CO 434: Combinatorial Designs

Christopher Godsil

Estimated study time: 3 hr 11 min

Table of contents

Sources and References

Primary textbook — C. Godsil, Geometry: Finite, Real, Imaginary (course notes, 2026). Available at https://www.math.uwaterloo.ca/~cgodsil/CO434-634/

Supplementary texts — P.J. Cameron & J.H. van Lint, Designs, Graphs, Codes and Their Links (Cambridge, 1991); D.R. Stinson, Combinatorial Designs: Constructions and Analysis (Springer, 2004); E.F. Assmus & J.D. Key, Designs and Their Codes (Cambridge, 1992)

Online resources — C. Godsil’s CO 434/634 course page, University of Waterloo (https://www.math.uwaterloo.ca/~cgodsil/CO434-634/); MIT OCW 18.315 Combinatorial Theory; lecture notes from Peter Cameron (QMUL)


Chapter 1: Incidence Structures and Block Designs

The subject of combinatorial designs begins with a deceptively simple idea: arrange a finite set of objects into subsets subject to precise regularity conditions. The resulting structures — block designs, Steiner systems, Hadamard matrices, and their kin — sit at a remarkable intersection of combinatorics, linear algebra, finite geometry, and group theory. Godsil’s Geometry: Finite, Real, Imaginary approaches these objects through the lens of linear algebraic methods, and these notes follow that perspective throughout.

1.1 Incidence Structures

Definition (Incidence Structure): An incidence structure is a triple \((P, B, I)\) where \(P\) is a finite set of points, \(B\) is a finite set of blocks, and \(I \subseteq P \times B\) is the incidence relation. We say point \(p\) is incident with block \(\beta\) if \((p, \beta) \in I\), and typically identify each block with the set of points incident with it.

Every incidence structure has a natural graph-theoretic encoding. The incidence graph (or Levi graph) of \((P, B, I)\) is the bipartite graph with vertex set \(P \cup B\), where \(p \in P\) is adjacent to \(\beta \in B\) if and only if \((p, \beta) \in I\). This graph encodes the full combinatorial data of the structure and connects design theory to spectral graph theory.

Definition (Incidence Matrix): The incidence matrix of \((P, B, I)\) is the \(|P| \times |B|\) matrix \(N\) with rows indexed by points and columns indexed by blocks, where \[ N_{x,\beta} = \begin{cases} 1 & \text{if } (x, \beta) \in I \\ 0 & \text{otherwise.} \end{cases} \]

The incidence matrix is the workhorse of the algebraic theory. Key properties of a design — regularity, intersection numbers, Fisher-type inequalities — all emerge from rank arguments and products involving \(N\).

Definition (Partial Linear Space / Linear Space): An incidence structure is a partial linear space if any two distinct points are incident with at most one common block. It is a linear space if any two distinct points lie in exactly one common block.

Projective and affine planes are the canonical examples of linear spaces. Their rich geometry provides the prototypical constructions for the general theory of block designs.

1.2 Block Designs

The central objects of this course are designs that impose a uniform regularity on how points and blocks interact. The following definition captures the precise notion of a 2-design, also called a balanced incomplete block design (BIBD).

Definition (\((v,b,r,k,\lambda)\)-Design): A \((v,b,r,k,\lambda)\)-design (or 2-design with these parameters) is an incidence structure \((P, B)\) satisfying:
  • \(|P| = v\) (number of points),
  • \(|B| = b\) (number of blocks),
  • every point lies in exactly \(r\) blocks,
  • every block contains exactly \(k\) points,
  • every pair of distinct points lies in exactly \(\lambda\) blocks.
Such a design is incomplete if \(k < v\), meaning no block is the entire point set.

The five parameters \((v, b, r, k, \lambda)\) are not independent. Counting incidences in two different ways yields the fundamental parameter relations.

Theorem (Parameter Relations): Any \((v, b, r, k, \lambda)\)-design satisfies: \[ vr = bk, \] \[ \lambda(v-1) = r(k-1), \] \[ v(v-1)\lambda = bk(k-1). \]
Proof. The first identity counts flags \((p, \beta)\) in two ways: summing over points gives \(vr\), summing over blocks gives \(bk\). For the second, fix a point \(x\): the \(r\) blocks through \(x\) each contain \(k-1\) other points, giving \(r(k-1)\) pairs \((x, y)\) with \(x \neq y\) in a common block through \(x\). On the other hand there are \(v-1\) choices for \(y\), each appearing \(\lambda\) times, giving \(\lambda(v-1)\). The third follows by combining the first two.

These relations are necessary but not sufficient for the existence of a design with given parameters. A pair \((v, k, \lambda)\) satisfying these arithmetic conditions is called admissible; whether an admissible set of parameters actually yields a design is a far deeper question, and much of the subject is devoted to it.

1.3 The Fano Plane

Example (Fano Plane): Set \(P = \mathbb{Z}_7 = \{0, 1, 2, 3, 4, 5, 6\}\). Define the seven blocks as the translates of the base block \(\{0, 1, 3\}\) modulo 7: \[ \{0,1,3\},\ \{1,2,4\},\ \{2,3,5\},\ \{3,4,6\},\ \{4,5,0\},\ \{5,6,1\},\ \{6,0,2\}. \] This is a \((7, 7, 3, 3, 1)\)-design. Since \(v = b\) and \(r = k = 3\), it is a symmetric design. It is the projective plane of order 2, denoted \(\mathrm{PG}(2, 2)\).

The Fano plane is the unique design with parameters \((7, 3, 1)\). It embodies much of the spirit of the subject: a tiny structure with enormous symmetry — its automorphism group is \(\mathrm{PSL}(2, 7)\) of order 168 — and connections running to coding theory (the Hamming code), group theory (the simple group \(\mathrm{GL}(3,2)\)), and geometry (the projective plane over \(\mathbb{F}_2\)).

1.4 Difference Sets

The Fano plane was constructed by taking the translates of a single set in an abelian group. This is the idea of a difference set.

Definition (Difference Set): Let \(G\) be a finite abelian group of order \(v\). A \(k\)-element subset \(S \subseteq G\) is a \((v, k, \lambda)\)-difference set if every nonzero element of \(G\) can be expressed as \(s - s'\) with \(s, s' \in S\) in exactly \(\lambda\) ways.
Theorem (Difference Sets Give Symmetric Designs): If \(S\) is a \((v, k, \lambda)\)-difference set in an abelian group \(G\), then the incidence structure with point set \(G\) and blocks \(\{S + g : g \in G\}\) is a symmetric \((v, k, \lambda)\)-design.
Proof sketch. There are exactly \(v\) blocks (one per group element), each of size \(k\). For any two points \(x \neq y\), the number of blocks \(S + g\) containing both equals \(|\{g \in G : x - g \in S \text{ and } y - g \in S\}| = |\{(s, s') \in S \times S : x - y = s - s'\}| = \lambda\) by the difference set condition.

Difference sets are a major source of symmetric designs. The quadratic residues modulo a prime \(p \equiv 3 \pmod{4}\) form a \(\left(\frac{p-1}{2}\right)\)-element difference set in \(\mathbb{Z}_p\) with \(\lambda = \frac{p-3}{4}\), giving the Paley designs. For example, the quadratic residues mod 7 are \(\{1, 2, 4\}\), yielding the Fano plane (up to relabelling).

Example (Difference sets from quadratic residues mod 11). Take \(p = 11\), \(p \equiv 3 \pmod 4\). The quadratic residues mod 11 are \(QR = \{1, 3, 4, 5, 9\}\) (since \(1^2=1, 2^2=4, 3^2=9, 4^2=5, 5^2=3 \pmod{11}\)). So \(S = \{1,3,4,5,9\}\) has \(k = 5\) elements in \(\mathbb{Z}_{11}\) with \(v = 11\), \(\lambda = (p-3)/4 = (11-3)/4 = 2\). Verify: every nonzero difference \(d \in \mathbb{Z}_{11}^*\) appears as \(s - s'\) for \(s, s' \in S\) exactly \(\lambda = 2\) times. For instance, \(d = 1\): \(4-3=1\), \(5-4=1\). \(\checkmark\) For \(d = 2\): \(3-1=2\), \(5-3=2\). \(\checkmark\) Checking all 10 nonzero differences confirms \(\lambda = 2\) throughout.

The resulting symmetric \((11, 5, 2)\)-design has 11 points and 11 blocks (one per group element, being the translates of \(S\)), e.g., the first few blocks are \(\{1,3,4,5,9\}\), \(\{2,4,5,6,10\}\), \(\{3,5,6,7,0\}\), etc. Each point is in exactly \(k = 5\) blocks, and any two points share exactly \(\lambda = 2\) blocks. This is the “biplane” of order 3.

Remark (Singer difference sets and cyclic projective planes). A particularly important family of difference sets are the Singer difference sets: for any prime power \(q\), the set \(S \subseteq \mathbb{Z}_{v}\) where \(v = (q^{d+1}-1)/(q-1)\) (the number of points in \(\mathrm{PG}(d,q)\)) forms a \((v, k, \lambda)\)-difference set with \(k = (q^d-1)/(q-1)\) and \(\lambda = (q^{d-1}-1)/(q-1)\). For \(d = 2\): \(v = q^2+q+1\), \(k = q+1\), \(\lambda = 1\) — these are cyclic projective planes. The Singer construction proves that projective planes of prime power order are always "cyclic" (have a cyclic automorphism group acting regularly on points). Whether every symmetric design with \(\lambda = 1\) is a projective plane (i.e., whether non-Desarguesian planes are "cyclic") is unknown.

1.5 Steiner Systems

At the opposite extreme from highly symmetric difference-set designs are Steiner systems, where \(\lambda = 1\): every pair of points lies in exactly one block.

Definition (Steiner System): A Steiner system \(S(t, k, v)\) is a \(t\)-design with \(\lambda = 1\): every \(t\)-subset of points is contained in exactly one block. A Steiner triple system is an \(S(2, 3, v)\).
Theorem (Existence of Steiner Triple Systems): A Steiner triple system \(S(2, 3, v)\) exists if and only if \(v \equiv 1\) or \(3 \pmod{6}\).
Proof sketch. Necessity: The parameter relations give \(r = (v-1)/2\) and \(b = v(v-1)/6\), forcing \(v \equiv 1\) or \(3 \pmod 6\). Sufficiency is proved by explicit constructions (Kirkman 1847): for \(v \equiv 3 \pmod 6\), use a recursive construction; for \(v \equiv 1 \pmod 6\), use algebraic methods over \(\mathbb{Z}_v\).

Steiner triple systems are among the most studied objects in combinatorics. The smallest is the Fano plane (\(v = 7\)); the next is \(S(2, 3, 9)\), the affine plane \(\mathrm{AG}(2, 3)\), consisting of the \(12\) lines of the \(3 \times 3\) grid.

Example (\(S(2, 3, 9)\) — the affine plane \(\mathrm{AG}(2, 3)\)). Take the point set \(P = \mathbb{Z}_3 \times \mathbb{Z}_3 = \{(0,0), (0,1), (0,2), (1,0), (1,1), (1,2), (2,0), (2,1), (2,2)\}\). The blocks are the 12 "lines" of the affine plane over \(\mathbb{F}_3\): for each direction \((a:b)\) (in homogeneous coordinates), the lines of that slope partition \(P\) into 3 parallel classes of 3 points each. Explicitly, the 4 parallel classes are:
  • Horizontal lines (\(y = c\)): \(\{(0,c),(1,c),(2,c)\}\) for \(c = 0,1,2\).
  • Vertical lines (\(x = c\)): \(\{(c,0),(c,1),(c,2)\}\) for \(c = 0,1,2\).
  • Slope-1 lines (\(y = x + c\)): \(\{(0,c),(1,c+1),(2,c+2)\}\) mod 3, for \(c = 0,1,2\).
  • Slope-2 lines (\(y = 2x + c\)): \(\{(0,c),(1,c+2),(2,c+1)\}\) mod 3, for \(c = 0,1,2\).
This gives \(4 \times 3 = 12\) blocks, each of size 3, with \(v = 9\), \(b = 12\), \(r = 4\), \(k = 3\), \(\lambda = 1\). Verify: any two points determine a unique line (unique slope between them), so \(\lambda = 1\). Check the parameter relations: \(vr = 9 \times 4 = 36 = bk = 12 \times 3\). \(\checkmark\) The affine plane \(\mathrm{AG}(2,3)\) is also the unique Steiner triple system on 9 points (up to isomorphism).
Remark (Resolvability of Steiner triple systems). A Steiner triple system \(S(2,3,v)\) is resolvable if its blocks can be partitioned into parallel classes, each of which partitions the point set. For a resolvable STS, we need \(3 \mid v\), so the necessary condition is \(v \equiv 3 \pmod{6}\). The affine plane \(\mathrm{AG}(2,3)\) with \(v = 9\) is resolvable: the four parallel classes are exactly as listed above, and each class partitions the 9 points into 3 triples. Resolvable Steiner triple systems are called Kirkman schoolgirl systems, after the Kirkman schoolgirl problem (1847): arrange 15 schoolgirls in rows of 3 for 7 days so that any two are in the same row exactly once. This is equivalent to a resolvable \(S(2,3,15)\).

1.6 t-Designs

The definition of a 2-design extends naturally.

Definition (\(t\)-Design): A \(t\)-(v, k, \lambda)\) design is an incidence structure with \(v\) points and blocks of size \(k\) such that every \(t\)-subset of points is contained in exactly \(\lambda\) blocks. A 2-design in this language is a \(2\)-(v, k, \lambda) design.

The derived parameter counting generalises cleanly.

Theorem (Derived Parameter Formula): In a \(t\)-(v, k, \lambda) design, for each \(0 \leq s \leq t\), every \(s\)-subset of points is contained in exactly \(\lambda_s\) blocks, where \[ \lambda_s = \lambda \cdot \frac{\binom{v-s}{t-s}}{\binom{k-s}{t-s}}. \] In particular \(\lambda_0 = b\) (the total number of blocks) and \(\lambda_1 = r\) (the replication number).
Proof. Fix an \(s\)-subset \(T\). Double-count pairs \((B, U)\) where \(B\) is a block containing \(T\), and \(U\) is a \(t\)-subset with \(T \subseteq U \subseteq B\). Each block containing \(T\) contributes \(\binom{k-s}{t-s}\) such pairs; each \(t\)-set \(U \supseteq T\) is in exactly \(\lambda\) blocks, and there are \(\binom{v-s}{t-s}\) choices for \(U\).

The existence of a \(t\)-design requires that \(\lambda_s\) be a positive integer for all \(0 \leq s \leq t\). These divisibility conditions are necessary but generally not sufficient. The great existence theorem of Wilson (discussed in Chapter 5) shows they are asymptotically sufficient.

Example (Parameter counting for a \(3\)-(10, 4, 1) design). Check divisibility conditions for a hypothetical \(3\)-(10, 4, 1) design (\(v = 10\), \(k = 4\), \(t = 3\), \(\lambda = 1\)): \[ \lambda_3 = 1, \quad \lambda_2 = \lambda \cdot \frac{\binom{10-2}{3-2}}{\binom{4-2}{3-2}} = 1 \cdot \frac{\binom{8}{1}}{\binom{2}{1}} = \frac{8}{2} = 4, \] \[ \lambda_1 = r = \lambda \cdot \frac{\binom{10-1}{3-1}}{\binom{4-1}{3-1}} = 1 \cdot \frac{\binom{9}{2}}{\binom{3}{2}} = \frac{36}{3} = 12, \] \[ \lambda_0 = b = \lambda \cdot \frac{\binom{10}{3}}{\binom{4}{3}} = \frac{120}{4} = 30. \] All are positive integers. \(\checkmark\) So the arithmetic necessary conditions are satisfied. A \(3\)-(10, 4, 1) design does exist: it can be constructed from the unique \(5\)-(12, 6, 1) Witt design \(\mathcal{W}_{12}\) by taking the derived design at two points (deriving twice reduces \(t\) by 2 and reduces \(v\) by 2, giving a \(3\)-(10, 4, 1) design).
Remark (Necessary vs. sufficient conditions for \(t\)-designs). For \(t = 2\), the parameter conditions (\(r\), \(b\) integers and \(r > \lambda\)) are necessary but far from sufficient: many admissible parameter sets correspond to non-existent designs (e.g., the exhaustive computer search showing no projective plane of order 10 exists). For \(t \geq 6\) and \(\lambda = 1\), only finitely many designs were known until 2014, when Keevash proved via probabilistic methods that for sufficiently large \(v\) satisfying the necessary divisibility conditions, a \(t\)-(v, k, \lambda) design exists for all \(t, k, \lambda\). This is one of the most significant results in combinatorics of the past decade: it showed that the divisibility conditions are nearly sufficient, and the proof technique ("randomised algebraic constructions") opened a new chapter in design theory.

Chapter 2: Symmetric Designs and Fisher’s Inequality

2.1 Symmetric Designs

Among all 2-designs, those with \(b = v\) — equivalently, \(r = k\) — occupy a special position. They are called symmetric designs and their theory is substantially richer than the general case, largely because their incidence matrices are square.

Definition (Symmetric Design): A 2-design is symmetric if \(b = v\) (equivalently, \(r = k\)). A symmetric design with parameters \((v, k, \lambda)\) satisfies \(k(k-1) = \lambda(v-1)\). It is sometimes written as a \((v, k, \lambda)\)-design without the adjective "symmetric" when the context is clear.

The incidence matrix of a symmetric design satisfies a fundamental matrix identity. Since \(N\) is \(v \times v\) in this case, we can compute \(NN^T\) directly.

Theorem (Matrix Identity for Symmetric Designs): Let \(N\) be the incidence matrix of a symmetric \((v, k, \lambda)\)-design. Let \(J\) denote the \(v \times v\) all-ones matrix. Then: \[ N \mathbf{1} = k \mathbf{1}, \quad \mathbf{1}^T N = k \mathbf{1}^T, \] \[ N N^T = (k - \lambda) I + \lambda J. \]
Proof. The first two identities state that every row sum and every column sum of \(N\) equals \(k\) (each block has \(k\) points, each point is in \(k\) blocks). For the product: \((NN^T)_{ij}\) counts the number of blocks containing both point \(i\) and point \(j\). This is \(k\) if \(i = j\) (each point is in \(k\) blocks) and \(\lambda\) if \(i \neq j\) (any two points share \(\lambda\) blocks). Hence \(NN^T = (k-\lambda)I + \lambda J\).

2.2 Fisher’s Inequality

One of the most elegant results in combinatorics is Fisher’s inequality, which asserts that a non-trivial 2-design must have at least as many blocks as points.

Theorem 2.1.1 (Fisher's Inequality): Let \((P, B)\) be a 2-design with \(v > k\) (i.e., the design is non-trivial, so no block contains all points). Then \(b \geq v\).
Proof. We show the \(v \times b\) incidence matrix \(N\) has rank \(v\), forcing \(b \geq v\).

Consider \(M = NN^T = (r - \lambda)I + \lambda J\). This is a \(v \times v\) matrix. Its eigenvalues are:

  • \(\lambda_1 = r - \lambda + \lambda v = r + \lambda(v-1) = rk\) (eigenvalue for eigenvector \(\mathbf{1}\), since \(J\mathbf{1} = v\mathbf{1}\)),
  • \(\lambda_2 = r - \lambda\) (eigenvalue for any vector orthogonal to \(\mathbf{1}\)).

Since \(v > k\), we have \(r > \lambda\) (from \(\lambda(v-1) = r(k-1)\) and \(v > k\)), so \(\lambda_2 = r - \lambda > 0\). Also \(\lambda_1 = rk > 0\). Hence \(M\) is positive definite, so \(\det(M) \neq 0\), which means \(\mathrm{rank}(NN^T) = v\). Since \(\mathrm{rank}(NN^T) = \mathrm{rank}(N)\), we get \(\mathrm{rank}(N) = v\), giving \(b \geq v\).

