université de grenoble university college dublin ... · discrete mathematics, coding, cryptography...

24
Université de Grenoble Laboratoire Jean Kuntzmann Applied Mathematics and Computer Science Department University College Dublin Claude Shannon Institute Discrete Mathematics, Coding, Cryptography and Information Security

Upload: others

Post on 29-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Université de GrenobleLaboratoire Jean KuntzmannApplied Mathematics and Computer Science Department

University College DublinClaude Shannon InstituteDiscrete Mathematics, Coding, Cryptography and Information Security

Page 2: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Subspaces of matrices

• Fq is a finite field

• V is a vector space of finite dimension n over Fq

• Consider subspaces M of EndFq (V) in which each

non-zero element has a prescribed rank

• M is a (n2, d) code

– Search for large dimensions d

– [Gow et. al] investigate maximum dimension subspaces

Page 3: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Finite Semi-fields

• A finite non-associative ring D where nonzero

elements are closed under multiplication is called a presemifield

• If D has an identity element it is called semifield

• [L.E. Dickson, 1906]• [L.E. Dickson, 1906]

• [A.A. Albert, 50s]

• [D.E. Knuth, 1965] for projective semifield planes

• [Kantor 2006, Dempwollf 2008, Rúa et al. 2009] … – Representation as subspaces of invertible matrices

– Classification of semifields of order 81=34, 64=26, …

Page 4: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Equivalence testing

• Space equivalence– Classification, exhaustive search, etc.– M eq. S iff S = U-1 M V, for some invertible U and V

� Some ideas to reduce the search when Id ∈ M

1. Reduction to similarity1. Reduction to similarity

• Id = U-1 A V ���� V = A-1 U • ie. Si = U-1 Mj V if and only if Si = U-1 (Mj A-1) U �M eq. S iff ∃ A ∈ M such that M A-1 sim. S

2. Less admissible characteristic polynomials

• Chevaley-Warning theory ���� prescribed coefficients• A+x·Id ∈ M ���� no eigen value in the field for A ≠ λ Id�No linear factor in the characteristic polynomial

Page 5: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Computing the characteristic

polynomial and matrix normal forms

• Motivations– Subspaces of matrices, semifields

– But also: Isomorphism of graphs, certified eigenvalues …

• Computations

• Motivations– Subspaces of matrices, semifields

– But also: Isomorphism of graphs, certified eigenvalues …

• Computations• Computations– Similarity via matrix normal forms

– Frobenius normal form and characteristic polynomial

– Krylov iterations

– Reductions to matrix multiplication

• Finite semi-fields of order 243=35 ?

• Computations– Similarity via matrix normal forms

– Frobenius normal form and characteristic polynomial

– Krylov iterations

– Reductions to matrix multiplication

• Finite semi-fields of order 243=35 ?

Page 6: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Companion matrix

Charpoly ( Companion(P) ) = P

Minpoly ( Companion(P) ) = P

Page 7: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Frobenius normal form

• Similarity

� Tested via a change of basis to a normal form– Gauβ-Jordan normal form

– Frobenius (rational canonical form)

• Block diagonal companion matrix

• fk | fk-1 |… | f1 | f0 = Minpoly

• fk · fk-1 · … · f1 · f0 = Charpoly

• Minpoly | Charpoly | Minpolyn

Page 8: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Space equivalence via similarity

• Equivalent– ∃ U, V ∈ GL(n,q)

∀ Si ∈ S, ∀ Mj ∈ M

Si = U-1 · Mj · V

• Equivalent– ∃ A ∈ M, Frob{S} = Frob{M A-1}

– S* ~~> Frob*Si = U-1 · Mj · V – S* ~~> Frob*

∃ A,Ma ∈ M, Ma A-1 ~~> Frob*

� S* = Ka-1 · (Ma A-1) · Ka

– ∃ Y* ∈ Centralizer(S*)

U = Y* · Ka-1 and V = A-1 · Ka · Y*

-1

∀ Si ∈ S, ∀ Mj ∈ M

Si = U-1 Mj V

Page 9: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Algebraic complexity model

• Counting arithmetic operations

• E.g. Matrix multiplication– Classic 2n3 − n2

– [Strassen 1969] 7n2.807 + o(n2.807)

– [Winograd 1971] 6n2.807 + o(n2.807)

– ...– ...

