CO 434: Combinatorial Designs
Christopher Godsil
Estimated study time: 3 hr 11 min
Table of contents
Sources and References
Primary textbook — C. Godsil, Geometry: Finite, Real, Imaginary (course notes, 2026). Available at https://www.math.uwaterloo.ca/~cgodsil/CO434-634/
Supplementary texts — P.J. Cameron & J.H. van Lint, Designs, Graphs, Codes and Their Links (Cambridge, 1991); D.R. Stinson, Combinatorial Designs: Constructions and Analysis (Springer, 2004); E.F. Assmus & J.D. Key, Designs and Their Codes (Cambridge, 1992)
Online resources — C. Godsil’s CO 434/634 course page, University of Waterloo (https://www.math.uwaterloo.ca/~cgodsil/CO434-634/); MIT OCW 18.315 Combinatorial Theory; lecture notes from Peter Cameron (QMUL)
Chapter 1: Incidence Structures and Block Designs
The subject of combinatorial designs begins with a deceptively simple idea: arrange a finite set of objects into subsets subject to precise regularity conditions. The resulting structures — block designs, Steiner systems, Hadamard matrices, and their kin — sit at a remarkable intersection of combinatorics, linear algebra, finite geometry, and group theory. Godsil’s Geometry: Finite, Real, Imaginary approaches these objects through the lens of linear algebraic methods, and these notes follow that perspective throughout.
1.1 Incidence Structures
Every incidence structure has a natural graph-theoretic encoding. The incidence graph (or Levi graph) of \((P, B, I)\) is the bipartite graph with vertex set \(P \cup B\), where \(p \in P\) is adjacent to \(\beta \in B\) if and only if \((p, \beta) \in I\). This graph encodes the full combinatorial data of the structure and connects design theory to spectral graph theory.
The incidence matrix is the workhorse of the algebraic theory. Key properties of a design — regularity, intersection numbers, Fisher-type inequalities — all emerge from rank arguments and products involving \(N\).
Projective and affine planes are the canonical examples of linear spaces. Their rich geometry provides the prototypical constructions for the general theory of block designs.
1.2 Block Designs
The central objects of this course are designs that impose a uniform regularity on how points and blocks interact. The following definition captures the precise notion of a 2-design, also called a balanced incomplete block design (BIBD).
- \(|P| = v\) (number of points),
- \(|B| = b\) (number of blocks),
- every point lies in exactly \(r\) blocks,
- every block contains exactly \(k\) points,
- every pair of distinct points lies in exactly \(\lambda\) blocks.
The five parameters \((v, b, r, k, \lambda)\) are not independent. Counting incidences in two different ways yields the fundamental parameter relations.
Proof. The first identity counts flags \((p, \beta)\) in two ways: summing over points gives \(vr\), summing over blocks gives \(bk\). For the second, fix a point \(x\): the \(r\) blocks through \(x\) each contain \(k-1\) other points, giving \(r(k-1)\) pairs \((x, y)\) with \(x \neq y\) in a common block through \(x\). On the other hand there are \(v-1\) choices for \(y\), each appearing \(\lambda\) times, giving \(\lambda(v-1)\). The third follows by combining the first two.
These relations are necessary but not sufficient for the existence of a design with given parameters. A pair \((v, k, \lambda)\) satisfying these arithmetic conditions is called admissible; whether an admissible set of parameters actually yields a design is a far deeper question, and much of the subject is devoted to it.
1.3 The Fano Plane
The Fano plane is the unique design with parameters \((7, 3, 1)\). It embodies much of the spirit of the subject: a tiny structure with enormous symmetry — its automorphism group is \(\mathrm{PSL}(2, 7)\) of order 168 — and connections running to coding theory (the Hamming code), group theory (the simple group \(\mathrm{GL}(3,2)\)), and geometry (the projective plane over \(\mathbb{F}_2\)).
1.4 Difference Sets
The Fano plane was constructed by taking the translates of a single set in an abelian group. This is the idea of a difference set.
Proof sketch. There are exactly \(v\) blocks (one per group element), each of size \(k\). For any two points \(x \neq y\), the number of blocks \(S + g\) containing both equals \(|\{g \in G : x - g \in S \text{ and } y - g \in S\}| = |\{(s, s') \in S \times S : x - y = s - s'\}| = \lambda\) by the difference set condition.
Difference sets are a major source of symmetric designs. The quadratic residues modulo a prime \(p \equiv 3 \pmod{4}\) form a \(\left(\frac{p-1}{2}\right)\)-element difference set in \(\mathbb{Z}_p\) with \(\lambda = \frac{p-3}{4}\), giving the Paley designs. For example, the quadratic residues mod 7 are \(\{1, 2, 4\}\), yielding the Fano plane (up to relabelling).
The resulting symmetric \((11, 5, 2)\)-design has 11 points and 11 blocks (one per group element, being the translates of \(S\)), e.g., the first few blocks are \(\{1,3,4,5,9\}\), \(\{2,4,5,6,10\}\), \(\{3,5,6,7,0\}\), etc. Each point is in exactly \(k = 5\) blocks, and any two points share exactly \(\lambda = 2\) blocks. This is the “biplane” of order 3.
1.5 Steiner Systems
At the opposite extreme from highly symmetric difference-set designs are Steiner systems, where \(\lambda = 1\): every pair of points lies in exactly one block.
Proof sketch. Necessity: The parameter relations give \(r = (v-1)/2\) and \(b = v(v-1)/6\), forcing \(v \equiv 1\) or \(3 \pmod 6\). Sufficiency is proved by explicit constructions (Kirkman 1847): for \(v \equiv 3 \pmod 6\), use a recursive construction; for \(v \equiv 1 \pmod 6\), use algebraic methods over \(\mathbb{Z}_v\).
Steiner triple systems are among the most studied objects in combinatorics. The smallest is the Fano plane (\(v = 7\)); the next is \(S(2, 3, 9)\), the affine plane \(\mathrm{AG}(2, 3)\), consisting of the \(12\) lines of the \(3 \times 3\) grid.
- Horizontal lines (\(y = c\)): \(\{(0,c),(1,c),(2,c)\}\) for \(c = 0,1,2\).
- Vertical lines (\(x = c\)): \(\{(c,0),(c,1),(c,2)\}\) for \(c = 0,1,2\).
- Slope-1 lines (\(y = x + c\)): \(\{(0,c),(1,c+1),(2,c+2)\}\) mod 3, for \(c = 0,1,2\).
- Slope-2 lines (\(y = 2x + c\)): \(\{(0,c),(1,c+2),(2,c+1)\}\) mod 3, for \(c = 0,1,2\).
1.6 t-Designs
The definition of a 2-design extends naturally.
The derived parameter counting generalises cleanly.
Proof. Fix an \(s\)-subset \(T\). Double-count pairs \((B, U)\) where \(B\) is a block containing \(T\), and \(U\) is a \(t\)-subset with \(T \subseteq U \subseteq B\). Each block containing \(T\) contributes \(\binom{k-s}{t-s}\) such pairs; each \(t\)-set \(U \supseteq T\) is in exactly \(\lambda\) blocks, and there are \(\binom{v-s}{t-s}\) choices for \(U\).
The existence of a \(t\)-design requires that \(\lambda_s\) be a positive integer for all \(0 \leq s \leq t\). These divisibility conditions are necessary but generally not sufficient. The great existence theorem of Wilson (discussed in Chapter 5) shows they are asymptotically sufficient.
Chapter 2: Symmetric Designs and Fisher’s Inequality
2.1 Symmetric Designs
Among all 2-designs, those with \(b = v\) — equivalently, \(r = k\) — occupy a special position. They are called symmetric designs and their theory is substantially richer than the general case, largely because their incidence matrices are square.
The incidence matrix of a symmetric design satisfies a fundamental matrix identity. Since \(N\) is \(v \times v\) in this case, we can compute \(NN^T\) directly.
Proof. The first two identities state that every row sum and every column sum of \(N\) equals \(k\) (each block has \(k\) points, each point is in \(k\) blocks). For the product: \((NN^T)_{ij}\) counts the number of blocks containing both point \(i\) and point \(j\). This is \(k\) if \(i = j\) (each point is in \(k\) blocks) and \(\lambda\) if \(i \neq j\) (any two points share \(\lambda\) blocks). Hence \(NN^T = (k-\lambda)I + \lambda J\).
2.2 Fisher’s Inequality
One of the most elegant results in combinatorics is Fisher’s inequality, which asserts that a non-trivial 2-design must have at least as many blocks as points.
Proof. We show the \(v \times b\) incidence matrix \(N\) has rank \(v\), forcing \(b \geq v\).
Consider \(M = NN^T = (r - \lambda)I + \lambda J\). This is a \(v \times v\) matrix. Its eigenvalues are:
- \(\lambda_1 = r - \lambda + \lambda v = r + \lambda(v-1) = rk\) (eigenvalue for eigenvector \(\mathbf{1}\), since \(J\mathbf{1} = v\mathbf{1}\)),
- \(\lambda_2 = r - \lambda\) (eigenvalue for any vector orthogonal to \(\mathbf{1}\)).
Since \(v > k\), we have \(r > \lambda\) (from \(\lambda(v-1) = r(k-1)\) and \(v > k\)), so \(\lambda_2 = r - \lambda > 0\). Also \(\lambda_1 = rk > 0\). Hence \(M\) is positive definite, so \(\det(M) \neq 0\), which means \(\mathrm{rank}(NN^T) = v\). Since \(\mathrm{rank}(NN^T) = \mathrm{rank}(N)\), we get \(\mathrm{rank}(N) = v\), giving \(b \geq v\).
Fisher’s inequality was first proved by R.A. Fisher in the context of statistical design of experiments (1940). The algebraic proof via the matrix \(NN^T\) is due to Majumdar and later clarified by Bose. The positive-definiteness argument is a model for many results in algebraic combinatorics: encode a counting condition as a matrix identity, then use spectral information.
2.3 Block Intersection in Symmetric Designs
When \(b = v\), the incidence matrix is square and invertible (by Fisher’s proof). This gives a strikingly clean description of how blocks intersect.
