Next Article in Journal
Stability Analysis of a Mathematical Model for Infection Diseases with Stochastic Perturbations
Previous Article in Journal
Pricing and Emission Reduction Strategies of Heterogeneous Automakers Under the “Dual-Credit + Carbon Cap-And-Trade” Policy Scenario
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication

by
Muhammad Sajjad
1,* and
Nawaf A. Alqwaifly
2,*
1
NUTECH School of Applied Science and Humanities, National University of Technology, Islamabad 44000, Pakistan
2
Department of Electrical Engineering, College of Engineering, Qassim University, Buraydah 52571, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Mathematics 2025, 13(14), 2263; https://doi.org/10.3390/math13142263
Submission received: 25 May 2025 / Revised: 17 June 2025 / Accepted: 22 June 2025 / Published: 13 July 2025
(This article belongs to the Special Issue Mathematics for Algebraic Coding Theory and Cryptography)

Abstract

This paper presents the construction and analysis of a novel class of alternant codes over Gaussian integers, aimed at enhancing error correction capabilities in high-reliability communication systems. These codes are constructed using parity-check matrices derived from finite commutative local rings with unity, specifically Z n [ i ] , where i 2 = 1 . A detailed algebraic investigation of the polynomial x n 1 over these rings is conducted to facilitate the systematic construction of such codes. The proposed alternant codes extend the principles of classical BCH and Goppa codes to complex integer domains, enabling richer algebraic structures and greater error-correction potential. We evaluate the performance of these codes in terms of error correction capability, and redundancy. Numerical results show that the proposed codes outperform classical short-length codes in scenarios requiring moderate block lengths, such as those applicable in certain segments of 5G and IoT networks. Unlike conventional codes, these constructions allow enhanced structural flexibility that can be tuned for various application-specific parameters. While the potential relevance to quantum-safe communication is acknowledged, it is not the primary focus of this study. This work demonstrates how extending classical coding techniques into non-traditional algebraic domains opens up new directions for designing robust and efficient communication codes.

1. Introduction

Algebraic coding theory is a cornerstone of modern information theory, enabling reliable transmission and storage of data over noisy channels. By introducing redundancy through structured mathematical codes, it allows for both the detection and correction of errors. One of the most versatile families of such codes is the class of alternant codes, which generalizes BCH and Goppa codes and combines algebraic flexibility with strong error correction capabilities. These codes are constructed using parity-check matrices derived from evaluations of rational functions, typically over finite fields.
Recently, research has explored the construction of alternant codes over more generalized algebraic structures, such as finite rings, Galois rings, and complex integer domains. One promising candidate in this direction is the ring of Gaussian integers, Z [ i ] , which offers additional algebraic tools such as norms, divisors, and Euclidean algorithms. Their structure enables more adaptable encoding mechanisms, particularly suitable for high-reliability systems such as satellite communication, the IoT, and 5G networks. Despite these prospects, the literature lacks a concrete coding framework for alternant codes over Z n [ i ] , where n is a positive integer.
This paper addresses this gap by proposing a construction method for alternant codes over Gaussian integer residue rings, evaluating their structural properties, and analyzing their effectiveness in correcting errors across moderately sized block lengths.

1.1. Related Works

The construction of error-correcting codes over non-field algebraic structures has received growing attention in recent decades. BCH and Goppa codes laid the foundation for alternant code construction. Huber extended this theory using Eisenstein–Jacobi integers, while Byrne and Fitzpatrick introduced alternant codes over Galois rings with efficient Hamming metric decoding. More recently, codes over Gaussian and Eisenstein integers have been explored for applications in both classical and quantum settings [1,2,3,4,5,6,7]. Sajjad et al. constructed BCH codes over Gaussian and Eisenstein fields and applied them in cryptographic systems [6,7]. Other works have linked alternant codes to Gröbner bases [8] and semigroup rings [9], while Shah and Medhat investigated the role of pullback constructions and integral domain properties [10,11,12]. Progress in quantum-safe cryptography has also intersected with this area. Xie et al. and Galindo et al. developed quantum error-correcting codes derived from classical BCH variants [13,14]. Lemoine et al. and Tang et al. enhanced decoding algorithms for alternant and GRS codes [15,16]. Different types of efficient codes and decoding strategies have been discussed in [17,18,19]. These studies collectively highlight the ongoing interest in applying algebraic structures beyond fields to construct robust, scalable codes.

1.2. Organization and Contributions

The remainder of this paper is structured as follows:
  • Section 2 outlines the algebraic preliminaries on Gaussian integers, residue class rings, and their impact on modern technology.
  • Section 3 presents the construction of alternant codes over Z n [ i ] , with theoretical justifications.
  • Section 4 includes decoding algorithms and performance evaluations.
  • Section 5 includes a comparative analysis and discussion.
  • Section 6 concludes the paper and outlines future research directions.

1.3. Major Contributions

This work offers the following original contributions:
  • A New Algebraic Framework:
We develop a generalized framework for constructing alternant codes over residue class rings of Gaussian integers, Z n [ i ] , extending classical BCH principles.
2.
Factorization of x n 1 :
The factorization of x n 1 over Z n [ i ] is analyzed to form the theoretical basis for parity-check matrix construction.
3.
Efficient Encoding and Decoding Algorithms:
We provide procedures for encoding and syndrome-based decoding suited for Gaussian-integer based alternant codes, optimized for computational efficiency.
4.
Performance Evaluation:
The proposed codes are evaluated in terms of redundancy, error correction capability, and complexity, particularly for medium-length codewords relevant to the IoT and segments of 5G.
5.
Application Potential:
We demonstrate that the flexibility of Z n [ i ] -based codes opens opportunities for future use in quantum-safe and noise-resilient communication systems.

