Chien search

From HandWiki
Revision as of 20:03, 6 March 2023 by OrgMain (talk | contribs) (correction)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

In abstract algebra, the Chien search, named after Robert Tienwen Chien, is a fast algorithm for determining roots of polynomials defined over a finite field. Chien search is commonly used to find the roots of error-locator polynomials encountered in decoding Reed-Solomon codes and BCH codes.

Algorithm

The problem is to find the roots of the polynomial Λ(x) (over the finite field GF(q)): [math]\displaystyle{ \Lambda(x) = \lambda_0 + \lambda_1 x + \lambda_2 x^2 + \cdots + \lambda_t x^t }[/math]

The roots may be found using brute force: there are a finite number of x, so the polynomial can be evaluated for each element xi. If the polynomial evaluates to zero, then that element is a root.

For the trivial case x = 0, only the coefficient λ0 need be tested for zero. Below, the only concern will be for non-zero xi.

A straightforward evaluation of the polynomial involves O(t2) general multiplications and O(t) additions. A more efficient scheme would use Horner's method for O(t) general multiplications and O(t) additions. Both of these approaches may evaluate the elements of the finite field in any order.

Chien search improves upon the above by selecting a specific order for the non-zero elements. In particular, the finite field has a (constant) generator element α. Chien tests the elements in the generator's order α1, α2, α3, ..... Consequently, Chien search needs only O(t) multiplications by constants and O(t) additions. The multiplications by constants are less complex than general multiplications.

The Chien search is based on two observations:

  • Each non-zero [math]\displaystyle{ \beta }[/math] may be expressed as [math]\displaystyle{ \alpha^{i_\beta} }[/math] for some [math]\displaystyle{ i_\beta }[/math], where [math]\displaystyle{ \alpha }[/math] is a primitive element of [math]\displaystyle{ \mathrm{GF}(q) }[/math], [math]\displaystyle{ i_\beta }[/math] is the power number of primitive element [math]\displaystyle{ \alpha }[/math]. Thus the powers [math]\displaystyle{ \alpha^i }[/math] for [math]\displaystyle{ 0 \leq i \lt (q-1) }[/math] cover the entire field (excluding the zero element).
  • The following relationship exists:[math]\displaystyle{ \begin{array}{lllllllllll} \Lambda(\alpha^i) &=& \lambda_0 &+& \lambda_1 (\alpha^i) &+& \lambda_2 (\alpha^i)^2 &+& \cdots &+& \lambda_t (\alpha^i)^t \\ &\triangleq& \gamma_{0,i} &+& \gamma_{1,i} &+& \gamma_{2,i} &+& \cdots &+& \gamma_{t,i} \\ \Lambda(\alpha^{i+1}) &=& \lambda_0 &+& \lambda_1 (\alpha^{i+1}) &+& \lambda_2 (\alpha^{i+1})^2 &+& \cdots &+& \lambda_t (\alpha^{i+1})^t \\ &=& \lambda_0 &+& \lambda_1 (\alpha^i)\,\alpha &+& \lambda_2 (\alpha^i)^2\,\alpha^2 &+& \cdots &+& \lambda_t (\alpha^i)^t\,\alpha^t \\ &=& \gamma_{0,i} &+& \gamma_{1,i}\,\alpha &+& \gamma_{2,i}\,\alpha^2 &+& \cdots &+& \gamma_{t,i}\,\alpha^t \\ &\triangleq& \gamma_{0,i+1} &+& \gamma_{1,i+1} &+& \gamma_{2,i+1} &+& \cdots &+& \gamma_{t,i+1} \end{array} }[/math]

In other words, we may define each [math]\displaystyle{ \Lambda(\alpha^i) }[/math] as the sum of a set of terms [math]\displaystyle{ \{\gamma_{j,i} \mid 0\leq j \leq t\} }[/math], from which the next set of coefficients may be derived thus: [math]\displaystyle{ \gamma_{j,i+1} = \gamma_{j,i}\,\alpha^j }[/math]

In this way, we may start at [math]\displaystyle{ i = 0 }[/math] with [math]\displaystyle{ \gamma_{j,0} = \lambda_j }[/math], and iterate through each value of [math]\displaystyle{ i }[/math] up to [math]\displaystyle{ (q-1) }[/math]. If at any stage the resultant summation is zero, i.e. [math]\displaystyle{ \sum_{j=0}^t \gamma_{j,i} = 0, }[/math] then [math]\displaystyle{ \Lambda(\alpha^i) = 0 }[/math] also, so [math]\displaystyle{ \alpha^i }[/math] is a root. In this way, we check every element in the field.

When implemented in hardware, this approach significantly reduces the complexity, as all multiplications consist of one variable and one constant, rather than two variables as in the brute-force approach.

References