Next Article in Journal
Computer Vision-Driven Framework for IoT-Enabled Basketball Score Tracking
Previous Article in Journal
Efficient Image-Based Memory Forensics for Fileless Malware Detection Using Texture Descriptors and LIME-Guided Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Algorithm for Obtaining Complete Irreducible Polynomials over Given Galois Field for New Method of Digital Monitoring of Information Space

by
Dina Shaltykova
1,
Aliya Massalimova
1,2,
Yelizaveta Vitulyova
1,3,4,* and
Ibragim Suleimenov
1,4
1
National Engineering Academy of the Republic of Kazakhstan, Almaty 050060, Kazakhstan
2
Academy of Public Administration Under the President of the Republic of Kazakhstan, Astana 010000, Kazakhstan
3
JSC “Institute of Digital Engineering and Technology”, Almaty 050013, Kazakhstan
4
Department Smart Technologies in Engineering, International Engineering Technological University, Almaty 050060, Kazakhstan
*
Author to whom correspondence should be addressed.
Computers 2025, 14(11), 468; https://doi.org/10.3390/computers14110468 (registering DOI)
Submission received: 11 October 2025 / Revised: 25 October 2025 / Accepted: 26 October 2025 / Published: 1 November 2025

Abstract

Irreducible polynomials are widely used in modern cryptography; however, algorithms for finding such polynomials remain quite complex and require significant computational resources. In this study, a new approach to finding irreducible equations over Galois fields G F ( p ) is proposed. It is shown that such irreducible equations can be obtained by solving a system of linear equations over the base Galois field, generated by any element of the field G F p K that is distinct from the elements of the base field and from elements corresponding to lower-degree extensions. The connection of the proposed approach with algorithms based on the Frobenius automorphism is established. The case corresponding to the field G F ( 3 ) and matrices over this field is examined in detail. It has been shown that the proposed method makes it possible to obtain complete sets of irreducible polynomials over a given Galois field. It has also been demonstrated that generating such sets is of particular interest for the development of new methods of digital monitoring of the information space, which are based on analogies with error-correcting coding techniques.

1. Introduction

The problem of constructing and classifying irreducible polynomials over Galois fields has consistently attracted the attention of researchers [1,2,3]. Such polynomials play a crucial role, in particular, in cryptography [4,5,6] and coding theory [7,8]. Specifically, this issue is of key importance in the development of algorithms for the advanced encryption standard (AES) [9,10] and elliptic curve cryptography (ECC) [11,12,13], as well as in the design of error-correcting codes such as Reed–Solomon codes [14,15]. Galois fields of comparatively small dimension are of interest for the development of lightweight cryptographic protocols used, for example, in devices that conform to the Internet of Things (IoT) concept [16,17]. Lightweight cryptographic protocols, such as SPONGENT and PRESENT, applied in such devices, indeed employ small-dimension finite fields in order to minimize computational costs on resource-constrained devices [18,19].
Classical methods for finding irreducible polynomials, such as the Berlekamp algorithm [20] (including its modifications [21,22]) or the Rabin algorithm [23,24], have proven highly effective in practice, particularly due to their reliability. However, their implementation requires substantial computational resources. This limits the applicability of such algorithms in systems such as RFID tags [25,26], SCADA system controllers [27,28], and other microsystems where stringent requirements are imposed on both processing speed and energy efficiency. To overcome these limitations, algebraic methods for generating irreducible polynomials are of interest, particularly those employing primitive elements of field extensions and Frobenius automorphisms [29,30]. It should also be noted that the above-mentioned algorithms do not guarantee obtaining a complete set of irreducible equations of a given degree over a specified Galois field.
Methods analogous to those used in the theory of error-correcting coding are also of considerable interest in the context of the current problem of improving psychological testing and the methodology of conducting sociological surveys [31,32]. Specifically, the task of psychological testing generally entails establishing a certain set of classification features that characterize a particular respondent [33,34]. For this purpose, tests are used that represent a set of questions. The answers to these questions can be mapped to a certain code sequence. In the simplest case, when the respondent is asked to choose between two options (“yes” or “no”), the set of answers corresponds to a sequence of binary symbols that can be interpreted as a code sequence.
Moreover, such a sequence can be regarded as a sequence containing errors. The “correction” of such errors in this case solves a classification problem, since the result of this procedure yields a sequence containing a smaller number of symbols. This approach was initially implemented in [35] using analogs of code sequences formed by permutations.
Such modernization of psychological testing gives possibility to overcome many difficulties connected to verification of psychological tests [36,37]. Classification features can be derived directly from large data arrays. A similar approach can be applied to sociological surveys. Moreover, in these cases, well-developed methods that ensure error correction can be used (Reed–Solomon codes [14,15], BCH codes [38,39], etc.).
However, this approach leads to the following problem. A set of responses to the test questions may be considered as a code containing errors, but the irreducible polynomial that provides the encoding generally remains unknown. Therefore, solving this problem requires, at a minimum, an algorithm for constructing a complete set of irreducible polynomials corresponding to a specific algebraic extension of a given Galois field. On this base the polynomial that allows solving the classification problem of the above type may be selected (including those based on experimental data).
In the long term, this approach also makes it possible to address problems related to the monitoring of the information space. It is unnecessary to emphasize that the modern information space contains enormous volumes of data accumulated, in particular, in social online networks, various Internet forums, and so forth. Adequate analysis of such information makes it possible, among other things, to analyze the processes taking place in society. Various methods have been proposed to solve this problem [40,41,42]. In Ref. [40], the information space was proposed to be viewed as a complex network in which messages, users, and thematic nodes are interconnected through graph-based and semantic relationships. The authors employ methods of graph mining, diffusion modeling, and content-based feature extraction to identify and classify false information, detect primary sources, etc. Such an approach makes it possible not only to record the facts of information propagation but also to reveal underlying patterns, predict topic evolution, and suppress anomalous flows.
The advantages of direct monitoring of the information space over traditional methods used in sociology are evident. First and foremost, sociological surveys require significant financial expenditures [43,44]. The main difficulty associated with the development of methods for direct monitoring of the information space lies in the fact that the nature of the information it contains is highly heterogeneous. For this reason, the use of methods analogous to those applied in the theory of error-correcting coding is of considerable interest from this perspective.
Specifically, in this case, it becomes possible to form code sequences (which are analogs of responses to test questions) of considerable length and then reduce them to a relatively small number of classification features. As analogs of responses to questions, one may consider, for example, users’ reactions to various resonant events (not necessarily of a political nature). In the simplest case, the reactions detected through monitoring—for instance, of social networks—correspond to ternary logic: positive reaction, negative reaction, or absence of reaction. Depending on the nature of the task being solved, it is also permissible to use five- and seven-valued logics.
The first step toward implementing such a methodology is the development of a simple and reliable algorithm for finding irreducible polynomials over various Galois fields.
The development of such an algorithm constitutes the aim of the present work.
The solution to this problem is based on a theorem proving that finding the complete set of irreducible polynomials of a given degree over a specified Galois field can be reduced to solving a system of linear equations over the base field.
Section 2 of this paper describes the main method used in this study—the method of representing algebraic complements in matrix form. Section 3.1 proves the main theorem for the case of fields G F ( p 3 ) , which correspond to ternary logic. Section 3.2 presents a specific example of constructing the complete set of irreducible equations for the case G F 3 3 . Section 3.3 provides a generalization of this approach to the construction of irreducible cubic equations over an arbitrary Galois field. Section 3.4 analyzes the relationship between the developed approach and the Frobenius automorphism. Section 3.5 proves the main theorem for the general case.
Section 4 demonstrates that the developed method for obtaining irreducible polynomials can also be applied to the creation of new methods for monitoring the information space.