2. Gaussian Integers

By following Section 2 in [20], Gaussian integers (GI) ring Z i = b 0 + b 1 i :   b 0 ,   b 1 Z is a subset of complex numbers, with multiplicative unit 1 and i 2 = 1 . Let g = a + b i be a Gaussian integer with conjugate g ¯ = a b i , and then the norm of Gaussian integer is N g which is the product of a Gaussian integer with its norm (sum of squares of real part and coefficient of imaginary part) as g g ¯ = a 2 + b 2 . For example, g = 2 + 3 i is a Gaussian integer; its conjugate is g ¯ = 2 3 i . The norm of g is N g = 2 + 3 i 2 3 i = 2 2 + 3 2 = 13 . Multiplication of the norm of Gaussian integers satisfies the N g 1 . g 2 g n = N g 1 . N g 2 N g n , where g 1 ,   g 2 ,   ,   g n Z i .
Theorem 1
([21], Theorem 2.3.2.). The Gaussian ring  Z i  is an integral domain.
Corollary 1 
([21], Corollary 2.4.2.1.). The integral domain  Z i  is an Euclidean domain.
Lemma 1 
([21], Lemma 3.1.1.). If  Z i  is a Euclidean domainthen  Z i  is a principal ideal domain.
Corollary 2
([21], Corollary 6.2.4.1.). Let  p Z  be primewith  p 1 ( mod 4 ) ;  then  p  can be factored into a product of the Gaussian prime in  Z [ i ] .
Corollary 3
([21], Corollary 6.2.4.2.). Let  p Z  be primewith  p 1 ( mod 4 ) ;  then  p  is not prime in  Z [ i ] .
Theorem 2
([21], Theorem 6.2.5.). Let  p Z  be primewith  p 3 ( mod 4 ) then  p  is irreducible in  Z i .
Lemma 2
(Section 2 in [22]). Let  g = a + i b Z n i  is unit if and only if  N ( g )  is a unit in  Z n .
We observe that { ± 1 ,   ± i } are units in Z [ i ] and that Gaussian primes are the usual integers p such that p 3 ( mod 4 ) and those Gaussian integers Z [ i ] such that N ( z ) = p . It can be seen easily that the ring Z [ i ] / n Z [ i ] is canonically isomorphic to Z [ i ] n = { a + i b   : a ,   b Z n } . This ring is denoted by Z [ i ] n , and it is a principal ideal ring, Definition 3.7. [22]; it suffices to fix n Z rather than fix n , such that a + i b . First, when n is of the form p k , where p is a prime integer and k > 0 . Since our main purpose is fields and local commutative rings of Gaussian integers, in this case, it may be noted that the ring Z p k [ i ] may not always be a local ring. Likewise, Z p i is not a field for every prime p . We begin with the description of Z p k [ i ] for primes p such that Z p k [ i ] is a local ring or field.
Theorem 3 
([23]). The ring  Z 2 k [ i ]  is local for every positive integer k .
Theorem 4 
([23]). The ring  Z p k i  is local for every positive integer  k  and  p 3 ( mod   4 ) .
Corollary 4 
([6]). Let  Z p k i  be a Gaussian field if  p 3 ( mod   4 )  and  k = 1 .
The following results characterize the unit elements of Z [ i ] n = Z p k [ i ] . From Section 2 in [22];
(i)
U Z p k [ i ] = 2 2 k 1 , if p 2 .
(ii)
U Z p k [ i ] = p k p k 1 2 , if p 1 ( mod 4 ) .
(iii)
U Z p k [ i ] = p 2 k p 2 k 2 , if p 3 ( mod 4 ) .
Impact of Alternant Codes in Modern Technology: Control and efficient data transfer in a constantly changing environment are crucial for the effectiveness of a number of exciting modern technological solutions, such as the 5G cellular network, computing in the cloud, automobiles without drivers, and the Internet of Things (IoT). These technologies depend on the high-speed accuracy of transmitting huge volumes of data in noisy and interfered areas. To overcome such issues, there is a need for the formulation of enhanced error-correction methods. This work proposes a new method in modern systems of communication by modeling the alternant codes built over the Gaussian integers. These codes are constructed based on parity-check matrices produced from finite commutative local rings created out of Gaussian integers modulo n . Thus, by integrating these alternant codes into data transfer processes, we advance the error detection and correction features of data transmission, thereby increasing its integrity and effectiveness. This study confirms that through the society of alternant codes, one can have strong support in responding to the challenges of modern communication systems; therefore, the given work can be regarded as significant progress in the sphere of coding and data transmission.