– [Coppersmith Winograd 1990] O(n2.376)

O(nω), where ω denotes an admissible exponent

• Reductions to matrix multiplication� Better complexity

� Better efficiency in practice

• Block versions optimize memory hierarchy usage

Page 10: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Examples of Matrix multiplication reductions

• Triangular system solving with n×n matrix right hand side– TRSM(n) = n3 or 1/(2ω-1-2) · MM(n)

• TRMM(n) = n3 or 1/(2ω-1-2) · MM(n)

• Inverse of well-behaved matrices [Strassen 1969]– INVERSE(n) = 2n3 or 3·2ω /(2ω-4) /(2ω-2) · MM(n)– INVERSE(n) = 2n or 3·2 /(2 -4) /(2 -2) · MM(n)– INVT(n) = 1/3 n3 or 4/(2ω-4) /(2ω-2) · MM(n)

• LQUP of any matrix [Ibarra-Moran-Hui 1982]– LQUP(n) = 2/3 n3 or 2ω /(2ω-4) /(2ω-2) · MM(n)– Rank– Determinant

• Charpoly, Frobenius form ?

Page 11: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Characteristic polynomial

Computations, pre-Strassen

• [Leverrier 1840]– trace of powers of A, and Newton’s formula– improved/rediscovered by Souriau, Faddeev, Frame and Csanky– O(n4) operations using matrix multiplication– Still suited for parallel computations

• [Danilevskii 1937]– elementary row/column operations– O(n3)

• [Hessenberg 1942]– transformation to quasi-upper triangular and determinant

expansion formula– O(n3)

Page 12: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Characteristic polynomial

Computations, post-Strassen

• [Preparata & Sarwate 1978]– Update Csanky with fast matrix multiplication

– O(nω+1)

• [Keller-Gehrig 1985]– Using a Krylov basis

– O(nω log n)

• [Keller-Gehrig 1985]– Danilevskii block operations

– O(nω) BUT only valid with well-behaved matrices

Page 13: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Krylov iteration

• Degree d Krylov matrix of one vector v– K = [ v | Av | A2v | … | Ad-1v ]

• Krylov property: d maximal, K full rank� A · K = [ Av | A2v | … | Adv ] = K · C = K ·

� C is the companion matrix of the minimal polynomial of A,v� C is the companion matrix of the minimal polynomial of A,v

☺ If v is chosen randomly and the field is sufficiently large minpolyA,v = minpolyA with high probability

� As minpolyA is annihilating the sequence of projections we always have minpolyA,v | minpolyA

– e.g. suppose K square, inv., minpoly=charpoly � C = K-1 A K

Page 14: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

1. QLUP factorisation of the Krylov matrix

Minpoly Krylov+LUP+TRSM [D., Pernet, Wan 2005]

2. Cayley-Hamilton

1. + 2.

� MinpolyA,v solves Lr = m · L0..r-1

Page 15: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Minpoly Krylov+LUP+TRSM [D., Pernet, Wan 2005]

Page 16: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

LUKrylov algorithm: two problems

1. Krylov space is iterative: 2n3

� [Keller-Gehrig 85] • A, A2, A4, A8, …, A2 l̂og(n) in only log(n) matrix multiplication• A2 · [v, Av] = [A2v, A3v]• A4 · [v, Av, A2v, A3v] = [A4v, A5v, A6v, A7v] …• … full Krylov iteration in O(nω log(n))� in practice log(n) matrix multiplication� in practice log(n) matrix multiplication

2. Charpoly = Minpoly + Charpoly(Schur complement)– Charpoly = O( ∑ n2 · ki + ki

2 n ) or O(∑ nω-1kilog(ki)+kiω-1nlog(n))

☺ With ∑ ki = n and ∑ ki2 n2 the latter gives O(n3)

� Frobenius form can be recovered along the way

� But not O(nω log(n)) even with fast matrix multiplication and Keller-Gehrig’s trick …

Page 17: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Simultaneously compute the blocks

• Krylov matrix of several vectors vi– K = [ v1 | … | Ak1-1v1 | v2 | … | Ak2-1v2 | … | vl | … | Akl-1vl ]

– [Eberly 2000] Finds several blocks in the Frobenius form plus the change of basis, but also in either O(n3) or O(nω log(n))