2. Methods

This study employs the well-known method [45] of matrix representation of algebraic extensions G F p K of Galois fields G F p . The approach is based on the fact that any element x of the field G F p K can be regarded analogously to a vector of a linear space, which, in the case of the field G F p 3 is expressed as
x = a 2 θ 2 + a 1 θ + a 0
where θ is the root of some irreducible cubic equation defining an algebraic extension, and c i are coefficients from the base field G F ( p ) . As pointed out in [46], for illustrative purposes the primitive element θ may be interpreted as a logical imaginary unit.
Expression (1), therefore, corresponds to a one-to-one correspondence of the form
x a 2 a 1 a 0
An irreducible cubic equation can, in the general case, be written as
x 3 + A 2 x 2 + A 1 x + A 0 = 0
where A 0 0 .
Relation (2) also makes it possible to express the third power of the element θ as
θ 3 = A 2 θ 2 A 1 θ A 0
Consequently, the product of an arbitrary field element x by the element θ is given by
θ x = a 1 a 2 A 2 θ 2 + a 0 a 2 A 1 θ a 2 A 0
By considering θ 2 , θ , 1 as analogs of basis vectors according to Expression (1) and the element θ as the analog of an operator acting on the element x , Expression (5) leads to the matrix representation of the element θ in the form
θ A 2 1 0 A 1 0 1 A 0 0 0 ,
A similar 3 × 3 matrix representation is valid for any other element of the field G F ( p 3 ) . This work demonstrates that, using representations of the form (6), it is possible to construct the complete set of irreducible equations over the field of the considered type.

3. Results

3.1. The Basis of the Proposed Algorithm

In this section, the theorem forming the basis of the proposed algorithm is proved for the particular case of cubic equations over an arbitrary Galois field. The method of proof is chosen to ensure clarity while minimizing the use of abstract algebraic concepts. Its generalization is discussed in Section 3.5.
Theorem 1.
The coefficients  c i  of an irreducible equation over the field  G F ( p 3 )
x 3 c 2 x 2 c 1 x c 0 = 0
can be obtained as the solution of a system of linear equations
w 22 w 12 0 w 21 w 11 0 w 20 w 10 1 c 2 c 1 c 0 = w 32 w 31 w 30 ,
where
w 12 w 11 w 10 g ; w 22 w 21 w 20 g 2 ; w 32 w 31 w 30 g 3 ,
g  is the predetermined element of the algebraic extension  G F p 3  of the base field  G F p , which does not coincide with any element of the base field.
Proof. 
Equation (8) can be written in the following two equivalent forms.
c 2 w 22 w 21 w 20 + c 1 w 12 w 11 w 10 + c 0 0 0 1 = w 32 w 31 w 30
g 3 c 2 g 2 c 1 g c 0 = 0
Relation (8) implies that the search for the coefficients of the irreducible equation can be carried out via a known solution g that belongs to G F ( p 3 ) but does not coincide with any element of G F ( p ) . We will show that, under the above condition, the solutions of Equation (8) indeed yield the coefficients of the irreducible equation.
A cubic equation over an arbitrary Galois field G F p is reducible only in two cases: either the corresponding polynomial factors into a product of a linear term and a quadratic polynomial, or into a product of three linear terms. In both cases, at least one root of the equation must belong to the base field.
Therefore, the question of whether Equation (11) constructed from a certain element g , which satisfies the conditions formulated above, is irreducible or not reduces to determining whether an element g of this type can be a root of a quadratic equation.
This question can be answered in the general case. Consider the quadratic equation
g 2 + a g + b = 0 ,
For p 2 it can be transformed into a perfect square in the usual manner:
g + 2 1 a 2 = 2 2 a 2 b
The element on the right-hand side of Equation (13) belongs to the base field. However, it can also be regarded as an element of its algebraic extension G F p 3 . More precisely, elements of the base field x can be expressed via the primitive element θ of the field G F p 3 as
x = θ m p 3 1 p 1
where m = 0,1 , 2 , , p 2 .
Expression (14) follows from the fact that all elements of the base field in the considered algebraic extension must be p 1 roots of unity, since they satisfy the equation
x p 1 1 = 0
The following identity holds:
p 3 1 = ( p 1 ) ( p 2 + p + 1 )
The number p 2 is odd, since p is odd (the case p 2 is not considered here). Consequently, the sum p 2 + p + 1 , being the sum of three odd numbers, is also odd. Therefore, the expression p 3 1 p 1 is odd. It follows that the possibility of extracting a square root from the right-hand side of Equation (14) is determined by the parity of the integer m . If m is even, there exists a power of the element θ that enables the extraction of the square root; if m is odd, such a power does not exist. Specifically, for even m , the following relation holds:
x = θ m 2   p 3 1 p 1
Expression (17) shows that if the square root from the right-hand side of Equation (14) can be extracted, it can be extracted already within the base field. Indeed, for even m Expression (17) has the same form as (14).
Therefore, if Equation (13) is reducible in the algebraic extension G F p 3 , then the element g must belong to the base field. Conversely, if g does not belong to the base field, then the equation of the form (3) generated by g , is irreducible.
Consequently, an element g that belongs to the algebraic extension G F p 3 but does not coincide with any element of G F p indeed generates an irreducible equation. The theorem is proved.
On this basis, we can propose the following algorithm for generating irreducible equations in G F p 3 fields. One begins with any irreducible equation that defines an algebraic extension of G F p to G F p 3 . Then, to generate an irreducible equation, one can use any element of G F p 3 that does not coincide with any element of the base field. The coefficients of this equation are determined by solving the system of linear Equation (8) over the base field. □