Fisher’s inequality was first proved by R.A. Fisher in the context of statistical design of experiments (1940). The algebraic proof via the matrix \(NN^T\) is due to Majumdar and later clarified by Bose. The positive-definiteness argument is a model for many results in algebraic combinatorics: encode a counting condition as a matrix identity, then use spectral information.

Remark (Symmetric designs and their duals). When \(b = v\) — that is, the design is symmetric — the incidence matrix \(N\) is square and invertible (by Fisher's proof). In this case one can compute \(N^T N\) as well as \(NN^T\). Since \(N(N^T N) = (NN^T) N\) and \(NN^T = (r-\lambda)I + \lambda J\), one shows (by comparing minimal polynomials or by the fact that \(N^T N\) and \(NN^T\) have the same spectrum) that \(N^T N = (k-\lambda)I + \lambda J\) as well. But \((N^T N)_{ij}\) counts the number of points common to blocks \(i\) and \(j\): it equals \(k\) for \(i = j\) and \(\lambda\) for \(i \neq j\). Therefore any two distinct blocks of a symmetric design intersect in exactly \(\lambda\) points. Moreover, the dual design (obtained by interchanging the roles of points and blocks) has incidence matrix \(N^T\), and \(N^T (N^T)^T = N^T N = (k-\lambda)I + \lambda J\) — so the dual is again a symmetric \((v,k,\lambda)\)-design. Self-duality is a feature unique to symmetric designs; for non-symmetric designs, the dual incidence structure need not be a design at all.

2.3 Block Intersection in Symmetric Designs

When \(b = v\), the incidence matrix is square and invertible (by Fisher’s proof). This gives a strikingly clean description of how blocks intersect.

Theorem 2.1.2 (Block Intersection Property): In a symmetric \((v, k, \lambda)\)-design, any two distinct blocks intersect in exactly \(\lambda\) points.
Proof. Since \(N\) is \(v \times v\) and invertible, we can compute \(N^T N\). We have \[ N^T N \cdot \mathbf{1} = N^T(k\mathbf{1}) = k \cdot k \mathbf{1}, \] so \(k\) is an eigenvalue of \(N^T N\) with eigenvector \(\mathbf{1}\). For \(\mathbf{x} \perp \mathbf{1}\), \[ N^T N \mathbf{x} = N^T N \mathbf{x}, \]

and since \(NN^T = (k-\lambda)I + \lambda J\), taking determinants shows \(\det(N^TN) = \det(NN^T)\), so \(N^TN\) has the same eigenvalues as \(NN^T\). Because \(N\) is invertible, \(N^TN = (k-\lambda)I + \lambda J\) as well (this follows since \(N(N^TN) = (NN^T)N\) and the matrix polynomial \((k-\lambda)I + \lambda J\) is the unique solution). Therefore \((N^TN)_{ij} = k\) for \(i=j\) and \(\lambda\) for \(i \neq j\), meaning any two blocks share exactly \(\lambda\) points.

Corollary (Dual of a Symmetric Design): The dual of a symmetric \((v,k,\lambda)\)-design — obtained by interchanging the roles of points and blocks — is again a symmetric \((v,k,\lambda)\)-design.
Proof. The dual has incidence matrix \(N^T\). We showed \(N^TN = (k-\lambda)I + \lambda J\), which is the condition for the dual to be a design with the same parameters.

The self-duality of symmetric designs is a beautiful feature absent in the general case. The Fano plane is self-dual: its dual is again the Fano plane (up to isomorphism).

Example (Dual of the Fano plane). Recall the seven blocks of the Fano plane with points \(P = \{0,1,2,3,4,5,6\}\): \[ B_0 = \{0,1,3\},\ B_1 = \{1,2,4\},\ B_2 = \{2,3,5\},\ B_3 = \{3,4,6\},\ B_4 = \{4,5,0\},\ B_5 = \{5,6,1\},\ B_6 = \{6,0,2\}. \] The dual design has blocks indexed by the original points: the block corresponding to point \(i\) consists of all original blocks containing \(i\). For example, point 0 lies in blocks \(B_0 = \{0,1,3\}\), \(B_4 = \{4,5,0\}\), \(B_6 = \{6,0,2\}\), so its dual block is \(\{B_0, B_4, B_6\} = \{0, 4, 6\}\) (re-indexing blocks as 0 through 6). Similarly point 1 lies in \(B_0, B_1, B_5\), giving dual block \(\{0,1,5\}\).

Let us verify the symmetric design property: any two original points (now acting as dual blocks) share exactly \(\lambda = 1\) original block. Points 0 and 1 both lie in \(B_0\) only — exactly one block, confirming \(\lambda = 1\). Points 0 and 2 both lie in \(B_6 = \{6,0,2\}\) only. Points 1 and 4 both lie in \(B_1 = \{1,2,4\}\) only. One can verify all \(\binom{7}{2} = 21\) pairs similarly; each pair of original points shares exactly one block, confirming that the dual is again a \((7,3,1)\)-design — the Fano plane itself.

2.4 Projective Planes as Symmetric Designs

Definition (Projective Plane of Order \(n\)): A projective plane of order \(n\) is a symmetric \((n^2+n+1,\, n+1,\, 1)\)-design. Equivalently, it is a linear space where every two lines meet in exactly one point and every line has \(n+1\) points.

The standard construction uses vector spaces over finite fields. Let \(\mathbb{F}_q\) be the field with \(q = p^m\) elements.

Example (\(\mathrm{PG}(d, q)\)): The projective space \(\mathrm{PG}(d, q)\) has:
  • Points: 1-dimensional subspaces of \(\mathbb{F}_q^{d+1}\),
  • Blocks (\(j\)-flats): \((j+1)\)-dimensional subspaces of \(\mathbb{F}_q^{d+1}\).
The number of \(j\)-dimensional subspaces is the Gaussian binomial coefficient \(\left[\begin{smallmatrix} d+1 \\ j+1 \end{smallmatrix}\right]_q\). For \(\mathrm{PG}(2, q)\) (a projective plane), the parameters are \(v = b = q^2 + q + 1\) and \(k = r = q + 1\), \(\lambda = 1\).

More generally, the 2-design of points and hyperplanes in \(\mathrm{PG}(d, q)\) has parameters

\[ v = \frac{q^{d+1}-1}{q-1}, \quad k = \frac{q^d - 1}{q-1}, \quad \lambda = \frac{q^{d-1}-1}{q-1}. \]

Projective planes of order \(n\) exist for all prime powers \(n\). Whether non-prime-power orders are possible is the central open problem of projective geometry. The famous Bruck–Ryser theorem (1949), later extended by Chowla–Ryser, provides a necessary condition that eliminates many cases.

Example (Affine planes from projective planes). Given a projective plane \(\Pi\) of order \(n\) (a symmetric \((n^2+n+1, n+1, 1)\)-design), one can construct an affine plane of order \(n\) by deleting a single line \(\ell_\infty\) and all its points. The resulting structure has:
  • Points: \(n^2+n+1 - (n+1) = n^2\) points,
  • Lines: those original blocks not equal to \(\ell_\infty\) — that is, \(n^2+n+1 - 1 = n^2+n\) lines,
  • Each line has \(n+1 - 1 = n\) points (after deleting the intersection with \(\ell_\infty\)),
  • Each pair of points lies on exactly 1 line (since the original design had \(\lambda = 1\), and the deleted line did not contain any pair of affine points).
This is an affine plane \(\mathrm{AG}(2,n)\), a \(2\)-(n^2, n, 1) design. The deleted line \(\ell_\infty\) is the "line at infinity" whose \(n+1\) points are the \(n+1\) "directions" of the affine plane: each direction corresponds to a parallel class (a partition of \(n^2\) points into \(n\) parallel lines of \(n\) points each). For \(n = 2\) (Fano plane minus a line): the affine plane has 4 points and 6 lines of size 2 — this is the complete graph \(K_4\), where each pair of points is a "line."
Remark (Ovals and hyperovals in projective planes). In a projective plane of order \(n\), an oval is a set of \(n+1\) points with no three collinear (a maximum arc). For \(n\) even, an oval can be extended to a hyperoval of \(n+2\) points. In \(\mathrm{PG}(2, 2^m)\), the set of all points on the "conic" \(x_1^2 + x_2 x_3 = 0\) forms a hyperoval of \(2^m + 2\) points. Hyperovals are central in finite geometry and appear in the construction of many combinatorial objects: the unique biplane on 11 points (the \((11,5,2)\)-design) is closely related to the hyperoval of \(\mathrm{PG}(2,4)\) (which has 6 points in a \(4^2+4+1=21\)-point plane). The correspondence between hyperovals and specific symmetric designs is a recurring theme in finite geometry.

2.5 The Bruck–Ryser–Chowla Theorem

Theorem (Bruck–Ryser–Chowla): If a symmetric \((v, k, \lambda)\)-design exists, then:
  • If \(v\) is even, then \(k - \lambda\) must be a perfect square.
  • If \(v\) is odd, the Diophantine equation \[ x^2 = (k - \lambda)\,y^2 + (-1)^{(v-1)/2}\,\lambda\,z^2 \] must have a solution in integers, not all zero.

The proof uses the theory of rational quadratic forms and the Hasse–Minkowski theorem. The incidence matrix \(N\) of a symmetric design yields a quadratic form over \(\mathbb{Q}\): the form associated to \(N^TN = (k-\lambda)I + \lambda J\). The Hasse–Minkowski theorem requires this form to be equivalent (over all \(p\)-adic completions \(\mathbb{Q}_p\)) to the form on the right-hand side of the equation. When the local conditions fail — i.e., the equation has no \(p\)-adic solution for some prime \(p\) — no design exists.

For projective planes, \(\lambda = 1\) and the condition becomes: if \(n \equiv 1\) or \(2 \pmod{4}\), then \(n\) must be a sum of two squares. This eliminates \(n = 6\) (since \(6 \not\equiv 0, 3 \pmod 4\) and \(6\) is not a sum of two squares) and \(n = 14\). The non-existence of a projective plane of order 10 was proved by Lam, Thiel, and Swiercz (1989) using an exhaustive computer search — one of the largest computations in mathematics at the time.

The BRC theorem is illustrative of a general principle: existence questions for designs translate into questions about quadratic forms, and algebraic obstructions can prevent existence even when arithmetic conditions are met.

Example (Applying BRC to rule out a symmetric design). Consider whether a symmetric \((22, 7, 2)\)-design can exist. Check: \(k(k-1) = 7 \times 6 = 42 = \lambda(v-1) = 2 \times 21 = 42\). \(\checkmark\) Arithmetic is consistent. Now apply BRC: \(v = 22\) is even, so the condition is that \(k - \lambda = 7 - 2 = 5\) must be a perfect square. But 5 is not a perfect square. Therefore, no symmetric \((22, 7, 2)\)-design exists.

As another example: a symmetric \((37, 9, 2)\)-design. Check: \(k(k-1) = 72 = \lambda(v-1) = 2 \times 36 = 72\). \(\checkmark\) Here \(v = 37\) is odd and \((v-1)/2 = 18\) is even, so \((-1)^{(v-1)/2} = 1\). The BRC equation is \(x^2 = (k-\lambda)y^2 + \lambda z^2 = 7y^2 + 2z^2\). Taking \(y = 1, z = 0\) gives \(x^2 = 7\) — not a perfect square. Try \(y = 0, z = 1\): \(x^2 = 2\) — not a square. Try \(y = 1, z = 1\): \(x^2 = 9\), so \(x = 3\). The equation \(3^2 = 7(1)^2 + 2(1)^2\) holds: \(9 = 7 + 2\). \(\checkmark\) So BRC does not rule out a \((37,9,2)\)-design. Indeed, such designs are known to exist (they arise from the unique biplane on 37 points).

2.6 The Ray-Chaudhuri-Wilson Theorem

Fisher’s inequality \(b \geq v\) can be dramatically strengthened when additional intersection conditions are imposed. The Ray-Chaudhuri-Wilson theorem is one of the great achievements of algebraic combinatorics, giving a tight bound on the size of set families with prescribed intersection sizes.

Theorem (Ray-Chaudhuri-Wilson, 1975): Let \(\mathcal{F}\) be a family of \(k\)-element subsets of an \(n\)-element set, and suppose that for any two distinct \(A, B \in \mathcal{F}\), the intersection size \(|A \cap B| \in L = \{\ell_1, \ldots, \ell_s\}\) for some fixed set \(L\) of \(s\) integers with \(0 \leq \ell_i < k\). Then \[ |\mathcal{F}| \leq \binom{n}{s}. \]
Proof sketch. For each set \(A \in \mathcal{F}\), define the multilinear polynomial \(f_A: \mathbb{R}^n \to \mathbb{R}\) by \[ f_A(x) = \prod_{i=1}^s \left(\sum_{j \in A} x_j - \ell_i\right). \] Evaluated at the 0-1 indicator vector \(\mathbf{1}_B\) of a set \(B \in \mathcal{F}\): \(f_A(\mathbf{1}_B) = \prod_i (|A \cap B| - \ell_i)\). This equals 0 if \(B \neq A\) (since \(|A \cap B| \in L\)) and equals \(\prod_i (k - \ell_i) \neq 0\) if \(B = A\). So the polynomials \(\{f_A : A \in \mathcal{F}\}\) are "interpolating" at the indicator vectors: they form a system where each \(f_A\) vanishes on all other \(f_B\)'s evaluation points but not its own. This implies the polynomials are linearly independent over \(\mathbb{R}\). On the other hand, each \(f_A\) is a multilinear polynomial of degree \(s\) that is symmetric in the variables within \(A\), so it lies in the space of multilinear polynomials on \(\{0,1\}^n\) of degree at most \(s\), which has dimension \(\sum_{i=0}^s \binom{n}{i}\). For the specific form of \(f_A\), one shows it lies in a subspace of dimension \(\binom{n}{s}\), giving the bound \(|\mathcal{F}| \leq \binom{n}{s}\). \(\square\)
Remark (Tightness and the modular version). The bound \(|\mathcal{F}| \leq \binom{n}{s}\) is tight: for any \(k\)-element subsets of an \(n\)-set with intersection sizes in \(\{0, 1, \ldots, s-1\} \setminus \{k\}\), the bound is achieved by the collection of all \(s\)-element subsets (trivially with \(s\) possible intersection sizes among subsets of an \(s\)-subset). More interestingly, for 2-designs with \(s = 1\) (only one intersection size \(\lambda\)), the Ray-Chaudhuri-Wilson theorem gives \(b \leq \binom{v}{1} = v\), recovering Fisher's inequality \(b \geq v\) combined to give \(b = v\) for symmetric designs. Frankl (1977) proved a modular version: if \(|A \cap B| \not\equiv \ell \pmod{p}\) for all \(A \neq B\), and \(|A| \not\equiv \ell \pmod{p}\), then \(|\mathcal{F}| \leq \binom{n-1}{s}\) over a field of characteristic \(p\). This modular Ray-Chaudhuri-Wilson theorem has stronger consequences in extremal set theory.

Chapter 3: Orthogonal Latin Squares and Orthogonal Arrays

3.1 Latin Squares

A Latin square of order \(n\) is the combinatorial analogue of a multiplication table.

Definition (Latin Square): A Latin square of order \(n\) is an \(n \times n\) array filled with \(n\) distinct symbols such that each symbol appears exactly once in each row and exactly once in each column.

Latin squares are equivalent to one-dimensional block designs and encode the structure of quasigroups. The canonical example is the multiplication table of \(\mathbb{Z}_n\): entry \((i, j)\) is \(i + j \pmod{n}\).

Definition (Mutually Orthogonal Latin Squares): Two Latin squares \(L_1\) and \(L_2\) of the same order \(n\) are orthogonal if, when superimposed, every ordered pair of symbols \((a, b)\) appears exactly once. A set of pairwise orthogonal Latin squares is called mutually orthogonal Latin squares (MOLS). Let \(N(n)\) denote the maximum number of MOLS of order \(n\).

The question of how many MOLS can exist of a given order \(n\) is one of the oldest problems in combinatorics, going back to Euler. The answer is now largely known, with a few stubborn small cases remaining.

Theorem (MOLS from Prime Powers): If \(n = p^m\) is a prime power, then \(N(n) \geq n - 1\). In fact \(N(n) = n-1\) for prime powers, and this is the maximum possible.
Proof sketch. Identify the rows, columns, and symbols with elements of \(\mathbb{F}_q\) (where \(q = n = p^m\)). For each \(\alpha \in \mathbb{F}_q \setminus \{0\}\), define the Latin square \(L_\alpha\) by \(L_\alpha(i, j) = \alpha i + j\). One checks these are pairwise orthogonal: if \(\alpha \neq \beta\), the system \(\alpha i + j = a\), \(\beta i + j = b\) has the unique solution \(i = (a-b)/(\alpha - \beta)\), \(j = a - \alpha i\).
Example (MOLS of order 3 from \(\mathbb{F}_3\)). Take \(q = 3\), so \(\mathbb{F}_3 = \{0, 1, 2\}\) with arithmetic mod 3. For \(\alpha = 1\) and \(\alpha = 2\), define Latin squares \(L_1(i,j) = i + j \pmod 3\) and \(L_2(i,j) = 2i + j \pmod 3\). Explicitly (rows indexed by \(i = 0,1,2\) and columns by \(j = 0,1,2\)): \[ L_1 = \begin{pmatrix} 0 & 1 & 2 \\ 1 & 2 & 0 \\ 2 & 0 & 1 \end{pmatrix}, \qquad L_2 = \begin{pmatrix} 0 & 1 & 2 \\ 2 & 0 & 1 \\ 1 & 2 & 0 \end{pmatrix}. \] To verify orthogonality: superimpose \(L_1\) and \(L_2\) to get the matrix of pairs \((L_1(i,j), L_2(i,j))\): \[ \begin{pmatrix} (0,0) & (1,1) & (2,2) \\ (1,2) & (2,0) & (0,1) \\ (2,1) & (0,2) & (1,0) \end{pmatrix}. \]

The nine pairs are exactly all nine ordered pairs from \(\{0,1,2\}^2\), each appearing once. \(\checkmark\) So \(N(3) \geq 2\), and since \(q - 1 = 2\), we have \(N(3) = 2\) exactly (the upper bound \(N(n) \leq n-1\) for all \(n\) follows from a counting argument: each of the \(n-1\) non-trivial symbols in the first row of any MOLS must be distinct).

Remark (MOLS and projective planes). A projective plane of order \(n\) is equivalent to a complete set of \(n-1\) MOLS of order \(n\). The equivalence: given \(n-1\) MOLS \(L_1, \ldots, L_{n-1}\) of order \(n\), construct a projective plane of order \(n\) with \(n^2 + n + 1\) points and the same number of lines. The \(n^2\) "inner" points are the cells \((i,j)\) of the Latin square grid; the \(n+1\) "special" points are the \(n-1\) slope-symbols plus two points at infinity. Lines are constructed from rows, columns, and the \(n-1\) MOLS. Conversely, any projective plane of order \(n\) yields \(n-1\) MOLS. Since projective planes are known to exist only for prime power orders, this equivalence suggests (but does not prove) that \(N(n) = n-1\) only for prime powers — a major open question.

3.2 Euler’s Conjecture and Its Refutation

The Euler conjecture (1782) stated that no pair of MOLS exists for \(n \equiv 2 \pmod{4}\). This was verified for \(n = 2\) (trivially) and \(n = 6\) (by exhaustive computation by Tarry in 1901), and remained open for nearly 180 years.

The conjecture was dramatically refuted by Bose, Shrikhande, and Parker in 1960:

Theorem (Bose–Shrikhande–Parker, 1960): For all \(n \geq 10\) with \(n \equiv 2 \pmod{4}\), there exist at least two MOLS of order \(n\). Hence the Euler conjecture is false for all \(n \geq 10\), and the only orders with \(N(n) = 1\) are \(n = 2\) and \(n = 6\).

The case \(n = 6\) (no pair of MOLS of order 6) was proved by Tarry’s exhaustive case analysis, with no known short proof. This is equivalent to the non-existence of a resolvable \(S(2, 3, 7)\) with a specific additional structure, and also to the non-existence of a projective plane of order 6.

The MacNeish conjecture (that \(N(n) = \min_i(p_i^{m_i}) - 1\) where \(n = \prod p_i^{m_i}\)) was also refuted by the Bose–Shrikhande–Parker construction.

Order \(n\)\(N(n)\)
21
32
43
54
61
76
87
98
10\(\geq 2\) (exact value unknown)

3.3 Orthogonal Arrays

Latin squares are a special case of a broader combinatorial structure.

Definition (Orthogonal Array): An orthogonal array \(\mathrm{OA}(t, k, n)\) is a \(k \times n^t\) array with entries from an \(n\)-element alphabet such that, in any \(t\) rows, every \(t\)-tuple of symbols appears exactly once as a column.

The parameter \(t\) is the strength, \(k\) is the number of constraints (rows), and \(n\) is the number of levels. The correspondence with Latin squares is:

  • \(\mathrm{OA}(2, 3, n)\) ↔ Latin square of order \(n\): the three rows encode row index, column index, and entry.
  • A set of \(m\) MOLS of order \(n\) ↔ \(\mathrm{OA}(2, m+2, n)\).
Theorem (Rao's Bound): In an \(\mathrm{OA}(t, k, n)\), the number of columns satisfies \(n^t \geq \binom{k}{t}\) (trivially) and more usefully: \[ k \leq \begin{cases} 2 + \frac{n^{t/2} - 1}{n-1} & \text{if } t \text{ is even} \\ 2\left(1 + \frac{n^{(t-1)/2}-1}{n-1}\right) & \text{if } t \text{ is odd.} \end{cases} \]

Orthogonal arrays arise in statistics (factorial experiments), coding theory (error-correcting codes), and cryptography (authentication codes). An \(\mathrm{OA}(t, k, n)\) is equivalent to a code with certain distance properties.

Example (Orthogonal array from a linear code). Let \(C\) be a linear code over \(\mathbb{F}_q\) with parameters \([n, k, d]\). The dual code \(C^\perp\) has parameters \([n, n-k, d^\perp]\). The generator matrix \(G\) of \(C^\perp\) (an \((n-k) \times n\) matrix) can be viewed as an orthogonal array: the columns of \(G\) indexed by any \(t\) positions span all of \(\mathbb{F}_q^{n-k}\) if and only if the minimum distance of \(C\) is at least \(t+1\) (the Singleton-type condition). More precisely, \(G\) is the generator of an \(\mathrm{OA}(t, n, q)\) iff every \(t\) columns of \(G\) are linearly independent iff \(d(C) \geq t+1\).

Concretely: the Hamming code \(\mathrm{Ham}(r, q)\) has parameters \([n = (q^r-1)/(q-1), n-r, 3]_q\). Its parity check matrix \(H\) (an \(r \times n\) matrix) forms an \(\mathrm{OA}(2, n, q)\) since any 2 columns of \(H\) are distinct (minimum distance 3 means no two columns are proportional). This gives the connection: a perfect 1-error-correcting code (Hamming code) corresponds to a Steiner system \(S(2, q, n)\) corresponds to an OA of strength 2.

Remark (OA and experimental design — the Taguchi method). In statistics, orthogonal arrays are the foundation of Taguchi's "robust design" methodology (1980s): one wants to test a product or process across \(k\) factors, each taking one of \(n\) levels, with the goal of finding the optimal combination. An exhaustive test requires \(n^k\) experiments. An \(\mathrm{OA}(2, k, n)\) reduces this to \(n^2\) experiments while still estimating all main effects and two-way interactions. The orthogonality ensures that the effect of each factor can be estimated independently of the others — a property equivalent to the "balance" condition in 2-designs. The connection between statistical designs and combinatorial designs, pioneered by R.A. Fisher in the 1920s-1940s, is historically the origin of the entire field of combinatorial design theory.

Chapter 4: Hadamard Matrices

4.1 Definition and Basic Properties

Definition (Hadamard Matrix): An \(n \times n\) matrix \(H\) with entries in \(\{+1, -1\}\) is a Hadamard matrix if \[ H H^T = n I. \] Equivalently, the rows of \(H\) are pairwise orthogonal (viewed as vectors in \(\mathbb{R}^n\)).

The rows of \(H\) form an equiangular frame: they are \(n\) vectors of norm \(\sqrt{n}\) in \(\mathbb{R}^n\) with all pairwise inner products equal to zero. Hadamard matrices are of great practical importance in signal processing, coding theory, and quantum information.

Theorem (Necessary Condition for Hadamard Matrices): If a Hadamard matrix of order \(n > 2\) exists, then \(n \equiv 0 \pmod{4}\).
Proof. Consider any three rows \(r_1, r_2, r_3\) of \(H\). Each row has \(n\) entries \(\pm 1\). Classify the \(n\) columns into four types by the pattern of \(+1, -1\) in rows 1 and 2: let \(n_{++}, n_{+-}, n_{-+}, n_{--}\) be the counts. Orthogonality of rows 1, 2 gives \(n_{++} + n_{--} = n_{+-} + n_{-+} = n/2\). Orthogonality of rows 1, 3 and rows 2, 3 gives further constraints, and combining these with the fact that all four counts are non-negative integers forces \(4 \mid n\).

The Hadamard conjecture asserts that Hadamard matrices exist for all orders \(n \equiv 0 \pmod{4}\). This remains one of the major open problems in combinatorics. The smallest unresolved case was \(n = 668\) as of 2025.

Remark (Known Hadamard matrix orders and the state of the conjecture). The Hadamard conjecture has been verified for all \(n \leq 664\), \(n \equiv 0 \pmod 4\). Construction methods known to produce Hadamard matrices include:
  • Sylvester construction: all powers of 2, giving \(H_1, H_2, H_4, H_8, H_{16}, \ldots\)
  • Paley type I: \(H_{q+1}\) for prime powers \(q \equiv 3 \pmod 4\), covering \(n = 4, 8, 12, 20, 24, 28, 32, \ldots\)
  • Paley type II: \(H_{2(q+1)}\) for prime powers \(q \equiv 1 \pmod 4\), covering \(n = 12, 24, 36, \ldots\)
  • Kronecker products: if \(H_m\) and \(H_n\) exist, then \(H_{mn}\) exists, greatly extending coverage.
  • Direct constructions: by computer search or algebraic methods for specific small orders.
The order \(n = 668 = 4 \times 167\) requires either a new prime power construction (\(167 \equiv 3 \pmod 4\), so \(H_{168}\) would exist if 167 is a prime power — and 167 is indeed prime! So \(H_{168}\) exists by Paley Type I, but \(H_{668}\) requires a different construction since \(668/168\) is not an integer). Actually \(668 = 4 \times 167\), and \(167\) is prime with \(167 \equiv 3 \pmod 4\), so \(H_{168}\) exists. But to get \(H_{668}\) from \(H_{168}\), one would need a factor, which doesn't work directly. The difficulty of order 668 illustrates how rapidly the known constructions fail to cover new orders.

4.2 Constructions

Sylvester’s construction (1867) produces Hadamard matrices of all powers-of-2 orders.

Theorem (Sylvester / Kronecker Construction): If \(H\) is a Hadamard matrix, then so is the Kronecker product \[ H_2 \otimes H = \begin{pmatrix} H & H \\ H & -H \end{pmatrix}, \] where \(H_2 = \begin{pmatrix} 1 & 1 \\ 1 & -1 \end{pmatrix}\). Starting with \(H_1 = [1]\), this gives Hadamard matrices of orders \(1, 2, 4, 8, 16, \ldots\)

The resulting matrices are the Walsh–Hadamard matrices and are fundamental in signal processing (fast Walsh–Hadamard transform) and quantum computing (Hadamard gates).

Example (Constructing \(H_4\) from \(H_2\) via the Sylvester construction). The base matrix is \[ H_2 = \begin{pmatrix} +1 & +1 \\ +1 & -1 \end{pmatrix}. \] Applying the Kronecker construction \(H_4 = H_2 \otimes H_2 = \begin{pmatrix} H_2 & H_2 \\ H_2 & -H_2 \end{pmatrix}\) gives \[ H_4 = \begin{pmatrix} +1 & +1 & +1 & +1 \\ +1 & -1 & +1 & -1 \\ +1 & +1 & -1 & -1 \\ +1 & -1 & -1 & +1 \end{pmatrix}. \]

Let us verify orthogonality by computing all six dot products between distinct rows:

  • Rows 1 and 2: \((+1)(+1) + (+1)(-1) + (+1)(+1) + (+1)(-1) = 1 - 1 + 1 - 1 = 0\). \(\checkmark\)
  • Rows 1 and 3: \((+1)(+1) + (+1)(+1) + (+1)(-1) + (+1)(-1) = 1 + 1 - 1 - 1 = 0\). \(\checkmark\)
  • Rows 1 and 4: \((+1)(+1) + (+1)(-1) + (+1)(-1) + (+1)(+1) = 1 - 1 - 1 + 1 = 0\). \(\checkmark\)
  • Rows 2 and 3: \((+1)(+1) + (-1)(+1) + (+1)(-1) + (-1)(-1) = 1 - 1 - 1 + 1 = 0\). \(\checkmark\)
  • Rows 2 and 4: \((+1)(+1) + (-1)(-1) + (+1)(-1) + (-1)(+1) = 1 + 1 - 1 - 1 = 0\). \(\checkmark\)
  • Rows 3 and 4: \((+1)(+1) + (+1)(-1) + (-1)(-1) + (-1)(+1) = 1 - 1 + 1 - 1 = 0\). \(\checkmark\)
Each row has norm \(\sqrt{4} = 2\), and \(H_4 H_4^T = 4I\), confirming \(H_4\) is a Hadamard matrix of order 4.
Proof sketch (Necessity: \(4 \mid n\) for \(n > 2\)). Suppose \(H\) is a Hadamard matrix of order \(n > 2\). Consider any three distinct rows \(r_1, r_2, r_3 \in \{+1,-1\}^n\). Classify each column \(j\) by the pattern \((r_1(j), r_2(j)) \in \{+1,-1\}^2\), and let \(n_{++}, n_{+-}, n_{-+}, n_{--}\) be the counts of each type.

From the orthogonality conditions:

  • \(\langle r_1, r_1 \rangle = n\): trivially \(n_{++} + n_{+-} + n_{-+} + n_{--} = n\).
  • \(\langle r_1, r_2 \rangle = 0\): \((n_{++} + n_{-+}) - (n_{+-} + n_{--}) = 0\), so \(n_{++} + n_{-+} = n_{+-} + n_{--} = n/2\). Hence \(2 \mid n\).
Now apply \(\langle r_1, r_3 \rangle = 0\) and \(\langle r_2, r_3 \rangle = 0\) to get two more equations involving the behaviour of \(r_3\) on each of the four column types. Writing \(r_3(j) = +1\) on \(a\) of the \(n_{++}\) columns and \(-1\) on \(n_{++} - a\), and similarly for the other types, the orthogonality equations give a system whose solutions force \(n_{++} = n_{+-} = n_{-+} = n_{--} = n/4\). Since these must all be non-negative integers, we need \(4 \mid n\). \(\square\)
Remark (The Hadamard conjecture and applications). The Hadamard conjecture — that \(H_n\) exists whenever \(4 \mid n\) — remains open for infinitely many values of \(n\). The smallest unknown case was \(n = 668\) for decades; as of 2025 this case remains open. The Paley construction provides \(H_{q+1}\) for all prime powers \(q \equiv 3 \pmod{4}\), and the Sylvester construction gives all powers of 2. Together they cover many orders, but the problem remains wide open in general.

Hadamard matrices have striking applications in coding theory: the rows of a \(\pm 1\) Hadamard matrix of order \(n\) (after mapping \(+1 \mapsto 0\) and \(-1 \mapsto 1\)) give a binary code of length \(n\), size \(2n\), and minimum Hamming distance \(n/2\). This is the Hadamard code (or first-order Reed-Muller code), which achieves the Plotkin bound: for a binary code of length \(n\) and minimum distance \(d > n/2\), the code size is at most \(2\lfloor d/(2d-n) \rfloor\). Hadamard codes are also used in the Walsh-Hadamard transform, which underlies spectral analysis in signal processing and the design of CDMA (code-division multiple-access) communication systems.

The Paley construction, introduced by Raymond Paley in 1933, is the first non-trivial infinite family beyond powers of 2, and it reveals a deep connection between Hadamard matrices and number theory. The key observation is that the quadratic residues of a finite field \( \mathbb{F}_q \) split the nonzero elements into two equal halves — squares and non-squares — and this balanced partition automatically produces a matrix with the orthogonality properties needed for Hadamard. Heuristically: a Hadamard matrix needs every pair of distinct rows to agree on exactly half the columns and disagree on the other half; the Legendre symbol \( \chi(j-i) \) assigns \( \pm 1 \) to each pair according to whether their difference is a square in \( \mathbb{F}_q \), and the multiplicative structure of \( \mathbb{F}_q^* \) guarantees the required balance.

Theorem (Paley Construction): Let \(q\) be a prime power.
  • If \(q \equiv 3 \pmod{4}\), there exists a Hadamard matrix of order \(q + 1\).
  • If \(q \equiv 1 \pmod{4}\), there exists a Hadamard matrix of order \(2(q+1)\).

Construction. Let \(\chi: \mathbb{F}_q^* \to \{+1, -1\}\) be the quadratic character (Legendre symbol), extended by \(\chi(0) = 0\). Define the Paley matrix \(Q\) of order \(q\) by \(Q_{ij} = \chi(j - i)\) for \(i, j \in \mathbb{F}_q\). Then \(Q\) is a symmetric (resp. skew-symmetric) matrix for \(q \equiv 1\) (resp. \(\equiv 3\)) \(\pmod 4\), and satisfies \(QQ^T = qI - J\). The Hadamard matrix is then \[ H = I + \begin{pmatrix} 0 & \mathbf{1}^T \\ \mathbf{1} & Q \end{pmatrix} \] (with appropriate sign adjustments).
Example (Paley matrix for \(q = 7\)). We have \(q = 7 \equiv 3 \pmod{4}\), so the Paley construction gives a Hadamard matrix of order \(q + 1 = 8\). The quadratic residues mod 7 are \(QR = \{1, 2, 4\}\) (since \(1^2 = 1\), \(2^2 = 4\), \(3^2 = 2 \pmod{7}\)) and non-residues are \(NR = \{3, 5, 6\}\). The Legendre symbol \(\chi: \mathbb{F}_7^* \to \{+1, -1\}\) is \(\chi(a) = +1\) if \(a \in QR\) and \(\chi(a) = -1\) if \(a \in NR\), with \(\chi(0) = 0\).

The \(7 \times 7\) Paley matrix \(Q\) has entries \(Q_{ij} = \chi(j - i \bmod 7)\). The first row (for \(i = 0\)) is:

\[ Q_{0,j} = \chi(j): \quad \chi(0)=0,\, \chi(1)=+1,\, \chi(2)=+1,\, \chi(3)=-1,\, \chi(4)=+1,\, \chi(5)=-1,\, \chi(6)=-1. \]

So the first row is \((0, +, +, -, +, -, -)\). The full matrix is circulant: each subsequent row is a cyclic shift of the previous. One verifies that \(Q\) is skew-symmetric (\(Q^T = -Q\) for \(q \equiv 3 \pmod 4\)) and satisfies \(QQ^T = qI - J + J = 7I - J\) (using the identity \(\sum_{a \in \mathbb{F}_q^*} \chi(a)\chi(a+b) = -1\) for \(b \neq 0\)).

The Hadamard matrix of order 8 is then constructed as:

\[ H_8 = \begin{pmatrix} 1 & \mathbf{1}^T \\ \mathbf{1} & Q + I_7 \end{pmatrix} \]

(after replacing 0 entries in \(Q\) by \(+1\) along the diagonal). One checks \(H_8 H_8^T = 8I_8\).

Remark (Gauss sums and the orthogonality of Paley matrices). The key identity underlying the Paley construction is the Gauss sum evaluation: for a finite field \(\mathbb{F}_q\) with quadratic character \(\chi\) and \(b \neq 0\), \[ \sum_{a \in \mathbb{F}_q} \chi(a)\chi(a+b) = -1. \] This identity — that the quadratic character is "almost orthogonal to its shifts" — is precisely what forces \(QQ^T = qI - J\), which in turn produces the Hadamard orthogonality. The same Gauss sums appear in analytic number theory: the Gauss sum \(g(\chi) = \sum_{a \in \mathbb{F}_p} \chi(a) e^{2\pi i a/p}\) satisfies \(|g(\chi)|^2 = p\), a key fact used in Dirichlet's proof of quadratic reciprocity and in the analytic theory of Dirichlet \(L\)-functions. This reveals an unexpected bridge: the combinatorial orthogonality of Hadamard matrices constructed from finite fields rests on the same arithmetic of multiplicative characters that governs the distribution of prime numbers in arithmetic progressions.

The Paley and Sylvester constructions together give Hadamard matrices of many orders. Various tensor product and “doubling” constructions extend the range further.

4.3 Hadamard Designs

One of the most important connections between Hadamard matrices and block designs is the following construction.

Definition (Hadamard Design): Let \(H\) be a normalised Hadamard matrix of order \(4t\) (i.e., the first row and column consist entirely of \(+1\)). Delete the first row and column to obtain a \((4t-1) \times (4t-1)\) matrix \(H'\). Define an incidence structure on \(4t-1\) points and \(2(4t-1)\) blocks, where each column of \(H'\) and its complement contribute two blocks. The resulting structure is a symmetric \(2\)-(4t-1, 2t-1, t-1) design, called a Hadamard design.
Theorem (Hadamard Designs are Symmetric 2-Designs): The construction above yields a symmetric \(2\)-(4t-1, 2t-1, t-1) design. Its parameters satisfy \(k - \lambda = t - (t-1) = 1\) (wait: \(k - \lambda = (2t-1) - (t-1) = t\)), and the design has \(v = b = 4t - 1\).

The Fano plane arises as the Hadamard design from \(H_8\) (the \(8 \times 8\) Walsh–Hadamard matrix). The Hadamard 3-designs are the closely related \(3\)-(4t, 2t, t-1) designs obtained from the full \(4t \times 4t\) Hadamard matrix.

Hadamard matrices and their associated designs are deeply connected to coding theory: the rows of a Hadamard matrix encode the codewords of a first-order Reed–Muller code, which achieves the best possible rate-distance trade-off for a binary code meeting the Plotkin bound.


Chapter 5: t-Designs and the Witt Designs

Everything in Chapters 1–4 dealt primarily with 2-designs (\( t = 2 \)) — structures where every pair of points appears in \( \lambda \) common blocks. These are already rich and difficult to classify. The natural generalization asks: what if every \( t \)-subset of points is covered exactly \( \lambda \) times? For \( t \geq 3 \), existence becomes dramatically more constrained and the known examples are far rarer. The most celebrated such examples are the Witt designs: the unique 4-(23, 7, 1) and 5-(24, 8, 1) designs, and their relatives, discovered by Ernst Witt in 1938. These designs are not just combinatorial curiosities — their automorphism groups are the Mathieu groups \( M_{22}, M_{23}, M_{24} \), the smallest of the 26 sporadic simple groups. The Witt designs thus sit at the intersection of combinatorial design theory and the classification of finite simple groups, making Chapter 5 a meeting point between the combinatorics of blocks and the deepest reaches of group theory.

5.1 Existence Questions for t-Designs

For \(t \geq 3\), the existence of \(t\)-designs with small \(\lambda\) is a delicate question. The necessary divisibility conditions for a \(t\)-(v, k, \lambda) design are that for each \(0 \leq s \leq t\),

\[ \lambda_s = \lambda \cdot \frac{\binom{v-s}{t-s}}{\binom{k-s}{t-s}} \in \mathbb{Z}_{>0}. \]

For a long time, only finitely many non-trivial \(t\)-designs with \(t \geq 6\) and \(\lambda = 1\) were known. Wilson’s theorem resolved the asymptotic question completely.

Theorem (Wilson's Existence Theorem, 1975): For fixed \(t\), \(k\), and \(\lambda\), and for all sufficiently large \(v\) satisfying the necessary divisibility conditions, there exists a \(t\)-(v, k, \lambda) design.
Proof idea. Wilson's proof constructs designs from difference families in \(\mathbb{Z}_v\) and uses algebraic methods to show the required structures exist for large \(v\). The key ingredient is the "PBD-closure" machinery: if \(v\) is large enough and admissible, one can decompose \(\binom{P}{t}\) (the collection of all \(t\)-subsets of a \(v\)-set) into blocks of size \(k\).

Wilson’s theorem is one of the great achievements of combinatorics. However, it is existential and gives no bound on “sufficiently large.” The quest for small \(t\)-designs, especially with \(t \geq 5\) and small \(v\), requires very different techniques.

Remark (Keevash's probabilistic existence theorem for designs). Wilson's theorem (1975) settled the existence of \(t\)-designs for large \(v\) via algebraic methods. For four decades, the question "for which \((t,k,\lambda,v)\) do designs exist?" remained open for moderate \(v\). In 2014, Peter Keevash proved — using a powerful probabilistic method called "randomised algebraic constructions" — that for any fixed \(t, k, \lambda\), a \(t\)-(v,k,\lambda) design exists for all sufficiently large \(v\) satisfying the necessary divisibility conditions. Keevash's proof combines three ingredients:
  1. A nibble (random greedy hypergraph matching) to find an approximate design,
  2. An absorption step to convert the approximate design to an exact one,
  3. Algebraic structure (group theory over \(\mathbb{Z}_v\) or \(\mathbb{F}_q^m\)) to ensure the divisibility conditions are met.
The "nibble" method — randomly and greedily including hyperedges while maintaining feasibility — was pioneered by Rödl (1985) and is now a standard tool. Keevash's theorem resolved Steiner's 1853 conjecture (that Steiner systems \(S(t,k,v)\) exist whenever the divisibility conditions hold) and is one of the most celebrated results in combinatorics of the past decade.
Example (Steiner systems for large \(v\)). For the parameters \(S(5, 6, v)\) (so \(t = 5\), \(k = 6\), \(\lambda = 1\)): the divisibility conditions require \(\lambda_s = \binom{v-s}{5-s}/\binom{6-s}{5-s}\) to be a positive integer for \(s = 0,1,2,3,4,5\). For \(s=5\): \(\lambda_5 = 1\). For \(s=4\): \(\lambda_4 = (v-4)/1 = v-4\) — always an integer. For \(s=3\): \(\lambda_3 = (v-3)(v-4)/6\) — requires \(6 \mid (v-3)(v-4)\). For \(s=2\): \(\lambda_2 = (v-2)(v-3)(v-4)/60\) — requires \(60 \mid \prod_3 \text{ consecutive}\). These conditions are satisfied whenever \(v \equiv 1\) or \(3 \pmod{6}\) and additionally \(v \equiv 3\) or \(5 \pmod{20}\), giving the admissible residues: \(v \equiv 3\) or \(23 \pmod{60}\). For \(v = 12\), we get \(\mathcal{W}_{12}\) (the unique \(S(5,6,12)\)). For \(v = 72\) (next admissible value after 12), Keevash's theorem guarantees existence but an explicit construction is much harder.

5.2 Derived and Residual Designs

Two operations on \(t\)-designs produce designs with smaller parameters.

Definition (Derived and Residual Designs): Let \(\mathcal{D}\) be a \(t\)-(v, k, \lambda) design.
  • Fix a point \(p \in P\). The derived design \(\mathcal{D}_p\) has point set \(P \setminus \{p\}\) and blocks \(\{B \setminus \{p\} : p \in B\}\). This is a \((t-1)\)-(v-1, k-1, \lambda) design.
  • The residual design \(\mathcal{D}^p\) has point set \(P \setminus \{p\}\) and blocks \(\{B : p \notin B\}\). This is a \((t-1)\)-(v-1, k, \lambda_{t-1} - \lambda) design.

These operations are key in proving uniqueness of designs: one shows that the derived and residual designs are unique (by induction on \(t\) or \(v\)), and then patches them together.

Example (Deriving \(\mathcal{W}_{23}\) from \(\mathcal{W}_{24}\)). Fix any point \(p\) in the 24-point set of \(\mathcal{W}_{24}\). The derived design \((\mathcal{W}_{24})_p\) has:
  • Points: \(24 - 1 = 23\) points (all but \(p\)),
  • Blocks: octads of \(\mathcal{W}_{24}\) containing \(p\), each reduced by \(p\); each such octad becomes a 7-subset of the 23 remaining points,
  • Number of blocks: \(\lambda_1 = 759 \times 8/24 = 253\) blocks (each of the 759 octads contains \(8\) points; the replication number \(r = \lambda_1\) for \(\mathcal{W}_{24}\) as a \(1\)-design is \(759 \times 8/24 = 253\)),
  • Design parameters: every 4-subset of the 23 remaining points is covered \(\lambda = 1\) time, so the derived design is a \(4\)-(23, 7, 1) design — which is \(\mathcal{W}_{23}\).
The residual design \((\mathcal{W}_{24})^p\) consists of the 759 - 253 = 506 octads not containing \(p\), viewed as 8-subsets of 23 points. Every 4-subset of these 23 points appears in \(\lambda_{4} - \lambda = \lambda_4(\mathcal{W}_{24}) - 1\) blocks of the residual (where \(\lambda_4(\mathcal{W}_{24}) = 1\) is the number of octads through any 4 given points including \(p\)). So the residual is a \(4\)-(23, 8, \lambda)\) design. Computing: \(\lambda_4(\mathcal{W}_{24}) - 1 = 1\), so the residual is a \(3\)-(23, 8, \ldots)\) design (reducing the \(t\) parameter). The chain of derived designs ultimately connects all Witt designs to each other.

5.3 The Witt Designs

The most celebrated \(t\)-designs are the Witt designs, discovered by Ernst Witt in 1938. They are the unique \(5\)-designs with the parameters given below, and their automorphism groups are the Mathieu groups — some of the smallest and most mysterious sporadic simple groups.

Definition (Large Witt Design): The large Witt design \(\mathcal{W}_{24}\) is the unique \(5\)-(24, 8, 1) design. It has \[ b = \frac{\binom{24}{5}}{\binom{8}{5}} = \frac{42504}{56} = 759 \] blocks, called octads. Its automorphism group is the Mathieu group \(M_{24}\), a simple group of order \(244{,}823{,}040\).
Definition (Small Witt Design): The small Witt design \(\mathcal{W}_{12}\) is the unique \(5\)-(12, 6, 1) design. It has \[ b = \frac{\binom{12}{5}}{\binom{6}{5}} = \frac{792}{6} = 132 \] blocks. Its automorphism group is the Mathieu group \(M_{12}\), a simple group of order \(95{,}040\).
Example (\(\mathcal{W}_{12}\) and the ternary Golay code). The small Witt design \(\mathcal{W}_{12}\) can be constructed from the extended ternary Golay code \(\mathcal{C}_{12}\), a \([12, 6, 6]_3\) code — a self-dual linear code over \(\mathbb{F}_3\) with length 12, dimension 6, and minimum weight 6. The code \(\mathcal{C}_{12}\) has exactly \(3^6 = 729\) codewords total. Among these, the weight distribution is:
  • 1 codeword of weight 0 (the zero vector),
  • 264 codewords of weight 6,
  • 440 codewords of weight 9,
  • 24 codewords of weight 12.
The 264 codewords of weight 6 come in complementary pairs: if \(\mathbf{c}\) is a weight-6 codeword, so is \(-\mathbf{c}\) (over \(\mathbb{F}_3\), negation maps \(1 \leftrightarrow 2\) and fixes 0). Each pair \(\{\mathbf{c}, -\mathbf{c}\}\) has the same support (the 6 non-zero coordinates), giving \(264/2 = 132\) distinct 6-element subsets of \(\{1, \ldots, 12\}\). These 132 subsets are exactly the blocks of \(\mathcal{W}_{12}\). To verify the \(5\)-(12, 6, 1) property: for any 5-element set \(T \subseteq \{1,\ldots,12\}\), exactly one codeword pair has \(T\) in its support (equivalently, there is exactly one block of \(\mathcal{W}_{12}\) containing \(T\)), which follows from the minimum distance being 6 and the self-dual structure of \(\mathcal{C}_{12}\).
Remark (Mathieu groups and sporadic simple groups). Émile Léonard Mathieu discovered the groups \(M_{11}\) and \(M_{12}\) in 1861 and \(M_{22}\), \(M_{23}\), \(M_{24}\) in 1873 — long before group theory had a systematic theory of simple groups. For nearly a century they appeared as isolated curiosities with no apparent reason to exist. The Classification of Finite Simple Groups (CFSG), completed around 2004 after work by hundreds of mathematicians over 50 years, revealed their place: there are exactly 26 sporadic simple groups (simple groups that do not belong to any of the infinite families — cyclic groups of prime order, alternating groups, and groups of Lie type). The five Mathieu groups are the smallest sporadic groups.

The Witt designs provide the geometric foundation for three of the five:

  • \(M_{22}\) is the automorphism group of the unique \(3\)-(22, 6, 1) design (derived from \(\mathcal{W}_{24}\) by fixing two points).
  • \(M_{23}\) is the automorphism group of the unique \(4\)-(23, 7, 1) design (derived from \(\mathcal{W}_{24}\) by fixing one point).
  • \(M_{24}\) is the automorphism group of \(\mathcal{W}_{24}\) itself.
The largest sporadic group — the Monster \(\mathbb{M}\) — has order approximately \(8 \times 10^{53}\), and contains 19 of the 26 sporadic groups as subgroups or quotients of subgroups. The Witt designs thus stand at the bottom of a hierarchy whose top is the Monster, one of the deepest objects in modern mathematics.
Theorem (Uniqueness of \(\mathcal{W}_{23}\)). Up to isomorphism, there is a unique \(4\)-(23, 7, 1) design.
Proof sketch. The key is to analyse the derived and residual designs. Suppose \(\mathcal{D}\) is any \(4\)-(23, 7, 1) design. Fix a point \(p\). The derived design \(\mathcal{D}_p\) is a \(3\)-(22, 6, 1) design. One shows (using Fisher-type bounds and the arithmetic of the parameters) that any \(3\)-(22, 6, 1) design is unique — it must be the design associated with the Mathieu group \(M_{22}\) acting on 22 points. The residual \(\mathcal{D}^p\) is a \(3\)-(22, 7, 4) design, also uniquely determined. Since both the derived and residual designs are uniquely determined, and the original design is reconstructed from them by specifying which blocks contain \(p\), one shows the gluing is unique: any \(4\)-(23, 7, 1) design is isomorphic to the design derived from \(\mathcal{W}_{24}\) by fixing one point. Hence \(\mathcal{W}_{23}\) is unique. \(\square\)
Example (Construction of \(\mathcal{W}_{24}\) via the Binary Golay Code): The extended binary Golay code \(\mathcal{G}_{24}\) is a \([24, 12, 8]\) binary linear code — a self-dual code with minimum weight 8. Its 759 codewords of weight 8 form the octads of \(\mathcal{W}_{24}\). The Golay code can be constructed as the span (over \(\mathbb{F}_2\)) of the rows of a \(12 \times 24\) generator matrix built from the Paley matrix of order 11.

The uniqueness of \(\mathcal{W}_{24}\) (proved by Witt) uses the derived/residual technique: one shows that derived designs at each step are unique, ultimately reducing to the uniqueness of the Fano plane. This chain of uniqueness results is a beautiful exercise in design theory.

The octads of \(\mathcal{W}_{24}\) encode deep structure: the Leech lattice \(\Lambda_{24}\) (the densest known sphere packing in \(\mathbb{R}^{24}\)) can be constructed from \(\mathcal{G}_{24}\), and the automorphism group of \(\Lambda_{24}\) is the Conway group \(Co_0\), which contains \(M_{24}\) as a subgroup.

Remark (The Golay code and error correction). The binary Golay code \(\mathcal{G}_{24}\) is one of the most remarkable error-correcting codes ever found. As a \([24, 12, 8]\) code, it corrects any 3-bit errors in a 24-bit block (since minimum distance 8 means error patterns of weight \(\leq 3\) are correctable). Its rate is \(1/2\) (12 information bits per 24 transmitted), and it meets the Hamming (sphere-packing) bound: \(|\mathcal{G}_{24}| \cdot \sum_{i=0}^{3}\binom{24}{i} = 2^{12} \cdot (1 + 24 + 276 + 2024) = 4096 \times 2325\). The total is \(4096 \times 2325 \approx 9.5 \times 10^6 < 2^{24} = 16{,}777{,}216\). So the code does not meet the Hamming bound — it is not a perfect code. However, the ternary Golay code \(\mathcal{C}_{12}\) over \(\mathbb{F}_3\) is perfect: \(3^6 \cdot (1 + 2\times 12 + 4\times 66) = 729 \times 289 = 210{,}681 = 3^{11}\). So \(\mathcal{C}_{12}\) is a perfect 2-error-correcting ternary code. The Witt design \(\mathcal{W}_{12}\) is thus the "support design" of the only perfect ternary linear code beyond the trivial repetition codes and Hamming codes.
Example (Decoding in the binary Golay code). Suppose a 24-bit codeword is transmitted and at most 3 bits are flipped. The received word \(r\) lies at Hamming distance \(\leq 3\) from a unique codeword \(c \in \mathcal{G}_{24}\). To decode: compute the syndrome \(s = Hr \in \mathbb{F}_2^{12}\) (where \(H\) is the \(12 \times 24\) parity check matrix). If \(\mathrm{wt}(s) \leq 3\), the error pattern was in the first 12 positions. Otherwise, cycle through the 24 columns of \(H\): for each column \(h_i\), compute \(\mathrm{wt}(s + h_i)\); if this is \(\leq 2\), the error includes position \(i\) and the remaining errors are in the first 12 positions. This process (a form of Berlekamp's algorithm) corrects all 3-error patterns in polynomial time, using the structure of \(\mathcal{G}_{24}\) and the Witt design.
DesignParametersBlocksAutomorphism Group
\(\mathcal{W}_{12}\)\(5\)-(12, 6, 1)132\(M_{12}\)
\(\mathcal{W}_{24}\)\(5\)-(24, 8, 1)759\(M_{24}\)

5.4 Uniqueness and the Mathieu Groups

The Mathieu groups \(M_{11}, M_{12}, M_{22}, M_{23}, M_{24}\) were discovered by Émile Léonard Mathieu in 1861 and 1873 — the first sporadic simple groups to be found. Their rediscovery via the Witt designs in 1938 placed them on a firm combinatorial foundation.

Theorem (Uniqueness of the Witt Designs): Up to isomorphism, there is a unique \(5\)-(24, 8, 1) design and a unique \(5\)-(12, 6, 1) design.
Proof sketch for \(\mathcal{W}_{24}\). Any \(5\)-(24, 8, 1) design \(\mathcal{D}\) has a derived design \(\mathcal{D}_p\), which is a \(4\)-(23, 7, 1) design. One shows this derived design is unique (it is the unique \(4\)-(23, 7, 1) design, associated with \(M_{23}\)). Then the residual of \(\mathcal{D}_p\) is a \(3\)-(22, 6, 1) design (associated with \(M_{22}\)), also unique. Knowing the derived design determines \(\mathcal{D}\) uniquely.

Chapter 6: Association Schemes and Distance-Regular Graphs

6.1 Association Schemes

Association schemes provide a unified algebraic framework for studying distance-regular graphs, strongly regular graphs, and many families of combinatorial designs. The concept was introduced by Bose and Shimamoto (1952) in the context of statistical design of experiments.

Definition (Association Scheme): An association scheme with \(d\) classes on a finite set \(X\) (with \(|X| = n\)) is a partition of \(X \times X\) into relations \(R_0, R_1, \ldots, R_d\) satisfying:
  1. \(R_0 = \{(x,x) : x \in X\}\) is the diagonal.
  2. For each \(i\), if \((x,y) \in R_i\) then \((y,x) \in R_i\) (symmetry).
  3. For each \(i, j, k\), the number \[ p^k_{ij} = |\{z \in X : (x,z) \in R_i \text{ and } (z,y) \in R_j\}| \] is constant over all \((x,y) \in R_k\). These are the intersection numbers (or Krein parameters).

The integers \(p^k_{ij}\) are the structure constants of the scheme. Notice \(p^0_{ij} = 0\) unless \(j = i\) (the “transpose” relation), and \(p^k_{00} = \delta_{0k}\).

Example (The Johnson scheme \(J(v,k)\)). Let \(X\) be the set of all \(k\)-element subsets of a fixed \(v\)-element ground set \(\Omega\), so \(|X| = \binom{v}{k}\). Define the relation \(R_i\) by: \((A, B) \in R_i\) if and only if \(|A \cap B| = k - i\) (equivalently, \(|A \triangle B| = 2i\)). This gives \(d = k\) classes (for \(i = 0, 1, \ldots, k\)).

Let us verify the axioms for the smallest non-trivial example, \(J(4,2)\). Here \(X\) consists of the \(\binom{4}{2} = 6\) two-element subsets of \(\{1,2,3,4\}\): \(\{12, 13, 14, 23, 24, 34\}\) (abbreviating \(\{a,b\}\) as \(ab\)). The three associate classes are:

  • \(R_0\): each set paired with itself (identity). Valency \(k_0 = 1\).
  • \(R_1\): pairs sharing exactly 1 element (\(|A \cap B| = 1\)). Each 2-subset \(A\) shares one element with \(2(v-k) = 4\) other 2-subsets. Valency \(k_1 = 4\).
  • \(R_2\): disjoint pairs (\(|A \cap B| = 0\)). Each 2-subset is disjoint from exactly \(\binom{v-k}{k} = \binom{2}{2} = 1\) other 2-subset. Valency \(k_2 = 1\).
Check: \(k_0 + k_1 + k_2 = 1 + 4 + 1 = 6 = |X|\). \(\checkmark\)

The intersection numbers \(p^2_{11}\) (the number of \(C\) such that \(|A \cap C| = |B \cap C| = 1\), given \(|A \cap B| = 1\)) can be computed as follows: with \(A = \{1,2\}\) and \(B = \{1,3\}\), we need \(C\) sharing exactly one element with each. The sets are: \(\{1,4\}\) (shares 1 with both, so \(|A \cap C| = 1\) and \(|B \cap C| = 1\)), \(\{2,3\}\) (shares 1 element with each), \(\{2,4\}\) (shares \(\{2\}\) with \(A\) and nothing with \(B\), so not counted), and so on. One finds \(p^2_{11} = 2\). All such intersection numbers for \(J(4,2)\) are determined by the scheme’s parameters and are tabulated as part of its structure.

Remark (Association schemes and coding theory via the Hamming scheme). The Hamming scheme \(H(n,q)\) is the association scheme on \(X = \{0,1,\ldots,q-1\}^n\) (all words of length \(n\) over an alphabet of size \(q\)), with \((A,B) \in R_i\) iff the Hamming distance \(d_H(A,B) = i\). This is a \(d = n\)-class scheme with \(|X| = q^n\).

The power of the association scheme framework for coding theory comes from the Delsarte LP bound (also called the linear programming bound): a binary code \(C \subseteq \{0,1\}^n\) with minimum distance \(\geq d\) has size at most the optimal value of a linear program whose constraints are encoded in the \(Q\)-matrix of the scheme. Specifically, the inner distribution \((a_0, a_1, \ldots, a_n)\) of \(C\) (where \(a_i = |C|^{-1} |\{(x,y) \in C^2 : d_H(x,y)=i\}|\)) satisfies \(\sum_j Q_{ij} a_j \geq 0\) for all \(i\), and \(a_i = 0\) for \(1 \leq i < d\). Optimising \(|C| = \sum_i k_i a_i\) subject to these constraints gives the LP bound. This recovers and strengthens classical bounds: the Hamming bound, the Singleton bound, and the Plotkin bound all follow as special cases. The dual of the LP bound gives the Fisher/Ray-Chaudhuri-Wilson type lower bounds on the number of codewords at each distance — closing a beautiful loop between the design-theoretic and coding-theoretic sides of the subject.

6.2 The Bose–Mesner Algebra

The power of association schemes lies in their associated matrix algebra.

Definition (Bose–Mesner Algebra): Let \(A_i\) be the \(n \times n\) 0-1 adjacency matrix of relation \(R_i\): \((A_i)_{xy} = 1\) iff \((x,y) \in R_i\). The Bose–Mesner algebra is the algebra \(\mathcal{A} = \mathrm{span}(A_0, A_1, \ldots, A_d)\). It satisfies:
  • \(A_i A_j = \sum_k p^k_{ij} A_k\) (by definition of intersection numbers),
  • \(\sum_i A_i = J\) (the all-ones matrix),
  • \(A_i^T = A_i\) for all \(i\),
  • The \(A_i\) are simultaneously diagonalisable over \(\mathbb{R}\).

The Bose–Mesner algebra has a second distinguished basis: the minimal idempotents \(E_0, E_1, \ldots, E_d\), which satisfy \(E_i E_j = \delta_{ij} E_i\) and \(\sum_i E_i = I\). The change-of-basis matrices between \(\{A_i\}\) and \(\{E_j\}\) are the eigenvalue matrix \(P\) and its Krein-dual \(Q\):

\[ A_i = \sum_j P_{ji} E_j, \qquad n E_j = \sum_i Q_{ij} A_i. \]

The matrices \(P\) and \(Q\) play dual roles in the theory. The Delsarte linear programming bound uses \(Q\) to bound the size of codes and cliques in schemes.

Example (Bose-Mesner algebra of the Johnson scheme \(J(4,2)\)). Recall from our earlier example that \(J(4,2)\) has 6 points and 3 classes with valencies \(k_0 = 1, k_1 = 4, k_2 = 1\). The adjacency matrices are:
  • \(A_0 = I_6\) (identity),
  • \(A_1\): the \(6 \times 6\) 0-1 matrix where \((A_1)_{AB} = 1\) iff \(|A \cap B| = 1\) (adjacent pairs sharing one element),
  • \(A_2\): the \(6 \times 6\) 0-1 matrix where \((A_2)_{AB} = 1\) iff \(|A \cap B| = 0\) (the perfect matching — each 2-subset paired with its complement).
The eigenvalue matrix \(P\) for \(J(4,2)\) has eigenvalues: the three eigenvalues of \(A_1\) are \(4\) (with eigenvector \(\mathbf{1}\)), \(1\) (with multiplicity 3, corresponding to functions constant on distance classes), and \(-2\) (with multiplicity 2). These can be read from the Krawtchouk polynomials \(K_j(i; 4, 2)\): \[ P = \begin{pmatrix} 1 & 4 & 1 \\ 1 & 1 & -2 \\ 1 & -2 & 1 \end{pmatrix} \]

(rows indexed by eigenspace, columns by associate class). The \(Q\)-matrix is \(Q = (n/k_j) P^{-T}\) up to scaling. For the Johnson scheme, \(Q\) is closely related to the Eberlein polynomials — the dual Krawtchouk polynomials — and encodes the LP bound constraints for codes in \(J(4,2)\).

Remark (The Krein conditions and \(Q\)-polynomial schemes). Beyond the LP bound, the Bose-Mesner algebra satisfies the Krein conditions: the Hadamard (entrywise) product of the minimal idempotents \(E_i \circ E_j = \sum_k q^k_{ij} E_k\) must have non-negative Krein parameters \(q^k_{ij} \geq 0\). These are necessary conditions for the existence of an association scheme (and hence of a design realising those parameters) that go beyond the LP bound. A scheme is \(Q\)-polynomial if the \(Q\)-matrix has a specific tri-diagonal (or polynomial) structure — the dual analogue of distance-regularity. The Johnson scheme, Hamming scheme, and Grassmann scheme are all \(Q\)-polynomial, which is why the Delsarte LP bound is especially tight for codes in these schemes. The Krein conditions for \(Q\)-polynomial schemes give the strongest known necessary conditions for the existence of association schemes, equiangular tight frames, and SIC-POVMs.

6.3 Strongly Regular Graphs

The simplest non-trivial association schemes have \(d = 2\).

Definition (Strongly Regular Graph): A strongly regular graph \(\mathrm{srg}(n, k, \lambda, \mu)\) is a graph on \(n\) vertices that is \(k\)-regular, with the property that any two adjacent vertices have exactly \(\lambda\) common neighbours, and any two non-adjacent vertices have exactly \(\mu\) common neighbours. It corresponds to a 2-class association scheme.
Example (Petersen Graph): The Petersen graph is \(\mathrm{srg}(10, 3, 0, 1)\): 10 vertices, 3-regular, adjacent pairs share 0 common neighbours, non-adjacent pairs share exactly 1. It is the Kneser graph \(K(5,2)\) (vertices are 2-subsets of a 5-set, adjacent if disjoint).

The adjacency matrix of an \(\mathrm{srg}(n,k,\lambda,\mu)\) satisfies the polynomial identity \(A^2 = kI + \lambda A + \mu(J - I - A)\), giving three eigenvalues \(k\) and \(r, s = \frac{(\lambda - \mu) \pm \sqrt{(\lambda-\mu)^2 + 4(k-\mu)}}{2}\).

Theorem (Integrality and Krein conditions for SRGs): For a strongly regular graph \(\mathrm{srg}(n, k, \lambda, \mu)\) to exist, the following necessary conditions must hold:
  • Integrality: either \((\lambda - \mu)^2 + 4(k - \mu)\) is a perfect square, or the multiplicities of the eigenvalues \(r\) and \(s\) are both equal to \((n-1)/2\) (the "conference graph" case, requiring \(n \equiv 1 \pmod 4\)).
  • Krein conditions: a set of polynomial inequalities involving \(n, k, \lambda, \mu\) derived from the fact that the Hadamard product of two positive semidefinite matrices is positive semidefinite (applied to the Bose–Mesner algebra).
  • Absolute bound: \(n \leq \frac{1}{2}(f+2)(f+1)\) where \(f\) is the multiplicity of the smallest eigenvalue.
Example (Strongly regular graphs from symmetric designs). The point graph of a symmetric \((v,k,\lambda)\)-design \(\mathcal{D}\) — where two points are adjacent if they appear together in at least one block — is a strongly regular graph if \(\mathcal{D}\) has the "two-intersection property." More directly: the collinearity graph of the Petersen graph as the Kneser graph \(K(5,2)\) gives \(\mathrm{srg}(10,3,0,1)\). The Paley graph on \(q\) vertices (where \(q \equiv 1 \pmod 4\) is a prime power) connects two vertices if their difference is a quadratic residue; this gives \(\mathrm{srg}(q, (q-1)/2, (q-5)/4, (q-1)/4)\).

For \(q = 13\) (Paley graph on 13 vertices): \(\mathrm{srg}(13, 6, 2, 3)\). Verify: \(n = 13\), \(k = 6\), \(\lambda = 2\) (two common neighbours for adjacent vertices), \(\mu = 3\) (three for non-adjacent). Check integrality: \((\lambda-\mu)^2 + 4(k-\mu) = (-1)^2 + 4 \times 3 = 13\). The eigenvalues are \((−1 \pm \sqrt{13})/2\) — irrational! This is the conference graph case: \(n = 13 \equiv 1 \pmod 4\), and the eigenvalue multiplicities are both \((13-1)/2 = 6\).

Remark (The Friendship theorem and SRGs). A beautiful application of the eigenvalue techniques for strongly regular graphs is the Friendship theorem (Erdős, Rényi, Sós 1966): if in a finite graph, any two vertices have exactly one common neighbour ("every pair of people has exactly one mutual friend"), then there is a vertex adjacent to all others ("a common friend of everyone"). The proof proceeds by supposing the graph is regular (it must be, by a counting argument), writing down the adjacency matrix equation \(A^2 = I + A \cdot J'\) (where the \(1\)'s correspond to the friendship condition), and deriving a contradiction unless one vertex is universal. The argument is purely eigenvalue-based and connects directly to the theory of strongly regular graphs.

6.4 Distance-Regular Graphs

Definition (Distance-Regular Graph): A connected graph \(\Gamma\) of diameter \(D\) is distance-regular if there exist non-negative integers \(b_i, c_i\) (for \(0 \leq i \leq D\)) such that for any vertices \(x, y\) with \(d(x, y) = i\), the number of neighbours of \(y\) at distance \(i-1\) from \(x\) is \(c_i\), and the number at distance \(i+1\) is \(b_i\). The sequence \(\{b_0, b_1, \ldots, b_{D-1}; c_1, c_2, \ldots, c_D\}\) is the intersection array.

Setting \(a_i = k - b_i - c_i\) (the number of neighbours at the same distance), we get \(A^2\) and higher powers of \(A\) expressible in terms of the tridiagonal recurrence given by the intersection array. This gives a \((D+1)\)-class association scheme.

Example (The Petersen graph as a distance-regular graph). The Petersen graph has diameter 2 and intersection array \(\{3, 2; 1, 1\}\): at distance 1 from any vertex, there are \(b_0 = 3\) neighbours (degree 3), and at distance 2, we go further from \(x\) to \(b_1 = 2\) vertices and return toward \(x\) via \(c_2 = 1\) vertex. The Petersen graph is the unique distance-regular graph with intersection array \(\{3,2;1,1\}\) and is also strongly regular \(\mathrm{srg}(10,3,0,1)\).

From the intersection array, the adjacency matrix \(A\) satisfies a polynomial relation: \(A^2 = 3I + 2(J-I-A) = 3I + 2J - 2I - 2A = I - 2A + 2J\). Hence \(A^2 + 2A - I = 2J\), so the minimal polynomial of \(A\) divides \(\det(xI - A - J) = ...\) — equivalently, the eigenvalues of \(A\) satisfy \(\lambda^2 + 2\lambda - 1 = 2v_J\) where \(v_J\) is the eigenvalue of \(J\). With \(J \mathbf{1} = 10 \mathbf{1}\) and \(J v = 0\) for \(v \perp \mathbf{1}\): eigenvalue \(\lambda = 3\) (for \(\mathbf{1}\)); for \(v \perp \mathbf{1}\): \(\lambda^2 + 2\lambda - 1 = 0\), giving \(\lambda = -1 \pm \sqrt{2}\). But the Petersen graph has eigenvalues \(3, 1, -2\) — let me recompute. From \(A^2 = I + \mu(J-I-A)\) (the SRG equation with \(\mu = 1\)): \(A^2 = I + J - I - A = J - A\). So \(A^2 + A = J\). Eigenvalue of \(J\) on \(\mathbf{1}\) is 10, so \(\lambda^2 + \lambda = 10\), giving \(\lambda = 3\). For \(v \perp \mathbf{1}\): \(\lambda^2 + \lambda = 0\), so \(\lambda = 0\) or \(\lambda = -1\). The Petersen graph has eigenvalues \(3\) (multiplicity 1), \(1\) (multiplicity 5), and \(-2\) (multiplicity 4). The discrepancy is because I confused \(\lambda_{SRG} = 0\) (adjacent common neighbours) — the SRG equation is \(A^2 = kI + \lambda_{srg} A + \mu(J - I - A)\) with \(k = 3, \lambda_{srg} = 0, \mu = 1\): \(A^2 = 3I + 0 + (J - I - A) = 2I + J - A\), giving \(A^2 + A - 2I = J\). Eigenvalues: for \(\mathbf{1}\): \(9 + 3 - 2 = 10 = 10\), \(\checkmark\). For \(v \perp \mathbf{1}\): \(\lambda^2 + \lambda - 2 = 0\), so \((\lambda+2)(\lambda-1) = 0\), giving \(\lambda \in \{-2, 1\}\). \(\checkmark\)

Remark (Classification of distance-regular graphs). The classification of all distance-regular graphs is a major achievement of algebraic combinatorics, completed around 2016 by Koornwinder, Bannai, Ito, and others for the cases of small valency, and extended to specific diameter ranges. The key result is: for fixed degree \(k \geq 3\) and large diameter \(D\), there are only finitely many distance-regular graphs (Bannai-Ito conjecture, proved by Damerell and Bannai-Ito). The known distance-regular graphs include the Johnson graphs, Hamming graphs, Petersen graph, Desargues graph, Icosahedron graph, and the collinearity graphs of various classical geometries. Their classification parallels and uses the classification of strongly regular graphs.
Example (Hamming and Johnson Graphs):
  • The Hamming graph \(H(d, n)\) has vertices the words in \(\{0,\ldots,n-1\}^d\), adjacent if they differ in exactly one coordinate. Its intersection array is \(\{d(n-1), (d-1)(n-1), \ldots; 1, 2, \ldots, d\}\).
  • The Johnson graph \(J(n, k)\) has vertices the \(k\)-subsets of an \(n\)-set, adjacent if their symmetric difference has size 2. Its intersection array is \(\{k(n-k), (k-1)(n-k-1), \ldots; 1, 4, \ldots\}\).

Distance-regular graphs arise as coset graphs of codes, orbital graphs of permutation groups, and geometries. The Delsarte–Goethals–Seidel bound on the size of codes in Johnson schemes connects designs to distance-regular graphs in a fundamental way.

Example (The \(q\)-analogue: Gaussian binomial coefficients and \(q\)-designs). The Johnson scheme \(J(v,k)\) has a \(q\)-analogue, the \(q\)-Johnson scheme or Grassmann scheme, where the role of \(k\)-subsets of a \(v\)-set is played by \(k\)-dimensional subspaces of \(\mathbb{F}_q^v\). The number of such subspaces is the Gaussian binomial coefficient \[ \binom{v}{k}_q = \frac{(q^v - 1)(q^{v-1}-1)\cdots(q^{v-k+1}-1)}{(q^k-1)(q^{k-1}-1)\cdots(q-1)}. \] Two subspaces \(U, W\) are \(i\)-th associates if \(\dim(U \cap W) = k - i\). This gives the Grassmann scheme with \(d = k\) classes, generalising the Johnson scheme (recovered at \(q \to 1\)). The Delsarte LP bound in the Grassmann scheme gives upper bounds on the size of "subspace codes" — sets of \(k\)-dimensional subspaces with minimum intersection dimension, a topic of intense recent interest in network coding.

6.5 Delsarte’s Linear Programming Bound

The Bose–Mesner algebra and the \(Q\)-matrix lead to Delsarte’s celebrated bound.

Theorem (Delsarte's LP Bound): Let \(\Gamma\) be a distance-regular graph with \(d\) classes and \(Q\)-matrix. Let \(C\) be a code (a subset of vertices) with distance set \(\mathcal{D} \subseteq \{1, \ldots, d\}\). Define the inner distribution \(a_i = |C|^{-1} |\{(x,y) \in C \times C : d(x,y) = i\}|\). Then \(\sum_j Q_{ij} a_j \geq 0\) for all \(i\), and optimising over all valid inner distributions gives an upper bound on \(|C|\).

Delsarte’s LP bound (1973) unified and improved previously known bounds on error-correcting codes, and its dual gives lower bounds on designs (the “Fisher-type” bound on the number of blocks, and later the absolute bound on equiangular lines). It is a cornerstone of algebraic combinatorics.

Example (Delsarte LP bound for binary codes). Consider binary codes of length \(n = 5\) and minimum distance \(d = 2\). The Hamming scheme \(H(5,2)\) has classes \(R_0, R_1, \ldots, R_5\) (by Hamming distance). The \(Q\)-matrix entries are the Krawtchouk polynomials \(K_j(i; 5, 2) = K_j(i)\). The Delsarte LP asks: maximise \(|C|\) subject to the inner distribution \((a_0, \ldots, a_5)\) satisfying \(\sum_j Q_{ij} a_j \geq 0\), \(a_0 = 1\), \(a_1 = 0\) (no two codewords at distance 1). The optimal solution gives \(|C| \leq 16 = 2^4\). Since the repetition code extended by a parity bit achieves \(|C| = 16\) with \(d = 2\) (the even-weight code), the bound is tight: the LP bound recovers the Plotkin bound for this case.

More explicitly, for \(n = 7\), \(d = 3\) (the Hamming code): the LP bound gives \(|C| \leq 16 = 2^{7-3}\). The \([7,4,3]\) Hamming code achieves this with 16 codewords. The LP bound is tight, confirming the Hamming code is optimal among all binary codes of length 7 and minimum distance 3.

Remark (Semidefinite programming bounds). The Delsarte LP bound has been strengthened by Schrijver (2005) and Bachoc-Vallentin (2008) using semidefinite programming (SDP). Instead of linear constraints from the \(Q\)-matrix, the SDP bound uses positive semidefinite constraints arising from the representation theory of the symmetric group (for codes) or the orthogonal group (for sphere packings). The SDP bound matches the LP bound for codes where the LP is already tight (Hamming codes, Golay codes), but gives improvements elsewhere. For the kissing number problem (maximum number of non-overlapping unit balls touching a central unit ball in \(\mathbb{R}^n\)), the SDP bound gives the exact answer in dimensions 1, 2, 3, 4, 8, and 24 — connecting sphere packing, design theory, and semidefinite programming in a spectacular unity.

Chapter 7: Lines, Spherical Designs, and Mutually Unbiased Bases

7.1 Equiangular Lines

Definition (Equiangular Lines): A set of lines \(\ell_1, \ldots, \ell_m\) through the origin in \(\mathbb{R}^d\) (or \(\mathbb{C}^d\)) is equiangular if there exists a constant \(\alpha \geq 0\) such that for any unit vectors \(u_i \in \ell_i\) and \(u_j \in \ell_j\) with \(i \neq j\), \[ |\langle u_i, u_j \rangle|^2 = \alpha. \] The common angle is \(\arccos(\sqrt{\alpha})\).

Sets of equiangular lines are equivalent to certain association schemes, and their study connects design theory to spectral graph theory and quantum information. The Gram matrix \(G_{ij} = \langle u_i, u_j \rangle\) (where we choose unit vectors \(u_i\) for each line, choosing the sign to make the Gram matrix as uniform as possible) satisfies a polynomial equation constraining the spectrum of \(G\), which in turn bounds \(m\).

Example (Equiangular lines in \(\mathbb{R}^2\)). In the plane \(\mathbb{R}^2\), a set of equiangular lines must have all pairwise angles equal to some common angle \(\theta = \arccos \alpha\). The maximum by the absolute bound is \(\binom{3}{2} = 3\) lines. Indeed, the three lines at angles \(0^\circ, 60^\circ, 120^\circ\) (or equivalently, the three diagonals of a regular hexagon) are equiangular with \(|\cos \theta| = 1/2\). One can check: any unit vector in each direction gives inner product \(\pm 1/2\) with any unit vector in another direction, so \(\alpha = 1/4\). These 3 lines achieve the bound \(\binom{d+1}{2} = 3\) for \(d = 2\).

In \(\mathbb{R}^3\), the maximum is \(\binom{4}{2} = 6\). Six equiangular lines in \(\mathbb{R}^3\) with angle \(\arccos(1/\sqrt{5})\) exist and correspond to the six faces of the icosahedron paired with their opposite faces (or equivalently, the 6 diagonals of the icosahedron). These lines are also related to the root system of the Lie algebra \(A_3\) (or equivalently \(D_3\)) after projectivisation.

Theorem (Relative bound on equiangular lines): Let \(\mathcal{L}\) be a set of \(m\) equiangular lines in \(\mathbb{R}^d\) with common angle \(\arccos \alpha\). Then \[ m \leq \frac{d(1 - \alpha^2)}{1 - d\alpha^2} \] provided \(d\alpha^2 < 1\). When \(d\alpha^2 \geq 1\) (or \(\alpha = 1/\sqrt{d}\)), the bound is vacuous and the absolute bound \(m \leq \binom{d+1}{2}\) applies.
Proof sketch. Choose unit vectors \(u_i \in \ell_i\) such that the Gram matrix \(G_{ij} = \langle u_i, u_j \rangle\) satisfies \(G_{ii} = 1\) and \(G_{ij} = \pm \alpha\) for \(i \neq j\). Define \(A = (G - I)/\alpha\); this is the signed adjacency matrix of a graph on \(m\) vertices. The matrix \(G = I + \alpha A\) has rank at most \(d\). Its eigenvalues are \(1 + \alpha \lambda_j\) where \(\lambda_j\) are eigenvalues of \(A\). Since \(\mathrm{rank}(G) \leq d < m\), we have \(1 + \alpha \lambda_j = 0\) for \(m - d\) eigenvalues, i.e., \(\lambda_j = -1/\alpha\) with multiplicity \(m - d\). Using \(\mathrm{tr}(A^2) = m(m-1)\alpha^2/\alpha^2\) and the eigenvalue sum, one derives the relative bound.
Theorem (Absolute Bound on Equiangular Lines): The maximum number of equiangular lines in \(\mathbb{R}^d\) is at most \(\binom{d+1}{2}\).
Proof. Each line \(\ell_i\) determines a rank-1 matrix \(u_i u_i^T \in \mathrm{Sym}^2(\mathbb{R}^d)\). The space of symmetric \(d \times d\) matrices has dimension \(\binom{d+1}{2}\). One shows the matrices \(u_i u_i^T\) are linearly independent (using the equiangularity condition and the Gram matrix argument), giving the bound.
Example (276 Equiangular Lines in \(\mathbb{R}^{23}\)): There exist 276 equiangular lines in \(\mathbb{R}^{23}\) with angle \(\arccos(1/5)\). This is the maximum: \(\binom{24}{2} = 276\). These lines are closely connected to the Leech lattice \(\Lambda_{24}\) and the Conway group. The 276 lines can be realised as the shortest vectors of \(\Lambda_{24}\) projected to a 23-dimensional subspace.

The problem of determining the maximum number of equiangular lines in \(\mathbb{R}^d\) for all \(d\) is currently active research. Bukh (2016) and Lin–Yu (2020) proved asymptotic bounds; the exact answer is known for small \(d\) and for specific infinite families.

Theorem (Jiang-Tidor-Yao-Zhang-Zhao 2021 — equiangular lines with fixed angle). For a fixed angle \(\alpha = 1/\alpha_0\) (with \(\alpha_0\) a positive odd integer), the maximum number of equiangular lines in \(\mathbb{R}^d\) with angle \(\arccos(\alpha)\) is \(\Theta(d)\) as \(d \to \infty\), with the precise asymptotic depending on \(\alpha_0\). Specifically, the maximum is \(\left\lfloor \frac{\alpha_0^2 - 1}{2} (d + (2\alpha_0^2 - 4)/(\alpha_0^2-1)) \right\rfloor\) for large enough \(d\) and \(\alpha_0\) odd.
Remark (Equiangular lines and spectral graph theory). The JTYZZ theorem uses a remarkable connection between equiangular lines and spectral graph theory. Given \(m\) equiangular lines in \(\mathbb{R}^d\) with angle \(\arccos(1/\alpha_0)\), define the signed adjacency matrix \(A\) with \(A_{ij} = \pm 1/\alpha_0\) (the inner product of the \(i\)th and \(j\)th line's unit vectors). The Gram matrix \(G = I + A\) is positive semidefinite of rank at most \(d\). The key innovation of the JTYZZ proof is to show that — for odd integer \(1/\alpha\) — the matrix \(A\) must be the adjacency matrix of a specific "friendship graph" or "cocktail party graph," using the interlacing theorem and a careful analysis of the spectral gaps. This reduces the combinatorial question to a spectral graph theory problem, which is then solved using the Seidel spectrum. The result demonstrates how combinatorial design theory (equiangular lines = ETFs = tight frames) and spectral graph theory are genuinely the same subject viewed from different angles.

7.2 Spherical Designs

Spherical designs generalise the notion of a design from finite sets to the unit sphere, providing a framework for numerical integration that is exact for polynomials up to a given degree.

Definition (Spherical \(t\)-Design): A finite set \(X \subseteq S^{d-1}\) (the unit sphere in \(\mathbb{R}^d\)) is a spherical \(t\)-design if for every polynomial \(f: \mathbb{R}^d \to \mathbb{R}\) of total degree at most \(t\), \[ \frac{1}{|X|} \sum_{x \in X} f(x) = \int_{S^{d-1}} f(u)\, d\sigma(u), \] where \(\sigma\) is the normalised surface measure on \(S^{d-1}\).

In other words, \(X\) is a spherical \(t\)-design if and only if the average of every harmonic polynomial of degree at most \(t\) over \(X\) is zero. This is the continuous analogue of the discrete uniformity condition in a \(t\)-design.

Theorem (Fisher-Type Bound for Spherical Designs): A spherical \(t\)-design on \(S^{d-1}\) with \(|X| = N\) satisfies \[ N \geq \binom{d + \lfloor t/2 \rfloor - 1}{\lfloor t/2 \rfloor} + \binom{d + \lfloor t/2 \rfloor - 2}{\lfloor t/2 \rfloor - 1}. \] A design achieving this bound is called tight.

Tight spherical designs are the analogues of Steiner systems in the spherical setting. They are rare and beautiful: examples include the vertices of the regular simplex (tight 2-design in \(S^{d-1}\)), the vertices of the regular icosahedron (tight 5-design in \(S^2\)), and the minimal vectors of the \(E_8\) lattice (a tight 7-design on \(S^7\) with 240 points).

Example (The icosahedron as a tight spherical 5-design). The regular icosahedron has 12 vertices on \(S^2 \subset \mathbb{R}^3\). These 12 points form a tight spherical 5-design: any polynomial \(f(x,y,z)\) of degree \(\leq 5\) satisfies \[ \frac{1}{12} \sum_{v \in \mathrm{vertices}} f(v) = \int_{S^2} f \, d\sigma. \] The icosahedron is tight for \(t = 5\), and the lower bound gives \(N \geq \binom{2 + 2}{2} + \binom{2+1}{1} = 6 + 3 = ... \) — actually applying the formula \(\binom{d + \lfloor t/2 \rfloor - 1}{\lfloor t/2 \rfloor} + \binom{d + \lfloor t/2 \rfloor - 2}{\lfloor t/2 \rfloor - 1}\) with \(d = 3\) (sphere in \(\mathbb{R}^3\)), \(t = 5\), \(\lfloor t/2 \rfloor = 2\): \(\binom{3+2-1}{2} + \binom{3+2-2}{1} = \binom{4}{2} + \binom{3}{1} = 6 + 3 = 9\). Since 12 \(>\) 9, the icosahedron is not tight by this formula — it is tight in a different sense (it achieves equality in the Delsarte bound for \(t = 5\)). Tight spherical designs in the Fisher-bound sense (achieving \(N = \) the minimum) are more constrained: they require the polynomial system to have no slack.
Remark (The \(E_8\) root system as a spherical design). The 240 minimal vectors of the \(E_8\) lattice lie on a sphere of radius \(\sqrt{2}\) in \(\mathbb{R}^8\) and form a tight spherical 7-design. Their inner products take values in \(\{-2, -1, 0, 1, 2\}\) (after normalisation to \(\|\mathbf{v}\|^2 = 2\)). The tight 7-design property means the 240 vectors integrate all polynomials up to degree 7 exactly. This is deeply connected to the Leech lattice in 24 dimensions (whose 196,560 minimal vectors form a tight 11-design on \(S^{23}\)), and to the sphere packing problem: \(E_8\) achieves the densest sphere packing in \(\mathbb{R}^8\) (proved by Viazovska 2016), and the proof uses the modular form properties of the \(E_8\) theta series — which are encoded in the tight spherical design structure.
Example (Vertices of the Regular Simplex): Place \(d+1\) vertices of a regular simplex on \(S^{d-1}\). This is a tight spherical 2-design: any polynomial of degree \(\leq 2\) integrates correctly. The \(d+1\) vertices form an equiangular set with \(|\langle u_i, u_j \rangle| = 1/d\).

7.3 Mutually Unbiased Bases

Mutually unbiased bases (MUBs) arise in quantum mechanics as measurement bases that are maximally incompatible: measuring in one basis gives no information about the outcome of measuring in the other.

Definition (Mutually Unbiased Bases): Two orthonormal bases \(\mathcal{B} = \{u_1, \ldots, u_d\}\) and \(\mathcal{C} = \{v_1, \ldots, v_d\}\) for \(\mathbb{C}^d\) are unbiased if \[ |\langle u_i, v_j \rangle|^2 = \frac{1}{d} \] for all \(i, j \in \{1, \ldots, d\}\). A collection of pairwise unbiased orthonormal bases is a set of mutually unbiased bases (MUBs).
Theorem (Bound on MUBs): In \(\mathbb{C}^d\), the maximum number of MUBs is at most \(d + 1\).
Proof. Consider the \(d^2 - 1\) traceless Hermitian matrices of unit Frobenius norm that are rank-1 projectors \(\{u_i u_i^* : u_i \in \mathcal{B}\} \setminus \{I/d\}\). Vectors from different MUBs are orthogonal in the Hilbert–Schmidt inner product (up to the identity), and there are \(d-1\) non-trivial projectors per basis. Since the traceless part of the space of Hermitian matrices has dimension \(d^2 - 1\), we can fit at most \((d^2-1)/(d-1) = d+1\) bases.
Theorem (MUBs from Prime Powers): If \(d = p^m\) is a prime power, then there exist \(d + 1\) MUBs in \(\mathbb{C}^d\).
Construction. Use the finite field \(\mathbb{F}_d\). Index the standard basis by \(\mathbb{F}_d\). For each \(a \in \mathbb{F}_d\), define the basis \(\mathcal{B}_a\) with vectors \[ v_s^{(a)} = \frac{1}{\sqrt{d}} \sum_{t \in \mathbb{F}_d} \omega^{\mathrm{tr}(at^2 + st)} e_t, \quad s \in \mathbb{F}_d, \] where \(\omega = e^{2\pi i/p}\) and \(\mathrm{tr}\) is the trace from \(\mathbb{F}_d\) to \(\mathbb{F}_p\). Together with the standard basis \(\mathcal{B}_\infty = \{e_t\}\), these give \(d + 1\) MUBs.

Whether \(d+1\) MUBs exist in \(\mathbb{C}^d\) for non-prime-power \(d\) is a major open question in quantum information theory. The smallest unresolved case is \(d = 6\): it is unknown whether 7 MUBs exist in \(\mathbb{C}^6\). Numerical and algebraic evidence strongly suggests the answer is no (only 3 MUBs are known), but no proof exists.

Example (MUBs in \(\mathbb{C}^2\) — the Bloch sphere picture). In \(\mathbb{C}^2\) (qubits), the maximum is \(d+1 = 3\) MUBs. Concretely:
  • \(\mathcal{B}_Z = \{\vert 0 \rangle, \vert 1 \rangle\}\) (the \(Z\)-eigenbasis / standard basis),
  • \(\mathcal{B}_X = \{\frac{1}{\sqrt{2}}(\vert 0 \rangle + \vert 1 \rangle), \frac{1}{\sqrt{2}}(\vert 0 \rangle - \vert 1 \rangle)\}\) (the Hadamard basis),
  • \(\mathcal{B}_Y = \{\frac{1}{\sqrt{2}}(\vert 0 \rangle + i\vert 1 \rangle), \frac{1}{\sqrt{2}}(\vert 0 \rangle - i\vert 1 \rangle)\}\) (the \(Y\)-eigenbasis).
Verify: \(|\langle 0 | (+) \rangle|^2 = |1/\sqrt{2}|^2 = 1/2 = 1/d\). \(\checkmark\) The three bases correspond to the three pairs of antipodal points on the Bloch sphere at the intersections of the coordinate axes: \(\pm z\), \(\pm x\), \(\pm y\). The unbiasedness condition \(|\langle u_i, v_j \rangle|^2 = 1/d\) is the quantum-mechanical statement that measuring a \(Z\)-eigenstate in the \(X\)-basis gives each outcome with equal probability — the maximal uncertainty principle.
Remark (MUBs, Latin squares, and the order-6 problem). There is a deep (but not fully understood) connection between MUBs in \(\mathbb{C}^6\) and mutually orthogonal Latin squares of order 6. It is known that \(N(6) = 1\) (only one pair of MOLS of order 6 exists, or rather, no pair of MOLS of order 6 exists), and correspondingly it appears that no complete set of 7 MUBs in \(\mathbb{C}^6\) exists. The connection goes through the structure of the Bose-Mesner algebra: the \(Q\)-matrix of a hypothetical 7-MUB scheme in \(\mathbb{C}^6\) would need to satisfy constraints analogous to the MOLS constraints, and the failure of MOLS for order 6 propagates. Making this connection rigorous is an active area of research.

7.4 Complex Equiangular Lines and SIC-POVMs

In \(\mathbb{C}^d\), the analogue of equiangular lines is SIC-POVMs (symmetric informationally complete positive operator-valued measures) — a concept from quantum information theory.

Definition (SIC-POVM): A SIC-POVM in \(\mathbb{C}^d\) is a set of \(d^2\) unit vectors \(u_1, \ldots, u_{d^2} \in \mathbb{C}^d\) such that \[ |\langle u_i, u_j \rangle|^2 = \frac{1}{d+1} \quad \text{for all } i \neq j. \] Equivalently, the \(d^2\) rank-1 projectors \(\Pi_i = u_i u_i^*\) form a tight frame for the space of \(d \times d\) Hermitian matrices.

SIC-POVMs are the complex analogues of tight spherical 2-designs in \(\mathbb{C}^d\). They achieve the absolute bound \(d^2\) for equiangular lines in \(\mathbb{C}^d\).

Theorem (Zauner's Conjecture): SIC-POVMs exist in \(\mathbb{C}^d\) for all \(d \geq 1\). (Conjecture, Zauner 1999.)
Proved for infinitely many values of \(d\) (Appleby, Flammia, McConnell, Yard, 2017 and subsequent work), with numerical evidence for \(d \leq 2208\). No general proof is known.

Zauner’s conjecture connects to deep number theory (class field theory over real quadratic fields), and understanding it is one of the outstanding open problems bridging quantum information and pure mathematics. Godsil’s course treats this from the perspective of complex Hadamard matrices and association schemes.

Example (SIC-POVM in \(\mathbb{C}^2\)). In dimension \(d = 2\), a SIC-POVM consists of \(d^2 = 4\) unit vectors \(u_1, u_2, u_3, u_4 \in \mathbb{C}^2\) with \(|\langle u_i, u_j \rangle|^2 = 1/(d+1) = 1/3\) for all \(i \neq j\). Explicitly, these four vectors are: \[ u_1 = \begin{pmatrix} 1 \\ 0 \end{pmatrix}, \quad u_2 = \begin{pmatrix} 1/\sqrt{3} \\ \sqrt{2/3} \end{pmatrix}, \quad u_3 = \begin{pmatrix} 1/\sqrt{3} \\ \sqrt{2/3} e^{2\pi i/3} \end{pmatrix}, \quad u_4 = \begin{pmatrix} 1/\sqrt{3} \\ \sqrt{2/3} e^{4\pi i/3} \end{pmatrix}. \] These correspond to the north pole and three equally-spaced points on the equator of the Bloch sphere at latitude \(\arccos(1/\sqrt{3})\) — the vertices of a regular tetrahedron inscribed in the Bloch sphere. One verifies: \(|\langle u_1, u_2\rangle|^2 = 1/3\) (since \(|u_1^* u_2| = |1/\sqrt{3}| = 1/\sqrt{3}\), so the square is \(1/3\)), and the three equatorial vectors have mutual overlaps \(|\langle u_i, u_j\rangle|^2 = |1/3 + (2/3)e^{\pm 2\pi i/3}|^2 = |1/3 - 1/3 \pm i\sqrt{3}/3|^2 = 1/3\). \(\checkmark\) The four projectors \(\Pi_k = u_k u_k^*\) form a tight frame for \(M_2(\mathbb{C})\) and constitute a symmetric informationally-complete POVM.
Remark (SIC-POVMs, Galois theory, and the arithmetic of special values). For \(d \geq 3\), constructing SIC-POVMs requires solving systems of algebraic equations. Zauner conjectured that the solutions lie in the ray class fields of real quadratic number fields — a highly specific arithmetic prediction. Appleby, Flammia, McConnell, and Yard (2017) verified this for many dimensions: the coordinates of the SIC-POVM vectors generate specific abelian extensions of \(\mathbb{Q}(\sqrt{d^2-3})\) or \(\mathbb{Q}(\sqrt{(d-3)(d+1)})\), and the Galois group acts on SIC-POVMs in a structured way. This connection to Hilbert's twelfth problem (constructing class fields using special values of transcendental functions) makes SIC-POVMs one of the most surprising bridges between quantum information and algebraic number theory.

7.5 Hadamard Matrices and Quantum Information

The connection between Hadamard matrices and quantum information theory runs deep. The Walsh-Hadamard transform is the quantum Fourier transform over \(\mathbb{Z}_2^n\), and real Hadamard matrices correspond to unitary designs.

Definition (Unitary design): A finite set \(\{U_1, \ldots, U_m\} \subseteq U(d)\) (the unitary group) is a unitary \(t\)-design if for any polynomial \(f\) of degree \((t,t)\) in the matrix entries and their conjugates, \[ \frac{1}{m}\sum_{k=1}^m f(U_k) = \int_{U(d)} f(U) \, dU_{\text{Haar}}. \]
Remark (Mutually unbiased bases as spherical designs). A complete set of \(d+1\) MUBs in \(\mathbb{C}^d\) (when \(d\) is a prime power) forms a spherical 3-design on the unit sphere \(S^{2d-1} \subset \mathbb{C}^d \cong \mathbb{R}^{2d}\): the \(d(d+1)\) unit vectors from all bases integrate all degree-3 polynomials exactly. Moreover, the set of \(d^2\) projectors from a SIC-POVM forms a tight spherical 2-design. These design properties are precisely what make MUBs and SIC-POVMs optimal for quantum state tomography — the task of reconstructing an unknown quantum state from measurements. Optimality here means that the Fisher information (a measure of estimation precision) is maximized.

The framework of association schemes provides the correct language: MUBs and SIC-POVMs correspond to specific “coherent configurations” (generalised association schemes where the symmetry is not required to be transitive), and the eigenvalue conditions for these configurations encode the design property. Godsil’s approach to CO 434 uses this algebraic language throughout.

7.5 Connections and the Broader Picture

The objects studied in this course are deeply interconnected:

ObjectKey Connection
Symmetric \((v,k,\lambda)\)-designDifference sets, projective planes, Hadamard designs
Hadamard matrix \(H_n\)Hadamard 2-designs, Walsh codes, SIC-POVMs
\(\mathrm{OA}(t, k, n)\)MOLS, orthogonal codes, factorial experiments
Witt design \(\mathcal{W}_{24}\)Golay code, Leech lattice, Mathieu groups
Association schemeDistance-regular graphs, Bose-Mesner algebra, Delsarte bounds
Equiangular linesStrongly regular graphs, root systems, ETFs
Spherical \(t\)-designNumerical integration, lattices, coding theory
MUBsSIC-POVMs, quantum tomography, Latin squares

The unifying theme throughout is the interplay between regularity (uniformity conditions on combinatorial structures), linear algebra (eigenvalue methods, Gram matrices, quadratic forms), and geometry (finite projective spaces, spheres, lattices). Godsil’s approach in Geometry: Finite, Real, Imaginary is to see all these objects as special cases of a geometric philosophy: finite analogues of the great continuous geometries of Euclidean and projective space.


7.6 Open Problems and Future Directions

Combinatorial design theory is a field with a wealth of open problems at all levels of difficulty. We close with a brief survey of the major open questions.

Open Problem 1 (Hadamard conjecture). Does a Hadamard matrix of order \(n\) exist for every \(n \equiv 0 \pmod 4\)? The conjecture has been verified for all \(n \leq 664\), and the Paley and Sylvester constructions cover infinite families. The current frontier of unresolved orders begins at \(n = 668\). No conditional proof (assuming GRH, etc.) is known, and no asymptotic result (showing that "most" admissible orders have Hadamard matrices) is established.
Open Problem 2 (Existence of projective planes of non-prime-power order). Does a projective plane of order 12 exist? The Bruck-Ryser-Chowla theorem does not rule it out (\(n = 12\) is even and \(k - \lambda = 12\) is a perfect square? — actually for a projective plane, \(\lambda = 1\) and \(k - \lambda = n = 12\), which is not a perfect square: \(\sqrt{12} \notin \mathbb{Z}\). Wait: BRC for even \(v\): \(v = n^2+n+1 = 157\) (odd for \(n=12\)). For \(v\) odd and \(n = 12\): the BRC equation is \(x^2 = ny^2 + (-1)^{(v-1)/2} z^2\). With \(v = 157\), \((v-1)/2 = 78\) even, so the equation is \(x^2 = 12y^2 + z^2\). Taking \(x = 2, y = 0, z = 2\): \(4 = 4\). \(\checkmark\) So BRC does not rule out a projective plane of order 12. The question remains open.
Open Problem 3 (Zauner's conjecture for SIC-POVMs). Do SIC-POVMs exist in \(\mathbb{C}^d\) for all \(d \geq 1\)? Proved for \(d \leq 193\) and numerically verified for \(d \leq 2208\). Suspected to be equivalent to a statement in class field theory.
Open Problem 4 (MUBs in \(\mathbb{C}^6\)). Do 7 mutually unbiased bases exist in \(\mathbb{C}^6\)? Only 3 are known. Non-existence would be a major theorem, likely requiring new algebraic or analytic tools.
Open Problem 5 (Keevash-type exact thresholds). For small values of \(v\), characterise exactly which \(t\)-(v,k,\lambda) designs exist. Keevash's theorem gives existence for large \(v\); the small cases require computer search (as was done for small Steiner systems and the non-existence of a projective plane of order 10).

Appendix: Key Notation and Parameter Summary

SymbolMeaning
\((v, b, r, k, \lambda)\)Parameters of a 2-design
\(N\)Incidence matrix (\(v \times b\) or \(v \times v\) for symmetric)
\(J\)All-ones matrix
\(\mathrm{PG}(d, q)\)Projective space over \(\mathbb{F}_q\)
\(\mathrm{OA}(t, k, n)\)Orthogonal array of strength \(t\)
\(N(n)\)Maximum number of MOLS of order \(n\)
\(\mathcal{W}_{24}\)Large Witt design, 5-(24,8,1)
\(\mathcal{W}_{12}\)Small Witt design, 5-(12,6,1)
\(p^k_{ij}\)Intersection numbers of an association scheme
\(\mathrm{srg}(n,k,\lambda,\mu)\)Strongly regular graph parameters
\(H_n\)Hadamard matrix of order \(n\)
\(\chi\)Quadratic character of \(\mathbb{F}_q\)

Chapter 8: Difference Sets and Cyclic Designs

8.1 The Concept of a Difference Set

Among all methods for constructing block designs, the theory of difference sets is at once the most elegant and the most powerful. It reduces the problem of building a design with the right intersection structure to a purely group-theoretic condition, turning combinatorics into number theory.

Definition (Difference Set). Let \(G\) be a group of order \(v\). A \(k\)-element subset \(D \subseteq G\) is a \((v, k, \lambda)\)-difference set if every nonidentity element \(g \in G \setminus \{e\}\) can be represented as a difference \(d_1 d_2^{-1}\) (or \(d_1 - d_2\) in additive notation) with \(d_1, d_2 \in D\) in exactly \(\lambda\) ways.

The name comes from the original setting of cyclic groups \(G = \mathbb{Z}_v\): the “differences” are \(d_i - d_j \pmod{v}\) for \(d_i \neq d_j \in D\). The condition that each nonzero difference appears exactly \(\lambda\) times is the key regularity property.

The connection to design theory is immediate: if \(D \subseteq G\) is a \((v,k,\lambda)\)-difference set, then the development of \(D\) — the collection of translates \(\{D + g : g \in G\}\) — forms a symmetric \((v, k, \lambda)\)-design. Each translate is a block, and the regularity condition on differences guarantees that any two points appear together in exactly \(\lambda\) blocks.

Example (Difference set in \(\mathbb{Z}_7\)). Let \(G = \mathbb{Z}_7\) and \(D = \{0, 1, 3\}\). Check the differences: \[ 1-0=1,\quad 3-0=3,\quad 0-1=6,\quad 3-1=2,\quad 0-3=4,\quad 1-3=5. \] Every nonzero element of \(\mathbb{Z}_7\) appears exactly once. So \(D\) is a \((7, 3, 1)\)-difference set. Its development gives the seven blocks \(\{0,1,3\}, \{1,2,4\}, \{2,3,5\}, \{3,4,6\}, \{4,5,0\}, \{5,6,1\}, \{6,0,2\}\) — the 7 lines of the Fano plane \(\mathrm{PG}(2,2)\). This is not a coincidence: the Fano plane is the unique symmetric \((7,3,1)\)-design, and its cyclic symmetry corresponds to the Singer cycle.

8.2 Singer’s Theorem and Planar Difference Sets

The most important family of difference sets comes from finite projective geometry. A Singer cycle is a cyclic group that acts regularly on the points of a projective space.

Theorem (Singer, 1938). For any prime power \(q\) and integer \(d \geq 1\), there exists a \(\left(\frac{q^{d+1}-1}{q-1},\, \frac{q^d-1}{q-1},\, \frac{q^{d-1}-1}{q-1}\right)\)-difference set in \(\mathbb{Z}_{(q^{d+1}-1)/(q-1)}\).

For \(d = 2\), this gives a \((q^2+q+1,\, q+1,\, 1)\)-difference set — the planar difference set corresponding to the Desarguesian projective plane \(\mathrm{PG}(2,q)\).

Proof sketch. Work in \(\mathbb{F}_{q^{d+1}}\), the field with \(q^{d+1}\) elements. Let \(\alpha\) be a primitive element (generator of the multiplicative group \(\mathbb{F}_{q^{d+1}}^*\)). The cyclic group \(\langle \alpha \rangle\) has order \(q^{d+1}-1\). The points of \(\mathrm{PG}(d, q)\) correspond to the \((q^{d+1}-1)/(q-1)\) cosets of the subgroup \(\mathbb{F}_q^*\) in \(\mathbb{F}_{q^{d+1}}^*\). These cosets can be indexed \(0, 1, \ldots, (q^{d+1}-1)/(q-1) - 1\) by taking \(\alpha^i\) as coset representative. The Singer cycle is the map \(\alpha^i \mapsto \alpha^{i+1}\), which cyclically permutes the cosets. A hyperplane \(H \subset \mathrm{PG}(d,q)\) meets this coset structure in \((q^d-1)/(q-1)\) cosets, and the difference between any two such cosets ranges over the nonzero cosets with the right multiplicity \((q^{d-1}-1)/(q-1)\). \(\square\)

The Singer construction is foundational because it shows that the “combinatorial” structure of a projective plane is completely captured by a single cyclic group element. This is why Hamming codes (whose parity check matrices are constructed from Singer cycles) have such elegant structure.

8.3 Multipliers and the Hall-Paige Condition

The multiplier theorem is a powerful tool for proving uniqueness of difference sets.

Definition (Multiplier). Let \(D\) be a \((v,k,\lambda)\)-difference set in \(\mathbb{Z}_v\). An integer \(t\) with \(\gcd(t, v) = 1\) is a multiplier of \(D\) if \(tD = \{td \pmod{v} : d \in D\}\) is a translate of \(D\): i.e., \(tD = D + g\) for some \(g \in \mathbb{Z}_v\).
Theorem (Hall's Multiplier Theorem). If \(D\) is a \((v,k,\lambda)\)-difference set in an abelian group, and \(p\) is a prime dividing \(k - \lambda\) but not \(v\), then \(p\) is a multiplier of \(D\).

The multiplier theorem gives a way to show that a potential difference set (if it exists) must be invariant under multiplication by \(p\). This greatly restricts the search space for difference sets and is used to prove non-existence: if the multiplier group acts on the potential difference set in a way inconsistent with the required parameters, then the difference set cannot exist.

Example (Non-existence via multipliers). A \((21, 5, 1)\)-difference set in \(\mathbb{Z}_{21}\) would give a projective plane of order 4. Here \(k - \lambda = 4\), so \(p = 2\) is a multiplier. The multiplier \(t = 2\) must fix \(D\) as a set modulo translation. Checking all cosets of \(\{0, 7, 14\}\) in \(\mathbb{Z}_{21}\) under multiplication by 2, one verifies that no 5-element set with difference multiset \([1^1 2^1 \ldots 20^1]\) exists that is fixed by the map \(x \mapsto 2x\). This is a computation, but it works: \((21, 5, 1)\)-difference sets in \(\mathbb{Z}_{21}\) do not exist, consistent with the known result that projective planes of non-prime-power order remain unresolved.

(For completeness: a projective plane of order 4 DOES exist — it is \(\mathrm{PG}(2, 4)\), isomorphic to the unique projective plane of order 4. The point here is about \(\mathbb{Z}_{21}\) specifically, not the existence of the plane.)

8.4 Hadamard Difference Sets

A \((v, k, \lambda)\)-difference set with \(v = 4\mu\), \(k = 2\mu - 1\), \(\lambda = \mu - 1\) (so \(k - \lambda = \mu\)) is called a Hadamard difference set or \((4\mu-1, 2\mu-1, \mu-1)\)-difference set. Its development gives a Hadamard design — a symmetric \((4\mu-1, 2\mu-1, \mu-1)\)-design, which is the “residual” of a Hadamard matrix.

Example (Legendre's difference set). For an odd prime \(p \equiv 3 \pmod 4\), the set of quadratic residues \(D = \{a^2 \pmod p : a \neq 0\}\) is a \((p, (p-1)/2, (p-3)/4)\)-difference set in \(\mathbb{Z}_p\). For \(p = 7\): \(D = \{1, 2, 4\}\) (the squares mod 7), giving a \((7, 3, 1)\)-difference set — the same as the Singer difference set! This is a general phenomenon: the Singer and Legendre constructions agree for Mersenne primes \(p = 2^n - 1\).

For \(p = 11\): \(D = \{1, 3, 4, 5, 9\}\) (the quadratic residues mod 11). This is a \((11, 5, 2)\)-difference set, giving a symmetric \((11, 5, 2)\)-design — the unique such design, whose points and blocks are the 11 points and 11 lines of a “biplane.”


Chapter 9: Resolutions and Parallelisms

9.1 Resolvable Designs

A resolution of a design adds further structure: it partitions the blocks into “parallel classes,” each class itself forming a partition of the point set. This concept has classical roots in Kirkman’s 1847 schoolgirl problem.

Definition (Resolvable Design). A \((v,k,\lambda)\)-design is resolvable if its blocks can be partitioned into classes \(R_1, R_2, \ldots, R_r\) (called parallel classes or resolution classes) such that each class partitions the point set. A resolution is a choice of such a partition.

For a resolvable \((v, k, 1)\)-design (a Steiner system \(S(2, k, v)\)), each parallel class has exactly \(v/k\) blocks, and the number of parallel classes is \(r = \lambda(v-1)/(k-1) = (v-1)/(k-1)\). The necessary condition for resolvability is \(k \mid v\).

Example (Kirkman's schoolgirl problem). A schoolmistress has 15 girls. She wants to take them on a daily walk in rows of 3, arranging them so that every pair of girls walks in the same row exactly once over 7 days. This asks for a resolvable \(S(2, 3, 15)\) — a Steiner triple system on 15 points with a resolution into 7 parallel classes of 5 triples each. This problem was posed by Kirkman in 1847 and solved by him: resolvable Steiner triple systems \(S(2, 3, v)\) exist if and only if \(v \equiv 3 \pmod 6\). For \(v = 15\), the solution is now called a **Kirkman schoolgirl design**.

Concretely, one resolution is:

\[ \begin{array}{ccccc} \text{Day 1:} & \{1,2,3\} & \{4,5,6\} & \{7,8,9\} & \{10,11,12\} & \{13,14,15\} \\ \text{Day 2:} & \{1,4,7\} & \{2,5,8\} & \{3,6,9\} & \{10,13, ??\} & \ldots \end{array} \]

(The full solution requires careful arithmetic to ensure every pair meets exactly once. There are 80 non-isomorphic resolutions for \(v = 15\).)

9.2 Ray-Chaudhuri-Wilson Theorem

The Ray-Chaudhuri-Wilson theorem (1971) is the definitive resolvability result for Steiner triple systems:

Theorem (Ray-Chaudhuri-Wilson, 1971). A Steiner triple system \(S(2, 3, v)\) is resolvable if and only if \(v \equiv 3 \pmod 6\).

The necessity is arithmetic: \(v \equiv 1\) or \(3 \pmod 6\) is needed for an STS to exist; the extra condition \(v \equiv 3 \pmod 6\) (not \(v \equiv 1\)) ensures that 3 divides \(v\), which is required for each parallel class to partition all \(v\) points into groups of 3.

The sufficiency proof is constructive: for any \(v \equiv 3 \pmod 6\), one constructs an explicit resolvable STS using a “direct” construction (algebraic methods over \(\mathbb{Z}_v\) for prime \(v\)) and a “recursive” construction (combining smaller resolvable STSs into larger ones via product constructions).

9.3 The Existence Theorem for Resolvable Designs

Wilson’s asymptotic existence theorem (1975) extends the Rödl nibble packing result to a sharp statement:

Theorem (Wilson, 1975). For fixed \(k \geq 2\) and \(\lambda \geq 1\), a resolvable \((v, k, \lambda)\)-design exists for all sufficiently large \(v\) satisfying the necessary arithmetic conditions: \(k \mid v\), \(k - 1 \mid \lambda(v-1)\), and \(\binom{k}{2} \mid \lambda \binom{v}{2}\).

The proof uses the theory of transversals in Latin squares (essentially, a large “balanced” Latin square can be resolved into subsquares) combined with a direct counting argument. Wilson’s theorem was a landmark: it showed that the necessary conditions for the existence of a resolvable design are (asymptotically) also sufficient, mirroring the pattern for non-resolvable designs established by the same author.

9.4 Room Squares

A Room square of order \(2n\) (named after Thomas Room, 1955) is a symmetric Latin square of order \(2n-1\) with special structure: a \((2n-1) \times (2n-1)\) array where each cell contains either a pair \(\{i,j\} \subseteq \{1, \ldots, 2n\}\) or is empty, such that:

  • Each of the \(2n\) symbols appears in exactly one cell per row and one cell per column.
  • Each pair \(\{i,j\}\) appears in exactly one cell.
Example (Room square of order 6). A Room square of order 6 is a \(5 \times 5\) array with pairs from \(\{1, 2, 3, 4, 5, 6\}\). It is equivalent to a resolvable 1-design on 6 points with 5 parallel classes of 3 pairs each — the "round-robin tournament" schedule for 6 teams. Such arrays exist for all even orders \(2n \geq 4\) except \(2n = 4\) (proved by Stanton-Mullin). The construction uses Galois fields: for \(q\) an odd prime power, place the pair \(\{\infty, 0\}\) in cell \((0, 0)\) and build the rest from the multiplicative structure of \(\mathbb{F}_q^*\).

Room squares generalize to starter-adder constructions over cyclic groups, which provide a unified framework for tournament scheduling, round-robin tournaments, and other combinatorial designs with rotational symmetry. They are equivalent to 1-factorizations of complete graphs, connecting design theory to graph theory.


Chapter 10: Codes from Designs

10.1 The Code of a Design

Every design has a natural associated linear code, obtained by viewing the incidence matrix over a finite field.

Definition (Code of a Design). Let \(\mathcal{D} = (P, B)\) be a \((v,b,r,k,\lambda)\)-design with incidence matrix \(N\). The code of \(\mathcal{D}\) over \(\mathbb{F}_p\) is the linear code \(C_p(\mathcal{D})\) spanned by the rows of \(N\) over \(\mathbb{F}_p\).

The parameters of \(C_p(\mathcal{D})\) — its length \(n = b\), its dimension \(k = \mathrm{rank}_p(N)\), and its minimum distance \(d\) — carry deep information about the design. In particular:

  • The minimum distance of \(C_p(\mathcal{D})\) is related to the minimum number of blocks needed to cover all points an odd number of times.
  • The dual code \(C_p(\mathcal{D})^\perp\) is often the code of a complementary or “derived” design.

10.2 Reed-Muller Codes from Affine Geometry

The Reed-Muller codes are among the most important codes in both theory and practice. They arise naturally from the geometry of affine spaces.

Definition (Reed-Muller code). The first-order Reed-Muller code \(\mathcal{R}(1, m)\) is the binary linear code of length \(2^m\) consisting of all codewords of the form \((f(x))_{x \in \mathbb{F}_2^m}\) where \(f : \mathbb{F}_2^m \to \mathbb{F}_2\) is an affine Boolean function: \(f(x) = a_1 x_1 + \cdots + a_m x_m + b\) with \(a_i, b \in \mathbb{F}_2\). More generally, the \(r\)-th order Reed-Muller code \(\mathcal{R}(r, m)\) consists of all evaluations of degree-\(\leq r\) polynomials in \(\mathbb{F}_2[x_1, \ldots, x_m]\).

The parameters of \(\mathcal{R}(r, m)\) are:

\[ [2^m,\, \sum_{i=0}^r \binom{m}{i},\, 2^{m-r}]. \]
Theorem (Reed-Muller ↔ Design). The supports of codewords of minimum weight in \(\mathcal{R}(m-2, m)\) (the second-from-top Reed-Muller code) are exactly the hyperplanes of \(\mathrm{AG}(m, 2)\) — the \((m-1)\)-dimensional affine subspaces. These hyperplanes form a \((2^m, 2^{m-1}, 2^{m-2}-1)\)-design, i.e., a \(3-(2^m, 2^{m-1}, 2^{m-2}-1)\) design. For \(m = 4\), this is the unique \(3-(16, 8, 3)\) design associated with the extended Hamming code.

The connection is deep: the weight enumerator of a Reed-Muller code can be computed from the design-theoretic parameters of the associated hyperplane design, and vice versa. The Assmus-Mattson theorem (1969) formalizes this: certain codes automatically contain designs among their minimum-weight codewords.

10.3 The MacWilliams Transform

If \(C\) is a linear code with weight enumerator \(W_C(x, y) = \sum_{w} A_w x^{n-w} y^w\), then the weight enumerator of the dual code \(C^\perp\) is determined by the MacWilliams transform:

Theorem (MacWilliams, 1963). For a linear code \(C\) of length \(n\) and its dual \(C^\perp\), \[ W_{C^\perp}(x, y) = \frac{1}{|C|} W_C(x + y,\, x - y). \]

This formula has a clean interpretation: the weight distribution of the dual code is the Krawtchouk (discrete Fourier) transform of the weight distribution of the original code. It is the discrete analogue of the Poisson summation formula.

Example (Weight enumerator of the Hamming code and its dual). The \([7, 4, 3]_2\) Hamming code has weight enumerator \(W_C = x^7 + 7x^4y^3 + 7x^3y^4 + y^7\). Its dual is the \([7, 3, 4]_2\) simplex code. Applying the MacWilliams transform: \[ W_{C^\perp}(x, y) = \frac{1}{16}\Big[(x+y)^7 + 7(x+y)^4(x-y)^3 + 7(x+y)^3(x-y)^4 + (x-y)^7\Big]. \] Expanding and simplifying (each of the 8 nonzero codewords has weight 4 and the all-zeros codeword has weight 0): \[ W_{C^\perp} = x^7 + 7xy^6... \]

Actually the simplex code \([7, 3, 4]_2\) has all nonzero codewords of weight 4, giving \(W_{C^\perp} = x^7 + 7y^4 x^3\) — a constant-weight code. The MacWilliams transform confirms this: the weight distribution of the simplex code (all weights equal to 4) corresponds, via the transform, to the highly non-constant weight distribution of the Hamming code. This duality between “flat” and “peaked” weight distributions is a recurrent theme in the algebraic theory of codes and designs.

10.4 The Assmus-Mattson Theorem

The Assmus-Mattson theorem (1969) gives a systematic way to extract designs from codes.

Theorem (Assmus-Mattson). Let \(C\) be a binary linear \([n, k, d]\) code. Let \(d^\perp\) be the minimum distance of \(C^\perp\). Suppose there is an integer \(t\) with \(0 < t < d\) such that the number of weights in \(C^\perp\) that are at most \(n - t\) is at most \(d - t\). Then the minimum-weight codewords of \(C\) form a \(t\)-design on the \(n\) coordinate positions.

The theorem is used to prove, for example, that the weight-8 codewords of the Golay code \(\mathcal{G}_{24}\) form the Witt design \(5-(24, 8, 1)\) — indeed, the Assmus-Mattson theorem applied to \(\mathcal{G}_{24}\) gives \(t = 5\), consistent with the 5-design structure. Similarly, the weight-12 codewords of the ternary Golay code \(\mathcal{G}_{12}\) form the small Witt design \(5-(12, 6, 1) = \mathcal{W}_{12}\). This beautiful correspondence — codes determine designs, and designs determine codes — is the unifying theme of Assmus and Key’s monograph.

10.5 The Sphere-Covering and Sphere-Packing Bounds

The design-theoretic parameters of a code are constrained by two classical bounds.

Theorem (Hamming bound / Sphere-packing bound). A binary \([n, k, d]\) code satisfies \[ 2^k \cdot \sum_{i=0}^{t} \binom{n}{i} \leq 2^n \] where \(t = \lfloor (d-1)/2 \rfloor\). Equivalently, \(k \leq n - \log_2 \text{Vol}(n, t)\).

A code achieving equality in the Hamming bound is called perfect. Perfect binary codes are fully classified: the only nontrivial ones are the Hamming codes \([2^r - 1, 2^r - r - 1, 3]\) and the Golay code \([23, 12, 7]\). This classification (Lloyd 1957, van Lint-Tietäväinen 1973) is one of the deepest results in coding theory, and it provides a characterization of the Hamming and Golay designs in purely coding-theoretic terms.

Remark (Perfect codes and Steiner systems). The connection is exact: a perfect 1-error-correcting binary code of length \(n = 2^r - 1\) is equivalent to a Steiner triple system \(S(2, 3, 2^r - 1)\) only if it is the Hamming code (a linear code). Nonlinear perfect codes exist (the Vasil'ev codes and their generalizations), and they give non-isomorphic Steiner triple systems. Counting non-isomorphic STSs is a major open problem; the number grows superexponentially with \(v\). The Hamming code corresponds to the "cyclic" STS with the Singer symmetry, while Vasil'ev codes break this symmetry and give STS's with no linear structure.

Chapter 11: The Linear Algebra Bound and Fisher-Type Inequalities

11.1 Ray-Chaudhuri-Wilson and the Absolute Bound

The most powerful bounds in design theory come from linear algebra. The general philosophy is: embed the blocks (or points) of a design as vectors in a vector space, then use the rank of the resulting matrix to bound the number of vectors.

Theorem (Ray-Chaudhuri-Wilson). Let \(\mathcal{F} = \{F_1, \ldots, F_m\} \subseteq \binom{[n]}{k}\) be a family of \(k\)-element subsets of \([n]\). Suppose there exists a set \(L = \{\ell_1, \ldots, \ell_s\} \subseteq \{0, 1, \ldots, k-1\}\) of \(s\) integers such that \(|F_i \cap F_j| \in L\) for all \(i \neq j\). Then \(|\mathcal{F}| \leq \binom{n}{s}\).
Proof sketch. Associate to each set \(F_i\) the multilinear polynomial \(f_i(x) = \prod_{\ell \in L}(|F_i \cap \text{supp}(x)| - \ell)\) in the variables \(x_1, \ldots, x_n\) (where \(x \in \{0,1\}^n\)). One shows that: (1) \(f_i(v_{F_i}) \neq 0\) (each polynomial is nonzero on the characteristic vector of \(F_i\)), and (2) \(f_i(v_{F_j}) = 0\) for \(i \neq j\) (since \(|F_i \cap F_j| \in L\) means one of the factors in \(f_i\) vanishes). These two conditions imply that the polynomials \(f_1, \ldots, f_m\) are linearly independent over \(\mathbb{R}\). Since they all have degree \(s\) and are multilinear, they lie in the space of multilinear polynomials of degree \(\leq s\), which has dimension \(\sum_{i=0}^s \binom{n}{i} \leq \binom{n}{s} \cdot (s+1)/1 \leq ...\); more carefully, the space of multilinear polynomials of degree exactly \(s\) in \(n\) variables has dimension \(\binom{n}{s}\), giving the bound. \(\square\)

The RCW theorem is a vast generalization of Fisher’s inequality (which is the case \(s = 1, L = \{\lambda\}\)) and the Delsarte-Goethals-Seidel bound. Its specializations give the best-known bounds on:

  • Two-distance sets in \(\mathbb{R}^n\): at most \(\binom{n+2}{2}\) points.
  • \(s\)-distance sets (sets where all pairwise distances take only \(s\) values): at most \(\binom{n+s}{s}\) points.
  • Equiangular lines: at most \(\binom{n+1}{2}\) lines (the absolute bound from Chapter 7).

11.2 Oddtown and Eventown

The “oddtown/eventown” results are elegant applications of the linear algebra method to purely combinatorial problems.

Theorem (Berlekamp 1969, Eventown). Let \(\mathcal{F} \subseteq 2^{[n]}\) be a family of subsets such that \(|F|\) is even for all \(F \in \mathcal{F}\) and \(|F \cap G|\) is even for all \(F, G \in \mathcal{F}\). Then \(|\mathcal{F}| \leq 2^{\lfloor n/2 \rfloor}\).
Theorem (Oddtown). If \(\mathcal{F} \subseteq 2^{[n]}\) satisfies \(|F|\) odd for all \(F \in \mathcal{F}\) and \(|F \cap G|\) even for all \(F \neq G\), then \(|\mathcal{F}| \leq n\).
Proof (Oddtown). Work over \(\mathbb{F}_2\). Identify each \(F \in \mathcal{F}\) with its characteristic vector \(v_F \in \mathbb{F}_2^n\). The conditions say: \(v_F \cdot v_F = |F| = 1 \pmod 2\) (nonzero self-inner-product) and \(v_F \cdot v_G = |F \cap G| = 0 \pmod 2\) for \(F \neq G\). We claim the vectors \(v_F\) are linearly independent over \(\mathbb{F}_2\). Suppose \(\sum_{i \in S} v_{F_i} = 0\) for some nonempty \(S\). Then \(\left(\sum_{i \in S} v_{F_i}\right) \cdot v_{F_j} = v_{F_j} \cdot v_{F_j} + \sum_{i \in S, i \neq j} v_{F_i} \cdot v_{F_j} = 1 + 0 = 1 \neq 0\), a contradiction. So the \(|\mathcal{F}|\) vectors are linearly independent in \(\mathbb{F}_2^n\), giving \(|\mathcal{F}| \leq n\). \(\square\)

These results have become the prototypical examples of the linear algebra method in combinatorics — a collection of techniques where one assigns vectors to combinatorial objects and uses linear independence to bound their number. The method is closely related to the Delsarte LP bound: both exploit the fact that objects with limited intersection structure must be “nearly orthogonal.”

11.3 The Frankl-Wilson Theorem

The Frankl-Wilson theorem combines the linear algebra method with the Ray-Chaudhuri-Wilson theorem to give striking bounds in discrete geometry.

Theorem (Frankl-Wilson, 1981). Let \(p\) be a prime, and suppose \(\mathcal{F} \subseteq \binom{[n]}{k}\) satisfies \(|F \cap G| \not\equiv -1 \pmod p\) for all \(F \neq G \in \mathcal{F}\), and \(k \equiv -1 \pmod p\). Then \(|\mathcal{F}| \leq \binom{n}{p-1}\).

The most spectacular application is the chromatic number of the unit-distance graph. Let \(G_n\) be the graph on \(\{0,1\}^n\) where two vectors are adjacent if their Hamming distance is exactly \(n/2\) (for even \(n\)). Frankl and Wilson show \(\chi(G_n) \geq (1.2)^n\) by the modular intersection bound. More dramatically: the chromatic number of \(\mathbb{R}^n\) (the Hadwiger-Nelson-type problem in higher dimensions) satisfies \(\chi(\mathbb{R}^n) \geq (1.2389...)^n\), proved by the Frankl-Wilson construction of a set in \(\{0,1\}^n\) with no two points at distance 1 whose chromatic number forces many colors.

Chapter 12: Sharply Transitive Sets and the Cayley Graph Connection

12.1 Group Actions on Designs

The automorphism group of a design acts on both its point set and block set. The interplay between a design’s symmetry group and its combinatorial structure is one of the deepest themes in the subject. When the automorphism group acts transitively — or even sharply transitively — on points, blocks, or flags, the design acquires an algebraic structure that greatly simplifies both construction and analysis.

Definition (Flag-transitive design). A design \(\mathcal{D} = (P, B)\) is flag-transitive if its automorphism group acts transitively on the set of flags \(\{(p, B) : p \in B\}\). It is point-transitive (or point-regular) if the automorphism group acts transitively (respectively, regularly — i.e., sharply transitively) on \(P\).

Flag-transitive designs are precisely those for which every point-block pair \((p, B)\) looks the same — a very strong symmetry condition. The classification of flag-transitive 2-designs is a major open problem, with progress tied to the classification of finite simple groups (CFSG). Using CFSG, O’Nan and Scott (1980) and later Buekenhout (1990) gave a partial classification of flag-transitive designs.

12.2 Cayley Graphs and Difference Sets

Every difference set \(D\) in a group \(G\) defines a Cayley graph \(\mathrm{Cay}(G, D - D^{-1})\) where two group elements \(g, h\) are adjacent iff \(gh^{-1} \in D \cup D^{-1}\). This graph is strongly regular when \(D\) is a \((v, k, \lambda)\)-difference set.

Theorem. If \(D\) is a \((v, k, \lambda)\)-difference set in an abelian group \(G\), then the Cayley graph \(\mathrm{Cay}(G, D \setminus \{0\})\) (viewing \(G\) additively, with \(D\) not containing 0) is a \(\mathrm{srg}(v, k, \lambda, \lambda)\) — a conference graph when \(k = (v-1)/2\) and \(\lambda = (v-3)/4\).

The Paley graph \(P(q)\) for a prime power \(q \equiv 1 \pmod 4\) is the Cayley graph \(\mathrm{Cay}(\mathbb{F}_q, Q)\) where \(Q\) is the set of nonzero quadratic residues. Since \(|Q| = (q-1)/2\), the Paley graph is a conference graph — it is a self-complementary strongly regular graph with parameters \((q, (q-1)/2, (q-5)/4, (q-1)/4)\). The Paley graphs are the canonical examples of Ramsey graphs: by the second-moment method, the clique and independence numbers of \(P(q)\) are both \(O(\sqrt{q} \log q)\), giving the largest known explicit constructions avoiding large cliques or independent sets.

12.3 Planar Functions and Semifields

A planar function over \(\mathbb{F}_q\) (for odd prime power \(q\)) is a function \(f: \mathbb{F}_q \to \mathbb{F}_q\) such that the map \(x \mapsto f(x+a) - f(x)\) is a bijection for every nonzero \(a \in \mathbb{F}_q\). Planar functions generalize difference sets to the non-abelian setting.

Example (\(f(x) = x^2\) is planar over \(\mathbb{F}_p\) for odd prime \(p\)). The map \(x \mapsto (x+a)^2 - x^2 = 2ax + a^2\) is a linear bijection for \(a \neq 0\) (since \(2a \neq 0\)). So \(f(x) = x^2\) is planar. The corresponding design: define blocks \(B_a = \{(x, x^2 + ax) : x \in \mathbb{F}_p\}\) for \(a \in \mathbb{F}_p\). Together with the "vertical lines" \(\{(c, y) : y \in \mathbb{F}_p\}\), these \(p^2 + p\) blocks on \(p^2\) points form the affine plane \(\mathrm{AG}(2, p)\). So the planar function \(f(x) = x^2\) reconstructs the standard affine plane.

More exotic planar functions (like \(f(x) = x^{(3^k+1)/2}\) over \(\mathbb{F}_{3^n}\) for appropriate \(k, n\)) give rise to non-Desarguesian projective planes — planes that cannot be coordinatized by a field but only by a semifield (a division ring that may not satisfy associativity of multiplication). The classification of semifields, and hence of non-Desarguesian planes, remains an active research area.

12.4 The Polynomial Method for Designs

Polynomial methods, developed in Chapter 13 of CO 448 (Combinatorial Nullstellensatz), also apply to design theory. The cleanest application is the proof of Wilson’s theorem via the permanent of a polynomial matrix.

Remark (Polynomial proof of Fisher's inequality). Fisher's inequality (\(b \geq v\) for a 2-design with \(\lambda < r\)) has an elegant polynomial proof. Index the \(v\) points and \(b\) blocks. Assign to each block \(B_j\) the polynomial \(f_j(x_1, \ldots, x_v) = \prod_{i \notin B_j}(1 - x_i) \cdot \prod_{i \in B_j} x_i\). Under the evaluation at the characteristic vector \(v_{B_i}\), one finds \(f_j(v_{B_i}) = \delta_{ij}\) (Kronecker delta), so the \(b\) polynomials are linearly independent in the space of multilinear polynomials. This space has dimension \(2^v\). But Fisher's inequality says more: the polynomials lie in a smaller space of "intersection-controlled" degree, and the constraint \(b \geq v\) follows from a rank argument on the incidence matrix — exactly as in the linear algebra proof. The polynomial perspective unifies Fisher's inequality, the RCW theorem, and the Delsarte bound into a single framework: "restrict to a polynomial subspace, then count."

12.5 Concluding Perspective

The three strands woven throughout this course — linear algebra, finite geometry, and probabilistic/algebraic combinatorics — converge at the deepest results. Fisher’s inequality and the Delsarte LP bound use linear algebra to constrain parameters. Projective planes and difference sets use finite field arithmetic to provide constructions. The Witt designs and Golay codes exist at the intersection of all three, requiring group theory (Mathieu groups), coding theory (Golay codes), and algebraic combinatorics (association schemes) for a complete understanding.

The field continues to develop rapidly. Recent breakthroughs — Keevash’s existence theorem for designs (2014), the resolution of the Existence Conjecture for resolvable designs (Glock-Kühn-Lo-Osthus, 2020), and progress on Zauner’s conjecture via class field theory (Appleby et al., 2017) — show that the classical questions of design existence, uniqueness, and structure are far from exhausted. The interaction between high-powered algebraic machinery (representation theory, algebraic number theory) and elementary combinatorial structure (intersection numbers, regularity) remains the defining feature of the subject.

SubjectKey ToolMain Open Problem
Existence of designsProbabilistic/algebraicSharp thresholds for small \(v\)
UniquenessAutomorphism groups, codesClassification of flag-transitive designs
Hadamard matricesSylvester, Paley, cocyclicHadamard conjecture (\(n = 4m\))
Projective planesFinite fields, difference setsNon-prime-power order planes
Equiangular linesSDP, algebraic number theoryTight bounds for \(d \geq 15\)
SIC-POVMsClass field theoryZauner’s conjecture (all \(d\))
MUBsUnitary designs, Latin squares7 MUBs in \(\mathbb{C}^6\)

Appendix B: Notable Designs and Their Parameters

The following table collects the most important specific designs appearing in the course.

DesignParametersAutomorphism GroupNotes
Fano plane\(2-(7,3,1)\)\(\mathrm{PSL}(2,7)\), order 168Unique; projective plane of order 2
Petersen graphNot a design, but related\(S_5\), order 120Kneser graph \(K(5,2)\)
\(\mathrm{AG}(2,3)\)\(2-(9,3,1)\)\(\mathrm{AGL}(2,3)\), order 432Unique; 4 parallel classes
Desargues \(\mathrm{PG}(2,3)\)\(2-(13,4,1)\)\(\mathrm{PSL}(3,3)\), order 5616Unique
Petersen design\(3-(10,4,1)\)\(S_6\), order 720Unique
\(\mathcal{W}_{12}\)\(5-(12,6,1)\)\(M_{12}\), order 95040Unique
\(\mathcal{W}_{24}\)\(5-(24,8,1)\)\(M_{24}\), order 244823040Unique
Hadamard design\(2-(11,5,2)\)\(M_{11}\), order 7920Biplane from Paley \(\mathrm{QR}(11)\)
\(H_{12}\) design\(5-(12,6,1)\) = \(\mathcal{W}_{12}\)\(M_{12}\)From Hadamard matrix of order 12
\(\mathrm{PG}(3,2)\)\(2-(15,3,1)\) (lines)\(\mathrm{PSL}(4,2) = A_8\)35 lines, 15 points
Biplane \((11,5,2)\)\(2-(11,5,2)\)\(M_{11}\)Unique
Biplane \((13,4,1)\)= projective plane of order 3\(\mathrm{PSL}(3,3)\)Unique
Steiner triple \(S(2,3,9)\)= \(\mathrm{AG}(2,3)\)\(\mathrm{AGL}(2,3)\)Unique (up to isomorphism)

The Mathieu groups \(M_{11}, M_{12}, M_{22}, M_{23}, M_{24}\) are the first five sporadic simple groups discovered and arise as automorphism groups of the Witt designs. Their existence is intimately tied to the richness of the Golay codes: the Golay codes are uniquely characterized by being the only doubly-even self-dual binary codes of their parameters, and this uniqueness forces the automorphism group to be extremely large.

CodeParametersDesign Content
Hamming code\([7,4,3]_2\)Weight-3 words form \(S(2,3,7)\) = Fano plane
Extended Hamming\([8,4,4]_2\)Weight-4 words form \(3-(8,4,1)\) = \(\mathrm{AG}(3,2)\)
Golay code\([23,12,7]_2\)Weight-7 words form \(4-(23,7,1) = \mathcal{W}_{23}\)
Extended Golay\([24,12,8]_2\)Weight-8 words form \(5-(24,8,1) = \mathcal{W}_{24}\)
Ternary Golay\([11,6,5]_3\)Weight-5 words form \(4-(11,5,1)\)
Ext. ternary Golay\([12,6,6]_3\)Weight-6 words form \(5-(12,6,1) = \mathcal{W}_{12}\)
Reed-Muller \(\mathcal{R}(1,m)\)\([2^m, m+1, 2^{m-1}]\)Weight-\(2^{m-1}\) words form \(3-(2^m, 2^{m-1}, 2^{m-2}-1)\)

Back to top