Proof. Since \(N\) is \(v \times v\) and invertible, we can compute \(N^T N\). We have \[ N^T N \cdot \mathbf{1} = N^T(k\mathbf{1}) = k \cdot k \mathbf{1}, \] so \(k\) is an eigenvalue of \(N^T N\) with eigenvector \(\mathbf{1}\). For \(\mathbf{x} \perp \mathbf{1}\), \[ N^T N \mathbf{x} = N^T N \mathbf{x}, \]
and since \(NN^T = (k-\lambda)I + \lambda J\), taking determinants shows \(\det(N^TN) = \det(NN^T)\), so \(N^TN\) has the same eigenvalues as \(NN^T\). Because \(N\) is invertible, \(N^TN = (k-\lambda)I + \lambda J\) as well (this follows since \(N(N^TN) = (NN^T)N\) and the matrix polynomial \((k-\lambda)I + \lambda J\) is the unique solution). Therefore \((N^TN)_{ij} = k\) for \(i=j\) and \(\lambda\) for \(i \neq j\), meaning any two blocks share exactly \(\lambda\) points.
Proof. The dual has incidence matrix \(N^T\). We showed \(N^TN = (k-\lambda)I + \lambda J\), which is the condition for the dual to be a design with the same parameters.
The self-duality of symmetric designs is a beautiful feature absent in the general case. The Fano plane is self-dual: its dual is again the Fano plane (up to isomorphism).
Let us verify the symmetric design property: any two original points (now acting as dual blocks) share exactly \(\lambda = 1\) original block. Points 0 and 1 both lie in \(B_0\) only — exactly one block, confirming \(\lambda = 1\). Points 0 and 2 both lie in \(B_6 = \{6,0,2\}\) only. Points 1 and 4 both lie in \(B_1 = \{1,2,4\}\) only. One can verify all \(\binom{7}{2} = 21\) pairs similarly; each pair of original points shares exactly one block, confirming that the dual is again a \((7,3,1)\)-design — the Fano plane itself.
2.4 Projective Planes as Symmetric Designs
The standard construction uses vector spaces over finite fields. Let \(\mathbb{F}_q\) be the field with \(q = p^m\) elements.
- Points: 1-dimensional subspaces of \(\mathbb{F}_q^{d+1}\),
- Blocks (\(j\)-flats): \((j+1)\)-dimensional subspaces of \(\mathbb{F}_q^{d+1}\).
More generally, the 2-design of points and hyperplanes in \(\mathrm{PG}(d, q)\) has parameters
\[ v = \frac{q^{d+1}-1}{q-1}, \quad k = \frac{q^d - 1}{q-1}, \quad \lambda = \frac{q^{d-1}-1}{q-1}. \]Projective planes of order \(n\) exist for all prime powers \(n\). Whether non-prime-power orders are possible is the central open problem of projective geometry. The famous Bruck–Ryser theorem (1949), later extended by Chowla–Ryser, provides a necessary condition that eliminates many cases.
- Points: \(n^2+n+1 - (n+1) = n^2\) points,
- Lines: those original blocks not equal to \(\ell_\infty\) — that is, \(n^2+n+1 - 1 = n^2+n\) lines,
- Each line has \(n+1 - 1 = n\) points (after deleting the intersection with \(\ell_\infty\)),
- Each pair of points lies on exactly 1 line (since the original design had \(\lambda = 1\), and the deleted line did not contain any pair of affine points).
2.5 The Bruck–Ryser–Chowla Theorem
- If \(v\) is even, then \(k - \lambda\) must be a perfect square.
- If \(v\) is odd, the Diophantine equation \[ x^2 = (k - \lambda)\,y^2 + (-1)^{(v-1)/2}\,\lambda\,z^2 \] must have a solution in integers, not all zero.
The proof uses the theory of rational quadratic forms and the Hasse–Minkowski theorem. The incidence matrix \(N\) of a symmetric design yields a quadratic form over \(\mathbb{Q}\): the form associated to \(N^TN = (k-\lambda)I + \lambda J\). The Hasse–Minkowski theorem requires this form to be equivalent (over all \(p\)-adic completions \(\mathbb{Q}_p\)) to the form on the right-hand side of the equation. When the local conditions fail — i.e., the equation has no \(p\)-adic solution for some prime \(p\) — no design exists.
For projective planes, \(\lambda = 1\) and the condition becomes: if \(n \equiv 1\) or \(2 \pmod{4}\), then \(n\) must be a sum of two squares. This eliminates \(n = 6\) (since \(6 \not\equiv 0, 3 \pmod 4\) and \(6\) is not a sum of two squares) and \(n = 14\). The non-existence of a projective plane of order 10 was proved by Lam, Thiel, and Swiercz (1989) using an exhaustive computer search — one of the largest computations in mathematics at the time.
The BRC theorem is illustrative of a general principle: existence questions for designs translate into questions about quadratic forms, and algebraic obstructions can prevent existence even when arithmetic conditions are met.
As another example: a symmetric \((37, 9, 2)\)-design. Check: \(k(k-1) = 72 = \lambda(v-1) = 2 \times 36 = 72\). \(\checkmark\) Here \(v = 37\) is odd and \((v-1)/2 = 18\) is even, so \((-1)^{(v-1)/2} = 1\). The BRC equation is \(x^2 = (k-\lambda)y^2 + \lambda z^2 = 7y^2 + 2z^2\). Taking \(y = 1, z = 0\) gives \(x^2 = 7\) — not a perfect square. Try \(y = 0, z = 1\): \(x^2 = 2\) — not a square. Try \(y = 1, z = 1\): \(x^2 = 9\), so \(x = 3\). The equation \(3^2 = 7(1)^2 + 2(1)^2\) holds: \(9 = 7 + 2\). \(\checkmark\) So BRC does not rule out a \((37,9,2)\)-design. Indeed, such designs are known to exist (they arise from the unique biplane on 37 points).