3.2. Example of Constructing the Complete Set of Irreducible Equations

Let us consider a concrete example of applying the proposed method. As the base field, we take G F 3 . Its algebraic extension to G F 3 3 can be constructed using the irreducible equation
x 3 x + 1 = 0
This, in particular, means that the cube of a solution to (18) is expressed in terms of lower powers as
θ 3 = θ 1
This relation can be used to find the matrix representation of the element θ . Specifically, according to the method described in Section 2, this element is represented as
θ 0 1 0 1 0 1 1 0 0 ,
Expression (20) follows from the relation, which is a special case of (5):
θ a 2 θ 2 + a 1 θ + a 3 = a 1 θ 2 + a 3 + a 2 θ a 2 ,
which, as noted above, can also be represented in matrix form:
0 1 0 1 0 1 1 0 0 a 2 a 1 a 0 = a 1 a 2 + a 0 a 2
Using Expression (22), one can obtain the representations for the powers of the element θ . It is sufficient to start from the representation for θ , given by the tuple 0,1 , 0 . Table 1 presents the results of n -fold application of this matrix (values of n are listed in the first column). The second, third, and fourth columns show the coefficients representing the powers of θ in the form (1). There are exactly three elements in the base field G F 3 which can be listed as 1,0 , 1 , as clearly demonstrated in [47]. It is evident that all 26 elements presented in Table 1 are distinct, confirming that θ is indeed a primitive element. It is also observed that the 13th power of this element equals −1, which is consistent with Expression (14).
Consequently, there exist 24 nonzero elements of the algebraic extension of the base field that can be used to construct irreducible equations in accordance with the proposed method.
The coefficients of these equations are straightforward to determine, since Equation (8) allows for a direct analytical solution, which is conveniently written in the form
c 2 = D 1 w 11 w 32 w 12 w 31 ,
c 1 = D 1 w 22 w 31 w 21 w 32 ,
c 0 = w 32 w 20 c 2 w 10 c 1 ,
where
D = w 11 w 22 w 12 w 21 ,
The results of solving system (8) for each of the elements of the field G F 3 3 , which are not elements of the base field G F 3 , are presented in Table 2.
The first column of this table contains the degree n of the primitive element θ corresponding to each element of G F 3 3 , i.e., such that g = θ n .
The second, third, and fourth columns contain the coefficients c i obtained using Formulas (23)–(25), i.e., the coefficients of an equation of the form (3) generated by a particular element g .
The fifth column lists the group numbers N corresponding to the same equation.
These numbers have the following meaning: there exists a theorem [45] stating that all roots of an irreducible equation are distinct unless the corresponding polynomial can be reduced to a polynomial in x p k , where k is an integer. For a cubic equation, such a situation can occur only in the degenerate case where the polynomial depends solely on x 3 . Therefore, all three roots of any of the considered irreducible equations must be distinct.
Table 2 (column 5) shows that there are, in fact, not 24 different equations, but 24/3 = 8. Three of the obtained equations coincide—more precisely, the elements with indices n split into eight groups of three such elements each. All elements in the same group generate the same irreducible equation. These three elements are the three distinct roots of that equation. This result, as further demonstrated in the following Section 3.4, also corresponds to the fact that the different roots of equations of the considered type are related to each other through a transformation corresponding to the Frobenius isomorphism [29,30] (the roots correspond to a cyclotomic class [48,49]), which leads to the aforementioned partition into subsets.
The validity of the results presented in Table 2 can be verified as follows.
The number of distinct cubic equations over the field G F ( 3 ) whose root is not x = 0 is relatively small. Specifically, there are exactly 18 such equations, since in the representation of the form (11), the coefficient c 0 can take only two values, whereas the coefficients c 2,1 can each take three values.
Therefore, it is possible to enumerate all reducible equations and compare their coefficients with those given in Table 2.
Reducible cubic equations over the field under consideration have the form
( x ± 1 ) ( x 2 + b 1 x + b 2 ) = 0
In this field, there exist only six equations of the form
x 2 + b 1 x + b 2 = 0 ,
whose root is not x = 0 . This follows from the fact that b 2 can take two possible values, while b 1 can take three. Among these equations, three are reducible:
x + 1 x 1 = x 2 1 = 0
x + 1 2 = x 2 x + 1 = 0
x 1 2 = x 2 + x + 1 = 0
Therefore, the number of equations of the form (28) whose left-hand side is not factorable is three.
This corresponds to the existence of six equations of the form (27) in which the quadratic polynomial is irreducible over the base field.
Another four reducible equations correspond to the case where the polynomial is completely factorable into linear terms. These equations can be readily obtained and are provided explicitly in the Supplementary Materials.
Supplementary Materials also contains a classification of all cubic equations with coefficients in G F ( 3 ) . This classification shows that the entire set of equations of the type under consideration can be partitioned into the following three subsets:
Eight irreducible equations corresponding to Table 2;
Six reducible equations corresponding to Expression (27), in which the quadratic polynomial is irreducible over the base field;
Four reducible equations with nonzero roots belonging to G F ( 3 )
This classification, in particular, confirms that the result presented in Table 2 is indeed valid.

3.3. Counting the Set of Irreducible Cubic Equations over an Arbitrary Galois Field

The obtained result can be generalized to arbitrary fields of the form G F ( p 3 ) . To demonstrate this, we calculate the total number of irreducible equations that have no solution x = 0 and whose coefficients belong to the base field G F ( p ) . As in the preceding case, this can be achieved by first determining the number of reducible equations of this type.
Both reducible and irreducible equations under consideration can be written in the form
x 3 + A 2 x 2 + A 1 x + A 0 = 0
where A 0 0 .
The number of cubic equations whose left-hand side in (32) factors completely into distinct linear terms is equal to the binomial coefficient C p 1 3 . The number of cubic equations whose left-hand side in (32) factors completely into terms, at least two of which coincide, is equal to p 1 2 .
For convenience, we will hereafter refer to equations whose left-hand side in (32) factors completely into distinct terms as reducible equations of the first kind. Their number, R 13 p , is given by
R 13 p = 1 6 p 1 p 2 p 3 + p 1 2
There also exist reducible equations which, for convenience, we will refer to as reducible equations of the second kind, in which the left-hand side in (32) factors into two terms, one linear and the other quadratic. To determine the number of such equations, we use the same approach, namely, by first counting the number of equations of the form
x 2 + B 1 x + B 0 = 0
where B 0 0 and whose left-hand side factors into linear terms.
The number of equations of the form (34) whose left-hand side factors into distinct linear terms is equal to the binomial coefficient C p 1 2 . The number of equations whose left-hand side factors into identical linear terms is p 1 . The total number of equations of the form (34) is therefore p p 1 . Consequently, the number of irreducible equations Q 2 ( p ) of the form (34) is
Q 2 ( p ) = p p 1 1 2 p 1 p 2 p 1 = 1 2 p p 1
To obtain the number R 32 p of reducible cubic equations of the first kind from the number Q 2 , this quantity must be multiplied by the number of possible linear factors, i.e., by p 1 . We thus have
R 23 p = 1 2 p p 1 2
The total number of equations of the form (32) with A 0 0 is
T 3 p = p 1 p 2
Therefore, the desired number of irreducible equations is
Q 3 p = T 3 p R 13 p R 23 p
The difference T 3 p R 23 p can be transformed into the form
T 3 p R 23 p = p 1 p p 1 2 p 1 = 1 2 p ( p 2 1 )
The expression R 13 p can be rewritten as
R 13 p = p 1 1 6 p 2 p 3 + p 1 = 1 6 p p 2 1
Consequently, the total number of irreducible equations is
Q 3 p = 1 3 p ( p 2 1 )
The number of elements of the field G F ( p 3 ) that are distinct from the elements of the base field is p 3 p . One third of this quantity coincides exactly with Q 3 p . Thus, it has been proven that for arbitrary fields G F ( p 3 ) , the same situation holds as was established above for the field G F ( p 3 ) . Specifically, the number of irreducible equations that can be generated by solving equations of the form (8) equals p 3 p , whereas the total number of such equations is Q p , that is, three times smaller. These conditions can be satisfied simultaneously only in one case: when the elements of G F ( p 3 ) that are not contained in the base field are partitioned into subsets of three elements each, and the elements of each subset are the roots of the same equation. This conclusion also follows from the existence of cyclotomic classes [48,49], which is discussed in the following section.
It should be emphasized that Q 3 p is an integer for any p , since the numerator in fraction (40) is the product of three integers, p + 1 p p 1 , one of which is necessarily divisible by three.