3. Alternant Codes

We explain the construction technique of alternant codes over the finite commutative local rings of Gaussian integers with identity. Initially, we list some data from the basic theory of commutative rings. Thus, Z [ i ] n is assumed to be a finite local commutative ring with unity, M is the maximal ideal of rings Z [ i ] n , and the residue field is K = Z [ i ] n M G F ( q ) , where q = p m   m Z + and p is a prime. Let Z [ i ] n x = a j x j :   a j Z [ i ] n . Let g ( x ) be a monic polynomial of degree s in Z [ i ] n [ x ] , such that μ ( g ( x ) ) is irreducible in K [ x ] , where μ is a natural projection. Moreover, we would also conclude that g ( x ) is irreducible because it gave a factorization of h j ( x ) in terms of lower-order cyclotomic polynomials and is irreducible in Z [ i ] n x . Suppose R = Z [ i ] n [ x ] < g x > G R ( p k ,   s ) is a finite commutative local ring with unity and is the Gaussian extension of Z [ i ] n of degree s . Its residue field will be K 1 = R M 1 ¯ G F p m s , where M 1 ¯ is the maximal ideal of R . Let K 1 * be the unit element K 1 , and its order is p m s 1 . Suppose R * is the multiplicative group of R ; then, as is customary with all multiplicative groups, it must be a direct product of cyclic groups. The cyclic group is the maximal cyclic subgroup of the group of units in R . The elements of that maximal cyclic group G s are the roots of the polynomial x s 1 for some s , where g c d ( s ,   p ) = 1 , it is isomorphic to K 1 * . The cyclic group that is maximal then is denoted G s and has the order s = p m s 1 .
It has long been known that a parity=check matrix H with r rows and n columns of elements from G s of G F ( q m ) can uniquely characterize an n ,   k 0 linear code over G F q , where m ,   r Z + and r m n k 0 .
Definition 1.
Given maximal cyclic subgroup  G s  of  Z p k i m ,  assume that the locator polynomial  η = ( α 1 ,   α 2 ,   ,   α n )  consists of distinct elements of  G s  and  y = ( y 1 ,   y 2 , ,   y n )  is an arbitrary vector consisting of the elements of  G s Then, a parity-check matrix  H  of shortened alternant code  C ( n ,   η ,   y )  of length  n s  over  Z p k [ i ]  is defined as follows:
H = y 1 y 2 y n         y 1 α 1 y 2 α 2 y 2 α n                       y 1 α 1 r 1 y 2 α 2 r 1 y n α n r 1 ,
where  r Z +  and  r = n k 0 .    Additionally, C ( n ,   η ,   y )  is a linear alternant code  [ n ,   k 0 ,   d ]  over  K = G F ( p m ) with  n m r k 0 n r .  The number of parity-check symbols is at most  m r .  Apart from itit is possible to estimate the minimum Hamming distance for  C ( n ,   η ,   y )  from the parity-check matrix.
Theorem 6.
It can also be seen that the minimum Hamming distance of alternant code  C ( n , η , y )  will be at least  d r + 1 .
Proof. 
Let C ( n , η , y ) be an alternant code of length n , where η = ( η 1 , , η n ) F q m is a vector of distinct elements, y = ( y 1 , , y n ) F q m is a non-zero vector, and r is the designed error-correcting capability, i.e., the alternant code is derived from a Generalized Reed–Solomon (GRS) code of dimension n r . The parity-check matrix H of the alternant code is given by the following:
H = 1 y j η j i 1 1 i r ,   1 j n .
Now, consider the minimum Hamming distance d . With the Singleton bound, for a code of length n , dimension k , and minimum distance d , we have d n k + 1 . For an alternant code of length n , dimension k n r , since it is a subfield subcode of a GRS code over F q m . However, a key result from the theory of alternant codes tells us d r + 1 .
Justification. 
This is because any codeword c = ( c 1 , , c n ) C ( n , η , y ) F q n satisfies: H c T = 0 . Suppose c has Hamming weight w r . Then, the set of positions j such that c j 0 has size r . The submatrix of H corresponding to those positions is a r × w Vandermonde-like matrix over F q m , and when w r , such a matrix has linearly independent columns, unless c j = 0 for all j , contradicting the assumption that c has weight w . Hence, no non-zero codeword can have weight r , implying d r + 1 .
Example 1.
For the impact of alternant codes constructed over Gaussian integers, let  p = 2  and  k = 1 ,  then  Z 2 [ i ] = 0 ,   1 ,   i ,   1 + i  with  i 2 = 1  being the finite commutative local ring with identity having maximal ideal  M = 0 ,   1 + i , then the residue field  K = Z 2 [ i ] M = 0 ¯ , 1 ¯ G F 2 . If  g x = x 2 + x + i , then  µ x 2 + x + i = x 2 + x + 1  it has no rational root and so it is irreducible over  K ,  and  g x = x 2 + x + i  is the basic irreducible over  Z 2 [ i ] . The given extension ring  R = Z 2 [ i ] x / < x 2 + x + i > G R 2 4  is the finite commutative local ring with residue field  K 1 G F 2 2 . Then, the maximal cyclic subgroup  G s  has the order  s = 3 . For the purpose of generating the maximal cyclic group  G 3 ,  let  α  be the root of  g x  and be of order of 6 in set  R * . So,  α 2 = α + i  is the primitive root of  G 3 . If  β = α + i , then elements of  G 3  are  β = α + i , β 2 = α + i + 1 ,  β 3 = 1 .  Each of the elements of  G s  are all the roots of  x 3 1 ( modulo  2 ) . Now we choose  n = 3 ,  r = 2 ,   η = 1 ,   β ,   β 2 ,  and  y = 1 ,   1 ,   1 ,  then  C ( 3 ,   η ,   y )  is the shortened alternant code with the parity-check matrix  H
H = 1 β β 2 1 β 2 β = 1 α + i α + 1 + i 1 α + 1 + i α + i ,
with a minimum distance  d 3 . The corresponding parity-check matrix  H  of entries from the residue field  K G F ( 2 )  is
H = 1 1 0 0 1 1 . . 1 0 . . 0 1 . . 1 1 .
It is an established fact that the order of every finite field is a power of some prime p . From Corollary 4, Z p k [ i ] is a field if and only if p 3 (mod  4 ) and k = 1 . Furthermore, the order of every finite field of Gaussian integers Z p [ i ] with p 3 (mod 4) will be p 2 .
Example 2.
For the alternant codes construction over Gaussian integers, let  p = 3 and  k = 1 ; then  Z 3 [ i ] = { 0 ,   1 ,   2 ,   i ,   1 + i ,   2 + i ,   2 i ,   1 + 2 i ,   2 + 2 i } is a Gaussian field with 9 elements, and it is isomorphic to  G F ( 3 2 ) . Let  f x = x 2 + x + 2 + i is a primitive irreducible polynomial over  Z 3 [ i ] . Let  α be the root of  f ( x ) ; then,  α has order  80 in  Z 3 [ i ] . The remaining elements of extension field  Z 3 i * 2 are given in Table 1.
Let η = ( α ,   α 3 ,   α 19 ,   α 51 ,   α 54 ,   α 57 ,   α 70 ,   α 75 ,   α 79 ) and y = α ,   α 7 ,   α 19 ,   α 25 ,   α 27 ,   α 47 ,   α 60 ,   α 63 ,   α 71 then for r = 3 , C ( 9 ,   η ,   y ) has parity-check matrix
H = α α 7 α 19 α 25 α 27 α 47 α 60 α 63 α 71 α 2 α 10 α 38 α 76 α α 24 α 50 α 58 α 70 α 3 α 13 α 57 α 47 α 55 α α 40 α 53 α 69 .
The parity-check matrix H of elements from Z 3 [ i ] G F ( 3 2 ) is
H = 0 + 0 i 2 + 0 i 1 + 2 i 1 + 2 i 0 + 2 i 1 + 0 i 0 + 2 i 1 + 1 i 0 + 0 i 1 + 0 i 1 + 2 i 1 + 2 i 2 + 1 i 1 + 1 i 2 + 1 i 0 + 0 i 2 + 1 i 1 + 1 i . . 1 + 2 i 2 + 0 i . . 2 + 1 i 2 + 2 i . . 2 + 1 i 0 + 0 i . . 0 + 1 i 2 + 0 i . . . . . . . . . . . . . . 1 + 2 i 2 + 2 i 0 + 0 i 0 + 1 i 1 + 2 i 1 + 1 i 1 + 1 i 0 + 1 i 1 + 2 i 1 + 0 i 1 + 0 i 0 + 0 i 2 + 0 i 0 + 0 i . . . . . . . . . . . . . . 2 + 1 i 1 + 0 i 1 + 0 i 0 + 0 i 2 + 0 i 0 + 2 i 0 + 1 i 0 + 1 i 2 + 1 i 2 + 0 i 1 + 0 i 0 + 0 i 1 + 0 i 0 + 1 i .
We have an alternat code C [ 9 ,   6 ] over Z 3 2 [ i ] with minimum distance d 4 . Then all columns of H are linearly independent, and C ( 9 ,   η ,   y ) has a minimum distance of 9.
Example 3.
For the alternant code construction over Gaussian integers, let  p = 3 and  k = 2 , then  Z 3 2 [ i ] is a local commutative ring with maximal ideal  M = { 0 ,   3 ,   6 ,   3 i ,   3 + 3 i ,   6 i ,   3 + 6 i ,   6 + 3 i ,   6 + 6 i } . Further  K = 0 ,   1 ,   2 ,   i ,   1 + i ,   2 + i ,   2 i ,   1 + 2 i ,   2 + 2 i G F 3 2 . The polynomial  f ( x ) = x 2 + 7 x + 8 + i is irreducible over  Z 3 2 [ i ] . Thus,  R = Z 3 2 i [ x ] < f x > is a Galois extension of  Z 3 2 i . Let  α be the root of  f ( x ) , then  α has the order  240 in  R * . Let  β = α 3 generate a cyclic group  G s of order  s = 3 4 1 = 80 . If we set  η = 1 ,   β , ,   β 79 , and  y = ( 1 ,   1 ,   · · · 1 ) for  n = 80 and  r = 4 , we have an alternat code  C [ 80 ,   76 ] over  Z 3 2 [ i ] with a minimum Hamming distance of at least 5.

4. Decoding Procedure

In this section, our intention is to demonstrate how the Euclidean algorithm can be used to decode alternant codes. Given C n ,   η ,   y , an alternant code over G F ( q ) with parity-check matrix H , let the code have minimum distance d = r + 1 . Let c = ( c 1 ,   c 2 ,   ,   c n ) be the transmitted codeword and a = ( a 1 ,   a 2 ,   ,   a n ) be the received vector. The error vector is defined as e = ( e 1 ,   e 2 ,   ,   e n ) . Let t = r 2 errors that have happened in sites to decode alternant codes
X 1 = α i 1 ,   X 2 = α i 2 ,   ,   X t = α i t
In G s with error values
Y 1 = a i 1 ,   Y 2 = a i 2 ,   ,   Y t = a i t
Firstly, find the syndromes using
S = y 1 y 2 y n         y 1 α 1 y 2 α 2 y 2 α n                       y 1 α 1 r 1 y 2 α 2 r 1 y n α n r 1 0   0 .   Y t   . 0 = s 0   s 1 .   .   . s r 1 ,
where
S μ = v = 1 t α i v μ a i v y i v = v = 1 t X v μ Y v y i v ,   For   μ = 0 ,   1 , r 1 .
Secondly, find error locator polynomial σ z as
σ z = i = 1 t ( 1 X i z ) = i = 0 t σ i z i ,   σ 0 = 1 .
Using syndromes, and the error evaluator polynomials
ω z = v = 1 t Y v w i v   μ = 1 μ v t ( 1 X μ z ) .
Furthermore,
ω ( z ) σ ( z ) = S ( z ) ( mod   ( z r ) ) ,   where   S z = 0 r 1 S μ z μ .
Using the Euclidean algorithm, the above equation can be solved by
r 1 z = z r   and   r 0 z = S z .
Let is continue this Euclidean algorithm until r k ( z ) such that deg ( r k 1 ) r 2 and deg r k r 2 1 . Then, the error locator polynomial and error evaluator polynomial are σ z = δ U k z and ω z = 1 k δ r k z , where constant = δ . Chosen to make σ 0 = 1 and U k satisfies r k ( z ) 1 k U k ( z ) r 0 ( z )   ( mod r 1 z ) , and then
ω ( z ) σ z S z ( mod   ( z r ) ) ,   deg σ z 1 2 r ,   and   deg ω z 1 2 r 1 .
Lastly, find the error magnitudes using
Y ¯ μ = ω ( X μ 1 ) y i μ v μ t ( 1 X v X μ 1 )
The pseudo code of the decoding procedure is given in Algorithm 1.
Algorithm 1: Decoding Alternant Codes Using Euclidean Algorithm
Input:
  •
Alternant code C(n,η,y) over GF(q)
  •
Received vector a = (a_1, a_2, …, a_n)
  •
Parity-check matrix H
  •
Set of support elements α = (α_1, α_2, …,α_n)
  •
Set of multipliers y = (y_1, y_2, …, y_n)
  •
Minimum distance d = r + 1
  •
Error-correcting capability t = ⌊r/2⌋
Step 1: Syndrome Calculation
  1.
Initialize syndromes S_0, S_1, …, S_{r − 1} to zero.
  2.
For μ = 0 to r − 1:
  ○
S_μ = ∑{j = 1}^{n} aj⋅α_j μ⋅y_j
Step 2: Define Syndrome Polynomial
  •
Construct the syndrome polynomial:
S(z) = S_0 + S_1 z + S_2 z^2 + … + S_{r − 1} z^{r − 1}
Step 3: Apply the Euclidean Algorithm
  1.
Initialize:
  ○
r_{−1}(z) = z^r
  ○
r_0(z) = S(z)
  ○
U_{−1}(z) = 0
  ○
U_0(z) = 1
  2.
While deg(r_k(z)) > ⌊r/2⌋:
  ○
Perform polynomial division:
q_k(z) = ⌊r_{k − 2}(z)/r_{k − 1}(z)⌋
  ○
Update:
  ▪
r_k(z) = r_{k − 2}(z) − q_k(z).r_{k − 1}(z)
  ▪
U_k(z) = U_{k − 2}(z) − q_k(z).U_{k − 1}(z)
  3.
Let:
  ○
σ(z) = δ⋅U_k(z), where δ is chosen such that σ(0)=1
  ○
ω(z) = (−1)^k⋅δ⋅r_k(z)
Step 4: Find Error Locations
  1.
Find the roots of σ(z) = 0, say X_1^{−1}, X_2^{−1}, …, X_t^{−1}
  2.
Error locations are at positions where α_i = X_j for some j
Step 5: Compute Error Values

For each error location X_μ, compute the error magnitude:

Yμ = ω(X_μ^{−1})/(y_iμ⋅∏v ≠ μ(1 − X_v⋅X_μ^{−1}))

Step 6: Recover the Original Codeword
  1.
Initialize error vector e = (0, 0, …, 0)
  2.
For each error location i_μ, set e_iμ = Y
  3.
Compute corrected codeword:
c = a − e
End
Example 4.
From Illustration 3.1, the maximal cyclic subgroup  G 3 ,  η = β 2 ,   1 ,   β = ( η 1 ,   η 2 ,   η 3 ) ,  y = ( β ,   β ,   1 ) and  r = 2 , so  t = 1 with length 3 of alternant code  C ( η ,   y ) over  Z 2 [ i ] with a minimum Hamming distance of at least 3. Let
H = β β 1 β 3 β β ,
be the parity=check matrix. Consider a received vector  r = 0 ,   0 ,   β 2 , and  S = r H T = β 2 ,   β 3 are two syndromes corresponding to the received vector  r , which is non-zero; this means that  r is not a codeword. Secondly, find the error locator polynomial  σ z for the weight of the received vector  r , which is 1. Let  t = 1 , because only one component in  r is non-zero. So,  r i 1 = r 3 , for  i 1 = 3 ; this means the error is occurring at the third place in  r . The location of the error is  X 1 = η i 1 = β , with error magnitude  Y 1 = r i 1 = β 2 . The error locator polynomial is  σ z = 1 β z = 1 + β z . Furthermore, the error evaluator polynomial is  ω z = S z . σ z   m o d   z 2 = β 2 , where  S z = β 2 + β 3 z . Finally, the error magnitude is  Y ¯ 1 = β 2 . Hence,  c = r e = 0 ,   0 ,   0 is a corrected codeword of the alternant code over  Z 2 i .
Example 5.
From Illustration 3.2, the cyclic group of order 80. Let us set  η = α 2 ,   α ,   α 55 ,   0 ,   0 ,   , 0 1 × 10 = η 1 ,   η 2 ,   η 3 ,   ,   η 10 ,   y = 1 ,   1 ,   1 ,   ,   1 1 × 10 and  r = 4 , so  t = 2 then we have length 10, and the alternant code  C ( η ,   y ) over  Z 3 i with minimum Hamming distance is at least  5 . Let
H = 1 1 1 1 1 α 2 α α 55 0 0 α 4 α 2 α 30 0 0 α 6 α 3 α 5 0 0 ,
be the parity-check matrix. Let a received vector  r = 1 , α 2 , 0 , , 0 1 × 10 and  S = a H T = 1 + α 2 α 2 + α 3 α 4 + α 4 α 6 + α 5 = α 77 α 51 α 44 α 54 = S 1 S 2 S 3 S 4 are the four syndromes corresponding to the received vector  r , which are non-zero; this means that  r is not a codeword. Secondly, find the error locator polynomial  σ z . Let  t = 2 because there are two non-zero components in  r . So,  r i 1 = r 1 , and  r i 2 = r 2 , for  i 1 = 1 , and  i 2 = 2 ; this means the error occurs in the 1st and 2nd places in  r . The error locations are  X 1 = η i 1 = η 1 = α 2 and  X 2 = η i 2 = η 2 = α , with error magnitudes  Y 1 = a i 1 = 1 and  Y 2 = a i 2 = α 2 . Let the error locator polynomial  σ z = 1 + α 10 z + α 3 z 2 , and the error evaluator polynomial is  ω z = α 28 z + α 77 . Further polynomials  σ ( z ) and  ω ( z ) satisfy  σ z = ω z S ( z ) mod  z 4 . Finally, the error magnitudes are
Y ¯ 1 = ω X 1 Y 1 1 X 2 X 1 1 = ω α 78 1 1 X 2 X 1 1 = 2 + α + i + i α 2 + α + i + i α = 1 .
Y ¯ 2 = ω X 2 Y 1 1 X 1 X 2 1 = ω α 79 1 1 X 1 X 2 1 = 2 + i α + i 1 + 2 α = 1 + 2 α + 2 i = α 2 .
Therefore, the error pattern is e = ( 1 ,   α 2 ,   0 ,   0 ) and the corrected codeword is c = 0 ,   0 ,   0 ,   0 .

5. Comparative Analysis and Discussion

This section provides a comparative study of alternant codes over Galois rings and Gaussian rings, referring to the concept from Norton and Sălăgean [4] and Byrne and Fitzpatrick [8]. Two-dimensional vector algebra for local rings and fields is divided into two cases: Gaussian and Eisenstein. Eisenstein is discussed in our previously published article [16] in 2025. We cannot compare the proposed work with Eisenstein integers [16], because both Gaussian and Eisenstein integers have different congruence classes dependent on parameters p and k . As a type of error-correcting code, alternant codes are studied in terms of various parameters, including the code length n , dimension k , minimum distance d , ability to detect errors ( d 1 ) , ability to correct errors ( t = f l o o r d 1 2 ) , code rate R = k / n and the number of codewords | C | . A comparative study of alternant codes over Gaussian rings Z p k i s and Galois rings G R ( p k ,   s ) is given in Table 2.
Based on the tabulated results, we can see that alternant codes over Gaussian rings provide a much larger codebook size C compared to their counterpart over Galois rings, with the same value of code parameters n, k, and d. For instance:
  • When  n = 3 ,   k = 1 ,   d = 3 , the minimum distance and the code rate ( R = 0.3333 ) are the same when using Z 2 i 2 and G R ( 2 2 ,   2 ) ; however, the code over the Gaussian ring has four times as many codewords ( | C | = 16 versus | C | = 4 ) .
  • In the case of n = 9 ,   k = 6 ,   d 4 ,   Z 3 i 2 and G R 3 2 ,   2 have the same structural parameters and error correction ability, but the Gaussian ring construction has twice the number of codewords ( 3 24   v s .   3 12 ) .
  • A greater advantage is seen in larger lengths like n = 80 ,   k = 76 , where both Z 3 2 i 2 and G R ( 3 2 ,   4 ) provide five or more minimum distances and approximately the same code rate ( R = 0.95 ) but the code over the Gaussian ring has exponential growth in the number of codewords, with C = 3 304 , whereas the Galois ring has | C | = 3 152 .
A direct consequence of this doubling of the codeword length in all examples is that this suggests a more abundant codebook and, consequently, greater redundancy and more error resilience with Gaussian rings. The algebraic view as a Gaussian integer, especially the complex units and extra symmetry, enables more valid codewords with the same constraints. There is, however, a trade-off with this benefit: a bigger codebook means increased complexity in decoding and possibly lower transmission speeds because of the symbol space. Nevertheless, where error tolerance and robustness are valued, as in deep-space communication, military systems, or quantum-safe protocols, it is very desirable to use alternant codes instead of Gaussian rings.
Finally, it can be seen that alternant codes over Gaussian rings not only inherit the crucial parameters of the classical alternant codes over Galois rings but also surpass them in the abundance of codewords, making them more useful in the settings where the error correction capabilities are given the highest priority. These results confirm the potential of Gaussian rings as an algebraic basis to realize superior and powerful coding schemes.

6. Conclusions and Future Directions

In this article, the construction and analysis of alternant codes over Gaussian integers have been introduced with respect to their algebraic background and relevance in dependable digital communication. Using parity-check matrices whose entries are elements of finite commutative local rings with unity, namely, quotient rings of Gaussian integers modulo n , we have created a unified framework to construct error-correcting codes and generalize the classical BCH codes’ paradigms. We have shown that these codes share structurally desirable properties with the Gaussian integer ring, including a more intricate algebraic structure and the existence of unit elements, which can help to achieve better error detection and correction. The study of the factorization of x n 1 in these rings formed the basis of encoding and decoding operations. Relatively, it has been indicated through comparative studies that these codes covering Gaussian integers are better than the traditional codes over Galois rings in some noise profiles, particularly in burst error scenarios or low SNR channels. Their suitability to modular arithmetic also implies their suitability to secure and quantum-resistant communication protocols.
This work can be extended in a number of ways in the future:
  • Minimization of decoding algorithms, especially in the case of long codes, in order to decrease the computational complexity–accuracy trade-off.
  • Going to quaternion and even octonion integers to seek structural benefits in other algebraic settings.
  • Understanding the performance of these codes in post-quantum communicational systems, as well as blockchain consensus mechanisms and safe distributed systems.
Finally, alternant codes over Gaussian integers constitute an interesting family of algebraically robust but practically relevant error-correcting codes. Ongoing efforts in this direction could bring about new generations of codes that satisfy the requirements of more complex and security-sensitive communication infrastructures.

Author Contributions

M.S.: conceptualization; methodology; software; formal analysis; investigation; writing—original draft; writing—review & editing; project administration. N.A.A.: conceptualization; validation; writing—review & editing; project administration. All authors have read and agreed to the published version of the manuscript.

Funding

The researchers would like to thank the Deanship of Graduate Studies and Scientific Research at Qassim University for their financial support (QU-APC-2025).

Data Availability Statement

The original contributions presented in this study are included in the article.

Acknowledgments

We are also deeply grateful to our beloved mentor and true gentleman, Tariq Shah, whose vision and guidance have profoundly inspired our journey as researchers.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Dresden, G.; Dymàček, W.M. Finding factors of factor rings over the Gaussian integers. Am. Math. Mon. 2005, 112, 602–611. [Google Scholar] [CrossRef]
  2. Freudenberger, J.; Ghaboussi, F.; Shavgulidze, S. New coding techniques for codes over Gaussian integers. IEEE Trans. Commun. 2013, 61, 3114–3124. [Google Scholar] [CrossRef]
  3. Sajjad, M.; Shah, T.; Xin, Q.; Almutairi, B. Eisenstein field BCH codes construction and decoding. AIMS Math. 2023, 8, 29453–29473. [Google Scholar] [CrossRef]
  4. De Andrade, A.A.; Palazzo, R., Jr. Construction and decoding of BCH codes over finite commutative rings. Linear Algebra Its Appl. 1999, 286, 69–85. [Google Scholar] [CrossRef]
  5. Sajjad, M.; Shah, T.; ul Haq, T.; Almutairi, B.; Xin, Q. SPN based RGB image encryption over Gaussian integers. Heliyon 2024, 10, e30353. [Google Scholar] [CrossRef]
  6. Sajjad, M.; Shah, T.; Alammari, M.; Alsaud, H. Construction and decoding of BCH-codes over the Gaussian field. IEEE Access 2023, 11, 71972–71980. [Google Scholar] [CrossRef]
  7. Sajjad, M.; Shah, T.; Serna, R.J. Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers. Comput. Mater. Contin. 2023, 75, 5287–5305. [Google Scholar] [CrossRef]
  8. Byrne, E.; Fitzpatrick, P. Gröbner bases over Galois rings with an application to decoding alternant codes. J. Symb. Comput. 2001, 31, 565–584. [Google Scholar] [CrossRef]
  9. De Andrade, A.A.; Shah, T.; Khan, A. A note on linear codes over semigroup rings. Trends Comput. Appl. Math. 2011, 12, 79–89. [Google Scholar] [CrossRef]
  10. Shah, T. A note on ascend and descend of factorization properties. Bull. Korean Math. Soc. 2006, 43, 419–424. [Google Scholar] [CrossRef]
  11. Shah, T. Relative ascent and descent in a domain extension. Int. Electron. J. Algebra 2010, 7, 34–46. [Google Scholar]
  12. Shah, T.; Medhat, S. Stability of some integral domains on a pullback. Mat. Vesn. 2012, 64, 109–123. [Google Scholar]
  13. Xie, C.; Chen, H.; Li, C.; Mesnager, S. Constructions of self-orthogonal linear codes and dual-containing BCH codes. IEEE Trans. Inf. Theory 2025, 71, 5049–5062. [Google Scholar] [CrossRef]
  14. Galindo, C.; Hernando, F.; Martín-Cruz, H. New quantum codes from homothetic-BCH codes. arXiv 2025, arXiv:2503.13069. [Google Scholar]
  15. Lemoine, A.; Mora, R.; Tillich, J.P. Understanding the new distinguisher of alternant codes at degree 2. Des. Codes Cryptogr. 2025, 1–23. [Google Scholar] [CrossRef]
  16. Tang, N.; Han, Y.S.; Pei, D.; Chen, C. A Fast Decoding Algorithm for Generalized Reed-Solomon Codes and Alternant Codes. arXiv 2025, arXiv:2502.02356. [Google Scholar]
  17. Norton, G.H.; Sălăgean, A. On Efficient Decoding of Alternant Codes over a Commutative Ring. In Proceedings of the Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, 20–22 December 1999; Springer: Berlin/Heidelberg, Germany; pp. 173–178. [Google Scholar]
  18. Byrne, E.; Fitzpatrick, P. Hamming metric decoding of alternant codes over Galois rings. IEEE Trans. Inf. Theory 2002, 48, 683–694. [Google Scholar] [CrossRef]
  19. Sajjad, M.; Shah, T.; Abbas, M.; Alammari, M.; Serna, R.J. The impact of alternant codes over Eisenstein integers on modern technology. Comput. Appl. Math. 2025, 44, 95. [Google Scholar] [CrossRef]
  20. Zhang, K.; Dai, J.; Yu, X.; Zhang, G. Distance correction range-free localization algorithm for WSNs. Ain Shams Eng. J. 2024, 15, 102924. [Google Scholar] [CrossRef]
  21. Molelekeng, B. Arithmetic in the Ring of Gaussian Integers. Ph.D. Thesis, University of the Witwatersrand Johannesburg, Johannesburg, South Africa, 2022. [Google Scholar]
  22. Abu-Osba, E.A. Von Neumann inverses and cryptography. Dirasat Pure Sci. 2009, 36, 1–4. [Google Scholar]
  23. Abu-Osba, E.A.; Henriksen, M.; Alkam, O.; Smith, F.A. The maximal regular ideal of some commutative rings. Comment. Math. Univ. Carol. 2006, 47, 1–10. [Google Scholar]
Table 1. Elements of the multiplicative cyclic group G F 3 4 Z 3 i *   2 .
Table 1. Elements of the multiplicative cyclic group G F 3 4 Z 3 i *   2 .
α j V a l u e s α j V a l u e s α j V a l u e s α j V a l u e s
1 α 21 i α 41 2 α 61 2 i α
2 2   α + 1 + 2 i 22 2 i α + i + 1 42 α + 2 + i 62 i α + 2 i + 2
3   2 α + 2 + i + 2 i α 23 α + 2 + 2 i + 2 i α 43 α + 1 + 2 i + i α 63 2 α + 1 + i + i α
4 2 i α + 1 24 α + i 44 i α + 2 64 2 α + 2 i
5 i α + 2 i + 2 + α 25 2 α + i α + 1 + 2 i 45 2 α + 1 + i + 2 i α 65 α + 2 + i + 2 i α
6 i α + α + 2 26 2 α + i α + 2 i 46 2 α + 1 + 2 i α 66 α + i + 2 i α
7 2 i α + α + 2 27 α + i α + 2 i 47 2 α + 1 + i α 67 2 α + i + 2 i α
8 i α + α + i 28 2 α + i α + 2 48 2 α + 2 i α + 2 i 68 α + 1 + 2 i α
9 2 α + 2 29 2 i α + 2 i 49 α + 1 69 i α + i
10 2 + i 30 2 i + 2 50 1 + 2 i 70 1 + i
11 2 α + i α 31 2 i α + 2 α 51 α + 2 i α 71 α + i α
12 α + 2 i + 2 i α 32 α + 1 + i α 52 2 α + i + i α 72 2 α + 2 + 2 i α
13 2 α + i 33 2 i α + 2 53 α + 2 i 73 i α + 1
14 α + 2 + i + i α 34 2 α + 2 + 2 i + i α 54 2 α + 1 + 2 i + 2 i α 74 α + 1 + i + 2 i α
15 α + 2 35 i α + 2 i 55 2 α + 1 75 2 i α + i
16 α + 1 + 2 i 36 i α + i + 1 56 2 α + 2 + i 76 2 i α + 2 i + 2
17 2 i α + 1 + 2 i 37 α + 1 + i 57 i α + i + 2 77 2 α + 2 + 2 i
18 α + 2 + 2 i 38 i α + 1 + 2 i 58 2 α + i + 1 78 2 i α + 2 + i
19 α + 2 i α + 1 + 2 i 39 α + i + 1 + i α 59 2 α + 2 + i + i α 79 2 α + 2 + 2 i + 2 i α
20 i 40 2 60 2 i 80 1
Table 2. Comparative analysis of alternant codes over Galois rings and Gaussian rings.
Table 2. Comparative analysis of alternant codes over Galois rings and Gaussian rings.
StructureReference n k d d 1 t R | C |
Z 2 i 2 Proposed 3 1 3 2 1 0.3333 16
Z 3 i 2 Proposed 9 6 ≥4≥3≥1 0.6667 3 24
Z 3 2 i 2 Proposed 80 76 ≥5≥4≥2 0.95 3 304
G R ( 2 2 ,   2 ) [11,22] 3 1 3 2 1 0.3333 4
G R ( 3 2 ,   2 ) [11,22] 9 6 ≥4≥3≥1 0.6667 3 12
G R ( 3 2 ,   4 ) [11,22] 80 76 ≥5≥4≥2 0.95 3 152
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sajjad, M.; Alqwaifly, N.A. Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication. Mathematics 2025, 13, 2263. https://doi.org/10.3390/math13142263

AMA Style

Sajjad M, Alqwaifly NA. Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication. Mathematics. 2025; 13(14):2263. https://doi.org/10.3390/math13142263

Chicago/Turabian Style

Sajjad, Muhammad, and Nawaf A. Alqwaifly. 2025. "Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication" Mathematics 13, no. 14: 2263. https://doi.org/10.3390/math13142263

APA Style

Sajjad, M., & Alqwaifly, N. A. (2025). Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication. Mathematics, 13(14), 2263. https://doi.org/10.3390/math13142263

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop