Chapter 17 Exercises
17.1 Binary Codes
1. Use the circle diagram method shown in Figures 17.1 and 17.2 (page 700) to verify the code words in Table 17.1 (page 702) for the messages 0101, 1011, and 1111.
1.
See Table 17.1 for answer.
2. Use the circle diagram method to decode the received messages 0111011 and 1000101.
3. Find the distance between each of the following pairs of words:
3.
(a) 6
(b) 3
4. Referring to Table 17.1, use the nearest-neighbor method to decode the received words 0000110 and 1110100.
5. If the code word 0110010 is received as 1001101, how is it decoded using the circle diagram method?
5.
1001101
6. Suppose that a received word has the circle diagram arrangement shown here:
What can we conclude about the received word?
7. Suppose that a received word has the circle diagram arrangement shown here:
Assuming that exactly one error was made in transmission, what was the sent word?
7.
1101000
8. If the code word 1010 in the code C2 in Example 4 (page 706) is received as 1000, explain why the error will be detected but cannot be corrected.
9. For the code C4 in Example 4, decode the following received messages:
9.
(a) 0101011
(b) 1011010
(c) 1110001
10. If the code word 0010111 in the code C4 in Example 4 is received as 1010110, will the error be detected? Can it be corrected?
17.2 Encoding with Parity-Check Sums
11. Determine the binary linear code that consists of all possible three-digit messages with three check digits appended using the parity-check sums a2+a3,a1+a3 and a1+a2. (That is, c1=0 if a2+a3 is even, c1=1 if a2+a3 is odd, and similarly for c2 and c3.)
11.
{0000000,0010111, 0101011, 1001101, 1100110,1011010, 0111100, 1110001}
12. Let C be the code
{0000000, 0010111, 0101011, 1001101, 1100110, 1011010, 0111100, 1110001}
What is the error-correcting capability of C? What is the error-detecting capability of C?
13. Find all code words for binary messages of length 4 by appending three check digits using the parity-check sums a2+a3+a4,a2+a4, and a1+a2+a3. Will this code correct any single error?
13.
0000000, 1000001, 0100111, 0010101, 0001110, 1100110, 1010100, 1001111, 0110010, 0101001, 0011011, 1110011, 1101000, 1011010, 0111100, 1111101. No, because 1000001 has weight 2.
14. Consider the binary linear code
C=000000,100110,010101,001011,110011,101101,011110,111000
Use nearest-neighbor decoding to decode 101100 and 101011. If a received word is 001100, can you determine the intended code word? Explain your reasoning.
15. Construct a binary linear code using all eight possible binary messages of length 3 and appending three check digits using the parity-check sums a1+a2, a2+a3 and a1+a3. Decode each of the received words below by the nearest-neighbor method:
001001, 011000, 000110, 100001
15.
000000, 100101, 010110, 001011, 110011, 101110, 011101, 111000. 001001 is decoded as 001011; 011000 is decoded as 111000; 000110 is decoded as 010110; 100001 is decoded as 100101.
16. Extend the code words listed in Table 17.1 (page 702) to eight digits by appending a 0 to words of even weight and a 1 to words of odd weight. What are the error-detecting and error-correcting capabilities of the new code?
17. Extend the code words listed in Table 17.2 (page 704) to eight digits by appending a 0 to words of even weight and a 1 to words of odd weight. What are the error-detecting and error-correcting capabilities of the new code?
17.
00000000, 00010111, 00101110, 01001011, 10001101, 11000110, 10100011, 10011010, 01100101, 01011100, 00111001, 11101000, 11010001, 10110100, 01110010, 11111111. The code will detect any three errors or correct any single error.
18. Suppose that the weight of a binary linear code is 6. How many errors can the code correct? How many errors can the code detect?
19. How many code words are there in a binary linear code that has all possible messages of length 5 with three check digits appended? How many possible received words are there with this code?
19.
25=32;28=256.
17.3 Data Compression
20. Suppose we code a four-symbol genetic set {A, C, T, G} into binary form as follows:
A→0C→10T→110G→111
Convert the sequence ACAAGTAAC into binary code.
21. Use the code in Exercise 20 to determine the sequence of symbols represented by the binary code 001100001111000.
21.
AATAAAGCAA
22. Suppose that we code a five-symbol set {A, B, C, D, E} into binary form as follows:
A→0B→10C→110D→1110E→1111
Convert the sequence of AEAADBAABCB into binary code. Determine the sequence of symbols represented by the binary code 01000110100011111110.
23. Use the code in Exercise 22 to convert the sequence EABAADABB into binary code. Determine the sequence of letters represented by the binary code 001000110011110111010.
23.
111101000111001010; AABAACAEADB
24. Devise a variable-length binary coding scheme for a six-symbol set {A, B, C, D, E, F}. Assume that A is the most frequently occurring symbol, B is the second most frequently occurring symbol, and so on.
25. Judging from the frequency table in Figure 17.9 (page 709), what are the three most frequently occurring consonants in English text material? What is the most frequently occurring vowel?
25.
T, N, and R; E
26. Explain why Morse code must include a space after each letter, but fixed-length codes do not.
27. Following are the closing values (rounded to the nearest integer) of the Dow Jones Industrial Average stock market values for a two-week period. Use the delta function method to compress these values. What percentage reduction in characters is there?
13403137391381613767138201375913779138781391313896
27.
13403 336 77 −49 53 −61 20 99 35 −17; we go from 59 characters to 36 characters, a reduction of almost 39%.
28. The following numbers were encoded using delta function encoding. Determine the original numbers.
1207373−57−97−234−105178−7327579−183−146−94129
29. Assume that a dataset of four letters occurs with the following probabilities:
A0.425B0.210C0.215D0.150
Use a Huffman tree to create a Huffman code for A, B, C, and D.
29.
A is 0; B is 111; C is 10; D is 110.
30. Given that the delta function was used to create values in the following list
13403 336 77 −49 53 −61 20 99 35 −17
recreate the original list.
31. Decode the binary string
11100100001001110110011010
which has been encoded using the Huffman code given on page 713.
31.
BCEEFCDDCFF
32. Use a Huffman tree to assign a binary code to the letters that occur with the following probabilities:
A0.025B0.150C0.015D0.170E0.200E0.225G0.215
17.4 Cryptography
33. Use hand computations to calculate the following.
33.
(a) 2
(b) 10
(c) 9
34. Solve for x by trial and error.
35. Use the Caesar cipher to encrypt the message RETREAT. Decrypt the message DGYDQFH, which was encrypted using the Caesar cipher.
35.
UHWUHDW; ADVANCE
36. Suppose a message encrypted with a Caesar shift can be decoded with the same shift. What is the shift?
37. Using to label the positions of the letters , suppose that we create a cipher by replacing the letter in position with the letter in position . How many iterations of this cipher must be done before a message will return to its original state?
37.
13
38. The message ADDAOS was encrypted using the decimation cipher with the key 7. Decrypt it.
39. Explain why 2 cannot be used as the key in a decimation cipher.
39.
There is no integer such that modulo 26.
40. If you attempted to use the decimation cipher with the key 13, how would the word MESSAGE be encrypted?
41. Use the decimation cipher with the key 5 to encrypt RETREAT.
41.
HURHUAR
42. Suppose you wanted to break a code that employed a linear cipher by trying all possible linear ciphers. How many would you have to test to try every one?
43. Find a formula for a linear cipher that decrypts messages encrypted using the formula .
43.
44. List all possible permutations of 1, 2, 3, including 1,2, 3 itself, in a systematic way. (The original ordering 1,2, 3 is viewed as a permutation to simplify various theoretical arguments.)
45. Encrypt the message ADVANCE WHEN READY using the permutation .
45.
VAADENWCNHREDEYA
46. Encrypt the message ATTACK POSTPONED using the permutation .
47. The message EMTENAOTXOQN was encrypted using the permutation . Decrypt it.
47.
MEET AT NOON
48. The message TAACTPKSTOOPEDN was decrypted using the permutation . Decrypt it.
49. How many permutations of 1, 2, 3, 4 are possible, including the original ordering 1, 2, 3, 4?
49.
50. Use the Playfair cipher with the keyword IMAGINE to encrypt the plaintext CALL ME.
51. The ciphertext WR VI SE CW RY was encrypted with the Playfair cipher using the key WORLD WAR II. Decipher it.
51.
DO NOT CALL
52. Explain why the ciphertext BT TZ PM UO AW AC HK EU W cannot have been encoded using the Playfair cipher.
53. How many possible keys are there for a Jefferson wheel with six disks?
53.
54. Referring to the Jefferson wheel with six disks and the key shown in Example 20 (page 725), what would the encrypted message be if we used the row that is just above the row ATTACK?
55. Referring to the Jefferson wheel with six disks and the key shown in Example 20, what row was used to create the encrypted message MCEMPL?
55.
Third above the row ATTACK
56. Referring to the Jefferson wheel with six disks shown in Example 20 and the key 5, 1, 4, 2, 6, 3, encrypt the message DEPLOY, using the row directly below the message.
57. Given that BEATLES was used as the keyword for the Vigenère cipher to encrypt SSLETRY TXOGPW, decrypt the message.
57.
ROLLING STONES
58. Use the Vigenère cipher with the keyword CLUE to encrypt the message THE WALRUS WAS PAUL.
59. Use the Vigenère cipher with the keyword HELP to encrypt the message PHONE HOME.
59.
WLZCL LZBL
60. Use the linear cipher method with and to encrypt GOOD.
61. Given that the received message ZVW was encrypted using the linear cipher method with and , decrypt the message.
61.
SUN
62. Add the following pairs of binary strings.
63. For any two binary strings and of the same length, define to be the string obtained by summing the strings as explained in Example 21 (page 726). Find for each of the following cases.
63.
(a) 1111101
(b) 1100011
64. Suppose that and are two binary words of length 7 whose distance apart is 7. What string is ?
65. Given the binary word , find all binary words of length 7 that are a distance of 1 from .
65.
0010110, 1110110, 1000110, 1011110, 1010010, 1010100, 1010111
66. Suppose that and are binary code words of the same length. Using the method of summing binary strings as shown in Example 21, explain why the distance from to is the same as the weight of .
67. Suppose that , , and are binary code words of the same length. Using the method of summing binary strings as shown in Example 21, explain why the distance from to is the same as the distance from to .
67.
Recall that the distance between two strings is the number of positions by which they differ. Observe that everywhere and agree, so do . Conversely, in every position that and disagree, so do .
68. All binary linear codes have the property that the sum of two code words is another code word. Use this fact to determine which of the following sets cannot be a binary linear code.
Chapter Review
69. Messages encrypted with the __________ cipher are the hardest to break.
69.
a
70. Explain why for any choice of the key shown in Table 17.4 (page 717) the number 13 is always encrypted as 13.
71. Suppose a Huffman tree has been used to create a binary code for the letters through , and the results include , , and . If the code has only two code words of length 6 and one of length 5, what can you say about the probability of the occurrence of the letters , , and ?
71.
is the least likley, is the second least likely, and is the third least likley.
72. What is the minimum weight of a binary code that can correct any 3 or fewer errors?
73. Explain why encoding ID numbers by multiplying them by 15 would not detect the single-digit error of replacing 1328 by 1326.
73.
The difference is a multiple of 15.
74. Explain why any error involving the code word 001 in the code in Example 4 (page 706) is not detected.