3.4. The Relationship Between the Set of Irreducible Equations over a Given Galois Field and the Frobenius Automorphism

The result shown in Table 2 can be expressed in terms of the Frobenius automorphism too. Recall that a Galois field automorphism is a mapping φ of the field onto itself such that
φ x + y = φ x + φ y ;   φ x y = φ ( x ) φ ( y )
The Frobenius automorphism is defined by the mapping
x x p
This mapping is indeed an automorphism, since for fields of characteristic p the following expression holds:
x + y p = x p + y p
Table 2 in fact shows that the set of roots of each irreducible equation over the field G F ( 3 3 ) is connected precisely by such an automorphism, because if q 1 is an arbitrary root of an irreducible equation, then the other roots are given by q 2 = q 1 3 , q 3 = q 2 3 .
This conclusion is illustrated in more detail in Table 3. The first row of the table shows the numbers N , which appear in the last column of Table 2. The third and fourth rows show the third and ninth powers of the elements in the first row. The exponents are computed modulo 26, since all nonzero elements of G F ( 3 3 ) satisfy
x 26 = 1
The “formal” exponents, i.e., the exponents before reduction modulo 26, are given in parentheses in Table 3.
Let us construct the following polynomial:
P x = ( x θ m ) ( x θ p m ) ( x θ p 2 m )
It can be written in the form of (7):
P x = x 3 a 2 x 2 a 1 x a 0 = 0
where
a 2 = θ m + θ p m + θ p 2 m
a 1 = θ m θ p 2 m θ p m θ p 2 m θ m θ p m
a 0 = θ m θ p m θ p 2 m
Using the Frobenius automorphism, we then have
P p x = x 3 p a 2 p x 2 p a 1 p x a 0 p = 0
Under this automorphism, all coefficients of polynomial (47) remain unchanged; in particular,
a 2 p = θ m p + θ p 2 m + θ p 3 m = a 2
Since θ p 3 = θ . Similar relations hold for the coefficients a 0 and a 1 .
a 1 p = θ p m θ p 3 m θ p 2 m θ p 3 m θ p m θ p 2 m = a 1
a 0 p = θ p m θ p 2 m θ p 3 m = a 0
Therefore, the irreducible equation obtained starting from the element θ m coincides with the equations obtained using the elements θ p m and θ p 2 m . This result is fully consistent with well-known theorems of abstract algebra [45]. Hence, Theorem 1 can also be proved by considering polynomials of the form (46), although the proof presented above is, in our view, more transparent.

3.5. Obtaining Complete Sets of Irreducible Equations of Arbitrary Degree over a Given Galois Field

The generalization of the proposed approach is given by a refined formulation of Theorem 1.
Theorem 2.
The coefficients of an irreducible equation of degree  K + 1  over a given Galois field are determined by solving the following system of linear equations. 
w K K w 1 K 0 w K 1 w K 0 w 11 0 w 10 1 c K c 1 c 0 = w K + 1 K w K + 1 1 w K + 1 0 ,
where the columns of the matrix correspond to the representations of the powers of the primitive element  g  of the field  G F ( p K + 1 )  in the form
x = n = 0 n = K a n θ n
That is,
w 1 K w 11 w 10 g ; ; w K + 1 K w K + 1 1 w K + 1 0 g K + 1 ,
This theorem makes it possible to obtain a complete set of irreducible equations of an arbitrary degree over a given Galois field, starting from any irreducible equation of the same degree over that field. If at least one such equation is known, it is possible to find the primitive element θ of the field G F ( p K + 1 ) , whose powers allow determining all other primitive elements g . Recall that an element g is primitive if there does not exist an integer n 0 < p K + 1 1 such that
g n 0 = 1
Proof. 
If the element g is primitive, then the columns of matrix (55) are linearly independent, and therefore the system of Equation (55) has a solution. Expression (55) is equivalent to the equation
P x = x K + 1 a K x K a 1 x a 0 = 0
Therefore, it remains to be proven that if the element g is primitive, then the corresponding equation is irreducible. It can be reducible only if the element g is a root of an equation of degree M < K + 1 . For equations of degree M , a system of equations similar to (55) can be written. In this case, the vectors of the form (57) will naturally contain M + 1 elements. Consequently, if a solution exists for such a case, the element g must belong not only to the field G F ( p K + 1 ) but also to the field G F ( p M + 1 ) . This is possible only if a condition of the form (58) is satisfied, which is excluded by the assumptions of the theorem.
The theorem is proved. □
As an example, consider the case of the field G F ( 3 4 ) . This field contains 80 nonzero elements, meaning their number is divisible by 8. Consequently, it contains 8 nonzero elements that can be represented in the form
x = θ 10 m ,   m = 0,1 , , 7
Among the four elements θ 10 m ; θ 30 m ; θ 90 m ; θ 270 m , only two are distinct, since 10 90 ( 80 ) and 30 270 ( 80 ) . Therefore, such elements must be excluded from the set of nonzero elements of G F ( 3 4 ) suitable for finding irreducible equations.
The elements (60) are also roots of the equation
x 8 = 1
That is, they correspond to an algebraic extension of lower degree, specifically to the field G F ( 3 2 ) , and therefore they allow forming irreducible equations of degree 2. An illustration of this conclusion, related to the algebraic extension G F ( 3 4 ) , is provided in Supplementary Materials.
It can also be shown that the irreducible polynomial (59) can be written in the form
P x = k = 0 k = K ( x θ p k m )
where θ m is the primitive element of the algebraic extension G F ( p K + 1 ) of the base field G F ( p ) , and p is the characteristic of the field.
Using (62), one can show that the coefficients of the irreducible equation satisfy an analog of Formulas (52)–(54) by virtue of the isomorphism (44)
a i p = a i
Relation (63), in particular, indicates that the elements a i remain unchanged under all Frobenius isomorphisms. As follows from Galois theory, this means that they belong to the base field. Consequently, the proof of Theorem 2 can also be given directly on the basis of polynomial (62).
This also implies that, as in the specific case considered above, the solutions of a given irreducible equation, as expected, form a cyclotomic class. Therefore, if an irreducible equation is constructed on the basis of an element g , then the same equation will result from solving system (55) when the initial elements g p r with r = 1,2 , , K are used. This, in turn, means that the total number of irreducible equations of degree K over the field G F ( p ) is equal to the ratio of the number of primitive elements of the extension G F ( p K + 1 ) to K .
For the sake of reproducibility, the proposed method can be summarized by the following algorithmic outline (Algorithm 1). It shows the step-by-step procedure for generating all irreducible equations of degree n over GF(p) from a single known irreducible polynomial, highlighting the role of the matrix formulation (55) and the exclusion of Frobenius-related duplicates.
Algorithm 1. Construction of the complete set of irreducible equations over a given Galois field G F ( p )
   Input:
p—Prime defining the base field G F ( p ) ;
n—Degree of the desired algebraic extension;
f(x)—One known irreducible polynomial of degree n over G F ( p ) .
   Output:
Complete set of irreducible polynomials of degree n over G F p .
  • Initialization. Construct the extension field GF(pn) using f(x) and determine its primitive element α.
  • Element generation. Generate all nonzero elements of GF(pn) as powers αk, 1 ≤ k ≤ pn − 1.
  • Equation formation.
    For each element β = αk; that does not belong to the base field GF(p):
    • Represent the powers {β0, β1, …, βn−1} as column vectors according to (57).
    • Form the matrix M whose columns correspond to these vectors.
    • Solve the linear system M · c = −βn (over G F ( p ) ) as given by (55) to obtain the coefficient vector c = [c0, c1, …, cn−1].
    • Construct the polynomial P(x) = xn + cn−1xn−1 + … + c0.
  • Equivalence reduction. Exclude all polynomials related by the Frobenius automorphism β → βp, βp2, … since they yield identical irreducible equations.
  • Output. Return the remaining unique polynomials as the complete set of irreducible equations of degree n over G F ( p ) .
This outline provides an explicit algorithmic description of the computational procedure, complementing the theoretical formulation of Equations (55) and (57).

4. Discussion

Thus, the algorithm for finding the complete set of irreducible equations of a given degree K over a specified Galois field G F ( p ) consists of the following steps. The starting point is any irreducible equation of degree K over the given Galois field G F ( p ) . Using this equation, a primitive element of the extension G F ( p K + 1 ) is determined. Based on this element, all other primitive elements—that is, those for which condition (58) is not satisfied—are then identified. The obtained set of primitive elements is used to generate a set of irreducible equations as follows. The elements from this set and their powers are expressed in the form (57). On this basis, for each primitive element used, a system of equations of type (55) is constructed. This is a system of linear equations that can be solved using standard methods. Its solution yields the set of coefficients of the irreducible equation. Elements related to each other by the Frobenius automorphism are excluded from consideration, since they produce identical equations.
There is no doubt that further research in this direction is of significant interest for cryptography, as follows from the works cited in the Introduction. However, it should be emphasized once again that the development of an algorithm for obtaining complete sets of irreducible polynomials over a given Galois field is also of interest in terms of developing methods for digital monitoring of the information space.
The main idea of this approach is illustrated in Figure 1 of [50], which demonstrates the existence of analogies between classification problems currently solved using neural networks [51,52] and the error-correction methods employed in error-resistant coding.
This figure emphasizes that, in both of the aforementioned cases, there exists a surjection from set A of code sequences of a certain length (or images represented in digital form) onto set B, which corresponds to code sequences containing a smaller number of symbols. Figure 1 also highlights that any classification problem, whose initial data can be represented as sequences of symbols in a multivalued logic form, can be interpreted from the same perspective.
Consequently, the tools already developed in the theory of error-correcting coding (such as BCH codes and similar ones) can indeed be applied to solving classification problems. The solution of such problems is also of interest for improving methods of psychological testing.
Let us consider the following illustrative example using one of the simplest codes—the Hamming code [53]. When applying the Hamming (7,4) code, which allows the correction of a single error, the initial sequence of binary symbols a 1 , a 2 , a 3 , a 4 is supplemented with three additional symbols according to a well-known rule.
a 1 , a 2 , a 3 , a 4   W a 1 , a 2 , a 3 , a 4 , b 2 , b 3 , b 4
Error correction in this case implies that the code sequence containing seven symbols is mapped onto a sequence containing four symbols. Such a mapping can be considered a particular case of the correspondence shown in Figure 1.
A sequence of seven binary symbols can, among other things, be formed on the basis of respondents’ answers to the questions of a particular psychological test. In this context, the operation that is treated as error correction in coding theory can be interpreted as the correlation between a set of answers to test questions and a set of classification features. There are solid grounds to assume that this approach may, in the future, eliminate many issues arising during the verification of new psychological tests. Traditionally, this procedure is built upon comparing new tests with the results of already established ones and/or relies on the expert assessment method, which does not guarantee the exclusion of subjective factors.
The operation inverse to operation (64) allows, at the very least, for the selection of the most relevant classification features based on the available body of experimental data (test results). Indeed, the classical approach used in error-correcting coding theory assumes that the division of symbols into source and check (redundant) symbols is known. In the case of psychological testing data, however, there is no such distinction between original and check symbols. Consequently, there arises a choice: which questions’ answers should be assigned to set a i and which to set b i . By iterating through possible variants, one can determine the optimal classification features according to the following criterion: each of the above variants is characterized by a certain number of errors determined on the basis of experimental data. The optimal (or near-optimal) variant is the one corresponding to the minimal number of errors.
A similar approach can be applied to various psychological tests associated with different error-correction algorithms. The essence of the matter illustrated by the above example, however, remains unchanged. Specifically, it shows that we are essentially dealing with a problem that is inverse to that addressed by classical error-correcting coding theory.
This fact highlights the relevance of finding complete sets of irreducible equations of a given degree over specified Galois fields. Indeed, the foundation of many cryptographic methods lies in irreducible polynomials over particular Galois fields. These polynomials serve as the basis for algorithms ensuring error correction. However, traditional approaches developed in this field generally assume that a cryptographic key or its analog is either known or explicitly constructed.
When the aforementioned methods are applied to the processing of psychological test data, it is assumed that the “cryptographic key” (or, more precisely, its analog) must be derived from a large array of experimental data. Therefore, the first—and in many respects the principal—step in implementing the proposed approach is precisely the algorithm for finding the complete set of irreducible equations over a given Galois field. This is the exact problem solved in the present study.
A similar approach is also applicable to information-space monitoring—and in this case, it is even more suitable. Indeed, while in the verification of new psychological tests it is possible to test respondents using previously known methodologies, in the monitoring of social networks such a possibility is fundamentally absent. The classification features must be established directly from the available experimental data, since obtaining any additional information is difficult.
The simplest implementation of the proposed approach proceeds as follows. A dataset is formed reflecting the reactions of Internet users to various resonant events. As mentioned in the Introduction, there are reasons to assume that ternary logic is the most appropriate for tracking Internet users’ reactions to such events (positive reaction, no reaction, negative reaction). Sequences of this type of data can be processed using the methodology discussed above. In particular, in the simplest case, when ternary logic is employed, it is acceptable to use the Golay code [54].
In general, it can be stated that the use of Galois fields of the form G F ( 3 p 0 ) corresponds to a “batch” interpretation of the results of information-space monitoring. In this case, we are not dealing with a 3 p 0 valued logic but rather with segments of code sequences containing p0 symbols, each corresponding to ternary logic. However, this does not exclude the use of other codes, including those conforming to existing standards based on binary encoding [55].
Moreover, this does not preclude the possibility of employing a more detailed classification of responses corresponding to five- or seven-valued logics, whose algebraic operations can be represented according to the methodology described in [56]. In the practical implementation of a more complex approach, tools of fuzzy logic may also be used; however, a detailed discussion of such aspects lies beyond the scope of the present study. Furthermore, it cannot be ruled out that the multivalued logics used for the algebraic representation of variable values may prove most promising for integrating the proposed information-space monitoring methodologies with artificial intelligence systems, since, as noted in [57], the scenarios of AI’s further development remain highly variable.

5. Conclusions

The improvement of algorithms for constructing irreducible polynomials over Galois fields remains a relevant task for cryptography, error-correcting code design, and other applications. This study demonstrates that if at least one irreducible equation of degree K over a given Galois field G F ( p ) is known, it becomes possible to obtain the complete set of irreducible equations of the same degree over that field. Moreover, the problem of determining the coefficients of such equations reduces to a linear one. This makes it possible to implement a simple algorithm for finding all equations from the given set by using matrices formed by the powers of primitive elements represented as column vectors.
The proposed approach is of interest not only for cryptography but also for the development of new methods for monitoring the information space. In particular, there is a prospect of developing methodologies for indirect testing of users of social online networks by tracking their reactions to various resonant events and representing these reactions as sequences of symbols in multivalued logic form. The systematization of the obtained results in this case can be performed using methods analogous to those developed in the theory of error-correcting coding (Reed–Solomon codes, etc.), which ensure the correction of errors in such sequences. The main analytical tool in this context is the complete set of irreducible equations over a particular Galois field. The next step in this direction involves the practical implementation of information-space monitoring methods based on analogies with error-correcting coding techniques, as well as the integration of the proposed methods with the capabilities provided by artificial intelligence.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/computers14110468/s1, Supporting Information S1: Classification of Cubic Equations over GF(3)—detailed enumeration of all irreducible, semi-reducible, and fully reducible cubic equations used for validation of Table 2. Supporting Information S2: Counting of Irreducible Equations of Higher Degree over Galois Fields—combinatorial derivation confirming Theorem 2 for GF(34) and general GF(pn).

Author Contributions

Conceptualization, D.S. and I.S.; data curation, I.S.; formal analysis, A.M.; funding acquisition, D.S., A.M., Y.V. and I.S.; methodology, D.S. and I.S.; project administration, Y.V.; resources, A.M.; supervision, Y.V.; validation, A.M.; visualization, Y.V.; writing—original draft, D.S. and I.S.; writing—review and editing, Y.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by the Committee of Science of the Ministry of Science and Higher Education of the Republic of Kazakhstan: AP26104635.

Data Availability Statement

The original contributions presented in this study are included in the article and Supplementary Materials. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Yelizaveta Vitulyova was employed by the JSC “Institute of Digital Engineering and Technology”. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Beletsky, A. An Effective Algorithm for the Synthesis of Irreducible Polynomials over a Galois Fields of Arbitrary Characteristics. WSEAS Trans. Math. 2021, 20, 508–519. [Google Scholar] [CrossRef]
  2. Dey, S.; Ghosh, R. Search for Monic Irreducible Polynomials with Decimal Equivalents of Polynomials over Galois Field GF(pq). Open J. Discret. Math. 2017, 8, 21–33. [Google Scholar] [CrossRef]
  3. Zaman, J.S.U.; Dey, S.; Ghosh, R. An Algorithm to Find the Irreducible Polynomials over Galois Field GF(pm). Int. J. Comput. Appl. 2015, 109, 24–29. [Google Scholar] [CrossRef]
  4. von zur Gathen, J.; Gerhard, J. Modern Computer Algebra, 3rd ed.; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  5. Dey, S.; Ghosh, R. A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. Comput. Cyber Secur. 2018, 1, 527–555. [Google Scholar]
  6. Savaş, E.; Koç, Ç.K. Finite Field Arithmetic for Cryptography. IEEE Circ. Syst. Mag. 2010, 10, 40–56. [Google Scholar] [CrossRef]
  7. Mozhiarasi, P.; Gayathri, C.; Deepan, V. An Enhanced (31, 11, 5) Binary BCH Encoder and Decoder for Data Transmission. Int. J. Eng. Res. Gen. Sci. 2015, 3, 1–7. [Google Scholar]
  8. Graner, A.M. Irreducible Polynomials over Finite Fields for Coding and Cryptography. Ph.D. Thesis, Universität Rostock, Rostock, Germany, 2024. [Google Scholar]
  9. Tita, F.; Setiawan, A.; Susanto, B. Performance of S-Boxes Constructed by Irreducible Polynomials on GF(28). In Proceedings of the 2024 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 6–7 July 2024; pp. 1–7. [Google Scholar]
  10. Alsobky, W.; Ismail, A.; Mohra, A.; Hassan, A.; Abdelaziem, A. Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (28). Int. J. Telecommun. 2022, 2, 1–11. [Google Scholar] [CrossRef]
  11. Hankerson, D.; Menezes, A.; Vanstone, S. Guide to Elliptic Curve Cryptography; Springer: New York, NY, USA, 2004. [Google Scholar]
  12. Ben-Sasson, E.; Carmon, D.; Kopparty, S.; Levit, D. Elliptic Curve Fast Fourier Transform (ECFFT) Part I: Fast Polynomial Algorithms over All Finite Fields. arXiv 2021, arXiv:2107.08473. [Google Scholar] [CrossRef]
  13. Alinejad, M.; Hassan Zadeh, S.; Biranvand, N. Digital Signature with Elliptic Curves over the Finite Fields. J. Discret. Math. Sci. Cryptogr. 2022, 25, 1289–1301. [Google Scholar] [CrossRef]
  14. Dinh, T.X.; Nguyen, L.Y.N.; Mohan, L.J.; Boztas, S.; Luong, T.T.; Dau, S.H. Practical Considerations in Repairing Reed–Solomon Codes. arXiv 2022, arXiv:2205.11015. Available online: https://arxiv.org/abs/2205.11015 (accessed on 9 August 2025).
  15. Kopparty, S.; Ron-Zewi, N.; Saraf, S.; Wootters, M. Improved Decoding of Folded Reed–Solomon and Multiplicity Codes. arXiv 2018, arXiv:1805.01498. Available online: https://arxiv.org/abs/1805.01498 (accessed on 9 August 2025).
  16. Thakor, V.A.; Razzaque, M.A.; Khandaker, M.R.A. Lightweight Cryptography for IoT: A State-of-the-Art. arXiv 2020, arXiv:2006.13813. Available online: https://arxiv.org/abs/2006.13813 (accessed on 9 August 2025).
  17. El Gaabouri, I.; Senhadji, M.; Belkasmi, M. A Survey on Lightweight Cryptography Approach for IoT Devices Security. In Proceedings of the 2022 5th International Conference on Networking, Information Systems and Security (NISS), Bandung, Indonesia, 30–31 March 2022; pp. 1–8. [Google Scholar] [CrossRef]
  18. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems—CHES 2007; Paillier, P., Verbauwhede, I., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4727, pp. 56–68. [Google Scholar] [CrossRef]
  19. Bogdanov, A.; Knežević, M.; Leander, G.; Toz, D.; Varıcı, K.; Verbauwhede, I. Spongent: A Lightweight Hash Function. In Cryptographic Hardware and Embedded Systems—CHES 2011; Preneel, B., Takagi, T., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6917, pp. 312–325. [Google Scholar] [CrossRef]
  20. Berlekamp, E.R. Factoring Polynomials over Finite Fields. Bell Syst. Tech. J. 1967, 46, 1853–1859. [Google Scholar] [CrossRef]
  21. Divasón, J.; Joosten, S.; Thiemann, R.; Yamada, A. A Formalization of the Berlekamp–Zassenhaus Factorization Algorithm. In Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, Paris, France, 16–17 January 2017; pp. 17–29. [Google Scholar]
  22. Huang, D.; Yue, Q.; Li, F. Two Classes of Quasi-Cyclic Codes via Irreducible Polynomials. Cryptogr. Commun. 2023, 15, 649–659. [Google Scholar] [CrossRef]
  23. Rabin, M.O. Probabilistic Algorithms in Finite Fields. SIAM J. Comput. 1980, 9, 273–280. [Google Scholar] [CrossRef]
  24. Yakymenko, I.; Kasianchuk, M.; Shylinska, I.; Shevchuk, R.; Yatskiv, V.; Karpinski, M. Polynomial Rabin Cryptosystem Based on the Operation of Addition. In Proceedings of the 2022 12th International Conference on Advanced Computer Information Technologies (ACIT), Ternopil, Ukraine, 14–16 September 2022; pp. 345–350. [Google Scholar]
  25. Avoine, G.; Oechslin, P. RFID Traceability: A Multilayer Problem. In Security in Ubiquitous Computing; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3450, pp. 125–140. [Google Scholar]
  26. Juels, A. RFID Security and Privacy: A Research Survey. IEEE J. Sel. Areas Commun. 2006, 24, 381–394. [Google Scholar] [CrossRef]
  27. Stouffer, K.; Falco, J.; Scarfone, K. Guide to Industrial Control Systems (ICS) Security. NIST Spec. Publ. 2011, 800, 16. [Google Scholar] [CrossRef]
  28. Cardenas, A.A.; Amin, S.; Sastry, S. Research Challenges for the Security of Control Systems. In Proceedings of the 3rd Conference on Hot Topics in Security (HotSec ‘08), San Jose, CA, USA, 29 July 2008. [Google Scholar]
  29. Cheng, K. A New Direction on Constructing Irreducible Polynomials over Finite Fields. Finite Fields Appl. 2024, 95, 102368. [Google Scholar] [CrossRef]
  30. Lidl, R.; Niederreiter, H. Finite Fields; Encyclopedia of Mathematics and Its Applications; Cambridge University Press: Cambridge, UK, 1997; Volume 20. [Google Scholar]
  31. Swan, K.; Speyer, R.; Scharitzer, M.; Farneti, D.; Brown, T.; Woisard, V.; Cordier, R. Measuring What Matters in Healthcare: A Practical Guide to Psychometric Principles and Instrument Development. Front. Psychol. 2023, 14, 1225850. [Google Scholar] [CrossRef]
  32. Streiner, D.L.; Norman, G.R.; Cairney, J. Health Measurement Scales: A Practical Guide to Their Development and Use, 5th ed.; Oxford University Press: Oxford, UK, 2014. [Google Scholar] [CrossRef]
  33. Embretson, S.E.; Reise, S.P. Item Response Theory for Psychologists; Lawrence Erlbaum Associates Publishers: Mahwah, NJ, USA, 2000. [Google Scholar]
  34. Reise, S.P.; Ainsworth, A.T.; Haviland, M.G. Item Response Theory: Fundamentals, Applications, and Promise in Psychological Research. Curr. Dir. Psychol. Sci. 2005, 14, 95–101. [Google Scholar] [CrossRef]
  35. Suleimenov, I.; Kostsova, M.; Grishina, A.; Matrassulova, D.; Vitulyova, Y. Empirical Validation of the Use of Projective Techniques in Psychological Testing Using Galois Fields. Front. Appl. Math. Stat. 2024, 10, 1455500. [Google Scholar] [CrossRef]
