Grundlehfen Def Mathematischen Wissenschaften 290: A Series of Comprehensive Studies in Mathematics
Grundlehfen Def Mathematischen Wissenschaften 290: A Series of Comprehensive Studies in Mathematics
Editors
M. Artin S.S. Chern J.M. Frohlich E. Heinz H. Hironaka
F. Hirzebruch L. Hormander S. Mac Lane C.C. Moore
J.K. Moser M. Nagata W. Schmidt D.S. Scott Ya.G. Sinai
J. Tits B.L. van der Waerden M. Waldschmidt S. Watanabe
Managing Editors
M. Berger B. Eckmann S.R.S. Varadhan
Grundlehren der mathematischen Wissenschaften
A Series of Comprehensive Studies in Mathematics
A Selection
Sphere Packings,
Lattices and Groups
With Additional Contributions by
E. Bannai, J. Leech, S.P. Norton,
A.M. Odlyzko, R.A. Parker, L. Queen
and B.B. Venkov
N.J.A. Sloane
Mathematical Science Department
AT&T Bell Laboratories
Murray Hill, New Jersey 07974, USA
9 S7 6 54 3 2 I
The main themes. This book is mainly concerned with the problem of
packing spheres in Euclidean space of dimensions 1,2,3,4,5, .... Given a
large number of equal spheres, what is the most efficient (or densest) way
to pack them together? We also study several closely related problems: the
kissing number problem, which asks how many spheres can be arranged so
that they all touch one central sphere of the same size; the covering
problem, which asks for the least dense way to cover n-dimensional space
with equal overlapping spheres; and the quantizing problem, important for
applications to analog-to-digital conversion (or data compression), which
asks how to place points in space so that the average second moment of
their Voronoi cells is as small as possible. Attacks on these problems
usually arrange the spheres so their centers form a lattice. Lattices are
described by quadratic forms, and we study the classification of quadratic
forms. Most of the book is devoted to these five problems.
The miraculous enters: the E 8 and Leech lattices. When we investigate
those problems, some fantastic things happen! There are two sphere
packings, one in eight dimensions, the E 8 lattice, and one in twenty-four
dimensions, the Leech lattice A24 , which are unexpectedly good and very
symmetrical packings, and have a number of remarkable and mysterious
properties, not all of which are completely understood even today. In a
certain sense we could say that the book is devoted to studying these two
lattices and their properties.
At one point while working on this book we even considered adopting a
special abbreviation for "It is a remarkable fact that", since this phrase
seemed to occur so often. But in fact we have tried to avoid such phrases
and to maintain a scholarly decorum of language.
Nevertheless there are a number of astonishing results in the book, and
perhaps this is a good place to mention some of the most miraculous. (The
technical terms used here are all defined later in the book.)
vi Preface
is a vector of zero norm (Theorem 3 of Chap. 26). (We remind the reader
that in Lorentzian space R 25 ,1, which is 26-dimensional space equipped
with the norm x'x=xr+'" +Xi5-xi6, there is a unique even
unimodular lattice 1125 •1 - see §1 of Chap. 26.)
- The occurrence of the Leech lattice as the Coxeter diagram of the
reflections in the automorphism group of 11 25 •1 (Chap. 27).
Some further themes. Besides the five problems that we mentioned in the
first paragraph, there are some other topics that are always in our minds:
error-correcting codes. Steiner systems and t-designs, and the theory of
finite groups. The E8 and Leech lattices are intimately involved with these
topics, and we investigate these connections in considerable detail. Many
of the sporadic simple groups are encountered, and we devote a whole
chapter to the Monster or Friendly Giant simple group, whose construction
makes heavy use of the Leech lattice.
The main applications. There are many connections between the
geometrical problems mentioned in the first paragraph and other areas of
mathematics, chiefly with number theory (especially quadratic forms and
the geometry of numbers).
The main application outside mathematics is to the channel coding
problem, the design of signals for data transmission and storage, i.e. the
design of codes for a band-limited channel with white Gaussian noise. It
has been known since the work of Nyquist and Shannon that the design of
optimal codes for such a channel is equivalent to the sphere packing
problem. Theoretical investigations into the information-carrying capacity
of these channels requires knowledge of the best sphere packings in large
numbers of dimensions. On the other hand practical signalling systems
(notably the recently developed Trellis Coded Modulation schemes) have
been designed using properties of sphere packings in low dimensions, and
certain modems now on the market use codes consisting of points taken
from the E 8 lattice!
There are beautiful applications of these lattices to the numerical
evaluation of n-dimensional integrals (see § 4.2 of Chap. 3).
Of course there are connections with chemistry, since crystallographers
have studied three-dimensional latti.::es since the beginning of the subject.
We sometimes think of this book as being a kind of higher-dimensional
Preface VII
from the lattice. We were astonished to discover that there are precisely
23 distinct types of deep hole, and that they are in one-to-one
correspondence with the Niemeier lattices (the 24-dimensional even
unimodular lattices of minimal norm 2) - see Theorem 2 of Chap. 23.
Chapter 23, or the Deep Holes paper, as it is usually called, has turned out
to be extremely fruitful, having stimulated the remaining chapters in the
book, also Chap. 6, and several journal articles.
In Chap. 24 we give 23 constructions for the Leech lattice, one for each
of the deep holes or Niemeier lattices. Two of these are the familiar
constructions based on the Golay codes. In the second half of Chap. 24 we
introduce the hole diagram of a deep hole, which describes the environs of
the hole. Chapter 25 (the Shallow Holes paper) uses the results of
Chap. 23 and 24 to classify all the holes in the Leech lattice.
Considerable light is thrown on these mysteries by the realization that
the Leech lattice and the Niemeier lattices can all be obtained very easily
from a single lattice, namely 11 25 ,1> the unique even unimodular lattice in
Lorentzian space R 25,). For any vector w E R25 ,), let
wl- = Ix EII25 ,):X·w=0}.
Then if w is the special vector
W25 = (0,1,2,3, .... 23,24170),
wl-/w is the Leech lattice, and other choices for w lead to the 23 Niemeier
lattices.
The properties of the Leech lattice are closely related to the geometry
of the lattice 1125,). The automorphism groups of the Lorentzian lattice
In,) for n ~ 19 and lIn,) for n = 1, 9 and 17 were found by Vinberg,
Kaplinskaja and Meyer. Chapter 27 finds the automorphism group of
11 25 ,). This remarkable group has a reflection subgroup with a Coxeter
diagram that is, speaking loosely, isomorphic to the Leech lattice. More
precisely, a set of fundamental roots for 11 25 ,) consists of the vectors
r E 1125 ,) satisfying
r . r = 2, r . W25 = -I ,
and we call these the Leech roots. Chapter 26 shows that there is an
isometry between the set of Leech roots and the points of the Leech lattice.
Then the Coxeter part of the automorphism group of Il 25 ,) is just the
Coxeter group generated by the Leech roots (Theorem I of Chap. 27).
Since 11 25 ,) is a natural quadratic form to study, whose definition
certainly does not mention the Leech lattice, it is surprising that the Leech
lattice essentially determines the automorphism group of the form.
The Leech roots also provide a better understanding of the
automorphism groups of the other lattices In,) and lIn,), as we see in
Chap. 28. This chapter also contains an extensive table of Leech roots.
Chapter 29 describes a construction for the Monster simple group, and the
Preface XI
o o o
o o o o
o o o o o
o o o o
o o o
List of Symbols
page
an ordinary Coxeter-Dynkin diagram 481
A Gram matrix of lattice 5
An n-dimensional zero-sum root lattice 108
A(m) Craig's lattice 223
n
An alternating group of degree n 82
A.B, AB, A :B, A'B extensions of groups 92
Aut (A) automorphism group of lattice 90
Bn lattice constructed from BCH codes 235
BWn n-dimensional Barnes-Wall lattice 234
en cyclic group of order n 109
~4 [4, 2, 31 tetracode over F3 81.320
~6 [6, 3, 41 hexacode over F4 82. 300
~12 [12,6,61 Golay code over F3 85. 321
~24 or ~ [24, 12,81 Golay code over F2 84. 303
c.w.e. complete weight enumerator 78
d minimal distance of code (usually) 76
dn ordinary Coxeter-Dynkin diagram 481
Dn n-dimensional checkerboard root lattice 117
det square of volume of fundamental region 5
e6, e7, e8 ordinary Coxeter-Dynkin diagrams 481
E 6, E 7, E8 Gosset's root lattices 120
8 Eisenstein integers 52
Fq Galois field of order q 75
<!} Gaussian integers 52
go, gJ, g2 orders of glue groups 100
Go, GJ, G 2 glue groups 100
G(p) second moment of polytope 34
G(A) second moment of Voronoi cell of lattice 35
;Yf Hurwitzian integral quaternions 53
HiS Higman-Sims group 292
HJ or J 2 Hall-lanko group 293
I identity matrix 77
Preface............................................................ v
Chapter 1
Sphere Packings and Kissing Numbers
J.H. Conway and N.J.A. Sloane .............................. .
I. The Sphere Packing Problem ............................... I
1.1 Packing Ball Bearings ...................................... I
1.2 Lattice Packings ............................................ 3
1.3 Nonlattice Packings ........................................ 7
1.4 n-Dimensional Packings .................................... 8
1.5 Sphere Packing Problem-Summary of Results............. 12
2. The Kissing Number Problem .............................. 21
2.1 The Problem of the Thirteen Spheres ....................... 21
2.2 Kissing Numbers in Other Dimensions ..................... 21
2.3 Spherical Codes ............................................ 24
2.4 The Construction of Spherical Codes from Sphere
Pac kings .................................................... 26
2.5 The Construction of Spherical Codes from Binary Codes ... 26
2.6 Bounds on A(n,lj» .......................................... 27
Appendix: Planetary Perturbations. . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 2
Coverings, Lattices and Quantizers
J.H. Conway and N.J.A. Sloane ............................... 31
I. The Covering Problem ...................................... 31
1.1 Covering Space with Overlapping Spheres .................. 31
1.2 The Covering Radius and the Voronoi Cells ................ 33
1.3 Covering Problem-Summary of Results ................... 36
1.4 Computational Difficulties in Packings and Coverings ....... 40
xviii Contents
Chapter 3
Codes, Designs and Groups
J.R. Conway and N.J.A. Sloane 63
I. The Channel Coding Problem .............................. . 63
1.1 The Sampling Theorem .................................... . 63
1.2 Shannon's Theorem ....................................... . 66
1.3 Error Probability .......................................... . 69
1.4 Lattice Codes for the Gaussian Channel ................... . 71
2. Error-Correcting Codes .................................... . 75
2.1 The Error-Correcting Code Problem ....................... . 75
2.2 Further Definitions from Coding Theory ................... . 77
2.3 Repetition, Even Weight and Other Simple Codes ......... . 79
2.4 Cyclic Codes .............................................. . 79
2.5 BCH and Reed-Solomon Codes ............................ . 81
2.6 Justesen Codes ............................................ . 82
2.7 Reed-Muller Codes ........................................ . 83
2.8 Quadratic Residue Codes .................................. . 84
2.9 Perfect Codes ............................................. . 85
2.10 The Pless Double Circulant Codes ......................... . 86
2.11 Goppa Codes and Codes from Algebraic Curves ........... . 87
2.12 Nonlinear Codes ........................................... . 87
2.13 Hadamard Matrices ........................................ . 87
3. t-Designs, Steiner Systems and Spherical t-Designs ........ . 88
3.1 t-Designs and Steiner Systems ............................. . 88
3.2 Spherical I-Designs ........................................ . 89
4. The Connections with Group Theory ...................... . 90
4.1 The Automorphism Group of a Lattice .................... . 90
4.2 Constructing Lattices and Codes from Groups ............. . 92
Chapter 4
Certain Important Lattices and Their Properties
J.R. Conway and N.J.A. Sloane ............................... 94
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
2. Reflection Groups and Root Lattices ....................... 95
3. Gluing Theory.............................................. 99
Contents XIX
Chapter 5
Sphere Packing and Error-Correcting Codes
J. Leech and N.J.A. Sloane .................................... 136
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
1.1 The Coordinate Array of a Point.. .. . .. .. .. .. .. .. .. .. .. .. . .. 137
2. Construction A ............................................. 137
2.1 The Construction ........................................... 137
2.2 Center Density ............................................. 137
2.3 Kissing Numbers ........................................... 138
2.4 Dimensions 3 to 6 .......................................... 138
2.5 Dimensions 7 and 8 ......................................... 138
2.6 Dimensions 9 to 12 ......................................... 139
2.7 Comparison of Lattice and Nonlattice Packings ............. 140
3. Construction B ............................................. 141
3.1 The Construction ........................................... 141
3.2 Center Density and Kissing Numbers....................... 141
3.3 Dimensions 8, 9 and 12 ..................................... 142
3.4 Dimensions 15 to 24 ........................................ 142
4. Pac kings Built Up by Layers ............................... 142
4.1 Packing by Layers. .. .. ..... ....... .. .. ... .. ... .. .. ... .. .. . . 142
4.2 Dimensions 4 to 7 .......................................... 144
4.3 Dimensions 11 and 13 to 15 ................................. 144
4.4 Density Doubling and the Leech Lattice A24 •••••••••••••••• 145
4.5 Cross Sections of A24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
5. Other Constructions from Codes............................ 146
xx Contents
Chapter 6
Laminated Lattices
J.B. Conway and N.J.A. Sloane 157
1. Introduction.. .. .. .. ... . .. .. .. .. .. .. . .. . .. .. .. . . . . .. .. .. .. . . 157
2. The Main Results........................................... 163
3. Properties of A" to A. ....................................... 168
4. Dimensions 9 to 16 ......................................... 170
5. The Deep Holes in AI6 ...................................... 174
6. Dimensions 17 to 24 ........................................ 176
7. Dimensions 25 to 48 ........................................ 177
Appendix: The Best Integral Lattices Known ............... 179
Chapter 7
Further Connections Between Codes and Lattices
N.J.A. Sloane.................................................... 181
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
2. Construction A ............................................. 182
3. Self-Dual (or Type I) Codes and Lattices ................... 185
4. Extremal Type I Codes and Lattices........................ 189
5. Construction B ............................................. 191
6. Type II Codes and Lattices................................. 191
7. Extremal Type II Codes and Lattices ....................... 193
8. Constructions A and B for Complex Lattices ............... 197
9. Self-Dual Nonbinary Codes and Complex Lattices..... .. ... 202
10. Extremal Nonbinary Codes and Complex Lattices .......... 205
Chapter 8
Algebraic Constructions for Lattices
J.B. Conway and N.J.A. Sloane ............................... 206
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
2. The Icosians and the Leech Lattice. . . . . . . . . . . . . . . . . . . . . . . . . 207
Contents xxi
Chapter 9
Bounds for Codes and Sphere Pac kings
N.l.A. Sloane .................................................... 245
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
2. Zonal Spherical Functions .................................. 249
2.1 The 2-Point-Homogeneous Spaces .......................... 250
2.2 Representations of G ....................................... 252
2.3 Zonal Spherical Functions.................................. 253
2.4 Positive-Definite Degenerate Kernels ....................... 256
3. The Linear Programming Bounds ........................... 257
3.1 Codes and Their Distance Distributions. . . . . . . . . . . . . . . . . . . . . 257
3.2 The Linear Programming Bounds ........................... 258
3.3 Bounds for Error-Correcting Codes......................... 260
3.4 Bounds for Constant-Weight Codes......................... 263
3.5 Bounds for Spherical Codes and Sphere Packings .......... 263
4. Other Bounds .............................................. 265
Chapter 10
Three Lectures on Exceptional Groups
l.R. Conway ..................................................... 267
I. First Lecture ............................................... 267
1.1 Some Exceptional Behavior of the Groups Ln(q) ............ 267
1.2 The Case p = 3 ............................................ 269
1.3 The Case p = 5 ............................................ 269
1.4 The Case p = 7 ............................................ 269
xxii Contents
Chapter 11
The Golay Codes and the Mathieu Groups
J.H. Conway ..................................................... 299
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
2. Definitions of the Hexacode ................................ 300
3. Justification of a Hexacodeword ............................ 302
4. Completing a Hexacodeword ............................... 302
5. The Golay Code 't;24 and the MOG .......................... 303
6. Completing Octads from 5 of their Points ................... 305
7. The Maximal Subgroups of M 2• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 307
8. The Projective Subgroup L 2(23) ............................. 308
9. The Sextet Group 26 :3'S6 •• •• •• • • • •• •• • • • •• • •• •• • • • • • • • •• • • •• 309
10. The Octad Group 24: AR ...•................................. 311
II. The Triad Group and the Projective Plane of Order 4 ....... 314
12. The Trio Group 26: (S, x L/7)) ............................. 316
13. The Octern Group .......................................... 318
14. The Mathieu Group M 2 , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 319
15. The Group M,,:2 ........................................... 319
16. The Group M'2' the Tetracode and the MINIMOG ......... 320
17. Playing Cards and Other Games ............................ 323
1.8. Further Constructions for M'2 .............................. 327
Chapter 12
A Characterization of the Leech Lattice
J.H. Conway ..................................................... 331
Contents xxiii
Chapter 13
Bounds on Kissing Numbers
A.M. Odlyzko and N.J.A. Sloane .............................. 337
1. A General Upper Bound.................................... 337
2. Numerical Results .......................................... 338
Chapter 14
Uniqueness of Certain Spherical Codes
E. Bannai and N.J.A. Sloane................................... 340
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
2. Uniqueness of the Code of Size 240 in 0 8 • • • • • • • • • • • • • • • • • • 342
3. Uniqueness of the Code of Size 56 in 0 7 • • • • • • • • • • • • • • • • • • • • 344
4. Uniqueness of the Code of Size 196560 in 0 24 • • • • • • • • • • • • • • 345
5. Uniqueness of the Code of Size 4600 in 0 23 ••••••••••••••••• 349
Chapter 15
On the Classification of Integral Quadratic Forms
J.H. Conway and N.J.A. Sloane ............................... 352
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
2. Definitions ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
2.1 Quadratic Forms ........................................... 354
2.2 Forms and Lattices; Integral Equivalence .................. 355
3. The Classification of Binary Quadratic Forms .............. 356
3.1 Cycles of Reduced Forms .................................. 356
3.2 Definite Binary Forms...................................... 357
3.3 Indefinite Binary Forms .................................... 359
3.4 Composition of Binary Forms .............................. 364
3.5 Genera and Spinor Genera for Binary Forms ............... 366
4. The p-Adic Numbers ....................................... 366
4.1 The p-Adic Numbers ....................................... 367
4.2 p-Adic Square Classes ...................................... 367
4.3 An Extended Jacobi-Legendre Symbol ..................... 368
4.4 Diagonalization of Quadratic Forms ........................ 369
5. Rational Invariants of Quadratic Forms. . . . . . . . . . . . . . . . . . . . . 370
5.1 Invariants and the Oddity Formula ......................... 370
5.2 Existence of Rational Forms with Prescribed Invariants .... 372
5.3 The Conventional Form of the Hasse-Minkowski
Invariant ................................................... 373
6. The Invariance and Completeness of the Rational
Invariants .................................................. 373
6.1 The p-Adic Invariants for Binary Forms .................... 373
6.2 The p-Adic Invariants for n-Ary Forms ..................... 375
6.3 The Proof of Theorem 7 .................................... 377
7. The Genus and its Invariants ............................... 378
7.1 p-Adic Invariants........................................... 378
7.2 The p-Adic Symbol for a Form ............................. 379
xxiv Contents
Chapter 16
Enumeration of Unimodular Lattices
i.H. Conway and N.i.A. Sloane ............................... 406
I. The Niemeier Lattices and the Leech Lattice. . . . . . . . . . . . . . . 406
2. The Mass Formulae for Lattices ............................ 408
3. Verifications of Niemeier's List ............................ 410
4. The Enumeration of Unimodular Lattices in Dimensions
n ~ 23 ...................................................... 413
Chapter 17
The 24-Dimensional Odd Unimodular Lattices
R.E. Borcherds .................................................. 421
Chapter 18
Even Unimodular 24-Dimensional Lattices
B.B. Venkov ...................................................... 427
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
2. Possible Configurations of Minimal Vectors ................ 428
3. On Lattices with Root Systems of Maximal Rank........... 431
4. Construction of the Niemeier Lattices ...................... 434
5. A Characterization of the Leech Lattice .................... 437
Contents xxv
Chapter 19
Enumeration of Extremal Self-Dual Lattices
J.H. Conway, A.M. Odlyzko and N.J.A. Sloane.............. 439
I. Dimensions 1-16 ............................................ 439
2. Dimensions 17-47 ........................................... 439
3. Dimensions n ;;: 48 ......................................... 441
Chapter 20
Finding the Closest Lattice Point
J.H. Conway and N.J.A. Sloane ............................... 443
l. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
2. The Lattices Z", D" and A" . .. .. .. ... .. .. ..... .. .. ... .. .. . .. . 444
3. Decoding Unions of Cosets ................................. 446
4. "Soft Decision" Decoding for Binary Codes................ 447
5. Decoding Lattices Obtained from Construction A ........... 448
6. Decoding E8 ................................................ 448
Chapter 21
Voronoi Cells of Lattices and Quantization Errors
J.H. Conway and N.J.A. Sloane ............................... 449
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
2. Second Moments of Polytopes.............................. 451
2.A Dirichlet's Integral. .. .. .. . ... .. .. .. .. .. ... ... .. .. .. .. .. .. . .. 451
2.B Generalized Octahedron or Cross polytope .................. 452
2.C The n-Sphere ............................................... 452
2.D n-Dimensional Simplices.................................... 452
2.E Regular Simplex............................................ 453
2.F Volume and Second Moment of a Polytope in Terms
of its Faces ................................................. 453
2.G Truncated Octahedron ...................................... 454
2.R Second Moment of Regular Polytopes...................... 454
2.1 Regular Polygons ........................................... 455
2.1 Icosahedron and Dodecahedron ............................ 455
2.K The Exceptional 4-Dimensional Polytopes .................. 455
3. Voronoi Cells and the Mean Squared Error of Lattice
Quantizers .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
3.A The Voronoi Cell of a Root Lattice......................... 456
3.B Voronoi Cell for An ......................................... 459
3.C Voronoi Cell for D" (n ;;: 4) ................................. 462
3.D Voronoi Cells for E6 ,E7 ,E. .................................. 462
3.E Voronoi Cell for D~ ........................................ 463
3.F Voronoi Cell for A~ ........................................ 472
3.G The Walls of the Voronoi Cell.............................. 474
Chapter 22
A Bound for the Covering Radius of the Leech Lattice
S.P. Norton...................................................... 476
XXVI Contents
Chapter 23
The Covering Radius of the Leech Lattice
J.H. Conway, R.A. Parker and N.l.A. Sloane 478
I. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
2. The Coxeter-Dynkin Diagram of a Hole .................... 480
3. Holes Whose Diagram Contains an An Subgraph ............ 484
4. Holes Whose Diagram Contains a Dn Subgraph ............. 495
5. Holes Whose Diagram Contains an En Subgraph ............ 502
Chapter 24
Twenty-Three Constructions for the Leech Lattice
J.H. Conway and N.J.A. Sloane............................... 506
1. The "Holy Constructions" ................................. 506
2. The Environs of a Deep Hole. .. .. ........ .. ....... ......... 510
Chapter 25
The Cellular Structure of the Leech Lattice
R.E. Borcherds, J.H. Conway and L. Queen 513
1. Introduction................................................ 513
2. Names for the Holes ....................................... 513
3. The Volume Formula....................................... 514
4. The Enumeration of the Small Holes 519
Chapter 26
Lorentzian Forms for the Leech Lattice
J.H. Conway and N.1.A. Sloane............................... 522
1. The Unimodular Lorentzian Lattices ...................... . 522
2. Lorentzian Constructions for the Leech Latticc 523
Chapter 27
The Automorphism Group of the 26-Dimensional Even
Unimodular Lorentzian Lattice
J.H. Conway ..................................................... 527
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
2. The Main Theorem ......................................... 528
Chapter 28
Leech Roots and Vinberg Groups
J.H. Conway and N.l.A. Sloane ............................... 532
1. The Leech Roots ........................................... 532
2. Enumeration of the Leech Roots ........................... 541
3. The Lattices In.Jor n ~ 19 ................................. .547
4. Vinberg's Algorithm and thc Initial Batches
of Fundamental Roots ...................................... .547
5. The Later Batches of Fundamental Roots .................. .5.50
Contents xxvii
Chapter 29
The Monster Group and its 196884-Dimensional Space
l.R. Conway ..................................................... 554
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
2. The Golay Code C(5 and the Parker Loop!!J> ................. 556
3. The Mathieu Group M 24 ; the Standard Automorphisms
of!!J> ........................................................ 556
4. The Golay Cocode C(5* and the Diagonal Automorphisms ... 556
5. The Group N of Triple Maps ............................... 557
6. The Kernel K and the Homomorphism g ~ II .............. 557
7. The Structures of Various Subgroups of N ................. 557
8. The Leech Lattice A24 and the Group Qx .................... 55R
9. Short Elements.................................... ......... 559
10. The Basic Representations of N, ........................... 559
11. The Dictionary ............................................. 560
12. The Algebra ................................................ 561
13. The Definition of the Monster Group G. and its
Finiteness .................................................. 561
14. Identifying the Monster ......... '" .. .. .. . .. .. ... .. .. .. . .. .. 562
Appendix 1. Computing in?P ............................... 563
Appendix 2. A Construction for?P .......................... 563
Appendix 3. Some Relations in Q, .......................... 564
Appendix 4. Constructing Representations for N, ........... 566
Appendix 5. Building the Group G, ......................... 567
Chapter 30
A Monster Lie Algebra?
R.E. Borcherds. l.R. Conway. L. Queen and
N.l.A. Sloane.................................................... 568
The first three chapters describe some of the questions that motivated this
book. In this chapter we discuss the problems of packing spheres in
Euclidean space and of packing points on the surface of a sphere. The
kissing number problem is an important special case of the latter, and asks
how many spheres can just touch another sphere of the same size. We
summarize what is known about these topics and also introduce
terminology that will be used throughout the book.
(a)
Figure 1.1. Two views of the most familiar sphere packing, in which the
centers form the face-centered cubic (or fcc) lattice. This is the packing
usually found in fruit stands, in piles of cannon balls on war memorials, or
in crystalline argon. The spheres occupy 0.7405 ... of the space, and each
sphere touches 12 others. (b) Shows only the centers of the spheres (the
open circles). These centers are obtained by taking those points of the
cubic lattice Z3 whose coordinates add up to an even number.
Sphere Packings and Kissing Numbers 3
The classical version of the sphere packing problem now asks: is this
the greatest density that can be attained? Unfortunately this is an
unsolved problem, one of the famous open problems in mathematics. For
many years the best bound known was Rogers' 1958 result (Eq. (39)
below, [Rog2], [Rog7]) that no packing of ball bearings can have density
greater than .7796... . Recently Lindsey [Lin9] has tightened Rogers'
bound, replacing .7796 ... by .7784... . (Muder [Mudl] and Lindsey
[Lin9a] have obtained further small improvements to the upper bound.
See also [Fej9, p. 298].) As Rogers [Rog2] remarks, "many
mathematicians believe, and all physicists know" that the correct answer is
.7405 .... The situation is complicated, however, by the fact that there are
partial packings that are denser than the face-centered cubic lattice over
larger regions of space than one might have supposed [Boell.
The general sphere-packing problem, to which we return in §IA, asks
for the densest packing of equal spheres in n-dimensional space. This
problem has considerable practical importance even for dimensions greater
than 3.
We pause to assure the reader that there is nothing mysterious about
n -dimensional space. A point in real n -dimensional space Rn is simply a
string of n real numbers
A sphere in Rn with center u = (u) • ...• un) and radius p consists of all
the points x = (x J,X2 • . . . • xn) satisfying
(X)-U)2 + (X2- U 2)2 + ... + (xn- u n)2 = p2.
The vectors v I • . . . • vn are then called a basis for the lattice. The
parallelotope consisting of the points
0IVI+"'+Onvn (O~Oi<l)
M=
is called a generator matrix for the lattice, and the lattice vectors consist
of all the vectors
~M,
where ~ = (~I ..... ~n) is an arbitrary vector with integer components ~i'
The matrix
A = MM t"
where tr denotes transpose, is called a Gram matrix for the lattice. The
(j ,jhh entry of A is the inner product Vi . Vj. (Given two vectors
u = (UI . .... urn), v = (VI . .... vrn), their inner or scalar product
u I VI + ... + Urn Vrn will be denoted in this book either by u . v or
(u , v ).} The determinant of A is then the determinant of the matrix A,
det A = det A.
Sphere Packings and Kissing Numbers 5
FUNDAMENTAL
LATTICE PARALLELOTOPE
Figure 1.2. The plane divided into fundamental parallelotopes of a 2-
dimensional lattice.
and det A = det A = 3/4. But for many purposes it is better to use the
generator matrix
(8)
A'=M'M'tr= [ 2-I)
-I 2 ' (9)
and now det A = det A' = 3. Eq. (8) uses three coordinates to define a
two-dimensional lattice, but the points all lie in the plane x + y + z "" O.
Eqs. (6) and (8) both describe the hexagonal lattice in Fig. 1.3a, but in
different coordinates and on a different scale. Formally we say that the
lattices defined by (6) and (8) are equivalent (see §1.4). The advantages
of (8) over (6) are that the coordinates are nicer (the J3's have
disappeared), and the symmetries of the lattice are more easily seen. It is
6 Ch a pte r 1
0 0 0
0 0 0 0
0 0 0 0 0
0 0 0 0
0 0 0
(0) (b)
(C)
Figure 1.3. (a) The hexagonal lattice in the plane. (b) The
corresponding sphere-packing (in this case a circle-packing). The points
labeled a are the lattice points; the points labeled band c are the "deep
holes" in this lattice. the points of the plane furthest from the lattice.
(c) The Voronoi cells are regular hexagons. (d) An enlargement of (b)
and (c). showing the packing radius p of the lattice (the radius of the
circles in (b». and the covering radius R. the distance from a lattice
point to a deep hole. For this lattice R - 2p/.J3.
clear from (8) that the three coordinates can be permuted in any way
without changing the lattice. (8) is the two-dimensional representative
(A 2) of the infinite sequence of root lattices A I> A 2. A 3.... (see Chap. 4.
§6.1).
We can now give a precise definition of the density .:l of a lattice
packing:
A DEEP HOLE
o o
(d)
.:l = .Ji2
7r
= 0.9069 .... (] 2)
Using (8) leads to the same value: the density is independent of the choice
of coordinates, as we should expect it to be.
1.3 Nonlattice packings. Of course most packings are not lattices. In
three dimensions, for example, there are non lattice packings that are just
as dense as the face-centered cubic lattice. This happens because the fcc
can be built up by layers, beginning with one layer of spheres placed in the
hexagonal lattice arrangement of Fig. 1.3b, with the centers at the points
marked 'a'. There are then two (equivalent) ways to place the second
8 Chapter 1
layer: the spheres can be placed above the positions marked 'b' or above
those marked 'c'. Suppose we place them at 'b'. The third layer can now
be placed either above the positions marked 'a', i.e. directly above the first
layer, or above the positions marked 'c'. Similarly there are two choices
for every remaining layer. Choosing the layers in the order
... abcabcabc ... or .. .acbacbacb ...
produces the face-centered cubic lattice. But there are uncountably many
other (nonlattice) possibilities, such as ... acbabacbca ... , all with the same
density. Taking the layers in the order ... ababab... produces the
hexagonal close packing or hcp (as found for example in helium crystals
[Kit4], [WeI4]). We shall give a more detailed study of such laminating
constructions in Chaps. 5 and 6.
The hexagonal close packing, like most of the packings encountered in
this book, is a periodic packing, one that is obtained by placing a fixed
configuration of say s spheres in each fundamental region of a lattice A.
Another example is the tetrahedral or diamond packing (Chap. 4, §6.4)
that is obtained by placing s = 8 spheres in each fundamental region of
the simple cubic lattice. The density of a periodic packing is given by
.:1 = s . volume of one sphere (I3)
(detA) 1/2
In the diamond packing the spheres have radius .J3/8, so the density is
only
7r.J3
.:1 = 16 = 0.3401....
The answer is also known in two dimensions: the highest density that
can be attained is .:1 = 7r /m = 0.9069 ... , as in the hexagonal lattice
packing of Fig. 1.3b. This result has a long history - see especially
Thue's 1910 paper [Thul1 and the proof given by Fejes T6th in 1940
[Fej31. For a concise and elegant proof see [FejlO, pp.58-611. Other
references are [Foil], [Gra5], [Rog7, p. 11], [Seg11.
"SPHERE"
~
---0 ! 0 ! 0>-----'--<0)--'---0---
-I 0 1 2 3
showed in 1831 [Gau2] that the face-centered cubic lattice is the densest
lattice packing in three dimensions. Proofs of this result may be found in
[Cas2, Chap. II, Th. IIIl, [Con42], [Cox14, §18.4], [Demll or [MorS].
What about dimensions higher than 3? To demonstrate how easy it is
work in 4-dimensional space, we describe the densest sphere packing known
in four dimensions. This is the checkerboard lattice D4 (Chap. 4, §7.2), in
which the centers of the spheres are all the points (u b U 2, U 3, U4) where the
Uj are integers that add to an even number. Thus (0,0,0,0) is allowed,
and (I, 1,0,0), but not (1,0,0,0). The sphere centered at (0,0,0,0) has 24
spheres around it, centered at the points (± 1, ± 1,0,0), with any choice of
signs and any ordering of the coordinates. (There are V2 4' 3 - 6 positions
for the O's and then 4 choices for the signs, for a total of 24.) Any two
distinct centers must differ by at least 1 in at least two coordinates, or by
at least 2 in one coordinate, so the minimal distance between the centers is
.Ji. Then if the spheres are taken to have radius p = .Ji12 = 1/.Ji, they
will not overlap, and each sphere will touch 24 others.
It is clear from the definition that D 4 contains the centers (2,0,0,0),
(0,2,0,0) ..... (0,0,0,2), (1,1,0,0), (1,0,1,0) ..... (0,0,1,1), and
conversely that each center of D4 is an integer combination of these
vectors. Actually it is enough to use (2,0,0,0), (1,1,0,0), (1,0, 1,0) and
(1,0,0,0, and
2 0 0 0
1 1 0 0
M= o 0
(Is)
o 0
is a generator matrix for D 4. [E.g. (0,2,0,0) = 2 (1,1,0,0) - (2,0,0,0)']
Therefore D4 has determinant det D4 = (detM)2 = 4.
In order to compute the density of D4 we need to know the volume of
an n -dimensional sphere of radius p: this is
(The second form avoids the use of (nI2)! when n is odd. See §2C of
Chap. 21, or [Soml, p. 1361.) Also
(18)
10 Chapter 1
This is the highest density known in four dimensions, and Korkine and
Zolotareff proved in 1872 [KorI] that this is the highest possible density
for a 4-dimensional lattice packing. By using Mordell's inequality
(Eq. (I9) of Chap. 6) Korkine and Zolotareff's result can be deduced
immediately from the optimality of the fcc lattice packing ([Mor41,
[Oppl]).
D4 may be generalized in an obvious way to an n-dimensional packing
Dn (take n integer coordinates with an even sum). In Chap. 4 we
summarize the properties of the lattices Dn, and of other important lattices
that occur throughout this book, including the n-dimensional lattices An
(for n ~ 1), the 6-, 7- and 8-dimensional lattices E 6, E7 and E 8, and the
24-dimensional Leech lattice A24 . (The subscript usually gives the
dimension,)
If one lattice can be obtained from another by (possibly) a rotation,
reflection and change of scale we say they are equivalent, or similar,
written =. Two generator matrices M and M' define equivalent lattices if
and only if they are related by
M' = cUMB, (22)
For example the dual of the fcc is the body-centered cubic or bcc lattice
A; ;;;; D; (see Chap. 4, §6.8). If A is a Gram matrix for L n , L: has Gram
matrix A-I, and detL:- (detLn)-I. If M is a square generator matrix
for L n , then (M-I)'r is a generator matrix for L:.
Why do we care about finding dense packings of n-dimensional
spheres? There are many reasons.
(j) This is an interesting problem in pure geometry. Hilbert mentioned it
in 1900 in his list of open problems [Hill], [MilS]. There is an enormous
literature (see the bibliography), from which we select a few items of
particular interest: [BarIl, [CoxI8], [Fejl], [Fej9], [FejIO], [GruIl,
[Hahl], [Ham2], [Hil2], [Mil7], [Rog7], [Sch16], [SigIl, [SI014], [We14].
Furthermore the best packings turn out to have connections, sometimes
totally unexpected, with other branches of mathematics. For example the
best lattice packings in up to eight dimensions belong to the families An,
Dn and En, and the corresponding Coxeter-Dynkin diagrams (see Chap. 4)
turn up in several apparently unrelated areas - see Hazewinkel et al.'s
survey article "The ubiquity of Coxeter-Dynkin diagrams (an introduction
to the A-D-E problem)" [HazIl. Similarly in 24 dimensions the Leech
lattice A24 has mysterious connections with hyperbolic geometry, Lie
algebras, and the Monster simple group - see Chaps. 23-30 of this book,
and the "Monstrous Moonshine" articles [Conll], [ConI7], [FonIl,
[Kac2]-[Kac6], [Koil], [Konl], [Kon2], [Mas2], [Mas3], [NorS], [Smil3],
[ThoS], [Th06]. We expect that one day someone will write an article on
"The ubiquity of the Leech lattice".
OJ) There are direct applications of lattice packings to number theory,
for example in solving Diophantine equations, and to "the geometry of
numbers" - see [Cas2], [Grul], [Grula], [Han3], [HlaIl, [Hla3], [Kell],
[Min4]-[Min6]. We shall say more about this in Chap. 2, §2.
(iij) There are important practical and theoretical applications of sphere
packings to problems arising in digital communications, as we shall see in
Chap. 3. Just to give the flavor, here is a typical question from the design
of spread-spectrum communications for mobile radio (cf. [CooIl, [Mazl)):
how many spheres of radius 0.43 can be packed into a sphere of radius I in
100-dimensional space?
Ov) Two- and three-dimensional packings have many applications. For
example the circles in a two-dimensional packing may represent optical
fibers as seen in the cross-section of a cable [KinIl. Three-dimensional
packings have applications in chemistry and physics [Berll], [HoaIl,
[Hoa2], [Kit4], [O'KeIl, [SI017], [SI019], [Teol]-[Te03], [WeI2]-[WeIS],
[ZimIl; biology [RiU], [TamS]; antenna design [Strl]; choosing directions
for X-ray tomography [She3], [She4], [Smi7]; and in performing
statistical analysis on spheres [Wat24].
(v) n-dimensional packings may be used in the numerical evaluation of
integrals, either on the surface of a sphere in Rn or in its interior. See
12 Chapter 1
DIMENSION I 2 3 4 5 6 7 8 12 16 24
DENSEST
PACKING ~~A3 D4 ~ E6 E7 E8 K!2 A!6 A24
rn~~ E7~
~
HIGHEST 04 D!5 E6 K!2 A!6
KISSING
2 6 12 24 40 72 126 240 756 4320 196560
NUMBER
THINNEST
COVERING 0~A; A~ A; A: A~ A; A~2 Ar6 A24
BEST
QUANTIZER 0~A; D4 0; E: E~ E8 K!2 A!6 A24
Sphere Packings and Kissing Numbers 13
which is a much simpler number. For A24 for example (an extreme case),
~ = 11"12/479001600 = 0.001930 ... , whereas 0 = 1. The table gives the
exact values only for o. If the spheres have radius 1, 0 is the number of
centers per unit volume. For a lattice packing, from (20),
o= pn (detA)-1/2. (27)
The center densities in Fig. 1.5 have been rescaled to make them easier
to see. The vertical axis gives
1
log20 +% n(24-n).
Fig. 1.5 and Table 1.2 also give the best upper bound on the center density
presently known. For n = 3 this is Lindsey's bound mentioned in §1.1,
while for n ~ 4 it is Rogers' bound [Rog2] as calculated by Leech [Lee5].
Leech's figures are truncated to 5 decimal places, but apart from this the
last digits of all decimal expansions in this book have been rounded off to
the closest digit. In the column headed Type in Table 1.2, B indicates that
both a lattice and a nonlattice packing with this density and kissing
number are known, L indicates that only a lattice packing is known, N
that only a nonlattice packing is known and A indicates a local
14 Ch a pte r 1
2 DENSITY
10928 + ~ n (24-n)
o A~
-1
-2
-3
DIMENSION n
o 4 8 12 16 20 24 28 32 36 40 44 48
Figure 1.5. The densest sphere packings known in dimensions n ~ 48.
The vertical axis gives log20 + n (24-n)/96, where 0 is the center density.
The An are laminated lattices, the Kn are described in Chap. 6, K 12 is the
Coxeter-Todd lattice, the crosses are non lattice pac kings (Chap. 5,
§§2.6,4.3), and Q32, B36 and P48q are described in Table 1.3a. The upper
bound is Rogers' bound (39), (40).
This implies (from (27» that there are lattices with center density at least
as large as the following :
n 128 256 512 1024 4096 65536 1048576
log2o 63 249 750 2006 12102 324603 7290660
Sphere Packings and Kissing Numbers 15
o Ao I I 6,2 L
AI ;A I 1/2 - 0.5 0.5 4,6.1 L
2 A 2 ;;;; A2 0.90690 1/2JJ - 0.28868 0.28868 6 6 4,6.2 L
3 AJ ; DJ 0.74048 1/4..fi. -0.17678 0.1847 12 12 4,6.3 B
4 A4; D4 0.61685 1/8 - 0.125 0.13127 24 24 4,7.2 L
A5;;;; D5 0.46526 l/8..fi. - 0.08839 0.09987 40 40 4,7.1 B
6 A6 "" £6 0.37295 l/8JJ - 0.07217 0.08112 72 72 4,8.3 B
A7; £7 0.29530 1/16 - 0.0625 0.06981 126 126 4,8.2 B
Ag "" £S 0.25367 1/16 - 0.0625 0.06326 240 240 4,8.1 L
9 A9 0.14577 1/16..fi. - 0.04419 0.06007 272 272 6,4 B
P 9a 0.12885 5/128 - 0.03906 306 235 3/5 5,2.6 N
10 AIO 0.09202 1/16JJ - 0.03608 0.05953 336 336 6,4 B
P lOa 0.09463 19/512 - 0.03711 372 353 9/19 5,2.6 N
P lOb 0.08965 9/256 - 0.03516 500 340 1/3 5,2.6 N
PICk 0.09962 5/128 - 0.03906 372 372 5,2.6 N
II A'rrJ. 0.05888 1/32 - 0.03125 0.06136 438 438 6,4 B
KII 0.06043 1/18JJ - 0.03208 432 432 6,2 L
Plio 0.06624 9/256 - 0.03516 566 519 7/9 5,2.6 N
P llb 580 5,4.3 A
PIle 582 5,2.6 A
12 Ai2ax 0.04173 1/32 = 0.03125 0.06559 648 648 6,4 B
KI2 0.04945 1/27 - 0.03704 756 756 4,9 L
LI2 0.04456 3 7/216 - 0.03337 704 704 5,3.3 N
Pl2a 0.04694 9/256 -0.03516 840 770 213 5,2.6 N
13 Aj{1. 0.02846 1/32 - 0.03125 0.07253 906 906 6,4 B
K IJ 0.02921 1/18JJ - 0.03208 918 918 6,2 B
P'3a 0.03201 9/256 - 0.03516 1130 1060 2/3 5,4.3 N
Pm 1066 5,4.3 A
14 AI4 0.02162 1/16JJ - 0.03608 0.08278 1422 1422 6,4 B
Pl4a 1484 5,4.3 A
P I4b 1582 5,4.3 A
15 AI5 0.01686 1/16..fi. - 0.04419 0.09735 2340 2340 6,4 B
A comparison with Table l.3 shows that in dimensions above 1000 these
lattices are denser than any presently known. Unfortunately the proof of
(28) (see [Cas2, Chap.61, [Lekl, §191, [Rog?, Chap.4]) uses an
averaging argument, and does not say how lattices satisfying (28) may be
16 Chapter 1
1 1
-;; log2 ~ - - '4 log2 n, as n - 00 (30)
1 1
-;; log2 ~ - - '2 iog2 log2 n ;
Sphere Packings and Kissing Numbers 17
and in 1973 [Slo11 (see §6.8 ot Chap. 5) gave nonlattice packings for
which
1
- log 2 Ll > - 6.
n -
Lattices with
1 1
- log 2 Ll - - - log2 log2 n
n 2
were found in [BariS] (see Chap. 8, §8.2g) and by Craig (see Chap. 8,
§6), and lattices with
1 •
- log2 Ll - - log2 n
n
18 Chapter 1
were given in [Bos3] (see Chap. 8, §10h). Here log; n is the smallest
value of k for which the kth iterated base 2 logarithm of n is less than 1.
The lattices constructed in Chap. 8 are however still reasonably dense in
quite large dimensions. For example there are lattices in dimensions
n ::s;; 98328 with
1
-log2 ~ = -1.2454 ... + E,
n
Again all these packings are quite explicit. Litsyn and Tsfasman [Lit3],
[Lit5] have recently announced that nonlattice packings with
1
-log2 ~ > -1.31, (36)
n -
1 (38)
-log2 ~ - -2.218... as n -- 00.
n
(This was pointed out by Litsyn and Tsfasman [Lit3].) However there
does not seem to be any practicable method known for explicitly finding
these lattices.
where j (t) is the smallest positive zero of the Bessel function J/ (x). For
large n = 2t the approximate formula ([Bos2], [Olvl])
j{t) - ( + 1.8557571 + 1.033150 (-1/3
(1/3 - 0.003971 (-1
The precise form of their bound and an outline of its proof are given in
Chap. 9.
Other bounds are given in [Lev4], [Lev5], [Lev9], [Rog7], [Sid 1],
[Sid3], [Ural]. Rogers' bound (39), (40) is the best for n ~ 42, and
above that the Kabatiansky-Levenshtein bound takes over. The upper
bounds in Table 1.3 are obtained from these two bounds.
Table 1.4 compares the various densities in dimension 65536, showing
the best packings known, the density that we know from Minkowski's
result is possible, and three upper bounds on the highest attainable density.
In summary, from (29) and (45) the densest (lattice or non lattice)
packings satisfy
1
-1 < -log2 Ll < -0.5990 (46)
n -
(48)
* in dimension 65520
Sphere Packings and Kissing Numbers 21
Although this book only considers the problem of packing a very large
number of spheres, there is a considerable body of literature dealing with
the best packings of N spheres for small values of N. See for example
[Ben3], [Boel1, [Fej2a], [Fej2b], [GoI8], [Gra4a], [Gril2]·[Gril4], [GroO],
[Wegl1, [WilO).
The n -dimensional version of the kissing number problem then asks for
the greatest value of T attained by any packing of n-dimensional spheres.
In one-dimensional space the answer is 2, and in two dimensions it is 6 (it
is easy to show that although six pennies can be arranged around another
penny on a table-top without overlapping, as in Fig. 1.3b, seven can not.)
In three dimensions, as we have mentioned, the answer is 12.
It is somewhat surprising that we also know the answers in 8 and 24
dimensions ([Od15] == Chap. 13, [Lev7]), but in no other dimension above
3. In fact these numbers (240 and 196560 respectively) are technically
easier to establish than the result in three dimensions. This is partly
because in these dimensions the arrangements are unique: the only way to
place 240 8-dimensional spheres around a central sphere is the
arrangement found in the E 8 lattice, and similarly in 24 dimensions the
arrangement must be that found in the Leech lattice in one of its two
mirror-image forms ([Ban13] ;;;;; Chap. 14).
On the other hand in four dimensions, for example, the highest
attainable kissing number is at present only known to be either 24 or 25.
24 occurs in the D4 lattice, while the best bound known is 25. The kissing
numbers of various packings in dimensions up to 24 can be found in
Tables 1.1 and 1.2, while Table 1.3 includes the kissing numbers of some
lattices in dimensions 24 to 128. (Beyond that the kissing numbers in
Table 1.3 are not known.> The best bounds currently known on Tn, the
highest attainable kissing number in dimension n, are shown in Table 1.5
for 1 ~ n ~ 24. The lower bounds in this table are taken from Table 1.2,
and the upper bounds will be derived in Chap. 13.
So far we have considered the kissing numbers of arbitrary
arrangements of spheres. If we restrict ourselves to lattice packings rather
more is known: Watson [Wat7] showed that the laminated lattices An
have the highest possible kissing numbers for lattices in dimensions n ~ 9.
For n ~ 8 the highest kissing numbers presently known for arbitrary
packings coincide with what can be attained by lattices. However in
dimension 9 a nonlattice packing (p 9a ) exists in which some spheres touch
306 others (see Table 1.2 and §2.6 of Chap. 5), whereas the highest
possible kissing number for a lattice is 272 [Wat7] (see also [Wat6J,
[Wat8], [Wat9], [Wat13]). So as regards the maximal kissing number, 9
is the first dimension in which non lattice packings are known to be superior
to lattice packings.
It is worth commenting on our present state of knowledge about 11-
dimensional packings, which is summarized in the following table (part of
Table 1.2):
Name Type 0 Tmax
This suggests that in general we should expect the lattice and nonlattice
versions of the packing and kissing problems to have four different answers.
The moral is that the kissing number question is a local problem, while the
sphere packing question is a global problem! Of course the packings in
this table are not known to be optimal, and it is still possible that there is a
single lattice that is superior to all four.
Table 1.5. Range of possible values for T", the highest attainable kissing
number in dimension n. The third column gives the degree of the
polynomial used in Chap. 13 to obtain the upper bound.
n Tn Deg.
2
2 6
3 12
4 24-25 9
5 40-46 10
6 72-82 10
7 126-140 10
8 240 6
9 306-380 11
10 500-595 11
11 582-915 11
12 840-1416 11
13 1130-2233 12
14 1582-3492 12
15 2564-5431 12
16 4320-8313 13
17 5346-12215 13
18 7398-17877 13
19 10668-25901 13
20 17400-37974 13
21 27720-56852 13
22 49896-86537 14
23 93150-128096 14
24 196560 10
(see [Kabl1 and Chap. 9, Eq. (55», and Wyner [Wynl1 showed that
arrangements of spheres exist with
T ~ 2(J-O.5Iog23)n(J+o(I)
= 20.2075 ... n(J+o(I» . (50)
(The inequality is ~ rather than ~, since the closer two points are on On,
the larger is their inner product. When x = y, x . y = 1. When y is the
antipodal point to x, i.e. y = -x, then x . y = -1.)
Sphe re Packings and Kissing Numbers 2S
See also [Arnl1, [Becl], [Ber9], [BerIO], [Blal1, [Gril2], [Lee3], [Linl],
[Mell], [Meyl], [Mohl], [Muel], [SI013a], [WeI4]. For four-dimensional
spherical codes see [Cox24], [MacO], [Nunl1, [War4].
There are two simple and general methods for constructing spherical
codes that are not restricted to three dimensions, one based on sphere
packings and the other on error-correcting codes. These constructions, like
the three- and four-dimensional codes just mentioned, all give lower bounds
on A (n,rjJ).
2.4 The construction of spherical codes from sphere packings. Let A be a
sphere packing in Rn, and let us place the origin of coordinates at a
convenient point P. (Usually P is taken to be the center of a sphere or a
point equidistant from a certain number of centers. For example, in
Fig. 1.3b we might choose P to be a point marked 'a' or 'b', or midway
between two points marked 'a'.) Suppose there are N spheres in A with
centers at distance u from P. Then these centers, when rescaled by
dividing them by u, form an n-dimensional spherical code of size N. In
other words we take a shell of points around P as the spherical code
[SI012].
The distance between the centers of the spheres is at least 2p (where p
is the radius of a sphere), so the minimal angle in this code is at least
2 sin-' (p/u). (53)
The number of points in this code is given by the theta series of the
packing with respect to P (Chap. 2, §2.3).
Examples. Consider the lattice D4 (§1.4), with the origin P at a lattice
point and p = 1/J2. The first shell has u = J2 and contains 24 centers
(the kissing number), and the corresponding spherical code consists of the
points T'/2(±I,±1,0,0), with minimal angle 2 sin-'1h = 60°. The
second shell has u = 2 and also contains 24 points, and the spherical code
consists of (± 1,0,0,0) and 1h (± 1, ± 1, ± 1, ± 1). Again the minimal angle
is 60 0, so in this case (53) does not give the exact value of rjJ. In fact this
second code is a rotation of the first. Both examples show that
A (4,60°) ~ 24.
On the other hand if we move P to 0,0,0,0) (a "deep hole" in D4 -
see Fig. 1.3d) we obtain a different sequence of spherical codes. The first
shell now contains 8 points at distance 1 from P, forming a code of
minimal angle 90 ° (the vertices of a regular 4-dimensional generalized
octahedron). Thus A (4,90 0) ~ 8. The numbers of points in these two
families of spherical codes are the coefficients of the theta series
Y2(8 3(2z)4 + 84(2z)4) and Y28 2 (2z)4 respectively (Chap. 4, §7).
2.5 The construction of spherical codes from binary codes. Let C be a
binary error-correcting code (Chap. 3, §2) of length n and minimal
distance d. A spherical code is obtained by changing the l's to -1's and
the O's to + l's in every codeword, and dividing by .In. The resulting
points lie on n n and the minimal angle is given by
Sphere Packings and Kissing Numbers 27
(S4)
d . 2 IjJ
-;; = sm "2' (SS)
(This is not very good when compared with Wyner's existence result (SO),
but at least grows exponentially with n.)
2.6 Bounds on A (n, 1jJ). Again there is a nonconstructive lower bound
[Sha6], [Wynl]:
(S7)
(Eq. (SO) is the special case IjJ = 60°.) In the other direction there are a
number of bounds. We start with bounds that apply when IjJ is large, and
work down. Rankin [Ran4] found the exact value for IjJ ~ 90°:
A (n,ljJ) = 1, for 11" < IjJ ~ 211", (S8)
The spherical codes corresponding to (60) and (61) are respectively the
vertices of a regular simplex and a regular cross-polytope or generalized
octahedron. Rankin also showed that
28 Chapter 1
( ) 2Fn-l (a) (
A n,rP ~ Fn (a) , 63)
(64)
l.-
n
log2 A (n, rP) < -
-
21 log2 (I - cos rP) - 0.0990, (66)
where rP' ::::: 63" is the root of a certain equation. When rP = 60", (66)
yields (49). Eqs. (65) and (66) follow from linear programming - see
Chap. 9, §3.5(iv). The linear programming method also produces many
tight estimates of A (n, rP) in particular cases - see for example Tables 1.4
and 9.2. For cos rP < l/.Jn, Delsarte et al. [DeI16] showed that
A (n,rP) ~ n(I-cosrP) (2+ (n+I)cosrP) , (67)
I-n cos 2rP
(see Chap. 9, Th. 6). For example Eq. (45) was deduced from (66) and
(70).
Sphere Packings and Kissing Numbers 29
W
10 10
9 3
9
~
2
8 2
7 7
(0 ) (b) (c)
Figure 1.7. How to permute the planets.
30 Chapter 1
cycles is well known to generate A12. Since we can also achieve the odd
permutation 1I'j, we can achieve the full symmetric group S12, as claimed.
By a slight perturbation of the satellite motions we can obtain the
twelve 5-cycles like 11'2 (which generate A12) even when the planets have
radius slightly larger than the sun. We do not know whether the whole
group S 12 can be achieved for such a radius.
2
Coverings, Lattices and Quantizers
1. H. Conway and N. 1. A. Sloane
e is also called the density or the sparsity of the covering. None of these
32 Chapter 2
(0)
(b)
Figure 2.1. Covering the plane with circles. In (a) the centers belong to
the square lattice Z2, in (b) they belong to the hexagonal lattice. (b) is a
more efficient or thinner covering.
Coverings, Lattices and Quantizers 33
1.2 The covering radius and the Voronoi cells. Consider any discrete
collection of points [lj> = {p b P 2 , . ..} in Rn. The least upper bound for the
distance from any point of Rn to the closest point Pi is called the covering
radius of [lj>, usually denoted by R. Thus
R = sup inf dist(x ,p). (3)
x ERn P E ilJ'
(If the upper bound does not exist we set R = 00.) Then spheres of radius
R centered at the points of [lj> will cover Rn, and no smaller radius will do.
Around each point Pi E .J}J is its Voronoi cell, V(Pi ), consisting of
those points of Rn that are at least as close to Pi as to any other Pj . Thus
V(Pi ) = { x ERn : dist(x ,Pi) ~ dist(x ,Pj ) for all j }. (4)
If P b P 2, ... represent schools, the Voronoi cells are the school districts!
Other names are nearest neighbor regions. Dirichlet regions. Brillouin
zones and Wigner-Seitz cells (the last two are physicists' terms). The
Voronoi cells of the hexagonal lattice, for example, are the regular
hexagons shown in Fig. 1.3c. The Voronoi cells of many other lattices are
described in Chaps. 4 and 21.
The interiors of the Voronoi cells are disjoint, although they have faces
in common. Each face lies in the hyperplane midway between two
neighboring points Pi' The Voronoi cells are convex polytopes whose union
is the whole of Rn. (It is true, but not entirely obvious, that the
intersection of two abutting Voronoi cells is an entire face of each of
them.) If [lj> is a lattice A, all the Voronoi cells are congruent and have
volume equal to (detA) 1/2.
The vertices of the Voronoi cells are especially interesting. They
include the points of Rn whose distance from [lj> is a local maximum: these
are called the holes in [lj> (cf. Fig. I.3d). If there is a point whose distance
from [lj> is an absolute maximum it is called a deep hole and its distance
from [lj> is the covering radius R. (The children who live at deep holes are
those that have the longest walk to schooL) Holes that are not deep are
called shallow. The deep holes in the hexagonal lattice are the points
marked band c in Fig. 1.3b. For this lattice R = 2pj.J3, where p is the
packing radius. If [lj> is a lattice, the vertices of the Voronoi cells are
exactly the holes, but in general they may include other points.
For a lattice packing A, with Voronoi cells congruent to a polytope V
say, the packing radius p is the inradius of V (the radius of the largest
inscribed sphere), while the covering radius R is the circumradius of V
(the radius of the smallest circumscribed sphere). We now see the
difference between the packing and covering problems. For a good packing
we try to maximize p, i.e. we wish to choose the centers of the spheres so
that the inradius of the Voronoi cells is as large as possible (for a
non lattice packing we consider the smallest inradius of any Voronoi cell).
On the other hand for a good covering we try to minimize R, i.e. we wish
to choose the centers so that the circumradius of the Voronoi cells is as
34 Chapter 2
f
2
G = G(V(P)) = 1. Vol(V(p)) -1--;;- Ilx -PjIl 2dx .
n V(~)
(001)
(0) (b)
(-1/2 1/2 1/ 2)
(010)
(00-1)
Figure 2.2. (a) Rhombic dodecahedron (the Voronoi cell for fcc lattice)
centered at origin. There are 6 vertices (± 1,0,0), 8 vertices
(± V2, ± V2, ± V2) . (b) Truncated octahedron (the Voronoi cell for bcc
lattice) centered at origin. There are 24 vertices (± I, ± V2,0). For
example a = (O,lh,I), b=(0,1, V2), c =(V2 ,1 , 0), d-(I,V2 , 0) ,
e = (I,O,\l2),f = ( V2, 0,1) , g = (0,-V2 , 1), h = (-1/2, 0, I) .
Coverings, Lattices and Quantizers 3S
yl
-"'-
I
Figure 2.3. For the points fYJ indicated by small circles the Delaunay
cells are squares (A) and octagons (B); the Voronoi cells are triangles
(e.g. XYZ).
36 Chapter 2
and is in fact the thinnest covering known{[) in all dimensions n ~ 23. (It
is surprising that A;, with e = 3.6658 ... , is better than E 8, which has
e = 4.0587 ... .) But Ai4 has thickness 63.269 ... , and is inferior to the
Leech lattice A 24, for which e = 7.9035... (Chap. 4, §11, and [Con20] =
Chap. 23).
In three dimensions, A;
(the bcc lattice) is not just the thinnest lattice
covering, it is the only locally optimal lattice covering. In R4 Dickson
[Dic4] found that there are precisely three locally optimal lattice coverings,
namely A:
and the lattices with Gram matrices
2 a -1 -1 3-1' l' -1 -1
a 2 -1 -1 l' 3-1' -1 -1
Di 4a :
-1 -1 2 I-a
, Di 4b :
-1 -1 2+2{3 -{3 (6)
-1 -1 I-a 2 -1 -1 -{3 2+2{3
where a = (5 -.Jf3) /2 and {3 ::::: 0.544, l' ::::: 0.499 are the roots of certain
polynomials. In dimensions n = 5, 7, 9, ... Barnes and Trenerry
[Barl7] found locally optimal lattice coverings that are only slightly worse
than A;. Table 2.1 and Fig. 2.4 show the thinnest coverings known in
dimensions n ~ 24, together with the thicknesses of certain other lattices
of interest. The upper bound on the thickness is the Coxeter-Few-Rogers
bound (16), calculated via (17) and Eq. (40) of Chap. 1.
([) I t IS
. now known t h at A*·
23 IS a better covermg
. than A 23,
• and there are
other improvements to Table 2.1 and Fig. 2.4 in dimensions just below 24.
Cove rings, Lattices and Quantizers 37
:;
2 COXETEA
FEW
ROGERS
BOUND (16)
o 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30
DIMENSION
-1 log2 0 - log2
n
-Jffe
--
12
= 0.2546 .... (8)
I
- log2 0 < log2 .J27r eG (A) , (9)
n -
0
M
I- 1M I- 1M I-1 M
(see Chap. 21, Eq. (26», finding that it is minimized when k = 8. This
produces lattices ff' with
1
- log2
n
e <- 0.2012 .... (10)
for n ~ 3 (see also [Erd21, [Grill], [Rog7]). As usual these results are
nonconstructive, in the sense explained in Chap. 1.
In the other direction Coxeter, Few and Rogers [Cox261 showed that
any n-dimensional covering satisfies
(16)
as n - 00. (Is)
Remarks. (j) These bounds are considerably closer together than the
corresponding bounds for packings (Chap. 1, Eq. (46)); on the other hand
the best constructions known are further from the bounds. (ij) There are
no known examples of nonlattice coverings that are thinner than the best
lattice coverings. (iii) One may also consider the covering problem on the
sphere n n (analogous to Chap. 1, §2.3). There are some results in [Fej 1,
p. 325], [Rog61, [Wyn21, but not much is known about this problem.
(iv) Davenport's construction can be adapted to produce binary codes with
low covering radius [Gra4].
Formulae (20) and (21) are equivalent definitions for the minimal norm of
a lattice, for if x and yare distinct vectors in A then x' = x - y is a
nonzero vector of A. (20) and (22) - but not necessarily (21) - are also
valid for nonlattice packings.
2.2 Quadratic forms associated with a lattice. Quadratic forms provide an
alternative language for studying lattices, especially useful for investigating
arithmetical properties. In this section we show how quadratic forms and
lattices are related. Some of the material is rather detailed, and the reader
may like to turn at once to §3 where we discuss the quantization problem.
The classification of quadratic forms and lattices is briefly discussed in
§2.4; we shall say much more in Chaps. 15-18.
Let A be a lattice in n -dimensional space Rn, having basis vectors
(forming the rows of a generator matrix M). The generic
VI • . . . • Vn
lattice vector x = (x I • . . . ,xn ) E A may be written (see Eq. (2) of
Chap. 1) as
where the ~i are integers and ~ = (~I' .... ~n). The norm of this vector is
n n
N(x) = N(~lvI+ ... +~nvn) = ~ ~ ~i~i Vi· Vi
i-I i-I
(24)
For example, from the Gram matrix given in Eq. (7) of Chap. 1, one
quadratic form associated with the hexagonal lattice is
H + ~Ib + ~r (25)
It is sometimes simpler to use the ~-coordinates (~l' ...• ~n) for lattice
vectors rather than the x-coordinates. For instance if we start with the
quadratic form f we may define the lattice by setting the norm of
(~l' ...• ~n) equal tof(~). (Or we may factor A as MM tr and use Mas
a generator matrix.)
We recall that congruent lattices are related by Eqs. (22) and (23) of
Chap. 1 with c '"' 1 and det U = ± 1. Quadratic forms corresponding to
congruent lattices are called integrally equivalent. Thus there is a one-to-
one correspondence between congruence classes of lattices and integral
equivalence classes of quadratic forms. For example the vectors VJ, V2 in
Fig. 2.6a and WJ, W2 in Fig. 2.6b also span lattices that are congruent to
the hexagonal lattice of Fig. 1.3a. The Gram matrices for these bases are
C
0
0
VI
0
;> ·0
WI
0 0
0 0
0
(0) (b)
obtained from the basis given in Chap. 4, Fig. 4.7. The definition given in
Chap. 4, Eq. (97), reveals much more of the symmetry.
Nevertheless quadratic forms are important for studying certain aspects
of lattices, and there is an extensive literature - see the references in §1 of
Chap. 15. Quadratic forms are particularly useful for investigating
arithmetical aspects of lattices, as we now show.
2.3 Theta series and connections with number theory. A very old problem
asks for the number of ways of writing an integer m as a sum of four
squares, or in other words for the number of quadruples of integers
(XJ,X2,X3,X4) such that
or in other words the number of times the quadratic form associated with
A represents the number m. Eq. (30) is an example of a Diophantine
Coverings, Lattices and Quantizers 45
of a lattice A (compare Eq. (13) of Chap. I), we define the average theta
series to be
= 8 A (z) + 1. ~ ~ qN(x+urUk)
S j<kxEA
8 f?i(z) = ± ~
j-I xEA
qN(X +urUt) . (34)
m-- oo
which is the Jacobi theta function (J3(Z) (Chap. 4, §4.1). The translate
Z + Ih = L, -lIh, -Ih, Ih, lIh ,.. .} has theta series
So the answer to the problem at the start of this section is simply the
coefficient of qm in the expansion of 8 3 (z)4 in powers of q.
To obtain the theta series of the lattice Dn (which consists of the points
of Zn whose coordinates sum to an even number, Chap. 4, §7.1) we
introduce the theta function 8 4 • 8 3 and 8 2 may be regarded as assigning
unit masses to the integer and half-integer points on the real line
respectively. To get 84 we assign masses of +1 to the even integers and -I
to the odd integers, or formally
m-- oo
Then
(37)
(42)
(43)
- see Chap. 4, Eq. (19). Here for the first time we must use z rather
than q. There is also a generalization of (43) which applies to nonlattice
packings that are the union of translates of a lattice [OdI6]. Two
illustrations are given in Example 6 of Chap. 7.
The actual values of the theta series are also of importance in chemistry
(for example in calculating the Madelung constant, see [Bor6], [Gel2],
[Gla7], [ala8], [Zucl]), and in communication theory. The error
probability when a lattice is used as a code for a particular Gaussian
channel can be estimated by the value of e A (q) for a particular choice of
q - see Eq. (3S) of Chap. 3.
The theta series is determined by the lattice, but not conversely. Witt
[Wit4] observed that in 16 dimensions Dt6 and the direct sum E8 EB E8
are inequivalent lattices of determinant 1 with the same theta series. It is
easy to verify this, and the verification illustrates how identities between
theta functions have lattice-theoretic proofs. First, since Dt is congruent
to Z4, we have the identity 1f2(8 2 (z)4+8 3 (z)4+8 4(z)4) = 8 3 (z)4, i.e.
8 3 (z)4 = 8 2 (z)4 + 84(z)4. (44)
r
We must show that the theta series of Di6 and E8 EB E8 are equal, i.e. that
and for many geometrical purposes this is the best form of the definition.
Most of the lattices encountered so far in this chapter are integral when
suitably scaled. Our general policy (for example when selecting basis
vectors in Chap. 4) is to choose the scale so as to make the determinant as
small as possible while making the lattice integral. For example the
hexagonal lattice A2 as defined by Eq. (8) of Chap. I is integral, although
the equivalent lattice defined by (6) is not.
An important group associated with an integral lattice A is its dual
quotient group A* lA, which has order det A. For example A;IA 2 is a
cyclic group of order 3. The three cosets of A2 in A; are indicated by the
letters a, b, c in Fig. 1.3b.
Note that an integral lattice A has the property
A ~ A* c I A (46)
- det A .
It is known that if a unimodular lattice has the property that the norm
of every lattice vector is a multiple of some positive integer c, then c is
either I or 2 [O'Mel, p. 3241.
n 0 1 2 3 4 5 6 7 8
an 0+1 0 0 0 0 0 0 0 0+1
bn 0+1 1 1 1 1 1 1 1 1+ 1
n 9 10 11 12 13 14 15 16 17
an 0 0 0 1 0 1 1 1+ 2 1
bn 2 2 2 3 3 4 5 6+2 9
n 18 19 20 21 22 23 24 25 26
an 4 3 12 12 28 49 156 + 24 368 ?
bn 13 16 28 40 68 117 273 + 24 665 ?
(47)
where the sum is over all inequivalent lattices from a given genus (for
example all n -dimensional odd unimodular lattices). A slightly more
general formula gives an explicit formula for
tI
0 A (z)
Aut(A) I .
so Chapter 2
We illustrate by using the mass formula to check that the first nine
columns of Table 2.2 are correct. First we consider even unimodular
lattices. In dimension 8 the constant ao = 1/696729600 is given in
Chap. 16, Table 16.4, and indeed
1
IAut(E 8) I 696729600
(see Chap. 4, §8.I). The values of ao for odd unimodular lattices are given
in Chap. 16, Table 16.2. For 1 :s:; n :s:; 8, ao = 1/(2n nO, confirming that
zn is the unique odd unimodular lattice (since IAut(zn)I = 2n n!, Chap. 4,
§5). However, for n = 9, ao = 17/2786918400, and indeed there are two
9-dimensionallattices, E8 ED Z and Z9, and
1 + 1
I Aut(E 8 ED Z) I IAut(Z9) I
We shall say more about these formulae in Chap. 16. The most dramatic
application of the mass formulae is the verification of Niemeier's list of
24-dimensional even unimodular lattices given in Chap. 16, §2.
The main consequence of this theory is that there are only a limited
number of possibilities for the theta series when the determinant is small.
From this it is sometimes possible to derive explicit expressions for the
coefficients N m in the theta series, or to obtain accurate numerical
estimates for the coefficients. We shall give five samples of such results;
many others will be found in the above references.
Coverings, Lattices and Quantizers 51
m-l m-O
0 A1A(Z) = ~ N m qm
m-O
(53)
Nm :::::
65520 0"11 [m2]
"69l (56)
i 2 = / = k 2 = -I ,
ij=-ji=k, jk=-kj=i, ki=-ik=j
z
([Birl], [Cox8], [Cox!71, [Herl]). The conjugate of z is defined to be x - iy
(in C) or u - iv - jw - kx (in H), and the norm of z is N (z) = zz, which is
x 2 + y2 or u 2 + v 2 + w 2 + x 2 . Similarly the norm of a vector z = (z \' ... ,zn) is
N(z) = z\z\ + ... + znzn.
Besides changing the field we also change what we mean by an integer. There
are many possibilities, but here we shall just consider three rings of integers to be
used instead of Z. These are the Gaussian and Eisenstein integers
Coverings, Lattices and Quantizers 53
~ = { a + ib : a, b E Z} c C, (58)
8-{a+wb : a,bEZ} CC, (59)
where w - (-I +i.J])/2 is a complex cube root of unity [CoxIO, p. 421), [Cox21,
p. 145), [Fei2), [Har5, p. 179), [LanO, III, pp. 5, 16), and the Hurwitz
quaternionic integers [Hurl), [CoxI8)
:Yf- {a +ib + jc +kd : a,b,c,d E Z or a,b,c,d E Z + 'h} C H. (60)
Let J be one of the rings of integers Z, ~, It, .,r, and let K be the
corresponding field (R, C, C, H respectively). A J-lattice is defined as follows.
Take n vectors VI • • • • • V, E K' that are linearly independent over K. Then the
J -lattice A generated by these vectors consists of all linear combinations
(61)
The determinant of A is given by Eq. (4) of Chap. 1, the minimal norm IJ. by
Eq. (21) above, the packing radius p by Eq. (22), the covering radius by a formula
analogous to Eq. (3), the theta series by
f)A(Z) - ~ qNGc), q = e";z, (64)
xEA
where a,
the absolute value of the discriminant of J, is equal to 3 if J = tf or 4 if
J = '!i. The theta series of the dual lattice is
(68)
(69)
In all cases Areal has the same packing and covering radii as A, and we define the
density, kissing number and thickness of A to be equal to the corresponding values
for Areal.
In the case where A is an tf-lattice (where tf is the ring of Eisenstein integers),
multiplication of vectors in A by w is a fixed-paint-free automorphism of order 3
of A and Areal; only the zero vector is fixed. Conversely, a real lattice in R2n with a
fixed-point-free automorphism of order 3 can be regarded as an tf-lattice in en. If
A has generator matrix M = X + iY (X, Y rea!), then Areal has generator matrix
[-~ ;].
The situation is a little more complicated if A is an Jff..lattice (where .Yf is the
ring of Hurwitz integers). yt' contains 24 integers of norm I, or units, namely
±I, ±i, ±j, ±k, ±w, ±w',
where
w= Ih(-I+i+j+k),
w= 'h(-I-i-j-k), (73)
Coverings, Lattices and Quantizers 55
and
Wi =i-lwi =jw=wk -w+i = lh(-l+i-j-k),
wi = rlwj - kw = wi = w + j - lh(-l-i + j-k),
wk = k-lwk - iw = wj - W + k = ~'2(-I-i-j+k),
wi = i-lwi = -kw = -wj - w - i = lh(-l-i+j+k),
wj = rlwj = -iw = -wk - w - j = lh(-1+i- j+k),
;;;k =k-lwk =-jw=-wi -w-k =¥2(-1+i+j-k). (74)
U V W X
-V U -X W
(75)
-W X U -V
-X -W V U
[~ ~ :1 (76)
[17 ~]
i
(77)
then Areal is E 8•
The Leech lattice can be constructed in all three ways, as a f'fJ-, 8- or Jf'.
lattice - see §1 of Chap. 6 and Example 12 of Chap. 7.
Finally, we briefly discuss the existence of even complex lattices. The norm of
A, denoted by .A1A), is the subgroup of the real numbers generated by
( N(x) : x E A}. We have already seen that if A is a real self-dual lattice then
.AI(A) is either Z or 2Z [O'Mel, pp.227,324). The same proof shows that this
result also holds for complex lattices. Lattices for which .A1A) - 2Z are called
even. Even self-dual f'fJ-Iattices exist in Cn if and only if n is a multiple of 4; there
are no even self-dual 8-lattices [Ger5, Th. 3.6). There are however even self-dual
lattices over other rings of integers - see for example §4 of Chap. 8.
56 Chapter 2
3. Quantizers
3.1 Quantization, analog-to-digital conversion, and data compression. As
mentioned at the end of §1.4 of Chap. I. although this book primarily
discusses geometrical problems. many of them have direct application to
other branches of science. In this section and in §! of Chap. 3 we describe
two of the principal applications. to vector quantizers and to the design of
signals for use over a noisy channel.
The real world is full of nasty numbers like 0.79134989 ...• while the
world of computers and digital communication deals with nice numbers
like 0 and I. A quantizer. or analog-to-digital converter. is a device for
converting nasty numbers into nice numbers. Quantizers are found in
digital measuring instruments or recording devices. and in digital
communication systems (including most medium- or long-distance
telephone networks, those that use pulse code modulation for example -
see §I.l of Chap. 3). We must add. however. that most existing quantizers
are one-dimensional; the n-dimensional quantizers described here are not
yet in general use.
Figure 2.7 shows a hypothetical two-dimensional quantizer. Eleven
representative points PI ..... P" have been chosen in advance. The input
VORONO! CELL
AROUND P4
INPUT OUTPUT IS
QUANTIZER
(78)
(79)
Remarks. (j) (78) and (79) assume the probability that the input x lies
exactly on the boundary of a Voronoi cell to be negligibly small. (ii) The
factor lin is to ensure a fair comparison between quantizers of different
dimensions. (iii) The mean squared error criterion is only one of many
possible distortion measures; it has the advantage of being widely used and
is mathematically the simplest. For applications to speech or picture
processing the correct choice of distortion measure is a difficult problem.
See for example [Atal1-[Ata3], [Flal], [SchlO1.
58 Chapter 2
i.e. the smallest error attainable by any set of M points PI • ...• PM E Rn.
Zador ([Zadll, [Zad2]; see also [Buc2], [Buc3], [Ger21, [Yaml]) showed
under quite general assumptions about p (x) that
n+2
Ji~oo M2/n E(n,M,p) = Gn [£p(x)n/(n+2)dX]-n-, (S1)
(n
1
+2h
r [ !!.+I )
2 G ~ n~
n1-rr r [ ; + 1 rn r [1+ ~ ). (S2)
For large n the upper and lower bounds in (S2) agree, giving
1
Gn -- -2- = 0.058550... as n -- 00 (83)
-rre
Since the probability density function p (x) only appears in the last
term of (S 1), we may choose any convenient p (x) when attempting to find
Gn • The simplest choice, and one which is of considerable interest in its
own right, is to assume that x is uniformly distributed over a large region
of R n (a large ball, for example). With a uniformly distributed input the
mean squared error is minimized if each point Pi lies at the centroid of its
Voronoi region V(p) [Ger2]. We are most interested in the case when M,
the number of points, is very large. This enables us to ignore boundary
effects, and leads to simpler answers. If the input is uniformly distributed,
(79) and (S 1) become
1.. ~
n
J
i-I V(P j )
N(x - Pi)dx
E = ------M------------- (S4)
~ J
i-I V(Pj)
dx
Coverings, Lattices and Quantizers 59
E(n,M,p)
(85)
[ ~ i~ vt;) dx rn ,
where E(n,M,p) = inf E. Equations (84) and (85) can be interpreted as
saying that, for optimal quantization of a uniformly distributed input using
a large number of points, Gn is the average mean squared error per
dimension. scaled so as to be a dimensionless quantity (independent of the
choice of scale of the Pi)'
3.2 The quantizer problem. From now on we assume that the input x has
a uniform distribution over a large ball in Rn, and that M, the number of
points Pi, is large. The quantizer problem is to choose points PI • ...• PM
in Rn so as to minimize
-1 M
~ f N(x-P)dx
M i-I V(P;)
(86)
n M }1+1-'
{ _1 ~ Vo\(V(p) n
M i-I
where V(Pi ) is the Voronoi cell of Pi' Then (from (84), (85» Gn is equal
to the limit as M - 00 of the infimum of (86) over all choices of the Pi'
By the previous section the solution to the quantizer problem gives both the
optimal quantizer for uniformly distributed inputs and, via (81), the error
probability for an optimal quantizer when the input has an arbitrary
probability density function p (x).
If all the Voronoi cells V(p) are congruent (as in the case when the Pi
form a lattice), (86) can be simplified. Suppose the Voronoi cells are
congruent to a polytope IT. If we place the origin of coordinates at the
centroid of IT, (86) becomes
1- f x . x dx
n II
-=---~ = G (IT), (87)
1+1-
Vo\(IT) n
It is shown in [Bar161 that the bcc lattice is the only lattice at which G (IT)
is even a local minimum . For comparison
G (fcc) = G (rhombic dodecahedron) = 2- 11 / 3 = 0.078745... (9 J)
(Chap. 21 , Eq. (26», but this can be reduced by perturbing the lattice
slightly. In higher dimensions even the best lattice quantizers are not
known .
0 .082
<:)c 0.080
>-
z 0.078
I.LJ
:::;
~ 0 .076
0*n
~ 0 .074
o
u
~ 0072
o
~ 0.070
..J
~ 0.068
0:::
CONJECTUREO
~ 0.066 LOWER 80UND (92)
0 .064 ~-!:--'-~~--'--=--'-:'::-'--:'::--'-:":--'---:'::-'-~'--::'::-'--;';:-.L.:f~
o 2 4 6 8 10 12 14 16 18 20
DIMENSION n
Table 2.3. Bounds for G., the mean squared error of the optimal n-
dimensional quantizer. (92) is our conjectured lower bound.
0 Ao 0 0
1 Z 0.083333 0.083333
2 A; == A2 0.080188 0.080188
3 Ai == Di 0.078543 0.077875
A3 == D3 0.078745
4 D: ==D4 0.076603 0.07609
A: 0.077559
A4 0.078020
5 D; 0.075625 0.07465
Ds 0.075786
A; 0.076922
As 0.077647
6 E~ 0.074244 0.07347
E6 0.074347
7 E; 0.073116 0.07248
E7 0.073231
8 E; == Eg 0.071682 0.07163
D; 0.074735
Dg 0.075914
A; 0.075972
As 0.077391
12 K;2 == KI2 0.070100 ± 0.000024 0.06918
16 A;6 == AI6 0.068299 ± 0.000027 0.06759
24 A;4 == A24 0.065771 ± 0.000074 0.06561
Tables 1.1, 2.3 and Fig. 2.9 show the best quantizers known in
dimensions n ~ 24. For some of these lattices G (A) can be determined
exactly, as shown in Chap. 21. However, for E~, E;, K 12 , AI6 and A24 ,
G (A) was evaluated in [Con38] by Monte Carlo integration, making use of
algorithms (see §1.4 and Chap. 20) that find the closest lattice point to an
arbitrary point of Rn • (2)
Table 2.3 and Fig. 2.9 also show Zador's bounds (82). The lower
bound in (82) on Gn is the normalized second moment of an n-dimensional
sphere - see Chap. 21, Eq. (8).
(2) Worley [Worl1, [Wor2] has since found exact values for E: and E;
see §3.D of Chap. 21.
62 Chapter 2
n+3-2Hn +2
4n(n+1)
{ 42[12" cos-II]};
(n+I)(n!) Fn -;; ,
this process by taking the received (or retrieved) signal and making a
(hopefully correct) estimate of the code signal; the source decoder then
converts this back to the original message.
From now on we shall just describe the data transmission problem,
always keeping in mind that there are identical results for data storage
systems.
The sampling theorem plays a crucial role in many communication
systems. The sampling theorem (Fig. 3.2) states that if f (t) is a signal
(j.e. a function of time) containing no components of frequency greater
than W cycles per second, then f (t) is completely specified by its samples
taken every I!(2W) seconds (see [DymIl, [HigIl, UerIl, [LanIl, [LeeO],
[Pet21, [Sha21, [Ste 11, [Woz 1]). In fact there is an explicit formula, the
cardinal series, expressing f (t) in terms of its sample values:
Since
J sin 27rW(t-k/2W)
27r W(t - k/2W)
sin 27r W(t -1/2 W) dt
27r W(t -I /2W)
f00
-00
f(t)2dt = -
look
~ f -
2W k--oo 2W
[ ] 2
(0 ) f (')
o~
-AT11lI\ ~ T
2W
(b )
o
IIIII
II T
(e)
(d)
•
Figure 3.2. The sampling theorem is the basis for many digital
communication systems. (a) A function 1 (t) which does not change too
quickly, in particular one which does not contain any frequency
components greater than W cycles per second, is sampled every 1/(2W)
seconds. (b) The sample values 1(0), 1(J/2W), 1(2/2W), ... are
transmitted. The theorem states that 1 (t) can be reconstructed exactly
from these samples. This is the principle underlying pulse code
modulation (PCM) . (c) In T seconds there will be n samples, where
n = 2TW. These samples (f(0),f(J/2W) . ... '/«n-J)/2W» are the
coordinates of a point in n-dimensional space. (d) Thus the complicated
function 1 (t) has been represented by a single point in n-dimensional
space.
feeding them into a simple electrical circuit (a low pass filter). Moreover
the recovery is stable, in the sense that small errors in the sample values
produce only correspondingly small errors in the recovered signal.
For example the sampling theorem is the basis for the digital
transmission system known as pulse code modulation, or PCM ([Bell],
[Ben4], [OliI)). Amplitude modulation (AM) and frequency modulation
(FM) are no doubt familiar to the reader. PCM is less well-known but
just as important, being widely used in medium-distance telephone calls.
The speaker's voice is sampled at the appropriate rate (usually 8000 times
a second), and each sample is rounded off or quantized to one of 256
levels, and then expressed as an 8-bit binary number. The binary numbers
are transmitted and at the receiving end the speaker's voice is
reconstructed from the samples. Since the sampling theorem is a true
theorem, the listener is unaware that this has happened.
66 Chapter 3
where
(6)
J (j(t}-g(t)2dt,
T
N(F-G) =!!:.... (7)
T 0
T
F· G = ; Jo f(t) g{t)dt. (8)
The decoder finds the closest code point to the received vector and from it
reconstructs the signal. If the noise is small, the closest code point will be
the transmitted point and the signal f (t) will be recovered correctly. But
if the noise is large the received vector may be closer to some other code
point and will be decoded incorrectly; this is a decoding error.
Thus we may reduce the effect of the noise by placing the code points
further apart. On the other hand by (5) this requires signals of greater
energy and increases the cost. One of Shannon's basic theorems is the
surprising result that it is possible to attain essentially error-free
transmission over this channel while using only signals of finite power,
provided the rate of the code does not exceed a critical threshold called the
capacity of the channel. There are similar results for many other channels,
including the binary symmetric channel.
The precise statement of Shannon's theorem for the Gaussian channel
is as follows. For any rate R less than the capacity
C = W log2 [1 + ~ ) , (10)
[ p]
R ::::: W log2 1 + -;?
2W
+ -n- log2 Ll.
A second, very similar problem asks for the best code in which all
signals have the same energy (a constant energy code). For small values of
II the solution to this problem is closely related to the problem of packing
Assuming that all code points are equally likely to be used, the error
probability for this code is
I M
Pe = I - - ~
M k-l
If all the Voronoi cells are congruent, to some polytope II say, this
simplifies to
Pe = 1-
(~)
1
IIv27r. n
f
II
e -x'x/2u d x.
2
(Is)
Then one version of the Gaussian channel coding problem is the following.
Given the dimension n, the number of code points M, and a power
constraint
k = I, ... ,M,
Pe(k) ~ ~
r lh p. )
erfc [ _1_ , (17)
j-l u.J2
where
f e-
00
(20)
So even when u is small it is not quite correct to say that the coding
problem coincides with the sphere packing problem, since the latter
maximizes P but ignores T. At the other extreme, when u is large, we can
approximate exp{-x'x /(2u 2 )} by 1 - X 'x/2u 2 + ... in (14), and the
coding problem coincides with the quantizing problem.
Codes, Designs and Groups 71
1.4 Lattice codes for the Gaussian channel. We now consider the lattice
channel coding problem in more detail. In one and two dimensions the
optimal lattice is independent of u. On one dimension there is only one
lattice, and in two dimensions the optimality of the hexagonal lattice for all
u follows by taking j(x) = (ufu)-l exp{-x 2 /2u 2} in the theorem on
page 81 of [FejlOJ.)
We now assume u is small. From (20) we may approximate the error
probability Pe by
Let the code consist of all lattice points C with N (C) ~ nP. The number
of points, M, is given by
M· Vnpn =.:l' Vn (np)nI2 (1+0(1), (22)
(see [Cai7, Th. 4)). For this analysis it is better to define the rate of the
code to be
1
R = - log2 M bits/dimension (25)
n
(26)
By combining (21), (26), (27) we obtain our final estimate for the error
probability of a Gaussian channel code with normalized signal-to-noise
ratio S, obtained from an n-dimensional lattice of density .:l and kissing
number r:
and therefore
-4
-6
-6
= •
n.
0
8"
oJ
-10
-12
-14
P48q
10 15 20 25
SIGNAL- TO- NOISE RATIO S
Figure 3.3 . The smallest known error probability P/ (Eq. (28» for any
n -dimensional lattice, as a function of the normalized signal-to-noise ratio
S (Eq. (27», for various dimensions n ~ 48.
Codes. Designs and Groups 73
For example, if we take our code to consist of all points C of norm at most
nP in a lattice A, then
from (23), (24). For comparison we use a roughly equal number of points
arranged in an n-dimensional cubical array centered at the origin (an
essentially one-dimensional code). For this code
.1!:... = _12_ (1+0(1). (33)
E nM2/n
(35)
Table 3.1. Nominal coding gain (Eq. (34» for various lattices in
Tables 1.2, 1.3, and the values of the center density 0 and 'Y = 402/n, a
lower bound on Hermite's constant.
2. Error-correcting codes
2.1 The error-correcting code problem. The other idealized model for the
channel in Fig. 3.1 is the binary symmetric channel. For this channel the
input and output symbols are O's and 1's, and there is some fixed
probability p < V2 that when a 0 or 1 is transmitted, the other symbol is
received; with probability 1 - P > V2, the correct symbol is received. A
binary cod/2) C of length n is a set of binary vectors (called codewords)
with n coordinates, or in other words is a subset of Fq, where F2 = { 0,1 }
is the Galois field of order 2.
Similarly a q-ary code is a subset of F;, where Fq is the Galois field of
order q and q is a prime or prime-power. Besides F 2, the ternary field
F3 = { 0,1, -I} and the field of order 4, F4 - { 0, l,w,w 2 } (where
w
w 2 ... = w + 1, w 3 = 1) are especially interesting. A q-ary code is used
on the q-ary symmetric channel, where the input and output symbols are
labeled with the elements of F q •
As in §1.2, we wish to choose the codewords so they are easy to
distinguish from each other even when errors have occurred. To make this
precise we define the Hamming distance between two vectors
U = ( U h " ' , U n ), V = ( V h " ' , V n ),
around the codewords are disjoint (so p is the packing radius of the code,
cf. Eq. (22) of Chap. 2), and therefore the code can correct p errors. A
code of length n, containing M codewords and with minimal distance d is
said to be an (n,M,d) code.
(2) Strictly speaking this is a block code. Convolutional codes (see for
example [LinO], [VitI]) are an important rival family of codes. Although
essential for many practical applications, convolutional codes are not
directly related to the geometrical problems discussed in this book.
76 Chapter 3
In a good code n is small (to reduce delays), M is large (to make efficient
use of the channel), and d is large (to correct many errors). Naturally
these goals are incompatible. The error-correcting code problem is the
following: given nand d, find A (n, d), the maximal number of codewords
in any (n,M,d) code. There is a similar problem for linear codes. In
general these problems are unsolved. However many upper and lower
bounds on A (n,d) have been found, and a large number of constructions
of codes are known. A table of A (n,d) for n ~ 24 is given in Table 9.1
of Chap. 9. Other tables may be found in [Bes3], [Chel], [Gra2], [HeI7],
[Mac6], [Pet3], [Pr01], [Slo13], [Verl1, [Zin2], [Zin41.
We will see in Chaps. 5 and 7 that there are strong connections
between codes and sphere packings, and between linear codes and lattice
packings. This is not surprising, since the error-correcting problem is also
a sphere packing problem, although in F~ or F; rather than Rn.
A constant weight code is one in which all codewords have equal
weight. Binary constant weight codes are a discrete analog of the spherical
codes described in §2.3 of Chap. 1.
Since we have written at length about error-correcting codes in [Mac6],
and numerous other references are available ([Ass4], [Ber4], [Ber6],
[Bla2], [BiaS], [Bla9], [LinO], [Linll], [Pet3], [VitI]), the discussion in
this chapter will be brief. In the next section we establish some further
notation, and then give a number of examples.
The covering problem of Chap. 2 also has a binary analog: one wishes
to find the smallest number of overlapping Hamming spheres that will
cover Fr Equivalently, let the covering radius of a code C be
maxmind(x,c) (xEF~,cEC). (41)
x
Then the coding version of the covering problem is, for a given length and
covering radius, to find the smallest possible number of codewords. We
shall not discuss such covering codes in this book, but refer the reader to
[Coh3], [Coh4], [Dow4], [Gra4], [Kill], [KiI2], [SI015], [SI0161. Much
less is known about the binary analog of the quantizing problem.
Codes, Designs and Groups 77
It was shown by Gleason and Pierce that these are essentially the only
possibilities: two proofs of this theorem are given in [SlolO, §6.11. Codes
of type I, II, III or IV exist if and only if n is a multiple of 2, 8, 4 or 2
respectively (see Chap. 7). Similar results for lattices were given in §§2.4,
2.6 of Chap. 2. We shall describe what is known about the enumeration of
these codes in Chap. 7.
Let C be an (n, M, d) code over Fq' We let Aj (c) denote the number
of codewords at Hamming distance i from a codeword c E C. The
numbers {A j (c) } are called the weight distribution of C with respect to
c. Of course Ao(c) = 1, Aj(c) ~ 0, and ~j Aj(c) = M. The Aj(c) also
satisfy certain less obvious inequalities found by De1sarte, which play a
crucial role in the theory. These are described in Chap. 9.
For linear codes (and some nonlinear codes) Aj (c) is independent of c
and will be denoted by A j • The (Hamming) weight enumerator of a linear
code C is
WC(x,y) = ~ xn-wt(u) ywt(u) (48)
uEC
n
= ~ Aj x n - j / . (49)
j-O
f IAut(C) I = ao,
(52)
Codes, Designs and Groups 79
where the sum is over all inequivalent codes of a certain type (for example,
all Type II codes of length n) - see [Mac61, [SlolO1. A slightly more
general version gives an explicit formula for
Wc(x,y)
t IAut(C) I
(53)
2.3 Repetition, even weight and other simple codes. We begin with some
easy examples of codes.
(2.3.1) The [n, 0, n] zero code of length n contains just the codeword
00 ... 0.
(2.3.2) The [n,n,l1 universe code F; is the dual of (2.3.0.
(2.3.3) The [n, 1, n] repetition code contains all codewords a a ... a, a E Fq'
(2.3.4) The [n, n -1,2] zero-sum code contains all vectors such that
~ Cj = 0; it is the dual of (2.3.3). When q = 2 this is called the even
weight code, sometimes denoted by tEn, since it consists of all binary
vectors containing an even number of I's.
2.4 Cyclic codes. A code is cyclic if whenever COCI ... Cn-I is a codeword so
is Cn-I COCI'" Cn -2' Unless stated otherwise a cyclic code is assumed to be
linear.
Let q = po where p is prime, and let C be an [n, k, d] cyclic code over
Fq • It is convenient to represent a codeword C = COCI"'Cn-1 E C by the
polynomial c(x) = Co + CIX + ... + Cn-I x n- I in the ring Rn(x) of
polynomials modulo xn - 1 with coefficients from F q • Then xc(x)
represents a cyclic shift of c, and so a linear cyclic code is represented by
an ideal in Rn (x) [Mac6, Chap. 7]. This can be generated by a single
polynomial g (x), a generator polynomial for the code. It is easily seen
that g (x) divides xn - lover F q and that the dimension of C is
k = n - deg g (x ).
Examples. For the universe code g(x) = 1, for the zero sum code
g(x) = x - I, and for the repetition code g(x) = I + x + ... + xn-I.
(2.4.0 The [7, 4, 3] Hamming code :Yt, is the binary cyclic code of
length 7 with generator polynomial g (x) = 1 + x + x 3 ; it has generator
matrix
80 Chapter 3
1 0 100 0
o1 1 0 1 0 0
(55)
o0 1 0 1 o '
000 0
where the rows correspond to g (x), xg (x), etc. ;K., has weight distribution
Ao" 1, A3 = A4 = 7, A7 = 1, which we abbreviate to
0' 37 47 7' .
xn - 1 =
n-'
II (x-a i ).
i-O
for some set K !:;;; {O, 1, ... , n -1 }, where since g (x) divides xn - lover
F q , i E K implies q i E K [Mac6, Chap. 71. The a i for i E K are called
the zeros of the code. There are good lower bounds on the minimal
Codes, Designs and Groups 81
distance of a cyclic code in terms of its zeros - see van Lint and Wilson
[Linl3l.
(2.4.3) For example, the binary Hamming code .1f" with parameters
n = 2m - I, k = n - m, d = 3 is obtained by taking K =
{ 1,2,4, ... ,2m - 1 }, so that g(x) is the minimal polynomial of o'.
(2.4.4) By appending a zero-sum check digit we obtain the extended
Hamming code .Yt;m with parameters [2 m, 2m - m -I, 41.
2.5 BC" and Reed-Solomon codes. The Bose-Chaudhuri-Hocquenghem
(BCH) code of length n and designed distance dover Fq is the cyclic code
whose generator polynomial g(x) has roots exactly a, 0'2, 0'3, . . . ,O'd - 1
and their conjugates [Ber4], [Linll], [Mac6, Chaps. 7-9], [Pet3]. The
actual minimal distance between codewords is at least the designed
distance and may exceed it.
BCH codes of length n = qm - I are called primitive. For example
primitive binary BCH codes of length n = 2m - I and designed distance 3
are Hamming codes.
BCH codes over Fq of length n = q - I are usually called Reed-
Solomon codes; they were the first to be discovered and are of great
practical and theoretical importance [Bla2], [Mac6, Chap. 10], [Reell
The minimal distance of a Reed-Solomon code is equal to its designed
distance. Thus a Reed-Solomon code over Fq with parameters
[n = q - I, k, d = n - k + 11 has generator polynomial of the form
g(x) = (x -O' b ) (x _O'b+l) ... (x _O'b +d - 2) , (59)
[~ ~ _ ~ ~], (60)
weight enumerator
82 Chapter 3
0 0 1
-
0 1 0 w w (63)
0 0 -
w w
0 0 w w
1 0 w w (64)
[i 0 w w
Using the definition (63), the 64 hexacodewords are obtained from the five
words
-
01 01 ww
-
ww ww ww
- -
00 11 11 (65)
11 ww ww
00 00 00
by freely permuting the three pairs, reversing any even number of pairs,
and multiplying by any power of w. The five words have 36, 12, 9, 6, 1
images respectively. The Hamming weight enumerator of C(J6 is
(66)
and Aut(C(J6) = 3.A6, where An is the alternating group of order Vzn!. (By
making use of the field automorphism that interchanges w with wwe obtain
the slightly larger group 3.S 6J This code is the basis for the MOG
construction of the Leech lattice - see §11 of Chap. 4 and Chap. 11.
2.6 Justesen codes. For large n, BCH codes are weak: for any fixed rate
R, the ratio din -- 0 as n -- 00. In contrast, Justesen codes are an
explicit family of binary linear codes for which both R and din are
bounded away from zero as n increases. We sketch their construction;
further details can be found in [Jusl], [Mac6, Chap. 10]. The starting
point is a Reed-Solomon code Cover Fq' q = 2m , with length
N = 2m - 1, dimension K and minimal distance D = N - K + 1. Let a
be a primitive element of Fq • If c = (cOCI ... CN-I), Ci E Fq , is an arbitrary
codeword of C, let C be the vector
I
(67)
Codes, Designs and Groups 83
for 0 < R < V2. Justesen codes of higher rate may be obtained by
deleting the appropriate number of coordinates from c".
Justesen's construction has been generalized by Weldon [Weill and
Sugiyama et at. [Sugll-[Sug31 to yield codes with higher rates and
minimal distances.
2.7 Reed-Muller codes. Let the binary weight W(j) of a non-negative
integer i be the number of ones in the binary expansion of i. For
1 ~ r ~ m - 2, the rth order binary punctured Reed-Muller code of
length n = 2m - 1 is the cyclic code whose generator polynomial has as
roots those a i such that 1 ~ i ~ 2m - 2 and 1 ~ W(j) ~ m - r - 1.
The rth order Reed-Muller (RM) code of length 2m is formed by
appending a zero-sum check digit to the rth order punctured Reed-Muller
code, for 1 ~ r ~ m - 2. An rth order RM code has parameters
r
[n = 2m , k = ~ (7) , d = 2 m -r I. (69)
i-O
The Oth, (m -l)th and mth order RM codes are the repetition, even-
weight and universe codes respectively. The (m - 2hh order RM codes are
extended Hamming codes. The rth and (m -r -l)th order RM codes are
duals, for all r. Thus ~ is a first-order Reed-Muller code.
Reed-Muller codes may also be defined in terms of Boolean functions
- see for example [Mac6, Chap. 131. Quite a lot is known about the
weight distributions of RM codes; for example the number of codewords of
minimal weight d = 2 m - r is
m-r-l 2m - i -1
Ad = 2" II 2m - r- i _1
(70)
i-O
It is clear from the definitions that BCH and RM codes are "nested".
More precisely, the BCH code of designed distance d is contained in that
of designed distance d - 1, and the rth order RM code is contained in the
(r + I)th order RM code. The rth order RM code is a subcode of the code
obtained by appending a zero-sum check digit to the BCH code of designed
distance 2m - r - 1.
2.8 Quadratic residue codes. Let p, n be primes such that p is a square
modulo n. For p = 2, the most important case, this means that n is a
prime of the form 8m ± 1. The quadratic residue code of length n over
Fp is the cyclic code whose generator polynomial has roots { c/ : i ¢ 0 is a
square modulo n } ([LinlI], [Mac6, Chap. 16]; see also [Le05], [Le06]).
In other words the roots are (Xi, where i is a quadratic residue modulo n.
The dimension of this code is (n + 1) /2. The extended quadratic residue
code is obtained by appending a zero-sum check digit. If n is of the form
4a - 1 then the extended code is self-dual. In particular, extended binary
quadratic residue codes of length 8m are self-dual Type II codes.
For example when q = 2, n = 7 we obtain the Hamming codes :Yt; and
.tfs again.
(2.8.I) The [23, 12, 7] binary Golay code rtl23 is the quadratic residue
code of length 23.
(2.8.2) The [24, 12, 8] (extended) Golay code rtl24 is obtained by
appending a zero-sum check digit to rtl23 . One of many possible generator
matrices is shown in Fig. 3.4. rtl24 has weight distribution
01875912257616759 24 1, (7 I)
o 1 2 ~ 4 5 6 7 8 9 10
1 1 0 1 0 0 0 1 1 1 0 1 1
1 1 1 0 1 0 0 0 1 1 1 0 1
1 0 1 1 0 1 0 o 0 1 1 1 1
1 1 0 1 1 0 1 0 0 0 1 1 1
1 1 1 0 1 1 0 1 o 0 o 1 1
1 1 1 1 0 1 1 0 1 0 0 0 1
1 0 1 1 1 0 1 1 0 1 o 0 1
1 o 0 1 1 1 0 1 1 0 1 0 1
1 0 o 0 1 1 1 0 1 1 0 1 1
1 1 0 0 0 1 1 1 0 1 1 0 1
1 0 1 0 0 0 1 1 1 0 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 0
Figure 3.4. A generator matrix for the binary Golay code rtl24 . Blank
entries are zero. The pattern of O's and 1's in the right-hand half is
defined by the quadratic residues modulo II.
Codes, Designs and Groups 85
The automorphism group of rt'12 is 2. M 12. The Golay codes are studied in
more detail in Chaps. 10 and 11. See also [Goll], [GoI2], [Mac6,
Chap. 201.
(2.8.6) When q = 3 and n = 23 or 47 we obtain [24, 12, 9] and [48, 24,
15] codes. The c.w.e. of the latter is
~ A ijk Xi yj zk ,
i+j+k-48
where the Aijk for i ~ j ~ k are given in Table 3.2. For the [24, 12, 9]
code see [Mal21. For later use we remark that the codewords of maximal
weight in these [12, 6, 6], [24, 12,9] and [48, 24, 15] ternary codes consist
exactly of the rows of a Hadamard matrix and its negative (cf. §2.13).
2.9 Perfect codes. A perfect code is defined by the condition that its
packing radius is equal to its covering radius. The packing radius of an
(n, M, d) code Cover Fq is p = [(d - 1) /21, and C is perfect if and only if
the Hamming spheres of radius p around the codewords are simultaneously
a packing and a covering of F;. (There is no connection with the concept
of a perfect quadratic form [Cas3, p. 281],)
Perfect codes were essentially classified by Tietavainen and van Lint
(see [Linll], [Mac6, Chap. 6]). The list is as follows.
86 Chapter 3
(i) Certain trivial codes (a code with one codeword, the universe code, or a
binary repetition code of odd length).
(ij) Hamming codes, i.e. linear codes with p = lover any field Fq , with
parameters n = (qm - I)/(q - I), k = n - m and d = 3, for m ~ 2.
(iii) Nonlinear codes with the same parameters as Hamming codes (these
codes have not been completely enumerated).
(iv) The binary [23, 12,7] Golay code rtf23 and the ternary [11, 6, 5]
Golay code rtf ll .
Table 3.2. Complete weight enumerator for both the quadratic residue
and Pless [48, 24, 151 ternary codes.
Number
A ijk i j k of terms
1 48 0 0 3
17296 33 12 3 6
190256 33 9 6 6
190256 30 15 3 6
4280760 30 12 6 6
11225104 30 9 9 3
951280 27 18 3 6
38621968 27 15 6 6
209281600 27 12 9 6
94 24 24 0 3
2092816 24 21 3 6
138220984 24 18 6 6
1343397616 24 15 9 6
2777932180 24 12 12 3
210423136 21 21 6 3
3333094864 21 18 9 6
12362073856 21 IS 12 6
20145351688 18 18 12 3
36133419520 18 15 15 3
2.10 The Pless double circulant codes. Pless ([Ple91, [Plell], [Bla7],
[Bla8], [HoI], [Mac6, Chap. 16] [MaI2]) has constructed a [2p + 2, P + 1]
ternary code S2p+2 whenever p is a prime == - 1 (modulo 6). Let
B = (bij) be a (p + 1) x (p + 1) matrix with rows and columns labeled 00,
0, 1, ... , P -1, where
b"""" = 0, b""i = I, hi; = 0,
hi"" = 1 if p == 1 (mod 4), hie<> = -1 if p == -1 (mod 4),
Codes, Designs and Groups 87
Then S 2p+2 has generator matrix [J B). For example the generator matrix
for p = 5 is shown in (73), and S \2 coincides with the Golay code C6'12'
The next five examples are [24, 12, 9], [36, 18, 12], [48, 24, 15], [60, 30,
18] and [84, 42, ~ 211 codes. The c.w.e. of S48 is given in Table 3.2. The
c. w.e.'s of S 24, S 36 and S 60 are given in [Mal2). S 24 and S 48 have the
same c.w.e.'s as the corresponding quadratic residue codes but different
automorphism groups.
The following properties of these codes will be used later. (j) S 2p+2 is a
self-dual (Type III) code containing the all-ones vector. (ii) The numbers
of -1 's, O's or +1's in any codeword are all multiples of 3. (iii) The
codewords of maximal weight contain among them the rows of a
Hadamard matrix and its negative (cf. §2.13), and for S 12, S 24 and S 48
these are the only codewords of maximal weight. (iv) For S\2, S24 and S48
the codewords containing only O's and +1's are of the types on, 1nand
on/21 n/2.
2.11 Goppa codes and codes from algebraic curves. In recent years it has
been shown that very good codes may be obtained from algebraic cun"~s,
although we shall not make use of these codes in this book. See for
example [GopI]-[GopS], [Hir2], UhaI], [Kat2], [Lac1], [Len2], [Lit4],
[ManI], [Mor71, [Ser3], [Tsfl], [Tsf2], [Vlal1-[Vla3], [Zin3].
2.12 Nonlinear codes. Many nonlinear codes are known which contain
more codewords than the best linear codes of the same length and minimal
distance. Some examples are:
(j) Codes obtained froIp Hadamard (§2.13) or conference matrices [Ma~6,
pp. 44, 55], [SI018].
(ii) Nonlinear single-error-correcting codes, such as Golay's (9, 20, 4)
code, Best's (10, 40, 4) code and Julin's (12, 144, 4) code. For these and
other single-error-correcting codes see Chap. 5, [BesI], [Go12], Dull],
[KatI], [LitI], [Mac6, Chap. 2], [RomI], [SI020).
(iii) The (16, 256, 6) Nordstrom-Robinson code [Mac6, p.73], [Norl],
[Seml1, and the Kerdock and Preparata codes and their generalizations
[Kan4], [KerI], [Mac6, Chap. 15], [Prel1.
2.13 Hadamard matrices. A Hadamard matrix H of order n is an n x n
matrix of +1's and -1 's such that
H H lr = nI. (76)
4, although this has not been proved. A large number of constructions are
known, and the smallest order for which a Hadamard matrix has not yet
been constructed is (in 1987) 428. Connections with coding theory are
described in [Mac6, Chap. 2, §3]. For this purpose one often changes H to
a binary matrix by replacing + l's by O's and -I's by l's. For further
information see [Hall ]-[Ha13], [Har8], [HedlJ, [lt02], [LeolJ, [LevI],
[Linl0], [LonlJ, [Lon2], [Mac6], [SawlJ, [Toni], [TurlJ, [Wa12].
Aj=A [ t - i
V - i) / [kt -- ii)'
(78)
Given t, k and v one wishes to find a design with the smallest A, i.e.
with the smallest number of blocks. Of course a necessary condition for a
design to exist is that the right-hand sides of (77) and (78) are integers.
In some cases these conditions are also sufficient (e.g. for Steiner systems
S (2, 3, v), S (2, 4, v), S (2, 5, v) and S (3,4, v», but not always. In general
the precise conditions under which t -designs exist are not known. For
further information about t-designs see [Ass2]-[Ass4], [Cam2], [Ha13],
Codes, Designs and Groups 89
[Han I], [Han2], [Hug2], [Hug3], Dacl1, [LanS], [Lin3], [Mac6, Chap. 2],
[Ragl1, [Ton4], [WiIl8], [Wi1l9].
Many t -designs may be constructed by taking the blocks to be the
codewords of a particular weight, often the minimal weight, in a good
binary error-correcting code (see especially the Assmus-Mattson theorem,
Theorem 22 of Chap. 7). Conversely, good codes can sometimes be
constructed as the linear span of the blocks of a t -design. We may also
obtain t-designs from non binary codes by taking the blocks to be the
locations of the nonzero components of the codewords of a particular
Hamming weight; i.e. the blocks are the distinct supports of the codewords
of a particular weight. In the nonbinary case it is much harder to recover
the code from the design.
Examples. (i) The seven codewords of weight 3 in the Hamming code :Yt,
form a Steiner system 8 (2, 3, 7), and the 14 codewords of weight 4 in .Yes
form an 8(3,4,8).
(iO More generally the codewords of weight 3 in any Hamming code .1f",
n = 2m - I, form an 8 (2, 3, 2m - 1), and the codewords of weight 4 in any
extended Hamming code of length 2m form an 8(3,4,2 m ).
(iii) The supports of the codewords of weight 5 in the ternary Golay code
rc 11 form an 8 (4, 5,1 1), and the supports of the words of weight 6 in rc 12
form an 8 (5, 6,12). The 132 blocks of this design are called hexads (see
Chap. 11).
(iv) The codewords of weight 7 in the binary Golay code rc 23 form an
8 (4,7,23), and the codewords of weight 8 in rc 24 form an 8 (5, 8, 24).
These 759 blocks (or the corresponding codewords) are called octads (see
Chap. 11).
Many other examples will be found in the references cited above. Until
recently t = 5 was the largest t for which a t-design was known ([Ass3],
[Denl1, [Mi14], [Wit2], [Wit3]), but in 1983 Magliveras and Leavitt
constructed 6-designs [Magl1, [Mag2], and Teirlinck [Teil1 has now
shown that t-designs exist for all t.
f f(~)dw(~) =
On
I~I ~
X EX
f(x) (81)
too much of a digression to explain why these are called t -designs - see
[Delli], [DeI16J.)
Many examples of spherical t -designs may be found by using the
vectors of a particular norm, often the minimal norm, in a good lattice
packing. For example the 240 minimal vectors in the E8 lattice (when re-
scaled so as to lie on n 8) form a spherical 7-design, and the 196560
minimal vectors in the Leech lattice form a spherical II-design. The
appropriate value of t for such designs may sometimes be determined by
using theorems of Sobolev (see §4.2) or Venkov (see Chap. 7, §7).
Given nand t one wishes to find a spherical t -design with the smallest
number of points. Delsarte, Goethals and Seidel [Del161 show that the
number of points satisfies
Ix I ~ 2[
n
n+ _s -I I) ' for t = 2s + I. (S3)
(cf. Eq. (22) of Chap. I). This implies U MBM tr A-I, where A is the
=
Gram matrix. On the other hand the set of integral matrices U for which
Codes, Designs and Groups 91
The interest of Coo lies in its connection with the classification of finite
groups. Any finite group can be built up out of certain special groups
called simple groups, and the classification of all finite simple groups is a
project that was completed in 1982 after occupying the attention of a great
many mathematicians for over fifty years (see for example [Gor2]-[Gor5]).
When Coo was discovered in 1968 it produced three new simple groups
(Co), CO 2 and C0 3 - see [Con2], [Con3] and Chap. 10). Furthermore
the largest of the "sporadic" simple groups (and one of the last to be
found), the Friendly Giant or Fischer-Griess "Monster" simple group, of
order
808017424794512875886459904961710757005754368000000000
and so preserves their sum 4(~ f + ~ 1 ~2 + ~D, which is a quadratic form for
the hexagonal lattice (Eq. (25) of Chap. 2). In this example the resulting
lattice is actually invariant under a larger group than we started with (the
full group has order 12, as we saw in the previous section). The study of
the integral representations of a given group G is to a large extent the
study of lattices invariant under that group. (See [BrolOl-[Bro 131, [Biilll,
[Con42l, [Crall, [Cra21, [DadIl, [FeiIl, [GudIl, [GusIl, [HemIl, [Plell-
[PleSl, [Rei2l-[Rei41, [RoglOl, [Shull, [Shu2l, [Th03!.)
(ij) The construction of codes from permutation representations.
Similarly, given a representation of group elements by permutations, we
can work modulo 2 and obtain a representation of G on a vector space V
over the field of order 2. The invariant subspaces (the subs paces of V
taken into themselves by every group element) are then all the binary
codes C for which G is a subgroup of Aut(C). Similar methods produce
codes over arbitrary fields. This technique has been used in [BroOl-[Br021,
[CaI9l, [KnaIl, [ParIl. Important information about these codes can be
obtained from the theory of modular representations of groups.
Codes, Designs and Groups 93
Calderbank and Wales [Ca19] used this idea to construct a binary code of
length 176 and dimension 22 whose automorphism group is the Higman-
Sims group. Brooke [BroO]-[Br02] has found all binary codes obtainable in
this way from the primitive permutation representations of many
interesting groups. See also [Kna 11. [Phe 11.
Gii) The construction of spherical codes and designs from orthogonal
representations. Given a representation of group elements by n x n
orthogonal matrices B, we may construct a spherical code X c n n by
choosing an initial point Xo E n n and setting
the orbit of Xo. These codes are sometimes called group codes, and have
been investigated in [Bill], [Bil3], [Bla4], [Bla6], [Bla9], [Dow11-[Dow3],
[Ing11, [Kar3], [Sle3], [Sle4].
There is a beautiful connection between these codes and invariant
theory, first discovered by Sobolev. Let G be a finite group of n x n real
or complex matrices B. The elements of G act on polynomials
f(x) = f(Xh ... ,xn ) by B 0 f(x) = f(Bx l ' ) . Polynomials for which
f (x) = f (Ex I') for all BEG are said to be invariant under G, and the
set of all invariant polynomials forms a ring RG.
Now suppose G is a group of real orthogonal matrices. Of course the
squared length cp (x) = x f + ... + x; is invariant under G. Sobolev
showed that if the degree of the first invariant that is not a polynomial in
cp(x) is t + 1, then every orbit under G is a spherical t -design (see [Sob2]
and the other references on spherical t-designs given at the end of §3.2).
Examples. The automorphism group of the E8 lattice, namely the Weyl
group of type E 8, is a reflection group (Chap. 4, §2). The ring of
invariants RG has a basis consisting of homogeneous polynomials of
degrees
2,8, 12, 14, 18,20,24,30, (86)
1. Introduction
In this chapter we introduce a number of important lattices that will be
used throughout the book, namely zn (n ~ 1), An (n ~ 1), Dn (n ~ 3), E 6,
E 7 , E 8, K 12 , A 16, A24 and their duals, and give a summary of the basic
properties of each lattice. Proofs of most of these results will be given in
later chapters. Some of the reasons for the importance of these lattices can
be found in Table 1.1 of Chap. 1: they include many of the best packings,
coverings and quantizers, as well as the lattices with the highest kissing
numbers, in dimensions up to 24. It is likely that they will also be good
candidates for the solution of other problems the reader may have in mind
in these dimensions.
The "root lattices" zn, An, D n , En are treated first, in §§5-8. The
terminology arises because these lattices are generated by the root systems
of certain Lie algebras, although we shall say very little about this
connection (cf. [BouI], [HumI]). These lattices are also closely related to
reflection groups, as we discuss in §2. Another reason the lattices Zn, An,
Dn , En are the first to arise in many investigations is that any integral
lattice generated by vectors of norms 1 and 2 is a direct sum of these
lattices (Witt's theorem - see §3). There is no corresponding theory for
Certain Important Lattices and Their Properties 95
larger norms. "Gluing theory" (§3) describes how component lattices may
be combined to produce lattices in higher dimensions.
The remaining lattices treated in this chapter (in §§9-11) are K I2 , AI6
and A 24, all of which occur inside the Leech lattice A 24 • In fact Z i;; AI>
A 2, A3 i;; D 3 , D 4 , D s, E 6 , E 7 , E s, AI6 and A24 are all laminated lattices
(see Eq. (25) of Chap. 1 and Chap. 6), and thus are found inside A 24 .
Two important lattices not included in this chapter are the 48-
dimensional self-dual lattices P4Sp and P 4Sq • A summary of their
properties will be found in Example 9 of Chap. 7.
The theta series of a lattice (§2.3 of Chap. 2) tells how many points
there are at each distance from the origin, i.e. gives the number of points
in each spherical layer or shell. The theta series of the lattices in this book
can be expressed in terms of simpler functions such as the Jacobi theta
series 8 2, 8 3 and 84 • These are defined in §4 together with various other
terms.
We have included tables of the first 50 or so theta coefficients of most
of these lattices. Such tables are useful in studying the lattices,
investigating the connections with number theory (§2.3 of Chap. 2), and
because configurations of lattice points often form excellent codes (§2.3 of
Chap. I, §1 of Chap. 3). Individual shells form spherical or constant
energy codes, while the set of lattice points lying inside or on a shell forms
a bounded energy code or spherical cluster.
We also give brief descriptions of the Voronoi cells (or nearest neighbor
regions) around the lattice points (§1.2 of Chap. 2); further information
will be given in Chap. 21. Although much of the material in this chapter
may be found elsewhere (for example [Boul1, [Con271, [Con28], [Con37],
[Cox20], [Intl1, [Nie2], [SI012], [SI019], [Te02], [Te03]), some of the
theta series and tables are published here for the first time. (Some related
tables are given in [Fral1, [Mit5], [New21, [Pry1].) Further information
about the packings in two and three dimensions (including more extensive
tables, both for the packings given here and other translates, plus tables of
the vectors in the first few layers) will be found in [SI017], [SI019], [Te02],
[Te03].
where 7f /Pij is the angle between the ith and jth walls. A celebrated
theorem of Coxeter [Cox4], [Cox28, §9.3] asserts that every finite group
with a presentation of this form is a reflection group.
The classification of the finite reflection groups has a complicated
history [Kan31. The elegant complete enumeration of the finite reflection
groups in terms of diagrams is due to Coxeter [Cox2J, [Cox3), [Cox20J .
However Mitchell [Mit! ]-[Mit4J had already solved an essentially harder
T HE LIN ES
o o I i i )
= 0 - - - - <0)-----"5_0
ABC
~
(p .. 2,3,4,6) ORDER 120 ORDER 14400
ORDER 2p
~
Zo
~-~
~ -~
Co Do ~--o--a::(::@
Do Do 4 ~-<>-c
~-~
G2 A2 CE)3>
F4 04 ~ ~
E6 E6 ~ ~
E7 E7 ~ ~
E8 E8 I~ ~
Since these differ only by scalar factors, the corresponding finite reflection
groups are identical. However the root lattices generated by these roots
(which are respectively zn and Dn) are different, as are the infinite groups
obtained by adjoining the translations in these lattices to the finite groups.
Similar phenomena occur in the cases G 2 and F 4 • It may be observed that
every root lattice is generated by its roots of shortest length. Thus our list
of lattices includes An, Dn and En, which are root lattices for which all
roots have the same length, but not B n, en, G 2 and F 4 • In fact the root
system for G 2 consists of the vectors of the first two norms (2 and 6) in the
root lattice A 2 • Similarly the root system for F4 consists of the first two
layers (of norms 2 and 4) in the root lattice D 4 .
For further information about reflection groups, crystallographic groups
(including the Bieberbach theorems) and related topics see [Aus11, [Bie11,
[BouI], [Bus11, [Cox20), [Cox28), [Del7], [Fri2), [Gr03], [Haz11, [Hi13),
[Hum11, [Oli2), [Vin11-[VinI5), [Zas11.
3. Gluing theory
Gluing theory is a way to describe the general n -dimensional integral
lattice L that has a sublattice which is a direct sum
L\ ED L2 ED ..• ED Lk
where gj (L) is the order of Gj (L). Also Go (L) is the direct product of the
groups Go(L). But in general G,(L) is only a subgroup of the direct
product of the G, (L) and therefore must be computed directly for each L.
Certain Important Lattices and Their Properties 101
2 10 -10 2] [ 22 _1 4 ]]
[2,11 = [ [ 12' U ; 0, 3 ' -3- , 0
which is the concatenation of the glue vectors Yl = [2] for A 11 and
Y2 = [11 for E 6. For this lattice Go is the product of the Weyl groups
G O(A 11 ) and GO(E 6 ); G l has order 2 (we can simultaneously negate Yl and
Y2); while G 2 is plainly trivial (no automorphism can interchange All with
E6)'
Witt's theorem [WitS], [KneS] tells us that, for any integral lattice L,
the sublattice generated by vectors of norms 1 and 2 is a direct sum of root
lattices. Thus the root lattices are particularly appropriate choices for the
L i . For a root lattice X n , Go is the Weyl group (the subgroup generated
by the reflections in the minimal vectors of Xn), and G l is the symmetry
group of the (ordinary) Coxeter-Dynkin diagram (the so-called graph
automorphism group). The symmetry group of the extended Coxeter-
Dynkin diagram has order gl d.
The outstanding application of gluing theory is provided by Niemeier's
list of even unimodular 24-dimensional lattices - see §3 of Chap. 16.
Many other examples are also given in Chaps. 16, 17. Gluing theory has
also proved useful in coding theory [Con21], [Con24], [Leo71, [Le08],
[Ple18}.
1 1 1 1 1 1
[ 4' 3 3]
[1] = 4' 4' 4' 4' 4' -4'-4
102 Chapter 4
m-- oo
(References are given at the end of this section.) For many purposes it is
enough to work with the simpler theta functions /II' (z), /1 2(Z), /I /Z), /1 4(z)
given by
m-- oo
(8)
m-- oo
= 1 + 2q + 2q4 + 2q 9 + (9)
Certain Important Lattices and Their Properties 103
(14)
and Jacobi's formula for the theta series of the dual lattice:
eA. (z) = (det A) 1/2 Ci /z)n/2 eA(-1 /Z).
One may regard Eq. (14)-(19), as well as the MacWilliams identity for
weight enumerators of codes (Eq. (50) of Chap. 3), as consequences of the
general version of the Poisson summation formula, which states that the
sum of a function over a linear space is equal to the sum of the Fourier
104 Chapter 4
transform of the function over the dual space [Dyml, Chap. 2, §11.3],
Ugul, p. 44], [Lool, p. 153], [Serl, Chap. VII, §6].
Other useful identities, arranged roughly by degree, and to show the
symmetry<° between 8 2, 8 3 and 84, are:
8 2 (z+1) = ..fi8iz), 8 3 (z+1) = 84 (z), 84 (z+1) = 83 (z), (20)
(24)
(25)
(26)
(27)
(28)
II O_q2m)(l+q2m-Ie2i~
00
II O_q2m)3,
00
II
00
II
00
in which the coefficients T (m) are called Ramanujan numbers. (The first
300 coefficients are given in [Leh21 See also Theorem 19 of Chap. 7.)
Some values of if;k(Z) (Eq. (11» can be expressed in terms of other
functions:
(§2.3 of Chap. 2). Tables of the numbers of points in the first 50 shells of
Z2, Z3 and their translates are given in Tables 4.2, 4.3. In Table 4.2 the
columns headed N<O), N(I), N(2) give respectively the numbers of points of
norms m, m + 1/4, 2m + 1/2 in Z2 with the origin of coordinates at the
Table 4.2. Numbers of points in the first shells of the square lattice Z2
with respect to various choices for the origin. See text for full
explanation.
0 I 2 4 17 8 0 0 34 8 4 8
I 4 4 8 18 4 4 8 35 0 0 0
2 4 2 4 19 0 0 0 36 4 8 16
3 0 4 8 20 8 2 4 37 8 4 8
4 4 4 8 21 0 8 16 38 0 4 8
5 8 0 0 22 0 4 8 39 0 4 8
6 0 6 12 23 0 0 0 40 8 0 0
7 0 4 8 24 0 4 8 41 8 0 0
8 4 0 0 25 12 4 8 42 0 6 12
9 4 4 8 26 8 0 0 43 0 4 8
10 8 4 8 27 0 4 8 44 0 0 0
II 0 4 8 28 0 4 8 45 8 4 8
12 0 2 4 29 8 4 8 46 0 8 16
13 8 4 8 30 0 2 4 47 0 0 0
14 0 0 0 31 0 8 16 48 0 4 8
15 0 4 8 32 4 0 0 49 4 4 8
16 4 8 16 33 0 0 0 50 12 0 0
Certain Important Lattices and Their Properties 107
Table 4.3. Numbers of points in the first shells of the cubic lattice Z3
with respect to various choices for the origin.
0 1 2 4 8 26 72 32 24 72
1 6 8 8 24 27 32 24 48 96
2 12 10 8 24 28 0 32 32 120
3 8 8 16 32 29 72 40 24 48
4 6 16 12 48 30 48 26 40 104
5 24 16 8 24 31 0 48 48 168
6 24 10 24 48 32 12 48 16 96
7 0 24 16 72 33 48 16 56 48
8 12 16 16 24 34 48 32 32 120
9 30 8 24 56 35 48 32 16 72
10 24 32 16 72 36 30 32 64 96
11 24 24 16 48 37 24 56 40 192
12 8 18 28 72 38 72 48 32 72
13 24 24 32 72 39 0 24 32 144
14 48 16 8 48 40 24 64 36 96
15 0 24 32 48 41 96 32 40 72
16 6 32 32 120 42 48 26 48 144
17 48 32 16 72 43 24 56 48 120
18 36 16 40 56 44 24 16 32 96
19 24 32 16 96 45 72 40 48 104
20 24 34 16 24 46 48 64 48 192
21 48 16 40 120 47 0 64 16 72
22 24 48 40 120 48 8 16 80 120
23 0 16 32 48 49 54 40 40 192
24 24 16 36 96 50 84 48 24 48
25 30 56 16 96 51 48 32 80 144
respectively. In Table 4.3 the columns headed N(O), N(l), N(2), N(3) give
respectively the numbers of points of norms m, m + 1/4, m + 1/2,
2m + 3/4 in Z3 with the origin of coordinates at the center of a lattice
point, an edge, a square face, a cube; or in other words the coefficients of
qm, qm+I/4, qm+I/2, q2m+3/4 in the expansion of
(46)
respectively.
108 Chapter 4
If we expand
r 4 (m) = 1 dim
24 ~ d ,
dim. d odd
if m is even,
(49)
Many similar, although more complicated, formulas are known for other
values of n. For further information see [Bat!], [Cas3], [Dic2], [Fri11,
[Gla11-[Gla6], [Gro2], [Har3]-[Har5], [MaI6], [Mor2], [Rad11, [Ran6],
[Smi5], [Vall]-[Va13].
If we define r4'(m) = r4(m)/8, then r4'(m) is multiplicative, i.e.
satisfies
r4'(lm) = r4'(l)r4'(m) whenever
This property simplifies the calculation of r 4' (m), for now it is enough to
know the values when m = pQ is a power of a prime. These are
r4'(2 Q ) =3, (a~1),
0 0 0 0 -I
1/2
R = 2a(n+l-a)
{ }
(54)
p n+1 '
where a is the integer part of (n + I) /2, a typical deep hole being the glue
vector [a I. The Voronoi cell is given in Chap. 21. Glue vectors:
Figure 4.5. Diagram for An showing integral basis for root lattice.
110 Chapter 4
m-- oo
where r= e 21ri / n .
6.2 The hexagonal lattice. We discuss the first few cases in more detail.
Of course A I ;;;; Z. A 2 is equivalent (or similar, see §1.4 of Chap. 1) to
the familiar hexagonal lattice shown in Fig. 1.3a of Chap. 1, so called
because the Voronoi cells are hexagons. The hexagonal lattice may be
spanned by the vectors (1,0) and (-1/2,.J3/2), and so an alternative
generator matrix to (52) is
o
M= -1 .J3 (58)
2 2
X,Y-- DO x,y--oo
',5-- 00
Certain Important Lattices and Their Properties III
q [r+t]\++tr = 82 (z)fh(3z).
r,s _-00
Therefore
and the first 50 nonzero terms are given in Table 4.4. If the origin is
moved midway between two lattice points (j.e. to the middle of an edge,
when each point is joined by edges to its six neighbors), the theta series is
where p ¢ 3 is a prime.
We shall use the name A2 only when the minimal norm is 2. From
(60) we have
(64)
6.3 The face-centered cubic lattice. Both A3 and D3 (§7) are equivalent to
the face-centered cubic lattice (or fcc), illustrated in every chemistry
textbook, and found in the pyramids of oranges on any fruit stand
(Fig. l.1). Fruiterers normally use square-based pyramids, but triangular-
based pyramids lead to geometrically equivalent packings. The simplest
definition is via D3: the fcc consists of the points (x,y, z), where x, y and
Z are integers with an even sum. A generator matrix is
-1 -1 0
M = 1 -1 0 (65)
o 1-1
det = 4, minimal norm = 2, T = 12, and the minimal vectors consist of all
permutations of (± 1, ± 1, 0), the twelve vertices of a regular
cuboctahedron. Also h = 4, the packing radius p = I/.Ji, the density
A = 'Tr/m = 0.7405 ... (o=T5/2) and the covering radius R = p.Ji = l.
The Voronoi cell is a rhombic dodecahedron (Fig. 2.2a and Chap. 21).
There are two kinds of holes in the fcc, corresponding to the two types of
vertices of the Voronoi cell: deep or octahedral holes, such as (0,0, 1),
surrounded by six lattice points, and shallow or tetrahedral holes, such as
(V2, V2, V2), surrounded by four lattice points. Glue vectors:
[0] = (0,0,0), [1] = (V2,V2,V2), [2] = (0,0,1), [3] = (V2,i/2,_i/2).
There is a complicated explicit formula for the coefficients [Dic2, Vol. II,
p. 263], [Gro21. The first 50 coefficients are given in Table 4.5. For the
translates we have:
0 fcc +[II(Z) = 1/2 (Jz(z)3 = 4q 3/4 + 12qll/4 + 12q19/4 + (67)
° fcc + [21 (z) = V2 (0 3(z )3 - 0 4(z ) 3)
= 6q + 8q 3 + 24q 5 + 30q9 + (68)
Table 4.5. Theta series of face-centered cubic lattice. The table gives
N(m) for m = lOr + s.
10r\s 0 2 4 6 8 10 12 14 16 18
0+ 1 12 6 24 12 24 8 48 6 36
20+ 24 24 24 72 0 48 12 48 30 72
40+ 24 48 24 48 8 84 24 96 48 24
60+ 0 96 6 96 48 48 36 120 24 48
80+ 24 48 48 120 24 120 0 96 24 108
100+ 30 48 72 72 32 144 0 96 72 72
however there are infinitely many nonlattice packings with the same
density and kissing number as the fcc. The simplest of these is the
hexagonal close-packing or hcp (§1.3 of Chap. 0, which is of considerable
importance in chemistry. The hcp is not itself a lattice, but may be defined
as the union of the lattice L spanned by the vectors (I, 0, 0), (1/2, ../3/2,0)
and (0,0, .JS/3), and the translate L + (I/2, l/m,.J2/3). Alternatively it
is the union of the lattice spanned by the vectors
r l/2(1,1,0), rl/2(1,0,0, r l/2(-4/3,-4/3,-4/3)
and its translate by r l/2(0, 1, O. A third definition is that the hcp consists
of the points
± (6i+l, 6j+l, 6k-2, 2../3(4£-1)), (72)
(Table 4.6). If the origin is moved to a deep hole the theta series is
0 hcp (hole) (z) = 8 2 (2z /3){8 2 (z) 1/;6 (3z) + 83(z )1/;3 (3z)}
= 6ql/2 + 6q 3/2 + 6qll/6 + 12 q 5/2 + ... . (74)
10r\s 0 1 2 3 4 5 6 7 8 9
0+ 1 0 0 12 0 0 6 0 2 18
10+ 0 12 6 0 0 12 0 12 6 6
20+ 12 24 6 0 0 12 0 12 0 24
30+ 12 12 2 12 6 24 6 12 0 24
40+ 0 12 0 6 24 12 12 24 6 12
50+ 0 24 0 24 18 12 12 24 0 12
Certain Important Lattices and Their Properties 115
n -1 -I -I
-I n -1 -1
A=
-I -I -I n
(cf. Eq. (49) of Chap. 8), with determinant (n+l)n-l, or the associated
quadratic form
n n
n ~ xl - ~ Xi Xj' (78)
i-I i""j
R = p"!FIr -J
~-3- =
n (n +1)
12(n+1) ,
(
80
)
the thickness is
n/2
e= II: .In+T [ n (n+ 2) ]
(82)
n n 12(n + 1) ,
and the Voronoi cells are permutohedra (see Chap. 21), with vertices all
permutations of (81). A;;;;; AI;;;; Z, A; ;;;; A 2 , and A; is the body-
centered cubic lattice (see §6.7). A;
is the best covering of Rn for n = 2,
116 Chapter 4
the best lattice covering for n ~ 5, and the best covering known for
n ~ 23 [Bamll-[Bam31, [De141, [Fewll, [Gamll, [Gam21, [Rys71,
[RysI21, [RysI31.
The typical lattice between An and An· is An[s 1, where s is any divisor
of n + 1. In Coxeter's notation [Coxl01 this is A~, where rs = n + 1. Its
theta series can be found by summing (57) for
e = 0, s, 2s • ...• n + 1 - s.
6.7 The body-centered cubic lattice. Both Ai and ni (§7) are equivalent
to the body-centered cubic lattice (or bcc), also familiar from chemistry.
The simplest definition is via n;: the bcc consists of the points (x,y, z)
where x, y and z are all even or all odd integers. A generator matrix is
2 0 0
M = 020 (83)
1 1
and the Voronoi cells are truncated octahedra (Fig.2.2b, Chap. 20.
Theta series:
(see Table 4.7). If the origin is moved to a hole the theta series is
o 0 0 -1
Figure 4.6. Diagram for D. showing integral basis for root lattice.
118 Chapter 4
-1 1-1
1 -1 -1
-1 -1
(89)
1 0 0 0
0 0 0
M'= (90)
0 0 0
V2 V2 'h 'h
The matrix
0 0
1 1 -1 0 0
T = 0'2 0
(91)
0 0 -1
Certain Important Lattices and Their Properties 119
maps the first version into the second. «90) also defines the dual lattice
D: - see §7.4 - showing that D 4 ;;;; D:.) Using the definition (86),
det = 4, minimal norm = 2, T = 24, minimal vectors = all permutations of
(± 1, ± 1,0,0), h = 10, p = 1/J2, d = 7r2/16 = 0.6169... (0 = 1/8),
R = pJ2 = 1, typical deep holes = (± '12, ± '12, ± '12, ± 'h) and
(0,0,0, ± 1), 0 = 7r2/4 = 2.4674... . The Voronoi cell is the regular 4-
dimensional polytope known as the 24-cell or {3,4,3} (Chap. 21, [Cox20,
§8.2]). The three nonzero cosets D4 + [i], i = 1,2,3, are equivalent.
Theta series
(cf. Eq. (89) of Chap. 7). D4 is the unique lattice with this density.
Using the second definition, (90), D 4 consists of the vectors (a, b, c, d)
with a, b, c, d all in Z or all in Z + V2, and therefore may be regarded as
the lattice of Hurwitz integral quaternions ([Cox8], [CoxI8, p. 25], [Har5,
§20.6], [Hurl]). This gives the lattice points the structure of a skew field.
As an Eisenstein lattice, D4 is generated by (2,0) and (1,0).
The first 50 coefficients of the theta series for D 4 (using the first
definition, Eq. (86» are shown in Table 4.8. These coefficients are given
explicitly by N(2m) = r4(2m), using the second formula in Eq. (49).
Also N(2m) is the number of integral quaternions of norm m, and
(24)-IN(2m) is a multiplicative function of m. In the notation of Schliifii
and Coxeter, D4 is the regular honeycomb {3,3,4,3} (see [Cox20, §7.8]).
7.3 The packing D;i. The covering radius of Dn increases with n, and
when n = 8 it is equal to the minimal distance between the lattice points.
So when n ~ 8 we can slide another copy of Dn in between the points of
D n , doubling the number of points (and the density) without reducing the
distance between them! Formally, we define
Dn+ = Dn U ([I]+D n). (93)
Generator matrix
1 0 o 0
o o 0
M= (95)
The standard integral basis (in the odd coordinate system) is marked on
the Coxeter-Dynkin diagram in Fig. 4.7. The extending node is (V2,-V2 7),
Certain Important Lattices and Their Properties 121
I 5 I 3
(2 '-2)
ES
Figure 4.7. Diagram for £8 showing integral basis for root lattice in the
odd coordinate system. A basis in the even coordinate system can be
obtained by changing the signs of any odd number of coordinates (for
example the last three coordinates).
and the extended diagram is given in the final column of Table 4.1. A
generator matrix (in the even coordinate system) is
2 0 0 0 0 0 0 0
-1 0 0 0 0 0 0
0 -1 0 0 0 0 0
0 0 -I 0 0 0 0
M= (99)
0 0 0 -1 0 0 o'
0 0 0 0 -1 0 0
0 0 0 0 0 -1 0
V2 'h 'h V2 1/2 1/2 V2 1/2
Eg is the unique lattice with this density and minimal norm [Vet2].
Automorphism group: go = 214 35 52 7 = 696729600, gl = 1. Go is the
Weyl group W(E g), generated On the even coordinate system) by all
permutations of 8 letters, all even sign changes, and the matrix
diag {H 4, H 4} (100)
together with 16 vectors (± 1,0 7). This definition is the best for showing
the identification of E 8 with the integral Cayley numbers or octaves
([Bli5], [Bli6], [ConI6, p. 85], [Cox91, [CoxI7], [CoxI8, Chap. 2]). Let
the coordinates be labeled 00, 0, I, 2 ..... 6 as in §2.4.2 of Chap. 3. The
real Cayley algebra is spanned by "numbers" i= = I, i o, i, ... " i6 with
the property that for the quadruples {a, b, c, d} = {oo, 1,2, 4} , ... ,
{00,0, I, 3} given in Eq. (56) of Chap. 3 (corresponding to the minimal
vectors of ,tfs that contain 00) the sets lia,ib,icoid} ;;;; {J,i,j,k} span a
quaternion subalgebra. Thus i,i 2 = i 4, i 2i, = -i 4, i,i 3 = i o, etc. The
integral Cayley numbers are the members of the E8 sublattice spanned by
vectors of the form (± V24, 04 ) for which the distinguished sets of four
coordinates are those obtained from Eq. (56) of Chap. 3 by interchanging
00 and 0, together with their complements. The 240 minimal vectors
become the 240 unit (or norm 1) Cayley numbers.
Alternatively, E 8 can also be identified with the ring of icosians, as
described is §2 of Chap. 8. Table 8.1 gives icosian names for the 240
minimal vectors. A quaternionic construction for E 8 is given in Eq. (77) of
Chap. 2. Theta series:
0 E8 (Z) = 1/2 (02(z)8 + 03(z)8 + 04(z)8)
= 02(2z)8 + 14 02(2z)40 3(2z)4 + 03(2z)8
(101)
m-O
(102)
where
O',(m) = ~ d' (103)
dim
=
~ N m' qm= 16q + 128q2 + 448 q 3 + 1024 q 4 + (104)
m-I
(105)
m N m (E 6) N m (E 7) Nm(Eg) m N m (E 6) N m (E 7) Nm(Es)
0 1 1 1 52 45900 470232 4747680
2 72 126 240 54 59040 505568 4905600
4 270 756 2160 56 46800 532800 6026880
6 720 2072 6720 58 75600 615384 5853600
8 936 4158 17520 60 51840 640080 7620480
10 2160 7560 30240 62 69264 701568 7150080
12 2214 11592 60480 64 73710 799092 8987760
14 3600 16704 82560 66 88560 809424 8951040
16 4590 24948 140400 68 62208 853776 10614240
18 6552 31878 181680 70 108000 1006992 10402560
20 5184 39816 272160 72 85176 1051974 13262640
22 10800 55944 319680 74 98640 1031688 12156960
24 9360 66584 490560 76 97740 1195992 14817600
26 12240 76104 527520 78 122400 1286208 14770560
28 13500 99792 743040 80 88128 1313928 17690400
30 17712 116928 846720 82 151200 1469664 16541280
32 14760 133182 1123440 84 110700 1474704 20805120
34 25920 160272 1179360 86 133200 1547784 19081920
36 19710 177660 1635120 88 140400 1797768 23336640
38 26064 205128 1646400 90 157680 1776600 22891680
40 28080 249480 2207520 92 114048 1809360 26282880
42 36000 265104 2311680 94 198720 2104704 24917760
44 25920 281736 2877120 96 147600 2130968 31456320
46 47520 350784 2920320 98 176472 2123982 28318320
48 37638 382536 3931200 100 162270 2382156 34022160
50 43272 390726 3780240
signs are required (in the even coordinate system). The group Go acts
transitively on the sets of vectors of norms 2, 4, 6, 10 and 12. (There are
two orbits of norm 8 vectors: such a vector mayor may not be twice a
lattice vector. The vectors of the second orbit, divided by 3, give the
shallow holes near 0.)
For further information about E 6 , E7 and E8 see later chapters and
[Boul], [CoxIO), [CoxI8), [Cox20), [Cox28), [Hazl1.
There are several possible coordinate systems. Using the even coordinate
system for E s and taking v = (1/2S) we obtain
E7= {(XI ....• Xs) E ES:XI + ... +X8=0}; (107)
using the odd coordinate system and taking v = (l/z 7 , - Yz) we obtain
E7 = {(Xl ..... Xs) E Es: ~Xi = 2xs}; (108)
Still another definition (see §2.5 of Chap. 5) leads to the generator matrix
20 00 00 0
02 00 00 0
00 20 00 0
M' = 1.. 00 02 00 0 (III)
2
11 10 10 0
o1 11 o1 0
00 11 10
1-1.1,0 6 )
Figure 4.8. Diagram for E 7 showing integral basis for root lattice in the
coordinate system (107).
Certain Important Lattices and Their Properties 125
For the definition via (107), (110) we have det = 2, minimal norm = 2,
T = 126, the minimal vectors consist of 56 of the form (1, -1,0 6) and 70 of
the form (V24,_V24), h = 18, p = 1/..fi, ~ = 1r 3/105 = 0.2953 ... (15=1/16),
R = p.J3 = .J31i, a typical deep hole being the glue vector [1], while the
Voronoi cell is given in Chap. 21. Glue vectors:
[0] = (0,0,0,0,0,0,0,0), of norm 0,
of norm 3/2 •
det = V2, minimal norm = 3/2, T = 56, minimal vectors = ± (1/46 ,_3/42),
P =.J378, R = pM =.J778, a typical deep hole being (7/8,(-1/8)7),
whose images are the vertices of the Voronoi cell (see [Wor2D. The theta
series is the sum of (112) and (113).
Again there are several possible coordinate systems. Using the even
coordinate system for Eg and taking V = < (1,0 6,1), (V2 g) > we obtain
E6 = {(x I • . . . • x g) E E g : x I + X g = X 2-1- .•. + X 6 = O}; (117)
126 Chapter 4
Figure 4.9. Diagram for E6 showing integral basis for root lattice in the
coordinate system (I 17).
while (in either coordinate system) V = < (0 5,1,-1,0), (06 ,1,-I) >
leads to
0 -I 0 0 0 0 0
0 0 -I 0 0 0 0
M 0 0 0 -I 1 0 0 0 (119)
0 0 0 0 -I 0 0
0 0 0 0 0 -1 0
1/2 1/2 1/2 V2 -V2 -V2 _1/2 _1/2
~ ~ ~l, (120)
1 I
where (J = w - W = R.
Using the definitions (117) and (119), we have det = 3, minimal norm
= 2, T = 72, the minimal vectors consist of 30 of the form (0; 1, -1,0 4 ; 0),
40 of the form ± (Vd'2 3 - V2 3. - V2) and 2 of the form ± (1. 06 • -1) h = 12
p = 1/.Ji, ~ = 7r 3/48J3 = 0~3729... (0= 1/8·)3), R = p'J8r3, ~ typicai
deep hole being the glue vector [11, and the Voronoi cell is given in
Chap. 21. Glue vectors:
[01 = (0;0,0,0,0,0,0;0), of norm 0,
[11 = (0; - 2IJ, - 2IJ, 1/3, IIJ, 1/3, IIJ; 0) , of norm 4/ 3 ,
[21 = -[I!, of norm 4/ 3 •
(Eq. (121) follows from definition (120), as shown in Chap. 7, and (122) is
derived from (121) via (18).)
The dual lattice is
E~ = E6 U ([1I+E 6) U ([2]+E 6) , (124)
0 -1 0 0 0 0 0
0 0 -1 0 0 0 0
M 0 0 0 -1 0 0 0 . (125)
0 0 0 0 -1 0 0
0 2/3 2/3 -If3 -1/3 -1/3 -1/3 0
V2 lf2 lf2 lf2 -lf2 -V2 -V2 -lf2
Using the definition (125), det - 1/3, minimal norm = 4/3, 'T = 54, the
minimal vectors consist of 30 of the form ± (0; (-2/3)2, (1/3)4;0) and 24
of the form ± (±1/2;(-1/6)5,5/6;+1/2), p = 1/.J3, and the covering
radius R = p..fi = .J273, corresponding to the deep hole
(0; 1, 1,1, - 1, -1, - 1; 0) /3, whose images are the vertices of the Voronoi
cell (see [Worl]). Theta series: Eq. (122).
(127)
(I 29)
o o o
(130)
m N(m) m N(m)
0 1 38 48009024
2 0 40 64049832
4 756 42 70709184
6 4032 44 102958128
8 20412 46 124782336
10 60480 48 142254252
12 139860 50 189423360
14 326592 52 237588120
16 652428 54 248250240
18 1020096 56 344391264
20 2000376 58 397510848
22 3132864 60 433936440
24 4445532 62 554879808
26 7185024 64 671393772
28 10747296 66 677557440
30 13148352 68 908374824
32 21003948 70 1018507392
34 27506304 72 1079894844
36 33724404
(Table 4.11). For further information see later chapters and [Con37],
[Con38], [Fei2], [Haml], [Har6], [Har7], [Lin6], [Lin7], [TodlJ, [Tod2].
4
2 2
2 0 2
o
2 0 0 2
2 0 0 0 2
2 0 0 0 0 2
2 0 0 0 0 0 2
_I 2 0 0 0 0 0 0 2
./22 0 0 0 0 0 0 0 2
2 0 0 0 0 0 0 0 o 2
2 0 0 0 0 0 0 0 002
I I I 0 I 0 I I 0 0 I
o I I 0 I 0 I I 0 0 I
001 I 0 I 0 I I 0 0 I
000 I o I 0 I I 0 0 I
I I I I I I I I I
m N(m) m N(m)
0 1 32 8593797600
2 0 34 11585617920
4 4320 36 19590534240
6 61440 38 25239859200
8 522720 40 40979580480
10 2211840 42 50877235200
12 8960640 44 79783021440
14 23224320 46 96134307840
16 67154400 48 146902369920
18 135168000 50 172337725440
20 319809600 52 256900127040
22 550195200 54 295487692800
24 1147643520 56 431969276160
26 1771683840 58 487058227200
28 3371915520 60 699846624000
30 4826603520 62 776820326400
Certain Important Lattices and Their Properties 131
e Aiz) = V2 {8 2 (2z) 16+8 3(2z) 16+8 4(2z) 16+ 308 2 (2z )88 3(2z )8}
This lattice was discovered by Leech in 1965 [Lee5]. We shall give several
constructions in this book. The following definition is probably the
simplest. We state it in three equivalent forms.
(i) The Leech lattice A24 is generated by all vectors of the form
(133)
where the + 3 may be in any position, and the upper signs are taken on a
"~-set", i.e. the set of coordinates where a codeword of the binary Golay
code ~24 is 1.
(ij) Equivalently, we label the coordinate positions 00, 0, 1, ... ,22 and let
Q denote the set of nonzero quadratic residues modulo 23. Then A24 is
spanned by the vectors
a (212,0 12), 23 vectors, supported on a translate
{ {oJ U Q} + i, 0 ~ i ~ 22,
a (- 3, 123 ), a single vector,
a (± 42,0 22 ), 2· 24· 23 vectors, (134)
2: Xi ==0(mod2), 2:Yi == 1 (mod 2). (135) are called the even vectors
and (136) the odd vectors. (See §4.4 of Chap. 5.)
Other constructions for the Leech lattice are given in §5.7 of Chap. 5
(from the [24,12,9] quadratic residue or Pless code over F 3); §6 of Chap. 6
(as a laminated lattice); Example 12 of Chap. 7 and §3.6 of Chap. 10 (as
a complex 12-dimensionallattice, using the [12, 6, 6] Golay code ~12 over
F 3); §2 of Chap. 8 (as a three-dimensional icosian lattice, an analog to the
Turyn construction of ~24); §3 of Chap. 8 (from Construction A f , a
generalized version of Construction A); §5 of Chap. 8 (McKay's
construction from a Hadamard matrix of order 12); §7.3b of Chap. 8
(Craig's construction as an ideal in the cyclotomic field Q(ehi/39»; §7.5 of
Chap. 8 (Thompson's construction from the cyclotomic field Q(ehi/23»;
Chap. 11 (the MOG definition - see below); Eq. (7) of Chap. 17 (from
D 24 ); Chap. 17 and §5 of Chap. 18 (as a neighboring lattice to A [4);
Chap. 24 (twenty-three constructions, one for each Niemeier latticeD;
Theorems 1, 2 and 3 of Chap. 26 (three constructions of the Leech lattice
as a Lorentzian lattice), and Theorem 1 of Chap. 27 (as the Coxeter
diagram of the automorphism group of the Lorentzian lattice 11 25 ,1)'
In a certain sense the construction given in §6 of Chap. 6 is the
simplest of all, since it states that the Leech lattice may be built up by
"induction", starting with the I-dimensional lattice of integers and each
time extending to a densest lattice in the next dimension. The lattices
constructed in this way can be seen in Fig. 6.1 of Chap. 6; in 24
dimensions one obtains the Leech lattice. This is a "no-input"
construction! Another is given in Chap. 27.
But for calculating with the Leech lattice it is best to use MOG
(Miracle Octad Generator) coordinates, which are arranged in a 4 x 6
rectangle. The MOG coordinates for ~-sets are obtained from the
codewords of the hexacode (§2.5.2 of Chap. 3) by replacing each digit by a
column of length 4 as shown in Fig. 4.11. The ~ -sets are obtained either
by giving each digit an odd interpretation in any way such that the top row
contains an odd number of points, or an even interpretation in any way
such that the top row contains an even number of points. The Leech
lattice is spanned by the vectors (± 28 ,0 (6 ), where the support is a ~-set
and there are an even number of minus signs, together with the vector
(-3,1 23 ). MOG arrays are extensively studied in Chap. 11.
o w w o w w
ODD EVEN
Figure 4.11. The two odd interpretations of a digit are the sets on the
left or their complements. Similarly the two even interpretations are the
sets on the right or their complements.
Certain Important Lattices and Their Properties 133
Figure 4.12. Generator matrix for the 24-dimensional Leech lattice A24
in standard MOG coordinates (the rows of the matrix are divided into six
blocks of 4, corresponding to the columns of the MOG, read downwards).
The generator matrix for A24 given in Fig. 4.12 has been chosen to be
compatible with the MOG coordinates. For A 24, det = 1, minimal norm
= 2, and kissing number T = 196560, the minimal vectors consist of
27 .759 = 97152 of the form 8- 1/2(± 28,0 16), where the positions of the
± 2's form one of the 759 codewords of weight 8 in f(j24 and there are an
even number of minus signs, 24· 212 = 98304 of the form (133), and
2· 24· 23 = 1104 of the form 8- 1/ 2(± 42,0 22 ). The vectors in the first
three layers are shown in Table 4.13, with the signs suppressed (see also
Table 4.l3. Vectors in the first three shells of the Leech lattice. A(n)i
indicates the Leech vectors of norm 2n (or type n) and shape i; the signs
have been suppressed.
§3.2 of Chap. 10). The first 15 layers are described on page 181 of
[ConI6l. The packing radius p = I, density 11 = 1r12/12! = 0.001930 ...
(0 = 1), covering radius R = .J2 p = .J2, there are 23 different types of
deep hole (Chap. 23), one of which is 8- 1/2(4,0 23 ) (this is an "octahedral"
hole, surrounded by 48 lattice points), and 284 types of shallow hole
(Chap. 25). The thickness 0 = (21r)12/12! = 7.9035 .... The Voronoi cell
has 16969680 faces, 196560 corresponding to the minimal vectors and
16773120 to those of the next layer (from [Con38l or Theorem 10 of
Chap. 21). A24 is the unique integral lattice of determinant I and minimal
norm 4 (Chap. 12). Its automorphism group is Coo (or '0), of order
2223 9 54 72 11' 13· 23 = 8315553613086720000 (137)
1 45
= g{02(z)8 + 0 3(z)8 +0 4(z )8)3 - 16 {02(Z )0 3(z)O 4(z)}8 (139)
1 69
= T{02(Z )24+0 3 (z )24+04(Z )24) - 16
{02(Z )0 3 (z)O 4(Z)}8 (140)
00
and 1l24(Z), T(n) are defined in (39), ~II (n) in (103). The first 50
coefficients N (m) are given in Table 4.14. The decompositions into prime
factors of the first 20 coefficients N (m) are given in [SI08, Table xl. The
coefficients grow rapidly, and
is a good approximation (see Eqs. (54), (56) of Chap. 2). If the origin is
shifted to a deep hole of octahedral (or A [4) type the theta series is
1 3
g{02(z)8 +0 3(Z)8 -0 4(Z )8]3 + 16{02(Z )0 3 (Z )0 4(z)}8 (J 44)
00
m N(m) m N(m)
0 1 52 348188700764268000
2 0 54 527108117540659200
4 196560 56 786767288036446080
6 16773120 58 1156841376897024000
8 398034000 60 1680521645295642240
10 4629381120 62 2409208986562560000
12 34417656000 64 3417887115322439760
14 187489935360 66 4792384230947389440
16 814879774800 68 6658492791534948000
18 2975551488000 70 9154704673132462080
20 9486551299680 72 12486419179545402000
22 27052945920000 74 16869989277755228160
24 70486236999360 76 22632233269428619200
26 169931095326720 78 30102943984468992000
28 384163586352000 80 39789443408903042400
30 820166620815360 82 52181704975196160000
32 1668890090322000 84 68053817735463006720
34 3249631112232960 86 88114798569141227520
36 6096882661243920 88 113523923563982568000
38 11045500816896000 90 145290076878792867840
40 19428439855275360 92 185116016465911440000
42 33213186220032000 94 234407918373703925760
44 55431591273414720 96 295640558277712240320
46 90344564568760320 98 370725724086681600000
48 144355739339448000 100 463209975930723119280
50 226066364540190720
with the convention that 0' II (x) and T(X) are 0 if x is not an integer.
Other references dealing with the Leech lattice are [Bayl], [Bro4), [Lep2),
[Lin6], [Lin8], [Mill], [Tit6], [Tit7], [VosIl. The "odd Leech lattice" 0 24
(Chap. 6, Appendix) was discovered by O'Connor and Pall in 1944
[O'Col).
5
Sphere Packing and
Error-Correcting Codes
John Leech and N. J. A. Sloane
1. Introduction
In this chapter we make systematic use of error-correcting codes to
construct dense sphere packings. By use of cross-sections we then obtain
packings in spaces of lower dimension, and by building up packings by
layers we obtain packings in spaces of higher dimension. The packings
constructed in this chapter include the densest packings presently known in
all dimensions up to 29, as well as a number of other interesting packings.
They are summarized in Tables 1.2, 1.3 and Fig. 1.5 of Chap. 1.
We begin by defining the coordinate array of a point in §1.1, and then
§2 describes Construction A, which is most effective in up to
15 dimensions. §3 describes Construction B, effective in dimensions 8 to
24. §4 digresses to deal with packings built up from layers, while §5 gives
some special constructions for dimensions 36, 40, 48 and 60. §6 deals with
Construction C, which generalizes A and B and is especially effective in
dimensions that are powers of 2. The constructions make use of the
material on error-correcting codes given in §2 of Chap. 3.
Packings built up by layers are considered further in Chap. 6, while
Chaps. 7 and 8 give additional properties and generalizations of
Constructions A, Band C. This chapter is a revised and updated version
of [Leel0).
Sphere Packing and Error-Correcting Codes 137
The number of rows is potentially infinite, but all rows after the first few
are identical.
2. Construction A
2.1 The construction. Let C be an (n,M,d) binary code. The following
construction specifies a set of centers for a sphere packing in Rn.
Construction A. x = (x h"" xn) is a center if and only if x is congruent
(modulo 2) to a codeword of C.
Thus a point x with integer coordinates is a center if and only if the l's
row of the coordinate array of x is in C. A lattice packing is obtained if
and only if C is a linear code. Construction A is a generalization of the
construction of A4 as given in [Lee4, §1.11, and is studied further in
Chaps. 7 and 8, where several generalizations are given.
2.2 Center density. On the unit cube at the origin,
{O ~ Xi ~ 1 : i = 1, ... ,n },
the centers are exactly the M codewords. All other centers are obtained
by adding even integers to any of the coordinates of a codeword. This
corresponds to shifting the unit cube by two in any direction. Thus all the
centers may be obtained by repeating a building block consisting of a
2 x 2x x 2 cube with the codewords marked on the vertices of the
1 x 1 x ... x 1 cube in one corner.
Each copy of the 2 x 2 x ... x 2 cube contributes M spheres of
radius p (say), so the center density obtained from Construction A is
(2)
138 Chapter 5
0 otr 1
[ (5)
o ~ .
The sums modulo 2 of pairs of rows of H 12 and the complements of such
sums form the 132 vectors of a Steiner system S(5, 6,12) (see [Lee41 for
example). Since no two of these vectors can overlap in more than four
places, they form a (]2, 132, 4) code, every codeword having weight six.
This code may be increased to a (]2, 144,4) nonlinear code by adding six
codewords of type 010 12 and six of type 0 2 110 , the six 12 and the six 02
being disjoint sets. Several different versions of this code are possible,
depending on the relationship between the positions of the 1's in the 12
"loose" codewords and the vectors of the Steiner system.
By shortening the (]2, 144, 4) code we obtain (] 1, 72, 4), (10, 38, 4)
and (9, 20, 4) codes. Codes equivalent to these four were first given by
Golay [Go121 and Julin Dull], and alternative constructions and
generalizations are given in [Litl], [Mac61, [Roml], [S10181, [S1020l.
Applying Construction A to the various versions of the (]2, 144, 4)
code we obtain non lattice packings in R12 with center density () = 144· r12
= r 8 . 32 = 0.03516 ... , which is less than that of K12 (§9 of Chap. 4), but
in the most favorable versions some spheres touch as many as 840 others,
as we now show. Let c be a codeword of weight 6. Any vector of weight 4
and length 12 is contained in exactly 8 vectors of weight 5, and therefore
in exactly 4 codewords of weight 6 (since any vector of weight 5 is
contained in a unique codeword of weight 6). So the number of codewords
of weight 6 that are at a Hamming distance of 4 from c is 3 [: 1 = 45.
If the 12 loose codewords are chosen so that there are three words
010 12 whose 1's coincide with pairs of 1's from c, and three words 0 2 110
whose O's coincide with pairs of O's from c, then there are an additional 6
codewords at a Hamming distance of 4 from c and A4(c) = 45 + 6 = 51.
Based on these codes we obtain packings in R12 with a maximal kissing
number of 2· 12 + 16·51 = 840 for those spheres whose centers are
congruent to c.
There are still several inequivalent versions of these packings,
depending on the choice of the remaining loose codewords, but they all
have the same maximal kissing number of 840, and are collectively called
P12a in Table 1.2.
140 Chapter 5
Other choices for the 12 codewords give packings with maximal kissing
number of 824 or 808. It can be shown that, regardless of the choice of
the 12 loose codewords, the average kissing number obtained is equal to
770 2/3. (This is true even for those packings where the maximal kissing
number is less than 840.)
For RlI we set XI2 = 1 in P 12a , and find the maximal kissing number to
be 566 in the most favorable cases, collectively called P lIa , but it can be
only 550 or 534 in other cases (if 010 I is altered to 011). Except in this
last case the average is 5197/9. (P lIa is studied further in [Vetil.)
For RIO, if we set Xli = XI2 = I in P l2a , where XII, Xl2 are a pair of
both 010 12 and 11°02, we obtain packings P lOb with () = r 8 • 32 and a
maximal kissing number of 500. If instead we set xl2 = I, xlO = 0 where
XIO, Xl2 is not a pair of either form, we obtain packings with () = r 9 ·19.
In the most favorable cases, called P lOa , the maximal kissing number is
372. The average kissing number is 353 91I9 for P lOa and 340 1/3 for P lOb •
For R9 we set XIO = 0, XII = Xl2 = I in P l2a and obtain packings P 9a
with () = 2-7 . 5 and a maximal kissing number of 306; the average kissing
number is 235 3/5.
An alternative derivation of P lOb may be given. The tetrads of a
Steiner system S (3, 4, 10) (see §3.1 of Chap. 3) form 30 codewords of
length 10, weight 4 and Hamming distance at least 4 apart. For example
the tetrads may be taken to be the cyclic permutations of 1110001000, of
1101100000 and of 1010100100. By including the zero codeword and five
codewords of weight 8, several different 00, 36, 4) codes are obtained.
Construction A then gives the packing P lOb .
Similarly, the packings P 9a , P lOa , P lla may be obtained by applying
Construction A to the (9, 20, 4), 00, 38, 4) and (11, 72, 4) codes. All
these are nonlattice packings.
A (10, 40, 4) code was found by Best [Bes1l; it consists of the cyclic
permutations of 1010000001, 1100101100, 0001010111 and 0111111010.
Although nonlinear, the weight distribution with respect to each codeword
is 0 1 422 6 12 85 . By applying Construction A a lO-dimensional nonlattice
packing P lOe is obtained with () = r 7 . 5, in which each sphere touches
2·10 + 16· 22 = 372 others.
Best [Besl], [Bes3] also found eleven different constant weight codes,
each consisting of 35 codewords of length II, weight 4 and distance 4; one
such code is shown in Fig. 5.1. By applying Construction A to anyone of
these codes an II-dimensional arrangement of spheres is obtained in which
some spheres touch 2· 11 + 16·35 = 582 others. These are collectively
denoted by P lIe in Table 1.2. The densities of these packings are quite
low.
2.7 Comparison of lattice and nonlattice packings. It is still an open
question whether there exists any nonlattice packing with density exceeding
that of the densest lattice packing in its dimension. But the non lattice
packings P lOe , P lIa and P l3a of §4.3 below have density greater than that
Sphere Packing and Error-Correcting Codes 141
3. Construction B
3.1 The construction. Let C be an (n, M, d) binary code with the
property that the weight of each codeword is even. A sphere packing in R n
is given by:
Construction B. x = (XI, .•. ,xn) is a center if and only if X is
congruent (modulo 2) to a codeword of C, and ~7-1 Xi is divisible by 4.
Thus a point X with integer coordinates is a center if and only if the l's
row of the coordinate array of x is a codeword c E C and the 2's row has
either even weight if the weight of c is divisible by 4, or odd weight if the
weight of c is divisible by 2 but not by 4. A lattice packing is obtained if
and only if C is a linear code. Construction B is a generalization of the
construction of Ag as given in [Lee4, §1.11, and will be studied further in
Chap. 7.
3.2 Center density and kissing numbers. The number of centers is half
that of Construction A, so 0 = M pnrn-I.
Let S be a sphere with center x, where x is congruent to a codeword c.
Candidates for centers closest to x are (a) the 2n (n - 1) centers of type
x + «± 2)2on-2), and (b) the 2d- 1Ad(c) centers congruent to the
codewords differing minimally from c. Therefore the kissing number of S
is
2d-1 Ad (c) if d < 8,
T(S) = 1 2n (n - 1) + 128Ag(c) if d = 8, (6)
2n (n - 1) if d > 8;
next. Since the layers are lattice packed, if one point of C is opposite to a
point of D, then so are all the points of C.
It may happen that D is more numerous than C, in which case several
inequivalent packings may be produced in Rn+l. These may be lattice or
nonlattice packings or both. Examples will be found below and in
succeeding sections. (So far we have not found an example where no such
lattice packing can be formed, but this does not seem impossible. Indeed,
there might even be a case where the deep holes fail to give either lattice
or nonlattice packings.)
For example let A be the square lattice Z2 in R2. Then C comprises
the vertices of the squares and D their centers. The layers are placed so
that the vertices of the squares in one layer are opposite to the centers of
the squares in the next. Since C and D are equally numerous, this
arrangement is unique, and the face-centered cubic lattice packing A3 in
R3 is obtained (§6.3 of Chap. 4).
where (CI, ... ,CIO) runs through the (10, 40, 4) code, and contain 80
points. It does not seem possible to extend this to a dense space packing.
In RI3 we take anyone of the packings P 12a and its translates by
multiples of the vector «Ih)12, ± 1), and obtain a family of nonlattice
packings collectively called P 13a • Any of these packings has (j = T S·3 2 and
a maximal kissing number of 840 + 2·144 + 2 = 1130, the last 2 being
caused by a sphere touching spheres two layers away. The average kissing
number is 1060 2/3.
Sphere Packing and Error-Correcting Codes 145
AI9 (again), A IS , AI7 and AI6 are obtained by equating to 0 the sum of
eight coordinates forming a Steiner octad and also any four, five, six or all
of them.
The [16, 5, 8] RM code occurs as a subcode of C€24, and we associate
the remaining 16 coordinates with coordinate positions of this subcode.
Any two intersecting octads of the [16, 5, 8] code split the coordinates into
four tetrads. A 15 , A 14, A\3 and AI2 are obtained by equating to 0 the sum
of the coordinates forming a tetrad and none, anyone, any two or all of
them. All, AIO and A9 are obtained from A\2 by equating any two, any
three or all four coordinates to each other in one of the remaining tetrads.
A9 (again) and As are obtained by equating to 0 any three or all four
coordinates in a tetrad.
A7, ... ,A4 are obtained as sections of As in the same way that AII, ... ,As
are obtained from A \2, defining any four coordinates of the eight to be a
tetrad. Finally, A 3, ... ,A I are obtained from A4 (calling the four
coordinates a tetrad) in the same way that A I5 , ... ,A\3 were obtained from
A 16·
The sequence A), ... ,A24 includes the densest known lattice packings in
R I, ... ,R 10 and R 14, ... ,R24. But in dimensions 11 to 13 the lattices K II, K \2,
K \3 of the Kn sequence are denser than An [Lee5], [Leel0]. These are
described in the next chapter. K\2 is the Coxeter-Todd lattice (§9 of
Chap. 4), with 0 = r 3 and T = 756. K II , K\2 and K\3 are the densest
known lattice packings in these dimensions, although P lla and P\3a are
denser nonlattice packings. Also the nonlattice packings P lOa, P lOe are
denser than A 10.
We remark that there is a close analogy between the packings D 3, ••• ,Ds
of §2.4 and the packings in RI9, ... ,R24 of §3.4, in that the first three are the
densest known, the last can be doubled in density, and the densest
intermediate packings can be derived either as sections of the doubled
packing or by building up in layers.
Table 5.1. Minimal vectors (x,y,z) in A40 • In the lines marked <*), one
entry ± 1 must be replaced by +3.
x y z Shape Number
5.3 Cross sections of A40 . A40 contains A24 as a section, and for
1 ~ n ~ 16 has a section A40 - n in R40 - n of center density 16 times that
of A24 - n • For instance in R36 there is a section A36 with {) = 2 and
T = 234456. A36 is obtained from A40 by equating to zero four coordinates
from a tetrad contained in one of the sets of 16. A32 is obtained by
equating to zero all coordinates from an octad contained in one of the sets
of 16, and has {) = 1 and T = 208320.
5.4 Packings based on ternary codes. Let C be an (n, M, d) ternary
code. By analogy with the constructions based on binary codes we obtain
sphere packings in Rn from the following constructions.
Construction A 3. x = (XI, . . . ,xn ) is a center if and only if X is
congruent (modulo 3) to a codeword of C.
Construction B3. In addition, ~7-1 Xi is divisible by 2.
From Construction A3 we obtain a packing of spheres for which
p = min {3/2, 1/2Jd}, {) = M pnrn, (7)
(9)
we have not found doublings of the packings P36p and P 60p , the technique
of §5.7 failing because of the existence of codewords of maximal weight
with odd numbers of each sign [MaI2]. (See Postscript, p. 156.)
In P 36p the centers closest to the origin are those of the type
«± 1) 120 24 ) and correspond to codewords of minimal weight, so
T = AI2 = 42840. In P 60p , T "" AI8 + 2·60·59 = 3908160.
5.6 Packings obtained from quadratic residue codes. As pointed out in
§§2.8, 2.10 of Chap. 3, there are [24, 12, 9] and [48, 24, 15] ternary
quadratic residue codes with the same weight distributions as the
corresponding Pless codes. Applying Construction B3, we obtain packings
h A24 and h P 48q. It will now be shown that these can be doubled in
density to give A24 in R24 and another lattice P 48q in R48.
5.7 Density doubling in R24 and R48. Any of the lattices h A24 , h P 48p and
h P 48q may be doubled in density, by adding a second copy which is a
translation of the first by (-2V2, (Y2)n-I).
To show this, we must verify that no point of the original lattice is
closer to (-2V2, (V2)n-l) than the origin. Every point of the original lattice
differs from this point by at least V2 in every coordinate. If any coordinates
are congruent to -1 (modulo 3) then at least three are, by §2.10 (ij) of
Chap. 3, and so at least three coordinates differ by 1 V2. On the other hand
if all coordinates are congruent to 0 or 1 (modulo 3), then by §2.10 (iv)
they are congruent to one of the types On, 1n or on/21 n/2. Since the sum is
even, at least one coordinate differs by 2 V2.
In R24 the doubled packing has center density 1 and so must be A24
(regardless of whether it came from the Pless code or the quadratic residue
code) since this lattice is unique (Chap. 12).
In R48 we obtain a lattice which we call P 48p by doubling that given by
the [48, 24, 15] Pless code, and one which we call P 48q from the [48, 24,
15] quadratic residue code. Both P 48p and P 48q have 0 ., r 24 . 324 . The
kissing numbers for P 48q and P 48p can be obtained from the weight
distribution given in Table 3.2. The centers closest to the origin are shown
in Table 5.3; their total is T = 52416000 (in agreement with the value
found in Eq. (57) of Chap. 2). The cross-sections of P 48p are investigated
in §2 of Chap. 6. The lattice P 48q was first found by Thompson [Th07]
Coordinates Number
(±3)2046 2·48·47
(+2) (± 1) 14033 15·415104
(± 1) 18 030 20167136
(+2V2) (±Y2)47 48·96
(±IY2)3(±Y2)45 4·6503296
150 Chapter 5
6. Construction C
6.1 The construction. Let Ci = (n,Mi,d), i = 0, 1. ... ,a, be a family
of codes with d i = 1" 4a - i , where I' = 1 or 2. A sphere packing in Rn is
given by:
Construction C. A point x with integer coordinates is a center if and only
if the i's row of the coordinate array of x is in Ci , for i = 0, 1, ... ,a.
This is a generalization of the constructions for Rn, n = 2m , given in
[Lee4, §1.6]. Construction C follows the trend of A and B in successively
imposing more restrictions on the coordinate array. In general a non lattice
packing is obtained. A modification of this construction (Construction D)
given in §8 of Chap. 8 always produces lattice packings provided only that
the codes Ci are linear and nested, i.e. satisfy Ci ~ CHI'
6.2 Distance between centers. If the first row in which two centers differ
°
is the i's row, then (i) if i > a their distance apart is at least 2a+l, and
(ij) if ~ i ~ a they differ by at least 2i in at least d i coordinates, and
so are at least (di · 4i) 1/2 = .J:Y. 2a apart. Thus we may take the radius of
the spheres to be p = .J:Y. 2a- l .
6.3 Center density. How many integer points x satisfy the conditions of
Construction C? The fraction of x's with l's row in Co is Morn, of these
a fraction Mlr n have 2's row in C b and so on. Thus the fraction of
integer points which are accepted as centers is MoMI ... M a 2-(a+lln, and
so the center density is
0= MoMI ... M a 2-(a+lln pn = MoMI ... M al'n/2r 2n . (10)
(14)
(17)
The details may be found in [Lee41 (The relation between the k-parity of
a vector as defined in [Lee4] and RM codes is that a binary vector of
length 2m has k -parity if and only if it is in the (m - k)1h order RM
code.}
152 Chapter 5
n log2 M d Name
32 26 4 Hamming
16 8 2nd order RM
6 16 1st order RM
64 57 4 Hamming
45 8 BCH
46 8 extended cyclic
47 8 Goethals
24 16 BCH
28 16 extended cyclic
7 32 1st order RM
128 120 4 Hamming
106 8 BCH
78 16 BCH
43 32 BCH
8 64 1st order RM
256 247 4 Hamming
231 8 BCH
233 8 Goethals
199 16 BCH
139 32 BCH
55 64 BCH
9 128 1st order RM
Sphere Packing and Error-Correcting Codes 153
For completeness we mention that the [64, 46, 8] code in Table 5.4 is
obtained by adding a zero-sum check digit to the [63, 46, 7] cyclic code
having generator polynomial
g(x) - M(I) (x) M(5) (x) M(9) (x) M(21) (x), (I 8)
k>.. .:;;; K>.. < k>.._I' For example, for codes of length 128 it is known that
ks = 36, Ks = 43, k4 = 78 [KasIl
If 6a and 6b denote the center densities of the two packings, then from
(lla), (llb) we have
[m/21 [(m-ll/21
log26a = ~ K2i - 2n, log2 6b = ~ K2i+1 - 3n/2.
i-O i-O
and so
i
aiJ = ~ tt.
v-I
Collecting these results we find that lower and upper bounds to log26a
are respectively
i-I
[m/21
2m ~ (I - 22i - m - 2)m - 2m + O(m 2).
i-I
Sphere Packing and Error-Correcting Codes 155
where c > 1 and d < 1 are constants, and the logarithms are to base 4.
Then
[m/21-clogm m
~I > ~ (I-m4 i ·rm ) > T- Io g4 m +0(1),
i-O
Therefore
It follows using Eq. (I8) of Chap. 1 that the actual density Ll = Vno of
these packings satisfies
log2 Ll - - V2 n log210g2 n .
6.8 Packings obtained from Justesen codes. A higher density than (21)
can be achieved by replacing some of the BCH codes by Justesen codes
(§2.6 of Chap. 3). Suppose n = m2m = 22a, and take 'Y = 1. For
o ~ i ~ 5 let Ci consist of the 0 codeword alone, for 6 ~ i ~ 5/ slog2 (2a)
let Ci be a Justesen code of minimal distance 4 a - i shortened to have length
n, and for 5/ slog2 (2a) < i ~ a let Ci be an extended BCH code of
minimal distance 4 a - i as in §6.7. Then it can be shown [Slo1] that
Construction C produces a nonlattice packing with
I
- log2 Ll > -6. (22)
n -
Remark. If we used codes meeting the Gilbert bound (Eq. (3) of Chap. 9)
in Construction C we would obtain nonlattice packings with
1
- log2 Ll > -1.2919 .... (23)
n -
156 Chapter 5
We study the densest lattice packings that can be built up in layers. Start
with the I-dimensional lattice Al of even integer points; at the nth step
stack layers of a suitable (n - I)-dimensional lattice An - I as densely as
possible, keeping the same minimal norm; the result is a laminated lattice
An. In this chapter the density of An is determined for n ~ 48, all An are
found for n ~ 25, and at least one An is found for 26 ~ n ~ 48. The
unique A24 is the Leech lattice. Denser lattices than An are now known
for n ~ 30.
1. Introduction
A natural and familiar way to construct a lattice packing of spheres in n-
dimensional Euclidean space Rn is the following. Starting with the one-
dimensional lattice consisting of the even integer points, 2Z, we obtain a
two-dimensional packing by drawing a row of circles of radius 1 centered
at the even integer points along one axis, then a similar row next to it as
close as possible, then another row at the same spacing, and so on. This
produces the hexagonal lattice packing A 2• To go to three dimensions we
place a layer of billiard balls in the hexagonal lattice packing, then place a
similar layer next to it and as close as possible, then another layer at the
same spacing, and so on, obtaining the face-centered cubic lattice packing
A3 == D 3 . At each step, in going from i to i + 1 dimensions, we stack
layers (or laminae) consisting of copies of a suitable i -dimensional lattice
Ai as close together as possible. The resulting lattice(s} - for in some
higher dimensional spaces more than one lattice can be obtained in this
way - we call laminated lattices (a more precise definition is given in §2).
A typical n-dimensional laminated lattice will be denoted by An.
In this chapter we determine the density of An for n ~ 48 (see Fig. 1.5
of Chap. I and Table 6.I), find all An for n ~ 25 (see Fig. 6.1), and find
at least one An for 26 ~ n ~ 48. We see that laminated lattices are the
densest packings known in dimensions n ~ 29 except for n = 10, 11, 12
and 13.
158 Chapter 6
11'5
11'6
1117
II,s
11'9
1120
liz,
1122
Figure 6.1. Inclusions among the laminated lattices An. All An for
n ~ 24 are shown, while there are 23 A2s 's and probably a large number
of A 26 's. At least one An is known for 26 ~ n ~ 48.
We shall see that there are unique laminated lattices A IS and A 16,
which are in fact isomorphic to lattices found by Barnes and WaH [Barl8]
in 1959. The unique A24 is the Leech lattice, and the "main sequence" of
cross-sections
Ao, AI •.. .• AJO, Aria" A~a" A~a" A 14, A ls . .. . • A24 (1)
00 00 00 ** 00 00 ** ** 00 00 ** **
00 0 0 00 ** 00 00 ** 00 A ** **
00 0 0 00
00 0 0 00 :1 00 00
0 0 00 ** *
** * 0
0 00
00
18 * * **
** **
00 00 00 ** 00 00 ** * 0 00 * * ** 00
00 00 00 It* 00 00 ** * 0 00 ** ** *0
O~
00
00
00
00 :1 00 0 0
00 00 **
** :0
00
00 ** **
** **
*0
*0
00 00 00 ** 00 00 ** ** *0
no 00 00 ** 00 00 ** ** *0
00 00 ** 00 00 11.20
*0
lJ~ 00 00 ** 00 00 ** **
** ** *0
00 00 00 ** *0 00 ** * 0 00 ** ** ***0
*0 00 00 ** 00 00 ** ** 00 ** **
*0 00 00 ** 00 00 ** ** 00 11.21 * *
** *0
*0 00 00 ** 00 00 ** ** 00 ** ** * 0
*0
*0
00
00
00
00
00
00
**
** ~ I: 00
00
00
** **
** **
00
00
00
**
**
** **
** *.
*0
*0 00 00 ** li~ 00 ** ** 00 ** ** :1
** ** ** ** **
** 00 00 ** *0 00 ** ** 0 0 ** ** **
*0 00 00 ** *0 00 ** ** 0 0 ** ** **
:1
AII\8lC
*0 00 00 11 ** 1~ 00 ** ** O ~ ** **
*0 00 00 ** 00 ** ** ** ** --
00 00 *0 00
o 0 0 0 II\8lC **
** *0 00 **
It It **
**
**
**
00 00 11.12 ** *0 00 ** ** **
00 00 ** * 0 00 ** ** It*
Figure 6.2. MOG coordinates for Ao • . . .• An as sections of the Leech
lattice A 24 . The figure shows Ao, AI;;;; Z;;; Ai> A 2 ;;;; Ab A3 ;;;; A 3 ;;;; D 3,
A4 .. D 4 , A5;;;; D 5, A6 ;;;; £6, A7 ;;; £7, Ag ;;;; E g, A 9, A IO , Al'l", A~" ,
Al'.\", A I4 , .... A small circle represents a zero coordinate, a hollow loop is
a set of coordinates adding to zero, an asterisk is a free coordinate, and a
line of asterisks is a set of equal coordinates.
and Table 6.2 gives their determinants. Some of the An for n ~ 16 and
the Kn for n ~ 13 were rediscovered by Skubenko [Sku I], who appears to
have been unaware of the earlier work on this subject. Particular lattices
A 2s •. . . • A40 are also described in the previous chapter. Leech has shown
that, for n ~ 21, the layers can be stacked to give nonlattice packings that
are as dense as An and Kn, except for AI> A 2, A 4 , As, KII and K 12 .
Sequels to this chapter. We have generalized this work in two ways in
[Con36], by considering (a) laminated complex and quaternionic lattices
(cf. §2.6 of Chap. 2), and (b) integral laminated lattices, where An is
required to be an integral (real, complex or quaternionic) lattice with the
Laminated Lattices 161
00 00 00 0 *o ** *0 00 00
00 00 00 00 **
00 ~ In* ** **
00 00 00 o 00 00 K12~ ** **
00 00 00 o 00 00 I ~: ** **
00 00 = ** ** -11* *0 00 00
00 00 00 11 0 00 00 ** ** **
00 00
00
00
00 00
00 00 It ~ 00 00 ** **
** **
**
**
00 00
000000
K 21-0-0-+-0-0-+-0-0-1
******
00 00 ~
00 00 K14[[]]]]]Q[] K20
**
** ** **
000000 00 00 ** *-11 **
** ** **
00 000* ** ** *0 00
00 00 ** ** **
00 00 00 ** ** **
00 00 00 ** ** **
IHljiftil
00 00 00
00 **
00 **
00 ** ** ** *
00 00 00 ******
00 00 00
K10 ** ** K22 ** * * * *
*****-11
0* ** ** 00 00 -11* *'*
00
00
00
00
00
00
~ *-11 ** **
** ** *-11
00 00 00 K11l!.1l11ltlJ ** **
-11* **
** **
**
** **
** **
*0 00 00 *-11 ** **
n )( ** ** ** ** *-11
:
~ ** **
** **
-11*
**
**
*-11
-11*
**
Figure 6.3. MOG coordinates for the lattices K o• . . .• Kn as sections of
the Leech lattice. The symbols have the same meaning as in Figure 6.2.
n Kn n K n n K n n K n n K n n Kn
4 64 12 729 20 64 28 4 36 36 ·r 12 44 r l4
5 128 13 972 21 32 29 4 37 35 ·r ll 45 2- 16
which becomes 5 = (det 0- 1/2 for a laminated lattice. A hole (see §1.2 of
Chap. 2) in a lattice Ln ~ Rn is a point of Rn whose distance from Ln is a
local maximum. The greatest distance of any hole from Ln is the covering
radius of Ln (Eq. (3) of Chap. 2), and a hole at this distance is called a
deep hole. By a k-dimensional section of a lattice Ln we mean a k-
dimensional lattice Mk ~ Rk ~ Rn such that Mk = Ln n Rk. The dual
lattice L; = {x ERn: x·y E Z for all y E Ln } (Eq. (24) of Chap. 1). If V
is a subspace of Rn the orthogonal subspace V-L = { x ERn: x· y =0 for
all y E V J.
So hn-I> which we shall call the subcovering radius, is a lower bound for
the covering radius rn-I of An-I. It is easy to see that h n- I and rn-I are
equal if either is ~../3. (It seems likely that hn - I is always equal to rn-I>
although we cannot prove this.) If the determinant of An is denoted by Xn,
we have
(4)
164 Chapter 6
The density of An is A;; 1/2. It is clear from the definition that all An have
the same determinant, but only those An with the maximal subcovering
radius (h n ) can be extended to An+I'S.
Our main result is the following.
Theorem 1. The density An of any laminated lattice An for n ~ 48 is as
shown in Table 6.1 (see also Fig. 1.5 of Chap. O. The greatest
subcovering radius hn of any An for n ~ 47 is also shown in Table 6.1.
When hn ~ .J3. hn is also the greatest covering radius of any An. All An
for n ~ 25 are shown in Fig. 6.1. At least one An is known for
26 ~ n ~ 48.
In dimensions 26 and above the number of inequivalent An appears to be
very large (see §7). We see from Fig. 6.1 that for n ~ 24 there is only
one An, A~id, that is not contained in a An + l . However, Plesken (personal
communication) has shown that A~id is a sublattice of A 24 .
On the scale at which the minimal norm is 4, the An are integral
lattices if and only if n ~ 24. (For n ~ 25, An contains A 24 , a self-dual
lattice, but does not contain A24 as a direct summand, and so is not
integral.) The quadratic form associated with any laminated lattice is
perfect. (This follows immediately from [Bar9, Part II, Th. 2.11.)
The proof of Theorem 1 depends heavily on the next two theorems, the
first of which collects known results.
Theorem 2. For n = 0, 1 ..... 8 the densest lattice packing in Rn is
isomorphic to A o• Al ;;; Z. A 2• A3 ;;; D 3. D 4• D 5• E 6• E 7• Es respectively.
The laminated lattices Ao• A I •...• As are unique and are isomorphic to
these lattices. Their determinants and covering radii are shown in
Table 6.1.
Proof For the first assertion see [Bli4], [Vet2]; for the second see [Lee7]
and the previous chapter; and for the covering radii see for instance
Chap. 21, [Con28], [Cox201.
Theorem 2 certainly establishes the results of Theorem 1 for n ~ 8,
although of course it is much stronger than that.
Theorem 3. Let Lsm +, (m ~ 0, 0 ~ r ~ 8) be any lattice in RSm +, of
minimal norm ~ 4 with a section ASm having covering radius rSm. Then
- 42]'
[-4-rs m
det Lsm +, ~ ASm A, - (5)
and
4-rs2 ] 1/2
c = [ --
4
-
m
'
Laminated Lattices 165
2]r
4-rsm
[--4-
~Sm+r = ~Sm ~r (9)
r~r,
at least 4 - rim. Therefore by Theorem 2
det Lr ~ [4-;im
An K n
A24+n -- -2n ' K
24+n -- -
2n (0 ~ n ~ 24).
In particular, if det Ln = 1,
det F = det E . (1s)
Proof Let el, ... ,en be an orthonormal basis for Rn, chosen so that
el, ... ,ek is a basis for Sand ek+l, ... , en is a basis for SJ.. Since E
is a section of Ln, we can find an integral basis VI, . . • ,Vn for Ln so that
v I, . . . ,Vk is an integral basis for E. Let WI, . • . ,Wn be the dual basis
1
to VI. ... , V n , with Vi . Wj = oij. Then WI, . . . ,Wn is an integral basis for
L: and Wk 1 ' . . . ,Wn is an integral basis for F. There is a matrix
M = (A 0
B C ' with inverse
(A-* I
0 )
C-I, such that
=M
n=O 1 2 3 4 5 6 7 8 9 10
D = 1 2 3 4 4 4 4 4 32
9
28
9
24
9
Proof. It follows from Table 5.3 that coordinates for P 4Sp can be chosen
so that the minimal vectors include all the vectors
(20)
have the same densities as those lattices by Corollary 5; the first assertion
now follows by rescaling . The second assertion of the corollary follows
from the optimality of Ao . ... . Ds (Theorem 2).
3. Properties of Ao to As
The lattices Ao to As (which were identified in Theorem 2) may be
specified as the sections of the Leech lattice shown in Fig. 6.2. For
instance the diagram for A2 indicates that A2 may be defined as the set of
all points of the Leech lattice in which the first three coordinates add to
zero and the rest are equal to zero. This lattice is spanned by (4, -4, 0 22 )
and (4, 0, - 4, 021 ), and clearly is a scaled version of A 2.
For use in the next section we remark that, for any r, Ar/2Ar is an
elementary abelian group of order 2r. The usual coordinates for Dn and
En are more convenient for describing the congruence classes of Ar/2Ar.
First, the nonzero classes of D3/2D3 have the structure of a projective
plane of order 2, as shown in Fig. 6.4.
101
110 011
Figure 6.4. Representatives for classes of D) /2D) . Three classes on a
line add to zero.
Laminated Lattices 169
The last 27 classes are each represented by ten norm 4 vectors forming a
5-dimensional coordinate frame (in these coordinates the minimal vectors
have norm 2). Similarly the classes of E 7 /2E 7 are:
o 0
±4 0
o 0
o 0
±2 0
±2 0
±2 0
o ±2
±1 ±1
±1 ±1
+3 ±1
±1 ±1
In the following section these 135 types will be referred to as the frames in
Eg (or Ag).
4. Dimensions 9 to 16
In this section we establish the assertions of Theorem 1 for 9 ~ n ~ 16.
Let A g + r (I ~ r ~ 8) be any laminated lattice in R g+r . By definition
Ag+ r contains Ag';;; E g. From Theorem 3 there is a gluing map
8: Ar --+ RAg such that Ag+ r consists of the vectors
u + vB + cv,
If v E Ar has the minimal nonzero norm, 4, then from (6), N(v B) ~ 2.
But the biggest hole in Ag has norm 2, so we conclude that minimal
vectors in Ar must be glued to deep holes in Ag.
We saw in the previous section that the deep holes in Ag are vectors in
lf2 Ag; and the value of vB is only important modulo Ag. Also the minimal
vectors of Ar generate An so 2Ar is mapped into Ag. Therefore 8 induces
a well-defined map
(22)
Laminated Lattices 171
c E
Proposition 10. If VI, •.• ,VI are minimal vectors of Ar that are
independent modulo (ker e, 2Ar) then we may assume that v? , ... , VIS
0 0o 20 22 00
[
0] 0' 20'00' 22
(23)
00 20 00 00
* * o0 o0
As: * * o0 o0
* * o0 o0
* * o0 o0
and
4 0 4 0 o0
vf + CVI o0 o0 o0
:
o0 o0 o0
o0 o0 o0
This leads to the definition of A9 given in Fig. 6.2. Also N(cvI) = 2 = 'Irs,
and >-9 = 'lrs>-s = 512, as stated in Table 6.1.
(A IO ). Here r = t = 2, k = 0 and e maps VI and V2 to the first two
elements of (23). Thus there is a unique A 10 which is spanned by A9 and
2 0 2 0 o0
2 0 2 0 o0
V = v~ + CV2 :
2 0 2 0 o0
2 0 2 0 o0
Laminated Lattices 173
o0 o0 o0
o0 2 0 o0
o0 2 0 o0
o0 2 0 o0
which has norm 11"9 = 3/2. Also from either (4) or (9) we have ;\ 10 - 768.
(A II). There are two possibilities, depending on whether the central class
in Fig. 6.4 is or is not in the kernel of e: (a) t = 2, k - I, ker e
= < (200) >, leading to A!'rx (see Fig. 6.2); (b) t -= 3, k = 0, e maps
v" v2, v3 to the first three elements of (23), leading to Arlin. We shall see
at the end of this section that these two lattices are distinct, as are the
A\2's and Al3's constructed below.
(A 12). The kernel of e is a subgroup of the first row of the table of classes
of D4/2D4 (see §3), and there is a unique subgroup of each of the orders I,
2 and 4. Thus there are (at most) three possibilities for Al2 : Ar1ax (when
k = 2), shown in Fig. 6.2, A r1id (when k = 1), and A r1in (when k = 0).
(A l3 ). The kernel must be a subgroup of classes m,
(iii), (iv), (v) of
Ds/2Ds, and have dimension ~ 1. However two classes from (iv) or (v)
with distinct support have a difference of type (ii), and cannot both be in
the kernel. Thus the kernel contains at most three nonzero classes. There
are (at most) three possibilities: (a) k = 2, ker e - {(OOOOO),
(20000), (11110), (-11110)}, leading to Al'3ax as shown in Fig. 6.2; (b)
k = I, ker e = < (20000) >, giving Al'3id ; (c) k = I, ker e = < (11110) >,
giving Al'3in .
(A I4 ). Similar reasoning shows that there is a unique A I4 , with ker e=
< (20000; 000), (1111 0; 000) >.
(A Is ). There is a unique A IS , with ker e= «200000;00), (111100;00),
(110011;00) >.
To see that these lattices are distinct we compute their kissing numbers
T. The minimal vectors fall into three classes: those in As (240 in
number), those gluing As to cAr (16T(A r ) of them), and those in cAr (the
174 Chapter 6
The results appear in Table 6.3, and the inclusions between lattices of
adjacent dimensions are displayed in Fig. 6.1. When n ~ 15 there are
very few n -dimensional sections of An+l that contain As, so all such
inclusions are easily found.
Ao Al A2 A3 A4 As A6 A7
0 2 6 12 24 40 72 126
0
2
2
0
2 2
0 0
2
0
-2:
01
-3 1I
1I
,
1 I
2 0 0 0 0 01 1I
1 I
2 0 0 0 0 01 1 __
1 J1
...J
(8) (I)
Figure 6.6. Typical deep holes in A 16. The broken line encloses (a scalar
multiple of) the associated minimal vector of Ag •
Theorem 12. The covering radius of AI6 is .J3, and the deep holes in AI6
are those vectors of Y2 A 16 which are congruent modulo A 16 to one of the
classes of type (vi) in Prop. 11. Thus apart from permutations and sign
changes the deep holes are congruent modulo A 16 to either Fig. 6.6a or
Fig. 6.6b. There is a 1-1 correspondence between the congruence classes
of deep holes and the pairs ± u of minimal vectors of As.
Proof Let the covering radius of AI6 be.Jd. By compactness there is a
point x which is at distance .Jd from 0 and at distance ~ .Jd from all
other points of A 16 . The existence of the vectors shown in Fig. 6.6 proves
that d ~ 3. The covering radius of Y2 AI6 is Y2 .Jd, so we can write
x = u + x where u E Y2 AI6 and N(x) ~ d/4. From Prop. 11, u belongs
to one of the classes (j) to (vi). In fact u must be in class (vi), for if
x = lh v, + x where v, E A 16 has norm r then N (x ± Y2 v,) ~ d, so
Then
512
T(y) . y = ~ (cjJj . y)2 (27)
j-I
is a quadratic invariant of the orthogonal group which fixes the origin and
sends A 16 to itself. Since this is an irreducible group, T (y) . y must be a
scalar multiple of the quadratic form y . y, say
T(y) . y = k y . y . (28)
or
6. Dimensions 17 to 24
We next establish the assertions of Theorem 1 for 17 ~ n ~ 24. If
A 16+, (I ~ r ~ 8) is any laminated lattice then, arguing as in §4, we see
that there is a gluing map
e : A,/2A, --+ V2 A16/A16 . (33)
Laminated Lattices 177
7. Dimensions 25 to 48
In this section we establish the remaining assertions of Theorem 1. First
we construct a sequence of lattices L 25 k L 26 k ... k L4g containing A 24 ,
and then prove that these are laminated lattices.
Let i denote the element of Aut (A 24 ) shown in Fig. 6.7, satisfying
i2= - 1. Then (I + ;)/2 is a similarity of R 24 which halves the norms of
vectors. The lattice L 24+s (I ~ s ~ 24) consists of the vectors
u + vB + cv, where u E A 24 , V E As, () = (I + ;)/2 and c = 1/.J2. The
determinant of L 24+s agrees with the value of A24+s given in Table 6.1.
178 Chapter 6
Figure 6.7. The element i of Aut(A 24 ). In the first column the 1st and
3rd components are to be exchanged, and the 2nd and 4th, and then the
2nd and 3rd components are negated. Similarly for the other columns.
The A 2S 's. We claim that there are exactly twenty-three A2S'S, one for
each type of deep hole in A24 (cf. Chap. 23). From the definition of a
laminated lattice it follows that there is at most one type of A2S for each
type of deep hole in A 24 . The kissing number of a A 2S is 196560 + 2V,
where V is the number of vertices of the hole (see Table 16.1 in Chap. 16).
This already shows that there are at least nine distinct A2S'S, the highest
kissing number being 196560 + 96 for the A 2S constructed from the hole of
type Af4.
To show that all the 23 holes produce distinct A2S'S, it is enough to
prove that there is a unique A24 inside a A 2S . In fact it is not difficult to
show that in each A 2S the original A24 is characterized by the following
property: it is spanned by all minimal vectors of A2S that are orthogonal to
at least 93150 other minimal vectors. We remark that the automorphism
group of the A 2S corresponding to a deep hole of type D24 has order 4
(whereas IAut (An) I > 1000 for 4 ~ n ~ 24).
3 4 A3 16 A 3 {3} 32 A3
4 4 D4 32 A 4 {3} 64 A4
5 4 Ds 48 As {3} 128 As
6 3 E6 64 A6{3} 192 A6
7 2 E7 64 A 7{3} 256 A7
8 1 E8 128 A8{3} 256 A8
9 2 E8 A l 192 A9{3} 512 A9
10 3 E8 A Z 243 K lO{3} 768 AlO
II 2 (DlOA 1)+ 256 A l d3} 972 Kll
12 1 Dtz 256 A IZ {3} 729 K12
13 2 (D6E 7)+ 243 K lO{3}-L 972 K13
14 1 Er+ 192 A9{3}-L 768 A14
15 1 Ais 128 A8{3}-L 512 A 1S
16 1 E§ 64 A7{3}-L 256 A16
17 1 (A llE6)+ 64 A6{3}-L 256 Al7
18 I A~+ 48 As{3}-L 192 A18
19 1 (ArDs)+ 32 A4{3}-L 128 A19
20 1 E8 D iz 16 A3{3}-L 64 Azo
21 1 Aj+ 8 A z{3}-L 32 AZI
22 1 E8E r+ 3 Ad3}-L 12 An
1. Introduction
We already saw in Chap. 5 that codes and sphere packings are related. In
this chapter we analyze Constructions A and B of Chap. 5 in greater detail
and generalize them to complex lattices. (More about Constructions A
and C will be found in the following chapter.) We also study the theta
series of the packings obtained from these constructions.
We shall see that the connections between codes and packings become
stronger when we consider self-dual linear codes and self-dual lattice
packings (§§3, 4), and strongest of all when we compare self-dual codes in
which the weight of every codeword is a multiple of 4 with self-dual
lattices in which the norm of every vector is even (§§6, 7). In the latter
case there are parallel theorems giving upper and lower bounds on the best
codes and lattices (Cor. 21 and Theorems 24, 25), and parallel theorems
characterizing the weight enumerator of the code and the theta series of
the lattice (Theorems 16, 17).
The weight enumerator of a self-dual code and the theta series of a
self-dual lattice are very strongly constrained, for the former must be
invariant under a fairly large group of transformations, and the latter must
be a modular form for a fairly large subgroup of SL 2 (R). As a
consequence these weight enumerators and theta series must lie in certain
simply described rings, sometimes free rings with a small number of
generators (see Theorems 6, 7,16,17,28-33).
182 Chapter 7
Extremal codes and lattices have the highest minimal distance or norm
permitted by the preceding theorems (the precise definition is given in §4).
We describe what is known about the classification of self-dual codes and
lattices, and in particular of extremal codes and lattices. In general only
finitely many extremal codes or lattices exist, and in certain cases they are
all known (Theorems 11-13, 20, 34, 36). The extremal weight
enumerators and theta series can (at least in principle) be determined
explicitly. This makes it possible to show that certain coefficients do not
vanish (Theorems 9, 20, 34), leading to upper bounds on the minimal
distance or norm (Corollaries 10, 21 35), and that other coefficients are
negative, showing that, for all n sufficiently large, extremal codes and
lattices do not exist. (Extremal lattices are unrelated to extreme forms
(§2.2 of Chap. 2).)
Sections 2-7 deal with binary codes and real lattices, and §§8-1O with
nonbinary codes and complex lattices. This chapter is based on [SI06]-
[SlolO1. Broue and Enguehard [Bro5]-[Br07] have also observed the many
parallels between codes and lattices (see also [MahI]-[Mah3], [TasI]).
Notation. We use the notation for codes established in §2 of Chap. 3, and
the theta functions defined in §4.1 of Chap. 4. In particular we recall from
Chap. 3 that Type I, II, III, IV codes are respectively self-dual codes over
F 2, F 2 , F3 , F4 in which the weight of every codeword is a multiple of 2, 4,
3, 2. As in §2.4 of Chap. 2, Type I or II lattices are real self-dual (i.e.
integral unimodular) lattices in which the norm of every vector is a
multiple of 1 or 2 respectively. If I J, 12,'" are algebraically independent
polynomials or power series then elf I,J 2 , .. J denotes the ring of
polynomials in I I, 12,'" with complex coefficients (a free ring).
2. Construction A
We repeat the construction from §2 of Chap. 5, changing it very slightly in
order to clarify the parallels between codes and packings.
Construction A. Let C be an (n,M,d) binary code. We assume the zero
codeword 0 is in C. A sphere-packing MC) in Rn is obtained by taking as
centers all x = (XI, . . . ,xn ) in Rn with
J2 x (mod 2) E C.
Thus the centers consist of all vectors which can be obtained from the
codewords of C by adding arbitrary even numbers to the components and
then dividing by J2. The origin is always a center.
Example 1. The lace-centered cubic lattice D 3. Let C =
{000,01I, 101, 1I0} with n = 3, d = 2. Some of the centers closest to the
origin are r l / 2 (± 1, ± 1,0), rl/2 (±2,0,0) ,.... This is the face-centered
cubic lattice D 3, the densest lattice sphere-packing in R3 (§6.3 of Chap. 4).
In general, if d < 4, the centers closest to the origin are the 2d Ad (0)
vectors of shape r l / 2 (±l) d on-d obtained from the codewords of weight
d. Such centers are at squared distance d /2 from the origin. If d > 4,
Further Connections Between Codes and Lattices 183
the centers closest to the origin are the 2n centers of type (± .Ji) lon-I, at
squared distance 2. Finally, if d = 4, both sets of centers are at the same
distance from the origin. Therefore the radius of the spheres should be
taken to be
p = r3/2 d 1/ 2 if d ~ 4, or rl/2 if d ~ 4, (2)
«3), (4) of Chap. 5). The center density of A(C) «2) of Chap. 5) is
{j = M pn 2- n / 2 •
I [I B] (5)
.J2 0 21
is a generator
matrix for A(C). (i)-(v) now follow easily.
(vi) Aut(A (C» certainly contains all the coordinate permutations in
Aut(C), all sign changes Xj - -Xj, and possibly other symmetries.
Remarks. Compare Theorem I of Chap. 8. If the .J2 is omitted from (1),
Construction A always produces an integral lattice.
where 82 (z), 83 (z) are Jacobi theta functions defined in §4.1 of Chap. 4.
184 Chapter 7
Therefore
Example 3. The square lattice Z2. The code CC 2 = too, II} has weight
enumerator
(8)
so from (6) the theta series of Dn is (allowing for the new scale)
ElD/Z) = Wc (OJ (4z), 02(4z))
+ 16 8 3(2z)4 82(2z)4]
(16)
in agreement with Eq. (40) of Chap. 2. (To go from (15) to (16) we use
Eqs. (24), (25) of Chap. 4.) The lattice E7 can be obtained in the same
way from the Hamming code :Yt, (§2.5 of Chap. 5).
Example 6. Best's lO-dimensional nonlattice PlOc. Best's (10,40,4) code
leads to a nonlattice lO-dimensional packing P lOc with 0 - r7 . 5 (§2.6 of
Chap. 5). Using the weight distribution given in Chap. 5 we find that this
packing is distance invariant and has theta series
8 3 (2z)1O+ 228 3(2z)68 2(2z)4 + 128 3(2z)48 2(2z)6 + 58 3(2z)28 2(2z)g
= 1 + 372q2 + 768 q 3 + 5684q4 + 6144q 5 + ... , (17)
verifying that the kissing number is 372. The generalized Jacobi formula
for periodic packings given in [OdI6] (which replaces z by -l/z and
multiplies by an appropriate constant) transforms (17) into
sq + -5-
1+ 4 516 q 2 + -2048
5- q
5/2 + 1728 3 +
-5- q
(18)
In fact from the MacWilliams identity for codes (Eq. (50) of Chap. 3)
and Jacobi's formula for lattices (Eq. (] 9) of Chap. 4) we deduce:
Theorem 4.
W e (V2(X+Y), V2(X-Y)) = We(x,y), (20)
We(x,-y) = We(x,y). (21)
Theorem 5.
0 A (-I/z) = (z/j)n/20 A (z), (22)
Jz [~ -~ ], [~ -~ ]. (24)
(Eq. (37) of Chap. 4); this is a modular form of weight 12 for SL 2 (Z)
with respect to the character X = 1.
Theorem 5 implies that e A (z) is a modular form of weight Vzn for the
group generated by
U= [~ n: z-+z+2, (29)
S= [~ ~1) 1
z--+-- , (30)
z
""n
n-O
= r 88 2 [ z ;1
II
00
= q ((l_q2m-l) (l_q4m)J8
Proof (a) follows from [Ogg 1, Th. 4, p. 1-411, since the hypotheses imply
e A (z)E "" (2, V2 n, 1) in the notation of [Ogg 1, p. xiv 1. (b) Since the
Poincare series for"" is
(35)
188 Chapter 7
r
from (9), (14),
are linearly independent. But this is immediate, for the rth product begins
qr + ....
Remark. From the proof of Theorem 7, in particular Eq. (35), we see that
the theta series of an n -dimensional Type I lattice can be written as
belongs to Als. Since both series begin 1 + 240q2 + ... , it follows that
E 4 (z) is equal to the theta series of the lattice E s.
Theorem 8 [SloIO]. If we expand .:lS(T) = T-arqr, the coefficients ar
alternate in sign and are multiplicative in the sense that
(40)
(41)
although no linear code with this weight enumerator exists. But there is a
nonlinear code with this weight enumerator, the (16, 256, 6) Nordstrom-
Robinson code (see §2.12 of Chap. 3). Similarly the extremal theta series
in dimension 16 is
e* (7) = 1 + 7680q3 + 4320q4 + 276480q5 + 61440q6 + .... (47)
If a corresponding packing were to exist, it would set new records for the
density and kissing number in 16 dimensions. No such lattice exists
(Chap. 19), and we conjecture that there is also no such nonlattice
packing. Inspection of (47) suggests that such a packing might be a union
of A 16 and 15 of its translates. However, this is impossible, for we can
prove:
5. Construction B
We repeat the construction from §3 of Chap. 5, again with slight changes.
Construction B. Let C be an [n,k,d=8] binary linear code in which the
weight of every codeword is a multiple of 4. A sphere packing !£(C) is
obtained in Rn by taking as centers all x = (x I, . . . , x n) in Rn with
(j) J2 x (mod 2) E C, and (48)
n
(iO 41 J2 ~ Xi. (49)
i-I
(The construction may be applied to other codes, but this version covers
the most important cases.)
Theorem 15. !£(C) is an integral lattice with minimal norm, kissing
number, center density, determinant and theta series given by
IL = 4, (50)
T = 2n(n-1) + 128 As, (51)
0= 2k-I-n/2, (52)
det !£(C) = 2n+ 2- 2k , (53)
(Hz) = V2 Wc (03(2z), 02(2z» + V2 04(2z)n. (54)
where E 4 (z) is the theta series of the lattice E s, given by (I 4), (16) or
(37), and .:1 24 (Z) is given by (28) (see also (37)-(39) of Chap. 4).
Equivalently, 8 A (z) can be written as an isobaric polynomial in the theta
series of Es and A24 .
Proof (a) follows from [OggI, Th. 3, p. 1-231. (b) The Poincare series is
~
n-o
(dimcJln)Xn = (
I-X
s) I(
I-X
24)' (60)
Example 8 (cont.) The Leech lattice A Z4 ' The Leech lattice AZ4 is
obtained by taking the union of hAz4 and its translation by (-1 V2, (V2)Z3)
(§4.4 of Chap. 5). This doubles the density (without changing the minimal
norm), so AZ4 has f..L = 4, 0 = 1, det = 1, and therefore is a Type II lattice.
We can write down its theta series immediately from Theorem 16. Since
there are no vectors of norm 2, it is E 4(z)3 - 720 LlZ4(Z) (see Eqs. (138)-
(141) of Chap. 4).
Theorem 19 (Ramanujan [RamIl; see also [MorIl, [OggiU If we expand
Llz 4(z) = ~::::;", r(m)qZm, the function r(m), the Ramanujan function,
is multiplicative in the sense that
r(rh(s) = ~ d11r(rs/d Z). (61)
d I ("S)
Unfortunately this does not tell us how to find a lattice with given theta
series, even when an analogous code is known. In fact (62) does not even
map the weight enumerator of the Golay code onto the theta series of the
Leech lattice. Broue and Enguehard [Br06] give an interesting discussion
of the isomorphism between these rings.
Classification. Type II codes have been classified for length n ~ 32
[Con21], [PleIO], [PleI2], and Type II lattices for dimension n ~ 24, as
we have discussed in §2.4 of Chap. 2 (see Chap. 16).
i
,-0
a,E 4(z)j-3, LlZ4(Z)' = 1 + A;a+2 q2a+2 +
where A~24 = 1.16 .... 10 170, A~28 = -5.84 .... 10 170 [MaI3].
for all sufficiently large n. Note that (65), (66) are stronger than (44),
(45).
I + 52416000q6 + 39007332000q8 +
1 + 15590400q6 + 36957286800q8 + ... ,
1 + 2611200 q6 + 19524758400q8 + ... ,
I + 6218175600q8 + 15281788354560ql0 + (68)
Example 9. The lattices P48p and P 48q . In this section we summarize the
properties of these two very similar lattices. Both are even unimodular
(Type II) extremal lattices and were defined in §5.7 of Chap. 5. P 48q is
obtained by applying Construction B3 (§5.4 of Chap. 5) to the [48, 24, 15]
ternary quadratic residue code, and then doubling the density by adjoining
a translate by (-5/2,1 47 ). P 48p is obtained in the same way from the [48,
24, 15] Pless code. Since the two codes have the same c.w.e. (Table 3.2),
the vectors in P 48q and P 48p have the same shapes. The two lattices are
not equivalent, however, since they have different automorphism groups.
For P 48q we label the coordinate positions 00, 0, 1 ..... 46 and let Q
denote the set of nonzero quadratic residues modulo 47. Then P 48q is
spanned by the vectors
47 vectors, supported on a translate {{O} U Q} + i,
o~ i ~ 46,
c(-5,1 47 ), a single vector, and (69)
c(±6 2, 046 ), 2·48·47 vectors,
where c = l/m. For P 48p we label the coordinate posItIons by 00,
O•...• 22, 00', 0' ..... 22', and let Q denote the set of nonzero quadratic
residues modulo 23 and N the nonresidues. Then P 48p is spanned by:
c(2 12 , (-2)12,0 24 ),23 vectors, with 2's at i and {Q +;}' and -2's at 00'
0
6 52416000 29 32 53 7' 13
8 39007332000 25 37 53 7 3 13
10 6609020221440 2 3 5.7'13'23'47
11 8
12 437824977408000 2 12 33 53 7'13'31'103'109
r
extremal Type II code and n is a multiple of 24 then the code words of
any nonzero weight form a 5-design (cf §3.1 of Chap. 3).
The parameters of these designs can be determined from [Mal3]. For
II
00
(I - qS)-24(a+ j) .
s-l
The numbers A;a+2 for n = 24, 48, ... ,216 and their prime
factorizations are given in Table I of [S108l
Corollaries 10 and 20 give upper bounds on self-dual codes and lattices.
There are corresponding lower bounds, which state that for large n self-
dual codes meet the Gilbert-Varshamov bound of [Mac6, Chap. 17], and
self-dual lattices meet the Minkowski bound of Chap. 1, Eq. (29). The
following theorems are proved in [Mac6, Chap. 19], [Mac8J, [Mil7,
pp. 46-471, [Tholl We state the result only for Type II codes.
Further Connections Between Codes and Lattices 197
!£.
n
~ Hi! (lh) = 0.110 ... ,
where
(72)
! {~ r [ ~ + 1) rn (73)
(74)
or equivalently
1
-10g2.:l ~ -1. (75)
n
If m (n) is defined as the nearest even integer to (73), the same assertions
hold for Type II lattices.
The proofs use generalizations of the Minkowski-Siegel mass formulae
for lattices and their analogs for codes (see Chap. 16).
G = _1_
~
[h0 (76)
and
(77)
The minimal squared norm /.L of A (C) or A (C) real and the packing radius
p and kissing number T of A (C)real are determined by the codewords of
minimal Euclidean norm in C. The center density of A (C)real is
(79)
The theta series of A (C) (or equivalently of A (C) real) is determined by the
c.w.e. of C, and in some cases just by the Hamming weight enumerator.
Construction Be. A' (C) consists of the points 7r -1/2 (c + 7r x), for all
c E C and all x E r
such that ~Xi == 0 (mod 7r). On order for A'(C) to
be a lattice C must satisfy certain obvious conditions') Then
det A'(C) = qn/2-k+l, and A'(C)real has center density
(SO)
(S 1)
ow ow ow
---0
1
ow ow
Figure 7.1. The Eisenstein integers 8 are represented by small circles,
and 28 by double circles, showing how 8/28 == F4 = (a, 1,w,w).
o------@-----o
-I 0 -I 0
~
0 -I o -I
0 @r---O o------@-----o
-I 0 1 -I 0 1
~ o------@-----o 0---
0 -I 0 -I
o------@-----o o------@-----o
-I 0 -I 0
det = 3n - 2k , (82)
0= 2n 3k - 3n / 2 /n, (83)
(85)
It is easily checked that this is an &'-lattice. The minimal norm is 18, and
the 196560 minimal vectors are given in Table 7.2. In this table the
Coordinates Number
(J «(i,06) = (Jc+3x 264'3 5 = 64152
({3,a ll ) = !+(Jc+3y 2'3 6 '12'2 = 34992
or -1+(Jc+3z
«2a)2,a lO) = !+(Jc+3y 36 '66'2 = 96228
or -1+(Jc+3z
(Oa)2,0IO) = 3x 66'2'3 2 = 1188
Total = 196560
Further Connections Between Codes and Lattices 201
Table 7.3. Analogies between the real and complex Leech lattices.
Real Leech lattice Complex Leech lattice
Binary Golay code ~24 Ternary Golay code ~12
2 O=H
{+I.-l} h.",.",2}
Steiner system S (5. 8. 24) Steiner system S (5.6. 12)
Mathieu group M 24 Mathieu group M 12
Automorphism group contains Automorphism group contains
diag«-1)C\ ...• (_1)c ll ) diag(",CI •...• ",C 12 )
for any e E ~24 for any e E ~12
202 Chapter 7
M =
[01 1 +1]i ' A =
-
M M lr =
[2
1+i
I-i]
2 . (88)
The 24 minimal vectors have the form (± I,± 1), (± I,±j), (±i,±j),
(0, ± 1 ± j). The corresponding real lattice is D 4; in this form the theta
series is (cf. (92) of Chap. 4)
8 D /z) = 02(2z)4 + 03(2z)4 = 1 + 24q2 + 24q4 + 96 q 6 + .... (89)
where
(97)
h = (2) + x 2 + y2 + z2,
= w2 (99)
f6 = (6) + 15(222) = w + ... + 15(w x y2+ . . . ),
6 2 2 (100)
fs = (8) + 14(44) + 168(2222), (101)
f12 = (12) + 22(66) + 330(6222) + 165(444) + 330(4422). (102)
1r:: [1lww,
1 ~
,,3 1 ww
r r
Theorem 32 [S1091 If A is a self-dual 8-lattice then
8 A(z) E C[Q>o(z/2), ~6(Zn where
(105)
1. Introduction
This chapter makes use of a variety of constructions, generally more
technical than in previous chapters. One common theme is that they use
more complicated rings than Z, so that more knowledge of algebra is
required. The lattices constructed include Es (§2), the Leech lattice (§§2,
3, 5, 7.3, 7.5), Quebbemann's lattices Q32 and Q64 (§§3, 4), the lattices C 32
(§8.2h) and B 36 (§8.2d), McKay's lattice M 40 (§5), the lattices P 4Sq (§7.5)
and P 64c (§8.2e), the Barnes-Wall lattices BWn , n = 2m (§8.2f), the
lattices Bn , n = 2m , obtained from BCH codes (§8.2g), Craig's lattices
An(m) (§§6, 7.3), and the infinite trees of lattices 71 (A) obtained from
Construction E (§IQ). The latter give reasonably dense lattices in
dimensions up to at least 1010000 (see §10h, Table 8.7, and Tables 1.3, 1.4
of Chap. 1), although eventually their density is not very good.
The constructions used include two general versions of Construction A
(§§3, 4), a version of Construction C that always produces lattices
(Construction D, §8), and a powerful generalization of most of the previous
constructions (Construction E, §§9, 10) that may be applied recursively.
Section 7 gives a number of constructions using ideals in algebraic number
fields. One of the most interesting of these is the result, already mentioned
in §1.5 of Chap. 1, that towers of algebraic number fields of the type
exhibited by Golod and Shafarevich correspond to infinite sequences of
extremely dense lattices (§7.4).
Algebraic Constructions for Lattices 207
All the pac kings mentioned in this chapter are lattices. We shall
sometimes take the more general point of view mentioned in §2.2 of
Chap. 2, and regard a lattice A as a discrete subgroup of a real vector
space V in which norms and inner products are defined by means of a
symmetric bilinear form j: V x V - R. The norm of x is given by
j(x) = j(x,x), and we have
j(x,y) = V2(f(X+Y) - j(x) - j(y». (I)
and the superscript A means that all even permutations of the coordinates
are permitted. We use the particular names
w = V2(-I,I,I,n, iH = V2(0,I,u,T).
in which the kernel is {± I}. Table 8.1 below gives much more information
about this homomorphism. Abstractly the icosian group is the perfect
double cover 2. A5 of A5, and is sometimes called the binary icosahedral
group.
The icosian ring ~ is the set of all finite sums ql + ... + qn, where
each qt is in the icosian group. Elements of the icosian ring are simply
called icosians ([Con161, [DulJ, [WiI9]).
The typical icosian q has the form q = a + {3 i + 'Y j + 0 k, where the
coordinates a, (3, 'Y, 0 belong to the golden field Q(T), and so have the form
208 Chapter 8
We shall use two different norms for such vectors, the quaternionic norm
QN(v) = (v, v),
(It is easy to show that EN(v) ~ 0.) The icosians of quaternionic norm 1
are the elements of the icosian group.
With respect to the quaternionic norm the icosians belong to a four-
dimensional space over Q(J5); with the Euclidean norm they lie in an
eight-dimensional space. In fact under the Euclidean norm the icosian ring
~ is isomorphic to an E8 lattice in this space. Table 8.1 (taken from
[WiI9]) displays the particular isomorphism we shall use.
Table 8.1 has 60 entries, one for each pair of elements ±q of the
icosian group. The typical entry in this table:
-i
W = WIG --+ (HJK)
-1 0 0
-1 0 0
+ + -2 2
+ + 0 0
should be read as follows. The top line gives name(s) for q (in this case
wi = W /G = V2 (-I - i + j + k» and indicates the corresponding even
permutation of {G,H,I,J,K}. The four quaternionic coordinates of 2q
appear in the first column, followed by two columns giving the E 8 vectors
representing 2q and 2u q. As usual - stands for -I and + for + 1. The
formulae given in Eq. (74) of Chap. 2 are helpful for manipulating these
quaternions.
The naming system for q = V2(a,{3;y,0) is as follows. The letters i, j,
k indicate that a = 0, W indicates a = -1, S indicates a = -u, t indicates
a = - 7 , and the subscripts indicate the signs of a, {3, "(, 0:
Algebraic Constructions for Lattices 209
o 0 0 - + o 0 0 - + o 0 0 - + o 0 0 0 o 000 000 0
2 - + , 2 0 (J 0 0 + + 1 2 0 0 -t-2 0 0 -q 0 0 0- 2
q 0 + + o + -q 0 0-2 1 2 0 0 --t-2002
, 2 (1 0 + + - + -t-2 -q 0 0-2 1 2 0 0
IH1-(HGIJK) lHJ ...... (HGJKI) (HI( ..... (HGKIJ) 'a--(JGKHI) t",--(KG/HJ) t lJ -(1GJHK)
r - 2 0 0 ·2 0 0 r 2 0 0 -- r - 2 0 + + t - 2 0 + + 2 0 + +
o 0 o (J 0 0 0 o 0 0 + .. 1 -2 + a 0 0 + +
q 0 o o a 0 0 + + 0-2 +
2 o q 0 o - 1 0 -2 + q 0 + + o 0 +
2 0 2 2 0 + + + + + +
0+-00-\- OO-a+ 0+ + ++ + a+
-{1 + - 0 - 2 0 + 0 0 1 a-+ 0+ + 1++-+
-I 0 0 -(] + - 0-2 0 + o 0 I + + + -a + - 0 + - +
0(+00) G 0+-- I
-+++ GH -0++ HI
HG -0-- IH
-+-- GI -0+- JK
--++ IG -0-+ KJ
0+++ H
Using the map in Table 8.1, a vector v = (q] • ...• qn) with n icosian
coordinates is identified with a vector having 8n rational coordinates.
2.2 The icosian and Turyn-type constructions for the Leech lattice. Let L
be the three-dimensional lattice over the icosians consisting of all vectors
(x,y,z), where x, y, z E ~ satisfy
x == y == z (mod h),
x + y + z == 0 (mod h) , (5)
with hh = 2. Then the Euclidean norm (Eq. (3» converts L into a copy
of the Leech lattice. This will be proved in §3, Example (c). Ot is also
established in [WillI, [WiI9J.)
Let G be the automorphism group of L (regarded as a three-
dimensional icosian lattice). G is a double cover 2J 2 of the Hall-lanko
group J 2 = HJ [ConI6, p.421, [WiI91. In fact it follows from the
definition of L that G contains a subgroup S (of order 27.3.3!) generated
by all permutations of x, y, z and by right multiplication of (x,y,z) by
the diagonal matrices {],i, i}, {i,}, k), {w, w, w}. The minimal Euclidean
norm of L is 4. Modulo scalar multiplication (on the left) by elements of
the icosian group, there are four orbits of vectors in L of quaternionic
norm 4, namely
(2,0,0), (O,h,h), (h, 1, 1), (I ,TW,IIW) , (6)
2(v,r)r
v--+v-
(r ,r) ,
ITG.
notation, the vectors v for which
(I)
is in A24 form two E8 lattices in the same space, say EJO and EJ2}. We
can now define A24 to be the lattice generated by the vectors
(a,b,c), a +b +c = 0, a, b, c EEJo ,
(x,x,x), x EEJ2} .
Theorem 1. If C ~ C* then
(A (e)* /A (C»/(C* /C) ;; L * /L.
This implies
We define a homomorphism
(J: A(C)*/A(C) -+ L*/L
where V and V' are subspaces of M such that j(V} = j(V'} = 0, and
V = V', V' = V' * (with respect to j).
Let L = M n ~ R kn with the bilinear form
I(e,m} = I«e l • ...• en}, (mI •...• m n »= ~/(ei,m).
Then C = C· (with respect to j). From Theorem 1, A(C} (with the form
p-II) is integral and
(13)
(c) The Leech lattice. The Turyn-type construction of the Leech lattice
given in §2.2 follows by taking M '"" E 8, I to be usual Euclidean inner
product on E 8, and p = 2. Then M = M /2M is a 4-dimensional space
over F2 which may be written V $ V', where (in the icosian notation)
V = <h,ih,jh,wh >, V' = <h,ih,jh,wh>.
Zo + ZI + ... + Z7 = 0, (14)
Zo + 1r- I ZI + ... + 1r-7Z7 = o. (15)
We take C = B e B', and let Q64 = A (C). Thus Q64 is spanned by the
vectors
0[,0 7), where [ runs through a basis for £s, (16)
(xS), x E {e"e2,f"h}, (17)
Table 8.2. A basis for £8/3£8, an 8-dimensional vector space over the
field F3 (1 denotes - J).
1 2 4 00 3 5 6 0
V 1 1 0 0 0 0 0
el
-1
e2 0 1 1 1 0 0 0 0
e3 0 0 0 0 1 1 1 0
-
e4 0 0 0 0 0 1 1 I
V' 1 1 0 0 0 0 0
fl
-1 -
0 0
f2 1 1 1
-01 0 0
h 0 0 0 0 1
-1 0
-
f4 0 0 0 0 0 1 1 1
or as
~ ~
[1 i 1 i ) . (23)
Thus if a =,8 + 'Y~, a' =,8' + 'Y'~, where,8, ,8', 'Y, 'Y' E Z[;],
cf> (a,a') = ,8F cf> (1, 1) + ,8i cf> (1,n + 'YF cf> (~, 1) + 'Yi cf> (~,~), (24)
where cf> (1, 1) = cf> (~,~) = 2, cf> (1,~) = cf> (~, 1) = 1 - i. We define norms
in Z[~] by N(a) = cf> (a, a).
Since (23) is the same as Eq. (88) of Chap. 7, Z[~] with this inner
product is [!)2' The minimal norm is 2, and the 24 elements of norm 2 are
216 Chapter 8
The inner product in Z4 is the real part of the inner product in Z!r1 or
z[iF. Multiplication by r in z!r1 corresponds to interchanging the two
coordinates of Z[i F and multiplying the second coordinate by i, and to the
operation "(0123) then negate 3" on Z4. The vectors of norm 4 in z[rl
are obtained by multiplying the vectors of norm 2 by + r 1 = J2. The r
theta series of z!r1 is given by Eq. (89) of Chap. 7.
We can write 4> in another way. The trace map Tr from QW to Q(i)
sends a + bi + cJ2 + diJ2 (with a, b, c, d EQ) to 2a + 2bi. For
a = (3 + -yr E Q(r), (3, -y E Q(i), we define
T(a) = Tr(a(] +rl/2» = Tr«{3 + -yr)(1 +rl/2»
= 2{3 + (I + i)-y, (25)
- 1
Figure 8.1. A projection of the polytope {3,4,3l whose vertices are the 24
minimal vectors of D 4 , here represented as elements of Z[l"J.
Algebraic Constructions for Lattices 217
The field F9• By a slight abuse of notation we can also regard the 8-th
roots of unity r' as the nonzero elements of the field of order 9. To be
more precise we let F9 consist of the elements 0, 1, t, t 2 "" 1 - t,
t 3 - - I - t , t 4 =-I, t 5 =-t, ~=-I+t, t 7 -I+t, where
t 2 + t - 1 = 0, t 8 = 1 lMac6, p. 951. Now Zl;)/3Zl;) is identified with
F9 and Zlt1/3Zlt1 with F9 x F9. The homomorphism u: zlt1 -
Zlt1/3Zlt1 - F9 x F9 is given by
u(t) = (t, - t) (27)
b\c 0 I ~ ~2 ~3 ~ ~5 ~6 ~7
0 0 0 0 0 0 0 0 0 0
I 0 -I I I 0 I -I -I 0
~ 0 0 I -I -I 0 -I I I
~2 0 -I 0 -I I I 0 I -I
~3 0 I I 0 I -I -I 0 -I
~4 0 I -I -I 0 -I I I 0
~5 0 0 -I I I 0 I -I -I
~6 0 I 0 I -I -I 0 -I I
~7 0 -I -I 0 -I I I 0 I
and the number of v for which equality holds in (34) is 3P #.cl. We call
the quadruple (Po(b,d, PI (b, d, P2(b,d, P3(b ,d) the type of (b, d, and
set
where
d = min {p (b, c) : b E B, c E C, (b, c) ;z:! (0,0) } (37)
where
° °
§2.5) generated by (ill...]) and (Iww 2 ... w 7 ), so that C = B* is an
[8,6,3] Reed-Solomon code. If b ;: then p (b, c) ~ 2 . 7 = 14, and if
b = 0, c ;: then p (b, c) ~ 2 . 3 . 6 = 36. Thus d = 18, so A (B, C) has
minimal norm 6, and is extremal. Its theta series is
0 D4 (Z)8 - 1920 D4 (z)46 16 (Z) + 5766 16 (Z)2
= 1 + 261120q6 + + 535818240qlO
18947520q8
+ 8320327680ql2 + 83347937280q14 + ... , (42)
1 [(k+lH 0]
.Jk + 1 8 - 21 I' (43)
° °° ° °° °°
° °
I -I -I
A=
-I
° °, ~=
-I
° °° °° I -I
°°° -I
of sizes (n
-I
+ I) x (n + I)
°
and n x n respectively, then the rows of
2
Aif
Algebraic Constructions for Lattices 223
form a simplicial basis for ~A, and ~M is a generator matrix for ~A.
Although ~A depends on the particular simplicial basis used, its
determinant does not.
Theorem 6.
det ~A = (n + 1) 2det A. (48)
where J is the all-ones matrix. Then ~A~ = .In+T An. The minimal
norm has increased from n to 2n + 2.
(b) Craig's lattices. The following lattices were first described by Craig
[Cra5] using the construction of §7.3c. As a simplicial basis for An we
take the rows of ,i itself, and define An(m) = ~m-I An for m = 1,2, ....
Thus the rows of ,im form a simplicial basis for An(m). For example AJ3) is
spanned by the rows of
1 -3 3 -1 0 0 0
o -3 3 -1 0 0
3 -1 0 o 0 +1 -3
-3 3-1 000
which (assuming that the lower bound is close to the actual value) is
inferior to the lattices constructed in §9 (compare Table 1.4).
(52)
We apologize for the confusion caused by the multiple uses of the word
"norm". We use N for the norm of a lattice vector (§2.1 of Chap. 2) and
Norm when the word is used in the sense of algebraic number theory.
The two most interesting cases for our purpose occur when K is either
totally real (all the conjugates ()(j) are rea!) or totally complex (none of
the ()O) are rea!). If K is totally complex then n = 2s, say, and we label G
so that
a(S + J) = a(J), ... , a(2s) = atn
if K is totally real, or
a - v (a) = (Rea(J), Ima(\), ... , Rea(s>, Ima(s» (54)
if K is totally real, or
(55b)
if K is totally complex. The trace norm defined by (55a), (55b) is just one
of many possible ways of defining a norm on K; another is given in §7.5.
If we define c = 1 if K is totally real and c = V2 if K is totally complex,
(55a) and (55b) may be combined into
N(v(a» = c TrKIQ <laI 2). (56)
Let (!J denote the ring of algebraic integers in K, and let WI, ••. , W n
be an integral basis for (!J. The matrix n = (w?» (1 ~ j, k ~ n) has the
property that the (j, k)th entry of n n is
TrKIQ (w j Wk),
Proof (Cf. [LeVI, 11, p. 681.) We may choose an integral basis for d of
the form
(59)
where aij E Z. Then det A (,r;1) = (a 11 a 22 . . . ann) 2 det A ( (0, and one
can show that all' .. ann = Norm (,r;1) = number of residue classes of @
modulo d.
For a E @ let M (a) be the n x n integral matrix defined by
= M(a) (60)
Then
n diag {a(I), ... , a(n)} = M (a) n , (61)
where f!lJJ, f!lJ2 have Norm 33 and 211 has Norm 13. Let d = f!lJ1 f!lJ2 211.
Then Craig [Cra4] shows that A (.91) = A24 . However, this is not a very
simple way to construct A24, and the proof that A (.91) is A24 is fairly
complicated. A more natural cyclotomic construction of A24 is given in
§7.5.
(c) The lattices A;m). Craig's lattices A;m) described in §6 were
originally constructed in [CraS] as the lattices A(.9I), where d is the ideal
((I _!p)m+l) in the cyclotomic field Q(!p) and p ... n + 1 is a prime.
7.4 Lattices from class field towers. As pointed out by Litsyn and
Tsfasman [Lit3], the infinite class field towers found by Golod and
Shafarevich [GoI9], Martinet [Mar2], [Mar3] and others [RoqI1 produce
infinite sequences of very dense lattices. For example, these authors show
that an infinite sequence or tower of totally complex fields
(64)
[Hasl, Chap. 25, §51. Applying the construction (57) to the ring (!); of
algebraic integers in K;, we obtain a lattice A «(!) of dimension n;. From
Theorem 8 the packing radius and center density satisfy p ~ .Jil;/2.J2,
(69)
and the element v = 1 + q + ... + qP-1 in the group ring Z[q] satisfies
vd- (l-qP)A=O.
(74)
where f!) is the different of K/Q. (c) Conversely, given any ideal .91 of
Z[~] and a totally positive element,), E Z[~] satisfying (76), .91 becomes a
positive definite integral lattice if we define
(77)
Now r-I. ... ,r(p-l) is a basis for Kover Q, and there exists a dual basis
(J I, . . . , (Jp -I satisfying
then
(79)
and (75) follows from (78), (79). Furthermore, since A is positive definite,
TrK/Q(a')'a> = (a,a) >0
for all a E K, a ;II! O. This implies that')' is totally positive. (b) We also
know that u . v E Z for u, v E d, so
TrK/Qha~) E Z for a,{3 E .91,
(82)
(b) (84)
-I -I
But (1- t) ~ has index p in ~ , so finally we may conclude that
-I -
(1-t) ~ = dd'Y, (87)
(1-t)d* = d. (88)
(90)
Also let ka+l = O. Then the new lattice L in R n consists of all vectors of
the form
a k;
I + ~ ~ aj
(;) ()
II; Cj , (91)
;-1 j - I
n-1; k i
det L .. 4 i-I (92)
1; ki- n
~ ~ 'Y- n / 2 2i - 1 (93)
1 1 111
010 010
001100
o 0 001 111
o0 0 2 0 0 0 0 '
00000 200
o0 0 0 0 0 2 0
o0 0 0 0 0 0 2
and has minimal norm 4, determinant 28, and ~ ... r4.
MI 0 0
~
MI=~
M=
M2 M2 0
,
M2
M3
0
M3
M2
M3
M- 5EJ
2-~
Figure 8.2. Generator matrix M for the [48, 31, 81 Rao-Reddy code.
Here u - (11111111), and .YEs (Eq. (57) of Chap. 3),88 , M], M2 are
generator matrices for [8, 4, 41, [8, 7, 21, [16, 5, 8], [16, 11,41 codes
respectively.
and kissing number given by Eq. (17) of Chap. 5. Also BW4 == D4 == A4,
BWs == Es == As and BW 16 == A 16 . After multiplication by 1/.J2, BW32 is
Algebraic Constructions for Lattices 235
Proof (98) holds because for each i = 0, ... ,a the lattice satisfies
ra _j - r a _j -I independent congruences modulo 2j + '. The evaluation of
the minimal norm is straightforward and is omitted.
By changing the scale and relabeling the codes, Construction D may be
restated in such a way that the norms and determinants of Land L' agree.
Then if the Cj are Reed-Muller codes, as in Example 8.2f, the two lattices
coincide. In general however the two constructions produce inequivalent
lattices with the same density.
9. Construction E.
The following rather general construction includes many of the earlier
constructions as special cases. It was first given in [BariS] and [Bos3].
The ingredients for the construction are a lattice A in Rm, an
endomorphism D of A that satisfies certain conditions, one of which is that
AIDA is an elementary abelian group E of order pb, say, and a family of
codes Co ;;2 C 1 ~ •.• ;;2 Ca of length n over E; the result is a family
Lo ~ L 1 ~ . . . ~ La of lattice packings in Rmn.
Hypotheses.
(i) Let A be a lattice in R m with minimal non-zero norm M.
(ij) Let D be an endomorphism of A which is also a similarity (i.e. a
constant times an orthogonal transformation) and which satisfies
,
pD- 1 = ~ ajD j (99)
j-O
pK ~ K ~ A, (loo)
pK ~ pA ~ DA ~ A, (101)
for i = I, ... , a, and (2) some rearrangement of C I, ••. , Cbk I forms the
rows of an upper triangular matrix.
Construction E. Let Lo = An and, for i = 1,2, ... , a, define
(104)
where the union is taken over all x I, . . . ,Xbk j E {O, 1, ... ,p - J}. By
abuse of notation we shall also use D and T to denote the maps
(D,D, ... ,D) and (T, T, ... , T) acting on Rmn. It is clear that Lo is a
lattice and that D and pT are endomorph isms of Lo.
Theorem 15 [Bos3]. For i = I, ... ,a,
(a) L; is a lattice in R mn , and in fact
L; = Z<L;_h T;Y(cI), ... , T;Y(Cbk) > ; (105)
which is (c).
Theorem 16 [Bos3]. For i = 0, I, ... ,a, the determinant, minimal norm
and center density of Li are given by
i
logp Li = n logp det A - 2b ~ kj' (107)
j-I
and
o= M mn / 2 / 2mn (det L i ) 1/2 (109)
respectively.
Proof Equation (107) is immediate from (104), and (108) follows from
the definition of Li and the fact that the minimal distance of Ci is d i .
Usually we are only interested in the finest lattice La. The construction
may now be applied to La' since it inherits D and T from A, and (99) still
holds. The values of p and t are unchanged, while b becomes nb. A
lattice obtained by applying Construction E to A is denoted by 7] (A) (in
Table 1.3 for example).
where ~ is a primitive nth root of unity in the field of order 22b and
s = 2;-1 - 1 (see the proof of Theorem 9, Chap. 11 of [Mac61(I».
Besides being additive, these codes are also closed under multiplication by
elements of F2b. However we make no use of this multiplicative structure
in our construction. Clearly Co ~ C 1 ~ C 2 ~ ... . For n less than
2b + 1 the codes are shortened by setting the appropriate number of
information symbols equal to zero. If n lies in the range 2 ~ n ~ 2b + 1,
we use the codes C h C 2 , . . . • Ca , where a is determined by
2 a ~ n < 2a+l. Then the value of };j_1 k j for use in (107) is
an - 2a +1 + a + 2. (110)
(!)That theorem is incorrect if the field size q is odd (see [Mac6, p. xii])
but that does not concern us since here q is even.
240 Chapter 8
The examples that follow are descendants of the lattices Z2, K 12 , A24
and P 4Sq .
(c) Packings constructed from the lattice Z2. Let A be the two-
dimensional square lattice Z2 with minimal norm M = 1 (see Fig. 8.3).
Although this is not a particularly dense packing, it has surprisingly good
progeny. We let D map (1,0) to (I, 1), and (0, I) to (I,-I), or in matrix
notation, with D mapping v to vD,
so that Eq. (99) reads 2D- 1 = D. Then A/DA ;;; Z/2Z, pb = 21, and we
may take K to be the I-dimensional lattice spanned by VI = (I, 0) (see
Fig. 8.3) .
0 v,
respectively.
E s (the first grandchild of Z2) also has an essentially unique norm-
doubler. If £s is defined by Eq. (99) of Chap. 4, then we may take
Algebraic Constructions for Lattices 241
h 0 0 0
D= ~~~~'h=[!_!]. (I 14)
o0 0 h
1 8 -4 7 56 12 13 104 60
2 16 -4 8 64 20 14 112 68
3 24 -4 9 72 28 15 120 76
4 32 0 10 80 36 16 128 88
5 40 4 11 88 44 17 136 100
6 48 8 12 96 52
(d) Packings constructed from the Coxeter-Todd lattice K\2. We use the
complex 6-dimensional version of K \2 defined in Example lOa of the
previous chapter (the "2-base"). This has a norm-doubling map
D:(a,b,c,d,e,f) - (wa+wb,wa-wb, ... ,we+wf,we-wf),
where a = [log2n 1. In dimensions 228 to 780 these are denser than any
other lattices constructed in §4, but are inferior to Craig's lattices.
242 Chapter 8
3 -1 -1 -1 -1 -1 -1
-1 -3 -1
-1 -1 -3 (116)
4
-1 -1
-1 -1 -3 -1
from (112), where lEI < 12N- 1log 2(N/6). The first term on the right side
of (118) is -lh log2 (48/e1l").
(f) Lattices constructed from a norm-trebling map for A 24. Suppose the
MOG coordinates for a Leech lattice vector
WI W2 W3 W4 W5 W6
XI X2 X3 X4 X5 X6
(119)
YI Y2 Y3 Y4 Y5 Y6
ZI Z2 Z3 Z4 Z5 Z6
-1 -5 -1
-1 -1 -5
6
-1 -1
(123)
-1 -1 -5 -1
It is simpler to work with the density ~ rather than with 0, so let us define
log2~
11 = ---.
m
(We know from Chap. 1 that for large dimensions m the best packings
satisfy O' 599 ~ 11 ~ I.) Using (18) of Chap. 1, (125) becomes
The solution of (125), (126) is 11 (m) = log;m , the smallest value of k for
which log210g2 ... log2 m (with k log2's) is less than 1. In other words
as the dimension N -+ 00, these lattices have density ~ satisfying
(127)
(127) holds for any choice of the initial lattice. The actual rate of growth
is quite slow. For example the 324-dimensional lattice 11 (K 12) has children
with
1
N log2 ~ = -2.006 ... +~ (J 28)
and so on.
Acknowledgements. We thank E. S. Barnes, M. Craig, W. M. Kantor,
H.-G. Quebbemann and 1. G. Thompson for helpful correspondence and
discussions. §§8-11 are based on [Barl5], [Bos3], [Con37].
9
Bounds for Codes and Sphere Packings
N. J. A. Sloane
1. Introduction
The introduction of the techniques of harmonic analysis and linear
programming into sphere packing and coding theory has resulted in a
considerable strengthening of the classical bounds. Our aim in this chapter
is to describe a derivation of the new bounds from the analytical theory,
which we quote without proof in §2.
The first step towards these bounds was taken by MacWilliams, who
proved the surprising result that if C is a linear code then the weight
distribution of the dual code C· is a certain linear transformation of the
weight distribution of C. (Eq. (50) of Chap. 3, [Mac2], [Mac6, Chap. 5,
Th. 1]. See §2 of Chap. 3 and [Mac6] for terminology from coding
theory,) Of course this implies in particular that this linear transformation
(it is actually a Krawtchouk transform, as we shall see in §3.n of the
weight distribution of C has nonnegative entries.
The next step was taken by Delsarte ([DeI8], [Mac6, Chap. 5, Th. 6])
who showed that the same, Krawtchouk, transform of the weight
distribution of any code, linear or nonlinear, has nonnegative entries (see
Theorem 1 below). This result has had far-reaching consequences. One of
the main problems in coding theory is to determine the function A (n, d),
which is the maximal number of binary vectors of length n that can be
found with the property that any two of the vectors differ in at least d
places. Using his result, Delsarte showed that the value of A (n,d) is
246 Chapter 9
and to examine how this rate behaves as a function of the ratio din when
d and n both increase, for 0 ~ din ~ 1. In fact it is enough to consider
the range 0 ~ d In ~ lh, for it is not difficult to show (using for example
the Plotkin bound (45)) that, in the range V2 ~ d In ~ I, R (n, d) - 0 as
n - 00. The McEliece et al. (or lPL) bound on A (n,d) states that, for
o~ din ~ lh,
as n - 00, where h(x) = H2 ((J - .JI-x )/2), and H 2(x) is the binary
entropy function defined in (72) of Chap. 7. In the range
0.273 < din ~ 0.5 the minimum in (I) is attained at u = I - 2dln, and
the bound simplifies to
In the other direction Gilbert proved in 1952 ([Gill], [Mac6, Chap. 17,
Th. 30]) that, for 0 ~ 0 ~ lh, there exists an infinite sequence of codes
with din ~ 0 and rate
o.e
+ 06
:q
c
Ci" 04
0 .2
0.1 0 .2 0 .3 0 .4 0 .5
d/n-
Figure 9.1. Asymptotic bounds on the best codes, showing
R (n ,d) = n- I iog 2 A (n,d) as a function of din as n -- 00.
The bounds (1), (2) and (3) are plotted in Fig. 9.1. For large n the best
codes lie somewhere in the shaded region.
The linear programming method has proved equally effective in
studying codes of shorter length. [Bes3) gives a large number of bounds on
A (n, d) and A (n, d, w) that were obtained in this way for codes of length
n ~ 24. Some examples will be given in §3.3. Table 9.1 shows the
present state of knowledge about small values of A (n,d). Note that it is
enough to consider even values of d ~ 4, since A (n, 21 - 1) = A (n + 1,21),
and A (n, 2) = 2n- 1 [Mac6, Chap. 21. The unmarked entries in the table
are taken from [Bes3) or [Mac6). References to other tables will be found
in §2.I of Chap. 3. See also [Bes2J, [Roo1).
The next major advance was the paper by Kabatiansky and Levenshtein
[KabI), which succeeded in establishing bounds for sphere packings
analogous to the JPL bounds for codes. In order to obtain their bounds
Kabatiansky and Levenshtein extended the linear programming approach
still further to include a number of packing problems on Riemannian
manifolds. Their paper contains many new bounds, the most important
being an upper bound on the highest density .:In of any packing of equal
spheres in n-dimensional Euclidean space Rn. The classical results of
Minkowski and Blichfeldt (see §1.5 of Chap. 1, [Rog7]) state that
n n +2
-n <
-
< - -2 + log2 -2
log 2 .:l n _ -' for all n.
Table 9.!. The best codes: bounds for A (n,d) (a: [Besl], b: [Hon3],
c: [Rom I], d: H. O. Hiimiiliiinen, personal communication).
n d=4 d=6 d=8 d=1O
6 4 2 I I
7 8 2 I 1
8 16 2 2 1
9 20 4 2 1
10 40° 6 2 2
11 72-79° 12 2 2
12 144-158° 24 4 2
13 256 32 4 2
14 512 64 8 2
15 1024 128 16 4
16 2048 256 32 4
17 2720 c -3276 256-340 36-37 6
18 5248 d -6552 512-680 64-74 10
19 10496d -13104 1024-1288 128-144 20
20 20480°-26208 2048-2372 256-279 40
21 36864-43690 2560-4096 512 40-48 b
22 73728-87380 4096-6942 1024 48-88 b
23 147456-173784 8192-13774 2048 64-150
24 294912-344636 16384-24106 4096 128-280
1 1 + sin fJ 1 + sin fJ
- log2 A (n ,fJ)
n
< 2 sin (J log2 2 sin (J
1 - sin (J 1 - sin (J
log2
2 sin (J 2 sin (J
and use this to derive (5). The main goal of the present chapter is to give
a simplified account of Kabatiansky and Levenshtein's general theory and
to sketch how their bounds are obtained.
The linear programming method has also proved successful in low
dimensions. As we shall see in Chap. 13, it can be used to solve the kissing
number problem in 8 and 24 dimensions.
The general theme of this chapter is the problem of finding nice
arrangements of points in various spaces. The four examples we are
primarily concerned with are the following.
Example El. The space is "Hamming space", i.e. the set F~ = {o,l}n of
binary vectors of length n, and a binary code is a subset of F~ (see §2.1 of
Chap. 3).
Example E2. The space is "Johnson space", i.e. the subset F~'w ~ F~
consisting of all vectors containing wI's and n - w O's. A subset C of
F~' w is a constant weight code, and A (n, d, w) is the greatest cardinality of
a constant weight code in which distinct codewords have Hamming
distance at least d apart. (The name Johnson space was chosen because
S. M. Johnson was the first to extensively study A (n, d, w) - see [Mac6J.)
°
Example E3. The space is the "spherical space" On, and a finite subset of
n is a spherical code. In this example we always assume n ~ 3, the
cases n ~ 2 being special (and trivia!).
Example E4. Finally there is Euclidean space Rn. A subset ceRn such
that N (x - y) ~ 4p2 for x, y E C, x ¢ y, is a sphere packing of radius
p.
In §2 we quote the machinery needed from harmonic analysis, the main
purpose being to construct certain functions, the zonal spherical functions,
associated with each of the packing problems to be considered. §3 shows
how the linear programming bounds (Theorems 2-4) are simply derived
from the results in §2. A short proof is also given of the "mean inequality"
for codes (Theorem 5). §§3.3-3.5 given many applications of these bounds
to Examples El, E2 and E3. Table 9.2 for instance gives bounds on the
number of spheres that can touch a pair of touching spheres of the same
size. The crucial link between spherical codes (Example E3) and sphere
packings (E4) is provided by Theorem 6. Finally §4 gives a brief account
of other recent bounds. As background references [DymI1, [Mac1],
[MiI3], [TerIl and [Vill] are particularly recommended.
Table 9.2. How many spheres can touch two spheres? Bounds on
A (n,cos-II/3), from [Assn The lower bound for n = 4 is taken from
[MacOl.
I 2 6 32-37
2 5 7 56
3 9 8 64-78
4 14-15 9 96-107
5 20-24 10 ~I46
T = {O, I, ... ,n}. A typical element of G has the form g == (J7r, and
consists of a permutation 7r E Sn followed by a sign change (J - diag
{(_I)a t , • • • , (_I)an), aj ,. 0 or 1. The subgroup H fixing the vertex
Xo = (1, I, ... , I) is Sn itself, and the natural map G - G /H .. M sends
g to (_I)a.
(E2) M = Johnson space Fi"w with w ~ n/2, dx,y) ., 'h Hamming
distance between x and y, T = {O,I, ... , w}, H" Sn-w x Sw' (E3)
M .. On' dx,y) = X'y, T "'" [-1,11, H '" SO(n-I). On this case
cos- 1 (x' y) is the metric on M, but it is simpler to work with x .y.)
The final assumption we shall make about G is that (a) if G is infinite,
then M is a connected Riemannian manifold and T is a constant times the
natural distance on the manifold, and (b) if G is finite, and
do = min dx,y) for x,y E M, x ¢ y, then M has the structure of a
graph in which x is adjacent to y if and only if T (x ,y) ... do, and
furthermore T is a constant times the natural distance in the graph.
These assumptions are quite restrictive. In fact if G is infinite then
Wang ([Wan2]; see also [HeI6, p. 5351, [Tit 11, [Woll, Th. 8.12.2]) has
proved that the following are the only possibilities for the space M:
(a) the sphere On,
(b) real projective space pn(R) == SO(n+I)/O(n),
(c) complex projective space pn(c) = SU(n+I)/U(n),
(d) quaternionic projective space pn(H) = Sp(n + I)/(Sp(n) x Sp(l),
(e) the Cayley projective plane p2(Cay).
These are the compact Riemannian symmetric spaces of rank one, and
(a,H) is an example of a Gelfand pair ([BouO], [Gell], [Kra2], [LeU],
[Let2]) .
The finite 2-point-homogeneous spaces M have not yet been completely
classified, although they have been the subject of an enormous amount of
research in connection with distance-transitive graphs, strongly regular
graphs, two-weight codes and association schemes (see [BanI I], [BanI21,
[Big2], [Big3a], [Big4], [Big5], [Buml], [Call], [Cam2], [Coin, [Coi2],
[Curl], [DeI9], [Dell 11, [Dell21, [Dell4], [Dun11-[Dun9], [Goe4], [Gor11,
[Hub11, [Kan51, [LeolO], [Leoll], [LinI21, [McKI], [Sei11-[Sei3], [SI05],
[Smi11-[Smi3], [Sta41, [Sta8]). Some of the most important examples are:
(f) Hamming space F~, or more generally the space F; of n-tuples from
Fq , with dx,y) = Hamming distance,
(g) Johnson space F~' w as in Example E2,
(h) the space whose elements x, y , ... are k -dimensional subspaces of F;,
where k ~ n/2, with dx,y) == rank(x n y),
(j) the space of maximal totally isotropic subs paces of an orthogonal,
unitary, or symplectic geometry over a finite field, with dx,y) ==
rank (x n y), and
252 Chapter 9
where
It is clear that pff> (h) = I for h E H. The functions p/f) (g) are constant
on left cosets of H, and can be written as p/p(x), x E M [Vill, p. 53].
Then
.p; Pl(f> (x), ... , .p; PJZl (x)
is an orthonormal basis for V(k) [Coi2, Th. 1.10]. Any element of L 2(M)
has a "Fourier expansion"
dk
u (x) = ~ ~ cN) p/p(x), x E M, (7)
k i-l
II
MM
h(x,y) u(x)iiTyTdjt(x) djt(y) ~ 0, (10)
holds. (Conditions (10) and (11) are equivalent - see for example
Bochner [Bocl].)
(in Since the representation p(g) afforded by V(k) is unitary, it also
follows from (9) that J k (x ,y) is independent of the particular choice of
basis for V(k), and furthermore that
where
dk _ __
<l>k(r(X,y)) = ~ pH)(x) pH)(y). (14)
i-I
The function <I> k (r), which is a continuous function of t defined on the set
T (the range of T), is called the zonal spherical function associated with
V(k) (see [Coi2], [Dun?], [ErdJ], [Ganl], [Miill], [StalJ], [ViiI]). If we
let r(x, x) = TO, then
(v) An alternative expression for <l>k (t) may be obtained as follows ([Coi2,
p. 3S], [Yill, p. 30)). By definition,
p[fl(g) = (p(k) (g)a, a), (17)
gx(xo) = x, gy(xo) = y,
then
(I 9)
In the literature pa)(g), Fk(x,y) and <l>k(t} are all referred to as zonal
spherical functions (or kernels). The name comes from the identification
of points x E M with left cosets gH. Then Hx represents a "sphere" in M
centered at Xo and passing through x, and is identified with the double
coset HgH. From (1S) p{P(x) is constant on these spheres.
Example EI (see [Dunl], [DunS)). L 2 (M) consists of the complex-valued
functions on the vertices of the n-cube, and has a basis consisting of the
monomials c/>~l ... c/>;', where (al •...• an) E Fg and c/>i is the ith
coordinate function (with c/>l = c/>i)' G permutes and/or negates the c/>i
while H just permutes them. V(k) consists of the polynomials of degree k
in c/>l •...• c/>n, with dk = [Z], for k = 0,1, .... n. The fixed vector
a = ef in V(k) is ~ c/> ~l ... c/>;', the sum being over all (a 1, . . . • an) with
weight k (i.e. which contain k ones). Then <I> k (t) is a special case of a
Krawtchouk polynomial (see [Mac61, [Szel)):
for k = 0, I ..... n.
Example E2 (see [De1l2], [Dun2)). L 2(M) consists of the complex-valued
functions on the w-subsets of an n-set, and decomposes into orthogonal
subspaces {V(k), 0 ~ k
~ w}. Vk has dimension d k = ~ [Z]- [k I]'
and is described explicitly in [De1l2] (where it is denoted by Harm (k».
Vk affords the irreducible representation of Sn corresponding to the two-
rowed Young tableau [n - k, k] (cf. [Mil3, §4.2)). The corresponding
zonal spherical function is
where
256 Chapter 9
k
Qk(t} = ~ (_1)i (22)
i-O
\1 2f = ft + ... + ft = 0.
aX[ ax;
V(k) is usually denoted by Harm(k) and its elements are called spherical
harmonics. It has dimension
d =
k
[n +k-
n-l
1) _ [n +nk- l- 3).
The corresponding zonal spherical function is a Gegenbauer or
ultraspherical polynomial, which is a special case of a Jacobi polynomial.
To avoid confusion of notation we write it as a Jacobi polynomial, using
the standard notation of [Abrl]:
pla ,f3l(t)
<I> k (t) = [k t a) , k = 0, I ..... (23)
(I 2). It is easy to see that the product of two p.d.k.'s is a p.d.k., and a
sum of p.d.k.'s with positive coefficients is a p.d.k. The p.d.k.'s that are
given by the zonal spherical functions are called elementary, and clearly
any sum
F(x, y) = ~ Ak It (x, y) (25)
k
It is immediate that
258 Chapter 9
a TO = 1, (27)
at ~ 0 for t E T, (28)
~ at = lei, (29)
t E T
~ 0 by (J]).
s
maximize ~ a Tj (30)
i-I
subject to
a Tj ~ 0, i = 1, ... , s,
s
~ aTj<l>k(Ti) ~ -1, k =0, 1, ....
i-I
subject to
h ~ 0, k = 1, ... ,N, (34)
N
~ h tfl k (t) ~ - 1, for t E S. (35)
k -I
and the sum converges for all t E T. The mean of F over C and over M
are defined by
= f
M
F(x,y) d/l(x), for any y E M,
since F (x,y) only depends on dx,y)' Thus F (M) = 10, using (! 6) and
<l>o{t) = l.
Theorem 5 (The mean inequality [Kahl1. [LevS], [Sid3]). For any
invariant p.d.k. F we have
or equivalently
1
2 ~ I(dx,y» ~ 10.
C1 x,y E C
~
1
x TCf2
F(x, x) =
1
fc
1(70)' TCT
Note that the only properties of zonal spherical functions used to prove
Theorems 2-4 are that they are positive-definite kernels invariant under G,
The theorem quoted in §2.4, that the most general continuous functions
with these properties are positive sums of zonal spherical functions, (a)
justifies our restriction to functions of the form (36), and (b) is used to
derive the mean inequality and therefore in the second proof of Theorem 4.
In general the value of the linear programming bound 1 + A' (see
Theorem 2) is unknown. Nor is it known in general how close the bound
comes to the true value of A (M, S). For small problems it is usually very
close and occasionally does give the exact value of A (M, S)
3.3 Bounds for error-correcting codes. In Example E1 there are just n+1
distinct <P k 's, and so we may take N = n in (33) and (36) (and similarly
in all the cases where G and M are finite). Theorem 4 now states that if
n
I (t) = ~ !k Kk (t ; n) (42)
k - 0
Bounds for Codes and Sphere Pac kings 261
and deduce that A (8, 4) ~ 16. On the other hand the Hamming code Jffs
(§2.4.2 of Chap. 3) shows that A (8,4) ~ 16. Thus A (8,4) = 16. The
code is self-dual and the nonzero codewords have weights 4 and 8, the
zeros of f(t).
(jj) The technique suggested by the first example also works in some other
cases. For example the Golay code C(j 24 implies that A (24, 8) ~ 4096.
The lowest degree polynomial that satisfies the constraints and vanishes at
the nonzero weights of the dual code is
Also ao = 1 and the remaining at's are zero except perhaps for a6, ag, a 10
and a12' The primal problem is to maximize a6 + ag + alO + a12 subject
to ai ~ 0 and
Solving the primal problem by the simplex method with this additional
inequality gives A (13,6) ~ 32. Therefore A (13,6) = 32 and the Nadler
code is optimal. By analyzing the solution to this linear program in more
detail, Goethals [Goe31 has shown that the code is unique.
(iv) The best available bounds on A (n,d) for n ~ 24 and d ~ 10 are
given in Table 9.1; many of the upper bounds were obtained from Theorem
2 and the simplex algorithm, with the addition of extra inequalities (as in
the previous example) whenever possible.
(v) Returning to Theorem 4, the best choice for a linear polynomial is
f(t) = Ko(t;n) + n K 1(t;n)/(2d-n) = 2(d-T)/(2d-n), for 2d > n.
This satisfies the constraints of the theorem and proves that
2d
A (n,d) ~ -d--' for 2d > n.
2 -n
A(n,d)~2[2d~nl (45)
(vij) As we have already discussed in Section 1, for large nand d the best
upper bound on A (n, d) presently known is the JPL bound. The simpler
part, given in (2), is obtained from Theorem 4 by using a polynomial of
the form
3.5 Bounds for spherical codes and sphere packings. Example E3,
continued. Theorem 4 now takes the following form: if
f(t) = ~!k
N
k-O
p1a,a)(t), CI' = -=--,
n 3
2
(49)
A(n,o):::;;f;~). (50)
(i) The kissing number problem. This result will be used in Chap. 13 to
obtain bounds on the kissing number problem, the case A (n, 7r /3), and in
Chap. 14 to prove that certain arrangements of spheres achieving these
bounds are unique.
264 Chapter 9
(ii) Tables of bounds on A (n, () for some other values of () and for certain
packing problems in the projective spaces pn (R), pn (C) and pn (H) have
been calculated in [Assll. For example Table 9.2 gives some bounds on
A (n, cos- 1 1/3), which is the maximum number of nonoverlapping spheres
that can touch a pair of touching spheres in Rn + 1 (Chap. 14, Th. 1). E.g.
five billiard balls can be arranged so that they are all in contact with two
touching billiard balls, implying A (2, cos- 1 1/3) = 5.
The values A (7, cos- 1 1/3) = 56 and A (23, cos- 1 1/3) = 4600
correspond to arrangements of spheres in the E 8 and Leech lattices, and
were independently found by Levenshtein [Lev7]. In Chap. 14 it is proved
that the corresponding spherical codes are unique.
(iii) Kabatiansky and Levenshtein [Kabll show that the best linear and
quadratic polynomials are f (t) = t - sand f (t) = (t - s) (t + I), where
s = cos (). The corresponding bounds are
f (t) = _1_ { ph.a? (t) p~a,a) (s) - p~a,a) (t) P~"+I) (s) J2 (53)
t-s
(54)
for cos () ~ d~L where the Jacobi polynomial p~a,a) (x) has k simple zeros
1 > t (al
l,k
> ... > t k,k
(a) .
Bounds for Codes and Sphere Packings 265
(Eq. (66) of Chap. 1), which for 8 = 71"/3 leads to the asymptotic bound on
the kissing number given in (49) of Chap. 1.
To deduce their bound (5) on the density of an n-dimensional sphere
packing, Kabatiansky and Levenshtein make use of the following analog of
Elias's inequality (48).
Theorem 6 [YagIl The highest density d n of any sphere packing in Rn
satisfies
d n ~ (sin V28)n A (n + 1,8), for 0 < 8 ~ 71". (56)
4. Other bounds
(i) Lovasz [LovI] has solved a coding problem of long standing by
determining the "capacity" (see [Sha4]) of the pentagon. His method,
which gives a new way to bound the capacity of any graph, turns out to be
closely related to Delsarte's linear programming bound for subsets of an
association scheme (see [McE2], [McE3], [Sch9]).
(iO An unusual method for obtaining lower bounds on A (n, d, w) was
given in [Gra2] (see also [GraI], [Gra3], [Hon2], [Hon3], [Klrj>I]). This
yields
266 Chapter 9
which implies
A(n,4,w) _nw-l/w! asn --+00;
and
A (n, 2 0, w) :::: n w - 0 + 1/w! as n --+ 00.
1. First lecture
1.1 Some exceptional behavior of the groups Ln (q). The general linear
group GLn (q) is the group of all linear automorphisms of an n-dimensional
vector space over the field Fq , q being any prime power. The special linear
group is the normal subgroup consisting of the automorphisms of
determinant 1. The center of either of these groups consists of operations
of the form x - kx (for kEFq), and we obtain the corresponding projective
groups PGLn (q) and PSLn (q) by factoring out these centers. PSLn (q) is
a simple group (for n ~ 2) except in the two cases n = 2 and q = 2 or 3. It
was called by Dickson [Dicl1 the linear fractional group LF(n,q), but we
shall use Artin's abbreviation Ln (q) [Artll
When n = 2, we take a basis y,z for the space, so that the operations
of the group SLn(q) have the form y - ay + bz, z - ey + dz (with
ad - be = 1). The projective line PL (q) consists of the q + 1 values of
the formal ratio x = y/z (which are conveniently thought of as the q field
elements together with the formal ratio 00) and, on the projective line,
268 Chapter 10
provided that Q' is the set of powers of the field element k; for (3b a Q takes
x to kbx + a, while (3b a Q-yac takes x to e - (kbx+a)-l, and plainly
every operation of L2 (q) can be expressed in one of these forms.
The necessary set of defining relations varies slightly with the structure
of q: when q is a prime congruent to 3 modulo 4 we have
L 2(q) = <a,(3,-y:aq = (3'h (q-Il =-y2=af3· a- k = «(3-y) 2 = (a-y) 3= 1 >,
since it is easy to see that these relations enable us to put every function of
a, (3, -y into one of the two forms above. (af3 denotes (3-1a(3,) In the cases
q = 3,5,7,11, we shall take k = 1,4,2,3; for p = 5, the relation
(a(3-y)S = 1 completes the above set.
and define 71" i as a - i 71" a i . (Mnemonic: 71" interchanges 00 with 0, and takes
x to nx or x/n according as x E Q' or x EN', where n = 2,4,3,6 in the
respective cases.) It is convenient to define 71" to be the identity
00
permutation of n.
Theorem 1. The group L 2 (p) (p = 3, 5, 7,11) leaves invariant the set II
consisting of the p involutions 71" i (j En').
Proof woo, WI> W3, W4 WS, W9 are linearly independent in "/I( so ~12 is at
least 6-dimensional. But WN = wQ = 0, so that W {} = 0 and
WN-i = WQ-i = 0 for i En'. Thus (Ci) E ~12 implies that ~CiWi = 0,
and the Wi satisfy at least six linearly independent relations, from which
the statements follow.
We define linear maps A, B, C, D on f!( by:
A :Xi -+ Xi+1> C :Xi -+ ± x-Iii, D :Xi -+ Xio,
the 48 vectors, namely {±voo } {±vi:i EO'} and {±wi:i E Ol. This
must be a direct product C 2 x M ll , (where C 2 is a cyclic group), since it
has a subgroup Mll of index 2 fixing Voo and -V oo separately, with orbits
of sizes 1, 1, 22, 12, 12, namely {v oo }, {-v oo }, {± vi:i EO'} and
{wi:i EO}, {-wi:i EO}. Note that the permutation representation of
2M lIon 22 objects here is not the direct product of permutation
representations of C 2 on 2 objects and M II on 11 objects, since the
subgroup MIl is still transitive on all 22 objects. There is a second
conjugacy class of subgroups M II in M \2, obtained by interchanging the
roles of the Vi and Wi'
There is a subgroup SL 2 (I1) = <A,B,C> with two orbits of size 24,
and a subgroup L 2 (I1) with orbits of sizes 1, 1, 11, 11, 1, 1, 11, 11,
namely {v oo }, {vi:i EO'}, {woo}, {wi:i EO'} and their negatives. The
group L 2 (I 1) is completed to a direct product 2 x L 2 (I1) by adjoining -I.
In the quotient group M\22 these both become L 2 (l1)'s but one is
maximal in M \2, and the other is not.
The subgroup 2 x M 10 fixing two subgroups V Va has orbits of sizes
00,
2, 2, 20, 24. It has a subgroup MIO fixing Voo and -V oo separately, and
this has a further subgroup M IO ' fixing also Va, -Va separately. M 10' has
orbits of sizes 1, 1, 1, 1, 20, 6, 6, 6, 6, the fixed points being obvious, and
the orbits of size 6 being {Wi: i EN}, {Wi: i E Q} and their negatives.
Coincidence of orders implies the isomorphism M 10' ;;: A6, but we can also
see M IO ';;: L 2 (9) by translating the 10 subgroups VJ, V 2 • • . . • Vx into the
10 points
0, 1, i, -i, 1 - i, -1 - i, i + 1,00, i - I , -1
of the projective line PL(9), when the permutations of M IO ' become linear
fractional transformations. We therefore have A6 ;;: M IO ' ;;: PSL 2 (9). The
three groups S6, M 10, PGL 2 (9) are all distinct, being the three subgroups
of index 2 in Aut (A 6) (Aut (A 6)/A 6 is a 4-group). S6 is completed to
Aut (A 6) by our outer automorphism 8, interchanging duads with
synthemes, MIa by an outer automorphism interchanging V with Va, and 00
1.6 A presentation for M 12. Each of the triples a, {3, 'Y and a, (3, b satisfies
the defining relations for L 2 (l I). It is remarkable that the conjunction of
the relations so obtained with the miraculous relation hb)2 = {32, or
equivalently (b'Y{3)2 = 1, gives a presentation for M 12 , namely
<a,{3,'Y,b: a" = {35='Y2=b2~aP'a-3 =
These equations are quite easy to work with when we remember that the
equation [i,j,k] = U inverts to determine 7ri, 7rj' 7rk as interchanging the
pairs (U,U7rk7rj), (U7ri,U7rk), and (U,U7ri7r) respectively. (Any pair of
distinct points of PL (l]) is interchanged by just one of the permutations
7ri.)
That J, is a proper subgroup of A266 with the right order is also easy to
verify. If we join each of the 266 points to the orbit of size II in its
stabilizer we get a graph in which the joins are (L, Lh), (Li, Lhi),
(Lij,Lhij), (Lx,Lyh), (Lxj,Lyhj), where in each case h varies arbitrarily
and y = X7r h. It is not hard to verify that the operations defined above
preserve this graph. If instead we join each point to the corresponding set
of 12 points, we get the joins (in which y and h are arbitrary)
(L,L y ), (Li,Lyi), (Lij,Lyij),
(Lx,L), (Lx,Lxh), (Lxj,Lj), (Lxj,Lxhj).
2. Second lecture
2.1 The Mathieu group M 24 . We define M24 to be the group obtained by
adjoining the permutation o:x -x 3/9 (x E Q) or x -9x 3 (x EN) to the
group L 2 (23) acting on the projective line fl =PL (23). We list the
generators in full:
a = (00)(0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22),
{3 = (00)(15714510 201711222119) (0)(3612 12481691813),
"( = (00 0)(15 3)(7 13)(14 18)(5 9)(10 16)
(208)(174)(11 2)(22 ])(21 12)(196),
o = (00)( 14 17 11 19 22)( 15)(20 10 7 5 2])
(0)(18426 ])(3)(8 1613 9 12).
It is sometimes convenient to replace the pair ,,(,0 by the product "(0 2 ,
which generates the same group, since plainly "( and 0 commute. We have
get C{1 -sets with least element i (0 ~ i ~ 10). These obviously span an
II-dimensional space, and we get the extra dimension by adjoining any
C{1-set containing 00.
Theorem 8. M 24 preserves C{124'
Proof We have obviously N;a = N;-h N;f3 = N 2;, and we verify the
equations
NO'Y02 = Nco, Nco'Y 02 = No, Nl'Y02 = N(-I,O,I,3],
N_l'Y02 = N(3,12,2I),
points form an octad. We can therefore suppose that M24 contains the
permutation X = (abcde Hfgh)(i) (jkl ... x) and a permutation J.L of shape
I s2s interchanging i and j and fixing a,b,c,d,e,f,g,h. The permutations
J.L\ J.L,,2, ••• have the same fixed points but now interchange i with k, i with
I, etc., and so the pointwise stabilizer of {a, b, c ,d, e,f, g, h} has at least 15
involutions and order at least 16. The pointwise stabilizer of {a,b,c,d,e}
has at least three times this order, since it contains also the permutation xs.
of order 3. It follows that M 24 has order at least
24·23·22·21·20·16·3 = 244823040.
Theorem 10. The subgroup of M24 fixing an octad setwise is a group
24As• an extension of an elementary abelian group of order 16 (fixing the
octad pointwise) by the alternating group on 8 letters. which is isomorphic
to L 4 (2). M24 has order exactly 244823040. and contains all
permutations of n that preserve the Golay code rc 24.
Proof We consider the subgroup H of index 16 in the stabilizer of an
octad that in addition to fixing the octad {a,b.c,d,e,f,g,h} as a whole,
fixes the point i. Since {a, b, c ,d ,e,f ,g, h, i} contains just one non-empty
rc-set, the rc-sets disjoint from it form a space of codimension 8, and so
dimension 4, and it is easy to see that every non-trivial element of H acts
non-trivially on this space, so that H is a subgroup of its automorphism
group L 4 (2), whose order is
(16- 1) (16-2) (16-4) (16-8) = 20160.
and we have the rightmost entries. The others are deduced from these by
repeated use of the rule that the sum of two adjacent entries in any line is
278 Chapter 10
330 176 77
210 120 56 21
130 80 40 16 5
78 52 28 12 4
46 32 20 8 4 0
30 16 16 4 4 0 0
30 0 16 0 4 0 0 0
1288 1288
616 672 616
48 72 88 88 72 48
16 32 40 48 40 32 16
0 16 16 24 24 16 16 0
0 0 16 0 24 0 16 0 0
the entry just above them in the previous line. Table 10.2 gives the
number of umbral dodecads meeting (a I • . . . • ai} in (al . .. '. a) (see
below).
2.3 The structure of the Golay code ~ 24
Theorem 12. ~24 has weight distribution 0 1 8759 12 2576 16 759 24 1.
Proof Since by Theorem 11 two distinct oct ads intersect in 0 or 2 or 4
points their symmetric difference has cardinal 16 or 12 or 8. The theorem
follows using Theorem 9 and the fact that ~-sets come in complementary
pairs.
2.4 The structure of P( n) / ~24
Theorem 13. Every subset of n is congruent modulo ~24 either to a
unique set of cardinal at most 3 or to each of 6 distinct sets of cardinal 4.
Proof If a subset S has 5 or more members we obtain a congruent set
with fewer members by taking the symmetric difference with an octad
containing 5 members of S. If S has 4 members we obtain 5 more
Three Lectures on Exceptional Groups 279
When we have identified this group with M 12 we can say that the
stabilizer of a point in one of the dodecads is a group M I), triply transitive
on the other. In fact, identification with our previous M 12 is unnecessary,
since we could easily define M 12 to be the stabilizer of a dodecad in M 24.
But it is quite easy - the groups V =, Yo, ... , Vx , W =, W o, ... , Wx of
the first lecture become the points
00,15,7,14,5,10,20,17,11,22,21,19,0,3,13, 18,9, 16,8,4,2, 1, 12,6
of n, and we easily check that the permutations a, fl, 'Y, (j of that lecture
do indeed correspond to permutations of M 24 as defined here. (a and fl
become fl and (j rather plainly, so we need only check the effects of 'Y, (j on
the N j , using the test of Theorem 7 for CC-sets. Only two of the
calculations are really required.) The outer automorphism (J of the first
lecture translates into the operation 'Y of this lecture, interchanging the two
dodecads of the duum, here taken as Nand Q.
Theorem 16. M 24 is transitive on monads, dyads, and triads, whose
stabilizers are respectively groups M 23, M 22 2, and M 21 S3. These groups
are a + b transitive on the two appropriate sets if a + b ~ 5 and
a ~ 1, 2, 3 respectively.
Proof These statements follow at once from the quintuple transitivity of
M 24 ·
Three Lectures on Exceptional Groups 281
then the 21 octads containing 00,0,1 yield the 21 lines of the the projective
plane over F4 = {O,I,w,w}. Using standard techniques we can then
identify M 21 with L3 (4) and deduce the simplicity of M 21> M 22, M 23, M 24.
Theorem 17. M24 is transitive on sextets. The stabilizer oj a sextet is a
group 26 .3. S6. and the subgroup 26 .3 fixing the tetrads individually is
2 + 1 + 1 + 0 + 0 + 0 and 3 + 1 + 0 + 0 + 0 + 0 transitive on the
tetrads (in any order).
Proof The transitivity follows at once from the quadruple transitivity of
M 24 and the fact that a sextet is determined by anyone of its tetrads (as,
say, the family of all tetrads congruent to the given one modulo ~24).
Now in the stabilizer of the sextet containing {a,b,c,d} and {e,j,g,h},
consider the subgroup fixing the four points a, b, c , i . This is contained
within the group H = A8 considered earlier, and so we can see what it is -
a group S3 permuting J,g,h in the obvious way. It permutes the three
tetrads disjoint from {a,b,e,i} in the same way, and so the group fixing
the tetrads individually as well as the 4 points a, b, e, i has order 1. Since
this group has index at most 4·3·4·4 = 192 in the group of all
permutations fixing the tetrads individually, the latter has order at most
192. But the number of sextets is
(Theorem 13), and the 7 sextets refining a trio must therefore, together
with the empty set, form a 3-dimensional vector space over F2 (a subspace
of p(n)/C{j24). The stabilizer of a trio has therefore two interesting
normal subgroups - one fixing the octads individually, and another fixing
each of the 7 sextets refining the trio. The quotient by the first is S3, since
all permutations of the three octads are induced, and the quotient by the
second is L 3 (2) or a subgroup thereof, since the permutations of the 7
sextets must preserve the vector space structure. The index of their
intersection therefore divides 6'168, and so the intersection, fixing both the
octads and the sextets individually, has order of form 64n (since
64·6'168'3795 = 244823040). But the intersection is a subgroup of the
group described in the previous theorem, and since an element 16 36 cannot
fix 7 sextets, it has order at most 64. This gives the structure of the group.
We make only the following remarks about the transitivity. If we fix
the three octads individually, and then also a point of one of them, we
obtain a subgroup 23 L 3 (2) of index 8 in 26 L 3 (2), which is represented on 7
points of the first octad (with kernel 2 3) and in two distinct ways on the
8 points of the other two oct ads (faithfully in each case, related by the
outer automorphism of the first lecture). Fixing a point of the second
octad in addition, we come down to a group L3 (2), represented on 7 points
in the first and second octads, on 8 points in the third, and doubly
transitively in each case.
Theorem 19. M24 contains subgroups of type L 2(23), doubly transitive on
n and transitive on the set of759 octads.
Proof Such is the subgroup <a,fl,"!>. The double transitivity on n is
obvious, and the transitivity on octads is proved as follows. An easy if
rather tedious calculation shows that at most 8 linear fractional
transformations preserve some given octad. This octad therefore has at
least! L 2 (23)!/8 = 759 images under L 2 (23).
Theorem 20. M24 contains subgroups L 2(7), transitive on n but with
imprimitivity sets of size 3, not contained in any of the above subgroups
of M 24 .
Proof Consider the permutation II =
Mil
[241 L,(23) [I; 231 23.11 [I; I; 1,211 M21 [12; 121 L,(lI) [I; II; I, III L,(lI)
[1,231 M2J [I; 1.221 M" [I; I; 2, 4'1 2'-S, [I, II; 121 Mil [I; I, 10;6'1 M lo
[2,221 M".2 [I; 2, 211 M21.2 [I; I; 6,161 24.A6 [12; I, III Mil [I; 2. 9; 3'1 M9.2
[3,211 M 21 .S] [I; 3,4'1 2'(3xS,) [I; I; 7.151 A7 [2.10; 6'1 MlO.2 [I; 3. 8; 4. 81 M,.S,
[4 6 1 26 3S 6 [I; 7,161 2'.A 7 [I; I; 7,151 A7 [6'; 2, 101 MlO.2 [I; 5, 6; 2, 101 S,
[8'1 26 (L,(2)xS]) [I; 8, 151 A, [I; I; 8,141 2'.L](2) [3,9; 3'1 M 9·S,
[12'1 M".2 [I; II, 121 Mil [I; I; II, III L,(I I) [3'; 3, 91 M 9·S]
[3'1 L,(7) [I; I; 10.6'1 MlO [4,8; 4, 81 M,.S,
[8, 161 2'.A, [6x2; 6x21 2xS,
[4x3; 4x31 A,xS,
[4'; 4]1 4 2 DJ2
286 Chapter 10
3. Third lecture
3.1 The group Coo = . a and some of its subgroups. This group is the
group of automorphisms of the Leech lattice in 24-dimensional space R24.
It contains as subquotients 12 exceptional simple groups, and it seems fair
to say that these groups are easiest studied inside' O.
3.2 The geometry of the Leech lattice. Let R24 be spanned by the
orthonormal basis Vi (i E 0 = PL (23», and define Vs to be ~ Vi (i E S)
whenever S ~ O. We use ~24 for the binary Golay code, ~(8) for the
set of special octads, ~(I2) for the set of umbra I dodecads, and finally
o (n) for the set of all n-ads. Let Ao be the lattice spanned by the vectors
2ve for C E ~(8).
Theorem 24. Ao contains all vectors 4VT(T E 0(4», and
4Vi - 4vj (i,j E 0). A vector belongs to Ao if and only if its coordinate-
sum is a multiple of 16 and the coordinates not divisible by 4 fall in the
places of a ~ -set, the coordinates being all even.
Proof If T, V, V are three tetrads of a sextet, Ao contains
proves the second statement similarly. The final statement then follows
since ~(8) spans ~24 and the set of vectors 4VT and 4Vi - 4vj spans the
lattice of all points with coordinate-sum a multiple of 16 and each
coordinate a multiple of 4.
The Leech lattice A (called A24 in the rest of the book) is the lattice
spanned by Vo - 4voo together with the vectors of Ao. This is the
definition given in §ll (ji) of Chap. 4. The addition sum
-3 1 I 1...
4 -4 a 0 ...
-3 l...
Three Lectures on Exceptional Groups 287
to make all coordinates even and their sum a multiple of 16, and then
x E A by Theorem 24.
We can use these conditions to enumerate the vectors in A of any given
small length. We write A(n) for the set of x E A with X·X = 16n, and we
find, for instance, that A(I) is empty, while A(2) contains 196560 vectors,
namely 27 '759 vectors of shape «±2)8016) (the non-zero coordinates
having positive product and being in the places of an octad), 2 12 '24 vectors
of shape (+3(± 1)23) (the lower sign taken on a f{{-set), and all the
2·24·23 possible vectors of the shape «±4)2022), in an obvious notation.
The corresponding decompositions of A(3) and A(4) are also included in
Table 4.13 of Chap. 4, these sets being orbits under the group N below,
and the signs of the coordinates being suppressed.
3.3 The group ·0, and its subgroup N. We define the group Coo or ·0
(pronounced "dotto") to be the group of all Euclidean congruences of R24
that fix the origin and preserve the Leech lattice A as a whole. Since each
vector 8Vi is in A, the elements of . 0 have rational orthogonal matrices in
which all the denominators divide 8. If 7r is a permutation of fl, we
extend 7r to a congruence of R24 by defining Vi7r=Vi ... , and if S ~ fl, we
define a congruence f s by Vif S = Vi (j ~ S) or -Vi (j E S).
Theorem 26. The following conditions on an element A of . 0 are
equivalent:
(j) ViA = ± Vj for some i,j E fl, and some sign ±;
(ii) A = 7r f C for some 7r E M 24 and some C E f{{ 24.
These operations form a subgroup N = 2 12 M 24 .
Proof Plainly (ii) implies (j). We show (j) implies (ii). Now (j) implies
that the ith row of the matrix of A contains a single non-zero entry ± I in
its jth place. Since A is orthogonal, the jth place of every other row must
be zero. Now the image of 4Vi + 4Vk under A is 4 times the sum of the ith
and kth rows, and so has a coordinate ±4. Since this vector must be in
A(2), it has shape «±4)2022), and the kth row has also a single non-zero
coordinate ± I. It follows that A = 7rfs for some permutation 7r and some
set S. But if C E f{{24, the non-zero coordinates of 2VcA are in the places
of C 7r, so 7r preserves f{{ 24, and is in M 24. Again, the coordinates
congruent to 3 modulo 4 in (v n -4V oo )A are in the places of S, so that
S E f{{24, and A satisfies Gi). The final statement is obvious.
288 Chapter 10
every position of T and zeros elsewhere. But 4 times the sum or difference
of this row and any other must be a vector of A (2), and this limits the
possibilities - if this vector of A(2) has shape ((±2)80'6), the other row
has four entries ± '/2 in the places of some tetrad from the same sextet as
T, and if the shape is (( ± 4) 20 22 ), we get entries ± '/2 in the places of T.
This suggests that we try a matrix which is the direct sum of six 4 x 4
matrices of ± V2's in the places of a sextet. The signs must be chosen
carefully - if 2 is a sextet we let 7/ = 7/:=; be the map taking Vi to
Vi - '/2 VT (j E T E 2), and then define ~ = h to be 7/ ~ T, 2 being the sextet
of T.
Now since two octads intersect in 0, 2, 4, or 8 points, any octad is
either the union of two tetrads of 2 or contains two points from each of
four tetrads, or has three points from one tetrad and one from each of the
others. Supposing the coordinates properly ordered, we apply 7/:
x = 2222 2222 0000 0000 0000 0000
X7/ = 2222 2222 0000 0000 0000 0000
x = 2220 2000 2000 2000 2000 2000
x7/=1113 1111 1111 1111 1111 1111
x = 2200 2200 2200 2200 0000 0000
X7/ = 0022 0022 0022 0022 0000 0000
-
x=3111 1111 1111 1111 1111 1111
-
x7/=3IlI 1111 1111 1111 1111 1111
(ii denotes - n). Since the vectors x 7/ are not all in A, 7/ is not in . 0, but
on changing the sign of any tetrad we get a vector of A, and so ~ = 7/ ~ T is
in ,0.
In [Con3] we proved that N is a maximal subgroup of . 0, and at the
same time computed the order of . O. The following method involves
explicit calculations with the element h, but is perhaps as elegant.
Theorem 27. ·0 is transitive on each of the three sets A(2), A(3), A(4),
and N has index IA(4) I /48 in . 0, which is generated by N together with
any element h.
Proof We have already shown that h takes certain elements of A(2)2
(see Table 4.13) to elements of A(2)3, and in a similar way we see that if i
and j are in distinct tetrads of 2, h takes 4v; +4vj to a member of A(2)2,
so that the subgroup <N,h> of ·0 is transitive on A(2). Similar
calculations (they are all easy) establish the transitivity on A (3) and A (4).
Now the particular vector 8v has just 48 images under N (the vectors
00
these remarks the rest of the theorem follows. (If A E . 0 we can find
J.LE <N,h> with 8vooJ.L=8vooA, so AENJ.L.)
Three Lectures on Exceptional Groups 289
D a
Figure 10.2.
Three Lectures on Exceptional Groups 291
Table 10.4 Various groups associated with the Leech lattice. HS, MeL,
p., pI +2. denote respectively the Higman-Sims group, the McLaughlin
group, an elementary abelian group of order p., and an extraspecial
group of order p2.+1 respectively.
incidence graph (where x and yare incident if and only if x - y has type
3) is now McLaughlin's graph. The details of the identification are rather
complicated, but the result is a fairly simple definition of McLaughlin's
graph. If we take the triangle XYZ to be X - 0, Y = 4Vi + V 0,
Z = -4vj + Vo (i ¢ j), then the 275 points fall naturally into the
following three sets: 22 points Uk (k E n \ (;, j}), 77 points
VK ( {i, j} ~ K E rt'(S) ), and 176 points GK , (K' E rt'(S) ,
{; , j} n K' = {;} ), and the incidences can be simply described by
combinatorial conditions on k, K, K'.
Letting {Yo,zo} be one of these pairs, we have for each other pair {y,z}
that either z - Yo or Y - Yo is of type 2. Assuming transitivity of . 0 on
triangles 322 and tetrahedra 322222 then suffices for the result: . 3 is
doubly transitive on the 276 unordered pairs {y ,z}. The stabilizer in . 3 of
the point Yo has index 2 in the stabilizer of the pair {Yo,zo}, and is visibly
. 322. If we take Yo = 4v .. + 4vo the situation is invariant under the group
M 22 fixing 00 and 0, and the 276 pairs fall into orbits of sizes 1, 22, 77,
176 under this group, which is contained in three distinct subgroups of . 3
- an M 23 with orbits 1 + 22 and 77 + 176, the McLaughlin group ·332
with orbits 1 and 22 + 77 + 176, and a Higman-Sims group . 332 with
orbits 1 + 22 + 77 and 176, the latter neatly displaying both the 100 letter
representation of Higman and Sims and the doubly transitive 176 letter
representation of Higman.
where the T(m) are the Ramanujan numbers (Eq. (37)-(39) of Chap. 4).
Ramanujan's remarkable congruence T(m) == 0"11 (m) (mod 691) is
particularly evident, and indeed we can use the formula to find congruences
for T(m) modulo any prime power dividing g/c = 218 37 537.11.23.691
(where g is the order of ·0). Thus to modulus 23 we have
N (m) == N (m) (a), where N (m) (a) is the number of vectors of A(m) that
are fixed by the element a of order 23. But the fixed vectors of a are those
of the shape av + bv n\
00 and since this has type m if and only if
00,
The first group contains M 24, the next two contain M 23, and the remainder
contain M 22 • We have the isomorphism ·222 == U6 (2). (See also [Fin2].)
Three Lectures on Exceptional Groups 297
HJ = F 5-
The Monster group M, which was discovered a few years after these
lectures were given, led to the discovery of several additional simple groups
and casts further light on some of those already known. These groups
usually arise from studying the structure of centralizers of suitable
elements of the Monster. Here we consider elements of prime order, and
write Fp+, Fp_ etc. for the nonabelian composition factor in the centralizer
of an element in the conjugacy class of M called p+, p- etc. in [Con161,
[ConI71. Some of the groups that are obtained in this way are shown
above.
M = FJ, the Monster, or Fischer-Griess group, or Friendly Giant, was
discovered independently by Fischer and Griess in 1973, and constructed
by Griess in 1980 [Gri41-[Gri8l. A simplified construction is described in
Chap. 29. The baby Monster B = F2+ was discovered by Fischer slightly
earlier and was constructed by Leon and Sims [Le091, [Sim31.
The existence of the Thompson group Th = F313 (constructed by 1. G.
Thompson and P. E. Smith [Th02l) and of the Harada-Norton group
HN = F 5+ (constructed by Norton [HarOl, [Harll, [Nor21, [Nor8]) was
suggested by that of the Monster, although the entirely analogous groups
of Fischer (Fi/ 24 = F3+) and Held (He = F7+) were already known [Helll,
[Hel2l. All of these groups are best understood in terms of their
relationship with the Monster. We remark that COl = F 2-, Suz = F 3-,
HJ = J 2 = F 5-, M12 = F I1 +.
298 Chapter 10
7 9 112 28 45 111
11 4 2 2 7 5
1. Introduction
The Golay code ~ 24, the Steiner system S (5,8,24), and the Mathieu
group M 24 are beautiful combinatorial objects with a great wealth of
structure and applications. The MOG, and its companion-at-arms the
hexacode, are computational tools that enable one to perform mental
calculations on these objects with great ease. In particular, one can check
at sight that a word is in ~24, complete an octad of S (5,8,24) from any
five of its points, or write down many permutations of M 24 in a few
moments. There is also a MINIMOG, with companion the tetra code,
which together perform similar services for M \2. Some discoveries about
the "lexicography" of M 24 and M \2 indicate that these devices may have
some theoretical as well as practical value.
Many calculations in the larger sporadic simple groups reduce to
calculations inside M 24, which has consequently been used in a number of
constructions. In particular, we mention the construction of the Conway
groups via the Leech lattice (see Chap. 10), the Fischer groups Fi 24, Fi 23,
Fi22 (§3.9 of Chap. 10), the Janko group J 4 [ConI2], [Nor3], and most
recently Griess's construction of the Monster group (see [Gri4]-[Gri8] and
Chap. 29).
The MOG array was invented by R. T. Curtis [Cur2], [Cur3] in the
course of his work on the Leech lattice, and he and others have made
300 Chapter 11
valuable use of it for many other investigations involving M 24. The special
virtues of the approach via the hexacode emerged much later, during the
construction by Norton, Parker, Benson, Conway and Thackray of the
largest lanko group J 4 [ConI2], [Nor3]. Although that company included
several practiced MOG users, it was found that the hexacode effected still
greater simplifications in the enormous number of M 24 -related calculations
that were required in the course of the construction. More recently, it has
performed a similar role for the many calculations with the Leech lattice
that were carried out in the determination of its covering radius and the
enumeration of its deep holes (see Chap. 23).
There are almost as many different constructions of M 24 as there have
been mathematicians interested in that most remarkable of all finite
groups. Usually, when one constructs a large group from some "simpler"
object, the construction itself will have a smaller group of symmetries, and
one finds that elements inside this "visible subgroup" are "easy" to
understand, and the others "hard." It is a remarkable fact that the MOG
construction manages to have several "visible groups," each of them a
maximal subgroup of M24! We shall construct it here in a way that is
specially related to the sextet group 26: 3'S6, since that offers maximal
opportunities for the use of the hexacode, which is the main topic of this
chapter. However, we feel that the reader should be aware that the MOG
was first used by Curtis in connection with the octad group 24:A g, that
when he wrote it up it seemed easiest to use the trio group 26: (S3XL2(7»,
and that still later the triad group prL 3 (4) was found to be just as simply
related to the MOG. In fact much of its power stems from the ability to
switch groups while seeking the element one desires.
In the first part of the chapter we shall describe the construction of the
hexacode and MOG, and show how to use them for the basic calculations
that arise in every investigation with M 24. The later part has a section for
each maximal subgroup, described where possible in close relation to the
hexacode or MOG.
,
- ww- ww,
ww - ww ww ww, ww ww ww, ww ww ww .
between the seven quantities a, b, c ,d, e,f, s imply all the rest. (The first
three of these imply that the replacement of any digit by its mate will alter
the sum by s.>
Given the 3-dimensionality, the identity of the three codes follows
readily by checking that some 3 independent words can be found in all
three codes. We suggest that the reader checks this for the generators of
the second version:
W(x 2 ) = 1001 ww, W(x) = 01 01 ww, w(1) = 00 11 11 .
From either the first or the third definition, it is obvious that Cff6 has the
following symmetries:
1) scalar multiplication by any power of w,
2) flipping of the two digits in any two of the couples,
3) bodily permutation of the three couples in any way.
A little calculation now reveals that under such symmetries every
hexacodeword is an image of one of the following five:
0101 ww ww ww ww 00 11 11 11 ww ww 000000
(36 images) (12 images) (9 images) (6 images) (1 image)
Since its images amount to more than half the code, the reader is advised
to memorize the first of these - the others are easily reconstructed from
this one and the known symmetries.
302 Chapter 11
3. Justification of a hexacodeword
It is important to be able to recognize at sight whether a word is or is not a
hexacodeword. Here's how to do this.
First check that it obeys the shape rule: up to permutations and flips
of its three couples the word should have one of the forms
Oa Oa bc, bc bc bc, 00 aa aa, aa bb cc, 000000
(where a,b,c are I,w,w in some order), and then check that it obeys the
sign rule: if we say that a couple of the form
ox or y wy has sign +
x 0 or y w y has sign -
00 or y y has sign 0
with x,y ;z!' 0, then the three couples have signs +++, +--, -+-, --+
or 000 (i.e. are either all 0 or have product +).
Thus Ow Iw wO obeys the shape rule, with a = W, b = I, c. = w, but the
signs of the three couples are ++-, so that it disobeys the sign rule, and is
not a hexacodeword. It would become a hexacodeword on flipping any
couple, for example Ow wi wO, with signs +--.
We refer to the process of checking the shape and sign rules as the
justification of a hexacodeword. Which of the words at the foot of this
page are hexacodewords ? (Answers are on the page behind.)
4. Completing a hexacodeword
In the application, one is often faced with the problem of determining a
hexacodeword from some partial information about its digits. In many
cases this reduces to one of two standard problems:
The 3-problem: determine a hexacodeword from any three of its digits.
The 5-problem: determine a hexacodeword from any five of its digits, one
of which may be mistaken.
In either case, the answer is unique, and so we earnestly recommend
that you use
The Best Method: guess the correct answer, and then justify it.
This is both easier and quicker than the methods that follow. But if
you're stuck, you can always solve such problems like this:
The 3-problem: If the given digits are from distinct couples (such as
a, c, e), use the w- or w-rule to find s, and then the I-rule for the
remaining digits (here b, d ,f).
?
OOllww 101010 wOwOwl wwwwOO Iwlwlw Ilwwww •
The Golay Codes and The Mathieu Groups 303
?w O? w? 11 ?O ?? wI?w wI wO ?w 11
?
?w ?I w? wO wO O? ?I?w ?w O? wI ?? •
304 Chapter 11
DaB 0 o a 8 0
o w w o w w
(0 ) (b)
Figure Il.l. Interpreting hexacode digits.
(a) Odd interpretations. (b) Even interpretations.
Justifying rtf -sets. The following procedure can therefore be used to verify
that a given set is a C{j -set (i.e. the set of places where a codeword of C{j24
is non-zero).
1) For each column, and for the top row, compute its count (the number of
non-zero digits it contains).
2) For each column, compute also its score, obtained by adding O,l,w,w
for any non-zero digit in the first, second, third, fourth row, respectively.
(Alternatively, a column has a given score digit if and only if it is one of
the four interpretations of that digit).
Then the set is a C{j -set if and only if the counts have all the same parity,
while the scores form a hexacodeword. We shall call this process
justifying the C(j -set.
In Fig. 11.2 we have given several interpretations of the standard
hexacodeword 01 01 ww. We recommend to the beginner our practice of
writing counts above, and scores below, the MOG diagram. Of course in
Fig. 11.2 the score words are all 01 01 ww.
EB3 E5E
020222 1 1 1 31 1 420222 3 1 3 11 3
***4 *** 3 * * 2 *
* * * * * ** * *
* ** ** *** * * **
*' * * ** * * *
0101ww 01 01 ww 01 01 ww 01 01 ww
Figure 11.2. Four Golay codewords from one hexacodeword.
The Golay Codes and The Mathieu Groups 305
~
tttJ
? 1 1 ? 1?
IF 000, UTI
~
YIELDS
li~I:+ ~I'
001111 (FAILS)
?01?1?
IF EVEN,
~
UTI 1:~I:rI2
** *
1770?0 YIELDS 1w wOw 0 ( WORKS)
Figure 1l.3. An example.
EE8** ** tEE *
*
*
?
•
EEB tm
* * *
*
*
*
,
** * **
ww 00 ww 11 00 11 wI Iw wI ww ww 11
Iw wI wI wO wO wI wI Ow Ow Ow wI wO •
306 Chapter 11
hexacodeword, from which we can complete that word. Only one of the
two choices will yield an octad compatible with the given five points.
Figure 11.3 shows an example.
If instead the given five points are distributed so as to make five of the
columns have the same parity, then that parity must be the correct one,
and we can find the desired hexacodeword (whence the octad) by solving
the corresponding S-problem (see the example in Fig. 11.4).
102002 202022
ITTI aJU2
UTI
? OwOOw
YIELDS ~
wOwOlw
+
Figure 11.4. Another example.
This time the foot of the page contains a number of sets of five points
for you to complete to octads.
Locating other l'€ -sets. Any set consisting of an odd number of the 24
points can be converted to arc-set by changing the status (member/non-
member) of 1 or 3 points. Our discussion of the octad-completion problem
generalizes almost trivially to this one - once again we must solve a 5-
problem or one of two 3-problems according as the given points are located
so as to make the columns be five of one parity and one of the other, or
three of each.
Sets consisting of an even number of points are either convertible to
rc -sets in a unique way by changing the status of 0 or 2 points, or in six
distinct ways by changing the status of 4 points. In the first case, the
columns all have the same parity, or will be four of one parity and two of
the other, and we solve a 5-problem (but with 6 given digits!) or two 3-
problems (with 4), as before. In the second case, we can change the status
of an arbitrary point, and will then be able to change three more to achieve
a rc
-set.
As we have already discussed in §2.5 of Chap. 10, there are just nine
conjugacy classes of maximal subgroups of M 24. With the exception of
L2 (23), they can be characterized by the non-trivial partition of the 24
elements they fix, as shown in Table 11.1.
Several of these have been used as starting points for constructions of
M notably L 2 (23) by Carmichael, prL 3 (4) by Witt and Tits,
24 ,
26:(S3XL2(7» by Turyn, 24 :A g by Curtis, and of course 26 :3'S 6 for our
own construction.
In the rest of the chapter we shall devote a section to each maximal
subgroup in turn, relating it to the MOG as far as is possible. The sections
are in a rather haphazard order - first the projective group, since it
a;go
NO YES YES NO
040404 002222 I 333 I 1 202220
~I
,
3
'* '* '* *
* *
***"* *
001 1 1 1 Iw Iw Iw (;)0 Iw;:;;O
*
...
Efjj
I 1 1 31 1
... ...
3
~
202022
... * 2
•
* *
* ... * **
1 Oww 0 I wOwOwl
YES YES
Em ffij EEB
*
*
** '*
'*
*
* *
*** ffij
* '* '*
* ?
•
308 Chapte r 11
provides the most usual labeling for the 24 points, then the four groups
most closely related to the MOG (the sextet, octad, triad and trio groups),
a few short sections on the monad, duad and octern groups, and then a
specially long section on MI2:2, which deserves an even longer one!
* * * 0 I2
* * * 3 4 -5
* * * 6 -7 8
* * * 9 -10 -II
0 CD I II 2 22
19 3 20 4 10 18
15 6 14 16 17 8
5 9 21 13 7 12
Figure 11.7. The standard MOG labeling.
+ +
31 1 1 1 1
+*:*
"
+
+ +
"
"
"
1 11 31 1
" +
1
111113
~1
" " +" :
,
•
w 1 wO Ow Ow w 1 WO w 11 w 1 w wwwwOO
310 Chapter 11
192 elements of the group 26 : 3 at sight! Figure 11.9 shows the three
elements obtained like this from the word 01 01 ww.
But this is not all! By suitably interpreting the digits of suitable
hexacodewords, we can also obtain all the involutions in the subgroup 3'S 6
that preserves the top row of the MOG array. (Any permutation of the
top row extends to just three elements of this group, but this is a non-split
extension, and contains no subgroup S6.)
ftim ° ° 0
o
o
8im0
0
t 01° °1
PAIRING' 4 ...... - ~
1°
o I ww 10
Figure 11.10. A word, a pairing, and blobs.
The blob trick. Here's how the trick is done. We take any hexacodeword
W with two 0 digits, and any pairing of the digits in this word for which
the 0 digits form a pair. For each non-zero digit of W we place a blob in
the corresponding row and column of the MOG, but in the columns
corresponding to 0 digits we place blobs instead in the row corresponding
to the non-zero digit that appears at least twice in W. Figure 11.10 shows
our pairing and the blobs for the word 01 ww 10.
Now, using the terms defined in Fig. 11.11, and according to the cycle-
shape 142 or 1222 or 23 of our permutation, we
(I 42) replace the O-pair by an odd flipper, and other digits by odd fixers;
(I 222) replace the 0 digits by even fixers, and other pairs by even flippers;
R° wwI 10
~.. ..
°
.
ww I
~
Olww l O
10
Figure 11 .12. Three more permutations from a hexacodeword.
ttE
3 1 1 1 1 1 2 2 20 20
a a a be f
a b b bd c
c e f d c f
a oa
c c
c 3
~4
d fee e d c
wOOwwl
~
I ww Ow 0
f"i"G}l
~
.. ......-...... ~ :1 r:
1I I I X :J :J 1.;
° I ° I Ww °IOlww °IOlww
83j
*
*
*
*
*
'* *
I~ ! ** **
'* * * *
*" * * *"
0
0
c
a+
o+c o+d c+d
d c+d
Figure 11.16 shows (a) our standard octad and (b) its complement, the
standard square. and the standard origin in that square. Figure 1l.16c
illustrates the vector space structure in the standard square.
The octad and its complementary square are linked by the fact that
there is a I-I correspondence between the partitions of the octad into two
tetrads, and of the square into four parallel 2-spaces, given by the
requirement that the resulting family of six tetrads should be a sextet. In
Fig. 11.17 we show all these 35 sextets. It is useful to note that the tetrads
(that is, 2-spaces) appearing in the square are precisely those that meet its
four columns in one parity, and its four rows in another (possibly the
same). This makes it easy to complete such a tetrad from any three of its
points.
(This remark is the basis of Curtis's original way of finding octads in
the MOG [Cur2], which uses the fact that every octad meeting the
standard one in four points is visible in one of the 35 sextets of Fig. 11.17.
t!E -trn
o x
1010ww
x
xx
x
0
x
xx
x
1010ww
x
x ~-c:PJ1
~~
wwwwOO wwwwww
(a) (b) (c) (d)
Figure 11.18. Transposing two octads.
:r
.....
H.
OO
:
(c)
ROO
. ..
:-t
~
(d)
Figure 11.19. Some permutations of 24 :A s.
EE8 EE8'
111113 022022
EEfl]
1001 ww
3
0110 ww
?
Figure 11.20. A problem, some calculations, and its solution.
Indeed, every octad except the three of the standard trio meets at least one
octad of that trio in four points, and so the figure can actually be used to
find all octads'>
The group 24 : As. The normal subgroup 24 consists of all elements that fix
the standard octad pointwise. In affine language, these are just the
translations of the complementary square.
The general element of 24: As acts as an element of the alternating
group As on the standard octad, and as an affine symmetry of the 4-space
on the complementary square. Every affine transformation of the square
extends to a unique element of M 24 by adjoining the appropriate even
permutation of the octad. Conversely, every even permutation of the octad
extends to 16 elements of M24 - we can force uniqueness by specifying a
destination for anyone point outside the octad. By requiring that the
origin be fixed, we restrict to a subgroup A8 complementing the group 24.
We illustrate some of these ideas by an easy calculation. The operation
of transposing the square is obviously an affine symmetry - let us find the
element of As that extends it to a permutation in M 24 . We note that the
two octads of Figs. 11.18a and c each have six points (x) in the square,
and only two (0) in the octad. We obtain the octads of Figs. 11.18b and d
by transposing the parts lying in the square, and then completing to octads.
Now the desired permutation is easily completed (Fig. 11.19a), using the
fact that it is an involution, and must be an even permutation. Some other
elements of M24 obtained in this way are also shown in Fig. 11.19.
The involutions of M 24 lie in two conjugacy classes, having cycle shapes
18 28 and 212. There is an easy way to compute an arbitrary permutation of
314 Chapter 11
·. X x x ··..
···... X
X :-t :1 :1
X X X ··.. :1 :1 :1
:1:I
:I :I
.. -
Figure 11.21. Elements in 24 :A g and other groups.
type 1828 from its fixed points (which must form an octad) and one of its
transpositions (which may be freely chosen). We just use the fact that if
an octad contains four of the fixed points and the two points of a
transposition, then its remaining two points must also be a transposition of
the permutation. Figure 11.20 illustrates the calculation.
The process of extending permutations by completing octads is one that
soon palls, however, and it is handy to know that it can often be avoided.
In particular, we can find many permutations in our group 24:A8 by using
other groups for which the calculation is trivial. If the desired element
preserves the sextet made from the six columns, or that made from the six
2x2 subsquares, we can use the sextet group. If it fixes the standard trio,
we can use the group 26: (S3xL2(7». Finally, if it fixes the standard triad,
or equivalently, the standard way of regarding the square as a 2-space over
F4 (rather than merely a 4-space over F 2) we can use the triad group
prL 3 (4), explained in §11. A miscellany of elements obtainable in these
ways is displayed in Fig. 11.21.
y/x
000
-
o
X
I·ww
0
I;'-~":"~f--+---t~ ~Y
...
y=x
~
[fu
COORDINATES 0,1
r'I; T'I
X=O , y=O
Figure 11.23. Four octads seen from a projective viewpoint.
We follow Witt [Wit2], [Wit3] in calling the three special points I, II,
III, and we shall refer to them as the Romans. The oct ads of the Steiner
system have the following four forms:
(3+5) All three Romans together with a line of the plane.
(2+6) Two Romans with a six-point oval (hyperconic) in the plane.
(]+7) One Roman, together with a subplane defined over F 2 •
(0+8) No Romans, and the sum of two lines of the plane.
(The sum is modulo 2, so that the intersection of the two lines does not
appear.) A hyperconic consists of the 5 points of a conic together with the
unique point on no chord of that conic. Figure 11.23 shows examples of all
four types of octad. We shall call this the Witt-Tits construction, because
Witt constructed M24 from PSL 3 (4), while Tits [Tit2] explored the implied
geometry in some detail.
SEMI LINEAR
(b)
You can now write down a permutation of M24 for any element of
prL 3 (4). Figure 11.25 shows some examples.
. . ..--
....
(0)
E (b) (c)
Figure 11.25. Four elements of prL 3 (4):
(d)
IIIIX
(a) x' = y, y' = x, z' = z; (b) x' = wx, y' = wy, z' = z;
(c) x' = z, y' = y, z' = x; (d) x' = x,
y' = y, z' = z.
8
0 c
3 2 o o+c
5 I b b+c
o+b
6 4 o+b +c
(0 ) (b)
Figure 11.26. Two labelings for an octad.
(0)
BB88B8B8
0 A B C D E F G
(b)
B88BBEH38
0 0 b c d e f
Figure 11.27. The two codes of Turyn's construction. (a) These sets and
g
their complements form the line-code. (b) These sets and their
complements form the point-code.
The Golay Codes and The Mathieu Groups 317
We take the standard trio to be that formed by the left, middle, and
right couples of columns of the MOG, and label each of these octads as
shown in Fig. 11.26a. The affine structure on any of these octads is that
corresponding to Fig. 11.26b.
According to Turyn's construction [Mac6, Chap. 18, Th. 12], the
Golay code C€24 consists of the words
(X+t, Y+t, Z+t)
-
..... ..... .....
[HmJEj X X X - .....
a ~ y
Figure 11.28. Five elements of the trio group.
318 Chapter 11
. . . . ---
... . ---
I I I 1X
a' (3' y'
Figure 11.30. Generators for another L 2 (7).
24 21 41 42 12 14
54 51 31 32 62 64
.,.
44 61 II 52 22 34
°1 "1 °2 "2 0 .
( 0)
1I
..........
(e) (d)
Figure 11.31. (a) Numbering for the octern group. (b) - (d) The elements
a· , fJ· , 'Y • .
'Y * n/ ---?
[- ~ Ln 2 or/2'
where nand t are to be read modulo 7, and the second alternative in the
last line is used only for n = 00 and n = O. One of the dodecads consists
of all the points Or. 1/, 2/ or 4/ in Fig. 11.31 a. This group can be defined
as the centralizer in M 24 of the octern element (not in M 24):
(We usually prefer to use the symbols 0, +, - rather than 0,1,2') In the
typical word a bed, the first two digits (a,b) specify a linear function
rj)(x) = ax + b, while the last three give the values rj)(0), rj)(I), rj)(2):
a b=rj)(o) e=rj)(+) d=rj)(-).
In other words the leading digit defines the slope s of the word, and the
other three digits cyclically increase by s. This makes it very easy to solve
the two types of problem:
0
+
+
-
-
? ? ??
+
-
+-
-- +
0(0) 0 0
- ~
- 0(-)+
0 +
,
I 221 2220 I 122 0222 •
[]
+ -
- 0 - +
IT]
+ -
-
o - -(-I
+
0 ad l[J
- - + 0 (0) 00 0
The Golay Codes and The Mathieu Groups 321
o
[[]
6 309
+ 5 2 7 10
- 4 1 8 11
+ 0 + -
Figure 11.32. The MINIMOG array with shuffle numbering, a "col" and
a "tet."
all yield CC l2 -words, and in fact they all yield signed hexads (CC l2 -words
of weight 6) - see the examples in Fig. 11.33. We have also entered in
the figure the column-distribution of the 6 points, and the odd-men-out.
(If a column contains just one non-zero digit, or alternatively just one zero
digit, then the odd-man-out is the name of the corresponding row.
Otherwise there is no odd-man-out for that column, and we write ? under
it.)
If we ignore signs, then from these signed hexads we get the 132
hexads of the Steiner system S (5,6, 12). These turn out to be all possible
hexads for which
1) the odd-men-out form part of a tetra codeword, and
2) the column-distribution is not 32 10.
The problem of completing such a hexad from any 5 of its points is easily
solved in terms of 2-problems or 4-problems, and then the signs can be
added, if desired, by using the expression in terms of columns and tetrads.
[D
0~o:
+
+
? ? ??
-
-
[t-l
~
+ ? + -
[j
- ? - +
EEJ
I;: I
- + 0
++-
+ 0 + -
Figure 11.33. Four signed hexads and their odd-men-out.
322 Chapter 11
[J
**
+ + 0
(0 )
?
to
* *
**0 -
- +
(b)
D ++0
(C)
u:: I
- +0
(d)
?
U::J
- + 0 -
(e)
ffiI]o+
- ++ -
- + 0 -
(f )
Figure 11.34. From pentads to signed hexads.
[[J U
**
[J
* "" to
""
*
?
•
II:: "I brJ
"
"" 11*: :1 [D
"*"
The Golay Codes and The Mathieu Groups 323
r r r
r r r
r r r CONTAINS :CLOSES TO
r r r
~BECOMES
~
m*
?OOwl?
"*
"***
,EXTENDS TO m*
* *
***
*
wOOwlw
of the left region to form an octad of S (S, 8, 24). Figure 11.36 shows an
example.
where the PGL 2 (S) acts on the cards in the way it permutes 0,00,1,2,3,4,
while M 12 acts upon them as on the numbers in Fig. 1l.32.
Many remarkable facts about M 12 appear when we regard it as acting
on a set ordered in this particular way. We consider the M12 as embedded
in M 24 acting on two such populations, as in Fig. 11.37. This has a simple
relation to the projective numbering of Fig. 11.7, given by
n+ whichever of n, -n is in Q ,
n whichever of 8/n, -8/n is in ll\Q.
0+ 0- 1+ r 2+ 8-
2- 3+ 5- 4+ 10- 5+
1- 6+ 6- 7+ 9- 8+
3- 9+ 4- lat 11- 11+
Figure 11.37. The shuffle numbering for M 24 .
appropriate line of Fig. 11.38. Then the stabilizer of such a partition turns
out to be a group Ma x M b , where Ma acts on the a rows and Mb on the b
columns of the appropriate array of Fig. 11.39. Moreover, the standard
duality takes the stabilizer of the standard partition into a sets of b into
that of the standard partition into b sets of a, with the map Sa on the rows
dualizing to sa-Ion the columns! The map ra on the rows dualizes to a
map which reverses the order of the columns, although in the case a = 6
this is not ra alone, but its product with the r2 that interchanges the two
rows.
o
2
01 3
01 2 32 4
0123
012345 345 45 5
o 1 234567891011 7654
678 76 6
67891011
891011
(0) 91011 89 7
(b)
(c) 1110 8
(d)
9
(e)
10
11
(f)
Figure 11.39. Six ways to lay down the cards.
Identifying points with the same number in Fig. 11.40 produces the same
M 12 that we have just defined.
o 2 3 4 5 6 7 8 9 10 11 11 10 9 8 7 6 5 4 3 2 1 0
o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 T1
0--0
}Te
0
} T'2
0
j'M
0
NU~ER 1, ,-,
,
HEXADS I- l-
I- 1--1- l-
I- l-
I- l-
I- l-
f- l-
I-
I- -
I- -
I- -
20 22 24 26 28 30 32 34 36 38 40 42 44 46
21 23 25 27 29 31 33 35 37 39 41 43 45
SUM
Figure 11.41. Pyramid between obelisks.
326 Chapter 11
It turns out that the 11 light hexads are precisely all the hexads of
non-negative integers whose sum is 21, and that when we join two hexads
if they have just 3 points in common, then these 11 hexads naturally form
a chain, in which each joins just those adjacent to it. Moreover, under our
duality, these hexads correspond to the 11 duads {0,1}, {1,2}, ... , {10,11}
as in Table 11.2. [The hexad {a, b, c, d, e,f} is dual to the duad {x,y} if
and only if {a+,b+,c+,d+,e+,f+,x-,y-} is an octad of S(5,8,24).] A last
remark is that the number of heavy hexads that contain (respectively)
0,1,2,3,4,5,6,7,8,9,10,11 is 1,1,2,3,4,5,6,7,8,9,10,10.
The Steiner system S (5, 6, 12) is obtained from the 11 light hexads by
complementation in {O, 1,2,3,4,5,6,7,8,9,10, II} and by addition of hexads
whenever the sum is again a hexad. The Golay code re
24 is spanned by
the corresponding 11 octads together with the universal set.
It will not be easy to explain all the above observations. They are
certainly connected with hyperbolic geometry and with the "hole" structure
of the Leech lattice. For example, using the terminology of Chap. 24, if
we take coordinates for the Leech lattice centered at a hole of type A [4,
then the vertices of that hole are the 48 f -points (±4,023), and the next
nearest points are the 4096 g -points (± 124), the signs being determined by
a re-set. In these coordinates the center of a certain D 24 -hole is
C = 23
1 ( 11 12., -11,-9,-7,-5,-3,-1,1,3,5,7,9,11 )
The vertices of this hole are the f -points that have inner product 44/23
with e, and the g -points whose coordinates -1 are against the 11 octads
mentioned above.
The lexicography of the hexacode and the Golay code reM' If we define a
list of numbers in f e scale of 4 by the requirement that each should be the
smallest such numbe, differing in at least 4 digits from all previous ones,
then it turns out that the first 64 of them:
000000, 001111, 002222, 003333, 010123, ... , 333300
are just the hexacodewords (with 0,1,2,3 for O,l,w,W). This observation
turns out to be equivalent to the "ax 2+bx+e" definition of the hexacode,
and R. A. Wilson [Wil6al has generalized it in various ways. By using the
scale of 2, and demanding that the numbers differ from previous ones in at
least 8 digits, M. 1. T. Guy found the Golay code CC24 , with the order
obtained by reading down the MOG columns, from left to right. Such
"lexicographic codes" are discussed in greater detail in [Con411.
Class g:
(12)(963) - (02)(1074) - (01) (1 1 8 5)
(To understand these, arrange the numbers in the standard 4x3 array as in
Fig. 11.39d.)
For classes d and h we change to the modulo II numbering
{oo,O,I, .. . ,xl.
Class d:
(19435) - (2X687) - (005789)
x
Figure 11.42. An icosahedron.
330 Chapter 11
The Mathieu groups have now been known for a century and a quarter,
but are still capable of surprising us. Some references to them are [Ass2],
[Betl], [Carl], [Cur6], [Cur7], [GibI1, [HugI1, Don5], [KraI1, [MasI1,
[MatI], [Mat2], [PeeI1, [PleI5], [PleI5a], [Soil], [Sta12], [Ton3],
[WarI1, [Whil1.
12
A Characterization of the Leech Lattice
J. H. Conway
where (J •• (m) is the sum of the ll-th powers of the divisors of m and T is
Ramanujan's function. The given values are readily computed from this .
From now on we shall suppose that A is a lattice satisfying the
hypotheses of Theorem 1. We call two vectors of A equivalent if their
difference is twice a lattice-vector - i.e. we consider A/2A. If
{b •. .. . . b 24 } is a basis for A then {2b •.. . . . 2b 24 } is a basis for 2A, and
so there are just 224 equivalence classes. We call a vector x short if it has
length at most .J8, and enquire which equivalence classes contain short
vectors. Since x and -x are always equivalent, the non-zero short vectors
in an equivalence class will occur in pairs (compare Theorem 2.8 of
Chap. 10).
Theorem 2. Each equivalence class contains a short vector. The
equivalence classes that contain more than a single pair of short vectors
are precisely those that contain vectors of length .J8. and these classes all
contain exactly 24 mutually orthogonal pairs of vectors of that length.
Proof Let x = OX and y = OY be equivalent short vectors, with
y ¢ ±x. Replacing y by -y if needs be, we can suppose that the angle
XOY ~ -rr/2. Then since OX2 ~ 8 and Oy2 ~ 8 we must have XY2 ~ 16
(Fig. 12. I) . But XY is twice a lattice vector, and so XY ~ 2J4, whence
XY2 ~ 16. It now follows that every inequality in the argument must in
fact have been an equality, so that two distinct equivalent short vectors not
forming a pair must be orthogonal and both of length .J8, and so there can
be at most 24 pairs of such vectors. The number of equivalence classes
that contain short vectors is therefore at least
No N4 N6 Ng
-+-+-+- .
I 2 2 48
-y
--~-----+~~----~ y
-x
Now let c = 1/../8. Then we can suppose that A contains all vectors of
the shapes c(±8,023 ) and c«±4)2,022), these being 24 mutually
orthogonal pairs of vectors of length ../8 and their halved differences. The
symbol «±4)2,022) denotes the typical vector with two coordinates ±4
and 22 coordinates zero. These vectors generate the sublattice Ao of all
vectors c(x\ • ...• X24) in which each Xi is a multiple of 4 and their sum
is a multiple of 8.
If X and yare vectors of A the scalar product x . y is necessarily an
integer, since it equals lh«x+y)2 - x 2 - y2). Letting
x = c(x\ . ...• X24) be the typical vector of A, and taking scalar products
with the generating vectors of Ao, we see that c 2 . 8Xi and C2(4xi - 4x)
are integral for all i, j, or in other words that the coordinates Xi are
integers all of the same parity. (This explains our choice of the scale
factor c.) If A has any vector x whose coordinates Xi are all odd, we can
suppose (by changing the signs of suitable coordinate-vectors) that it has a
vector x that satisfies Xi = 1 (mod 4) for each i.
We now investigate what congruence conditions modulo 4 are imposed
on the Xi' To this end, we let n = {I,2 •...• 24} and let C€ be the set of
all subsets C of n for which there exists a lattice-point X with Xi=2 or 0
(mod 4) according as i E C or i ¢ C (x is said to correspond to C). In
general, if A and B are subsets of n, we use A + B for the symmetric
difference (A\B) U (B\A), and define their distance to be the cardinal of
A + B. We call two sets close if their distance is at most 4. If X and y
correspond respectively to C and D, then x + y corresponds to C + D, so
that the set C€ is closed under symmetric difference.
Theorem 3. Each non-empty C€ -set has at least 8 members. The number
of C€ -sets with exactly 8 members is at most 759, and the total number of
C€ -sets at most 212.
Proof Let C ¢ IlJ be a C€ -set with n members, and x a corresponding
vector. By subtracting a suitable member of Ao we can reduce all but one
of the Xi to 0 or 2, and the remaining Xi to ±2. But then x . x = c 2 . 4n,
and since x . x ~ 4 we must have n ~ 8. Now no 5-element subset of n
can be contained in two distinct C€-sets of cardinal 8, for then their
symmetric difference would be a C€-set of cardinal at most 6. The number
of C€-sets of cardinal 8 is therefore at most (254)/(~) = 759.
whence
334 Chapter 12
and since the displayed number is exactly 212 there can be at most
224/212 = 212 C€-sets.
We now enumerate the vectors x with x· x = 4. Each such x
corresponds to a solution of the equation ~ xl = 32 in which the Xi are
integers all of the same parity, the number of Xi == 2 (mod 4) being zero
or at least 8. The only possibilities are therefore of the shapes
c«±2)8,0 16), c(+3, (±J)23), and c«±4)2,0 22 ). In the first case the
non-zero coordinates must form a C€-set, and we obtain at most 27 such
vectors per C€-set since otherwise we should have two lattice-vectors
differing by a vector of shape c(±4,0 23 ), which is impossibly short.
Hence we have at most 759 . 27 vectors of this shape. In the second case,
the lower sign must be taken on a C€-set, as we see by subtracting a vector
with every coordinate congruent to 1 modulo 4, and since there are 24
positions for the exceptional coordinate +3, we have at most 24· 212
vectors of this shape. We have already observed that A contains all the
(224) . 22 possible vectors of the third shape.
d-2, 27, 0 16), for we obtain from this the impossibly short lattice vector
c (I 8, (- 1) 16) by subtraction of a suitable vector d - 3, 123 ). A must
therefore contain the 759 vectors d2 8, 0 16) that correspond to the 759 8-
element rc -sets.
Let L be the set of all x satisfying (i) - (iii), and let
x =c (x 1..... x 24) be any vector of either A or L. We shall show that x
is a linear combination of the vectors d-3, 123 ), the 759 vectors d2 8, 0 16)
just discussed, and the generators of Ao, all of which belong to both A and
L. Subtracting d-3, 123 ) if necessary, we may suppose that the Xi are
even. Subtracting a number of vectors d2 8, 0 16), we may suppose the Xi
to be multiples of 4. Finally, subtracting a member of Ao, we can reduce
all but one of the Xi to 0, and the remaining one to 0 or 4. But since
x . x < 4 every coordinate is now zero, our result is proved, and A has
been identified with L.
Theorem 6. A is unique to within isomorphism.
Proof The first sentence of Theorem 4 asserts that the 8-element rc
-sets
form a Steiner system S (5,8,24). To complete the identification of A we
appeal to a theorem of Witt ([Wit3]; [Liin1], [Mac6, Chap. 20, §5]),
asserting that the system S (5,8,24) is unique to within a permutation of
n. The lattice is therefore completely determined.
Our argument gives slightly more. There are N 8/48 sets of 24 mutually
orthogonal pairs of vectors of length .J8, and anyone of these sets could
have been used to define our coordinate-system. In other words, the
automorphism group of A is transitive on the N 8/48 natural coordinate-
frames. On the other hand, the number of automorphisms fixing any
coordinate-frame is exactly 212 times the order of the Mathieu group M 24,
since any such automorphism can be obtained by changing the signs of a
rc -set of coordinates and then permuting n by a permutation fixing the
system S (5,8,24), and Witt defined M 24 to be the group of all such
permutations. Hence the order of the automorphism group is N8/48 times
212 times the order of M 24 , namely
2223 9 5472 11' l3. 23 = 8315553613086720000 .
Theorem 7. A is the only even unimodular lattice L with n < 32 that
satisfies anyone of the following.
(i) L is not directly congruent to its mirror-image.
(ji) No reflection leaves L invariant.
(iii) N 2(L) = O.
(iv) N2m (L) = 0 for some m ~ O.
Proof Plainly (i) implies (ii), and (iii) implies (iv). We show that (ij)
implies (iii).
If L has a vector x that satisfies x . x = 2, then the reflection in the
hyperplane through the origin perpendicular to x takes y to
X·V
y-2~x,
X'X
336 Chapter 12
AI =
o
_1- (number of ordered pairs c, c' € re for which (c, c') = t},
Irei
where 0I is a Dirac delta-function, Irei is the cardinality of re, and ( , ) is
the usual inner product. Then
338 Chapter 13
I I
Atp{,a(t)d( = --
1
~ p{,a ( (c,c') ) ~ 0,
-I Irt'l c,c',C{j
since the kernel p{,a ( (x,y) ) is positive definite ((10), (J 1) of Chap, 9).
If there is an arrangement of T unit spheres S I, . . . , S touching T
I
1/2
Atp{,a(t)d( ~ _p{,a(1), for k = 0,1, ....
-I
The theorem now follows by passing to the dual problem, and using the
fact that any feasible solution to the dual problem is an upper bound to the
optimal solution of the original problem.
2. Numerical results
For n = 8 we apply the theorem with
where Pi stands for p/.5,2.5(t), and obtain T8 :::;; 240. For n = 24 we take
where Pi stands for Pi lO .5,lO.5(t), and obtain T24 :::;; 196560. Since each
sphere in the E 8 lattice packing in 8 dimensions touches 240 others (§8.1
of Chap. 4), and each sphere in the Leech lattice packing in 24 dimensions
touches 196560 others (§11 of Chap. 4), we have determined T8 and T24'
For other values of n below 24 we were unable to find such simple and
effective polynomials. The results are summarized in Table 1.5 of Chap. 1,
which also gives the degree of the polynomial used. The best polynomial
we have found for n = 4, for example, is the 9th degree polynomial
Bounds on Kissing Numbers 339
Let f* (t) denote the polynomial 1 + ~~_I ftPt,CX(t}. Of course this need
not satisfy (Cn for all points t in the interval [-1,1/2 ). Let E be chosen to
be greater than the maximal value of f* (t) on [-1, V2) (E may be
calculated by finding the zeros of the derivative of f* (t)). Then
f (t) = f* (t) - E satisfies (Cn and (C2), and so
~ f* (1) - E
Tn"" I-E'
All the upper bounds shown in Table 1.5, except those for n = 3 and 17,
were obtained in this way. The degree k was allowed to be as large as 30,
but in all the cases considered the degree of the best polynomial (given in
the third column of the table) did not exceed 14. For n = 8 and n = 24
the form of the polynomials obtained in this way led us to (1) and (2), but
for the other values of n no such simple expression suggested itself.
For n = 17 we made use of the additional inequalities
f -..J3/2 Atdt
-I ~ 1 and
f-.J2i3 At dt
-I ~ 2
We show that there is essentially only one way of arranging 240 (resp.
196560) nonoverlapping unit spheres in R8 (resp. R24) so that they all
touch another unit sphere 0 n, and only one way of arranging 56 (resp.
4600) spheres in R8 (resp. R24) so that they all touch two further, touching
spheres. The following tight spherical t -designs are also unique: the 5-
design in 0 7, the 7-designs in 0 8 and 0 23 , and the II-design in 0 24 .
1. Introduction
It was shown in the previous chapter that the maximal number of
nonoverlap ping unit spheres in R S (resp. R24) that can touch another unit
sphere is 240 (resp. 196560). Arrangements of spheres meeting these
bounds can be obtained from the Es and Leech lattices, respectively. We
now prove that these are the only arrangements meeting these bounds. In
[Ban7], [Ban8] it was shown that there are no tight spherical t-designs for
t ~ 8 except for the tight II-design in 0 24 (cf. §3.2 of Chap. 3). The
present chapter also shows that this and three other tight t -designs are
unique. (Other results on the uniqueness of these lattices and their
associated codes and groups may be found in [Con4] = Chap. 12, [Cur3],
[DelI3], [Jon5], [Kne4], [LunI], [Mac6], [Nie21, [Ple8], [PleI7], [StaI2],
[Wit3].)
Our notation is that 0 n denotes the unit sphere in R n and ( , ) is the
usual inner product. An (n, M, s) spherical code (§2.3 of Chap. 1) is a
subset «j of On of size M for which (u, v) ;:::;; s for all u, v E «j, u ~ v.
Examples of spherical codes may be obtained from sphere packings via
the following theorem, whose proof is trivial.
Theorem 1. In a packing of unit spheres in Rn let S 1, . . . ,Sk be a set of
spheres such that Si touches Sj for all i ~ j. Suppose there are further
Uniqueness of Certain Spherical Codes 341
Then, as we have seen in Eq. (49), (50) of Chap. 9 and Theorem 1 of the
previous chapter, the dual problem can be stated as follows.
(P2) Choose an integer N and a polynomial f (t) of degree N, say
342 Chapter 14
N
f (t) = "l;hPk (t),
k-O
Since any feasible solution to the dual problem is an upper bound to the
optimal solution of the primal problem, we have
M ~ f(J)lfo
239
7 7 7 7
0
2 4 4 2
63 9 9 9 63
A_I
8 8 8 8 8
231 33 33 231
0 A-I/2
16 64 64 16
(8)
3003
- - - -429
- 143 429
Ao --3003
-
128 256 128 256 128
--9009
- 1287 o_ 1287
AI/2 --9009
-
256 1024 1024 256
51051 663 1105 663 51051
1024
----
2048
-
1024 2048
---
1024
Since A_I (u) =:;;; 1 and A_I = 1, we have A_I (u) = 1 for all U E ee,
and
so the code is antipodal [De116, p. 373]. Therefore (7) also holds for
k = 7 and by [De116, Theorem 5.5] ee
is a spherical 7-design. By [De116,
Definition 5.13] the design is tight, since Ieel - 2 (130 ]. By [De116,
Theorem 7.5] ee carries a 4-class association scheme. Therefore
At (u) ... At is independent of u for all t. This proves (b), (c) and (e).
The numbers (9) are the valencies of the association scheme, and by
[De116, Theorem 7.4] determine all the intersection numbers. This proves
(d).
Theorem 6. If condition (b) of Theorem 5 holds then so do (a), (c), (d)
and (e).
Thus all the At are zero except perhaps for A ± to A ± 1/2 and Ao. From
[De116, Theorem 5.5] Eq. (7) holds for k = 1,2 •...• 7. The rest of the
proof is the same as for Theorem 5.
In Example 2 we saw that the minimal vectors in the E s lattice form
an (8, 240, V2) code. Thus conditions (a)-(e) of Theorem 5 apply to this
code. Conversely we have:
Theorem 7. If eeis a tight spherical 7-design in Os there is an
orthogonal transformation mapping ee onto the minimal vectors of the Es
lattice.
344 Chapter 14
(10)
for all i,j. Let v be a unit vector along OP (see Fig. 14.1). From
Uniqueness of Certain Spherical Codes 345
o
Figure 14.1. The construction used in the proof of Theorem 11:
1:. UiOP = 7r/3 for all i, lopl = 1/J3, I Ou,1 = IOu21 = 2/J3, and
cos cf> = (1 + 3 cos 8)/4.
Theorem 10 cos 1: UjPUj takes the values ± 1 and ± 1/3, so cos 1: UjOUj
takes the values 0, ± '/2 and 1. It follows that the vectors .J3fiOUj
(I ~ i ~ 56) span an even integral lattice, containing at least
2(56 + 1) = 114 minimal vectors (corresponding to ±~, ±v). This
lattice must therefore be either E 8 or E 7 ED A 1> and the latter is
incompatible with (I 0).
By combining Theorems 10 and 11 we obtain:
Theorem 12. There is a unique way (up to isometry) to arrange 56
nonoverlapping unit spheres in R8 so that they all touch two further,
touching, unit spheres.
Theorem 14. If (a) ~ is a (24, 196560, V2) code then (b) ~ is a tight
spherical II-design in n 24, (c) ~ carries a 6-class association scheme,
(d) the intersection numbers of this association scheme are uniquely
determined, and (e) the distance distribution of ~ with respect to any
U E ~ is given by
Then
Since C€ is an II-design,
1 196560 1 r
196560 .~ f(u;) = - J{}j(~)dw(~)
.-1 W24
holds for any homogeneous polynomial f(~J,~2' ... '~24) of total degree
~ 11, where W24 is the surface area of 0 24 (Eq. (81) of Chap. 3). Let us
choosef = h = ~t, for k = 2 and 4, so that
h (u;) = rk/2((u;, v ))k.
1 ~ h(u)
196560 u E (J/2)A4
8190 945
- - - if k = 2, or if k = 4.
196560 196560
and therefore
(w, Ji(el ± e») E {a, ± 1, ±2)
196560 vectors u is for these vectors to coincide with the minimal vectors
in A4 .
This completes the proof of Theorem 15. By combining Theorems 14
and 15 we obtain:
Theorem 22. There is a unique way (up to isometry) to arrange 196560
nonoverlapping unit spheres in R24 so that they all touch another unit
sphere.
Remark. Since the Leech lattice has two distinct mirror image forms, the
isometry of Theorem 22 might necessarily involve a reflection.
Theorem 24. If (a) C(j is a (23, 4600, 1/3) code then (b) C(j is a tight
spherical 7-design in n 23, (c) C(j carries a 4-class association scheme, (d)
the intersection numbers of this association scheme are uniquely
determined, and (e) the distance distribution of C(j with respect to any
u E C(j is given by
A1(u) =A_1(u) = 1, A 1/3(U) -A- 1/3(U) -891, Ao(u) -2816.
Let L be the even integral lattice in R24 spanned by the vectors J3 OUj.
For convenience we set Uj = J30Uj.
COS.,..
~ V" jV
0 "E {O, ± 1, ±2} - Y
~~
,,3,,2 - y2
Since C€ is a tight 7-design, the set {cos 4:. V"jOv": 1::S:;; i ::s:;; 4600} is
symmetric about o. Therefore y E {O, ± \12, ± I}. First suppose y ... o.
Then
~ 0" {2 1 0 1 2} .
cos.,.. V" j v E - ..[6' - ..[6' , ..[6'..[6
Let these values occur 1', {3, a, {3, I' times respectively. Then by evaluating
the Oth, 2nd and 4th moments of C€ with respect to v", as in the proof of
Lemma 16, we obtain the equations a + 2{3 + 21' = 4600,
{3/3 + 41'/3'" 200, {3/8 + 81'/9 = 24, which imply I' = -14, an
impossibility. Similarly for the other values of y.
Proof. This is similar to the proof of Lemma 20, starting from the fact
that if we take u h U2 E C€ with 4:. u ,0 U2 = 7r /2, there are 42 vectors
Uj E C€ with 4:. u, 0 Uj = 4:. U 20 Uj = 7r /3. Furthermore the vector
v = 20P E L also satisfies 4:.u,Ov = 4:.U20V = 7r/3.
Theorem 29. There is a unique way (up to isometry) to arrange 4600 unit
spheres in R24 so that they all touch two further, touching, unit spheres.
(Once again, the isometry might necessarily involve a reflection.)
Acknowledgements. We should like to acknowledge helpful conversations
with C. L. Mallows, A. M. Odlyzko and 1. G. Thompson.
15
On the Classification of Integral
Quadratic Forms
J. H. Conway and N. J. A. Sloane
1. Introduction
The project of classifying integral quadratic forms has a long history, to
which many mathematicians have contributed. The binary (or two-
dimensionaO forms were comprehensively discussed by Gauss. Gauss and
later workers also made substantial inroads into the problem of ternary and
higher-dimensional forms. The greatest advances since then have been the
beautiful development of the theory of rational quadratic forms
(Minkowski, Hasse, Witt), and Eichler's complete classification of
indefinite forms in dimension 3 or higher in terms of the notion of spinor
genus.
Definite forms correspond to lattices in Euclidean space. For small
dimensions they can be classified using Minkowski's generalization of
Gauss's notion of reduced form, but this method rapidly becomes
impracticable when the dimension reaches 6 or 7. However there is a
geometric method used by Witt and Kneser which (after the work of
Niemeier) is effective roughly until the sum of the dimension and the
On the Classification of Integral Quadratic Forms 353
(determinant) 1/2 exceeds 24, beyond which point it seems that the forms
are inherently unclassifiable. The situation is summarized in Fig. 15.1.
There are several novel features of this chapter.
(1) We present On §5) an elementary system of rational invariants for
quadratic forms, defined without using the Hilbert norm residue symbol,
and whose values are certain integers modulo 8. The modulo-8 version of
the 2-adic invariant seems to have first arisen in topological investigations
(see [CasI], [Hir4]). Practitioners in the subject know that the effect of
the "product formula" is to yield congruence conditions modulo 8 on the
signature. With the invariants we use these congruences emerge
immediately rather than at the end of a long calculation (see Eqs. (15) and
(16».
(2) We also give a simply described system of p-adic invariants for
integral forms that yields a handy notation for the genus of a quadratic
form (§7).
(3) In terms of this new notation we enumerate Gn §8.1 and Table 15.4)
all genera of quadratic forms having determinant of magnitude less than
12, and
(4) classify the genera of p-elementary forms for all p (§8.2).
In view of Eichler's theory of spinor genera (see Theorem 14), these
results actually give the integral equivalence classes in the case of indefinite
forms of dimension ~ 3.
(5) We also give a simple description of the spinor genus, including a
notation for the various spinor genera in the genus of a given form, and an
easy computational way of finding their number (§9).
3 Minkowski:
reduced
forms
...
7 Eichler:
Kneser- spinor
Niemeier genus
gluing
method.
24 ...
Impracticable.
Figure 15.1 How quadratic forms are classified.
354 Chapter 15
2. Definitions
2.1 Quadratic forms. Let x be the row vector (x), X2) and A the
symmetric matrix [b ~). Then the expression
is called the binary quadratic form with matrix A. Calculations with this
form often involve the associated bilinear form
f(x, y) = xAytr = aX\YI + bXlY2 + bx2Yl + CX2Y2'
Replacing A by a symmetric matrix of arbitrary dimension n we obtain
the notion of an n-ary quadratic form and of an n-ary symmetric bilinear
form (see §2.2 of Chap. 2). From the very large number of references on
quadratic forms let us mention in particular [Bor5], [Cas3], [Cas4],
[Coh5], [Dav2a], [Dic2], [Dic3], [Eicl], [Gaul], [HsilJ-[Hsi9], [Jon3],
[Knel]-[Kne9], [LamIl, [MiI7], [MinO]-[Min3], [O'Mel]-[O'Me4],
[Orzl], [Ran3], [Ran5], [Ran5a], [Riel], [Rysll-[RysI4], [SchO]-[Sch2],
[Sch 13], [Sch 14], [Serl], [Smi5], [Smi6], [Tau2], [Wae5], [Wat3]-
[Wat22], [Witl], [Zagll.
On the Classification of Integral Quadratic Forms 355
then the norm of the vector x = xlel + X2e2 is just f(x), and its inner
product with the vector y = Ylel + Y2e2 isf(x, y).
The vectors x = xlel + X2e2 for which XI and X2 are integers form a
lattice in V, and el, e2 is an integral basis for this lattice. The other
integral bases for this lattice have the form ae I + {3e2, 'Ye I + oe2 , where
a, {3, 'Y, 0 are integers with ao - {3'Y = ± 1. We shall therefore call two
binary forms f and g with matrices A and B integrally equivalent. or say
they are in the same class. and write f - g, if there exists a matrix
We therefore say that two n-ary forms f and g with matrices A and B
are (properly or improperly) integrally equivalent if their matrices are
related by
B =MAMlr
Let [~~ ~~] (abbreviated aobo a\) be an integral binary quadratic form of
On the Classification of Integral Quadratic Forms 357
(5)
(abbreviated
for which
b/'+I + d < 0 (7)
0087527725788
+1 -67 +1 -3 +6 -7 +9 -2 +9 -7 +6 -3 +1 -3 ... (8)
There are ten reduced forms in the cycle. On the other hand -x 2 + 67y2
leads to the disjoint sequence obtained by changing the signs of the lower
terms in (8) (the ai's), and is therefore an inequivalent form.
3.2 Definite binary forms. In the case of a definite (say positive definite)
binary form, it follows from Theorem 1 that the cycle contains either a
single form
[b ~), with b = 0 or 2b = la 1 ,
The term reduced is normally applied only to the single form (9) or to
whichever of the pair (10) satisfies
a < C , or a = c and b > 0.
It is not difficult to show that a positive definite form (b ~ 1is reduced in
this sense if and only if it satisfies
-a < 2b ~ a ~ c, with b ~ 0 if a = c
[Dic3, Theorem 99], [Jon3, Theorem 76]. Furthermore every posItive
definite form is properly equivalent to a unique such reduced form. Since
(I 1) implies b 2 ~ d 13, all reduced forms are easily enumerated: for each b
with Ibl ~ .Jd13 we factor d+b 2 = ac in all possible ways consistent with
(I1) (see Table 15.1).
The reduction condition (11) expresses the fact that
a is the absolutely smallest value taken (at a vector e I say) by the form,
and
c is the absolutely smallest value that can be taken by the form at a
vector e2 independent of el .
An appropriate generalization of these conditions to higher dimensions
leads to the notion of a Minkowski reduced form (see §1O. 1).
(I 1) is also equivalent to the assertion that the root z = x Iy of
f (x, y) = 0 in the upper half plane lies in the region Iz I ~ 1,
-lj2 ~ Re z ~ Ij2 shaded in Fig. 15.2. As the form undergoes unimodular
transformations
(~ ~l E SL 2 (Z) ,
i.e. with a, {3, 'Y, 0 E Z and a{3 - 'YO = 1, this root transforms into az +(3 ,
'Yz+o
-1 o 1
2"
[Gaul, §183]. Again the reduced forms are easily found: for each positive
integer b < r-fi we factor d+b 2 = ac in all possible ways satisfying
(12) .
When -d is a square, Theorem 1 must be modified slightly, and in
particular the inequality in (7) must be replaced by ~. Then the process
of Theorem I terminates in a form (b g] with b = r-fi. If the process
is extended backwards it terminates in a f~rm (~ ~]. Gauss [Gaul,
§§206-21O] proved that two forms (b g], (~ g] are properly equivalent
if and only if a == a' (mod 2b), and are improperly equivalent if and only
if
aa' == gcd(a, b)2 (mod 2b gcd(a, b» .
... +ab-cd+ef-g h .. .
... -ab+cd-ef+g h .. .
... h +g f -e d +c b -a .. .
... h_gf +ed-cb+a .. .
Table 15.1. Reduced positive definite binary forms.
d Forms
10 1
10 2
1 0 3, 2 I 2
4 1 0 4, 2 0 2
1 0 5, 2 I 3
1 0 6, 2 0 3
1 0 7, 2 I 4
I 0 8, 2 0 4, 3 I 3
9 I 0 9, 3 0 3, 2 I 5
10 1 0 10, 20 5
II 1 0 I I, 2 I 6, 3 ± 14
12 I 0 12, 2 0 6, 3 0 4, 4 24
13 I 0 13, 2 I 7
14 1 0 14, 2 0 7, 3 ± 1 5
15 I a 15, 3 a 5, 2 I 8, 4 I 4
16 I a 16, 2 a 8, 4 a 4, 4 2 5
17 1 0 17,2 1 9, 3±16
18 1 0 18,2 0 9,3 0 6
19 1 0 19, 2 I 10, 4 ± 15
20 I 0 20, 2 a 10, 4 a 5, 3 ± I 7, 4 2 6
21 1 0 21,3 0 7,2 1 11,5 2 5
22 I a 22, 2 a 11
23 I a 23, 2 I 12, 3 ± I 8, 4 ± I 6
24 I 0 24, 2 a 12, 3 a 8, 4 a 6, 5 I 5, 4 2 7
25 I a 25, 5 a 5, 2 I 13
26 1 0 26,2 0 13, 3±19, 5±26
27 1027,3 0 9,2 1 14,4±1 7,6 3 6
28 1 0 28,2 0 14,4 0 7,4 2 8
29 1029,2 1 15,3±IIO,5±1 6
30 I a 30, 2 a 15, 3 a 10, 5 a 6
31 1 0 31,2 1 16, 4±1 8, 5±27
32 1 0 32,2 0 16,4 0 8,3 ±III, 4 2 9, 6 2 6
33 1 0 33,3 0 11,2 1 17,6 3 7
34 1 0 34, 2 0 17, 5 ± 17
35 1 0 35,5 0 7,2 1 18, 3±1 12, 4±1 9, 6 1 6
36 I a 36, 2 a 18, 3 a 12, 4 a 9, 6 a 6, 4 2 10, 5 ± 2 8
37 I a 37, 2 I 19
38 1 0 38,2 0 19, 3±1 13, 6±27
39 I 0 39, 3 a 13, 2 I 20, 4 ± I 10, 5 ± 1 8, 6 3 8
40 I a 40, 2 a 20, 4 a 10, 5 a 8, 4 2 II, 7 3 7
41 1 0 41,2 1 21, 3±114, 6±17, 5±29
42 1 0 42, 2 a 21, 3 a 14, 6 a 7
43 I 0 43, 2 I 22, 4 ± I I 1
44 1 0 44,2 0 22,4 0 11, 3±115, 5±19, 4 2 12, 6±28
45 1045,3015,509,2123,727,639
46 1 a 46, 2 a 23, 5 ± 2 10
47 1 0 47,2 1 24, 3±1 16, 4±1 12, 6±18, 7±3 8
48 I a 48, 2 a 24, 3 a 16, 4 a 12, 6 a 8, 7 I 7, 4 2 13, 8 4 8
49 1 0 49, 7 0 7, 2 1 25, 5 ±IIO
50 1 a 50, 2 a 25, 5 a 10, 3 ± I 17, 6 ± 2 9
On the Classification of Integral Quadratic Forms 361
In restoring the signs it is helpful to note that the lower digits alternate in
sign. Some care is needed in recovering the original cycles, because some
of the four cycles just mentioned may coincide, and so an entry in the table
may represent one, two or four cycles. We have used ordinary parentheses
( ) and curly brackets { } to further reduce the size of the table.
Entries bounded by parentheses indicate whole or half periods. Thus for
d = - 99 the entry
... -5 8 7 6 -9 3 10 7 -5 8 7 .. .
... 7 8 -5 710 3 -9 6 7 8 -5 .. .
... -7 8 5 7 -10 3 9 6 -7 8 5 .. .
and its reversal. Most entries in the table are contained within curly
brackets, which indicate reflections about the outermost digits. Thus for
d = -13 the entry
and
... -1 3 5 2 -2 25 3 -1 3 5 ....
Table I5.2a. Reduced indefinite binary forms.
d Forms
-1 OI}. OIl}
-2 {II}
-3 {112}
-4 0 2 I. 0 2 1 I. 0 2 2 )
-5 { 1 2}. {2I}
-6 { 1 2 2}
-7 {I 2 3 1 2}
-8 { 1 24 }. {2 2 }
-9 0 3 l. 0 3 ! l. 0 3 2 I. 0 3 3 )
-10 {I 3 }. {223 I }
-11 { 1 3 2}
-12 {I 3 31. {22 4 }
-13 (I3 4 1 3 2 1. {2 3 }
-14 (I 3 5 2 2)
-15 {I 3 61. {2 3 3}
-16 0 4 1. 0 4 II. 0 4 21. 0 4 3 2 41. 0 4 4}
-17 {I 4 1. {2 3 4}
-18 (I 4 21. {3 3 }
-19 (I 4 3 2 5 3 2)
-20 { 1441. {2 41. {4 2}
-21 {I 4 5 1 4 3 31. {2 3 6}
- 22 { 1 46 2 3 4 2 }
-23 {I 4 7 3 2}
-24 {I 4 81. {2 4 41. {33 5 2 4}
-25 0 5 1. 0 5 11. 0 5 21. 05 3 4}. 0 5 4 3 1. 055}
- 26 { I 51. {2 4 51}
-27 (1 5 21. (3 3 6)
- 28 { I 5 3 44 I. (2 4 6 2 4 )
- 29 { 1 54 3 5 21. {2 5 }
- 30 { I 5 5 I. {2 4 7 3 3 }
-31 {1 5 6 1 5 4 3 5 2}
- 32 { I 5 7 24 I. {2 4 8 I. {4 4}
- 33 { I 58 3 3 I. {2 5 4 3 6 }
- 34 { 1 5 9 42 I. {5 3 4 6 2 53}
- 35 { I 5 10 I. (2 5 5 )
-36 06}. 0 6 11. 0 6 21. 0 6 31. 0 6 41. 0 6 5 4 41. 06 6}
- 37 { I 61. {2 5 6 1 I. (3 5 4 3 74)
-38 {1 6 2}
- 39 { I 6 3 I. {2 5 7 2 5 3 6 }
-40 { I 6 4 }. {2 61. {5 5 3 4 8 I. {4 4 6 2 }
-41 { I 6 5 4 I. {2 5 8 3 4 5 }
-42 { I 6 6 }. {2 6 3 }
-43 { I 6 7 I 6 5 3 4 9 52}
-44 {1682537441.{264}
-45 {1 6 9 3 4 5 51. {2 5 101. {3 6 }. {6 3 }
-46 { 1 6 10 4 3 5 7 2 6 4 5 6 2 }
-47 { I 6 II 52}
-48 {I 6 121. {2 6 61.13 6 41. {4 4 8}
-49 0 7 I. 0 7 I }. 0 7 2 I. 0 7 3 5 8 3 5 7 O. 0 7 4 5 6 7 0. 0 7 7 }
-50 { I 7 I. {2 6 7 I I. {55}
Table 15.2b. Reduced indefinite binary forms.
d Forms
-51 11 7 2},13 6 5 4 7 3 6}
-52 I 1 7 3 5 9 4 4}, 1 2 6 8 2 6 4 J. 14 6 }
-53 I I 7 4 5 7 2 J. 127}
-54 I I 75 3 9 6 2 J. I 3 6 6 }
-55 I I 7 6 5 5 }, 12 7 3 5 10 }
-56 I I 77 J. I 2 6 10 4 4 J. I 46 5 4 8 }
-57 I I 78 I 7 6 3 J. I 2 7 4 5 8 3 6 }
-58 I I 7 9 2 6 4 7 3 J. I 2 6 II 5 3 7}
-59 I I 7 10 3 5 7 2 }
-60 I 1 7 11 4 4}, 12 6 12}, 13 6 8 2 7 5 5 J. 14 6 6}
-61 { I 7 12 5 3 7 4 5 9 4 5 6 J. I 2 7 6 5 }
-62 11 7 13 6 2}
-63 I 1 7 14l, 12 7 7}, 13 6 9 3 6}
-64 0 8 J. 0 8 I }, 0 8 2 J. 0 8 3 7 5 8 0, 0 8 4 J. 0 8 6 4 8 J. 0 8 7 6 4 J. 088}
-65 II 8 J. 12 7 8 I }, 14 5 10 J. I 4 7 J. I 5 5 8 3 7 4 }
-66 I I 8 2 }, I 3 6 10 4 5 6 6 }
-67 I I 8376 572972 }
-68 I 18 4 J. 12 8 }, 14 6 8 2 }
-69 I 1 8 5 7 4 5 11 6 3J. 12 7 10 3 6}
-70 I I 8 6 4 9 5 5 J. I 2 8 3 7 7 }
-71 11 8 7 6 5 4 11 7 2}
-72 I 1 8 8J. 1 2 8 4 J. 13 6 12}, 14 6 9 3 7 4 8}, 1 6 6}
-73 11 8 9 1 8 7 3 8 J. 127125476583}
-74 11 8 10 2 7 5 J. 1 2 8 5 7}
-75 I 1 8 11 3 6}, 12 7 13 6 3J. 15 5 1O}
-76 I I 8 12 4 5 6 8 29 7 3 8 4 J. I 28 6 4 10 6 4 }
-77 I I 8 13 5 4 7 7 J. 12 7 14}
-78 11 8 14 6 3J. {2 8 7 6 6)
-79 I I 8 15 7 2 J. (3 8 5 7 6 5 9 4 7 3 10 7 )
-80 I 1 8 16J. 12 8 8), 14 6 11 5 5}, 14 8 J. 18 4 }
-81 0 9 J. 0 9 I J. 0 9 2 J. 0 9 3 }, 0 9 4 7 8 9 0, 0 9 5 6 9 3 8 5 7 9 0, 0 9 6 J. 0 9 9 }
-82 I 1 9 }, 1 2 8 9 1 J. (3711 4 6 8 )
-83 I 1 9 2}
-84 11 9 3J. 12 8 10 2 8 6 }, 14 6 12}, 14 8 7 5 }
-85 I 1 9 4 7 9 2 J. 12 9 }, 15 5 12 7 3 8 7 6 J. (16 5 1O)
-86 I I 9 5 6 10 4 7 3 II 8 2 }
-87 I I 9 6 }, I 2 9 3 }
-88 I 19 7 5 9 4 8J. 12 8 12 4 6 8 4}, 14 6 13 7 3 8 8J. 14 8 6}
-89 I I 9 8 7 5 8 J. I 2 9 4 7 10 3 8 5 }
-90 I 1 9 9J. 13 9 J. 12 8 13 5 5J. {6 9 9 3 }
-91 11 9 10 1 9 8 3 7 14J. 12 9 5 6 11 5 6 7 7}
-92 11911286784J. 12 8 14 6 4}
-93 11912374117493J. 12 9 6}
-94 119134685792108371582}
-95 I 1 9 14 5 5J. 12 9 7 5 1O}
-96 11 9 15 6 4}, 13 9 5 6 12J. 12 8 16}, 14 8 8}, 16 6 10 4 8}
-97 I 19167381138594}, {29876512749}
-98 '{ I 9 I7 8 2},I 77}
-99 I I 9 18), I 2 9 9 J. I 3 9 6 }, (5 8 7 6 9 3 10 7 )
-100 OIOJ. OlOl), 0 10 2}, 010381247100, 0104J. 0105J. 0106 8 },
0108 6 J. 01098 4J. 0101O}
364 Chapter 15
represents
and
rather than
On the Classification of Integral Quadratic Forms 365
Two (normed) ideals § and; are said to be in the same (normed) ideal
class if and only if there exist principal (normed) ideals ~ and !!l for
which §~ = ;!!l, and under composition these ideal classes form a group,
the (normed) ideal class group.
The proper (i.e. determinant + 1) equivalence classes of properly
primitive forms of determinant d correspond to classes of normed ideals as
follows. (We remind the reader that we are supposing -d to be square-
free and not congruent to 1 mod 4). One solution of the equation
f(x, y) = ax 2+2bxy +cy2 = 0 is
-=
x -b+r-d
y a
corresponds to f.
Composition may now be defined as follows. To compose two quadratic
forms we first pass to the corresponding normed ideals, multiply them
using (13), and then, working modulo principal normed ideals, convert the
product to a normed ideal of shape
<a, -b+r-d >a ,
and this is easily seen to be the same as the ideal <9, -5+.J7>9
corresponding to the form (~ ~), which gives the reduction sequence
5 1 2 2 1 1
9 2 -3 -3 2 -3···
366 Chapter 15
Q-l and Z-l are both equal to the ring R of real numbers. The number
theory of Q or Z involves an infinity of prime numbers; by passing to Qp or
Zp we concentrate on just one prime at a time.
4.1 The p-adic numbers. We give a brief description of the main
properties of the p-adic numbers that will be needed later. Further
information is readily available in a number of books [Bacl1, [Bor5],
[Cas3], [Kobl], [Mah4], [O'Men
Any real number is the limit of a Cauchy sequence of rationals in the
ordinary metric
If p is any positive prime, we can also equip the rationals with the p -adic
metric
1 1
d 3 (27'0) - r3 .. 27.
We note that for x ;z! y the product of dp (x ,y) over all primes p
(including -1) is + l.
The p -adic rational numbers Qp are the limit points of Cauchy
sequences of ordinary rational numbers with respect to the p -adic metric.
The p -adic integers (or rational p -adic integers) Zp are obtained by
requiring the terms in the sequence to be ordinary integers.
For example, the difference between the nth and any later term in the
sequence 4, 34, 334, 3334, ... is divisible by 5n (in fact by IOn), and so
this sequence is 5-adically convergent to a 5-adic integer a say. In this
case a is actually a rational number. For 3a is the limit of the sequence
12, 102, 1002, 10002, ... which 5-adically converges to 2, since its nth
term differs from 2 by a multiple of 5n • Thus a = 2/3.
In a similar way we see that any rational number whose denominator is
not divisible by p is a p-adic integer.
4.2 p-adic square classes. As another example, we see that 6 has a square
root among the 5-adic integers, since 12 == 6 (mod 5) ,
(-9)2 == 6 (mod 25) , (16)2 == 6 (mod 125) , (-109)2 == 6 (mod 625) ,
... , the sequence 1, -9, 16, -109 ,... being capable of being continued
indefinitely in such a way that the n-th term is congruent to all later terms
modulo 5n • It is therefore a 5-adic Cauchy sequence whose limit is a
square root of 6. Similarly, for any positive odd prime p, an integer not
divisible by p that is a quadratic residue modulo p is a p-adic square
[Bac1, p. 59].
368 Chapter 15
Two p -adic rational numbers are said to be in the same p -adic square
class if their ratio is a p-adic rational square. The square classes for the
various values of p may be described as follows (cf. [Bac1, pp. 59-60],
[Cas3, p. 40], [Wat3, p. 33]):
+ u, - u for p = -1 ,
where
for p = -1, U is any positive real number (a (- I}-adic unit),
for p == 2, Ui represents any 2-adic unit congruent to i (mod 8),
for p ~ 3, U+ (resp. u_) is any p-adic unit that is a quadratic residue
(nonresidue) mod p .
4.3 An extended Jacobi-Legendre symbol. In agreement with our policy of
regarding - 1 as a prime, it is natural to define the greatest common
divisor of two integers
Note that this implies that two negative numbers cannot have (n, v) = 1
and so will not be counted as coprime. We can define the Jacobi-Legendre
symbol [~] in all cases where (n, v) = 1 as follows:
= 1 if v == ± 1 (mod 8) , -1 if v == ± 3 (mod 8) .
r[; r[; r
integer.) The symbol
[:1
On the Classification of Integral Quadratic Forms 369
[qa qb]
qb qc '
that the unconventional name -1 made things so much more simple that
its omission would be indefensible.
where m is the number of p-adic antisquares among paa, pfJb, p'Yc , ....
Thus the (-I)-signature of f is just its ordinary signature, which (by
Sylvester's law of inertia, §6.2) is an invariant for real equivalence. For
p ~ 2 the p -signature is only to be regarded as defined modulo 8, and we
shall see that the p-signature is an invariant for rational equivalence. The
2-signature, which often behaves specially, is also called the oddity of f.
What is usually termed the product formula relating the different p-
adic invariants [Cas3, p. 76], [Jon3, Th. 29] becomes in this notation the
sum formula
2-signature - dimension == ~ p -signature - dimension (mod 8) (15)
oddp
or
~ p -excess (J) == 0 (mod 8) ,
all p
while
Then our first main theorem, the proof of which will be given in §6, is
the following.
372 Chapter 15
then there exists a rational form f which is equivalent to f(p) over Qp for
each p.
By Theorem 4, if such a form exists it is unique up to equivalence.
Sketch of proof (For further details see for example [Cas3, Chap. 6,
Theorem 1.3] or [Jon3, Theorem 291.) The theorem is first reduced to the
case when f is a binary form. Then we wish to find a rational form
f = diag {A, B} of prescribed determinant d and with given signature and
p -excesses for all p ~ 2. The idea is to choose a large prime q and to
take f - ± diag {q, qd}, the sign being determined by the signature. The
value of the p -excess for each prime p dividing d is controlled by the
residue class of q modulo p, or if p = 2 by the residue class of q modulo
8. All these values may therefore be simultaneously adjusted by requiring
q to be in a suitable arithmetic progression modulo 4d. The existence of
such primes q is guaranteed by Dirichlet's theorem (1837) on primes in
arithmetic progressions (see for example [Apol]). For primes p ¢ q that
do not divide d, the p -excess is trivial, while for q itself the q -excess must
be correct by the oddity formula.
Remarks. (1) This proof essentially dates back to Legendre, at a time
when Dirichlet's theorem was an unproved conjecture. Gauss later
eliminated the dependence on that conjecture by finding a proof using the
genera of integral binary quadratic forms (see [Cas3, Chap. 14, §5).
(2) The possible values of a given p-adic invariant for an n-dimensional
form can be computed from its possible values for I-dimensional forms,
On the Classification of Integral Quadratic Forms 373
which are easily listed. For instance, p-excesses are always even, and are
divisible by 4 if P == 1 (mod 4).
where (x, y ) p is the so-called Hilbert norm residue symbol. This invariant
can be recovered from the p -excess as follows. (J) p is equal to
or -1
according as
p -excess (J) - p -excess (Jo)
is congruent to
o or 4 (mod 8) ,
where
6.1 The p-adic invariants for binary forms. The equivalence class of a
binary form over a field is completely determined by its determinant d
(modulo squares) and by any nonzero number a that it represents. For if
f(e\) = a, we can take e\ to be the first vector of a diagonal basis, with
respect to which we must have f - diag (a, d fa).
For the p-adic rationals there are only finitely many square classes, and
we can enumerate all possible forms (see Table 15.3), and thereby check
that two forms have the same determinant and p-adic invariants
(signature, p-excess, and oddity) if and only if they are equivalent. As an
example we consider the 2-adic forms of determinant 2U3' Each such form
is equivalent to one of
-u +u, -u 0
p Det Square classes represented Oddity
2 UI UI. us, 2UI. 2us 2
U3, U7, 2U3, 2U7 6
U3 UI. U3, us, U7 4
2UI. 2U3, 2us, 2U7 0
U7 all 0
~3 U+ all 0 - 0 -
U+, u_ - 0 - 0
pu+, pu_ - 4 - 4
u_ all - 0 - 0
U+, u_ 0 - 0 -
pU+,pu_ 4 - 4 -
pu+ u+,pu+ 0 2 4 6
U_,pu_ 4 6 0 2
(mod 8). Since x 2+6y2 (the first form) represents 7, it is equivalent to the
fourth form, and similarly the second and third forms are equivalent. But
an easy calculation reveals that x 2+6y2 does not represent any number of
the form 4m (8k+3), and so these two pairs of forms are not equivalent.
Thus there are two distinct 2-adic binary forms of determinant 2u 3. The
first has oddity 0 and represents the numbers u h U7, 2u 3 and 2u 5, while
the second has oddity 4 and represents the numbers U3, U5, 2Ul and 2U7.
This explains the entries for p - 2, det = 2U3 in Table 15.3.
After a similar discussion for all the cases with p - 2 in Table 15.3 we
conclude that the oddity is a 2-adic invariant, and together with the
determinant is a complete invariant for 2-adic rational equivalence.
Similarly for the other primes. This completes the proof of Theorem 3 for
binary forms.
The reader will notice that there is, for each p, one form that
represents all nonzero numbers. This is the isotropic form diag {A, -AJ,
of determinant -I, so called because it also represents zero nontrivially.
6.2 The p-adic invariants for n-ary forms. It is easy to extend the above
remarks to show that our invariants really are invariants for forms of all
dimensions. The proof reduces to showing that any equivalence between
diagonal forms can be broken down into a chain of binary equivalences
(i.e. ones effecting just two diagonal terms).
To see this, note that for
f = diag {a,b,c, ... J, f' = diag {a',b', c', .. J
will both have (the same) trivial invariants, and by Theorem 7 will be
equivalent to forms of the shape diag {± 1, ± 1, .. J. Since signature (J)
On the Classification of Integral Quadratic Forms 377
= signature (g), the numbers of positive and negative terms agree, and the
two forms (I9) are equivalent. By Witt cancellation (Theorem 6) we
deduce that f - g.
shows that the form diag {pat, - pbt} represents - ybt, and therefore, by
the observation at the beginning of §6.1, is equivalent to diag {Yat, - ybt}.
Also x 2_y2 = diag {I, - I} represents all numbers, in particular - pbt, and
so
diag {I, -I} - diag {-pbt,pbd.
Then we have
diag {pat, I, - I} - diag {pat, - pbt , pbd - diag {Yat, - ybt , pbd ,
or vice versa, so that the first of two or more p-terms may be chosen
arbitrarily.
The determinant condition tells us there exist evenly many p-terms.
We may replace the first one by -p and the second by p or pu (and
378 Chapter 15
If not, the only p-terms are -p,pu, and the p-excess differs by 4 from
that of diag{-p,p} (which is zero), and so is non-trivial, contradicting the
supposition.
So when p > 2 we have been able to reduce the size of p by repeated
application of the replacement lemma. If p = 2 all p-terms are ± 2, and
there are an even number of them since the determinant is a square. They
can then be eliminated using the equivalences diag {2, 2} - diag {I, I} ,
diag {2, -2} - diag {I, -I}, diag {-2, -2} - diag {-I, -I} . This
completes the proofs of Theorems 7 and 3.
constituent qJq. Note that, when p = -1, (22) is the familiar result that
any form can be written as a sum of definite forms:
I = III E9 (-1)/-1,
~q [de~/q ] ,
=
form a complete set of invariants for I (see Theorem 9). The case p = 2
presents additional complexities and will be discussed in §§7 .3-7 .6. In the
case p = - 1, ~q = + 1 since det Iq is positive, and so n+ I and n_1 are the
only invariants (this is Sylvester's law of inertia, §6.2). By convention, + 1
and -1 will usually be abbreviated to + and -, and so we write n+ for
n+b n_ for n_I'
7.2 The p-adic symbol for a form. For p = -1 we express the fact that
n+ = a and n_ = b by the (- J) -adic symbol
+Q _b .
For other odd p we shall use a p -adic symbol which is a formal product of
the "factors"
represents a form
where the former indicates a constituent qfq for which fq has type I and
det fq ] .
[ --2- .
= ~q' dim fq = nq , oddity (Jq) = tq ,
while the latter indicates a constituent qfq for which fq has type II and
the square brackets enclose the compartments and the trains are separated
by colons. Notice that here one train has two compartments, while another
train has none.
There are two ways in which such symbols may be altered and yet still
represent 2-adically equivalent forms.
(i) Oddity fusion. Two 2-adic symbols represent the same form if the only
change is that the oddities have been altered in a way that does not affect
their total sum over any compartment.
So we may replace the individual oddity markers in a compartment by
their total (modulo 8), written as a subscript to the entire compartment.
For example we may replace [26 2 45 3] in (25) by [r 2 4+ 3h.
(iO Sign walking. A form is unaltered if the signs fq of any two terms in a
train are simultaneously changed, provided certain oddities are altered by
4. Let fql' fq1! ql < q2, be the signs we wish to change. We imagine
walking along the train from the term for ql to that for q2' Our walk
consists of a number of steps between adjacent forms fq and f2q, and each
382 Chapter 15
such step involves just one compartment, since at least one of fq, f 2q is of
type I, and if they are both of type I they are in the same compartment.
Then the rule is that the total oddity of a compartment must be changed
by 4 modulo 8, precisely when the number of steps that involve that
compartment is odd.
Suppose for example we wish to change the signs corresponding to f 2
and f 16 in the train
(26)
The walk has three steps, from f 2 to f 4, f 4 to f 8, and f 8 to f 16. The first
two steps affect the first compartment and the third step affects the second
compartment. The resulting symbol is therefore
12 [2 2 43 h 8°[16- 1]5 32 2 (27)
Then two forms are 2-adically equivalent if and only if their canonical
symbols are identical.
7.7 Existence of forms with prescribed invariants. It is important to
specify exactly which conceivable systems of invariants actually correspond
to quadratic forms. There are three sets of conditions.
The determinant conditions for each p. The p -adic square classes of the
determinant as computed from the p-adic symbols must agree with its
known value. In other words
On the Classification of Integral Quadratic Forms 383
the product of all the signs ~q in the p -adic symbol must be [;] (29)
where the nq are the dimensions of the Jordan constituents and kp is the
number of antisquare terms (i.e. q not a square and ~q - - 1) in the p-
adic symbol; and for p = 2,
oddity (j) == 2; tq + 4k2 (mod 8) ,
q
from the 2-adic symbol. Then these quantities must be related by the
oddity formula
signature (j) + 2; p -excess (j) == oddity (j) (mod 8). (30)
p~3
The existence condition for each Jordan constituent. Each term in the p-
adic symbol must correspond to an existing form. If p ¢ 2, for each
Jordan constituent qfq of dimension n and sign ~ we must have
if n == 0 or p = - 1 then ~ == +. (31)
{ ~~ ==== +_ .. t == ± 1 (mod 8) ,
for n = I, . . t == ± 3 (mod 8) , (33)
for n - 2 {~ == + .. t == 0 or ± 2 (mod 8) ,
and type I ~ = - . . t == 4 or ± 2 (mod 8) ,
for the powers q > 1 of all primes 2, 3, .... The subscripts t, I or II may
be omitted when their values can be deduced from the oddness of m or the
oddity formula (30).
The symbols
for
respectively.
On the Classification of Integral Quadratic Forms 385
where the ambiguous sign ± is _s, and the 2-adic sign is - since the
determinant is == ± 3 (mod 8). These lead to the respective oddity
conditions
r-s +2 == t,
r-s +6 == t,
r-s +2 == 0,
r-s +6 == 0,
386 Chapter 15
the first two of which determine t, while the last two give conditions on the
signature. The existence conditions on the Jordan constituents are
automatically satisfied except for small n, when they are best handled by
consideration of all pairs (r, s) with r+s = n. Thus in the case Ir. s (3)
and for (r, s) equal to
respectively, for which the existence condition holds in only three cases:
x J x J J x
and
IIr,s(P±k) for r-s == ±2-2-(P-Uk (mod 8),
except that in either case when k = n (= r+s) the sign must be [ -pi ) s
On the Classification of Integral Quadratic Forms 387
Theorem 14. (Eichler [Eicl]; see also [Cas3, Chap. II, Theorem 1.4],
[Wat3, Theorem 63]). For indefinite forms of dimension at least 3, a
spinor genus contains exactly one integral equivalence class of forms.
The current use of the term differs slightly from Eichler's (by replacing
the orthogonal group by the special orthogonal group in some places). The
description given here is in essence due to Watson [Wat3], although since
Watson's description is rather complicated our treatment is based on the
version given by Cassels [Cas3], which we recommend to the reader who
would like to see the proofs. Cassels does not however give quite enough
information about spinor norms to justify the claim that the spinor genus is
a practicably computable invariant. We have therefore quoted from the
relevant theorem of Watson, and have taken some pains to produce a
mechanical rule for computing the spinor kernel.
The invariants we described in the previous section are invariants of the
genus. If two forms are in the same genus we can find a rational
transformation relating them whose denominator can be made relatively
prime to any given integer. If this transformation is integral (i.e. if the
On the Classification of Integral Quadratic Forms 389
denominator is 1) the forms are in the same class. The concept of spinor
genus arises when we apply local arguments to this rational transformation
to see what obstruction there is to making it an integral one.
Each genus is partitioned into a number of spinor genera (the number
is always a power of 2). There is a group of spinor operators acting
transitively on the spinor genera, so that we can obtain any spinor genus in
the genus from a fixed one by applying a suitable spinor operator. Thus
the division into spinor genera is determined once we name the spinor
operators and are able to decide when a given spinor operator acts trivially,
i.e. is in the spinor kernel. Our Theorems 15-17 serve as operational
definitions for the notions of spinor operator and spinor kernel.
The computations depend on the calculation of the spinor norms of
operations in certain orthogonal groups. Excellent references are Kneser
[Kne31, Hsia [Hsill, Earnest and Hsia [Ear2l These references have the
additional merit of discussing the problem over more general rings and of
giving the best possible conditions on the indices of prime divisors of the
discriminant to ensure that an indefinite genus contains just one class.
9.2 The spinor genus. If f and g are forms of determinant d in the same
genus, then they are rationally equivalent by some transformation whose
denominator is prime to 2d [Cas3, Chap. 91, [Wat3, p. 78]. Hence we can
find corresponding lattices Land M for which
[L: L nM] = [M: L nM] = r (say),
9.3 Identifying the spinor kernel. Any element of the orthogonal group of
f, over a field not of characteristic 2, can be written as a product of
reflections in certain vectors v" V2, ... , Vk. The spinor norm (defined only
up to multiplication by square factors) of this operation is f(v) ... f(Vk).
This operation is proper (j.e. of determinant 1) or improper (determinant
- 1) according as k is even or odd. The proper operations form the special
orthogonal group of the form. Only some elements of the orthogonal
group of f have integral matrix entries: these are the integral
automorphisms of f .
We call r E Q automorphous if it is the spinor norm of a proper
integral automorphism of f. Similarly a p -adic number A = paa E Qp is
p -adically automorphous if it is the spinor norm of a proper p -adic
integral automorphism of f.
The following theorems are due to Eichler [EicIl and Watson [Wat31
We have obtained them by translating Cassels's versions into our notation
- see in particular Theorem 3.1 of Cassels [Cas3, Chap. III and its
corollary.
Theorem 16. The spinor kernel consists of the spinor operators a (r) for
which the positive integer r is an automorphous number not divisible by
any prime divisor of 2d.
It is important that we can compute the spinor kernel "locally", in fact
by performing a simple calculation for each prime in a certain finite set II.
In the terminology of the next section we have:
9.4 Naming the spinor operators for the genus of f. Let II be any finite
set of primes that contains -1, 2 and all primes dividing d = det f, where
f is some form in the genus. (We shall see later that often some primes
can be removed from II with no loss of information).
Since the spinor operators depend only on the square class of r, we can
name them by sequences C., rp, .. .)pElh in which each rp is a p-adic unit
square class. In this notation the group operation is componentwise
multiplication. Rational or p -adic integers can be regarded as spinor
operators in the following way.
(j) To any rational integer r not divisible by any p E II there corresponds
the spinor operator whose p -coordinate is the p -adic square class of r for
each p. We shall write this as
a{r) = (r, r, .. .) (37)
(iO To each p-adic integer A = paa there corresponds the spinor operator
l1p (A) whose p I-coordinate (for PI ¢ p) is the P I-adic square class of pU,
and whose p-coordinate is the p-adic square class of a:
(38)
9.5 Computing the spinor kernel from the p-adic symbols. In view of
Theorem 17 the spinor kernel is determined once we know the p -adically
automorphous numbers. A vector v is called a p -adic root vector for f if
and only if the reflection in v is a p -adically integral automorphism of f.
Of course this reflection has determinant - 1.
Remark. For odd p it follows from [Cas3, p. 115, Corollary 1] that every
p -adically integral automorphism is the product of p -adically integral
reflections. For p = 2 this is usually true but not always [O'Me4].
In the rest of this section we describe a mechanical rule for finding the p-
adically automorphous numbers, that can be justified using Theorem 18.
§9.6 contains some examples and simplifications.
The algorithm is rather complicated to state, but is completely mechanical and
very easy to apply. If p ;z!: 2 we first diagonalize f, or if p = 2 we express f as a
direct sum of forms of the shapes
where q is a power of 2, a and c are divisible by 2, but x, band ac-b 2 are not
(see Theorem 2). We now prepare a list in two parts:
(J) If P ;z!: 2, all the diagonal entries, or if p = 2 the diagonal entries qx. (These
numbers are not yet to be interpreted modulo squares, and of course the list may
contain repeated entries.)
(II) Only if p = 2: the numbers 2quJ, 2qU3, 2qus, 2qU7 for every direct summand
[~~ ~n
Then the group of p-adically automorphous numbers is generated by the p-adic
square classes of the ratios (or products) of all pairs of numbers from the total list,
supplemented by:
(j) all p -adic units if
whenever p = 2 and part (I) of the list contains two entries whose ratio
has the form
(I or 4 or 16)uodd, {2 or 8)uI o's, {2 or S)U30,7
respectively.
Example. For the form f = diag {3, 16} and the prime p = 2, part (I) of the list
consists of {3 = U3, 16 - 16uI} and part (II) is empty. Since the ratio of 16 to 3
has the form 16u3, we supplement the total list by Us, according to (ii). Thus the
2-adically automorphous numbers are generated by the square classes of
{16ul> U3, us}, i.e. are {Ul> U3, us, U7l.
The supplementation rules correspond to the possibilities for root vectors not
necessarily in the basis. Thus e I +e 2, of norm 2 = 2u I> is a 2-adic root vector for
(6 ~), illustrating the first rule in (ii).
9.6 Tractable and irrelevant primes
The following considerations may be used to simplify the calculations. If there is a
prime p such that, for each p-adic unit u, the spinor operator
<1p{u) - (1, 1, ... ,1, u, 1, .. ') ... ,p,.. (39)
lies in the spinor kernel, then plainly the p-coordinate can be deleted, since it
conveys no information modulo the spinor kernel. Such p are called tractable. For
example, - I is always tractable, as is the prime 2 in the above example.
However, a tractable prime may still have some effect on spinor genus
calculations, since if p itself is automorphous, the spinor kernel will contain <1p (p),
which has nontrivial values in coordinates other than the p-th. For example, if f is
indefinite then -1 is {- 1)-adically automorphous, so that <1-1 (- 1) =
{+ 1, -1, -1, ".)-1,2,3, ... is in the spinor kernel.
If the p -adically automorphous numbers are precisely the square classes of the
p-adic units (as happens when p ¢ -lor 2 and p 1det(f», then p is not only
tractable but irrelevant. Irrelevant primes do not affect the computation of the
spinor genus in any way.
Example. We consider the form
2 1 0
f - [1 2 0
o 0 IS
(discussed in [Wat3, p. 115]). For p ¢ 2 we can diagonalize f, obtaining
diag {2,3/2, IS}. To find the spinor kernel we proceed as follows.
p = -1: list (I) = {2 = u, 3/2 = u, IS = u}, so U is the only {- 1)-adically
automorphous number.
p = 2: list (I) = {Is - 2u}, list (II) = {2ul> 2U3, 2us, 2U7}, so the 2-adically
automorphous numbers are {UI> U3, us, U7l. and 2 is tractable.
p = 3: list (I) = {2 = U_, 3/2 = 3u_, IS - 9u_l. so the 3-adically automorphous
numbers are {u+, 3u+l.
We need retain only the 3-coordinate since 3 is the only intractable prime, and the
spinor kernel is generated by
On the Classification of Integral Quadratic Forms 393
SO (U-)3 is not in the spinor kernel, and therefore the genus of f contains two
distinct spinor genera, one containing f, the other containing f.(u-h. A
representative for the second spinor genus is ([WatJ, p. lIS])
01
6 3
[3 6 0 .
002
9.7 When is there only one class in the genus? In practice one usually
finds that all primes are tractable and so the spinor genus coincides with
the genus (and therefore, in the case of indefinite forms of dimension at
least 3, the genus contains only one class). This section gives some
conditions which guarantee that this will happen.
Theorem 19. Iff is indefinite and the genus off contains more than one
class, then for some p (possibly - I), f can be p-adically diagonalized
and the diagonal entries all involve distinct powers of p.
[~l n
4 2 d is divisible by 4 (2) (41)
[~l n
4 2 d is divisible by 8 (2) (42)
(We recall that a prime p is tractable if dp(U) is in the spinor kernel for
every p -adic unit U.)
Proof (a) If an odd prime p is intractable then from part (j) of the
algorithm the powers of p in the diagonal terms of f are all distinct, and
so, when arranged in increasing order, must be at least po, pI, p2, ... ,
yielding a product of at least p (~.
(c) If 2 is intractable then from part (II) of the algorithm there is no type
II summand, i.e. the form is diagonalizable. Moreover no three powers of
2 in the diagonal terms can lie in the range 21 to 21+3 (inclusive), for any
t. Therefore, when arranged in increasing order, the powers of 2 must be
at least
(d) If 2 is the only intractable prime then every element of the spinor
kernel has a name (UI)2, (U3)2, (U5)2 or (U7)2, and since -1 is (-1)-
adically automorphous, (U7)2 is in the spinor kernel. Moreover, if any two
powers of 2 in the diagonal terms have ratio 1 or 4 or 16, then by part (ij)
of the algorithm (u 5) 2 is in the spinor kernel and all possibilities are
generated. So the even powers of 2 are at least
20, 26, 212, ... ,
establishing (42).
17 128
Proof For large n, (42) implies that det f is divisible roughly by 8 (i),
whereas if 5 is intractable then from (40) we need only 5 (i) I det f. The
cutoff point turns out to be at n = 4, and for n ~ 4 the smallest
determinant (for an indefinite form with more than one class in its genus)
is that of the form
396 Chapter 15
But (42) is better than (44) when n = 3. For n = 2, we find from Table
15.2 that the binary forms
(47)
n = 1, 2, 3, 4
respectively.
For n = 5, 6, 7 and 8, defining systems of inequalities for Minkowski
reduced forms have been given by Minkowski, Ryskov, Tammela and
Novikova - see [AffI], [Aff2], [Grul], [NovI], [Rys2], [Rys3], [Rys8],
[RysI4], [TamI]-[Tam4]. But the coefficients of v can no longer be
restricted to 0 and ± 1.
Many theorems in the geometry of numbers are consequences of the
inequalities (45) (see the references mentioned at the beginning of this
section). In particular they can be used to show that there are only finitely
many classes of forms of any given determinant [Casl, p. 256, Theorem
1.1] and in some case to enumerate these forms [Wae51 However, even in
dimension 3, the process is tedious for moderately large determinants, and
for much higher dimensions it is out of the question.
Tables 15.6 and 15.7 give all indecomposable, reduced, definite ternary
forms with determinant Idl ~ 50 and the indefinite forms with Idl ~ 100.
An entry abe f g h represents the form having matrix
a b h
b c f ,
h f g
and h is omitted when it is zero. Table 15.6 gives the positive definite
forms with d ~ 50, and was computed using the inequalities (46)-(48).
Table 15.7 gives the indefinite forms with Id I ~ 100, and was computed
using the theory of spinor genera.
398 Chapter 15
20 2 ] 4 2 4, 3] 3 ] 3 ]
2] 3]3]3
22 2 ] 2 ] 8, 3] 2 ] 5
23 2]3]5
24 2 ] 7 ] 2, 4] 2 ] 4, 3] 3 ] 4_]
25 2 ] 2 ] 9, 2] 5 ] 3
262]4]4
27 3 ] 2 ] 6, 2] 4 2 5
28 2 ] 8 ] 2, 2] 2] ] 0, 2] 3 ] 6, 2] 5 2 4. 3] 3 ] 4 ]
29 3]3]4
30 3]4 ]3
3] 2]2]]],4]2]5
32 2]9]2,3]2]7,3]3]5_],3]4 2 4,4 2 4 2 4
33 2] 3 ] 7, 2] 4 ] 5
34 2 ] 2 ] ]2, 2] 5 ] 4, 2] 4 2 6
35 3]4]4_]
36 2]]0]2,2]6 2 4,2]5]5_],3]3]5],4]4]4_ 2
37 2 ] 2 ] ]3, 2] 7 ] 3, 3] 2 ] 8, 2] 5 2 5, 3] 3 ] 5
38 2 ] 3 ] 8, 4] 2 ] 6
39 3 ] 5 ] 3, 3] 4 ] 4 ]
40 2]]]]2,2]2]]4,2]4]6,5]2]5.3]3]6_],4]3]4
4] 2] 4 2 7. 3] 4 ] 4
42 3]2]9
43 2 ] 2 ] ] 5, 2] 8 ] 3, 2] 3 ] 9, 2] 5 ] 5, 3] 4 2 5
44 2 ] ]2 ] 2, 2] 7 24, 3] 3 ] 6 ], 3] 5 2 4, 4] 4 2 4, 4 2 4 2 5
45 4]2]7,2]5]6_],3]3]6
46 2 ] 2 ] ]6, 2] 5 26, 3] 4 ] 5_]
47 3 ] 2 ] 10, 2] 4 ] 7, 2] 6 2 5
48 2 ] ]3 ] 2, 2] 3 ] ] 0, 2] 4 2 8, 2] 6 3 6, 3] 6 ] 3, 3] 3 ] 7_],
4] 5 ] 4_ 2 , 4 2 5 2 4
49 2]2]]7,2]9]3,5]2]6,5]3]5_ 2
50 2 ] 7 ] 4, 3] 5 ] 4 ] , 4] 4 ] 4_]
On the Classification of Integral Quadratic Forms 399
10.2 The Kneser gluing method. The integral lattices generated by vectors
of norm 1 and 2 are completely classified. Such a lattice can be written as
a direct sum of the particular lattices
Certain other lattices can be found by gluing these (and possibly other)
components together. This technique, due to Witt and Kneser [Kne41, is
described in §3 of Chap. 4. In Chaps. 16 and 17 we shall describe how, by
a combination of gluing and other methods, the unimodular lattices of
dimension n ~ 25 have been enumerated. However it is worth pointing
out that the enumerations of unimodular lattices can be used to find
lattices of other determinants in a fairly simple way, as the following
section will illustrate (cf. [Kne41, [Ple12]).
10.3 Positive definite forms of determinant 2 and 3. By following the
method used by Kneser [Kne41, and making use of the results of Chap. 16,
in this section we classify the forms of determinant 2 up to dimension 18
and determinant 3 up to dimension 17. This is enough to demonstrate the
techniques used, and since beyond this point the tables become unwieldy, is
a good place to stop. The results for determinant + dimension ~ 17 agree
with Kneser's.
Theorem 23. All positive definite forms of determinant 2 and dimension
~ 18, or determinant 3 and dimension ~ 17 are as shown in Tables 15.8
and 15.9.
Note. The tables explain these lattices in terms of unimodular lattices
taken from Chap. 16. As in that chapter a unimodular lattice is specified
by its component root lattices.
Outline of proof. Determinant 2. If Ln has determinant 2, then
L; / Ln has order 2 and there is a vector vEL; \ Ln with 2v E Ln and
400 Chapter 15
column (a), two of which are even, although the table only indicates their
number. The actual components can be found from Chap. 16.
[} 2: J and [} ~ -~l
We first compute the genus in each case. By rational transformations of
denominators 3 and 7, respectively, the forms may be diagonalized to
Therefore, since 3 and 7 are odd and prime to the determinant -68, we
can read off the relevant p -adic symbols
p = -1: +2_ +2 _
and since the first 2-adic symbol is converted to the second by a 2-step
walk, the forms are indeed in the same genus.
Let us compute the spinor kernel for the first form. Plainly 2 is the
only intractable prime, although -1 is still relevant since it tells us that
-1 is (- U-adically automorphous and so (U7)2 is in the spinor kernel.
Since two of the terms in the 2-adic diagonalization have ratio - 3 = U 5,
(U 5h is also in the spinor kernel, which therefore includes everything, and
so there is only one class in the genus. Thus the two forms are integrally
equivalent. In fact the unimodular matrix
-3 2
M = -2 3 10]
14 (50)
-1 5
(a) [- ~ 1
63 ~] and (b) [-9 0]
170
002
002
On the Classification of Integral Quadratic Forms 405
represent lattices Land M for which generators can be chosen in the form
eh e2, e3 for Land 3eh e 2i3, e3 for M. Now L also possesses the
diagonal basis eh e\+e2, e3, showing that it corresponds to the original
form f. The matrix (51 b) is therefore a representative for the second class
in this genus.
16
Enumeration of Unimodular Lattices
J. H. Conway and N. J. A. Sloane
[I] I 46 25
"{3 D24
D16 E g [10] 2 I 30 26
I' EJ [000] I 6 30 27
0 A'4 [5] 2 I 25 25
DI, [12], [21] 4 I 2 22 26
I A 17 E, [31] 6 2 18 26
~ DiOEj [1101, [301J 4 18 27
0 A15 D 9 [21J 8 2 16 26
DJ [(122) J 6 14 27
A I, [15J 13 2 2 13 26
A A llD,E 6 [III] 12 2 12 27
[I (012)J 24
" Et 9 12 28
A~ D6 [2401, [SOIl, [053J 20 2 2 10 27
Dt [even perms of (0123) J 16 24 10 28
AJ [(114) ] 27 2 6 9 27
7r Aj D5 [ II 121, [1721 J 32 2 4 28
p At [I (216) J 49 2 12 7 28
(J At D4 [2(024)01, [330011, [30302J, [30033] 72 2 24 6 29
DS [111111], [0(02332) J 64 3 720 6 30
AS [I (01441)] 125 2 120 30
1> A~ [3(200101 I)] 256 2 1344 4 32
X Aj' [2(11211122212)J 729 2 IMd 3 36
y; AI4 [I (0000010100110011010111 I)] 4096 IM241 48
w Leech 0
parentheses are also glue vectors. For example, the glue vectors for the
Niemeier lattice DJ in Table 16.1 are described by [(J 22»), indicating that
the glue words are spanned by
[122) = «V2)8, (011), (011»
[212] = «(011), (Vl)8, (011))
[221) = «(011), (011), (Vl)8)
- the glue vectors for Dn are given in §7.1 of Chap. 4. The full glue code
for this example contains the eight vectors [000), [122), [212), [221),
[033], [303], [330), [Ill). The number of glue vectors, IGool (this
notation is explained at the end of Chap. 24), is given in the fourth
column.
The automorphism group Aut(A) is compounded of groups Go, G" G 2
and has order
408 Chapter 16
(I-rk)(I+21-k) IB ·BB···B
2. k! k 2 4
I If
2k-2 ,
n=2k==0(mod8),
and let an = 3n- 1IB n (I/3)I/n, where Bn(x) is the nth Bernoulli
polynomial [Abrl. Chap. 23]. Then Ml = 1/6,
3n/2 + (_ I)n/2
Mn = Mn-1Bn 2n if n even,
Remarks. (i) These theorems have a long history. The versions given here
are taken from [Con34], [Fei2], [Serl], [SlolO]. For further information
and generalizations see [Bra3], [BroS], [Bro6], [Cas3], [CosIl, [ Eicl],
[Hsi6a], [Ko2], [Mag3], [Mil7], [O'MeIl, [Pall], [Pa12], [PfeIl-[Pfe3]'
[Que3], [SieIl-[Sie3). The reader is warned that there are mistakes in
many of the published formulae for the mass constants. (ij) Numerical
values of the mass constants in Theorems 1 and 2 for n ~ 32 are given in
Tables 16.2-16.5. (iii) Examples illustrating the use of these theorems
were given in §2.4 of Chap. 2. Other examples appear in §§3,4 below. (iv)
Analogous theorems for codes may be found in [BroS], [Mac4], [Mac6,
Chap. 19, §6], [Mac8], [MaI2], [Ple7], [Ple8], [Plel6], [Plel7], [Tholl.
410 Chapter 16
n mass
1/2
1
2
8
3
48
4
384
1
5
3840
6
46080
7
645120
1
8
10321920
17
9
2786918400
10
2229534720
31
11
735746457600
31
12
5885971660800
691
13
765176315904000
42151
14
192824431607808000
29713
15
385648863215616000
505121
16
12340763622899712000
f
1 1027637932586061520960267 (3)
IAut{A) I 129477933340026851560636148613120000000 '
Enumeration of Unimodular Lattices 411
n mass
642332179
17
18881368343036559360000
692319119
18
15105094674429247488000
8003636403977
19
77489135679822039613440000
248112728523287
20
619913085438576316907520000
593468652605200909
21
216969579903501710917632000000
50904295073459007001
22
1507367607750643465322496000000
1015740532498234470066371
23
1317439289174062388691861504000000
701876707956280018815862361
24
21079028626784998219069784064000000
84715059480304651623612272842147
25
30465396080006318014267329085440000000
14616335635894388876188472684851927
26
31871491283698917307233513504768000000
1894352751772146867430486995462923265007
27
12429881600642577749821070266859520000000
10345060377427694043037889482223023950203227
28
99439052805140621998568562134876160000000
4285009823959590682115628739356169586687220752159
29
28837325313490780379584883019114086400000000
156429914319579070270102710292957201465725850451195039
30
346047903761889364555018596229369036800000000
447543572700878404232772149927275573042725639059585587715489
31
150184790232659984216878070763546161971200000000
416022631331982837344253774635747627157753429574979915187099394241
32
9611826574890238989880196528866954366156800000000
where the sum is taken over all lattices A in Table 16.1. IAudA) I is given
by (1), where I GIl and I G 2 1 can be found in columns 5 and 6 of the table,
and IGol is the product of the IGol's for the components of A, which can
be obtained from Eq. (2) (except for the Leech lattice, for which
IAudA) I = ICool is given in §3.3 of Chap. 10). The second column of
Table 16.6 gives IAut (A) 1-1 times the denominator of the right-hand side
of (3). Since the sum is equal to the numerator of the right-hand side of
(3), the list is complete.
412 Chapter 16
Table 16.3. Decimal expansions of the mass constants for Type I lattices.
Table 16.4. The Minkowski-Siegel mass constants for lattices of Type II.
n mass
o
8
696729600
691
16
277667181515243520000
1027637932586061520960267
24
129477933340026851560636148613120000000
4890529010450384254108570593011950899382291953107314413193123
32
121325280941552041649762780685623131486814208000000000
n o 8 16 24 32
Mass 1.435xlO-9 2.489 x 10- 18 7.937xlO- 15 4.031x10 7
D" 24877125
E~ 63804560820
D,.E. 271057837050
A'4 4173688995840
D;, 67271626831500
A 17 E, 3483146354688000
DIO E ; 4134535541136000
A "D. 33307587016704000
D~ 156983146327507500
A;, 834785957117952000
E: 373503391765504000
A"D,E. 8082641116053504000
D: 19144966823230248000
AiD. 106690862731906252800
A~ 225800767686574080000
AiD; 2700612462901377024000
A: 8361079854908571648000
D~ 1196560426451890500000
A~D4 52278522738634063872000
A~ 180674574584719324741632
A~ 437599241673834240000000
A ~' 312927932591898624000000
A;4 31522712171959008000000
Leech 15570572852330496000
Total 1027637932586061520960267
consists in finding all lattices that can be obtained from the Niemeier
lattices.
The lattices in Table 16.7 have components Vb V 2,... (shown in the
column headed V). The V; are taken from the list On (n ~ I), an empty
component (that is, one containing no vector of norm ~2); Z, the one-
dimensional lattice of integers; and An (n ~ 1), Dn (n ~ I), E 6, E 7 and E 8.
As usual the subscript on a component indicates its dimension. We
sometimes use 1m to denote the m -dimensional integer lattice zm.
Remark. The notation used in this chapter to specify the components of a
lattice differs slightly from that used in [Con27]. For example the lattice
El 0 1 was there called El[3l. The latter notation is more informative but
less general (it fails when the empty component has dimension greater than
one), and somewhat confusing, since [3] is also the name of a glue digit.
We therefore recommend the ... On notation for general use.
Chains of lattices. Every unimodular lattice A appears in a uniquely
determined chain of the form
where the initial lattice An does not represent 1. We call An the reduced
version of A. (Beware: elsewhere in this book An usually denotes a
laminated lattice,) The summand 1m is the sublattice of A generated by
vectors of norm 1, and An is its orthogonal complement. In these
circumstances we have
where VI. V2, V3,'" are either (1) minimal representatives of glue digits
corresponding to a glue word of norm 4; (2) minimal vectors r, s of norm 2
in two distinct components Wi, W;, and 0 in the other components; or
(~3) 0 except for one Vi which is a vector of norm 4 in its component W;.
(Again we omit the easy proof of this statement.) The cases have been
numbered so as to correspond with the value of m mentioned above.
In case (1) the D\ generated by v is maximal and we obtain a 23-
dimensional lattice not representing 1. Our symbol for this case is the glue
word mentioned.
In case (2) the D2 generated by rand s is maximal with
[2] = V2(r+s), and so the reduced lattice is 22-dimensional. The symbol
for this case is a word with *'s in positions i and j and O's elsewhere.
The cases (~3) can be further subdivided as follows. Case (3): v - Vi
is the vector (1, 1, -1, -1, Ok-3) in a component Wi - Ak for some
k ~ 3. The maximal Dm is the sublattice A3 of Ak supported in the four
nonzero coordinates of Vi' The reduced lattice is 21-dimensional, and the
symbol for this case has a + in position i and O's elsewhere.
Table 16.7. The unimodular lattices of dimension ~ 23 that contain no
vectors of norm 1. All are odd (or of type 1) except for four lattices: the
empty lattice, E 8, Ei, and D I6 , which are even (or of type II). The
notation is explained in §4.
8 D\6E S -0 E. 240
16 E~ -00 E~ 2 480
16 D'6 E • 0- D'6 1 480
16 D: -00 D~ 224
and a symbol
where w - d\d 2 "'do is the symbol for AN, c(w) is the number of images
of wunder Aut(N), and c(di ) is the number of choices for the component
Vi of the vector v which would lead to the digit di . For example c(*) is
the number of minimal vectors in Wi' The numbers c (di ) can be found by
Enumeration of Unimodular Lattices 419
An D,
0 An 0 D,
A, 8
A;_,A n_; r;l)
A,
A, 8
An-, 2(n~l)
A~ 24
+ A,,_4 + 24
6r;l)
Dn(n;.5) E. E7 E.
d V,V,·· . c(d) d V,V,·· . c(d) V,V,·· . c(d) V,V,·· . c(d)
0 Dn 0 E. 1 E7 1 E.
1 A"-l 2"-1 1 D, 27 E. 56
D n_,
2 D, 27
2 2n A, 72 D. 126 E7 240
A"_l 2n-' 270 A, 756 2160
D"-2A l 4G)
+ D n_, 16(;)
2n
elementary counting arguments and are given in Table 16.8. The values of
c(w), which are usually small. were found by careful consideration of the
group action, and are given in Table 16.7.
The orders of the automorphism groups of the lattices An in Table 16.7
were calculated from (5) and (6). The lattices with minimal norm 1 were
then found by forming direct sums An 9 1m , and the mass constants were
checked against the formulae given in Theorem 1. (This completes the
formal proof of Theorem 5,) The numbers of lattices found in each
dimension are shown in Table 2.2.
The fifth column of Table 16.7 gives the number gl (An) g2(A n )
= 1G I (An) 11G 2(A n ) I, and provides the reader with an alternative and
easier method of computing 1Aut (An) 1 via the formula (cf. Eq. (I))
k
1Aut(A n ) 1= II 1Go(V;) 1. gl (A n )g2(A n ).
;-1
420 Chapter 16
The values of glg2 were actually "back-computed" from (5), (6) and (7)
after the mass formula check had been applied. We note that
(VI •...• Vk ) identifies An uniquely. The final column of Table 16.7 gives
the number (t2) of norm 2 vectors in An.
The Leech lattice. It remains to consider the unique Niemeier lattice with
minimal norm greater than 2, the Leech lattice. In this lattice there is just
one orbit of norm 4 vectors (Theorem 27 of Chap. 10). Our construction
produces a certain 23-dimensional lattice with minimal norm 3, the shorter
Leech lattice 0 23 , which we have already encountered in the Appendix to
Chap. 6. It appears in the last line of Table 16.7, and is the only lattice in
the table with minimal norm 3.
Acknowledgements. The extensive arithmetical calculations needed to
prove Theorems 4 and 5 were performed using ALTRAN [Bro14] and
MACSYMA [Mat3].
17
The 24-Dimensional
Odd Unimodular Lattices
R. E. Borcherds
1. Introduction
The even unimodular lattices in 24 dimensions were classified by Niemeier
[Nie2] and the results are given in the previous chapter, together with the
enumeration of the even and odd unimodular lattices in dimensions less
than 24. There are twenty-four Niemeier lattices, and in the present
chapter they will be refered to both by their components D 24 , D I6 E g , ••• "
and also by the Greek letters a, {3, ... , the Leech lattice being denoted by
w (see Table 16.1).
The odd unimodular lattices in 24 and 25 dimensions were classified in
[Bor! J. In this chapter we list the odd 24-dimensionallattices. Only those
with minimal norm ~ 2 are given, i.e. those that are strictly
24-dimensional, since the others can easily be obtained from lower
dimensional lattices (see the summary in Table 2.2 of Chap. 2)
Neighboring lattices. Two lattices A and B are called neighbors if their
intersection A n B has index 2 in each of them ([Kne4], [Ven2D.
Assume for simplicity that A is unimodular. Take any vector x
satisfying
XEV2A\A, x· x E Z, (1)
and define
422 Chapter 17
Ax == {a EA : a·x EZ},
where
But since the intersection A24 n D24 has index 47 in each of them, A24
and D24 are not neighbors in our sense.
The enumeration of the odd 24-dimensional lattices. Figure 17.1 shows
the neighborhood graph for the Niemeier lattices, which has a node for
each lattice.
If A and B are neighboring Niemeier lattices, there are three integral
lattices containing A n B, namely A, B and an odd unimodular lattice C
(cf. [Kne4]). An edge is drawn between nodes A and B in Fig. 17.1 for
each strictly 24-dimensional odd unimodular lattice arising in this way.
Thus there is a I-I-correspondence between the strictly 24-dimensional odd
unimodular lattices and the edges of our neighborhood graph. The
The 24-Dimensional Odd Unimodular Lattices 423
n=B n= 16 n = 24
(0
Figure 17.1.
Neighborhood graphs of the
even unimodular lattices in
n - 8, 16 and 24 dimensions.
424 Chapter 17
156 lattices are shown in Table 17.1. Fig. 17.1 also shows the
corresponding graphs for dimensions 8 and 16.
For each lattice A in the table we give its components (in the notation
of the previous chapter) and its even neighbors (represented by two Greek
letters). The final column gives the product glg2 of the orders of the
groups G\(A), G 2 (A). We may write Aut (A) = Go (A) .N(A). T(A),
where T(A) has order 1 or 2 and interchanges the two neighbors of A if it
has order 2. Then IN(A) T(A)I = g\g2, and the last column is written
either as n . 2 if T (A) has order 2, or as n if T (A) has order 1, where n is
the order of N (A). The components are written as a union of orbits under
N (A), with parentheses around two orbits if they fuse under T (A).
The 24-Dimensional Odd Unimodular Lattices 425
The first lattice in the table is the odd Leech lattice 024. The
remaining lattices have minimal norm 2, the number of norm 2 vectors
being given by the formula
8(h(A) + h (B)) 16, (8)
where h (A), h (B) are the Coxeter numbers of the even neighbors of the
lattice.
426 Chapter 17
2
106 AgAtO, 08 A!2A 7A 40 ]
107 E6D5A~AfOl 1'1. 4 133 DsDlA[Ar ,~ 2
108 E,(A 6A 6 )A,O, AI. 2· 2 134 A 11 D 7 D 5()j A, 2
109 A 7E,D,(A 3A 3)0, AA 2· 2 135 Arl O2 4
"
110 A 9(D,D,) (A ,A ,)A ,0, AA 2· 2 136 D 9 AjO l e~ 4
1. Introduction
We consider even unimodular Euclidean lattices A in Rn or, in more
classical terminology, classes of integral, positive definite, even quadratic
forms of determinant 1 in n variables. Such lattices exist only if n = 8k.
A complete classification of such lattices is known only for k = 1,2,3.
When k = 4 there are already more than 80 million lattices (see
Table 16.5.). When k = 1 or 2 the classification is very simple: there are
precisely one 8-dimensional and two 16-dimensional lattices of the above
type. A complete classification of the 24-dimensional lattices was obtained
in 1968 by Niemeier [Nie21. According to Niemeier, there are precisely
24 classes of even unimodular lattices. Each lattice A is uniquely
determined by its set of minimal vectors A (2) = {A E A : (A, A) = 2},
which form root systems of the following types:
121,
24Aj, 12Az, 8A 3, 6A 4, 4A 6 , 3A g, 2A 12 , A 24 ,
6D 4, 4D 6 , 3D g, 2D 12 , D 24 ,
4E 6 ,3E g,
4As+D4, 2A7+2Ds, 2A 9 +D 6, A 1S +D 9, E g +D 16 , 2E 7+D IO , E 7+A 17 ,
The lattice corresponding to the empty root system is the Leech lattice.
Niemeier obtained his classification by Kneser's method [Kne41, which
involves studying lattices that are "neighbors" of a given one (see the
428 Chapter 18
Proof We use the classical result (see [Hec2] or [Oggl, Chap. VI]) which
says that, for an even unimodular lattice A in V = Rf, the theta series
with spherical coefficients
f ..p=~[ ~ P.(x»)qn, q=e 27riz ,Imz >0,
n xEA (2n)
is a cusp form of weight 1/2f + 2 for the full modular group. In particular,
for f = 24 the series (3) is a cusp form of weight 14; but such a form is
equal to zero, since any modular form of weight k is a polynomial in two
modular forms, E 2 and E 3, of weights 4 and 6, and the cusp forms in this
polynomial ring constitute the principal ideal generated by the unique
parabolic form ~ of weight 12 (see [Ser I]). Thus
1
~ (x, a)2 = "242n (a, a) IA (2n) I,
xEA(2n)
Conditions (i)-(iii) are very strong, and it is not difficult to find all root
systems in R24 satisfying them.
Proposition 3. Suppose R is a (possibly reducible) root system in R24
whose roots all have the same length. Suppose also that R satisfies
conditions (i)-(iii) of Proposition 2. Then R is isomorphic to one of the
23 nontrivial root systems in (1).
Since all components of R must have the same Coxeter number, it follows
that at most one a, at most one {3, and at most one 'Y can be different from
zero. Moreover, if R contains components from the A and D series, i.e.
ai ;z!' 0 and {3j ;z!' 0, then i = 2j - 3. Similarly, if ai ;z!' 0 and 'Yk ;z!' 0,
then i = 11 if k = 6, i = 17 if k = 7, and i = 29 if k = 8. Finally, if
{3j ;z!' 0 and 'Yk ;z!' 0, then j = 7 if k = 6, j = 10 if k = 7, and j = 16 if
k = 8.
Thus R has the following form:
either R = aiAi for some i, (4)
or R = {3jD j for some j, (5)
In case (5):
Even Unimodular 24-Dimensional Lattices 431
In case (6):
In case (7), condition (j) becomes j{3j + (2j - 3)a2j-3 = 24, j ~ 4, {3j
and a2j-3 ~ 1 integers. It is easy to see that the indeterminate equation
j{3 + (2j - 3)a = 24, j ~ 4, a ~ 1, {3 ~ 1, has only the following
solutions: (j, a, (3) == (4,4, 1), (S, 2, 2), (6,2, 1), (9, 1, 1). This leads to
the following possibilities for R in case (7):
4As + D 4, 2A7 + 2D s, 2A9 + D 6, A 1s + D 9.
In case (8), condition (j) becomes llall + 7{37 + 6')'6 = 24, which admits a
unique possibility for R:
In case (9) we have 17a17 + IO{31O + 7')'7 = 24, which admits two
possibilities:
2. If R = D j , j ~ 4, then
The notation is chosen so that do is the zero element of the group T(Dj ),
and di == i (mod 4) if j == 1 (mod 2). Next, G(D4) = S3, G(Dj ) = Z/2Z
for j ~ 5. The action is the following: a nontrivial element u E Z/2Z fixes
do and d 2, and ud l =- d 3• When j = 4, G(D4) = S3 = GL(2,2) coincides
with the full automorphism group of T(D 4 ). The function IDoJ is defined as
follows: 1(do) = 0, [(d 2) = 1, [(d I) = [(d 3) = j /4. In the case where
j == 0 (mod 2), it is sometimes convenient to identify T(Dj) with the
additive group of the field F 4; G (Dj ), j > 4, can then be identified with
the Galois group GaI(F4 / F 2).
(the wreath product of G(R) by Sn) with the natural monomial action on
T(nR), and we define I by additivity:
where the summation extends over all types of irreducible root systems
other than E 8• We call a subgroup A C T(R) even and self-dual if
IAI2 = IT(R)I and the function IR assumes even integral values >2 on
A \ {O}. There may be no such subgroups, but if they exist, the set of
them is G (R) -invariant, since the function IRis G (R) -invariant.
Proposition 4. Suppose R is a root system of rank n. There exists a
natural one-to-one correspondence between the classes of even unimodular
n-dimensional lattices (to within isomorphism) with root system
isomorphic to R and the orbits of even self-dual subgroups A C T(R)
relative to the group G (R).
The proof amounts to a simple verification and is omitted. The
correspondence assigns to a lattice A the quotient A = A/ Q (A (2)) with
respect to the sublattice generated by the roots, which is viewed as a
subgroup of Q (A (2))o/Q (A (2)) = P/Q.
Example 1. Suppose R = nA I is the simplest root system of rank n. In
this case the group T (R) can be identified with the space of sequences of
length n over the field F 2, and T(R) = (Z/2z)n. The group G(R) is
isomorphic to Sn, and the function I is given by [(01) = [(011, ... ,an) = V2
wt (01), where wt (01) is the Hamming weight (§2.1 of Chap. 3). An even
self-dual subgroup is a binary self-dual Type II code (§2.2 of Chap. 3)
with minimal distance ~ 8. The classification of such codes under the
action of Sn is a famous problem of binary coding theory (see §6 of
Chap. 7). Thus this same problem is equivalent to that of classifying the
even unimodular n -dimensional lattices with root system nA I.
Example 2. Suppose R = nA 2 • In this case T(R) = (Z/3Z)n,
G(R) = (Z/2z)n'Sn, 1(01) = 1(011, ... ,an) = (2/3)' (the number of
nonzero OIj), and, exactly as above, the problem of classifying the 2n-
dimensional lattices with root system nA2 is equivalent to that of
classifying the ternary self-dual Type III codes with minimal distance > 3
(§2.2 of Chap. 3, §9 of Chap. 7).
In the general case, i.e. for any root system R, the problem of
classifying the even self-dual subgroups of T (R) relative to G (R) can also
be viewed as a problem of coding theory. This problem includes and
differs insignificantly from that of classifying the self-dual codes over all
rings Z/nZ and the field F 4 • An equivalent problem is to classify the even
unimodular lattices having a root system of maximal rank. In the sequel,
self-dual subgroups of T(R) will often be called codes.
Remarks 0) The usual concept of isomorphism in considering codes over
commutative rings is defined by monomial matrices (§2.2 of Chap. 3).
Proposition 4 shows that to classify lattices with root system of maximal
434 Chapter 18
°
XIII. R = D 24 . Then T(R) = F4 and G(R) = Z/2Z; 1(0) = 0, I (I) = 1
and I (x) = I (x 2) = 6. The code consists of and x. The lattice obtained
is, of course Dt (§7.3 of Chap. 4), or r 24 in the notation of [Serl,
Chap. V, Example 1.4.31-
XIV. R
1(0) = °
= 4E 6 • Then T(R) = (Z/3Z)4 and G (R) = (Z/2Z)4 . S4;
and I (± 1) = 4/3. In the space of sequences a = (aI, a2, a3, a4),
aj = 0, ± 1, we must look for 2-dimensional even self-dual subspaces. The
problem has a unique solution: the subspace spanned by (1, 1, I, 0), (0,
-1, 1, 1) (the tetracode C6'4, §2.5.1 of Chap. 3).
XV. R = 3E 8 • Then T(R) = °
and the code is trivial. The lattice is
isomorphic to E8 E9 E8 E9 E8 (or f8 E9 r8 E9 r8 in Serre's notation).
XVI. R = 4As + D 4 • Then T(R) = (Z/6Z)4 x F4 and G (R) = (Z/2Z)4 .
S4 x S3; /(0) = 0, [(±I) = 5/6, /(±2) = 4/3, 1(3) = 3/2 and /(b) = 1,
b E F4, b ¢ 0. In the space of sequences a = (aJ, a2, a3, a4, b),
aj = 0, ± 1, ±2, 3, b E F 4, we must find a subgroup A of order 72 such
that for all a E A, a ¢ 0, we have /(a) = '1;/(a) + /(b) E 2Z and
/(a) > 2. For such a subgroup we may take that generated by (0, 1, 2,
-1, w), (1, 1, 1,3,0), (3,3,0,0, 1), where w E F4 is a primitive element.
The uniqueness of such a subgroup to within the action of G (R) is easily
verified. (Details are given in [Nie2, p. 163].)
XVII. R = 2A7 + 2D s. Then T(R) = (Z/8Z)2 x (Z/4Z)2 and
G (R) = (Z/2Z) 2 . S2 x (Z/2Z) 2 . S2; the function I on the first two
summands has the form /(o) = 0, /(±I) = 7/8, /(±2) = 3/2,
/(±3) = 15/8, 1(4) = 2, and on the last two it has the form
1(0) = 0, /(± I) = 5/4, /(2) = 1. For the desired subgroup of order 32 we
Even Unimodular 24-Dimensional Lattices 437
may take that generated by (3, 1, 1, 0), (2, 0, -1, I). Uniqueness is very
easy.
XVIII. R = 2A9 + D 6 • Then T(R) = (Z/10Z)2 x F4 and
G (R) = (Z/2Z) 2. S2 x Z/2Z; the function I on the first two summands
has the form [(0) = 0, [(±I) = 9/10, [(±2) = 8/5, [(±3) = 21/10,
[(±4) = 12/5, [(5) = 5/2, and on F4 it has the form [(0) -= 0, I (I) - 1,
I (w) = I (w 2) = 3/2. The desired subspace of order 20 exists and is unique:
as generators w~ may take (5,5, I) (1,2, w).
XIX. R = A 1s + D 9 • Then T(R) = Z/16Z x Z/4Z and G(R)
= Z/2Z x Z/2Z; the function I on Z/16Z has the form
[(0) = 0, [(±I) == 15/16, [(±2) = 7/4, [(±3) = 39/16, [(±4) = 3,
[(±5) = 55/16, [(±6) = 15/4, [(±7) = 63/16, [(8) = 4, and on Z/4Z it
has the form [(0) = 0, [(± I) = 9/4, [(2) == 1. The desired subgroup of
order 8 is generated by the element (2, 1). The uniqueness is obvious.
XX. R == E8 + D 16 . Since the sublattice generated by E8 is unimodular,
the whole lattice is decomposable and is isomorphic to E 8 ED D t6.
XXI. R = 2E7 + D IO • Then T(R) = (Z/2Z)2 x F4 and G (R)
= s2 x Z/2Z; the function I on the first two summands has the form
1(0) = 0, 1(1) = 3/2, and on the last it has the form [(0) == 0, [( 1) = 1,
I (w) = I (w 2) = 5/2. For the desired subgroup of order 4 we may take that
generated by (1, 0, w), (0, 1, w2 ). The uniqueness is obvious.
XXII. R = E7 + A\7. Then T(R) = Z/2Z x Z/18Z and G(R) -= Z/2Z;
the function I on the first summand has the form [(0) = 0, [(I) == 3/2,
and on the second it has the form [(0) = 0, [(±1) =- 17/18,
[(±2) "" 16/9, [(±3) = 5/2, [(±4) = 28/9, [(±5) = 65/18, [(±6) -= 4,
[(±7) = 77/18, [(±8) = 40/9, [(9) = 2. The desired subgroup of order 6
is generated by the element (1, 3). The uniqueness is obvious.
XXIII. R = E6 + D7 + All. Then T(R) "" Z/3Z x Z/4Z x Z/12Z and
G (R) = Z/2Z x Z/2Z x Z/2Z; the function I on the first summand has
the form 1(0) = 0, [( ± 1) = 4/3, on the second the form [(0) = 0,
[(± I) = 7/4, 1(2) = 1, and on the third the form 1(0) = 0,
[(± 1) = 11/12, [(±2) = 5/3, [(±3) = 9/4, [(±4) - 8/3, [(±5)
= 35/12, [(6) = 3. The desired subgroup of order 12 is generated by (1,
I), and the existence and uniqueness are obvious.
Thus we have considered all possible nontrivial root systems, and in
each case we have obtained precisely one lattice. This proves the main
theorem in the case of lattices with a nonempty root system and provides a
complete description of the lattices. (An alternative description is given in
Table 16.1.)
[Translated by G. A. Kendall]
19
Enumeration of Extremal
Self-Dual Lattices
J. H. Conway, A. M. Odlyzko and N. J. A. Sloane
1. Dimensions 1-16
The theorem stated in the title is Theorem 13 of Chap. 7. We proceed at
once to the proof. The following result was proved by Kneser [Kne4], and
can also be obtained from Table 16.7.
Theorem 1. The only extremal unimodular lattices in Rn for n ~ 16 are
Zn (I ~n ~7), E g, n(2, (E 7+E 7)+, A(s, in Rl to R7, Rg, R l2 , R l4, R 1S
respectively.
Here A = (L I + ... + L k)+ indicates that A is obtained by gluing
component lattices L I, . . . ,Lk together (cf. §3 of Chap. 4).
2. Dimensions 17-47
Theorem 2. The only extremal unimodular lattices in Rn for
17 ~ n ~ 47 are the shorter Leech lattice 0 23 in R23 and the Leech
lattice A24 in R24.
Proof We could read the results for dimensions 17 to 24 straight from the
tables in Chaps. 16 and 17, but we prefer to give independent arguments.
Suppose first that A is a Type II (or even) lattice in Rn, which is also
extremal as a unimodular lattice. From Cor. 21, Chap. 7, the minimal
norm !l of A satisfies !l ~ 2[n/24] + 2. Also!l = [n/8] + 1 and 81 n,
which imply n = 8, 16 or 24, in which dimensions the even unimodular
440 Chapter 19
lattices were enumerated by Witt and Niemeier - see §2.4 of Chap. 2 and
Table 16.1. Only E 8 and A24 are extremal.
From now on we suppose that A is an odd unimodular lattice which is
extremal. The theta-series of A is therefore the extremal theta-series in
dimension n (§4 of Chap. 7). Let n = 8a + v, 0 ~ v ~ 7. This means
that
8 A(z) = i
,-0
a, 8 3(z)n-8, .:l8(Z)'
(see Eq. (36) of Chap. 7), where the integer coefficients ao . .... aa are
chosen so that
[;r [-!],
r
2
8 A (z) = 8A
8 Ao (z) = 8 A (z) + [;
2
8A [- ! + 1] .
Hence
[; r !+
[;r,~ r
/2
8A [- 1]
2
(- I)'r8'a,8 4 [- !r- 8
' 82 [- ;z
i (- l)'r4, a, 82(z )n-8'84(2z )8, ,
,-0
(5)
Enumeration of Extremal Self-Dual Lattices 441
which implies
The a, are easily computed (by equating (1) and (2)) and condition (6)
eliminates all n in the range 17 ~ n ~ 47 except 22, 23 and 24. For
example, when n = 17, ao = 1, a, = - 34, a2 = - 204, and 27 ~ a2'
Finally, n = 22 is eliminated by calculating 0 Ao (z) explicitly. It is
- 11 q3/2 + ... , and the negative coefficient shows that A does not
exist.
When n = 24 the extremal theta series is equal to the theta series of
the Leech lattice, and the uniqueness of the Leech lattice (Chap. 12) shows
that A = A 24 .
In dimension 23 an extremal lattice A must have theta series
The even sublattice Ao (with theta series 1 + 931S0q4 + ... ) has dual
latticeA;with theta series (from (4), (S))
1 + 4600q3 + 931S0q4 + ... + 223 q 23/4(1 + 23q2 + ... )
+ 23·2 12 q'S14(1 + ISq2 + "')(1 - 16q2 + ... )
= 1 + 4600q3 + 94208q'S/4 + 931S0q4 + ... .
From this we can see that the four cosets of Ao in A; contain nonzero
vectors of norms
IS IS
4 + 2m, 4 + 2m, 3 + 2m, 4 + 2m,
and have coset representatives Yo = 0, y" Y2, Y3 (say), for various integers
m ;?- O. The union of the cosets Ao and Ao + Y2 is A. Now the lattice M
of even integers also has four cosets in its dual M*, whose nonzero vectors
have norms
4 + 2m, 1.4 + 2m, 1 + 2m, 1,4 + 2m ,
with coset representatives Zo = 0, z, = V2, Z2 = 1, Z3 = - V2. It follows
that there is a 24-dimensional lattice (Ao + M)+ obtained by extending
Ao + M by the glue vectors Yj + Zj (i = 0, I, 2, 3), which is extremal and
so must be the Leech lattice. A is therefore uniquely characterized as the
projection onto the 23-space orthogonal to v of the vectors of A24 that have
even inner product with a minimal vector v in A 24 . This is the shorter
Leech lattice 0 23 (see also the Appendix to Chap. 6 and Table 16.7). This
completes the proof of Theorem 2.
3. Dimensions n ;?- 48
contains a negative coefficient for n ~ 48, which proves the theorem. The
q -expansion of the right-hand side is
I + (- I)"2 v- 4"a"qv/4
+ (- I)"+12 v- 4"qv/4+2((I6a-v)a,, + 4096a,,_d + ....
We will show that a" < 0 and a,,-l < 0 for a ~ 6, from which the
negative coefficient is apparent. Applying the Biirmann-Lagrange theorem
to (I) and (2) we obtain, exactly as in [Mall, Eq. (6)1,
a
s
= _ ~ -s --
1 d
, d s-l
{dOd
__
3. 08s-n-l.h s
3
} ,
(8)
5. q q q-O
II
00
II II
00 00
hS (I +q2m-l)-2k = (I _q2m-l)-(8s-2k)
m-l m-l
II II
00 00
x (I _q4m-2)-2k (I _q4m)-8s .
m-l m-l
1. Introduction
As discussed in §3 of Chap. 2 and §1 of Chap. 3, lattices are practically
important because they can be used as vector quantizers and as codes for a
bandlimited channel. For these applications it is essential that there exist
fast "decoding" algorithms which, given an arbitrary point of the space,
find the closest lattice point.
In this chapter we describe such algorithms for the lattices An (n ~ 1),
Dn(n ~ 3), E6, E7, E8 and their duals. This chapter is based on [Con29]
and [Con401. The latter reference also gives an algorithm for decoding the
Leech lattice (omitted here because of its length), algorithms for finding
the closest codeword to various binary codes including the Golay code
("soft" decoding algorithms - see §4 beloW), and an extensive
bibliography. See also [Ado 11, [Budl], [Che2], [Con26], [Con38], [For2],
[GorO], [WoI2].
Practical applications of these lattices also require algorithms for
labeling lattice points. Suppose our code or quantizer uses a set
C = lei ..... cm } of lattice points. Efficient "encoding" algorithms are
needed which map i (1 ~ i ~ M) into Ci, and vice versa. The first problem
can be solved using the algorithms described in this chapter, and the
second by using a dual basis for the lattice - see [Con35].
The problem discussed in the following sections is this: for a lattice A
in Rn , find a decoding algorithm which, given an arbitrary point x E Rn ,
finds a lattice point u E A that minimizes the distance from x to u. We
444 Chapter 20
shall use the descriptions of the lattices and their duals given in Chap. 4.
As usual it easier to work with the squared distance or norm
N (x - u) = (x - u) . (x - u) than with the distance itself.
In case of a tie, choose the integer with the smallest absolute value. For
x = (Xl .... • x n ) ERn, let
f(x) = (j(Xl) .... ,j(xn ».
For future use we also define g (x), which is the same as f (x) except that
the worst coordinate of x - that furthest from an integer - is rounded
the wrong way. In case of a tie, the coordinate with the lowest subscript is
rounded the wrong way.
More formally, for x E R we define f (x) and the function w (x) which
rounds the wrong way as follows. (Here m is an integer.)
If x = 0 then f (x) = 0, w (x) = I .
If 0 < m ~ x ~ m + V2 then f (x) = m , w (x) = m + I.
If 0 < m + V2 < X < m + 1 then f (x) = m + 1, w (x) = m . (1)
If - m - V2 ~ X ~ - m < 0 then f (x) = - m , w (x) = - m - I.
If - m - I < x < - m - V2 then f (x) = - m - I, w (x) = - m.
and
To see that the procedure works, let U = (u I • . . . • un) be any point of zn.
Then
n
N(u -x) ... ~ (Ui-Xi)2,
i-I
and selects j (x). Indeed j (x) does have the smallest norm of the eight
neighboring points. The algorithm takes about 4n steps to decode Dn.
The lattice An (§6.1 of Chap. 4) consists of the points
U = (UO,UI • ...• un) E Zn+1 with 'i:,Ui - O.
Algorithm 3. To find the closest point of An to x
Step 1. Given x E Rn +1, compute s - 'i:,Xi and replace x by
Suppose further that L is a lattice (or in fact any set of points) which
is a union of cosets of A:
/-1
L = U (rj+A).
i-O
Given x, compute
(5)
6. Decoding E8
Since E8 = A (,Yfs), and the Hamming code ,Yfs (§2.4.2 of Chap. 3) is a
first order Reed-Muller code, E8 can also be decoded by this algorithm.
,Yfs can be decoded in about 3·8 + 8 = 32 steps by the fast Hadamard
transform (§4), and so E 8 can be decoded in about 72 steps. It is worth
noting that this is faster than the more obvious algorithm given in
Example (c) of the previous section.
21
Voronoi Cells of Lattices
and Quantization Errors
J. H. Conway and N. J. A. Sloane
1. Introduction
Let A be an n-dimensional lattice in Rn. The Voronoi cells (§1.2 of
Chap. 2) around the lattice points are congruent polytopes, and we denote
by V(O) the Voronoi cell around the origin. Then, as we saw in Eq. (87)
of Chap. 2, the normalized, dimensionless, second moment of inertia of
V(O),
n+2
G (A) = -1 (det A) - 2n
- f X .X dx ,
n v(o)
is equal to the mean squared error per symbol when the lattice is used as a
vector quantizer for uniformly distributed inputs. If instead the lattice is
used as a code for a bandlimited channel, the integral of exp( - x . X /2( 2)
over V(O) gives the probability of correct decoding (§1.3 of Chap. 3).
Furthermore the vertices of V(O) furthest from A are the deep holes in A,
and their distance from A is the covering radius R of A (§1.2 of Chap. 2).
Spheres of radius R around the lattice points just cover Rn, so R
determines the thickness of A (§l.l of Chap. 2).
450 Chapter 21
[(p) = U(p)
Vol (p) ,
P G(P)
P G(p)
where the integral on the left is taken over the region bounded by
XI ~ O, ... ,Xn ~ 0 and XI +···+Xn ~ l.
2.B. Generalized octahedron or crosspolytope. Consider for example the
n -dimensional generalized octahedron or crosspolytope f3n [Cox20, §7.2] of
edge-length U. Takingf=l, (XI=I (to get the volume) or (XI=3 (to get the
second moment) and (Xi = 1 for i ~ 2 in Theorem 1 we find
Vo/(f3n) 2n/2 J(f3n) n
(u)n = 7' (U)2 = (n+ 1) (n+2) ,
G _ (n!)2/n
(6)
(f3n) - 2(n + 1) (n +2)
1
- -2 = 0.0676676 ... as n - 00
2e
r(Vzn + 1)
(which establishes (16), (17) of Chap. 1), I(Sn) = np2/(n+2), and
r(Vm+ 1)2/n
G(Sn) = (n+2h (8)
1
- -2- = 0.0585498 ... as n - 00
7re
It is clear from the definition that the sphere has the smallest value of
G (p) of any figure, so (8) establishes Zador's lower bound, the sphere
bound (the left side of Eq. (82), Chap. 2). Unfortunately quantizers
cannot be built with either spheres (unless n = 1) or generalized octahedra
(unless n = I, 2 or 4) as Voronoi cells, since these objects do not fill space.
2.D. n-Dimensional simplices. The next result makes it possible to find
the second moment of any figure, provided it can be decomposed into
simplices (cf. [Hohl]).
Theorem 2. Let P be an arbitrary simplex in Rn with vertices
Vi =(ViI, ... ,Vin) for 0 ~ i ~ n. Then (a) the centroid of P is the
barycenter
(9)
Voronoi Cells of Lattices and Quantization Errors 453
of the vertices,
I VOl ••• VOn
I I Vll"'Vln
(b) VoHp) = , det , and (10)
n.
I Vn I··· vnn
For n=I,2 and 3 the values of G(p) are 1/12, 1/(6.Ji) = 0.0962250 ... ,
and 32/ 3/20 = 0.104004 ... , and G (p) increases monotonically with n.
2.F. Volume and second moment of a polytope in terms of its faces.
Instead of decomposing a figure into simplices one may proceed by
induction, expressing the volume and second moment of a polytope in terms
of the volume and second moment of its faces, then in terms of its (n - 2)-
dimensional faces, and so on. Theorem 3 is the basis for this procedure.
Suppose P is an n-dimensional polytope with NI congruent faces Fb
F I ', F I ", ••. , N2 congruent faces F 2, F'2, F 2", • •• , and so on. Suppose
also that P contains a point 0 such that all of the generalized pyramids
OF b OF I' , ... are congruent, all of OF 2, OF 2' , ... are congruent, .... Let
a; E F; be the foot of the perpendicular from 0 to F;, let h; = II0a;ll, and
let V n - I (j) be the volume of F; and Un - I (j) the unnormalized second
moment of F; about a;.
Theorem 3. The volume and unnormalized second moment about 0 of P
are given by
Nh·
Vol (p) = ~ - '- ' Vn - I (j) ,
; n
454 Chapter 21
hence
1 ](p) 19
G (p) = 3 VoHp)2/3 192 3.Ji = 0.0785433 .... (13)
or equivalently
2 2 2 2 n (n + 1) 2
J(p) - (n+1) (n+2) (rl + 3r2 + 6r3 + ... + 2 rn)· (16)
Then
I(P) = U(p) = _n_{,2 + 2 (,,2 + ... + n (n-1) 2 )}
Vo/{p) n+2 n n (n+ 1) 2 'n-' ,
which simplifies to (16).
The values of g, Vo/{p) and R j are tabulated for all regular polytopes
in [Cox20, Table I, pp. 292-2951. We have already dealt with the simplex
and generalized octahedron. For an n-dimensional cube G (p) = 1/12 for
all n (since the cube is a direct product of line segments). We now treat
the remaining regular polytopes.
2.1. Regular polygons. If P is a regular p-gon of edge-length U, then
from Theorem 4 we find
1r' £2 1r'
Vo/{p) = p£2 cot - , [(p) = -6 (1 + 3 cot 2_) ,
p p
G (p) = _1_( cosec 21r' + cot ~) .
6p P P
r3s
2/3
[ )
= 0.0781285 ....
The three- and four-dimensional polytopes that have been considered are
compared in Tables 21.1 and 21.2.
where (except for the boundaries of g(S), a set of measure zero) each
point x E Rn belongs to a unique image g (S) . In this interpretation the
nodes of the diagram represent the hyperplanes that are the walls of the
fundamental simplex [Cox20, §11.3]. The angle between two walls or
hyperplanes is indicated by the branch of the diagram joining the
corresponding nodes. If the hyperplanes are at an angle of 7r /3 the nodes
are joined by a single branch, if the angle is 7r /4 they are joined by a
In- I= Xn
Wo (O n )
double branch (see Fig. 21.4), if the angle is 7r /p with P > 4 they are
joined by a branch labeled p, and finally if the hyperplanes are
perpendicular the nodes are not joined by a branch. The nodes in
Figs. 21.1-21.3 have been labeled with the equations to the corresponding
hyperplanes.
In the third interpretation the nodes in the extended Coxeter-Dynkin
diagram are taken to represent the vertices of a fundamental simplex,
rather than the bounding hyperplanes. Each node represents the vertex
opposite to the corresponding hyperplane (some examples are shown in
Figs. 21.6-21.8) - cf. [Cox20, §11.6].
One of the nodes in the diagram is indicated by a solid circle. This is
an extending node; removing it leaves an (ordinary) Coxeter-Dynkin
diagram for the Weyl group W(A}. Of the n+ 1 hyperplanes represented
by the extended diagram, all except that corresponding to the extending
node pass through the origin. It is helpful to think of the latter hyperplane
as forming the roof of the fundamental simplex. The vertex of the
fundamental simplex opposite the roof is the origin.
For later use we remark that the finite Weyl group W(A) also has a
fundamental domain, consisting of an infinite cone centered at the origin.
A fundamental simplex for Wa (A) is obtained by taking the finite part of
the cone beneath the roof. The intersection of this cone with the roof, or
more precisely with a unit sphere centered at the origin, is a spherical
simplex. The ordinary Coxeter-Dynkin diagram for W(A) describes this
spherical simplex in the same way as the extended diagram describes the
fundamental simplex for Wa (A) . These spherical simplices and (ordinary)
Coxeter-Dynkin diagrams can be used to define the Weyl groups of all the
root systems (and not just the root lattices An, Dn and En). In §§3.E, 3.F
we shall require the spherical simplices corresponding to W(A n ) and
W(Cn ), shown in Fig. 21.4. The Weyl group W(A n ) is usually written as
[3 n - I ] and is isomorphic to the symmetric group on n+l letters. W(Cn ) is
written [3n-2,4] and has order 2nn!. (See §2 of Chap. 4.)
Lemma. The origin is the closest lattice point to any interior point of the
fundamental simplex.
Proof Let u be the closest lattice point to xES . Suppose u ;:co. Then
u ¢ S, and u and x are on opposite sides of a reflecting hyperplane of
458 Chapter 21
(a)
XI + xs ' x2 + ". + x7
(b)
XI + xS ' Xz + '.. + X7
(c)
Figure 21.3 . Extended Coxeter-Dynkin diagrams for (a) W. (£8),
(b) W.(£,) and (c) W.(£6) .
Wa (A). Let u' E A be the image of u in this hyperplane, and let y be the
foot of the perpendicular from x to the line uu' (see Fig. 21.5). Then
Ilxu'112 = IIxyl12 + Ilyu'112 < IIxyl12 + Ilyull 2 = Ilxul1 2,
(a)
(b) ~
n n·1 3 2 I
Figure 21.4. Coxeter-Dynkin diagrams for the spherical simplices of (a)
W(A.) and (b) W(C.). (The labeling of the nodes is for convenience
only and has no geometrical significance.)
Voronoi Cells of Lattices and Quantization Errors 459
u
REFLECTING
HYPERPLANE
u'
The connection between the fundamental simplex and the Voronoi cell
is given by the following theorem.
Theorem 5. For any root lattice A, the Voronoi cell around the origin is
the union of the images of the fundamental simplex under the Weyl group
W(A).
Proof Let x be any point of the Voronoi cell around the origin. From
(23), x E g (S) for some g E Wa (A). Suppose x is an interior point of
g (S) . By the lemma, the closest lattice point to x is g (0). Therefore
g(O) = 0, g E W(A), and
x E U g(S) .
g E w(A)
Ilv.11 2
I
= .J.L
n+1
. (24)
I S = -- Ilvll ~ IIVil1 = -
n+2 n+1 n+2 i-O 12 6 n+1
I
- - as n -+ 00
12
(in agreement with [Dav2]) . Once the Voronoi cell has been found we can
also determine the points in R n at maximal distance from the lattice, since
these are necessarily vertices of the Voronoi cells . From (24) it follows
that the covering radius of An is R = (ab I(n + J)) 1/2 = p(2ab I(n + I) 1/2,
where p is the packing radius and a = [(n + 1) 121 and b = n + I-a.
Typical points at this distance from An are the vertex Va of yeO) and its
images under WeAn)'
The lattice A I consists of equally spaced points on the real line, and
G (A I) = 1/12. The lattice A 2 is the hexagonal lattice, the fundamental
n_I)2 ( 2 )n-I)
. .. Vn = ((- nh
~
r. (n ~ IY)
v2 = ((-0+1 . ii+I
((~)
(a)
(b)
(08 )
(c)
Figure 21.8 . Vertices of fundamental simplices for (a) £8. (b) £7 and
(c) £6.
462 Chapter 21
v= 1;80 (5,35,55,79,109,149,209,751),
929 (28)
G(E g) = 12960 = 0.0716821 ...
WIt is not difficult to give a direct proof of this statement; it also follows
from Theorem 8 below.
Voronoi Cells of Lattices and Quantization Errors 463
163 -In
G(
E7) - 2016 . 2 = 0.0732306 .... (29)
The Voronoi cells for E7 and E6 are the reciprocals of the Gosset polytopes
231 and 122 described in [Cox20, §11.8]. The covering radius of E6 is
R = 2/.J3 = pM, as illustrated by the vertices (05, -2/3, -2/3, 2/3) and
(04, 1, -1/3, -1/3,1/3).
For E~ and E; see [Con38], [Worl1, [Wor2].(2)
3.E. Voronoi cell for D;. In order to determine the Voronoi cells for the
dual lattices A; and D; we shall use Wythoffs construction, as described
in [Cox5] and [Cox20, §11.6]. The idea is to construct new polytopes out
of the spherical simplices described in §3.A, the vertices of the new
polytope being indicated by drawing rings around certain nodes in the
ordinary Coxeter-Dynkin diagram. More precisely, let Vlo ••• , Vn be the
vertices of a spherical simplex for a Weyl group W(A). If a single node of
the diagram is ringed, say that corresponding to Vi, the vertices of the new
polytope are the images of Vi under the Weyl group. If two or more nodes
are ringed, say those corresponding to Vi, Vj, ••• , the symbol represents a
polytope whose vertices are the images under W(A) of some interior point
of the spherical subsimplex with vertices Vi' Vj,.... We can adjust the
metrical properties of the polytope (for example, equalize its edge lengths)
by choosing this interior point suitably. Some 1-, 2- and 3-dimensional
examples are shown in Fig. 21.9; others may be found in [Cox5], [Cox20].
(a) ® o (k)~
(c)@--€) ( m) o----@------o
We now use this construction to find the Voronoi cell for n ~ 3. D:,
We change the scale so that D: becomes the union of (2z)n and
(I n) + (2z)n . The closest points to the origin in the first set consist of 2n
points of the form (± 2,on-I), and the closest in the second set consist of
2 n points of the form (±In) . The Voronoi cell V(O) is the intersection of
the Voronoi cells determined by these two sets. The first of these, P say, is
a cube centered at 0 with vertices (± 1n). The second, Q say, is a
generalized octahedron with vertices (±nI2,On-') . Furthermore Q can be
obtained by reciprocating P in a sphere of radius p = Jnfi centered at the
origin.
Thus the Voronoi cell V(O) is the intersection of P and a reciprocal
polytope Q=p. . In other words V(O) is obtained by truncating P in the
manner described on page 147 of [Cox201, and is therefore specified by
ringing one or two nodes of the Coxeter-Dynkin diagram (Fig. 21.4b) for
the spherical simplex of P ([Cox51, [Cox20, §§8 .1, 11.7]) .
The radii R j (defined in §2.H) for the cube P are given by R j = .In-j
[Cox20, Table I, p. 2951. If n is even the radius p of the sphere of
reciprocation is equal to Rn/2' and we must ring the node labeled nl2 in
o~==@
oj" 0 @
04 =---@---<>
o;~
06 =---<>-----@-<>
•••
Figure 21.10. Voronoi cells for the lattices D~ .
Voronoi Cells of Lattices and Quantization Errors 465
Fig. 21Ab. If n is odd p lies between R (n-t)/2 and R (n+t)/2 and both nodes
(n - 1)/2 and (n + 1)/2 must be ringed. We have therefore established the
following theorem.
Theorem 6. The Voronoi cell around the origin of the lattice D: is the
polytope defined by the diagrams in Fig. 21.10.
The coordinates for (Hn,k) and O(n,k) given below show that the
edge-lengths of the Voronoi regions are all equal. In Coxeter's notation
[Cox20, §8.I] the Voronoi cell for D;,
is
{ 3 3 ... 3 }
33 ... 34
{ 3 33 ... 3 }
33 ... 34
a ( 6 , 2) ~
(3(6,2) ~
r (6,2) o--o--o----@---
8 (6 , 2) =----->-----@--
Figure 21.11. The polytopes a(n,k), {3(n,k), ,,(n,k) and Q(n,k). In
general a(n,k) has n nodes with the k-th node from the right ringed,
and ,,(n,k) has n nodes with the k-th and (k+I)st ringed (except that
,,(n,O) = a(n,I) and ,,(n,n) - a(n,n». {3(n,k) and o(n,k) are the
same as a(n,k) and ,,(n,k) respectively, except that the left branch is a
double bond. By convention a(O,O) and ,,(0,0) represent a point.
Similarly
rHn,k) has vertices (on-k+l,±l k ), Rp(n,k) =.Jr,
.
'Y (n, k) has vertices
12k) R -y (n, k) --
(on-k '" -J4k (nn +
kHn
I'
Hn,k) has vertices (on-k,±I,±2k ), R~(n,k) = .J4k+1 .
p(n,k)
/ I
/ I
2n/ 12n
/ I
/ I
/ I
p(n-I,k -I) a(n-I,k)
Figure 21.13. fJ(n,k) has 2n faces which are ,8(n-l,k-l)'s and 2" faces
which are a(n-l,k)'s. (We use broken lines here to make the structure
of Figs. 21.14, 21.15 more visible.)
Voronoi Cells of Lattices and Quantization Errors 467
where
Table 21.3. The first few values of va(n,k), ua(n,k), v~(n,k) and
u~(n,k). The diagonals correspond to k = 1,2, ....
1 57 302 302 57 1
1 26 66 26 1
11 11 1
(46)
The j-dimensional faces of a(n,k), ... ,O(n,k) for any j can be found from
Figs. 21.14, 21.15.
470 Chapter 21
The special cases we are most interested in are {3 (2t ,t) and {) (2t + 1, t),
the Voronoi regions for n;1 and n;I+1 respectively. For n;1 we have
221
Vol (V(O» = vfl(2t,t) - - = 221 - 1
(2t) !
221
U(V(O» = ui 2t ,t) (2t+2)!'
• ui2t ,t)
G (D21) = 2 1/1 ( )' p = 1, (47)
2- t 2t+2 !
"'! /'
0(4,1) ,8(4,1)
0(3,1)
0(4,2)
/~ i / '
,8(3,1)
,8(4,2)
0(3,2)
0(4,3)
/~! /'
,8(3,2)
,8(4,3)
0(3,3)
0(4,4)
~!/ 0(1,1)
Figure 21.14. Interconnections between the a(n,k) and (:J<n,k).
~l/ y(O,O)
For this version of D;I+1 (which differs by a scale factor from the
definitions given in §7.4 of Chap. 4) we have
221 +1
Vo/(V(O» = v6(21+1,t) ( ) = 241 +1 ,
21+1 !
221 + 1
U(V(O» = u6(21+1,t) (21+3)!'
u6(2t+ 1, t)
( . ) =-:---....:....-----::-;-:-
GD (48)
21+1 (21+1) (21 + 3)! 2/ (1)'
where
f(t) = 2(21 2+51+1)
21+1 '
p = .J3 Of 1 = 1), p = 2 Of 1 > 1),
R = R 6 (21+1,t) - .J41+1
= p$ Of 1 = 1), p.Jl + 1/4 Of 1 > 1) .
For example D; ;;: A; is the body-centered cubic lattice, the Voronoi cell
is a truncated octahedron (Fig.2.2b), and G(D;) = 19/(192 3..Ji) On
agreement with (13». Also
GW;) = 13/(120..Ji) = G(D 4 ) ,
2641
G W;) = 3/5 = 0.0756254 ... , (49)
23040·2
601 . 21/3
G(D~) = 10080 = 0.0751203 .... (50)
472 Chapter 21
The values of G (D;) are plotted in Fig. 2.9. The minimal value is
0.0746931... at n = 9.
3.F. Voronoi cell for A;.
Theorem 7. The Voronoi cell for the lattice A; is the polytope Pn defined
in Fig. 21.16. If we rescale A; by multiplying it by n + 1, the vertices of
the Voronoi cell consist of the (n + 1)! points obtained by permuting the
coordinates of
= [-n -n +2 -n +4 n -2 !!...]
(J 2' 2 ' 2 , ... , 2 ' 2 .
= p{ (n +2)/3}1IZ,
(52)
@----@-@--@--@ Pn
Figure 2l.16. Voronoi cell p. = V(O) for A;. There are n nodes, all
ringed.
6 6
CE TER
OF Pn
J = I n-I
~ (
n ) r' S S (!!. J +
+ _' J
_ S ) .
n 2(n+I)nn-I,~ r 4 s r
where r+ s =n-2. Using Abel's identity [Rio2, §1.51 to simplify the first
term, this becomes
(53)
474 Chapter 21
The values for n ~ 9 are plotted in Fig. 2.9. The curve is extremely fiat,
the minimal value 0.0754913 ... occurring at n = 16.
G. The walls of the Voronoi cell. As explained in §1.2 of Chap. 2, the
walls of the Voronoi cell V(O) for a lattice A are defined by the relevant
vectors of A. For a root lattice we saw in the Corollary to Theorem 5 that
the relevant vectors in a root lattice are precisely the minimal vectors. In
this case there is a simple description of V(O).
Theorem 8. If the relevant vectors are precisely the minimal vectors, then
V(O) is the reciprocal of the vertex figure of A at the origin.
Equivalently. V(O) is (on a suitable scale) the reciprocal of the polytope
whose vertices are the minimal vectors of A.
Proof This follows immediately from the definitions of vertex figure and
reciprocal polytope - see [Cox20).
The following is a useful sufficient condition for a lattice to have this
property. Let us write A - Ao U Al U ... , where the ith shell Ai
consists of all v E A with v . v = Xi (say), and 0 = Xo < XI < ....
Theorem 9. Suppose that (i) Ar C Al + Al + ... + Al (r times). and
00 rX I ~ Xr • for all r = 1, 2, ... Then the relevant vectors are precisely
the minimal vectors.
Condition (i) states that Al spans A, and moreover does it economically in
the sense that any vector in Ar is the sum of not more than r vectors of AI.
In practice this condition is very easily checked by induction. An
important class of lattices satisfying (i) are those obtained by applying
Construction A to a linear binary code with minimal distance ~ 4 that is
spanned by the codewords of minimal weight, and if d < 4 has the
additional property that no coordinate of the code is always zero.
Proof of Theorem 9. Suppose the contrary, so that there is a point u E Ar
with r > 1 and a point x E Rn such that x· u > Y2X r , but
x·v ~ lhX I for all v E AI. From 0), u = ~nivi with Vi E AJ, ni > 0
and ~ni ~ r. Then x ·u = ~ni(x ·Vi) ~ lhX I ~ni ~ lhrXI ~ lhX r ,a
contradiction.
Voronoi has given a simple characterization of the relevant vectors in
any lattice (see [Vorl, Vol. 134 (1908), p. 277] and [Ven5]).
Voronoi Cells of Lattices and Quantization Errors 475
The distance (2k) 1/2 is therefore a bound for the covering radius, since
spheres with this radius, centered on lattice points, will cover the entire
space. (In the following chapter it is proved that the actual value of the
covering radius is..fi.) The packing radius of this lattice is 1.
Proof We start by putting a normed space structure on our 24-space,
with the zero point as one of the lattice points, and the norm of a vector as
the distance of the corresponding point from the zero point.
Lemma. If (the point corresponding to) 2v satisfies the result of the
theorem. then so does v.
Proof By hypothesis there is a vector u, with 2u in the lattice, such that
112v-2u II ~ 2k, so that II v-u II ~ Ihk. Now since u is the midpoint of
the line joining 0 to 2u, it satisfies one of (a) -(c) above. In case (a), u is
a lattice point, and v is obviously within the required distance of it. In
case (b), let x and y be the two lattice points closest to u, so that
2u =x+y. The last equation, together with lIu-xll ... 1f.Illx-yll = lor
3/2, implies that Ilv-xll + Ilv-yll =2(lIv-ull + Ilu-xll) ~ k+3 < 4k,
from which the result of the theorem follows, since one of Ilv-x II, Ilv-y II
will be less than 2k. In case (c) we apply a translation that takes u to the
origin (and v to say v' = v-u), and use the coordinate system defined in
the condition. Let x' be one of the 48 lattice points named in this
condition with the greatest inner product with v', and let this inner product
be a. Then Ilv'll ~ 12a 2, and Ilv'-x'll = Ilv'll + 2-2a, as v'· x' = a
and II x' II = 2. From this we can show by computation that the hypothesis
IIv'll ~ Ihk implies Ilv'-x'll ~ 2k, so that v is within the required
distance of a lattice point. This proves the lemma. It turns out that the
peculiar-looking value of k is the least that allows the final deduction.
To complete the proof of the theorem, we note that the lemma implies
immediately that every dyadic rational point satisfies the result of the
theorem, which is automatically true for lattice points. But it is obvious
that the distance from the nearest lattice point is continuous on 24-space,
and the inverse image of [0, 2k 1, being the set of points satisfying the
result of the theorem, will be both closed and dense (as the dyadic
rationals are dense in R). The theorem now follows directly.
Postscript. The method described here has proved even more successful
when applied to other lattices. Illustrations may be found in §5 of Chap. 6
and in [Con361, [Con371, [Con43].
23
The Covering Radius of the Leech Lattice
J. H. Conway, R. A. Parker and N. J. A. Sloane
1. Introduction
The main result of this chapter is the following, which confirms a
conjecture made by Leech soon after his discovery of the lattice.
Theorem 1. The covering radius of the Leech lattice is .Ji times the
packing radius.
The covering radius R is defined in Eq. (3) of Chap. 2. An upper bound
of R ~ 1.452 ... p (where p is the packing radius) was obtained by Norton
in [Nor4] (= the previous chapter). In the course of proving Theorem 1
we shall classify all the "deep holes" (defined in §1.2 of Chap. 2) in the
Leech lattice. There is a remarkable connection between these holes and
the Niemeier lattices. The Leech lattice is the unique 24-dimensional even
unimodular lattice with minimal norm 4 (Chap. 12), and Niemeier
([Nie2]; §1 of Chap. 16) found that there are 23 other 24-dimensional
even unimodular lattices, all with minimal norm 2.
Theorem 2. There are 23 inequivalent deep holes in the Leech lattice
under congruences of that lattice, and they are in one-one correspondence
with the 23 Niemeier lattices (see Table 23. J).
An outline of the remainder of this chapter is as follows. In §2 we
associate a Coxeter-Dynkin diagram (§2 of Chap. 4) to any hole in the
Leech lattice. Two kinds of diagrams occur; those for which all
components are ordinary Coxeter-Dynkin diagrams, and those that contain
The Covering Radius of the Leech Lattice 479
Table 23.1. The 23 types of "deep hole" in the Leech lattice. Here h -
Coxeter number, V - number of vertices of hole. Note that the
component of highest dimension identifies the hole uniquely.
Components h V Fig. Components h V Fig.
The resulting graph with these nodes and edges is the hole diagram. By
the end of the chapter we shall have proved that this diagram is actually a
Coxeter-Dynkin diagram, or more precisely that the following theorem
holds.
Theorem 4. The diagram for a hole in the Leech lattice is a graph whose
connected components are taken from the list an (n ~ 1), d n (n ~ 4), e6,
e7, eg, An(n ~ 1), Dn(n ~ 4), E 6, E 7, Eg (see Fig. 23 .1) .
The components denoted by lower case letters are called ordinary
Coxeter-Dynkin diagrams, the others, extended. (In this chapter the terms
ordinary and extended diagram will always refer to the connected graphs
shown in Fig. 23.1.)
The following construction is helpful when studying a hole (e, p). We
embed the space in which A lies in R 25 , with A contained in a hyperplane
H, and choose a point c' on the line through e perpendicular to H as
follows. If the radius R ~ J2 we take c' = e, but if R < J2 we choose e'
so that its distance from the vertices of P is J2 (Fig. 23.2) . If R < J2
two nodes Vi, Vj in the hole diagram are not joined, or are joined by one or
d. ~._~ (.NODES)
e~~ e7~
ea o~~--~--~o--~l__~o--~o
,
A 1\ 1 A... -
2,L...1 10'
, 1
, 1
On ~~ (n+' NODES>
2 2 2 2 2
,
'~
ES 1 2 3 2 1
E7 ,
0 0
2
0
3
r
4
0
3
0
2 ,
0
Ea
'2345642
Figure 23.1. Ordinary Coxeter-Dynkin diagrams an (n ~ 1),
dn(n ~ 4), e6. e7. e8 and extended Coxeter-Dynkin diagrams An(n ~ n,
Dn (n ~ 4). E 6. E 7, E 8. The latter are labeled with the integers Cj .
482 Chapte r 23
two edges according to whether the inner product (Vi-C', Vj-c') is 0, -lor
-2 respectively (see Fig. 23 .3).
The first step is to dispose of the case when the diagram contains no
extended diagram as a subgraph.
Theorem 5. A hole diagram with no extended diagram embedded in it
contains only ordinary diagrams as components.
Proof This is proved by an elegant and elementary combinatorial
argument (given on page 195 of [Cox20, §11.5]).
Theorem 6. The hole corresponding to a diagram in which all components
are ordinary has radius R < .Ji.
Proof Such a diagram also describes a root system in which all the roots
have the same length [Boul], [Humn Let us choose a fundamental set
(or base) of roots, i.e. a set of linearly independent vectors V" .. ., Vv in an
II,
o
...---./s - -- ...
oo--~---oo--~--~o
IIi ./2 c' ./2 II,
V
Suppose we can find points v[1l, ... , ~I/ in the Leech lattice A whose
mutual distances define an extended diagram Ill> and such that their
circumcenter c is distant J2 from all of them. The next theorem, which is
essential in all that follows, asserts that under certain conditions c is the
center of a unique hole in A of radius J2.
Theorem 7. Suppose c E R24 is distant J2 from Leech vectors v[1l •....
(I). (2) (2).. (s) (s)
VI'I ' VI • . . • • V1'2' .•• , VI • . . . • vI's suc
h th at th e vec tors Vj(0 - c span
R24. and. for i = 1•... • s. the mutual distances of v?). '" .v~: define an
extended diagram Il i . Then there is a unique hole in A with center c and
radius J2. whose vertices are precisely the vJo and whose hole diagram
has components Ill. 1l 2• . . • • Ils. In this case we say that the hole is of
type 1l 11l 2 · .. ll s .
Proof We first show that there is a hole of radius J2 centered at c, and
the vJo are all its vertices. Suppose z EA is distinct from the vJO and
satisfies N (z-c) ~ 2. For any vJO we have
Proof We take one vertex of A3 as the origin and label the others u. v. w.
and calculate the following inner products:
u v w u+v-w
u 6 2 4 4
v 2 4 2 4
w 4 2 6 0
u+v-w 4 4 0 8
The subgroup of Co"" fixing the origin is the group Coo. and the subgroup
of Coo fixing u is 24A7 (An denotes an alternating group and Sn a
symmetric group). To find v we use the facts that v is a type 2 vector. its
inner product with u is 2. and that the group 24. A7 is transitive on the last
IS coordinates of u to write
00 40 40
00 00 00
v'" 00 00 00
00 00 00
and then
-22 00 40
22 00 00
w-
22 00 00
22 00 00
-1 1 20 20
c .. 1 1 00 00
1 1 00 00
1 1 00 00
486 Chapter 23
For the second part of the proof we observe that c is also the center of
seven other A3's such as that shown in Fig. 23.4, and which are based on
octads meeting the left-hand octad of the MOG in four places. (The
others are the images of the one shown in Fig. 23.4 under powers of the
permutation ex given in Fig. 23.8 below.} Again Theorem 7 completes the
proof.
Theorem 12.
4 4 2 6 6 6
8 4 2 2 2 2
C = (I/S)
4 4 6 2 2 2
4 4 6 2 2 2
This is also the center of five other A/s, namely the one shown in
Fig. 23.Sb and its images under the following element of order S in Coo
bo Co Cz C3
ao do b4 b l
a3 a4 C4 d3 d4 bz
az al Cl dz b3 d l
(This has four fixed points indicated by dots and four cycles (ao • ...• a4),
(b o• ...• b 4 ) • . . . • (do . .... d 4 ).)
The remaining An's can be handled uniformly. Consider a hole
diagram containing an An' where n is large, labeled as in Fig. 23.6 and
0 2 2 2 2 2 2 0 2 2 -2 2
2 0 0 0 0 0 0 2 0 0 0 0
2 0 0 0 0 0 0 2 0 0 0 0
2 0 0 0 0 0 0 2 0 0 0 0
-2 0 2 2 2 -2 0 2 2 2 -2 -2
0 2 0 0 0 0 2 0 0 0 0 0
0 2 0 0 0 0 2 0 0 0 0 0
0 2 0 0 0 0 2 0 0 0 0 0
Figure 23.4. One of seven other A /s used in the proof of Theorem 11.
The Covering Radius of the Leech Lattice 487
(a) 1 1 1 1 1 1
/
5 1 1 1 1 1
1 1 1 1 1 1
1 1 1 1 1 1
00 o 0 00 2 2 o 2 2 2
00 o 0 00 00 2 0 o 0
00 00 00 o 0 2 0 00
00 o 0 00 00 2 0 00
,/'
00 o 2 2 2 1 1 1 1 1 1
2 2 2 0 o0 1 1 -3 1 1 1
2 2 2 0 o0 1 1 1 1 1 1
2 2 2 0 o0 1 1 1 1 1 1
(b) o0 20 2 2
2 2 02 o 0
/
00 2 0 o 0
00 2 0 o 0
1 1 -3 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 -3 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
/
02 2 2 2 2 20 o 2 00
2 0 o 0 00 2 0 o 2 00
20 o 0 00 o2 2 0 o0
20 o 0 o 0 o2 2 0 o0
Figure 23.5. Some vertices of the A: hole.
00 00 00 5 1 1 1 1 1 40 -4 0 00
00 o 0 o 0 1 1 1 1 1 1 000000
00 00 00 1 1 1 1 1 1
o000000
0 00 0 0 1 \
00 00 o 0 1 1 1 1 1 1
112
40 o 0 4 0
00 00 o 0
00 o 0 o 0
1
1
1
1
1
1
-3
1
1
1
1
1
1 1
1 1
1 1
3 -1 1 1
-1 -1 1 1
-1 -1 1 1
1
1 11/
1 1
00 00 o 0 1 1 1 1 1 1 -1 -1 1 1 1 1
ex
111111
fJ
Figure 23.8. Generators for PSL 2 (7).
From this it follows that each Vm in Fig. 23.6 for m ~ 6 is of the form
3 -1
- [ijk] (say) ,
where i, j, k are the locations of the -1's in the left octad with the
following labeling:
000
3 2
5 1
6 4
3 1 -1 1 1 1
-1 1 -1 1 1 1
" - [356] - -1 1 -1 1 1 1
-1 1 -1 1 1 1
'8 - [012] and [345]. Now only the identity element of Coo fixes
'9 -
'I, ... ,'9. and the remaining 'm
are not unique (see Fig. 23.9). We
summarize these results in a tlteorem.
Theorem 13. All possibilities for the vertices '0,"" 'n-I of an An
diagram are displayed in the An -tree of Fig. 23.9.
THE An - TREE
UtO
Utt
o0
.
'6 =
4 0
o0
o0
-2
2
2
2
2
2
o0
o0
o0 2 2 o0
4 0 -2 2 2 2
o0 2 2 2 2
o0 o0 o0
o0 o0 o0
4 0 -2 0 2 0
o0 2 0 2 0
o0 2 0 2 0
o0 2 0 2 0
4 0 -20 2 0
o0 2 0 20
o0 o2 o2
o0 o2 o2
For An (n ~ 10) there are at most two choices for v;, namely
4 0 -20 20
o0 o2 o2
o0 2 0 2 0
o0 o2 o2
4 0 -2 0 2 0
o0 o2 o2
o0 o2 o2
o0 20 20
and these are also shown in Fig. 23.9. Inspection of the tree reveals that
we have proved the following theorem (the assertions about the
AI, ... ,A4 holes having been established earlier).
Theorem 14. There is a unique An diagram in A for n = I, ... ,9, 11, 12.
There are at most two AI5'S, three A\7's and five A24's, and none of type
A n forn=lO, 13, 14, 16, 18, ... ,23.
It remains to consider the holes containing these diagrams. We
postpone consideration of A5 until Theorem 18.
The Covering Radius of the Leech Lattice 491
Theorem 15.
A6 .. At (Fig. 23.10) ,
A7 .. A1 D? (Fig. 23.11) ,
As .. A~ (Fig. 23.12) ,
A9 .. A§ D6 (Fig. 23.l3) ,
the first A 12 in one or two places. The result is shown in Fig. 23.15b.
Theorem 6 then completes the proof. A similar argument applies to the
other cases, the corresponding centers being
21 1 -7 5 7 3
1 1 5 5 3 3
1 1 5 5 3 3
1 1 5 5 3 3
12 1 -4 2 4 2
1 0 3 3 3 3
1 0 2 2 2 2
1 0 2 2 2 2
27 3 -9 3 9 3
1 1 5 5 7 5
A~ : (l/9)
1 1 5 5 7 5
1 1 5 5 7 5
15 1 -5 2 5 2
1 0 3 3 3 3
1 0 2 4 3 3
1 1 2 3 3 4
492 Chapter 23
A~
-[124]- u~ ]
~)
L Uo - U, - U2 - U3 - U4 - U5 -[124]-[356]-u: J
(b) , - - - - - - - - - - - - - - - _ - - ,
L[015] [236] [145] [023] [456] [123] [046] [135] [246]J
(b) [[015] [234] [016] [245] [136] [025] [146] [023] [145] [236]J
~26] ~2~
" [034]-[125 ]-[046]/
~5~ / "~3~
Figure 23.13. The A~ D6 hole, the unique hole containing Dg,
A11
(a)
Lvo v1 v2 v3 v4 v5 [124][356][012][345][126] Z1 J
(b) [023]
I
[146] Es
I
[245 ]-[136 ]-[025]-[134 ]-[256]
[234] [123]
" [015 ]-[246]-[135 ]-[046]/ 07
[236] / "[125]
(a)
(b)
[[015] [236] [145] [023] [146] [025] [134] [256] [034] [125] [046] [135] [246]J
Figure 23.15. The A f2 hole.
494 Chapter 23
18 2 -6 2 6 3
1 0 3 4 3 5
1 0 3 4 4 4
1 1 3 3 4 3
27 2 -9 3 9 4
1 1 4 7 4 6
2 0 5 6 7 5
2 1 4 6 6 5
[136] AfT E7
(b) I
[145]-p23]-[146]-[025]-[ 134]-[256]-[034]
Figure 23.17. A hole of type A I7E 7.
The Covering Radius of the Leech Lattice 495
The remaining six lines are the axes of C, and do not meet the oval (see
Fig. 23.19). They are labeled with totals, a total albcdef being an
abbreviation for the set of five synthemes ad.ce.bf, ae.bc.df, af. be. cd ,
ab.cf.de , ac.bd.ef, which are the points on the axis. The vertices in the Dn.
diagrams will involve the following vectors:
0, the zero vector;
[p], where P is a point in the plane or I, II or III, has -3 at
position P and l's elsewhere;
[J>] has 5 at position P and l's elsewhere;
[L], where L is a line in the plane, has 2's at the five points of the
line and at I, II, III, and O's elsewhere;
1 4 1 3 0 3 0 1 o 2 o 4
2 3 2 4 1 2 3 4 1 4 2 3
IX) 0 IX) 1 3
IX) IX) 2 4
IX)
I 1 2 0 2 o 4 0 3 o 1
3 4 3 4 1 2 1 4 2 3
IX) 2 CD 4
II CO 0 4 0 2 1 3
1 3 1 3
IX) 3 CD 1
ill 0 0 1 0 3 4 2
2 4 2 4
Figure 23.18. Labels for positions in the MOG, based on an oval in the
plane of order 4.
496 Chapter 23
·: ru3j.:
atE
00101234
..
.. .
...
00101324
HE·
..
00101423
....
~~~
[I[IJ [IIJJ [IT]]
Figure 23.19. The six axes of C.
[n] (0:>
[c'] (05)
(O~> [0] [00101234] (O~)
[001] (07)
[000.12.34] (Oa)
[23] (Og)
[003.02.14] (010)
[001.02.34]
[02]
[004.02.13]
The Dn - tree
[13]
[003.04.12] (024)
Figure 23.20. The D.-tree.
The Covering Radius of the Leech Lattice 497
o0 o0 o0
o0 o0 o0
2 2 o0 2 2
[e] -
2 2 o0 2 2
o0 o0 2 2
[e'] -
o0 o0 2 2
2 2 o0 o0
2 2 o0 o0
2 0 2 0 o0
[.0]-
2 0 2 0 o0
2 0 o2 2 2
2 0 o2 2 2
The edges in the diagrams can be found easily from the incidence relations
in the plane. For example
N([Pl,[L)) - 6 if and only if P is on L,
N ([p l,[L)) == 6 if and only if P is not on L,
N([p],[e)) == 6 if and only if P is on e,
N([Ll,[e)) - 6 if and only if L is an axis of e,
Arguments similar to those used in the previous section now lead to the
following theorems.
Theorem 17. All possibilities for a Dn diagram are displayed in the Dn-
tree of Fig. 23.20. There are at most two distinct D/s and D6'S, the
diagrams of type D 5, D 7 , D s, D 9 , D IO , D l2 , DI6 and D24 are unique, and
there is no diagram of type Dn for n - II, 13, 14, IS, 17, ... , 23.
Theorem 18.
D4 ,.. D3 (Fig. 23.21) or At D4 (Fig. 23.22) ,
D5 ,.. Ar D~ ,
D6 ,.. Dt (Fig. 23.23) or A~ D6 ,
D7 .. AII D 7E 6'
Ds .. Di (Fig. 23.24) ,
D9 ,.. A 15 D 9 ,
DIO ,.. DIOEr (Fig. 23.25) ,
DI2 ,.. D'l2 (Fig. 23.26) ,
DI6 ,.. DI6 E S (Fig. 23.27) ,
D24 ,.. D 24 ·
498 Chapter 23
(a) ( b)
[ill] [0] [1]
~l
[a]
[iJ
[CD 0.12.34]
,
[ CD 0.14.23]
[ CD 0]
[CD 1.02.34]
,
[CD 104.23]
[CD 1]
(a)
[m]
[fi]
[n]
(b) I rrnI rwnLll rl':O.l r?Lll I
[CD 2 .04.13] [CDO.1324] [CD 301.24]
[r] [0:>014.23]
[0:>401.23]
[0:>0.12.34]
[fi]
D~ [<00.14.23]
[r] [<0]
(a) ~ [<00]
[c]
[<00.12.34]
[:iIr ]
[<04.01.23] [<02.03.14]
[<03.01.24] [<01.03.24]
[24]
[<02.01.34] [<04.03.12]
[<01.02.34] [<01.04.23]
[<04.02.13] [<02.04.13]
[<03.02.14] [<03.04.12]
[fu]
[0040123]
[24] [01]
[ 001.0423]
[001.03.24]
[c] [000]
(a)
[1J [00] [000.14.23] [002.03.14]
[m] [004.03.12]
[004.01.23] [001.04.23]
[003.01.24] [003.04.12]
D16
[fr] [<D2.01.34]
(a)
)--m_J~:OI241
[m] [<D4.01.23]
(b) Ea [<D1.04.23]
5 3 5 3 3 3
9 3 5 3 3 3
9 3 3 5 5 5
9 3 3 5 5 5
3 3 3 3 3 3
7 3 3 3 3 3
Dt: (l/5)
7 3 3 3 5 5
7 3 3 3 5 5
4 6 4 4 4 4
10 4 4 4 4 4
10 4 4 4 6 6
10 8 4 4 6 6
502 Chapter 23
5 7 5 5 5 5
l37 5 5 5 5
13 5 5 5 9 7
13 9 5 5 9 7
6 8 6 6 8 6
16 8 6 6 6 6
16 6 6 6 1010
16 12 6 6 10 8
8 12 108 10 8
22 10 8 8 8 8
22 8 8 8 14 12
22 16 8 8 14 12
12 18 14 12 16 12
34 16 12 12 12 14
D24 : (1/23)
34 12 12 12 20 20
34 24 12 12 22 18
We have already encountered the latter hole in §4. The center of the Ei
hole is
The Covering Radius of the Leech Lattice 503
45 6 -15 6 15 6
1 2 8 7 10 7
c = (1/15)
4 2 8 10 10 10
1 -1 8 10 10 10
(a)
(b)
[146]
[134 ]
[256]
18 3 -6 4 4 4
1 0 5 3 3 3
c- (1/6)
1 0 5 3 3 3
1 0 5 3 3 3
where the subscripts are to be read modulo 25 throughout this proof, and
75 7 -25 9 25 11
3 1 13 17 13 17
c = (1/25)
5 1 13 15 23 13
5 3 11 15 15 15
is the center of the fi'S. We then verify that g, E A-c for r = 0, 5, 10, 15,
20, but not for the other values of r. (In fact A is spanned by the vectors
(fi-fo, gs,-fo}. This is one of the 23 "holy constructions" of the Leech
The Covering Radius of the Leech Lattice 505
lattice - see the next chapter.) Therefore no element of Coo can send fo
to fl' f1 to f l +1• . . . • f24 to f 24+1 for t - 1,2, 3, or 4, and so there are five
labeled A24 diagrams which are inequivalent under Coo. This accounts for
all the diagrams, and completes the proof.
We have found a unique hole for everyone of the Niemeier lattices
(see Table 23.1), proving Theorems 2 and 4. Each of these holes has
radius J2, so the proof of Theorem 1 is also complete.
24
Twenty-Three Constructions
for the Leech Lattice
J. H. Conway and N. 1. A. Sloane
h~,(+ (n -I), -en - 2), ... , -1,0) g,= h-' (0,1 ,2, ... , n f:2'1-(~ >-3
(go=h-' (-~n, -~n +. 1, .. " ~n -- I, ~n) (= ~
It>
;l
' - - - - + 010... 0- - + 00... ...00 - + «'
.:,
;l"
+ 0...
o - I, 000 -14+ 0... ~n_'
. .. 0 - + 0 ....
It>
~--- It>
00 - + 0 ... (')
[3 o
;l
-+0 ... 0-+0 ... 00-+0 ..... 0--+0 .. 00 -- + ++oo... ...OO--~ ~
....
(
~
I, I, 13 In _ I In C h ~ .. ) ;:?,
'"
g,=h-I(1n,-1n,-1n+I, . . ,-\:n-I). g3=h- I (-(n -I), -en -2), ... , -1,0) go=h-'(0,1,2, ... ,n -2, +(n -I» o·
;l
E7 , h = 18
'"
E., h = 12 0'
....
H++++----) S-
It>
go = h-I (If, -1. -~. -t LH, -¥)
e -000000 +
?b'
It>
+ 000000 00 - + 0000 0000 - + 00 000000 - + ) (')
;l"
C- o- + 00000 000 - + 000 00000 - + 0 t""
gl =11- 1 ('It, -Ij, -Ii, -lj, -i, -i, L~) go=h-' (-t -a, i, to lj, Ii, 11, -4(,) ~
;:;.
It>
!(++++----)
Figure 24,1. Fundamental vectors ii. glue vectors gx. and Coxeter
(J1
number h for the root lattices An (n ~ 1). Dn (n ~ 4). E 6. E 7 and E 8 o
(plus and minus signs stand for + 1 and -I respectively), "
508 Chapter 24
where h is the Coxeter number (§2 of Chap. 4). The Ii and gx for the
components are then combined to form the fundamental and glue vectors
for the corresponding holy construction, in a way that we now illustrate.
Example 1. For the case A [2 the fundamental vectors are
V) Id,/t.···. it2,fg,ff . .... If2
3
9
(b)
o
II
KI. I . I
9
~J 2
3
7
r · ~g6.2.0 ~'I'l
l ,
.
1 5
6
Figure 24.2. Hole diagrams for Af2 and A 11 D 7E 6 •
(or equivalently with 'f;mi + 'f;nw == 1 modulo h), and the nearest lattice
points to the hole are just the fi' The radius of the hole is
Vi, fi) I/Z =..fi. The gw are lattice points only slightly more distant,
having (gw, gw) = 2 + 2h- l .
It is easy to check from our description that fi is distant .J4 or .J6
from fi according to whether Vi, f) = 0 or -1, i.e. according to whether
g, = \ (1. - I) - - '
o
I ,' ( - .+)
gill ..
Figure 24.3. (a) Fundamental and glue vectors for A I . (b) Hole diagram
for A r4.
There is a glue vector gxyz '" for each codeword in the binary
Golay code.
Ii and hare unjoined or singly joined in the diagram. Again gxyz ... is
distant .J6 from 11./:./;, ... and distant .J4 from all other Ii' We
therefore indicate distances of .J6 between Ii and /j or between Ii and gw
by joins in the hole diagram. which has a node for each Ii and gw ' Some
examples appear in Fig. 24.2. (Distances between one gw and another are
not indicated in the diagram.)
The case A [4 is slightly exceptional. The diagram for A I is given in
Fig. 24.3a, where the pair of joins between 10 and I I indicates that their
inner product (fo, II) is -2, showing that II - -/0, and the distance
between 10 and I I is.J8. For the holy construction of type Af4 we change
to a different coordinate system and rescale, obtaining
I~ =- (-4,0 23 ) , Ig ~ (0 , -4, 022 ), ... ,
for each word xyx ... in the ternary Golay [12,6] code C€12 (§2.8.5 of
Chap. 3). This is the complex version of the Leech lattice (Example 12 of
Chap. 7, §3.6 of Chap. 10). It seems likely that some of our other
512 Chapter 24
The symmetry group of a deep hole. For each entry in Table 16.1, the
group of automorphisms of the Leech lattice that fix the corresponding
deep hole is a compound of groups Goo, Gj, G 2, where Goo is a group
isomorphic to the glue code (or group). A typical element 11"/ E Goo takes
gw to gw+/. The orders of Goo, G 1 and G 2 are shown in the table.
25
The Cellular Structure of the Leech Lattice
R. E. Borcherds, J. H. Conway and L. Queen
We complete the classification of the holes in the Leech lattice, and of the
associated Delaunay cells, by showing that there are precisely 284 types of
shallow hole.
1. Introduction
In Chap. 23 it was shown that there are 23 types of deep hole in the Leech
lattice A24 , and that these holes are in one-to-one correspondence with the
Niemeier lattices. The existence of this correspondence, and the recently
discovered correspondence between the conjugacy classes in the Monster
group and certain modular functions [Con17], suggested that it might be
worth enumerating the shallow holes in the Leech lattice and completing
the classification of its Delaunay cells, in case any "deep structure" became
apparent. Although this has not yet happened, the complete list of deep
and shallow holes has already found several uses, and it seems worth while
to put it on record. The main result is the following.
Theorem 1. There are 307 types of hole in the Leech lattice, consisting of
23 types of deep hole and 284 types of shallow hole. They are listed in
Table 25.l.
It was shown in Chap. 23 that the vertices of a deep hole in A24 are
described by a graph that is a disjoint union of extended Coxeter-Dynkin
diagrams which have total subscript (or dimension) 24 and constant
Coxeter number h. There are just 23 possible combinations, which can be
seen in the first 23 lines of Table 25.1. Using the same graphical notation
we prove the following result.
Lemma 2. The vertices of a shallow hole in the Leech lattice are sets of
25 points of A24 for which the corresponding graph is a union of ordinary
Coxeter-Dynkin diagrams.
Proof Theorems 5 and 6 of Chap. 23 show that the graph is a union of
ordinary Coxeter-Dynkin diagrams, and by dimension considerations the
hole must contain at least 25 vertices. But the fundamental roots
corresponding to such a diagram (whether or not it is connected) are
linearly independent in the vector space they lie in, and so are affinely
independent. This shows that the graph cannot contain more than 25
nodes. It is just as easy to verify that any such set of 25 points is the
vertex set of a shallow hole. The argument is similar to Theorem 7 of
Chap. 23, which is the corresponding result for deep holes. Thus all the
shallow holes in the Leech lattice are simplices.
3. The volume formula
Let P"P 2, ""PN be a system of representatives for all the holes in A24
under the full automorphism group Coco of A24 . Let voHPi ) denote the
volume of Pi and g (Pi) the order of its automorphism group (i.e. the
subgroup of Co co fixing Pi)' Then we have the volume formula:
1 = volume of a fundamental domain of A24
N
... ~ voHPi ) x no. of images of Pi under Coo
i-I
N ICool
- ~ ----u>T vol (Pi) ,
i-I g I
the norm s (Pj ) of its Weyl vector, and the determinant d (p j ) of the
Cartan matrix. The volume formula then becomes
~svoJ(Pj)/g(pl) - 24!/ICo ol-74613.
I
The name of a hole indicates the orbits of its automorphism group on the
components of the diagram. Thus the hole aia/a3ar has two components
of type Q7 that are equivalent under the automorphism group, also two
equivalent components of type ah and three components of type a3, only
two of which are equivalent.
Table 25.la Table 25.1 b ...,
~
rt>
Name g svol d Name g svol d ("l
~
D,. 2 92 4 d'5 140 9800/2 4 C-
A,. 10 125 25 a'5 195 2925/2 26 ..,~
A17E 7 12 1944 36 d,.a, 1 186 864912 8 ~
..,
D'6E , 2 1800 4 a24 Q l 2 255 260112 50 C
16 2048 64 <"l
A'5 D 9 Q23 Q 2 2 288 230412 72
Dr, 8 1936 16 d"a,a, 282 662712 24 ..,2"
rt>
Ar, 52 2197 169 d 21 a. 240 576012 20 0
24 20736 144 ....,
A"D7E 6 Q21Q)Q, 396 178212 176
D,oE? 8 23328 16 d20d 5 200 500012 16 S-
rt>
A§D6 80 20000 400 Q20Q5 315 157512 126 t""
EJ 6 27000 1 rt>
rt>
<"l
DJ 48 21952 64 d'g e 6 162 437412 12 ~
AJ 324 19683 729 a'9 d 6 1 240 144012 80 t""
A?Dl 256 131072 1024 Q19 Q 4Q r 2 520 135212 400 ~
Et 432 186624 81 d 18e7 126 396912 8 r:;'
rt>
Dt 384 160000 256 GISe7 171 1539/2 38
At 1176 117649 2401 al8 Q 6 Q 1 399 119712 266
A5D• 3456 559872 5184 d 17e8 1 92 423212 4
D: 138240 2985984 4096 GI7 e S 2 141 220912 18
A: 30000 1953125 15625 Q17G 8 2 297 108912 162
A~ 688128 16777216 48 °17 Q 8 2 297 108912 162
Al' 138568320 387420489 312
Af' 1002795171840 68719476736 224 Q17 7Q I
e 2 222 1369/2 72
a17d 7a , 1 288 115212 144
a 17d7a, 2 288 115212 144
a'7d 6a , 2 342 108312 216
Q17 Q 6 Q 2 2 441 1029/2 378
QI7 Q sQ) 2 468 101412 432
°17a4Q)Q, 2 600 100012 720
d'6 d 9 152 2888/2 16
(Jt
d'6 a 9 230 264512 40 .....
(Jt
d'6 e 8a , 122 372112 8
Table 25.lc Table 25.1d Table 25.le 01
...
0\
Name g svol s d Name g svol s d Name g svol s d
d'6Q gQ , 306 260112 72 d n dl2 136 231212 16 Q 12d 7e 6 I 234 70212 156
d'6e 7Q 2 186 288312 24 d n QI2 208 166412 52 d "ege6 I 114 2166/2 12
d '6e6Q3 252 2646/2 48 dnQ"Q, 276 158712 96 d"e? 2 112 156812 16
d'6 Q 6Q 2Q , 462 2541/2 168 dI3Q<J02Q, 420 147012 240 Q"d IOQ 3Q , 408 86712 384
d'6 d SQ 4 320 256012 80 d13e gQ4 160 256012 20 Q"dlf)IJ~ 2 432 864/2 432
d '6Q SQ 4 390 253512 120 d13Q gQ 4 360 144012 180 Q"d9Q s 2 324 72912 288
Q'~9 204 122412 68 d l3e7QS 204 173412 48 Q"Q~4Q, 480 480/2 960
QI6 e SQ I I 187 2057/2 34 d13Q7d s 304 144412 128 QIl e Se6 174 168212 36
Q,sd lO 2 200 1250/2 64 d ne6Q6 252 151212 84 Q"egdsQ, I 276 158712 96
Q,sd9Q, 2 264 108912 128 an D I2 273 81912 182 Qllesala? 2 576 1536/2 432
al5e8a~ 2 248 192212 64 Q 13d,002 294 102912 168 Q"dge 6 2 228 72212 144
a lSe7Q3 2 264 108912 128 Q13Q9Q 3 420 63012 560 Q"e7d 7 I 204 86712 96
Q,sd7Q 2Q , 2 408 86712 384 Qne sD4 245 171512 70 Q"e7Q SQ r 2 456 72212 576
Q'Se6d 4 2 288 86412 192 a neSo2a)0 I 378 1701/2 168 Qlld7e 6Q , 2 300 62512 288
Q,sd6Q4 2 360 81012 320 Q13 e 7 Q 4 Q I 350 875/2 280 Qlld7Q6Q , I 420 52512 672
Q,sdsd s 2 320 80012 256 Q13d7Q s 336 67212 336 Qlld7Q sQ2 2 468 50712 864
d'4d ,oO, 188 220912 32 °13 Q 7Q 4Q I 560 560/2 1120 Qlld7Q3Q~ 2 648 486/2 1728
d'4 Q ,oO, 286 185912 88 Ql3e 6d SQ , 336 67212 336 Q"d7Q3Q~ 2 648 486/2 1728
d'4Q9Q ,Q, 380 180512 160 a )3Q606 I 441 56712 686 QII Q 7d SQ ,Q, I 576 43212 1536
d'4e gQ2Q , 186 2883/2 24 dr2Q , 2 180 202512 32 Q"e6e 6Q r 2 360 600/2 432
d'4e 7Q 3Q , 256 204812 64 d 12 d IOQ2Q , 276 158712 96 Qll e 6d SQ 3 2 384 51212 576
d '4 Q 7Q 2Q ,Q, 576 172812 384 d 12d 9Q4 240 144012 80 Qll e 6d SQ2Q , 2 468 507/2 864
d'4e 6Q 4Q , 330 181512 120 d '2e gd s 136 231212 16 Qll e 6d 4Q4 2 420 49012 720
d'4 Q 6Q 4Q , 490 171512 280 dl2d gd s 208 135212 64 Q"d6Q sQ3 2 504 44112 1152
d'4d sQ sQ, I 408 173412 192 d 12 e 7d 6 I 156 1521/2 32 QIIQ6d4Q~ 2 756 37812 3024
(j
a 14D902 2 405 72912 450 d '2d7e6 I 180 135012 48 Qlld sQSQ3Q , 2 672 39212 2304 :r
QI4 e SQ2QI 285 180512 90 ar2Q) 4 351 729/2 338 QlldsQ4Q~Q, 2 900 37512 4320 Dl
'tl
Q'4d 7Q 2Q 2 450 75012 540 Q'2e gd s 208 166412 52 Q"QsQ Sd 4 2 576 384/2 1728 (1)
.....,
QI4 Q 6Q 302 I 630 63012 1260 Q12 e SQ4QI 325 162512 130 dro03 Q r 2 384 115212 256 ~
QI4 a j a 2Q I 2 825 60512 2250 QI2 e 7Q 6 273 81912 182 d,oO,oOs 330 82512 264 01
Table 25.1f Table 25.lg Table 25.lh >-l
::r
('!)
svol d
Name g svol d Name g svol d ('J
Name g
~
101412 192 d 9al 2 324 64812 324 egeja 3 2 128 204812 16 C-
d iOd 9a 5a , 312
d 9a?ar 4 544 57812 1024 ege7a 7G 2a l 288 172812 96 1ii"
...,
d iOa9d6 260 84512 160
a9a ge7 2 270 72912 200 ege7e 6Q 4 165 1815/2 30 u;
d iOa9aJa2a, 600 75012 960 ....
220912 8 a~d, 4 320 51212 400 ege7a 6a 4 245 1715/2 70 ...,
d iOeSe, 94 ~
a~d6a, 4 420 44112 800 48 ()
diOd Sd 6a , 248 96112 128 ese,d 5a 5 204 173412
72 a§d 5ar 4 560 392/2 1600 ega7e 6a 4 I 300 150012 120 2'
...,
diOase, 198 108912 ('!)
a~d.a2a, 4 660 36312 2400 esa,dl; 2 304 144412 128
d iOa saSa2 I 486 72912 648 0
....,
a~a.aJ 4 600 36012 2000 egelas 2 207 158712 54
diOefa, 2 148 136912 32 go
a§a4a J 2 600 36012 2000 eSe6a 6d S I 252 151212 84
d iOe,d,a, 192 115212 64 ('!)
age j 2 115 264512 10 dla, 6 232 84112 128
d iOe,d6a2 228 1083/2 96 t"'
('!)
('!)
190 1805/2 40 ()
agege 7a l dle,a la I 2 248 96112 128
d iOe,a6a2 294 102912 168 ::r
1014/2 192 agegd Sa 2a l 420 147012 240 dle6a J 2 264 726/2 192
diOe,asaJ 312 t"'
agega l 2 425 144512 250 2 360 67512 384 III
d iOe,a.a Ja I 400 100012 320 dld 6a 2a I ::+
a9d Se ,a, I 260 84512 160 dldsd. 2 288 64812 256 ri'
d iOa,d6a 2 384 768/2 384 ('!)
a9a j 2 405 405/2 810 dldsa. 2 320 64012 320
diOa,a}ar 2 832 67612 2048
age ,d,a2 I 300 75012 240 d sefa2a I 2 228 108312 96
dH#taJ 2 320 80012 256
age 7a 6 a ) I 420 630/2 560 d se,d6aJ a i 320 80012 256
d iOd 6a sa. 420 73512 480
age 7aia) 2 550 60512 1000 d Se,a,a2a l 384 76812 384
d H#6a SaJa I 528 72612 768
a9a ,d saJ a i I 640 32012 2560 dse,asa.a I 420 73512 480
d H,u6a Sa Ja l I 672 67212 1344
a9 d 5a a 2a l
i 2 900 27012 6000 d ge 7a Sa )a,al 528 72612 768
diOa~ 2 540 67512 864
a9a 1a1 4 875 24512 6250 d Sa,e6a • 360 54012 480
a iOa9d6 330 49512 440
22 eiat 6 61 372112 2 dsa,dl 2 352 484/2 512
a iOege7 143 185912
ejagQl 2 153 260112 18 d Se 6a l;al 2 468 50712 864
alOege6o) 231 161712 66
eje7Q 2 2 93 2883/2 6 dsdld.a, 2 368 52912 512
a iOega4a2a 1 495 148512 330
ele6a 3 2 126 264612 12 dsdtaJar 2 512 51212 1024
a iOe7a7al 352 704/2 352
eja 6a 2Q l 2 231 254112 42 dsd6dsa5a, 432 48612 768
a iOd,a6a2 I 462 46212 924
eldsa. 2 160 256012 20 aJal 12 513 36112 1458
d§a, 2 240 90012 128
ejasa4 2 195 2535/2 30 asa,dl; 2 432 32412 1152
d 9a 9a 6a l 420 63012 560
egage6 Q 2Q I 351 152112 162 (J1
d gel 2 76 288812 4 agela?a 1 2 567 44112 1458
d 9dl 2 176 96812 64 esasdsa. 360 144012 180 aSe6d Sa.a2 540 36012 1620 ...,....
Table 25.li Table 25.lj Table 25.lk
e7 e g 6 153 867/2 54 e6d ,alar 4 756 29412 3888 Q3 Q f2 887040 16384 32/2 16777216
e,dg 3 216 72912 128 e6a gd4 12 612 28912 2592 aFa 1 190080 5103 4912 1062882
e7a g 3 441 56712 686 dta, 24 336 44112 512 a2a [3 10200960 18432 2712 25165824
e7a ?ar 6 936 507/2 3456 dgd,ar 6 448 39212 1024 ar 4a 1 244823040 20480 2512 33554432
d 7afa3Q l 4 608 36112 2048 dgd 4a 2a , 6 528 36312 1536
d,a,a6a 3a 2 672 336/2 2688 dia4a 3 6 480 36012 1280
d7Q7QrQ3Q2 2 960 30012 6144 did 4a r 6 608 36112 2048
d,dg 6 256 512/2 256 dla5d 4a 3a , 672 294/2 3072
d,ai 490 350/2 1372 dgdla3 a f 4 768 28812 4096
d,a¥ 24 1408 242/2 16384 d 6agd 4 6 648 24312 3456
h: n+l 2n-2 12 18 30
d: n+l 4 3 2
which are drawn in Figs. 25.1a-e as heavy lines. (The background of these
figures is taken from Fig. 27.3, and shows all edges between pairs of the 35
points nearest to the center of a deep hole of type A 24 • This is a
convenient portion of the Leech lattice to work with, and in particular
contains all the points of A24 not joined to the a 15 diagrams.)
In four of figures a-e one finds that in the subgraph not joined to the
al5 diagram (indicated by shaded nodes and broken lines) it is impossible
to find a union of disjoint ordinary Coxeter-Dynkin diagrams with a total
of 10 (= 25-15) nodes, and so the corresponding type of a 15 diagram
cannot be part of a shallow hole. However, for the fifth type (figure e), the
disjoined subgraph contains 11 points, and by omitting each point in turn
we can break it into Coxeter-Dynkin diagrams, as shown in the figure .
Three of the eleven possibilities fail (those marked with an x), since they
leave a graph containing an extended diagram. The remaining eight
succeed.
The Cellular Structure of the Leech Lattice 521
Thus there are eight types of shallow hole with a component of type al5
in their diagram: al5egar, al5e7a3, al5e6d4, al5d~, al5d6a4, al5d 7a 2a ),
al5d9a), and al5dlO'
Method 2. We take a given deep hole and find all shallow holes having a
face in common with it. The environs of a deep hole are described in
sufficient detail in the previous chapter to make this quite easy. The group
orders of these holes can be found by considering the subgroup of those
automorphisms of the corresponding deep hole that fix the face in question
and then making due allowance for the fact that the shallow hole may
touch several deep holes in the same manner.
The complete enumeration was carried out by combining the two
methods and using the volume formula as a check. A second check was
supplied by the fact that the quantity sd for each hole must be a perfect
square (since the volume of a hole is a rational number). Most of the
enumeration was performed twice: first by L.Q. and J.H.C., then
independently by R.E.B who completed the list. The group orders were
computed by both teams.
Remarks. (i) It turns out that (in contrast to the deep holes) the diagram
of a shallow hole does not determine it uniquely. There are two holes of
each of the types al7ag, al7d7a), alld7a3af and a§a4a3'
(ii) There is a unique hole of type ar4al' This has the shape of a regular
simplex with 25 vertices, although its group is not transitive on the vertices.
The group is the Mathieu group M 24 acting with orbits of size 24 and 1.
This hole has the smallest radius, namely (2 - 2/25) 1/2, while the shallow
hole of largest radius is d 25 , with radius (2-1/4900)1/2. The deep holes
have radius ..fi.
(iii) If the closed polytopes corresponding to the deep holes of type Dt are
deleted from R24, the resulting space is disconnected.
Acknowledgement. We should like to thank R. A. Parker for several
helpful discussions.
26
Lorentzian Forms for the Leech Lattice
1. H. Conway and N. 1. A. Sloane
Just as for Euclidean lattices (i.e. lattices in Rn, see §2.4 of Chap. 2),
a lattice A in Rn,l is called integral if X· Y E Z for all X,Y E A, and
unimodular if it has a basis v(O), ... ,v(n) such that the determinant of the
Gram matrix (v(O . v V» is ± 1. An integral lattice is even, or of type II,
if N (x) E 2Z for all x E A, and otherwise is odd or of type I.
In contrast to the Euclidean case, the classification of integral
unimodular lattices in Rn,1 is easy: there is a unique odd unimodular
lattice in Rn,l for all n, and a unique even unimodular lattice when n == 1
(modulo 8) (see [MiI7], [Neu5], [Serl] and Chap. 15). These lattices will
be denoted by In,l and IIn,1 respectively. On Chap. 15 we used In,l and
lIn I to denote genera of forms, but there is no confusion in using the same
sy~bols for the unique forms in the genera.)
In I can be taken to be the set of vectors x = (xo,,,,,xn-II xn) with all
XiE Z. For n == 1 (modulo 8), IIn,1 can be taken to be the set of x for
which all Xi are all in Z or all in Z + lh and which satisfy
Xo + ... + Xn-I - Xn E 2Z.
Lorentzian Forms for the Leech Lattice 523
vectors" go and g\. Two points in the figure are joined by an edge (or a
directed edge) if they are distance ../6, all other pairs being distant .J4
apart.
Since Fig. 26.1 is a copy of the D24 hole diagram (see Chap. 24), it
follows that the set {Pi - po} contains A 24 . But A24 is unimodular, so this
lattice is the Leech lattice.
A similar argument establishes the next result.
Theorem 2. If u = (1,3,5, ... ,45,47,511145), an isotropic vector in 125 ,\.
then (u J. n 125 ) / u is a copy of the Leech lattice.
Proof Prefix all the points of Fig. 26.1 with an initial zero,
However still more elegant coordinates for A24 may be obtained as
follows, It is well known that the only solutions of
02 + 12 + 22 + ... + m 2 = n2
(The reason for this name will appear in the next chapter.) Our main
result is the following,
Theorem 3. (a) The Leech roots are in one-to-one correspondence with
the points of the Leech lattice. This correspondence is an isometry for the
metric defined by
d(r,s)2 = N(r -s) .
where h is the Coxeter number of the hole and the Cj are defined in
Fig. 23.1. Since the covering radius of A24 is .J2,
526 Chapter 26
N(f: - U) = 2, N(f:) = 2,
so
f: . U = Y2 N(U) (5)
1. Introduction
The automorphism groups of the unimodular Lorentzian lattices I n,\ and
II n,\ (defined in the previous chapter) are of considerable interest. In the
present chapter we investigate 11 25 ,1; the odd lattices In,1 will be considered
in the succeeding chapter.
The study of these automorphism groups seems to have originated with
Coxeter and Whitrow [Cox30] (see also [Cox28]), who identified the group
of 13,\ as a hyperbolic reflection group. More recently, Vinberg [Vinl1-
[Vin4], [Vin7], Meyer [Mey21, and Vinberg and Kaplinskaja [VinI5] have
shown that the reflection subgroup of AutO n,\) has finite index only if
n ~ 19, and have given Coxeter diagrams for the reflection subgroups in
these cases. In [Vin7] Vinberg has also shown that the reflection
subgroups of AutOI9,\) and AutOI17) have finite index and are described
by the Coxeter diagrams shown in Figs. 27.1 and 27.2.
The vectors with positive time coordinate and negative or zero norm in
a Lorentzian space, taken modulo positive scalar factors, become the
ordinary or ideal points, respectively, of the associated hyperbolic space.
The symmetry group of the hyperbolic space can be identified with the
autochronous symmetries of the Lorentzian space (those symmetries not
interchanging the positive and negative time cones). The full group of
symmetries of the Lorentzian space is the direct product of the
autochronous subgroup with the group of order 2 generated by negation.
528 Chapter 27
R/ = 1.
(R j Rj )2 = 1. if nodes i and j are unjoined.
(R j Rj )3 - 1. if nodes i and j are joined.
shown in Fig. 27.3. The full diagram has one node for each Leech lattice
vector and (using Vinberg's conventions) two nodes r ,s are joined by
no line if N(r-s) = 4 ,
an ordinary line if N (r - s) = 6 ,
a heavy line if N (r - s) - 8 , or
a broken line if N(r-s) ~ 10
8 9 2 3 4 5 6 7
Figure 27.1. The Coxeter diagram for 119.1, The points are:
i : (oj, +1, -I, 07-; 10), for 0 ~ i ~ 7; 8: ((1,-2)91 Y2); 9: (-1 2,07 10).
17 18
16 0 2 3 4 5 6 7 8 9 10 II 12 13 14 15
Figure 27.2. The Coxeter diagram for 11 17 •1, The points are:
i : (oj, +1, -I, 01S-; 10), for 0 ~ i ~ 15; 16: (-liz, (Y2) 16 1 3/2);
17: (_1 2,0 15 I 0); 18 : (0 14, 13 I I).
Proof It is easy to check that for n = 9 and 17 all r that satisfy the
conditions (1) are displayed in Figs. 27.1 and 27.2. Since the diagrams of
these figures agree with those given by Vinberg [Vin7, p. 347], the
assertion of the theorem holds for n = 9 and 17.
When n = 25, Theorem 3 of the previous chapter shows that there is a
one-to-one correspondence between the points of the Leech lattice and the
vectors r that satisfy (1), namely the Leech roots. This correspondence is
an isometry for the metric defined by d(r,s)2 = N(r-s). The assertion of
the theorem will therefore follow if we can show that the Leech roots are
precisely the fundamental roots for 11 25 ,[' since they have the joins and
symmetries indicated in the statement of the theorem.
We show this using the algorithm described by Vinberg for finding the
fundamental roots for any discrete hyperbolic reflection group ([Vin7], §4
of Chap. 28). We take Vinberg's vector Xo to be W25 (which satisfies his
conditions, except of course those entailing that the algorithm terminates
after finitely many vectors are produced), and define the height of a vector
r to be h (r) = - r . W25' The algorithm then proceeds as follows. The
vectors in 11 25 ,1 of norm 1 or 2 (for us, only norm 2) and positive height
are enumerated in increasing order of height· norm- l /2 (for us, in order of
height). Vectors of height zero have norm at least 4, by the result of the
previous chapter, and so need not be considered in our case. (In more
general cases such vectors require special treatment when starting the
algorithm.) A vector is rejected by the algorithm if it has strictly positive
inner product with any previously accepted vector; otherwise it is accepted
as a fundamental root. It is not necessary to test the condition between
vectors of the same height.
It is clear that in our case all vectors of height 1 and norm 2 are
accepted. We shall show that every other norm 2 candidate x is rejected.
Let h (x) = h, and define v = x /h . Then v lies in the affine
hyperplane of height 1 vectors and so by the previous chapter specifies a
point in the rational 24-dimensional space of the Leech lattice. By
Chap. 23 there is a Leech lattice vector r, which we can regard as a Leech
root, such that N(v-r) ~ 2. Thus
2 2 1
x'r>':
---x'r+2~2,
h2 h ~
~ h '
(Rr)2=1,
(RrRs)2 = 1 if N(r-s) = 4,
(RrRY = 1 if N(r-s) = 6
Automorphism Group of 26-Dimensional Lorentzian Lattice 531
--------------------------------------------I~
Table 28.1. Leech roots '1 in hyperbolic coordinates
,x241 X25). (The 27 columns of the table give the index i and
(Xo, Xl • .•.
then Xo, •.• ,X25, except that the roots with i < 0 are fractional and have
been multiplied by 2. For example r -1 - (_1/2,1/ 2, ... , 112,3/21512). The
table contains all roots with X25 < 25.)
t"'
(1)
x. x. X, x. x, x. x, x, x, X. x •• Xu Xli X .. X .. Xu Xu X., X .. Xu X •• X" X" X,. X" Xl.
(1)
(')
0 -1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ::r
1 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 U 0 0 0 0 0 ~
2 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0
3 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ....
4 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 '"
III
5 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 !:l
0-
6 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
7 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ~
!:l
8 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 cr
(1)
9 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ...,
I7Q
10 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
11 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
...,
0
12 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 c
'0
13 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0 0
14 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0 0
'"
15 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0 0
16 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0 0
17 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0 0
18 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0
19 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0 0
20 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0 0
21 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0 0
22 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0 0
23 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 -1 0 0
24 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0
25 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1
26 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 3
27 0 0 0 0 0 0 0 I 1 1 1 1 1 1 1 1 1 1 I 1 I 1 1 4
28 0 0 0 0 0 0 0 0 0 0 1 1 1 I 1 1 I 1 1 I 2 4
29 0 0 0 0 0 1 1 1 1 1 I 1 1 1 2 2 2 2 2 2 6
30 0 0 0 0 0 0 0 0 1 1 1 I 1 2 2 2 2 2 2 2 6
31 0 0 0 0 1 I I 1 1 1 2 2 2 2 2 2 2 2 2 2 7
32 0 0 0 0 0 0 1 1 1 I 2 2 2 2 2 2 2 2 3 7
33 0 0 0 0 0 1 1 2 2 2 2 2 2 2 2 2 2 3 3 8
34 0 0 0 0 1 2 2 2 2 2 2 2 2 2 2 3 3 3 3 9
Ul
35 0 0 0 1 1 1 2 2 2 2 2 2 2 3 3 3 3 3 9 w
w
Table 28.1 {cont.} U1
W
.j>.
Xo Xl Xz X3 X .. X5 Xe X7 Xs x, X 10 Xu Xlt Xu Xu Xu XIS Xli X l8 Xu X 20 Xu X 22 Xn Xt.a x"
36 0 o o o o o 1 2 2 2 2 2 2 2 2 3 3 3 3 3 9
37 0 o o 1 I 1 2 2 2 2 2 2 2 2 3 3 3 3 3 3 10
38 0 o o o o 1 2 2 2 2 2 2 3 3 3 3 3 3 3 3 10
39 0 o o o 1 1 1 2 2 2 2 2 2 3 3 3 3 3 3 4 10
40 0 o o o 1 1 2 2 2 2 2 2 2 3 3 3 3 3 3 4 4 11
41 0 o o 1 1 1 2 2 2 2 2 3 3 3 3 3 3 3 4 4 11
42 0 o o 1 1 1 2 2 2 2 2 3 3 3 3 3 3 3 3 4 4 4 12
43 0 o o 1 1 2 2 2 2 2 2 2 2 3 3 3 3 3 4 4 4 4 12
44 0 o 1 1 1 2 2 2 2 2 3 3 3 3 3 3 4 4 4 4 12
45 0 o o o o 2 2 2 2 2 2 3 3 3 3 3 3 4 4 4 4 12
46 0 o o o 2 2 2 2 2 2 3 3 3 3 4 4 4 4 4 12
47 0 o 2 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 4 13
48 0 o o o 2 2 2 2 3 3 3 3 3 3 4 4 4 4 4 4 13
49 0 o o o 2 2 2 2 2 2 3 3 3 3 3 3 4 4 4 4 5 13
50 0 o o 1 1 2 2 2 2 2 2 3 3 3 3 4 4 4 4 4 5 13
51 0 o o 1 2 2 2 2 2 3 3 3 3 4 4 4 4 4 4 4 5 14
52 0 o o 1 2 2 2 2 3 3 3 3 3 3 3 4 4 4 4 5 5 14
53 0 o o 2 2 2 2 2 2 2 3 3 3 3 4 4 4 4 4 5 5 14
54 0 o 1 1 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 14
55 0 o o 2 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 5 15
56 0 o 1 1 2 2 2 3 3 3 3 3 3 4 4 4 4 4 5 5 5 15
57 0 o 1 1 2 2 2 2 2 2 3 3 3 4 4 4 4 4 5 5 5 15
58 0 o o o 1 2 2 2 2 3 3 3 3 4 4 4 4 4 4 5 5 5 15
59 0 o 2 2 2 2 2 3 3 3 3 3 3 4 4 4 5 5 5 5 15
60 0 o o o 1 2 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 15
61 0 o o 1 1 1 2 2 2 3 3 3 3 3 4 4 4 4 5 5 5 5 15
62 0 o 1 1 2 2 2 2 3 3 3 3 3 4 4 4 4 5 5 5 5 5 16
63 0 o o 1 2 2 2 3 3 3 3 4 4 4 4 4 5 5 5 5 5 16
64 0 o o 1 2 2 2 2 3 3 3 3 4 4 4 5 5 5 5 5 5 16
65 0 o o 1 2 2 2 3 3 3 4 4 4 4 4 4 5 5 5 6 16
66 0 o o 2 2 2 3 3 3 3 3 3 4 4 4 5 5 .5 5 6 16 (')
67 0 o 1 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 16 ::r
68 0 o o 2 2 2 3 3 3 4 4 4 4 4 5 5 5 5 5 6 17 .§
69 0 o 1 1 2 2 3 3 3 3 4 4 4 .5 .5 .5 5 5 6 17 ..,en
70 0 o o 2 2 3 3 3 3 3 4 4 4 4 4 5
" 5 5 6 6 17 N
1 2 2 2 3 3 3 4 4 4 4 4 4 5 5 5 6 6 17 00
71 0 o
Table 2801 (conto) t"'
(1)
(1)
x. Xl X, X, X, x, X, x, x, X, Xl. Xu Xl3 Xu Xl5 X16 X 17 XIS Xu X 21 X" X" X" (')
X" x,. X"
::r'
72 0 0 1 1 2 2 2 3 3 3 3 3 3 4 4 4 5 5 5 5 6 6 17 :;0
73 0 0 1 1 2 2 2 2 2 2 3 3 3 4 4 4 4 5 5 5 5 6 6 17 0
74 0 0 0 0 1 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 6 17 ~
75 0 0 1 1 2 2 2 2 3 3 3 3 4 4 4 5 5 5 5 5 5 6 6 18 '"
III
76 0 0 1 2 2 2 2 3 3 3 4 4 4 4 4 4 5 5 5 6 6 6 18 ::l
0-
77 0 0 1 1 2 2 2 3 3 3 3 3 3 4 4 4 5 5 5 5 6 6 6 18
78 0 0 1 2 2 2 2 2 2 3 3 3 4 4 4 4 5 5 5 5 6 6 6 18 <
50
79 0 1 1 1 1 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 6 6 18 cr'
(1)
80 0 0 0 0 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 6 6 18 ..,
(fC<
81 0 0 0 2 2 2 2 3 3 4 4 4 4 4 5 5 5 5 6 6 6 18
82 0 0 0 2 2 2 3 3 3 3 3 4 4 5 5 5 5 5 6 6 6 18 (l
..,
83 0 0 0 2 2 2 3 3 3 3 4 4 4 4 4 5 5 6 6 6 6 18 0
C
"0
84 0 0 0 1 2 2 2 2 2 3 3 3 3 4 4 4 5 5 5 6 6 6 6 18
85 0 0 1 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 6 6 6 19
'"
86 0 0 0 1 2 2 2 2 3 3 3 4 4 4 5 5 5 5 5 6 6 6 6 19
87 0 0 0 1 2 2 2 3 3 3 3 3 4 4 4 5 5 5 6 6 6 6 6 19
88 0 0 1 1 1 2 2 2 3 3 3 4 4 4 4 5 5 5 6 6 6 6 6 19
89 0 0 0 1 2 2 2 3 3 3 3 4 4 4 4 4 5 5 5 6 6 6 7 19
90 0 0 0 2 2 2 2 2 3 3 3 3 4 4 4 5 5 5 5 6 6 6 7 19
91 0 0 1 1 1 2 2 3 3 3 3 3 4 4 4 5 5 5 5 6 6 6 7 19
92 0 0 1 1 2 2 2 2 2 3 3 4 4 4 4 5 5 5 5 6 6 6 7 19
93 0 0 1 1 2 2 2 2 3 3 3 3 4 4 4 4 5 5 6 6 6 6 7 19
94 0 0 0 2 2 2 2 3 3 3 4 4 4 4 5 5 5 5 6 6 6 6 7 20
95 0 0 2 2 2 3 3 3 3 4 4 5 5 5 5 5 6 6 6 6 7 20
96 0 0 1 2 2 2 3 3 3 4 4 4 4 4 5 5 6 6 6 6 6 7 20
97 0 0 2 2 2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 6 6 7 20
98 0 0 2 2 2 3 3 3 4 4 4 4 5 5 5 5 5 6 6 7 7 20
99 0 0 2 2 3 3 3 3 3 4 4 4 4 5 5 5 6 6 6 7 7 20
100 0 0 2 2 2 2 2 3 3 4 4 4 4 4 5 5 5 6 6 6 7 7 20
101 0 0 2 2 2 2 3 3 3 3 3 4 4 5 5 5 5 6 6 6 7 7 20
102 0 1 1 1 2 2 2 2 3 3 3 4 4 4 5 5 5 5 6 6 6 7 7 20
103 0 0 0 1 1 2 2 3 3 3 3 4 4 4 5 5 5 5 6 6 6 7 7 20
104 0 0 0 1 2 2 2 2 3 3 3 4 4 4 4 5 5 6 6 6 6 7 7 20
105 0 0 1 2 2 2 2 3 3 4 4 4 4 5 5 5 5 6 6 6 6 7 7 21
U1
106 0 0 1 2 2 2 3 3 3 3 4 4 4 4 5 5 6 6 6 6 6 7 7 21 W
107 0 0 0 2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 6 6 7 7 21 U1
(Jl
Table 28.1 (cont.) w
x, x. x, x, x. x, x, x,. Xu x .. Xli Xu x,. X18 Xu x., Xu x .. x .. x .. 0-
Xo x. x. x" x" x"
108 0 0 1 1 2 2 2 3 3 3 3 4 4 4 5 5 5 5 5 6 6 7 7 21
109 0 0 1 2 2 2 2 2 3 3 3 4 4 4 4 5 5 5 6 6 6 7 7 7 21
110 0 1 1 1 1 2 2 3 3 3 3 4 4 4 4 5 5 5 6 6 6 7 7 7 21
111 0 0 0 1 2 2 2 3 3 4 4 4 4, 4 5 5 5 6 6 6 7 7 7 21
112 0 1 1 2 2 2 2 3 3 3 3 4 4 5 5 5 5 6 6 6 7 7 7 21
113 0 0 0 1 2 2 3 3 3 3 3 4 4 5 5 5 5 6 6 6 7 7 7 21
114 0 0 0 2 2 2 2 2 3 3 4 4 4 5 5 5 5 6 6 6 7 7 7 21
115 0 0 1 1 2 2 3 3 3 4 4 4 5 5 5 5 6 6 6 7 7 7 21
116 0 0 0 2 2 2 3 3 3 3 4 4 4 5 5 6 6 6 6 7 7 7 21
117 0 0 1 1 2 2 2 2 3 3 4 4 4 4 5 5 6 6 6 6 7 7 21
118 0 0 1 2 2 2 3 3 3 3 4 4 4, 5 5 5 6 6 7 7 21
119 0 2 2 2 3 3 3 4 4 4 4 5 5 5 6 6 6 7 7 7 22
120 0 0 0 2 2 2 3 3 3 3 4 4 5 5 5 5 6 6 6 7 7 22
121 0 0 2 2 2 3 3 4 4 4 5 5 5 5 6 6 6 7 7 7 7 22
122 0 0 1 2 2 3 3 3 3 4 4 4, 5 5 6 6 6 6 7 7 7 7 22
123 0 0 1 2 2 2 2 3 3 3 4 4 4 5 5 5 6 6 7 7 7 7 7 22
124 0 0 0 2 2 2 3 3 3 4 4 4 4 5 5 5 6 6 6 6 7 7 8 22
125 0 0 1 2 2 3 3 3 3 4 4, .5 5 5 5 6 6 6 6 7 7 8 22
126 0 0 2 2 2 2 3 3 3 4 4 4 5 5 6 6 6 6 6 7 7 8 22
127 0 0 1 2 2 3 3 3 4 4 4 4 5 5 5 5 6 6 7 7 7 8 22
128 0 0 2 2 2 2 3 3 3 4 4 5 5 5 5 5 6 6 7 7 7 8 22
129 0 0 2 2 2 2 3 3 4 4 4 4 4 5 5 6 6 6 7 7 7 8 22
130 0 0 2 2 2 3 3 3 3 3 4 4, 5 5 5 6 6 6 7 7 8 22
131 0 2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 7 8 22
132 0 0 2 2 2 3 3 3 4 4 4 5 5 6 6 6 6 6 7 7 8 23
133 0 0 2 2 2 3 3 3 4 4 5 5 5 5 5 6 6 7 7 7 8 23
134 0 0 1 2 2 2 3 3 4 4 4 4 4 5 5 6 6 6 7 7 7 7 8 23
135 0 0 1 2 2 3 3 3 3 3 4 4 5 5 5 6 6 6 7 7 7 7 8 23
136 0 0 2 2 2 2 2 3 3 4 4 4 5 5 5 6 6 6 7 7 7 7 8 23
137 0 1 1 1 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 7 7 7 8 23
138 0 0 1 2 2 3 3 4 4 4 4 5 5 5 5 6 6 6 7 7 8 8 23 (")
139 0 0 1 1 2 2 3 3 3 3 4 4 4 4 5 5 6 6 6 6 7 7 8 8 23 ::r-
III
140 0 0 1 2 2 2 2 3 3 3 3 4 4 5 5 5 6 6 6 6 7 7 8 8 23 "0
141 0 1 1 1 2 2 2 2 3 3 4 4 4 5 5 5 6 6 6 6 7 7 8 8 23 t1>
.....,
142 0 0 0 1 1 2 2 3 3 3 4 4 4 5 5 5 6 6 6 6 7 7 8 8 23 I>.)
143 0 0 1 2 2 2 2 3 3 3 4 4 4 4 5 5 5 6 6 7 7 7 8 8 23 00
Table 28.1 (cont.) t""'
<1>
<1>
x, Xl X, X, x, X, X, x, x, X, XIO Xu Xu X13 XI< X" Xu X l7 X18 Xu X" X" X" X" X" x" ::r
"
144 0 I I 2 2 3 3 3 3 4 4 5 5 5 5 6 6 7 8 8 23 :;>j
145 0 0 0 I 2 2 2 2 3 3 4 4 4 5 5 5 5 6 6 7 7 8 8 23 0
• 0
,..
146 0 0 0 1 2 2 3 3 3 3 4 4 4 5 5 6 6 6 7 7 8 8 23
147 0 0 1 I 2 2 2 3 3 4 4 4 4 5 5 6 6 6 7 7 8 8 23 '"
24 ~
148 0 0 I 2 2 2 3 3 4 4 4 5 5 5 6 6 6 6 7 8 8 '0-"
149 0 0 I 2 3 3 3 3 4 4 5 .5 5 5 6 6 7 7 8 8 24
150 0 1 2 2 2 3 3 4 4 4 5 5 5 .5 6 6 7 7 7 8 8 24
<:
151 0 1 I 2 2 3 3 3 3 4 4 4 5 5 6 6 6 7 7 7 8 8 24
:r
r:r
152 0 0 0 2 2 2 3 3 4 4 4 4 5 5 6 6 6 7 7 7 7 8 8 24 ..,<1>
aq
153 0 0 1 2 2 3 3 3 4 4 .') 5 5 6 6 6 7 7 7 7 8 8 24
154 0 0 2 2 2 3 3 3 4 4 4 4 5 5 .') 6 6 6 7 7 8 8 8 24 ..,0
155 0 2 2 3 3 3 3 4 4 5 5 5 5 6 6 6 7 7 8 8 8 24 0
C
"1:l
156 0 0 0 1 2 2 2 3 3 4 4 4 5 5 5 5 6 6 6 7 7 8 8 8 24 '"
157 0 I I 2 2 2 2 3 3 3 4 4 4 5 5 6 6 6 6 7 7 8 8 8 24
158 0 0 0 2 2 3 3 3 3 4 4 4 5 5 6 6 6 6 7 8 8 8 24
159 0 0 I 2 2 3 3 4 4 4 4 5 5 6 6 6 6 7 7 8 8 8 24
160 0 0 I 2 2 2 2 3 3 4 4 5 5 5 6 6 6 6 7 7 8 8 8 24
161 0 0 0 2 2 2 3 3 3 4 4 4 5 5 5 6 6 7 7 7 8 8 8 24
162 0 0 1 2 3 3 3 3 4 4 4 5 5 5 6 6 7 7 8 8 8 24
163 0 0 2 2 2 2 3 4 4 4 4 5 5 5 6 6 7 7 8 8 8 24
164 0 0 2 2 2 3 3 3 3 4 5 5 5 5 6 6 7 7 7 8 8 8 24
165 0 0 2 2 2 3 3 3 4 4 4 4 5 6 6 6 7 7 7 8 8 8 24
166 0 0 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 8 8 8 8 24
167 0 0 2 2 2 3 3 3 4 4 4 5 5 5 6 6 7 7 7 8 9 24
-1 -1 I 1 1 1 1 1 1 1 1 1 1 1 1 3 5
-2 1 1 I 1 1 1 1 1 3 3 3 3 3 3 3 3 9
-3 1 1 1 3 3 3 3 3 3 3 3 3 3 3 3 3 11
-4 1 3 3 3 3 3 3 3 3 3 3 5 5 5 5 5 15
-5 -I 1 1 3 3 3 3 3 3 3 3 5 5 5 5 5 5 15
-6 -1 1 3 3 3 3 3 3 3 5 5 5 5 5 5 5 5 5 17
-7 I I 3 3 3 3 3 3 3 5 5 5 5 5 5 5 5 7 7 19
-8 3 3 3 3 3 3 3 3 5 5 5 5 5 5 5 7 7 7 7 21
-9 -I I 1 3 3 3 3 3 5 5 5 5 5 5 5 5 7 7 7 7 21
-10 -1 1 3 3 3 3 3 3 3 3 5 5 5 5 5 7 7 7 7 7 21
<.n
-11 -1 3 3 3 3 3 3 3 5 5 5 5 5 7 7 7 7 7 7 7 23 w
-12 I 3 3 3 3 3 3 5 5 5 5 5 5 7 7 7 7 7 9 23
"
(It
Table 28.1 (cont.) w
00
Xo Xl Xz X3 Xc X& Xe X7 Xe Xg XIO Xu Xu Xl3 Xu Xu Xu x 17 Xu Xu ,f20 Xu XII X Z3 Xu x,.
-13 I I 3 3 3 3 3 5 5 5 5 5 5 5 7 7 7 799 25
-14 -I I 1 3 3 3 3 3 5 :; 5 I) 5 7 7 7 7 799 25
-15 1 3 3 3 3 3 5 5 5 5 !i 5 7 7 7 7 7 9 9 9 27
-16 -1 I 3 3 3 3 3 5 5 i3 !i 7 7 7 7 7 7 9 9 9 27
-17 -I I 3 3 3 3 .:> 5 5 :; 5 I) 5 7 7 7 9 9 9 9 27
-18 -I 3 3 3 3 3 3 3 .5 5 .') 7 7 7 79999 27
-19 1 1 1 3 3 3 3 5 I) 5
" 5 5 7 7 7 7 7 999 9 27
-20 -1 3 3 3 3 3 I) 5 5 7 7 7 7 9 999 9 29
-21 1 I I 3 3 3 3 5 I)
" 5 I) fi 7 7 7 9 99999 29
-22 1 1 3 3 3 3 3 3 5 5 5 5 7 7 7 9 9 9 9 II 29
-23 1 1 3 3 3 3 5 5 5 5 5 7 9 9 9 9 9 9 11 31
-24 3 3 3 3 3 3 .5 5 5 ."i 7 7 7 9 9 9 9 11 11 31
-25 -1 1 1 3 3 3 Ii 5 5 .'i 7 7 9 9 9 9 11 11 31
-26 -1 I 3 3 3 3 3 Ii i)
" 5 .i :; 9 9 9 9 9 11 11 31
-27 I 3 3 3 3 .1 5 ;) 5 5 9 9 9 9 II II 11 33
-28 -1 3 3 3 3 5 !i 5 7 7 9 9 9 9 11 11 11 33
-29 -I I 3 3 3 5 !) :, 5 ;') j') 9 9 9 9 9 11 11 11 33
-30 -1 3 3 3 3 3 !i ;; I) 7 7 9 9 9 9 9 II 11 11 33
-31 1 I 1 3 3 3 :,3 Ii 5 r, 7 7 7 9 9 9 9 9 11 11 11 33
-32 -1 3 3 3 3 3 5 !i r, 5 :; 7 9 9 q II II II II 33
-33 1 1 3 3 3 3 3 ,; ~ [) 7 7 9 9 \) II II II 11 33
-34 -1 3 3 3 3 ;) 0) .5 .5 7 7 7 7 9 9 9 11 II II 11 11 3:,
-35 3 3 3 5 ;) .') r, 5 7 7 9 9 9 9 II II 11 11 11 35
-36 3 3 3 ;; Ii ii 5 9 9 9 9 11 II II 13 35
-37 I 3 3 3 3 3 5 !) [) 5 9 999 9 II 11 11 13 35
-38 -I I 3 3 3 3 5 r; :; :; 999 11 11 11 11 13 35
-39 I 3 3 3 3 5 ii ;') 7 9 9 9 II II II II 11 13 37
-40 -1 I 3 3 3 5 5 5 !i 7 7 9 9 9 9 II II 11 II 11 13 37
-41 1 3 3 3 .1 Ii 5 5 7 7 7 7 9 999 11 11 11 13 13 37
-42 - I I 3 3 3 .1 5 !i 7
" 7 7 7 7 9 999 II 11 II 13 13 37
-43 -1 3 3 3 3 3 5 I) 5 7 7 9 9 999 II 11 II 13 13 37 ('l
-44 -1 3 3 3 3 5 5 5 5 ."i 7 9 9 9 11 11 11 II 13 13 37 ::r'
III
-4,') I I I 3 3 3 3 5 I) 5 7 7 9 9 9 11 11 II II 13 13 37 "S.
<1>
-46 -1 I 3 3 3 3 .5 ;; I) 7 9 9 9 9 11 11 11 11 11 13 13 39 ..,
-47 1 3 3 3 3 5 5 .'i 7 7 7 9 9 9 9 11 11 11 13 13 13 39 tv
-48 -1 3 3 3 ij I) 7 7 9 9 9 9 11 11 11 13 13 13 39 00
Table 28.1 (cont.) t"
(l)
(l)
x. Xl x, x, x, x, x. x, Xs x, Xl. X ll Xu Xl3 Xu x" x .. X 17 x .. Xu x,. X 21 x" X 23 Xu x" (')
::>"
-49 - I I 3 3 3 5 5 5 5 579 9 9 9 9 II II II 13 13 13 39 :;0
-50 I I I 3 3 3 5 5 5 7 9 9 9 9 9 II II II 13 13 13 39 o
-51 - I I 3 3 3 .> 5 5 5 7 7 7 9 9 II II II II 13 13 13 39 S.
V>
-52 - I 3 3 3 3 3 5 5 5 5 7 7 9 9 9 II II II II 13 13 13 39 OJ
-53 I I 3 3 5 5 5 5 5 9 9 9 II II II II 13 13 13 39 ::l
0-
-54 I 3 3 3 3 3 5 5 7 7 7 9 9 9 II II II II 13 13 13 39
-55 I 3 3 3 3 5 5 5 5 7 7 9 9 9 9 II II 13 13 13 13 39 <
-56 - I .'i 7 9 II II II II 13 13 13 13 41
S·
3 3 3 3 5 5 5 9 9 0-
(l)
-57 I 3 3 3 3 5 5 7 9 9 9 tI II II II 13 13 13 13 41 ...,
-58 I 3 5 5 5 .) 9 9 9 9 II II 13 13 13 13 13 41 ~
3 3
-59 3 3 3 5 5 5 ;) 9 9 9 II II II II II 13 13 15 41 o
-60 3 3 3 5 5 5 7 9 9 9 II II II 13 13 13 15 41 dc
"0
-61 I 3 3 3 3 3 5 5 5 7 9 9 9 9 II II II 13 13 13 15 41 V>
-62 - I I I 3 3 5 5 5 5 7 7 9 9 9 9 11 11 II 13 13 13 15 41
-63 - I I 3 3 3 3 5 .'i 5 7 7 9 9 11 II II II 13 13 13 15 41
-64 I 3 3 5 5 5 5 7 9 9 9 9 II II II 13 13 13 13 15 43
-65 I 3 3 3 3 5 5 7 9 9 II 11 II II 13 13 13 13 15 43
-66 - I I 3 3 3 5 5 5 5 7 9 9 9 II II II II 13 13 13 13 15 43
-67 -I I 3 3 3 5 5 5 7 7 7 9 9 9 II II 13 13 13 13 13 15 43
-68 I 3 3 3 3 5 5 5 7 9 9 9 9 II II II 11 13 13 15 15 43
-69 -I 3 3 3 5 5 5 7 7 7 7 9 9 II II II II II 13 13 15 15 43
-70 - I 3 3 3 5 5 5 7 7 9 9 9 9 9 II II 13 13 13 15 15 43
-71 - I I 3 3 5 5 5 5 5 9 9 9 II II II 13 13 13 15 15 43
-72 -I 3 3 3 3 3 5 5 7 9 9 9 II II II 13 13 13 1.5 15 43
-73 I 3 3 5 5 5 7 7 9 9 9 II II II 13 13 13 15 15 43
-74 I 3 3 3 3 5 5 .5 7 9 9 9 9 II II II 13 13 13 15 15 43
-75 3 3 3 5 5 5 7 '7 7 9 9 9 II II II 13 13 13 13 15 15 45
-76 -I I 3 3 5 5 5 5 7 7 9 9 9 9 11 II II 13 13 13 13 15 15 45
-77 -I 3 3 3 3 5 5 5 7 7 7 9 9 II II II 11 13 13 13 13 15 15 45
-78 I I 3 3 3 5 5 5 7 7 7 9 9 9 II II 13 13 13 13 13 1.5 15 45
-79 -I I 3 3 5 5 5 7 7 7 7 9 9 9 II II II II 13 13 15 15 15 45
-80 -I 3 3 3 3 .5 5 5 7 7 9 9 9 9 II II II II 13 13 15 15 15 45
-81 I I 3 3 3 5 5 5 7 7 9 9 II II II II II 13 13 15 I.> 1.5 45
-82 -I 3 3 3 3 5 5 7 7 7 9 9 9 9 II II 13 13 13 15 1.5 15 45
Ul
-83 I I 3 3 3 5 5 5 9 9 9 9 9 II II 13 13 13 15 1.5 15 45 W
-84 -I 3 3 3 5 5 5 5 7 9 9 II II II 13 13 13 15 15 15 45 'D
Table 28.1. (cont.) VI
.j>
o
Xo Xl XI X3 X" Xs Xs X7 XM Xg XlO Xn Xu Xu Xu Xl5 x IG X 17 X 18 Xl. X zo Xn X zz X I3 x z" x"
-85 1 3 3 3 5 5 7 7 9 9 11 11 11 13 13 13 15 15 I.'i 45
-86 1 3 3 5 5 ., 5 5 9 9 9 11 11 11 13 13 13 15 15 15 4.5
-87 3 3 3 3 3 5 5 7 9 9 9 11 11 11 13 13 13 15 15 15 45
-88 -1 1 1 3 3 5 5 5 7 7 7 9 9 9 11 11 11 13 13 13 15 15 15 45
-89 -1 3 3 3 5 5 5 7 7 7 9 9 9 11 11 II 11 13 13 15 15 15 15 47
-90 1 1 3 3 5 5 5 7 7 9 9 9 9 11 11 13 13 13 15 15 15 15 47
-91 1 3 3 3 3 5 7 7 7 7 9 9 11 11 II 13 13 13 15 15 15 15 47
-92 -1 1 3 3 5 5 7 7 9 9 9 11 11 11 13 13 13 15 15 15 15 47
-93 1 1 3 3 .,3 ;"j 5 7 7 7 9 9 9 11 11 11 II 13 13 13 15 15 17 47
-94 1 3 3 3 5 7 7 7 9 9 9 9 11 II 13 13 13 13 15 15 17 47
-95 1 3 3 3 .3, 5 5 5 7 7 7 9 9 11 11 II 13 13 13 13 15 15 17 47
-96 -1 3 3 3 5 5 7 7 7 9 9 11 11 II 13 13 13 13 15 15 17 47
-97 1 3 3 3 5 .'i 5 5 9 9 9 9 11 II 11 13 13 15 15 15 17 47
-98 -1 1 3 3 3 5 5 7 9 9 9 9 II 11 II 13 13 15 15 15 17 47
-99 -1 1 3 3 5 5 5 5 7 7 9 9 11 11 11 II 13 13 15 15 15 17 47
-100 -1 3 3 3 3 5 5 ., 7 7 9 9 9 11 II 13 13 13 15 15 15 17 47
-101 1 3 3 3 5 5 5 7 7 9 9 9 9 11 11 13 13 13 13 15 I., 15 17 49
-102 -1 1 3 3 5 5 5 7 7 9 9 11 11 11 13 13 13 13 15 15 15 17 49
-103 1 3 3 3 Ii 5 7 7 7 9 9 9 11 II 11 13 13 15 15 15 15 17 49
-104 -1 1 3 3 5 5 5 7 7 9 9 9 9 11 II 11 13 13 15 15 15 15 17 49
-105 -1 3 3 3 3 .'i 5 9 9 11 11 11 II 13 13 15 15 15 15 17 49
-106 -1 3 3 3 5 5 ;, 9 9 9 II 11 13 13 13 15 15 15 15 17 49
-107 1 3 3 3 5 5 7 9 9 9 11 II 13 13 13 15 15 15 15 17 49
-108 3 3 5 5 5 5 7 9 9 9 11 11 11 13 13 13 15 15 17 17 49
-109 -1 1 3 3 5 ., 7 7 9 9 9 II 11 II 13 13 13 15 15 17 17 49
-110 -1 3 3 3 3 ., 5 7 9 9 9 9 II 11 11 13 13 13 15 15 17 17 49
-111 -1 3 3 3 5 ,"j 5 5 7 7 9 9 11 11 II 11 13 13 13 15 15 17 17 49
-112 1 1 3 3 3 5 5 7 7 9 9 11 11 11 11 13 13 13 15 15 17 17 49
-113 -1 3 3 3 ;"j 5 5 7 7 9 9 11 II 13 13 13 13 15 15 17 17 49
-114 1 1 3 3 5 5 5 5 7 9 9 9 II 11 13 13 13 13 15 15 17 17 49
(')
-115 -1 3 3 3 5 ., 5 7 9 9 9 9 11 II 13 13 15 15 15 17 17 49 ::T
-116 1 3 3 5 ;) 5 7 7 9 9 11 11 11 13 13 15 15 15 17 17 49 III
'0
-117 3 3 3 3 .'i 5 5 9 9 9 11 11 II 13 13 15 15 15 17 17 49
...,Cb
'"00
Leech Roots and Vinberg Groups 541
where the notation indicates that the first 25 coordinates are zero. Since
Z'w - -1 (i.e. z E T I), z can be regarded as a point in the real 24-space
that contains the Leech lattice. If x "" (XO .... ,X24 1t) is another point of
T I of norm 2 we have
t 1
N(x-z) - 2 + 35 - 4900 '
The coordinates of TO, .... T24 show that they do not lie in a 23-space, and so
they form a simplex whose circumcenter is z. In the language of Chap. 23
these points form an ordinary Dynkin diagram d 25, and they are all the
vertices of a shallow hole, of radius (2-1/4900)112, centered at z. Other
542 Chapter 28
Leech roots r must therefore give strictly larger values of N(r-z), and so
have strictly positive values of t.
The Leech roots (r) in Table 28.1 include all those with t ~ 25, and
were found by a backtracking program. We shall refer to the entries in
this table as the hyperbolic coordinates for the roots. In Table 28.2 we
give Euclidean coordinates for these roots. (The blocks of four numbers
correspond to columns in the MOG arrangement of coordinates - see
Chap. 11.)
Table 28.2 Euclidean coordinates (Yo, ... ,Y23) for the same Leech roots
rj as in Table 28.1. (The columns give i, Yo, ... ,Y23' The roots r_j have
not been multiplied by 2. Here + = +1, - = -1, b = -2, d = -4.)
46 o0 0 0 000 0 o0 0 d o0 0 0 o0 0 0 o0 0 0
47 +--+ -++- ++++ ++++ +--+ -++-
48 +--- -+-- +--- +-++ ++-+ +++-
49 o0 0 0 o0 0 0 o0 0 0 4 0 0 0 o0 0 0 o0 0 0
50 +--+ -++- -++- +--+ ++++ ++++
51 +--+ -+-+ --++ ++++ ++++ ++--
52 +-+- -++- --++ ++++ ++-- ++++
53 +--+ -:...-++ -+-+ ++++ +-+- ++++
54 +--+ -+-+ ++++ --++ ++-- ++++
55 +++- -+++ ---+ -+++ +-++ ++-+
56 +-++ -+++ +-++ -+++ ++-+ ---+
57 ++-+ ---+ +-++ -+++ +-++ -+++
58 o0 0 0 000 0 od 0 0 o0 0 0 o0 0 0 o 000
59 +-+- --++ ++++ -++- +--+ ++++
60 +--- ---+ +--- +++- +-++ ++-+
61 +--- -+++ --+- --+- ++-+ ++-+
62 +++- -+++ +++- -+++ +-++ --+-
63 +--- -+++ --+- ++-+ ++-+ --+-
64 +--- --+- --+- -+++ +-++ +++-
65 ++-- --++ --++ ++-- ++++ ++++
66 +-+- --++ -++- ++++ ++++ +--+
67 o 000 o0 0 0 004 0 o0 0 0 o0 0 0 o 000
68 ++-- -++- -+-+ ++++ ++++ +-+-
69 +--+ --++ ++++ -+-+ ++++ +-+-
70 +++- -+++ -+-- ++-+ +++- -+++
71 ++-- --++ ++++ ++++ ++-- --++
72 +-++ --+- +++- -+++ +++- -+++
73 ++-- -++- ++++ -+-+ +-+- ++++
74 +--- --+- +--- ++-+ +++- +-++
75 ++-+ -+++ ++-+ -+++ +++- -+--
76 +++- -+-- ++-+ -+++ ++-+ -+++
77 +-++ -+++ ++-+ ---+ +-++ -+++
78 ++-+ -+++ ++-+ -+++ ---+ +-++
79 ---+ +-++ ++-+ -+++ ++-+ -+++
80 o0 0 0 o0 0 0 o0 d 0 000 0 o0 0 0 o0 0 0
81 +--- ---+ ---+ -+++ ++-+ +-++
82 +--+ --++ -+-+ ++++ -+-+
83 +--- --+- -+-- +++- ++-+ -+++
84 +--- -+++ -+-- -+-- +-++ +-++
85 2 000 b 202 2 000 o0 2 0 o0 0 2 o2 0 0
86 ++-- -+-+ -++- ++++ -++-
87 +--- -+++ -+-- +-++ +-++ -+--
88 +--- ---+ +++- -+++ ++-+ -+--
89 +-+- -+-+ -+-+ +-+- ++++ ++++
90 ++-+ -+++ -+-- +++- -+++ ++-+
91 +--+ --++ ++++ +-+- ++++ -+-+
92 ++-- -+-+ ++++ -++- ++++ +--+
93 o0 0 0 o0 0 0 o4 0 0 o0 0 0 o0 0 0 o0 0 0
94 +++- -+++ --+- +-++ -+++ +++-
95 ++-- -+-+ ++++ +--+ ++++ -++-
96 +-+- -++- ++++ --++ ++++ ++--
97 ++-+ -+-- +++- -+++ -+++ +++-
98 +++- -+++ +-++ --+- +++- -+++
99 +-+- -+-+ ++++ ++++ +-+- -+-+
100 +++- -+++ +++- -+++ -+-- ++-+
101 ++-+ -+++ +++- +-++ --+- -+++
102 -+-- ++-+ +++- -+++ +++- -+++
103 +--- ---+ --+- +-++ +++- -+++
104 +--- -+-- -+-- -+++ +++- ++-+
105 2 000 b 220 2 000 o0 0 2 o2 0 0 o0 2 0
106 +-++ -+++ +-++ -+++ --+- +++-
544 Chapter 28
is a Leech root, and (b) the vectors v (of norm 1) for which
v+ = (0, ... ,0,1, Vo,···, vII-II VII)
of w into In,b and this does not affect inner products with elements of In,I'
It is easy to check that Wn does satisfy the conditions on Xo given in
Vinberg [Vin7].
It is convenient to group the candidate vectors v E In,1 that are to be
considered by the algorithm into batches according to their norm and
height h (v) = -v' w. We shall use nL,h to denote the set of all v E In,1
that have height h and norm 2 (i.e. are long roots), and nS,h to denote the
height h roots of norm 1 (short roots).
A candidate v is accepted by the algorithm (with w as the controlling
vector) if and only if v has non-positive inner products with the vectors of
all strictly earlier batches taken in the order nL,]' ns,], nL,2, nS,2, nL,3, nL,4,
ns, 3,,,, specified by condition (ij). Theorems 1 and 2 determine the first
batches of long and short roots, respectively, that are non-empty.
Theorem 1. For n ~ 2, the first batch of long roots is nL,I, and consists
of the vectors v = (vo, ... , vn-II vn ) for which v+ = (0, ... ,O,vo, ... , Vn-I 1 vn ) is
a Leech root. All candidates from this batch are accepted.
Proof The smallest possible value for h is 1, and the vectors of nL, I are
easily checked to be Leech roots (when extended by O's). Since nL, I is the
earliest possible batch, no candidate is rejected. The Leech root r24 is in
In, I for n ~ 2 and shows that the batch exists (i.e. is non empty). This
completes the proof.
Vinberg takes for his controlling vector Xo the vector z = (on 1 1). It is
easy to see that the algorithm with his controlling vector and initial vectors
accepts sufficiently many more vectors from our first batch to span the
space Rn,l. It follows that the two forms of the algorithm determine the
same fundamental region.
Theorem 2. For 1 ~ n ~ 24 the first non-empty batch of short roots is
nS,25-n, and consists of the vectors v = (vo, ... , vn-II vn ) for which
v+ = (0, ... ,0,1, Vo, ... , vn-II vn ) is a Leech root. Again all candidates from
this batch are accepted.
Proof If v is in ns, h where 1 ~ h ~ 25 - n then the vector
v + = (Oh-I , 1, 025-n-h ,Vo, ... ,Vn-l 1 Vn )
has norm 2 and height 1 and so is a Leech root. This implies that
h = 25 - n, since otherwise the inner product of v + and the particular
Leech root (Oh-I,I,-1,024-h 10) would be positive. Thus v has the
required form.
The batch nS,25-n exists since it contains the vector (-1,0, ... ,010) of
In,I' We have not been able to find a uniform proof that all candidates
from this batch are accepted. For n ~ 19 this can be read from the
results of Vinberg and Kaplinskaja. For 20 ~ n ~ 24 we observe that the
corresponding set of vectors v+ forms a single orbit under the stabilizer of
Itl in the automorphism group of the Leech lattice. So if one member of
this batch is accepted, all must be. But (-1,0, ... , 010) is accepted by
Leech Roots and Vinberg Groups 549
1 0 1 none 24 only
2 1 2 1 only 23 only
3 3 1 I only 22 only
4 4 I 1 only 21 only
5 5 1 1 only 20 only
6 6 1 1 only 19 only
7 7 1 1 only 18 only
8 8 1 1 only 17 only
9 9 1 1 only 16 only
10 10 2 1 only 15 only
11 12 1 1 only 14 only
12 13 1 1 only 13 only
13 14 1 1 only 12 only
14 15 2 1 only 11 only
15 17 1 1 only 10 only
16 18 2 1 only 9 only
17 20 2 1 only 8 only
18 22 3 1 only 7, 23 only
19 25 5 1, 17 only 6 only
20 30 12 1,17, ... 5,13, ...
21 42 56 1,9,17, ... 4,8, ...
22 100 1100 1,5,9, ... 3,5,7, ...
23 4600 953856 1,3,5, ... 2,3,4, ...
24 00 00 1,4,5,6, ... 1,2,3, ...
therefore invariant under the group CO 2 (see Chap. 10). The first batches
of short roots could be described similarly.
and transforms the initial batches 20 L. I and 20S.5 to image batches 20'£.1
and 20'S.5' The two Socage graphs 20 L,1 and 20'L,1 intersect in 24 roots,
and it seems likely that the full set of long fundamental roots is a union of
S-cages intersecting in this way, while the set of short roots is the union of
infinitely many disjoint images of 20S,5' It would be nice to know mord 2)
The 100 fundamental roots in 22 L ,1 are obtained from the Leech roots
that begin 000.... The latter consist of
42 beginning 0000 ... (producing 21 £. I) ,
56 beginning 0001... (producing 21s,4), and
2 beginning 0002 ...
and therefore includes the first two batches of fundamental roots for 121 ,1 <
S·
0-
and the first batch of fundamental roots for 122•1,) .,ro
[fQ
Xo x, x, X3 x, x, x, x, x, x, X ,O Xll X 12 X13 X 14 Xl5 X16 X 17 X18 X19 X'O X 2l x" x" x" x,. .,00
0 0 0 2 3 3 3 4 4 4 5 ,1 5 6 6 6 7 8 8 9 25 C
'J .) 8 8 8 9 25 '0
0 0 0 - 2 3 3 3 4 4 5 5 5 6 6 6 7
0 0 0 2
-3 3 3 4 4 4 ,1 5 6 6 6 8 8 8 8 9 26 '"
0 0 0 3 3 3 4. 4 5 5 5 5 6 6 8 8 9 9 26
0 0 0 2 3 3 4 4 4 ,'i 5 6 6 6 8 8 9 9 26
0 0 0 3 3 3 4 4 5 5 6 6 6 8 8 8 9 9 27
0 0 0 2 3 3 4 4 4 5 5 5 6 6 6 7 7 8 8 9 9 9 27
0 0 0 2 3 3 4. 4 4 5 5 6 6 6 7 8 8 8 9 9 10 28
0 0 0 2 3 3 4 4 ,1 5 5 6 6 7 8 8 8 9 9 9 10 29
0 0 0 2 2 3 3 3 4 4 4 5 5 6 6 7 7 8 8 9 9 10 10 29
0 0 0 2 3 3 4 4 4 5 5 6 6 6 7 8 8 9 9 9 10 10 30
0 0 0 2 2 3 3 3 4 4 5 5 6 6 8 8 8 9 9 10 10 11 31
0 0 0 2 3 3 4 4 5 ,5 6 6 6 8 8 9 9 10 10 10 11 32
0 0 0 2 3 3 4 4 5 5 6 6 7 8 8 9 9 10 10 11 II 12 34
0 0 0 2 3 4 4 5 5 6 6 8 8 9 9 10 10 11 11 12 12 36
til
til
552 Chapter 28
19
I.
13
" 23
16 24 I. 2.
let ,. -15 (dl n -I.
20 20
19
22
23
16 2. 16 2.
Figure 28.1. Coxeter-Vinberg diagrams for AutO l3 ,I) - Aut0 2o,I)' The
numbers attached to the nodes indicate the corresponding Leech roots.
All except fifteen of those roots can be found in Table 28.1. The last
fifteen occur much further along in our ordering of the Leech roots, and
are given separately in Table 28.4.
Figures 28.la-h show the Coxeter-Vinberg diagrams for the
fundamental roots of In , [, 13 ~ n ~ 20. The fundamental roots in nL, I
are represented by single circles and those in nS ,2S-n by double circles.
The remaining roots (for n = 18 - 20) are not shown. The numbers
attached to the roots in nL I and ns 2S-n give the subscripts i of the
corresponding Leech roots v+' = ri, whi~h must then be projected onto Rn,1
as described in §5 , For example, node 9 in the diagram for 116, 1
(Fig, 28,ld) refers to the Leech root
r9 = (08,+1,-1,0 15 10) .
If) n " 8
20
20
2•
•8
23
01
'6 2'
PLUS 12 MORE
POI TS
Is) n "9
20
20
22
23
PLUS 20 MORE
POI TS
PLUS IX) MORE
POINTS
Figure 28 .1 (Cont,)
Every pair of roots with double circles should be joined by a heavy line,
although for simplicity these lines have been omitted from the figure. The
figures have been drawn as subgraphs of the 8-cage, which (except for ten
missing edges) can be seen in full in Fig. 28.1h. The missing edges join
the diametrically opposite pairs of nodes 36 and 6, ... ,29 and 28, and only
their ends have been shown. The reader should note that for each
dimension greater than 13 the diagram has a nontrivial symmetry.
In the center of Fig. 28.1 h there is a circle of ten short roots enclosing
two more. The ten nodes around this circle should be labeled 34, 39, 40,
46, 48, 49, 58, 60, 74 and 80, and two in the center should be labeled 5
and 31. The double lines from node 40 to 9, 17, 23, 26 and 36, and from 5
to 6, 29, 33, 38 and 45 have been indicated by long double arrows. Node
31 should be joined to 15, 18, 25, 28 and 36 by double lines, while the
remaining joins from the nodes 34, 39, ... can be found by rotating the
figure.
29
The Monster Group
and its 196884-Dimensional Space
J. H. Conway
1. Introduction
The Monster (or Friendly Giant or Fischer-Griess) simple group of order
808017424794512875886459904961710757005754368000000000
= 246320597611213317. 19.23.29. 31 .41 ·47· 59·71 (I)
STRUCTURES:
+---+ THE MONSTER
+---+ 21+24
that commute with X-I> Y_I> Z-l respectively. The intersection of these
three groups, which is also the intersection of any two of them, is the group
g.yz..!hat centralizes the fourgroup X-I> Y_I> Z-l. The groups Q, Qx, ~,
Q., Q..yz are normal 2-subgroups of the above groups, while the groups Gx ,
~Y' G..: ar: the full centralizers in the Monster of the respective involutions
X-I> Y-I> Z-l·
The time has come to explain all those bars, and quickly describe our
construction. The main idea is that we give an explicit construction for a
certain group N of order
201889334420601569280 = 248 . 34 . 5 . 7 . 11 . 23,
(see (2.8.2) of Chap. 3). In this chapter we shall use multiplicative rather
than additive notation for the Golay code r.t1, but will continue as in
previous chapters to identify elements of r.t1 with the corresponding sets
(r.t1 -sets). The Parker loop ~ is a (non-associative) system with a center
{l, -I} of order 2, modulo which it becomes a copy of r.t1. We shall write
a, b, c, d, e, f ,... for typical elements of ~, and use d -+ d for the
homomorphism onto r.t1. Thus d and -d are the two preimages of the
r.t1 -set d. In particular, nand - n are the two preimages of the universal
n.
r.t1-set
So you already know how to multiply in ~ up to sign. The exact rules
for the signs are rather subtle (Appendix 1), but are not needed for an
overview of the construction.
and we shall give them the same names 0, E, L.... As usual we take the
elements of r.t1* to be subsets of n
modulo addition of r.t1-sets. The rule is
that 0 changes the sign of the preimages of just those r.t1-sets it intersects
oddly - in other words
The Monster Group and its 196884-Dimensional Space 557
where d ranges over the Parker loop ~, and 7r over its standard
automorphism group S.
There is an obvious "triality" automorphism that cyclically permutes x,
Y, Z in these and later notations. In future we shall often make only one
of three statements or definitions related by triality, and write "(&c)" to
indicate that the reader should derive the others for himself.
kx X_I X6 Xd X6 X".
ky Y-I Y6 Yd Yo Y".
kz Z_I Zo Zd Zo Z".
(0 even) (0 odd)
Xd -+ Xd , Xo -+ Xo,
where Xr denotes the image of">-r in A 2J2A 24 • We note that every element
of A24/2A24 can be expressed in the form
(d E ~,OE ~*),
9. Short Elements
We shall write Xdob = Xd + X b , Xdob = XdXb (&c), and will use r for the
generic subscript d . () that occurs here. A vector A or Ar that is a minimal
vector in the Leech lattice will be called short, as will the corresponding
objects X, X" x" X" Xr (&c).
Here are all the short vectors up to sign, with the names of the
corresponding elements of A 24 /2A 24 :
where in the last line d is an octad, () is an even subset of d, and the factor
n is present just when V21{)1 is odd. (The actual vectors of A24 displayed
above are Aj - Aj for X jj , Ad - Anojj for Xndojj, and Ad - Anoij - Anokl
for Xdojjkl.) So a subscript r indicates shortness just if it appears in the
above list.
+ +
+
+ + + +
560 Chapter 29
Xd·j d+ ®y j d- ®z j (&c),
1 1
X(n)d'6 8" ~ - 6,. Y(O)d-E 8" ~ - .,6 Z (O)d" (&c).
• •
Here in line I, (jj)x means (Ox ® (;)x,
in line 2, (ij)x means (Ox ® (j)x + (j)x ® (;)x,
in line 3, d" ®x j means (d); ® (Ox; and,
in line 4, IJI = 8, () and E range over the 64 C€* -sets that are
representable by even subsets of d, and -6,. = (_I)16.1/2+1<I!2
There are fairly obvious inner products on these spaces, under which
basis vectors are orthogonal except when equal or opposite, and the basis
vectors have norm 1 except that (ij)x - (Ox ® (j)x + (j)x ® (;)x has
norm 2 (&c).
The identifications given by the dictionary equate these inner products.
One can also check by explicit calculation that the actions of elements of
N (as given in Table 29.I), are preserved by the dictionary.
The Monster Group and its 196884-Dimensional Space 561
Mx • N x = 2(MN+NM)x,
(X r · s =X±I),
(x r .s short),
(otherwise) ,
a2 = (_0101/4,
and it is easy to see that in fact these provide an abstract definition for r!J>
(if it exists). For let us suppose that eJ, e2, ... , el2 are preimages of the
12 elements of some basis of C{j, so that any element of r!J> can be written
as ± F (e I, . . . , e 12)' where F is some bracketed product of some sequence
of its argument~, possibly with repetitions or omissions.
Then an obvious condition that an equation between two such products
should hold in r!J> is that it hold in C{j. On the other hand, C{j is an
elementary abelian 2-group, and the category of such groups is defined by
the laws a 2 = 1, ba =ab, a(bc) = (ab)c. This means that if the two
products are equal in C{j we can verify this fact by repeated applications of
these laws. Using the sign rules above, we can therefore check whether the
two products have the same or opposite sign in r!J>.
The argument also shows that any element ii- of M 24 lifts to 212 distinct
standard automorphisms. For if ii- takes el, ... ,e12 to iI, ... ,i12 we
can pick (in any of 212 ways), preimages I I, ... ,f 12 for iI, ... ,i12. No
matter how this is done, II, ... ,/12 will satisfy the same relations as
e I, . . . , e 12, so there is an automorphism 7r: ei - Ii.
Appendix 2. A Construction for r!J>.
Here is the shortest explicit construction we know for r!J>. The elements of
r!J> will be just the elements of C{j, equipped with formal signs. The loop
multiplication A . B is defined in terms of the addition A + B in C{j by
the formula
A· B = (_oIO(A)nBI (A+B)
where 0 is a certain function from C{j to C{j*. The sign rules for ;JjJ then
reduce to the following requirements on 0 (the congruences being
modulo 2):-
p(A): 10(A) nAI == 1/4IAI,
q(A,B): 10(A) nBI + 10(B) nAI == v21A nBI.
r(A,B,C):
10(A) n BI + 10(A +B) n cl + 1==IAnBncl.
+ 10(B) n cl + 10(A) n (B+c)1
564 Chapter 29
I == j
lh IE; n En I - 10(E;) n En I (j < n),
10(En) n E; IJ4IEn I (j =n),
0, say, (j > n).
(Recall that a C€* -set is exactly specified by giving the parities of its
intersections with the E;, since C€ and C€* are dual groups.)
These equations ensure thatp(A) and q(A,B) hold when A and Bare
among the E;. But then, using the quadratic property and the well known
formulae
Ix + yl ... Ixl + Iyl - 21x n yl , (X + y) n z = x nz +y nz ,
we find that rU,B,C) holds universally, that r(A,B,C) enables us to
deduce qU,B+C) from qU,B) and q(A,C), and finally that qU,B)
enables us to deduce p(A+B) from pU) and p(B). Inductively, this
shows that all of p(A), q(A,B), r(A,B,C) hold universally.
Appendix 3. Some Relations in Qx.
By direct computation with triples, one can verify that the elements Xd and
Xa satisfy the relations:
[xa,x,] = 1,
[x d, x]
e
Ii nil+lil·liI/4 ,
- x -1
e -
[X d, X] x -I
Ii n e-1/2 ,
X ...
.Y -
, - x a" x d x e -- zli
-I
nil/2 . x de . x-d n e'
where the symbols *** indicate some more complicated expressions whose
exact values won't be needed. Now since Z_I : (a,b,c) - (-a,-b,c) and
[d,e] = (_I)IJ ne I/2 we have
The Monster Group and its 196884-Dimensional Space 565
which needs only some reassociation to become (4). But the diagonal
automorphism J n i actually reassociates any three-term product two of
whose terms are d and e. For example, since IJ n il is even, we have
(c.de)Jne = cJni.de = (_l)lcnJnel.c.de = cd.e
agreeing with (4). (We need not check the first coordinate, since it IS
easily checked that triples with abc = 1 are taken to other such triples.)
This relation shows that L I and kx = x nLI are in Qx, and from the
previous relations we see that modulo Z_I and kx the group Qx becomes
abelian, after which it is easy to check that its order is at most 226 , and
that of Qx at most 225.
But the relations show much more; that indeed there is a 2:1
homomorphism from Qx onto A 24/2A 24, taking xr
to Ar . To see this, one
only has to check the images of the above relations. Once again we
consider only the last one. We have:
and so
in Qx.)
566 Chapter 29
for the space of the Leech lattice, and so we can abstractly identify them
with these vectors, so defining a 24-dimensional representation 24x of N x .
The representation 4096 x ' We define
d; = ({O,d,O), (O,- Od,O)}, di = {(O,O,d), (O,O, Od)} (&c),
for each d E f!JJ. Then there are 2·4096 distinct objects d;, which are
permuted by N x , and there is an invariant pairing on these, given by
changing the sign of d. We can therefore identify these objects with
2·4096 vectors d; spanning a 4096-dimensional space 4096x by adding the
relations (-d); = -(d);. The definitions have been arranged so that kx
(which takes (a,b,c) to (a,-Ob,Oe)) acts trivially, and in fact the
kernel of this representation is the fourgroup {l,y n,z-n,kxL (The
elements ky and k z both act as -1.)
The representation 98280 x ' The group Qx has 2·98280 short elements xr
corresponding~o the 98280 short elements Ar of A24/2A24· Under
conjugation, N x permutes these in such a way that the pairing x" X-r is
preserved.
We can think of this as an action of N x on a 98280-dimensional space
98280 x spanned by vectors Xr that are permuted just like the x" and
The Monster Group and its 196884-Dimensional Space 567
for all g in Qx, where m4096(g) is the matrix representing g in 4096 x ' We
can make M unique up to sign by demanding that it have real entries and
determinant 1. The two such matrices will be called the representors of (3.
Every automorphism of this group 21+ 24 yields an automorphism of the
quotient group 224 C=A 2i2A 24 ) when we factor by X-I' The
automorphisms of 224 that happen in this way are precisely those that fix
the quadratic form (modulo 2) defined on A 24/2A 24 . In particular, there is
such an automorphism a*, say, for each automorphism a of the real Leech
lattice A24 .
We define Gx to be the group of ordered pairs of matrices of the form
(24 x 24 matrix of a, 4096 x 4096 matrix of a representor of a*).
where rand s are distinct Leech roots. (We have quoted these relations
from Moody's excellent survey article [Mo021. Moody supposes that the
number of fundamental roots is finite. but since no argument ever refers to
infinitely many fundamental roots at once. this clearly does not matter.
See also [Kac5J.)
Then we conjecture that Loo provides a natural setting for the Monster,
and more specifically that the Monster can be regarded as a subquotient of
the automorphism group of some naturally determined subquotient algebra
of Loo.
The main problem is to "cut Loo down to size". Here are some
suggestions. A rather trivial remark is that we can replace the Cartan
570 Chapter 30
for Leech roots rhr2, ... , whenever ChC2, •.. are integers for which
Cl rl + C2r2 + ... = 0.
Since the 23 Niemeier lattices yield 23 constructions for the Leech lattice
(Chap. 25), it is natural to ask if we can obtain 23 different constructions
for the Monster using the Lie algebras L[N1 or L *[N1.
GO Each shallow hole in the Leech lattice (see Chap. 24) corresponds to a
maximal subalgebra of LOG of finite rank.
We have made various calculations concerning LOG (finding the
multiplicities of certain roots via the Weyl-MacDonald-Kac formula, etc.).
It is worth noting that these calculations are facilitated by the remarkable
recent discovery that the Mathieu group M12 is generated by the two
permutations
t -12tl , t - 11-t (mod 23) ,
We have tried to give an adequate bibliography for the major topics discussed in
this book. The numbers in square brackets at the end of an entry give the chapters
where it is cited, and thus also serve as an author index. [B) indicates that the
reference is cited elsewhere in this bibliography. Certain items, not otherwise
mentioned in the book, have been included for completeness. There are about
1550 references. Further references on number theory and many related subjects
will be found in [LeV2) and [Guyl J, and [Mac6) contains an extensive
bibliography on coding theory up to 1977. The books [Grula), [Lekll and the
survey articles in [Toll) and [Gru2) also contain relevant bibliographies.
Abbreviations
[Bli3) - The minimum value of quadratic forms, and the closest packing of
spheres, Math. Ann. 101 (1929),605-608 (1).
[Bli4) - The minimum values of positive quadratic forms in six, seven and
eight variables, Math. Zeit. 39 (1935), 1-15 [1,4,6).
[Bli5) F. van der Blij, History of the octaves, Simon Stevin 34 (1961), 106-125
[4).
[Bli6) - and T. A. Springer, The arithmetics of octaves and of the group G2,
KNAW A62 (1959),406-418 [4).
A. Blokhuis: see E. Bannai.
[Bocl) S. Bochner, Hilbert distances and positive definite functions, Ann.
Math. 42 (1941),647-656 [9).
[Boel) A. H. Boerdijk, Some remarks concerning close-packing of equal
spheres, Philips Res. Rep. 7 (1952), 303-313 (1).
E. D. Bolker: see P. F. Ash.
B. BolloMs: see J. J. Seidel.
[Booll W. M. Boothby and G. L. Weiss, editors, Symmetric Spaces, Dekker,
NY, 1972 [9, B).
[Borl) R. E. Borcherds, The Leech lattice and other lattices, Ph.D.
Dissertation, Univ. of Cambridge, 1984 [2, 171.
[Bor2) The Leech lattice, PRS A398 (1985),365-376 [24).
[Bor3) - The 24-dimensional odd unimodular lattices, Chap. 17 of this book
[2, 17).
[Bor4) - J. H. Conway, L. Queen and N. J. A. Sloane, A Monster Lie
algebra? Adv. in Math. S3 (1984),75-79;;; Chap. 30 of this book [30).
[Bor5) Z. I. Borevich and I. R. Shafarevich, Number theory, Nauka, Moscow,
1964; English translation, Ac. Press, NY, 1966 (15).
[Bor6) D. Borwein, J. M. Borwein and K. F. Taylor, Convergence of lattice
sums and Madelung's constant, J. Math. Phys. 26 (1985), 2999-3009
[2).
J. M. Borwein: see D. Borwein.
[BarIl K. Boriiczky, Packing of spheres in spaces of constant curvature (in
Hungarian), Mat. Lapok 2S (1974),265-306; 26 (1975),67-90 [I).
[Bor2) Packing of spheres in spaces of constant curvature, AMAH 32
(1978),243-261 [I, 13).
[Bor3) - The problem of Tammes for n = 11, Studia Sci. Math. Hung. 18
(1983), 165-171 [11.
[Bor4) Closest packing and loosest covering, in Diskrete Geometrie, 3rd
Kol/oq., Inst. f. Math., Univ. Salzburg, 1985, pp. 329-334.
[Bosi) A. Bos, Sphere-packings in Euclidean space, in [Sch8), 1979, pp. 161-
177.
[Bos2) - Upper bounds for sphere packings in Euclidean space, preprint [I).
[Bos3) - J. H. Conway and N. J. A. Sloane, Further lattice packings in high
dimensions, Math. 29 (1982), 171-180 [I, 8).
A. G. Boshier: see N. L. Biggs.
[Botl) F. V. Botya, Bravais types of five-dimensional lattices, TMIS 163
(1984) = PSIM 163 (No.4, 1985),23-27 [1,3).
[BouO) P. Bougerol, Un Mini-Cours sur les Couples de Guelfand, Pub. du
Laboratoire de Statistique et Probabilites, Univ. Paul Sabatier, Toulouse,
1983 [9).
[Boul) N. Bourbaki, Groupes et Algeores de Lie, Chapitres 4, 5 et 6, Hermann,
Paris, 1968 [4, 18,21,23,24,25,27).
[Bou2) M. Bourdeau and A. Pitre, Tables of good lattices in four and five
dimensions, Num. Math. 47 (1985), 39-43 [11.
580 Bibliography
[Brul) V. Brun, On regular packing of equal circles touching each other on the
surface of a sphere, Comm. Pure Appl. Math. 29 (I976), 583·590 [I).
J. A. Bucklew: see also N. C. Gallagher, Jr.
[Buell Compounding and random quantization in several dimensions,
PGIT 27 (I981), 207·211 (2).
[Bue2) - Upper bounds to the asymptotic performance of block quantizers,
PGIT 27 (I981), 577·581 (2).
[Bue3) - and G. L. Wise, Multidimensional asymptotic quantization theory
with rth power distortion measures, PGIT 28 (I982), 239·247 (2).
[Budll P. de Buda, Encoding and decoding algorithms for an optimal lattice·
based code, in Conference Record·lnternat. Con! Commun. ICC '81,
IEEE Press, NY, Vol. 3, 1981, pp. 65.3.1·65.3.5 [2, 20).
R. de Buda: see also J. B. Anderson.
[Bud2) The upper error bound of a new near·optimal code, PGIT 21
(I975), 441·445 (3).
[Bud3) - and W. Kassem, About lattices and the random coding theorem, in
Abstracts of Papers, IEEE Inter. Symp. Info. Theory 1981, IEEE Press,
NY 1981, p. 145 (3).
R. BUlow: see also H. Brown.
[Biill) - J. Neubiiser and H. Wondratschek, On crystallography in higher
dimensions, Acta Cryst. A27 (I971), 517·535 (3).
[Buml) C. Bumiller, On rank three graphs with a large eigenvalue, Diser. Math.
23 (I978), 183·187 (9).
H. Burzlaff: see also H. Zimmerman.
[Burl) - and H. Zimmerman, On the metrical properties of lattices, Z. Krist.
170 (I985), 247·262 (2).
[Bur2) - - and P. M. de Wolff, Crystal lattices, in [Hahl), 1983, 734·744
(2).
[Busll P. Buser, A geometric proof of Bieberbach's theorems on
crystallographic groups, L'Enseignement Math. 31 (1985), 137·145 (4).
[ButI) G. Butler, The maximal subgroups of the sporadic simple group of
Held, J. Alg. 69 (1981), 67·81 (10).
A. Buzo: see Y. Linde.
c
J. W. Cahn: see D. Shechtman.
[Call) A. R. Calderbank and W. M. Kantor, The geometry of two·weight
codes, BLMS 18 (1986),97·122 (9).
[Ca12) - T.·A. Lee and J. E. Mazo, Baseband trellis codes with a spectral
null at zero, PGIT to appear (3).
[Ca13) - and J. E. Mazo, A new description of trellis codes, PGIT 30 (1984),
784· 792 (3).
[Ca14) - - and H. M. Shapiro, Upper bounds on the minimum distance of
trellis codes, BSTJ 62 (I983), 2617·2646 (3).
[Ca15) - - and V. K. Wei, Asymptotic upper bounds on the minimum
distance of trellis codes, COMM 33 (I985), 305·309 (3).
[Ca16) - and N. J. A. Sloane, Four·dimensional modulation with an eight·
state trellis code, BSTJ 64 (1985), 1005·1018 (3).
[Ca17) - - An eight·dimensional trellis code, PIEEE 74 (1986), 757·759 (3).
[Ca18) - - New trellis codes based on lattices and cosets, PGIT 33 (1987),
177·195 (3).
[Ca19) - and D. B. Wales, A global code invariant under the Higman·Sims
group, J. Alg. 75 (1982), 233·260 (3).
582 Bibliography
[ I].
[Cox25] - Regular and semi-regular polytopes III, Math. Z., to appear [21l.
[Cox26] - L. Few and C. A. Rogers, Covering space with equal spheres, Math.
6 (1959), 147-157 [2].
[Cox27] - M. S. Longuet-Higgins and J. C. P. Miller, Uniform polyhedra, Phil
Trans. Royal Soc. 246 (1954),401-450 [21].
[Cox28] - and W. o. J. Moser, Generators and Relations fQr Discrete Groups,
Springer-Verlag, 4th ed., 1980 [3, 4, 7, 9, 10,21,27]'
[Cox29] - and J. A. Todd, An extreme duodenary form, CJM 5 (1953), 384-
392 [1, 4, 6].
[Cox30] - and G. J. Whitrow, World structure and non-Euclidean honeycombs,
PRS A201 (1950),417-437 [27].
[Cral] A. P. Cracknell, Irreducible representations of point groups and space
groups -the last 50 years and the next 10 years, Cornrn. Match in
Math. Chern. 9 (1980),227-241 [3].
[Cra2] M. Craig, A characterization of certain extreme forms, 11M 20 (1976),
706-717 [2, 3].
[Cra3] - Extreme forms and cyclotomy, Math. 25 (1978),44-56 [2,8].
[Cra4] - A cyclotomic construction for Leech's lattice, Math. 25 (1978),
236-241 [2, 8].
[Cra5] - Automorphisms of prime cyclotomic lattices, preprint [2, 8].
R. E. Crochiere: see J. L. Flanagan.
[Cunl] H. M. Cundy and A. P. Rollett, Mathematical Models, Oxford Univ.
Press, 2nd ed., 1961 [2, 21].
[CurO] M. P. J. Curran, Topics in Group Theory and Computation, Ac. Press,
NY, 1977 [B].
[Curl] C. W. Curtis, W. M. Kantor and G. M. Seitz, The 2-transitive
permutation representations of the finite Chevalley groups, TAMS 218
(1976),1-57 [9].
R. T. Curtis: see also J. H. Conway.
[Cur2] - On subgroups of·O, I: lattice stabilizers, J. Alg. 27 (1973), 549-573
[10, 11, 23].
[Cur3] - A new combinatorial approach to M 24 , PCPS 79 (1976), 25-42 [10,
11,14]'
[Cur4] - The maximal subgroups ofM 24 , PCPS 81 (1977), 185-192 [10].
[Cur5] - On subgroups of ·0, II: local structure, J. Alg. 63 (1980),413-434
[ 10].
[Cur6] - Eight octads suffice, JCT A36 (1984), 116-123 [11].
[Cur7] - The Steiner system S (5,6, 12), the Mathieu group M12 and the
"kitten", in [Atk2], 1984, pp. 352-358 [11].
[Cusl] E. L. Cusack, Error control codes for QAM signalling, Elect. Lett. 20
(1984),62-63.
[De1l4] Alternating bilinear forms over GF(q), JCT AI9 (1975), 26-50
[9].
[Dell 5] and J. J. Seidel, Bounds for systems of lines, and Jacobi
polynomials, Philips Res. Reports 30 (1975),91*-105* [3,9].
[De116] - - - Spherical codes and designs, Geom. Dedic. 6 (1977), 363-
388 [I, 3,9,14]'
[Deml] A. P. Dempster, The minimum of a definite ternary quadratic form,
CJM 9 (1957), 232-234 [I].
[Denl] R. H. F. Denniston, Some new 5-designs, BLMS 8 (1976),263-267 [3].
N. Deo: see E. M. Reingold.
[Devil P. A. Devijver and M. Dekesel, Insert and delete algorithms for
maintaining dynamic Delaunay triangulations, Patt. Recog. Lett. 1
(1982),73-77 [2].
[Dev2] - - Computing multidimensional Delaunay tessellations, Patt.
Recog. Lett. I (1983), 311-316 [2].
P. Dewilde: see B. S. Atal, S. G. Wilson.
[Dia I] P. Diaconis, Lectures on the Use of Group Representations in
Probability and Statistics, Inst. Math. Statist. Lecture Note Series, to
appear [9].
[Dia2] - R. L. Graham and W. M. Kantor, The mathematics of perfect
shuffles, Adv. Appl. Math. 4 (1983),175-196 [II].
[Dia3] W. J. Diamond, Practical Experiment Designs, Wadsworth, Belmont
CA, 1981 [3].
J. C. Diaz: see P. Keast.
L. E. Dickson: see also G. A. Miller.
[Dicl] - Linear Groups with an Exposition of the Galois Field Theory,
Dover, NY, 1958 [4, 10].
[Dic2] - History of the Theory of Numbers, Carnegie Institution of
Washington Publications, No. 256, 1919, 1920, 1923, 3 vols; Chelsea,
NY, 1966 [4, 15].
[Dic3] - Studies in the Theory of Numbers, Univ. of Chicago Press, 1930;
Chelsea, NY (no date) [15].
T. J. Dickson: see also E. S. Barnes.
[Dic4] - An extreme covering of 4-space by spheres, JAMS 6 (1966), 179-
192 [2].
[Dic5] - The extreme coverings of 4-space by spheres, JAMS 7 (1967), 490-
496 [2].
[Dic6] - A sufficient condition for an extreme covering of n-space by spheres,
JAMS 8 (1968), 56-62 [2].
[Dic7] - On Voronoi reduction of positive definite quadratic forms, JNT 4
(1972), 330-341 [2].
[Diel] U. Dieter, How to calculate shortest vectors in a lattice, MTAC 29
(1975),827-833 [2].
[Dijl] E. W. Dijkstra, A Discipline of Programming, Prentice-Hall, Englewood
Cliffs NJ, 1976, Chap. 19 [15].
[Dirl] P. G. L. Dirichlet, Uber die Reduktion der positiven quadratische
Formen mit drei unbestimmten ganzen Zahlen, JRAM 40 (1850), 216-
219 [2].
[Dobl] D. Dobkin and R. J. Lipton, Multidimensional searching problems,
SIAM J. Comput. 5 (1976), 181-186 [I].
N. P. Dolbilin: see B. N. Delone.
[Doll] I. Dolgachev, Integral quadratic forms: applications to algebraic
geometry, Sem. Bourbaki 611, Asterisque 105 (1983),251-278 [2, 151.
Bibliography 589
[Goe31 - The extended Nadler code is unique, PGIT 23 (1977), 132-135 [91.
[Goe41 - Association schemes, in Algebraic Coding Theory and Applications,
ed. G. Longo, CISM Courses and Lectures No. 258, Springer-Verlag,
1979, pp. 243-283 [9, 141.
[Goe51 - and J. J. Seidel, Cubature formulae, polytopes and spherical designs,
pp. 203-218 of [Dav31 [1, 31.
[Goe61 - - Spherical designs, PSPM 34 (1979), 255-272 131.
WoBI M. J. E. Golay, Notes on digital coding, PIEEE 37 (1949), 637 [31.
Wol21 - Binary coding, PGIT 4 (1954), 23-28 [3, 51.
[Gol31 M. Goldberg, Packing of 18 equal circles on a sphere, Elem. Math. 20
(1965), 59-61 [11.
[Go141 - Packing of 19 equal circles on a sphere, Elem. Math. 22 (1967),
108-110 [11.
[Go151 - An improved packing of 33 equal circles on a sphere, Elem. Math.
22 (1967), 110-111 [11.
[Go161 - AXially symmetric packing of equal circles on a sphere, Ann. Univ.
Sci. Budapest 10 (1967), 37-48; 12 (1969), 137-142 [11.
[Go171 - Stability configurations of electrons on a sphere, MTAC 23 (1969),
785-786 Ill.
[Go181 - On the densest packing of equal spheres in a cube, Math. Mag. 44
(1971), 199-208 [11.
W. M. Goldman: see D. Fried.
D. Golke: see H. E. Ong.
[Go191 E. S. Golod and I. R. Shafarevich, On class field towers, IANS 28
(1964),261-272 - Amer. Math. Soc. Trans!. (2) 48 (1965),91-102 [I,
81.
[Gooll I. J. Good and R. A. Gaskins, The centroid method of numerical
integration, Num. Math. 16 (1971), 343-359 [211.
[Gopl1 V. D. Goppa, A new class of linear error-correcting codes, PPI 6
(No.3, 1970) = PIT 6 (1970), 207-212 131.
[Gop21 - Codes associated with divisors, PPI 13 (1977), 33-39 = PIT 13
(1977) 22-27 [31.
Wop31 - Codes on algebraic curves, DAN 259 (1981), 1289-1290 = SMD 24
(1981),170-172 [31.
[Gop41 - Algebraic-geometric codes, IANS 46 (1982), 762-781 = Izv. 21
(1983),75-91 131.
Wop51 - Codes and information, Usp. Mat. Nauk 39 (1984), 77-120 - Russ.
Math. Surv. 39 (1984), 87-141 131.
[GorOI D. M. Gordon, Minimal permutation sets for decoding the binary Golay
codes, PGIT 28 (1982), 541-543 [201.
[Gorll L. M. Gordon and R. Levingston, The construction of some
automorphic graphs, Geom. Dedic. 10 (1981), 261-267 [91.
[Gor21 D. Gorenstein, The classification of finite simple groups I. Simple
groups and local analysis, BAMS 1 (1979),43-199 [3, 101.
[Gor31 - Finite Simple Groups, Plenum, NY, 1982 [3, 101.
[Gor41 - The Classification of Finite Simple Groups, Plenum, NY, 1983,
Vo!. 1 [3, 10].
[Gor51 - Classifying the finite simple groups, BAMS 14 (1986),1-98 [3,101.
[Gor61 - and K. Harada, A characterization of Janko's two new simple
groups, J. Fac. Sci. Univ. Tokyo 16 (1970), 331-406 [101.
Wosl1 T. Gosset, On the regular and semi-regular figures in space of n
dimensions, Messenger Math. 29 (1900),43-48 [4].
C. C. Gotlieb: see W. Fraser.
596 Bibliography
[HabI] W. Habicht and B. L. van der Waerden, Lagerung von Punkten aUf der
Kugel, Math. Ann. 123 (1951), 223-234 [11.
[HadI] H. Hadwiger, Uber ausgezeichnete Vektorsterne und reguliire Polytope,
Comment. Math. Helvet. 13 (1940),90-107 [61.
[HahI] T. Hahn, editor, International Tables for Crystallography, Reidel,
Dordrecht, 1983 [1, B1.
J. L. Hall: see M. R. Schroeder.
M. Hall, Jr.: see also N. J. A. Sloane.
[Hall] - Hadamard matrices of order 16, Jet Propulsion Lab. Research
Summary 36-10, Vol. 1 (Sept. 1, 1961), pp. 21-26 [31.
[HaI2] - Hadamard matrices of order 20, Jet Propulsion Lab. Technical
Report 32-761 Jet Propulsion Lab., Pasadena CA, 1965 [3].
[Hal3] - Combinatorial Theory, Blaisdell, Waltham MA, 1967 [31.
[HaI4] - and D. B. Wales, The simple group of order 604,800 J. Alg. 9
(1968),417-450 [10].
598 Bibliography
Q
[Quell H.-G. Quebbemann, Zur Klassifikation unimodularer Gitter mit
Isometrie von Primzahlordnung, JRAM 326 (1981), 158-170 [81.
[Que21 Gitter ohne Automorphismen der Determinante -1, Manuscripta
Math. 40 (1982), 245-253.
[Que31 - An application of Siegel's formula over quaternion orders to the
existence of extremal lattices, Math. 31 (1984), 12-16 [8, 161.
[Que41 - Definite lattices over real algebraic function domains, Math. Ann.
272 (1985),461-476 [21.
[Que51 A construction of integral lattices, Math. 31 (1984), 137-140
[1,7,81.
[Que61 - Lattices with theta-functions for G(Ji.) and linear codes, J. Alg.
lOS (1987),443-450 [1,2,7,81.
L. Queen: see also R. E. Borcherds, J. H. Conway.
[Que71 Some relations between finite groups, Lie groups and modular
functions, Ph.D. Dissertation, Univ. of Cambridge, 1980 [301.
[Que81 Modular functions and finite simple groups, PSPM 37 (1980),
561-566 [301.
[Que91 Modular functions arising from some finite groups, MTAC 37
(1981),547-580 [301.
S. U. Qureshi: see G. D. Forney, Jr.
620 Bibliography
[Sha4] The zero error capacity of a noisy channel, PGIT 2 (1956), 8-19 [3,
9].
[Sha5] Certain results in coding theory for noisy channels, IC 1 (1957),6-
25 [3].
[Sha6] - Probability of error for optimal codes in a Gaussian channel, BSTJ
38 (1959), 611-656 [I, 3].
[Sha7] - Coding theorems for a discrete source with a fidelity criterion, IRE
Nat. Cony. Record (Part 4, 1959), 142-163 [3].
[Sha8] R. G. Gallager and E. R. Berlekamp, Lower bounds to error
probability for coding on discrete memoryless channels, IC 10 (1967),
65-103 and 522-552 [3].
H. M. Shapiro: see A. R. Calderbank.
J. Shawe-Taylor: see N. L. Biggs.
[SheO] D. Shechtman, I. Blech, D. Gratias and J. W. Cahn, Metallic phase
with long-range orientation order and no translational symmetry, Phys.
Rev. Lett. 53 (1984), 1951-1953 [1].
O. I. Shekhovtsov: see S. N. Litsyn.
G. C. Shephard: see also B. Griinbaum, P. McMullen.
[Shell - Unitary groups generated by reflections, CJM 5 (1953), 364-383
[4].
[She2] - and J. A. Todd, Finite unitary reflection groups, CJM 6 (1954),
274-304 [3, 4, 71.
[She3] L. A. Shepp, Computerized tomography and nuclear magnetic
resonance, J. Computer Assisted Tomography 4 (1980),94-107 [1].
[She4] - and J. B. Kruskal, Computerized tomography: the new medical X-ray
technology, AMM 85 (1978),420-439 [11.
F. A. Sherk: see C. Davis.
[Shill G. Shimura, Introduction to the Arithmetic Theory of Automorphic
Functions, Princeton Univ. Press, 1971 [71.
Y. Shoham: see D.-Y. Cheng.
S. S. Shushbaev: see E. P. Baranovskii, E. A. Shamsiev.
[Shu 1] - An algorithm for the calculation of groups of integer automorphisms
of perfect forms in n ~ 2 variables, Voprosy Vychisl. Prikl. Mat.
(Tashkent) 22 (1973), 3-13; Math. Rev. 58 #16516 [3].
[Shu2] - The determination of the groups of integer automorphisms of perfect
quadratic forms, Dokl. Akad. Nauk UzSSR, (No. I, 1974), 16-18
13].
[Shu3] - The Dirichlet-Voronoi domain for the second perfect form, Voprosy
Vychisl. Prikl. Mat. (Tashkent) 45 (1977) , 3-11; Math. Rev. 58
#27811 [2].
[Shu4] - Voronoi neighborhood of the perfect form <PIS (XhX2, ••• , X1),
Voprosy Vychisl. Prikl. Mat. (Tashkent), 77 (1985),48-56 [2].
[Sidl] V. M. Sidel'nikov, On the density of sphere packings on the surface of
an n-dimensional Euclidean sphere and on the cardinality of a binary
code with a given minimum distance, DAN 213 (No.5, 1973), 1029-
1032 - SMD 14 (1973), 1851-1855 [1,9].
[Sid2] Upper bounds on the cardinality of a binary code with a given
minimum distance, PPI 10 (No.2, 1974), 43-51 - IC 28 (1975), 292-
303 [9].
[Sid3] New bounds for densest packings of spheres in n-dimensional
Euclidean space, Mat. Sb. 95 (No. 137, 1974), 148-158 - Sb. 24
(1974), 147-157 [1,9].
[Sid4] - On extremal polynomials used to estimate the size of codes, PPI 16
626 Bibliography
T
[TamIl P. Tammela, The Hermite-Minkowski domain of reduction of positive
definite quadratic forms in six variables, LOMI 33 (1973), 72-89 =
1SM 6 (1976), 677-688 [2,151.
[Tam2] On the reduction theory of positive quadratic forms, DAN 209
(1973),1299-1302 = SMD 14 (1973),651-655 [2, IS].
[Tam3] On the reduction theory of positive quadratic forms, LOMI 50
(1975),6-96 = 1SM 11 (1979),197-277 [2, IS].
[Tam4] - Minkowski's fundamental reduction domain for positive quadratic
forms of seven variables, LOMI 67 (1977), 108-143, 226 = 1SM 16
(1981),836-857 [2, IS].
[TamS] P. M. L. Tammes, On the origin of number and arrangement of the
places of exit on the surface of pollen-grains, Recueil des travaux
botaniques neerlandais 27 (1930), 1-84 [I].
S. L. Tanimoto: see R. 1. Fowler.
[Tan 11 1. Tannery and 1. Molk, Ele'ments de la the'orie des Fonctions
Elliptiques, Chelsea, NY, 2nd ed., 4 vols., 1972 [4].
[Tarll T. Tarnai, Packing of 180 equal circles on a sphere, Elem. Math. 38
(1983),119-122; 39 (1984), 129 [I].
[Tar2] - Note on packing of 19 equal circles on a sphere, Elem. Math. 39
(1984),25-27 [I].
[Tar3] - Spherical circle-packing in nature, practice and theory, Structural
Topology 9 (1984), 39-58 [I].
[Tar4] - and Z. Gaspar, Improved packing of equal circles on a sphere and
rigidity of its graph, PCPS 93 (1983),191-218 [I].
T. Tasaka: see also T. Kondo.
[Tasl] - On even lattices of 2-squares type and self-dual codes, 1. Fac. Sci.
Tokyo Sect. lA Math. 28 (1981),701-714 [7].
[Tau Il O. Taussky, Introduction into connections between algebraic number
theory and integral matrices, Appendix 2 to [Coh6], 1978 [8].
[Tau2] O. Taussky, editor, Ternary Quadratic Forms and Norms, Dekker NY,
1982 [IS].
S. E. Tavares: see G. Promhouse.
K. F. Taylor: see D. Borwein.
S. Tazaki: see Y. Yamada.
[Teil] L. Teirlinck, Non-trivial t-designs without repeated blocks exist for all
t, Discr. Math. to appear [3].
B. K. Teo: see also N. J. A. Sloane.
[TeolJ - and K. Keating, Novel triicosahedral structure of the largest metal
alloy cluster: [(Ph3P)12Au13Ag12CI6]m+, 1. Am. Chern. Soc. 106 (1984),
2224-2226 [IJ.
[Teo2] - and N. 1. A. Sloane, Magic numbers in polygonal and polyhedral
atom counting, Inorg. Chern. 24 (1985),4545-4558 [1,4].
[Teo}] - - Atomic arrangements and electronic requirements for close-
packed circular and spherical clusters, Inorg. Chern. 25 (J 986), 2315-
2322 [1, 4].
[Terl] A. Terras, Harmonic Analysis on Symmetric Spaces and Applications I,
Springer-Verlag, 1985 [9].
1. Thas: see also P. J. Cameron.
[Tha 1] - Two infinite families of perfect codes in metrically regular graphs,
JCT B23 (1977),236-238 [9].
[Tha2l - Polar spaces, generalized hexagons, and perfect codes, JeT A29
(1980),87-93 [9].
Bibliography 631
D4 lattice, 9jJ., 26, 55, 118, 164, 215, Delone, B. N., 35, 36
216, 495jJ., 507 Delsarte, P., 28, 90, 194, 245, 258
as Gaussian lattice, 202, 215 ~n' 247
as Hurwitzian lattice, 55, 119 density, 2, 7, 10,31,46, 101
as laminated lattice, 158jJ. center, 13,32, 101
constructions, 118, 138 doubling, 145, 149
deep holes, 26, 119,462 from theta series, 46
definition, 9, 118 designed distance, 81
density, 10, 119 determinant, 4, 5, 53, 101, 356
determinant, 9 conditions, 382
diagram, 117,457,481, 495jJ., 507 Diaconis, P., 266, 323
kissing number, 9, 22 diagonalization, 369
D 4 /2D 4,169 diagram, Coxeter-Dynkin, see
sections, 166 Coxeter-Dynkin diagram
summary of properties, 118 diamond structure Dt, 8, 46, 113, 119
theta series, 119, 202 definition, 113
Voronoi cell, 119,462 theta series, 46, 113
see also Dn lattice Dickson, L. E., 36,62,267,403
Ds/2Ds, 169 dictators, 25
Dn lattice, 10jJ., 94, 117jJ., 184, 406jJ., dictionary, 201, 328, 560
415,432, 443jJ., 449 different, 230
checkerboard lattice, 117 digital communications, 11, 56
decoding, 443jJ. dimension, 3, 76 379, 380
definition, 10 direct sum, 10 1
Delaunay cell, 144 Dirichlet, P. G. L., 33, 372,451
diagram, 117,457,481, 495jJ., 507 Dirichlet region, see Voronoi cell
finding closest lattice point, 443jJ. Dirichlet integral, 451
fundamental simplex, 461 discriminant, 4, 225, 356
glue vectors, 117, 507 disjoined, 480
summary of properties, 117 distance distribution, 257, 341
theta series, 46, 118, 184 distance, Hamming, 75
Voronoi cell, 462 distance invariant, 45
see also face-centered cubic lattice divisor, 366
D3 dodecad, 279, 308, 480
see also D4 lattice counts, 298
Dn-tree, 479, 496 dodecahedron, 25, 450, 455
Dn+ lattice, 119 rhombic, 34, 450, 462
D: lattice, 120, 449, 463jJ. · 0, see Conway group Coo
decoding, 447 '1, see Conway group COl
Voronoi cell, 463jJ. · 2, see Conway group CO 2
· 00, see Conway group Co~
Damerell, R. M., 90
data compression, v, 56 Downey, D. E., 76
data storage, vi, 63 duad, 269, 279, 495
data transmission, vi, 63 dual code, 77, 245
Davenport, H., 37 dual lattice, 10, 53, 99
Dawson, E., 205 dual problem, 258, 341
decoding algorithms, 41, 443jJ. dual quotient, see group, dual quotient
decoding error, 67 dual theory, vii, 12
deep hole, see hole, deep Dunkl, C. F., 266
Delaunay, B. N., 35, 36 duum, 279
Delaunay cell, 35, 144, 513 Dynkin diagram, see Coxeter-Dynkin
Deligne, P., 51 diagram
Index 647
E6 lattice, 1Off., 55, 94, I 25ff., 144, diagram, 121, 457, 481, 502ff., 507
164, 200, 227, 406.fJ, 427ff., E8/2E8, 169, 170
432, 449, 461ff., 507 E 8/3E 8,214
as Eisenstein lattice, 55, 126, 200 even coordinates, 120
as laminated lattice, 144, I 58ff., finding closest lattice point, 443ff.
162, 164 from Construction B, 142
cyclotomic construction, 227 from Hamming code, 121, 139, 185,
decoding, 447 233
definition, 125, 126, 200 fundamental simplex, 461
diagram, 126,457,481, 502ff., 507 group, 121,294
E6/2E6, 169 holes, 121, 170
fundamental simplex, 461 identified with icosians, 208ff.
glue vectors, 126, 507 initial shells, 123
summary of properties, 125 minimal vectors, 121, 209
theta series, 127, 200 norm-doubler, 240-241
uniqueness, 13 odd coordinates, 120
Voronoi cell, 462 optimality of kissing number, 12, 22,
E; lattice, 127 337, 338, 342
as Eisenstein lattice, 127 orbits of vectors, 123
decoding, 447 other constructions, 143
E7 lattice, I Off., 94, 124, 125, 164, quadratic form, 44
406ff., 427ff., 432, 449, 46 Iff., sections, 166
507 summary of properties, 120
as laminated lattice, 144, I 58ff., theta series, 46, 122, 123, 185, 188,
162, 164 192
construction, 124, 138 uniqueness, 13, 121, 340ff.
decoding, 447 Voronoi cell, 121,462
definition, 124 Weyl group W(E 8), 121,294
diagram, 124,457,481, 502ff., 507 Earnest, A. G., 389
E7/2E7, 169 Edge, W. L., 121
from Hamming code, 138, 185 edge-length, 451
fundamental simplex, 461 Edwards, H. M., 356, 366
glue vectors, 125, 507 Eichler, M., 352, 353, 356, 388, 390
summary of properties, 124 8-cage, 549, 553
theta series, 125 Eisenstein integer, 52, 197ff.
uniqueness, 13 elementary p.d.k., 257
Voronoi cell, 462 II-design, spherical, 196, 346
E; lattice, 125
empty component, 414
endomorphism, 236
decoding, 447
Enguehard, M., 182, 183, 193
E8 lattice, v, vi, 1Off., 22, 48, 90, 93,
entropy, 197, 246
94, 119, 120ff., 142, 146, 164,
equation, Diophantine, 11, 44
188, 192, 206, 240, 338, 340ff.,
Laplace, 256
406ff., 427ff., 432, 439, 449,
error probability, 69
461ff., 507, 523
error-correcting code, see code
as Eisenstein lattice, 200
error-correcting code problem, 76
as Gaussian lattice, 202
Estes, D., 366
as Hurwitzian lattice, 55
Euclidean Lie algebra, 570
as laminated lattice, 144, 158ff.,
eutactic star, 176
162, 164
Evans, D. M., 298
cyclotomic construction, 229
even interpretation, 304
decoding, 443ff.
explicit construction, 18
definition, 120ff.
648 Index
Weyl vector, vi, x, 472, 510, 514, 519, Yoshiara, S., 201, 298
528, 569 Young tableau, 255
Weyl-MacDonald-Kac formula, 571
Whitrow, G. J., 527
Wigner-Seitz cell, see Voronoi cell Z, see one-dimensional lattice
Wilson, J., 256 Z2, see square lattice
Wilson, R. A., 201, 298, 327 Z', see cubic lattice
Wilson, S. G., 74 ZP' 366
Witt, E., 47, 307, 315, 335, 352, 375, Zador, P. L., 58
399 Zaslavsky, T., 90
Woldar, A., 298 zero-sum check, 79
Worley, R. T., 61, 463 r<n), 14
wreath product, 432 Zink, T., 266
Wyner, A. D., 27 Zinoviev, V. A., 76
Zolotareff, G., 10, 12, 120
X-ray tomography, 11
Grundlehren der mathematischen Wissenschaften
Continued from page ii