2.6 The Ray-Chaudhuri-Wilson Theorem
Fisher’s inequality \(b \geq v\) can be dramatically strengthened when additional intersection conditions are imposed. The Ray-Chaudhuri-Wilson theorem is one of the great achievements of algebraic combinatorics, giving a tight bound on the size of set families with prescribed intersection sizes.
Chapter 3: Orthogonal Latin Squares and Orthogonal Arrays
3.1 Latin Squares
A Latin square of order \(n\) is the combinatorial analogue of a multiplication table.
Latin squares are equivalent to one-dimensional block designs and encode the structure of quasigroups. The canonical example is the multiplication table of \(\mathbb{Z}_n\): entry \((i, j)\) is \(i + j \pmod{n}\).
The question of how many MOLS can exist of a given order \(n\) is one of the oldest problems in combinatorics, going back to Euler. The answer is now largely known, with a few stubborn small cases remaining.
Proof sketch. Identify the rows, columns, and symbols with elements of \(\mathbb{F}_q\) (where \(q = n = p^m\)). For each \(\alpha \in \mathbb{F}_q \setminus \{0\}\), define the Latin square \(L_\alpha\) by \(L_\alpha(i, j) = \alpha i + j\). One checks these are pairwise orthogonal: if \(\alpha \neq \beta\), the system \(\alpha i + j = a\), \(\beta i + j = b\) has the unique solution \(i = (a-b)/(\alpha - \beta)\), \(j = a - \alpha i\).
The nine pairs are exactly all nine ordered pairs from \(\{0,1,2\}^2\), each appearing once. \(\checkmark\) So \(N(3) \geq 2\), and since \(q - 1 = 2\), we have \(N(3) = 2\) exactly (the upper bound \(N(n) \leq n-1\) for all \(n\) follows from a counting argument: each of the \(n-1\) non-trivial symbols in the first row of any MOLS must be distinct).
3.2 Euler’s Conjecture and Its Refutation
The Euler conjecture (1782) stated that no pair of MOLS exists for \(n \equiv 2 \pmod{4}\). This was verified for \(n = 2\) (trivially) and \(n = 6\) (by exhaustive computation by Tarry in 1901), and remained open for nearly 180 years.
The conjecture was dramatically refuted by Bose, Shrikhande, and Parker in 1960:
The case \(n = 6\) (no pair of MOLS of order 6) was proved by Tarry’s exhaustive case analysis, with no known short proof. This is equivalent to the non-existence of a resolvable \(S(2, 3, 7)\) with a specific additional structure, and also to the non-existence of a projective plane of order 6.
The MacNeish conjecture (that \(N(n) = \min_i(p_i^{m_i}) - 1\) where \(n = \prod p_i^{m_i}\)) was also refuted by the Bose–Shrikhande–Parker construction.
| Order \(n\) | \(N(n)\) |
|---|---|
| 2 | 1 |
| 3 | 2 |
| 4 | 3 |
| 5 | 4 |
| 6 | 1 |
| 7 | 6 |
| 8 | 7 |
| 9 | 8 |
| 10 | \(\geq 2\) (exact value unknown) |
3.3 Orthogonal Arrays
Latin squares are a special case of a broader combinatorial structure.
The parameter \(t\) is the strength, \(k\) is the number of constraints (rows), and \(n\) is the number of levels. The correspondence with Latin squares is:
- \(\mathrm{OA}(2, 3, n)\) ↔ Latin square of order \(n\): the three rows encode row index, column index, and entry.
- A set of \(m\) MOLS of order \(n\) ↔ \(\mathrm{OA}(2, m+2, n)\).
Orthogonal arrays arise in statistics (factorial experiments), coding theory (error-correcting codes), and cryptography (authentication codes). An \(\mathrm{OA}(t, k, n)\) is equivalent to a code with certain distance properties.
Concretely: the Hamming code \(\mathrm{Ham}(r, q)\) has parameters \([n = (q^r-1)/(q-1), n-r, 3]_q\). Its parity check matrix \(H\) (an \(r \times n\) matrix) forms an \(\mathrm{OA}(2, n, q)\) since any 2 columns of \(H\) are distinct (minimum distance 3 means no two columns are proportional). This gives the connection: a perfect 1-error-correcting code (Hamming code) corresponds to a Steiner system \(S(2, q, n)\) corresponds to an OA of strength 2.
Chapter 4: Hadamard Matrices
4.1 Definition and Basic Properties
The rows of \(H\) form an equiangular frame: they are \(n\) vectors of norm \(\sqrt{n}\) in \(\mathbb{R}^n\) with all pairwise inner products equal to zero. Hadamard matrices are of great practical importance in signal processing, coding theory, and quantum information.
Proof. Consider any three rows \(r_1, r_2, r_3\) of \(H\). Each row has \(n\) entries \(\pm 1\). Classify the \(n\) columns into four types by the pattern of \(+1, -1\) in rows 1 and 2: let \(n_{++}, n_{+-}, n_{-+}, n_{--}\) be the counts. Orthogonality of rows 1, 2 gives \(n_{++} + n_{--} = n_{+-} + n_{-+} = n/2\). Orthogonality of rows 1, 3 and rows 2, 3 gives further constraints, and combining these with the fact that all four counts are non-negative integers forces \(4 \mid n\).
The Hadamard conjecture asserts that Hadamard matrices exist for all orders \(n \equiv 0 \pmod{4}\). This remains one of the major open problems in combinatorics. The smallest unresolved case was \(n = 668\) as of 2025.
- Sylvester construction: all powers of 2, giving \(H_1, H_2, H_4, H_8, H_{16}, \ldots\)
- Paley type I: \(H_{q+1}\) for prime powers \(q \equiv 3 \pmod 4\), covering \(n = 4, 8, 12, 20, 24, 28, 32, \ldots\)
- Paley type II: \(H_{2(q+1)}\) for prime powers \(q \equiv 1 \pmod 4\), covering \(n = 12, 24, 36, \ldots\)
- Kronecker products: if \(H_m\) and \(H_n\) exist, then \(H_{mn}\) exists, greatly extending coverage.
- Direct constructions: by computer search or algebraic methods for specific small orders.
4.2 Constructions
Sylvester’s construction (1867) produces Hadamard matrices of all powers-of-2 orders.
The resulting matrices are the Walsh–Hadamard matrices and are fundamental in signal processing (fast Walsh–Hadamard transform) and quantum computing (Hadamard gates).
Let us verify orthogonality by computing all six dot products between distinct rows:
- Rows 1 and 2: \((+1)(+1) + (+1)(-1) + (+1)(+1) + (+1)(-1) = 1 - 1 + 1 - 1 = 0\). \(\checkmark\)
- Rows 1 and 3: \((+1)(+1) + (+1)(+1) + (+1)(-1) + (+1)(-1) = 1 + 1 - 1 - 1 = 0\). \(\checkmark\)
- Rows 1 and 4: \((+1)(+1) + (+1)(-1) + (+1)(-1) + (+1)(+1) = 1 - 1 - 1 + 1 = 0\). \(\checkmark\)
- Rows 2 and 3: \((+1)(+1) + (-1)(+1) + (+1)(-1) + (-1)(-1) = 1 - 1 - 1 + 1 = 0\). \(\checkmark\)
- Rows 2 and 4: \((+1)(+1) + (-1)(-1) + (+1)(-1) + (-1)(+1) = 1 + 1 - 1 - 1 = 0\). \(\checkmark\)
- Rows 3 and 4: \((+1)(+1) + (+1)(-1) + (-1)(-1) + (-1)(+1) = 1 - 1 + 1 - 1 = 0\). \(\checkmark\)
From the orthogonality conditions:
- \(\langle r_1, r_1 \rangle = n\): trivially \(n_{++} + n_{+-} + n_{-+} + n_{--} = n\).
- \(\langle r_1, r_2 \rangle = 0\): \((n_{++} + n_{-+}) - (n_{+-} + n_{--}) = 0\), so \(n_{++} + n_{-+} = n_{+-} + n_{--} = n/2\). Hence \(2 \mid n\).
Hadamard matrices have striking applications in coding theory: the rows of a \(\pm 1\) Hadamard matrix of order \(n\) (after mapping \(+1 \mapsto 0\) and \(-1 \mapsto 1\)) give a binary code of length \(n\), size \(2n\), and minimum Hamming distance \(n/2\). This is the Hadamard code (or first-order Reed-Muller code), which achieves the Plotkin bound: for a binary code of length \(n\) and minimum distance \(d > n/2\), the code size is at most \(2\lfloor d/(2d-n) \rfloor\). Hadamard codes are also used in the Walsh-Hadamard transform, which underlies spectral analysis in signal processing and the design of CDMA (code-division multiple-access) communication systems.
The Paley construction, introduced by Raymond Paley in 1933, is the first non-trivial infinite family beyond powers of 2, and it reveals a deep connection between Hadamard matrices and number theory. The key observation is that the quadratic residues of a finite field \( \mathbb{F}_q \) split the nonzero elements into two equal halves — squares and non-squares — and this balanced partition automatically produces a matrix with the orthogonality properties needed for Hadamard. Heuristically: a Hadamard matrix needs every pair of distinct rows to agree on exactly half the columns and disagree on the other half; the Legendre symbol \( \chi(j-i) \) assigns \( \pm 1 \) to each pair according to whether their difference is a square in \( \mathbb{F}_q \), and the multiplicative structure of \( \mathbb{F}_q^* \) guarantees the required balance.
- If \(q \equiv 3 \pmod{4}\), there exists a Hadamard matrix of order \(q + 1\).
- If \(q \equiv 1 \pmod{4}\), there exists a Hadamard matrix of order \(2(q+1)\).
Construction. Let \(\chi: \mathbb{F}_q^* \to \{+1, -1\}\) be the quadratic character (Legendre symbol), extended by \(\chi(0) = 0\). Define the Paley matrix \(Q\) of order \(q\) by \(Q_{ij} = \chi(j - i)\) for \(i, j \in \mathbb{F}_q\). Then \(Q\) is a symmetric (resp. skew-symmetric) matrix for \(q \equiv 1\) (resp. \(\equiv 3\)) \(\pmod 4\), and satisfies \(QQ^T = qI - J\). The Hadamard matrix is then \[ H = I + \begin{pmatrix} 0 & \mathbf{1}^T \\ \mathbf{1} & Q \end{pmatrix} \] (with appropriate sign adjustments).
The \(7 \times 7\) Paley matrix \(Q\) has entries \(Q_{ij} = \chi(j - i \bmod 7)\). The first row (for \(i = 0\)) is:
\[ Q_{0,j} = \chi(j): \quad \chi(0)=0,\, \chi(1)=+1,\, \chi(2)=+1,\, \chi(3)=-1,\, \chi(4)=+1,\, \chi(5)=-1,\, \chi(6)=-1. \]So the first row is \((0, +, +, -, +, -, -)\). The full matrix is circulant: each subsequent row is a cyclic shift of the previous. One verifies that \(Q\) is skew-symmetric (\(Q^T = -Q\) for \(q \equiv 3 \pmod 4\)) and satisfies \(QQ^T = qI - J + J = 7I - J\) (using the identity \(\sum_{a \in \mathbb{F}_q^*} \chi(a)\chi(a+b) = -1\) for \(b \neq 0\)).
The Hadamard matrix of order 8 is then constructed as:
\[ H_8 = \begin{pmatrix} 1 & \mathbf{1}^T \\ \mathbf{1} & Q + I_7 \end{pmatrix} \](after replacing 0 entries in \(Q\) by \(+1\) along the diagonal). One checks \(H_8 H_8^T = 8I_8\).
The Paley and Sylvester constructions together give Hadamard matrices of many orders. Various tensor product and “doubling” constructions extend the range further.
4.3 Hadamard Designs
One of the most important connections between Hadamard matrices and block designs is the following construction.
The Fano plane arises as the Hadamard design from \(H_8\) (the \(8 \times 8\) Walsh–Hadamard matrix). The Hadamard 3-designs are the closely related \(3\)-(4t, 2t, t-1) designs obtained from the full \(4t \times 4t\) Hadamard matrix.
Hadamard matrices and their associated designs are deeply connected to coding theory: the rows of a Hadamard matrix encode the codewords of a first-order Reed–Muller code, which achieves the best possible rate-distance trade-off for a binary code meeting the Plotkin bound.
Chapter 5: t-Designs and the Witt Designs
Everything in Chapters 1–4 dealt primarily with 2-designs (\( t = 2 \)) — structures where every pair of points appears in \( \lambda \) common blocks. These are already rich and difficult to classify. The natural generalization asks: what if every \( t \)-subset of points is covered exactly \( \lambda \) times? For \( t \geq 3 \), existence becomes dramatically more constrained and the known examples are far rarer. The most celebrated such examples are the Witt designs: the unique 4-(23, 7, 1) and 5-(24, 8, 1) designs, and their relatives, discovered by Ernst Witt in 1938. These designs are not just combinatorial curiosities — their automorphism groups are the Mathieu groups \( M_{22}, M_{23}, M_{24} \), the smallest of the 26 sporadic simple groups. The Witt designs thus sit at the intersection of combinatorial design theory and the classification of finite simple groups, making Chapter 5 a meeting point between the combinatorics of blocks and the deepest reaches of group theory.
5.1 Existence Questions for t-Designs
For \(t \geq 3\), the existence of \(t\)-designs with small \(\lambda\) is a delicate question. The necessary divisibility conditions for a \(t\)-(v, k, \lambda) design are that for each \(0 \leq s \leq t\),
\[ \lambda_s = \lambda \cdot \frac{\binom{v-s}{t-s}}{\binom{k-s}{t-s}} \in \mathbb{Z}_{>0}. \]For a long time, only finitely many non-trivial \(t\)-designs with \(t \geq 6\) and \(\lambda = 1\) were known. Wilson’s theorem resolved the asymptotic question completely.
Proof idea. Wilson's proof constructs designs from difference families in \(\mathbb{Z}_v\) and uses algebraic methods to show the required structures exist for large \(v\). The key ingredient is the "PBD-closure" machinery: if \(v\) is large enough and admissible, one can decompose \(\binom{P}{t}\) (the collection of all \(t\)-subsets of a \(v\)-set) into blocks of size \(k\).
Wilson’s theorem is one of the great achievements of combinatorics. However, it is existential and gives no bound on “sufficiently large.” The quest for small \(t\)-designs, especially with \(t \geq 5\) and small \(v\), requires very different techniques.
- A nibble (random greedy hypergraph matching) to find an approximate design,
- An absorption step to convert the approximate design to an exact one,
- Algebraic structure (group theory over \(\mathbb{Z}_v\) or \(\mathbb{F}_q^m\)) to ensure the divisibility conditions are met.
5.2 Derived and Residual Designs
Two operations on \(t\)-designs produce designs with smaller parameters.
- Fix a point \(p \in P\). The derived design \(\mathcal{D}_p\) has point set \(P \setminus \{p\}\) and blocks \(\{B \setminus \{p\} : p \in B\}\). This is a \((t-1)\)-(v-1, k-1, \lambda) design.
- The residual design \(\mathcal{D}^p\) has point set \(P \setminus \{p\}\) and blocks \(\{B : p \notin B\}\). This is a \((t-1)\)-(v-1, k, \lambda_{t-1} - \lambda) design.
These operations are key in proving uniqueness of designs: one shows that the derived and residual designs are unique (by induction on \(t\) or \(v\)), and then patches them together.
- Points: \(24 - 1 = 23\) points (all but \(p\)),
- Blocks: octads of \(\mathcal{W}_{24}\) containing \(p\), each reduced by \(p\); each such octad becomes a 7-subset of the 23 remaining points,
- Number of blocks: \(\lambda_1 = 759 \times 8/24 = 253\) blocks (each of the 759 octads contains \(8\) points; the replication number \(r = \lambda_1\) for \(\mathcal{W}_{24}\) as a \(1\)-design is \(759 \times 8/24 = 253\)),
- Design parameters: every 4-subset of the 23 remaining points is covered \(\lambda = 1\) time, so the derived design is a \(4\)-(23, 7, 1) design — which is \(\mathcal{W}_{23}\).
5.3 The Witt Designs
The most celebrated \(t\)-designs are the Witt designs, discovered by Ernst Witt in 1938. They are the unique \(5\)-designs with the parameters given below, and their automorphism groups are the Mathieu groups — some of the smallest and most mysterious sporadic simple groups.
- 1 codeword of weight 0 (the zero vector),
- 264 codewords of weight 6,
- 440 codewords of weight 9,
- 24 codewords of weight 12.
The Witt designs provide the geometric foundation for three of the five:
- \(M_{22}\) is the automorphism group of the unique \(3\)-(22, 6, 1) design (derived from \(\mathcal{W}_{24}\) by fixing two points).
- \(M_{23}\) is the automorphism group of the unique \(4\)-(23, 7, 1) design (derived from \(\mathcal{W}_{24}\) by fixing one point).
- \(M_{24}\) is the automorphism group of \(\mathcal{W}_{24}\) itself.
The uniqueness of \(\mathcal{W}_{24}\) (proved by Witt) uses the derived/residual technique: one shows that derived designs at each step are unique, ultimately reducing to the uniqueness of the Fano plane. This chain of uniqueness results is a beautiful exercise in design theory.
The octads of \(\mathcal{W}_{24}\) encode deep structure: the Leech lattice \(\Lambda_{24}\) (the densest known sphere packing in \(\mathbb{R}^{24}\)) can be constructed from \(\mathcal{G}_{24}\), and the automorphism group of \(\Lambda_{24}\) is the Conway group \(Co_0\), which contains \(M_{24}\) as a subgroup.
| Design | Parameters | Blocks | Automorphism Group |
|---|---|---|---|
| \(\mathcal{W}_{12}\) | \(5\)-(12, 6, 1) | 132 | \(M_{12}\) |
| \(\mathcal{W}_{24}\) | \(5\)-(24, 8, 1) | 759 | \(M_{24}\) |
5.4 Uniqueness and the Mathieu Groups
The Mathieu groups \(M_{11}, M_{12}, M_{22}, M_{23}, M_{24}\) were discovered by Émile Léonard Mathieu in 1861 and 1873 — the first sporadic simple groups to be found. Their rediscovery via the Witt designs in 1938 placed them on a firm combinatorial foundation.
Proof sketch for \(\mathcal{W}_{24}\). Any \(5\)-(24, 8, 1) design \(\mathcal{D}\) has a derived design \(\mathcal{D}_p\), which is a \(4\)-(23, 7, 1) design. One shows this derived design is unique (it is the unique \(4\)-(23, 7, 1) design, associated with \(M_{23}\)). Then the residual of \(\mathcal{D}_p\) is a \(3\)-(22, 6, 1) design (associated with \(M_{22}\)), also unique. Knowing the derived design determines \(\mathcal{D}\) uniquely.
Chapter 6: Association Schemes and Distance-Regular Graphs
6.1 Association Schemes
Association schemes provide a unified algebraic framework for studying distance-regular graphs, strongly regular graphs, and many families of combinatorial designs. The concept was introduced by Bose and Shimamoto (1952) in the context of statistical design of experiments.
- \(R_0 = \{(x,x) : x \in X\}\) is the diagonal.
- For each \(i\), if \((x,y) \in R_i\) then \((y,x) \in R_i\) (symmetry).
- For each \(i, j, k\), the number \[ p^k_{ij} = |\{z \in X : (x,z) \in R_i \text{ and } (z,y) \in R_j\}| \] is constant over all \((x,y) \in R_k\). These are the intersection numbers (or Krein parameters).
The integers \(p^k_{ij}\) are the structure constants of the scheme. Notice \(p^0_{ij} = 0\) unless \(j = i\) (the “transpose” relation), and \(p^k_{00} = \delta_{0k}\).
Let us verify the axioms for the smallest non-trivial example, \(J(4,2)\). Here \(X\) consists of the \(\binom{4}{2} = 6\) two-element subsets of \(\{1,2,3,4\}\): \(\{12, 13, 14, 23, 24, 34\}\) (abbreviating \(\{a,b\}\) as \(ab\)). The three associate classes are:
- \(R_0\): each set paired with itself (identity). Valency \(k_0 = 1\).
- \(R_1\): pairs sharing exactly 1 element (\(|A \cap B| = 1\)). Each 2-subset \(A\) shares one element with \(2(v-k) = 4\) other 2-subsets. Valency \(k_1 = 4\).
- \(R_2\): disjoint pairs (\(|A \cap B| = 0\)). Each 2-subset is disjoint from exactly \(\binom{v-k}{k} = \binom{2}{2} = 1\) other 2-subset. Valency \(k_2 = 1\).