  36. Elosua, P.; Aguado, D.; Fonseca-Pedrero, E.; Abad, F.J.; Santamaría, P. New Trends in Digital Technology-Based Psychological and Educational Assessment. Psicothema 2023, 35, 50–57. [Google Scholar] [CrossRef]
  37. Chen, X.; Jin, J.; Ke, W.; Mao, Y.; Hao, F.; Xu, D. Exploring Cognitive Behavioral Aspects in Educational Psychology: A Rigorous Analysis of Reliability and Validity Measures. SLAS Technol. 2024, 29, 100144. [Google Scholar] [CrossRef] [PubMed]
  38. Hocquenghem, A. Codes Correcteurs d’Erreurs. Chiffres 1959, 2, 147–156. [Google Scholar]
  39. Kamiya, N. On Algebraic Soft-Decision Decoding Algorithms for BCH Codes. IEEE Trans. Inf. Theory 2001, 47, 45–58. [Google Scholar] [CrossRef]
  40. Kumar, S.; Shah, N. False Information on Web and Social Media: A Survey. arXiv 2018, arXiv:1804.08559. [Google Scholar] [CrossRef]
  41. Solanki, S.; Kumar, M.; Kumar, R. A Survey on Information Diffusion and Competitive Influence Maximization in Social Networks. Soc. Netw. Anal. Min. 2025, 15, 41. [Google Scholar] [CrossRef]
  42. Singh, S.S.; Srivastava, D.; Verma, M.; Muhuri, S. Information Diffusion Analysis: Process, Model, Deployment, and Application. Knowl. Eng. Rev. 2024, 39, e11. [Google Scholar] [CrossRef]
  43. Coffey, S.M.; Elliott, M.R. Optimizing Data Collection Interventions to Balance Cost and Quality in a Sequential Multimode Survey. J. Surv. Stat. Methodol. 2024, 12, 741–763. [Google Scholar] [CrossRef]
  44. West, B.T.; Zhang, S.; Wagner, J.; Gatward, R.; Saw, H.-W.; Axinn, W.G. Methods for Improving Participation Rates in National Self-Administered Web/Mail Surveys: Evidence from the United States. PLoS ONE 2023, 18, e0289695. [Google Scholar] [CrossRef]
  45. van der Waerden, B.L. Algebra; Springer-Verlag: New York, NY, USA, 1991; Volume 1, p. 265. [Google Scholar]
  46. Vitulyova, E.S.; Matrassulova, D.K.; Suleimenov, I.E. Construction of Generalized Rademacher Functions in Terms of Ternary Logic: Solving the Problem of Visibility of Using Galois Fields for Digital Signal Processing. Int. J. Electron. Telecommun. 2022, 68, 237–244. [Google Scholar] [CrossRef]
  47. Suleimenov, I.E.; Bakirov, A.S.; Matrassulova, D.K. A Technique for Analyzing Neural Networks in Terms of Ternary Logic. J. Theor. Appl. Inf. Technol. 2021, 99, 2537–2553. [Google Scholar]
  48. Qi, M.; Xiong, S.; Yuan, J.; Rao, W.; Zhong, L. On Some New Difference Systems of Sets Constructed from the Cyclotomic Classes of Order 12. Discret. Math. 2017, 340, 2531–2537. [Google Scholar] [CrossRef]
  49. Leung, K.H.; Momihara, K.; Xiang, Q. Partial Difference Sets from Unions of Cyclotomic Classes. Finite Fields Appl. 2025, 108, 102661. [Google Scholar] [CrossRef]
  50. Suleimenov, I.E.; Matrassulova, D.K.; Moldakhan, I.; Vitulyova, Y.S.; Kabdushev, S.B.; Bakirov, A.S. Distributed Memory of Neural Networks and the Problem of the Intelligences Essence. Bull. Electr. Eng. Inform. 2022, 11, 510–520. [Google Scholar] [CrossRef]
  51. Li, S.; Hu, X.; Huang, Z.; Zhou, J. ECC-BERT: Classification of Error Correcting Codes Using the Improved Bidirectional Encoder Representation from Transformers. IET Comput. Mach. 2022, 2, 12357. [Google Scholar] [CrossRef]
  52. Verma, G.; Swami, A. Error Correcting Output Codes Improve Probability Estimation and Adversarial Robustness of Deep Neural Networks. In Proceedings of the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, BC, Canada, 8–14 December 2019; pp. 1–11. [Google Scholar]
  53. Hamming, R.W. Error Detecting and Error Correcting Codes. Bell Syst. Tech. J. 1950, 29, 147–160. [Google Scholar] [CrossRef]
  54. Forney, G.D., Jr. Coset Codes—Part I: Introduction and Examples. IEEE Trans. Inf. Theory 1988, 34, 1123–1151. [Google Scholar] [CrossRef]
  55. Bakirov, A.; Matrassulova, D.; Vitulyova, Y.; Shaltykova, D.; Suleimenov, I. The Specifics of the Galois Field GF(257) and Its Use for Digital Signal Processing. Sci. Rep. 2024, 14, 15376. [Google Scholar] [CrossRef]
  56. Shaltykova, D.; Kadyrzhan, K.; Caiko, J.; Vitulyova, Y.; Suleimenov, I. Trigger-Based Systems as a Promising Foundation for the Development of Computing Architectures Based on Neuromorphic Materials. Technologies 2025, 13, 326. [Google Scholar] [CrossRef]
  57. Kalimoldayev, M.N.; Pak, I.T.; Baipakbayeva, S.T.; Mun, G.A.; Shaltykova, D.B.; Suleimenov, I.E. Methodological Basis for the Development Strategy of Artificial Intelligence Systems in the Republic of Kazakhstan in the Message of the President of the Republic of Kazakhstan Dated October 5, 2018. News Natl. Acad. Sci. Repub. Kazakhstan 2018, 6, 47–54. [Google Scholar] [CrossRef]
Figure 1. The mapping of set A into set B, corresponding to the partition of set A into subsets Ai, each of which corresponds to a certain codeword with an absent error [50].
Figure 1. The mapping of set A into set B, corresponding to the partition of set A into subsets Ai, each of which corresponds to a certain codeword with an absent error [50].
Computers 14 00468 g001
Table 1. Coefficients representing the powers of the element θ .
Table 1. Coefficients representing the powers of the element θ .
n a 2 a 1 a 0
1010
2100
301−1
41−10
5−11−1
6111
71−1−1
8−10−1
9011
10110
1111−1
1210−1
1300−1
140−10
15−100
160−11
17−110
181−11
19−1−1−1
20−111
21101
220−1−1
23−1−10
24−1−11
25−101
26001
Table 2. Coefficients of irreducible equations obtained by solving system (8).
Table 2. Coefficients of irreducible equations obtained by solving system (8).
nc2c1c0N
101−11
2−1−112
301−11
4−1013
51−1−14
6−1−112
7−11−15
81116
901−11
10−1013
11−11−15
12−1013
13----
140117
151−1−14
160117
1710−18
18−1−112
191−1−14
201116
21−11−15
220117
2310−18
241116
2510−18
Table 3. Systematization of Galois field elements generating irreducible equations, from the perspective of the Frobenius automorphism.
Table 3. Systematization of Galois field elements generating irreducible equations, from the perspective of the Frobenius automorphism.
n/N12345678
11245781417
3361215212416 (42)25 (51)
991810 (36)19 (45)11 (63)20 (72)22 (126)23 (153)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shaltykova, D.; Massalimova, A.; Vitulyova, Y.; Suleimenov, I. Algorithm for Obtaining Complete Irreducible Polynomials over Given Galois Field for New Method of Digital Monitoring of Information Space. Computers 2025, 14, 468. https://doi.org/10.3390/computers14110468

AMA Style

Shaltykova D, Massalimova A, Vitulyova Y, Suleimenov I. Algorithm for Obtaining Complete Irreducible Polynomials over Given Galois Field for New Method of Digital Monitoring of Information Space. Computers. 2025; 14(11):468. https://doi.org/10.3390/computers14110468

Chicago/Turabian Style

Shaltykova, Dina, Aliya Massalimova, Yelizaveta Vitulyova, and Ibragim Suleimenov. 2025. "Algorithm for Obtaining Complete Irreducible Polynomials over Given Galois Field for New Method of Digital Monitoring of Information Space" Computers 14, no. 11: 468. https://doi.org/10.3390/computers14110468

APA Style

Shaltykova, D., Massalimova, A., Vitulyova, Y., & Suleimenov, I. (2025). Algorithm for Obtaining Complete Irreducible Polynomials over Given Galois Field for New Method of Digital Monitoring of Information Space. Computers, 14(11), 468. https://doi.org/10.3390/computers14110468

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop