Nervous System: The Great Fixer of Information Coding Errors
In this month's look at the history of cybersecurity, David Kalat looks back at how one man's frustration at losing time led to one of the great breakthroughs in information theory.
June 04, 2019 at 07:00 AM
6 minute read
With the aggressive pace of technological change and the onslaught of news regarding data breaches, cyber-attacks, and technological threats to privacy and security, it is easy to assume these are fundamentally new threats. The pace of technological change is slower than it feels, and many seemingly new categories of threats have actually been with us longer than we remember. Nervous System is a monthly blog that approaches issues of data privacy and cybersecurity from the context of history—to look to the past for clues about how to interpret the present and prepare for the future.
Telecommunications involves transmitting chunks of binary data over sometimes great distances through all types of interference and barriers. Meanwhile, computer storage systems seek to archive these chunks of binary data on hard drives or solid-state devices that get dropped, shaken, overheated and generally mishandled. Either way, the integrity of the binary data is at risk.
For any individual bit of data, how can the user know if a “1” is really a “1” or if it was flipped from a “0” by interference? As it happens, this fundamental challenge was met in the earliest days of computer science—and solved by a frustrated young man tired of wasting his weekends.
Richard Hamming was an American mathematician who had programmed IBM calculating machines for the Manhattan Project. After the war, he was employed at Bell Labs as a general purpose “computer janitor.” He distinguished himself with the invention of what came to be known as Hamming Error Correcting Codes (along with a slew of subsequent discoveries and patents, all of which bear the “Hamming” name).
In 1947, Hamming was running analysis on the Model V relay computer to prepare it for delivery to the US Army's Aberdeen Proving Ground facility in Maryland. He was, as he put it, “low man on the totem pole” and was allotted processing time on this machine only over the weekend. He could initiate his program at 5:00 p.m. Friday and return at 8:00 a.m. Monday to collect the output. When Hamming returned to the computer on one Monday morning, he was deflated to find the machine had produced nothing whatsoever.
The Model V relay computers suffered around two to three relay failures a day, meaning one failure per two or three million operations. To guard against undetected errors, the engineers had rigged a primitive form of error detection. If the computer could not read a section of data after three tries, it would abort the process. In this case, some glitch in Hamming's input data rendered a section hard to read and caused the computer to give up.
Hamming waited until Friday to try again, only to find yet another blank reel of tape the following Monday. He had now wasted two entire weeks and realized continued faults could likely cost him weeks to come. In exasperation, he decided if the machine was smart enough to discover an error, he would make it smart enough to fix the error, too.
As a first attempted solution, Hamming replicated each bit of the source input three times to create a buffer of redundancy. The intended meaning of each triplet would be inferred by the concept of majority rules. In order to send “1,” this approach would transmit “111.” The triplet is a “codeword,” meaning this particular code considers “111” to be a valid codeword meaning “1” and “000” a codeword meaning “0.”
No other combinations are considered valid in this particular system. Anything else received—such as “001” or “101”—would immediately indicate that corruption had occurred. In this system, error correction occurs by identifying the closest valid codeword for any corrupted word: “001” is corrected back to “000,” “101” is corrected to “1,” and so on.
It may have been effective, but Hamming was bothered by the overhead costs. This method required three times as much data storage and transmission capacity as the original data. Hamming found his “Eureka!” moment while commuting between the Murray Hill location of Bell Labs and New York. “New Jersey isn't worth looking at,” he figured, and set his mind to thinking through better alternatives.
Using his triplet codewords, he had added two bits of error checking to every bit of information in order to rely entirely on redundancy to catch and fix problems. In his new scenario, he found a way to add bits that also added context. Now, every codeword contained a clue about its neighbors in the chain—checking for error was no longer just about checking the “majority rules,” but also whether that result agreed with the conclusion implied by the other information around it. In this way, instead of needing three bits of code to convey a single bit of information, he had a way to use just seven bits of code for four bits of information.
Devising error-correcting codes involves balancing three competing principles. First, keeping codewords short is important to keep the error-correcting system from overwhelming the actual information being transmitted or stored. This is in tension with the need to keep a significant distance between valid codewords so that errors are more easily detected. Last, a limited number of codewords are short while also maintaining a useful distance. A code that balances these competing principles without waste is said to be perfect. By this standard, Hamming's 7,4 code is perfect.
Following some haggling over patents, Hamming published his landmark 1950 paper, “Error Detecting and Error Correcting Codes.” Bell Labs quickly adapted his idea into its telecommunications systems, and versions are still used roughly 70 years later to provide error correcting in mass storage devices and situations in which retransmitting corrupted data would be either impossible or prohibitively costly.
Yet while the 7,4 code is perfect in terms of information theory, its design allows the correction of only a single error in every seven bits of data. For especially unreliable and noisy communications channels, more robust error-checking systems have been devised. Their creation and development, however, derive from the pioneering work Hamming performed in the late 1940s, when he let his inspired frustration take the wheel.
David Kalat is Director, Global Investigations + Strategic Intelligence at Berkeley Research Group. David is a computer forensic investigator and e-discovery project manager. Disclaimer for commentary: The views and opinions expressed in this article are those of the author and do not necessarily reflect the opinions, position, or policy of Berkeley Research Group, LLC or its other employees and affiliates.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Blank Rome Adds Life Sciences Trio From Reed Smith
- 2Divided State Supreme Court Clears the Way for Child Sexual Abuse Cases Against Church, Schools
- 3From Hospital Bed to Legal Insights: Lessons in Life, Law, and Lawyering
- 4‘Diminishing Returns’: Is the Superstar Supreme Court Lawyer Overvalued?
- 5LinkedIn Accused of Sharing LinkedIn Learning Video Data With Meta
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250