes substituting the eighth column with a constant column, so that the resultant array is balanced and has symmetric autocorrelation values. The auto-correlation values are as shown in TABLE 3:
(71) TABLE-US-00003 TABLE 3 Autocorrelation Value +56 +8 0 B Frequency of Occurrence 1 16 16 23
(72) The array can be unfolded using CRT into a sequence, binary representation of which is:
(73) 1,0,1,1,1,1,0,1,1,1,0,0,1,1,0,1,1,1,0,1,0,0,0,0,0,1,1,0,1,1,0,1,1,0,1,0,0,0,0,0,0,1,1,1,0,0,0,0,0,0,0,1,1,1,0.
(74) A double periodic shift sequence of length (q+1)(q1) can also be constructed from a cycle generated by a rational function modulo q1. q+1 and q1 are relatively prime when q is a power of 2. Such constructions have two blank entries, compared with those of the type (q+1)q.
(75) For comparison of known codes with the codes generated in embodiments of the present invention, for example, the family of Gold codes of length 63 has off-peak autocorrelation and cross-correlation values of 17, 1 and +15. In general, the performance of sequence families depends on their length. Therefore, it makes sense to normalize the parameters and to compare sequences of similar length. The Linear Complexity (LC) of the sequences involved in the present invention up to length 25,000 was tested by computer using the Berlekamp Massey algorithm.
(76) The inventors have developed a theory which yields an estimate of the linear complexity for the new sequences. TABLE 4 below shows the performance of various constructions produced by embodiments of the present invention compared to the existing constructions. It is clear that many new lengths are added and, in general, the new sequences are superior. R refers to rational map, B refers to balanced Legendre column. The sequences according to embodiments of the present invention are available in many more lengths than traditional sequences, as seen in Table 4.
(77) TABLE-US-00004 TABLE 4 Normalized Balanced Total Efficiency Correlation Family Family Normalized Type Length % Bound Size Size Complexity Gold 31 100 0.29 17 33 0.32 Moreno Tirkel 2 (p = 7) 42 100 0.238 0 48 0.453 Moreno Tirkel 2B (p = 7) 42 85.7 0.222 48 48 >0.5* Moreno Tirkel 2R (p = 7) 56 100 0.143 48 48 0.768 Gold 63 100 0.27 33 65 0.19 Moreno Tirkel 2 (p = 1l) 110 100 0.127 0 120 0.455 Moreno Tirkel 2B (p = 11) 110 81.8 0.156 120 120 >0.5* Gold 127 100 0.13 65 129 0.11 Moreno Tirkel 2R (p = 11) 132 100 0.091 120 120 >0.5* Moreno Tirkel 2 (p = 13) 156 92.3 0.097 168 168 1 Moreno Tirkel 2R (p = 13) 182 85.7 0.095 168 168 1 Small Kasami 255 100 0.067 0 16 0.047 Large Kasami 255 100 0.129 0 4111 0.062 Moreno Tirkel 2 (p = 17) 272 94.1 0.07 288 288 1 Moreno Tirkel 2R (p = 17) 306 88.9 0.063 288 288 1 Moreno Tirkel 2 (p = 19) 342 100 0.064 0 360 >0.5* Moreno Tirkel 2B (p = 19) 342 89.5 0.072 360 360 >0.5* Moreno Tirkel 2R (p = 19) 380 100 0.053 360 360 >0.5* Moreno Tirkel 3R (p = 19) 380 100 0.105 6858 6858 >0.5*
(78) A comparison of the asymptotic behavior of various known sequence families with two of the sequence families of the present invention as L tends to infinity is shown in TABLE 5. The general form of the sequences generated by the present invention, which are derived from higher degree polynomials, is expected to be very useful to a CDMA designer, since it allows for a flexible number of users. The table shows sequences derived from polynomials of degree 2 and 3 only.
(79) TABLE-US-00005 TABLE 5 Normalized Balanced Total Correlation Family Family Normalized Type Bound Size Size Complexity Gold L = 2.sup.n 1 n odd L.sup.0.5 L/2 L 0 Gold L = 2.sup.n 1 n 2L.sup.0.5 L/2 L 0 even Small Kasami L.sup.0.5 0 L.sup.0.5 0 Large Kasami 2L.sup.0.5 0 L.sup.1.5 0 Moreno Tirkel L.sup.0.5 L L >0.5 degree 2 Moreno Tirkel 2L.sup.0.5 L.sup.1.5 L.sup.1.5 >0.5 degree 3
(80) Sequences can be generated mathematically by recursion polynomials, or practically by linear shift registers, which are a physical embodiment of these recursion polynomials. The inventors have established that the recursion polynomials for sequences in the exponential quadratic family have the same structure as the recursion polynomials of the column sequence used in the construction. The long sequence polynomial is obtained by raising the terms in the column sequence polynomial to the power (p1). This theory has been verified by computer for sequence lengths up to 25,000. The sequences in the families constructed using the rational function map are more complicated, because the columns in the parent array are of two types, so that other terms appear in their recursion polynomials.
(81) The theory has also been verified for ternary column sequences and for different substitutions for blanks in the shift sequence. By using the Legendre sequence as a column sequence, normalized complexities of at least 0.5 can be obtained for all sequence families of the present invention. This is regardless of sequence length. This is the first time such asymptotic performance has been achieved. This can be deduced by theoretical means and has been verified experimentally by the inventors. In fact, the inventors have developed an algebraic method of computing the linear complexity of the long sequence unfolded using CRT and even the recursion polynomial to generate the long sequence.
(82) The Berlekamp-Massey algorithm is a universally accepted means of analysing linear complexity, and hence the most likely tool of an attacker. The output of the Berlekamp-Massey algorithm is the recursion polynomial of the sequence under test. In order to compute the recursion polynomial, the Berlekamp-Massey algorithm requires 2LC terms of the sequence to be known without error. LC is the linear complexity of the sequence. Since our sequences have normalized complexities exceeding 0.5, this implies that an attacker must have access to at least a single repeat of our sequence in order to decode it. In most spread spectrum applications, the user data modulates the spreading sequence, at a repetition rate of the sequence period. Therefore, an attacker has no guarantee of analysing more than a sequence period, without sequence corruption by data modulation. In the case of watermarking, the attacker has access to one period only, and has to guess how to synthesize repeats, without knowing the start and end of a sequence. In summary, the new sequences are practically immune to linear attack, even when the sequence is not corrupted by noise, interference or distortion.
(83) The sequences/arrays described above with reference to
(84) In other embodiments, an alternative array construction is based on the use of the index function, which is an inverse of the exponential function. This is different from the log function, which applies to all finite fields. The index function is restricted to base fields only. The shift sequence is as follows:
s.sub.x=ind.sub.g(Ax.sup.2+Bx+C)
(85) Here xZ.sub.p (including 0) and g is the primitive root (generator). This generates a p(p1) array with p columns, each of length (p1).
(86) A vertical shift by v generates an equivalent array:
(87)
(88) Choose Ag.sup.v=1 from the equivalence class. Therefore, a representative is:
s.sub.x=ind.sub.g(x.sup.2Bx+C)
(89) This array is equivalent to any shift by h places horizontally.
s.sub.xs.sub.x+h=ind.sub.g((x+h).sup.2+B(x+h)+C)=ind.sub.g(x.sup.2+(2h+B)x+(h.sup.2+Bh+C)
(90) As h ranges over all values, choose B=0.
s.sub.x=ind.sub.g(x.sup.2+C)
(91) Re-express this as:
s.sub.x=ind.sub.g(x.sup.2C)
If C.Math., the set of quadratic residues, then (x.sup.2C) is irreducible, and s.sub.x assumes legitimate values modulo (p1) for all p values of x. Otherwise, blank columns result, which is undesirable. Since there are
(92)
quadratic non-residues in Z.sub.p, there are
(93)
members in the family of arrays.
(94) The cross-correlation between two arrays is obtained from:
=s.sub.is.sub.i+hv=ind.sub.g(x.sup.2C)ind.sub.g((x+h).sup.2C)v
Let +v=. Then ind.sub.g(x.sup.2 C) ind.sub.g((x|h).sup.2 C)=.
(95) Therefore:
(96)
(97) and finally:
(x.sup.2C)=g.sup.((x+h).sup.2C)
This is a quadratic, so there may be 0, 1 or 2 columns matching, as before. In this embodiment, the columns of length (p1) can be substituted by Sidelnikov sequences of that length. Such columns have auto-correlation values of (p2) for a full match, and 0 or 2 otherwise. It is not possible to calculate the array correlation in closed form. However, the bounds on the correlations are:
Autocorrelation peak=p(p2)
Largest positive off-peak correlation=2(p2)
Largest negative off-peak correlation=2(p2).
(98) Therefore, this construction is inferior to the exponential construction discussed before. This is because the family size is halved, the correlation bounds are doubled and the array efficiency is lower. Here, efficiency is the ratio of the number of non-zero entries in the array to the total number of entries.
(99) Other embodiments of the present invention include the generation of sequence families that are particularly suited to optical CDMA and frequency hopping.
(100)
(101) The arrays described above with reference to
(102) As an example of the index function construction, an irreducible quadratic is chosen, for example: i.sup.2+3i+1. In this example p=7:
s.sub.i=ind.sub.3(i.sup.2+3i+1)=0,5,4,5,0,3,3
(103) This defines a 76 inverse array having 7 columns each of length 6, as shown in
(104) A similar procedure can be applied to a rational map and an inverse array based on the rational map is shown in
(105) The arrays described above in relation to
(106) The arrays described above can be considered as sparse, in that each column contains at most one dot (transmission in the two dimensional pattern). The arrays whose column lengths are prime can be made denser by substituting each column by a binary (0,1) Legendre sequence of commensurate length. An example of such a substitution for the array described above in relation to
(107)
for a prime of the type (4k1). Larger arrays follow a similar pattern. Such sequence families are particularly suitable for multi-wavelength optical communications and multi-tone frequency hopping.
(108)
(109) The columns with integer entries can be substituted by equivalent cyclic shifts of an m-sequence of length 7, producing the array in
(110) The array of
(111) A larger example of this method, using the finite field GF(2.sup.4) results is a shift sequence of length 17: ,1,4,13,9,14,5,6,8,10,11,2,7,3,12,0,. This produces an array of size 1715. It can be used as an optical orthogonal code or as a frequency hopping sequence. Note that once again, the end columns are blank, so they could be omitted during transmission.
(112) The columns with integer shifts can be substituted by equivalent shifts of an m-sequence of length 15. This array can be unfolded into a binary or ternary sequence of length 255. Therefore, it is commensurate with the length of the small and large Kasami sets.
(113) It can be seen that the above shift sequence produces an array which has at most one dot per row. Therefore, it is also possible to substitute the rows by a pseudo-noise sequence of commensurate length. In the above example, this would be a ternary Legendre sequence of length 17. There are other cases, where substitution of rows or columns is possible, thus leading to the construction of new and different arrays for CDMA and other applications.
(114) In yet further embodiments, it is also possible to use the constructions described herein recursively. For example, take Construction A1 or A2 where the polynomial is of degree one, i.e. the well-known exponential Welch construction. The parent array has p1 columns each of length p. Substitute the columns with commensurate shifts of a pseudo-noise sequence, e.g. a Legendre sequence. This array can be unfolded into a sequence of length (p1)p using CRT. Such a sequence has three valued autocorrelation: (p1)p, +1, p. Quite often (p1)p=p+1 where p is another prime. Therefore, such a sequence can be used to substitute the non-blank rows of Family B, which are of commensurate length. This produces a family of sequences of length p.sup.42p.sup.32p.sup.2+3p+2 with low off-peak autocorrelation, low cross-correlation and high linear complexity. Hence, the methods of the present invention can also be used in cascade.
(115) According to some embodiments, the method of modulating a communication signal includes converting singly or doubly periodic shift sequences from m-sequences using a trace map and discrete logarithm to obtain families of shift sequences with correlation 2. These families also include a parent sequence with correlation 1. Most of these shift sequences are new, and can also be used as new frequency hopping codes, or in our constructions, where columns or rows are substituted by suitable binary sequences to produce CDMA codes. Special cases of this method include the small Kasami set and the No-Kumar set. Because these sets originate from an m-sequence, they have a normalized complexity which asymptotes to zero, even if their m-sequence columns are substituted by Legendre sequences. This is in contrast to the other sequences constructed by our method, which do not originate from m-sequences.
(116) According to some embodiments, where the shift sequence is obtained from an m-sequence, and the substitution column is a ternary or other non-binary pseudo-noise sequence, a new long pseudo-noise sequence obtained by CRT from the array results.
(117) In some embodiments, the family of sequences produced by using the shift sequence to construct arrays which are then unfolded using CRT has a linear complexity greater than 45% of the sequence length, regardless of the sequence length.
(118) Also, it is possible to construct new shift sequences and frequency hopping patterns from known CDMA constructions. In their paper Families of sequences and arrays with good periodic correlation properties, IEE PROCEEDINGS-E, Vol. 138, No. 4, July 1991 D. H. Green and S. K. Amarasinghe present known Kasami sequences and their derivatives, the No-Kumar sequences written in array format.
(119) Alternatively, the shift sequences can be used in their own right as new frequency hopping patterns, time hopping patterns or Optical Orthogonal Codes.
(120) One of the objectives of spread spectrum sequences is to provide good spectral occupancy of the allowed frequency band, for example the unlicensed Industrial, Scientific, and Medical (ISM) band from 2.4000 to 2.4835 GHz. An ideal spread spectrum sequence is pseudo-noise, i.e. the sequence possesses a two-valued autocorrelation. Because of the digital modulation, this produces a sinc function power spectrum. Families of sequences used in CDMA applications have good cross-correlation, but their autocorrelation takes on more values than 2. As a result, their power spectral density is more jagged. The spectrum of a 2.44175 GHz RF carried modulated by a typical Kasami sequence of length 63 is shown in FIG. 13A. By comparison, the spectrum of a typical Moreno-Tirkel sequence of the same length, obtained by unfolding the 97 array of
(121) The +/1 and (0,1) sequences described above can be applied simultaneously to acquire and/or track targets in a multi-target scenario for short range multi-target radar and sonar. Hence, embodiments of the present invention include applying the shift sequences described herein as frequency hopping sequences for radar and detecting the presence of the shift sequences by setting a correlation threshold of 3 for quadratic constructions and 4 for cubic constructions.
(122) Embodiments of the present invention also have application in cryptography. The constructions generate long sequences with high linear complexity from shorter sequences, which can be used, for example, in stream or block ciphers.
(123) The constructions described in this patent application can be used in their two-dimensional form in wireless communications. For example, the arrays described with reference to the drawings can be used as mn arrays, where m is the number of time slots required to carry the coded information and n is the number of orthogonal tones in an Orthogonal Frequency-Division Multiple Access (OFDMA) signal set. m and n need not be relatively prime. In cases where two orthogonal polarizations are deployed (e.g. vertical and horizontal, or left and right hand circular), the column length becomes 2n. Also, the orthogonal tones and the polarizations need not be arranged in a one dimensional form, but can be folded into an abstract space of arbitrary dimension. Therefore, the multi-dimensional array constructions described in the Applicants' patent application WO 2011/050390 can be used for the purposes of multiple access communication or radar. This applies regardless of whether the columns or folded arrays are substituted by suitable sequences or arrays to produce a multiplexed data stream, or whether the shift sequence is used as a selector of one out of a set of orthogonal tones and polarizations.
(124) Hence, embodiments of the present invention include methods and apparatus for modulating and encoding communication signals that address or at least ameliorate one or more of the aforementioned limitations of the prior art or at least provides a useful and effective alternative.
(125) The new sequence families for wireless CDMA described herein have correlation performance which at least equals or surpasses the known Gold and Kasami sequence families. The exponential quadratic families are nearly optimal with respect to the Welch bound, whilst the rational function families are optimal, i.e. for a given length no families with better correlation can exist.
(126) The sequences come in many variations, all except one of which are balanced, and all of which have much higher linear complexity than the known constructions, thus rendering them immune to linear attacks and rendering them particularly suitable for cryptography applications. The methods of the present invention include converting frequency hopping patterns into CDMA sequences and the converse, and deriving many patterns from m-sequences.
(127) The new sequences are available in more lengths, which fill in the gaps in lengths of the Gold and Kasami sequences. The new sequences do not compete with the known sequences, but complement them, thus affording the user more flexibility in designing communication networks. The new constructions also deliver frequency hopping sequences and sequences for optical CDMA and multi-target radar and sonar, GPS and ultrasound. In this specification, the terms comprise, comprises, comprising or similar terms are intended to mean a non-exclusive inclusion, such that a system, method or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.
(128) Throughout the specification the aim has been to describe the preferred embodiments of the invention without limiting the invention to any one embodiment or specific collection of features. It is to be appreciated by those of skill in the art that various modifications and changes can be made in particular embodiments exemplified without departing from the scope of the present invention.