• [Pernet-Storjohann 2007]– Start with A0 = A = [ Ae1 | Ae2 | … | Aen ]– Start with A0 = A = [ Ae1 | Ae2 | … | Aen ]

– Expand it to K’ = [e1 | Ae1 | e2 | Ae2 | … | en | Aen ]

– Find K1, the first n independent columns

– A0 · K1 = K1 · A1 = K1 · [e2 | * | e4 | * | … ] – …Iterate while reordering the columns to get increasingly large

ordered identity parts

– End by Frobenius = Ad = Kd-1 … K1

-1 A K1 … Kd

Page 18: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

From k-shifted form to (k+1)-shifted form

� build n×(n+k)

• If #Fq > n2, w. h. p.,

� Ak+1 = K-1 Ak K is in (k+1)-shifted normal form

� select first nindependent columns

� LQUP

Page 19: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Using fast rectangular matrix multiplication

• n×(n/k) by (n/k)×(n/k)

� Multiply k blocks of size (n/k)

� O( k (n/k)ω )

Page 20: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Overall complexity [Pernet-Storjohann 2007]

• Rank profile n×(n/k)

– derived from LQUP

– O( n(n/k)ω-1) = O( k (n/k)ω )

• Similarity transformation n×(n/k)

– Parenthesizing

– Parenthesizing

– O( k (n/k)ω )

• Overall complexity bound– summing for each iteration

Page 21: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Blocking for Efficiency

Pernet-Storjohann

Athlon 2200, 1.8 GHz, 2Gb

• Dominant factors of complexity bounds– LUKrylov ≈ 2n3+2/3nω ≈ 4.33 n3

– Pernet-Storjohann ≈ ((6+2/3)ζ(ω-1)-6)nω close to 4.96 nω

Page 22: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

About Probabilistic methods

• Monte-Carlo (always fast, probably correct)

• Less than 1/q to be wrong– Examples: minpolyA,v=minpolyA

– Solution: divisibilty ensures lcm will converge with 1/qk

• Las Vegas (always correct, probably fast)• Las Vegas (always correct, probably fast)– Examples: charpoly from LUKrylov algorithm

– Divisibility ensures that poly is correct if degree is n

– Solution: start again when check detects failure

• Frobenius – Preconditioning requires #Fq > n2

– Solution: select vectors from an extension field

Page 23: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Perspectives

• Frobenius Matrix Multiplication [Pernet-Storjohann 2007]

• Change of basis with an extra log(log(n)) factor– Application to semifields classification on small matrices …

• Sparse matrices ?– Rank, Det, Solve, Minpoly in O(n2) [Wiedemann 86]

– Charpoly

• Best algorithm O(n2.5log2(n) log(log(n)) [Villard 2000]

• Heuristic O(n2.5) [D.-Pernet-Saunders 2009]

• Arbitrary precision Integer matrices ?– Coefficients growth � naïve methods exponential in n … still

– Determinant O(nωloga(n) ) [Storjohann 2005]

– Charpoly O(n2.7loga(n) ) [Kaltofen-Villard 2004]

Page 24: Université de Grenoble University College Dublin ... · Discrete Mathematics, Coding, Cryptography and Information Security. Subspaces of matrices • F q is a finite field • Vis

Semi fields of order 243=35 …

• Specialized Packed matrix routines – [D. 2008, Boothby-Bradshaw 2010]– Among 320 = 3 486 784 401 matrices, 38 267 664 are invertible with 1

prescribed column and restricted charpoly☺ 2856s on 8 processors

• 26 × 38 267 664 = 994 959 264 Frobenius forms☺ Degree 5 with no linear factors ���� minpoly=charpoly� Simple Krylov iteration with 1 vector, w.h.p yields Frobenius� Simple Krylov iteration with 1 vector, w.h.p yields Frobenius� Estimation 22 CPU days, Memory is the bottleneck …

• 994 959 264 × the number of equivalent classes <I,F,Ai> : Comparisons� Full equivalence testing: 243 (|centralizer|) tests for each comparison? Some pre-filtering might still be necessary …

• Then append the remaining 2 admissible matrices one at a time☺ Generation of adequate matrices: estimation 3 hours? Compute the inequivalent classes <I,F,A3,A4,A5> …