The intersection numbers \(p^2_{11}\) (the number of \(C\) such that \(|A \cap C| = |B \cap C| = 1\), given \(|A \cap B| = 1\)) can be computed as follows: with \(A = \{1,2\}\) and \(B = \{1,3\}\), we need \(C\) sharing exactly one element with each. The sets are: \(\{1,4\}\) (shares 1 with both, so \(|A \cap C| = 1\) and \(|B \cap C| = 1\)), \(\{2,3\}\) (shares 1 element with each), \(\{2,4\}\) (shares \(\{2\}\) with \(A\) and nothing with \(B\), so not counted), and so on. One finds \(p^2_{11} = 2\). All such intersection numbers for \(J(4,2)\) are determined by the scheme’s parameters and are tabulated as part of its structure.
The power of the association scheme framework for coding theory comes from the Delsarte LP bound (also called the linear programming bound): a binary code \(C \subseteq \{0,1\}^n\) with minimum distance \(\geq d\) has size at most the optimal value of a linear program whose constraints are encoded in the \(Q\)-matrix of the scheme. Specifically, the inner distribution \((a_0, a_1, \ldots, a_n)\) of \(C\) (where \(a_i = |C|^{-1} |\{(x,y) \in C^2 : d_H(x,y)=i\}|\)) satisfies \(\sum_j Q_{ij} a_j \geq 0\) for all \(i\), and \(a_i = 0\) for \(1 \leq i < d\). Optimising \(|C| = \sum_i k_i a_i\) subject to these constraints gives the LP bound. This recovers and strengthens classical bounds: the Hamming bound, the Singleton bound, and the Plotkin bound all follow as special cases. The dual of the LP bound gives the Fisher/Ray-Chaudhuri-Wilson type lower bounds on the number of codewords at each distance — closing a beautiful loop between the design-theoretic and coding-theoretic sides of the subject.
6.2 The Bose–Mesner Algebra
The power of association schemes lies in their associated matrix algebra.
- \(A_i A_j = \sum_k p^k_{ij} A_k\) (by definition of intersection numbers),
- \(\sum_i A_i = J\) (the all-ones matrix),
- \(A_i^T = A_i\) for all \(i\),
- The \(A_i\) are simultaneously diagonalisable over \(\mathbb{R}\).
The Bose–Mesner algebra has a second distinguished basis: the minimal idempotents \(E_0, E_1, \ldots, E_d\), which satisfy \(E_i E_j = \delta_{ij} E_i\) and \(\sum_i E_i = I\). The change-of-basis matrices between \(\{A_i\}\) and \(\{E_j\}\) are the eigenvalue matrix \(P\) and its Krein-dual \(Q\):
\[ A_i = \sum_j P_{ji} E_j, \qquad n E_j = \sum_i Q_{ij} A_i. \]The matrices \(P\) and \(Q\) play dual roles in the theory. The Delsarte linear programming bound uses \(Q\) to bound the size of codes and cliques in schemes.
- \(A_0 = I_6\) (identity),
- \(A_1\): the \(6 \times 6\) 0-1 matrix where \((A_1)_{AB} = 1\) iff \(|A \cap B| = 1\) (adjacent pairs sharing one element),
- \(A_2\): the \(6 \times 6\) 0-1 matrix where \((A_2)_{AB} = 1\) iff \(|A \cap B| = 0\) (the perfect matching — each 2-subset paired with its complement).
(rows indexed by eigenspace, columns by associate class). The \(Q\)-matrix is \(Q = (n/k_j) P^{-T}\) up to scaling. For the Johnson scheme, \(Q\) is closely related to the Eberlein polynomials — the dual Krawtchouk polynomials — and encodes the LP bound constraints for codes in \(J(4,2)\).
6.3 Strongly Regular Graphs
The simplest non-trivial association schemes have \(d = 2\).
The adjacency matrix of an \(\mathrm{srg}(n,k,\lambda,\mu)\) satisfies the polynomial identity \(A^2 = kI + \lambda A + \mu(J - I - A)\), giving three eigenvalues \(k\) and \(r, s = \frac{(\lambda - \mu) \pm \sqrt{(\lambda-\mu)^2 + 4(k-\mu)}}{2}\).
- Integrality: either \((\lambda - \mu)^2 + 4(k - \mu)\) is a perfect square, or the multiplicities of the eigenvalues \(r\) and \(s\) are both equal to \((n-1)/2\) (the "conference graph" case, requiring \(n \equiv 1 \pmod 4\)).
- Krein conditions: a set of polynomial inequalities involving \(n, k, \lambda, \mu\) derived from the fact that the Hadamard product of two positive semidefinite matrices is positive semidefinite (applied to the Bose–Mesner algebra).
- Absolute bound: \(n \leq \frac{1}{2}(f+2)(f+1)\) where \(f\) is the multiplicity of the smallest eigenvalue.
For \(q = 13\) (Paley graph on 13 vertices): \(\mathrm{srg}(13, 6, 2, 3)\). Verify: \(n = 13\), \(k = 6\), \(\lambda = 2\) (two common neighbours for adjacent vertices), \(\mu = 3\) (three for non-adjacent). Check integrality: \((\lambda-\mu)^2 + 4(k-\mu) = (-1)^2 + 4 \times 3 = 13\). The eigenvalues are \((−1 \pm \sqrt{13})/2\) — irrational! This is the conference graph case: \(n = 13 \equiv 1 \pmod 4\), and the eigenvalue multiplicities are both \((13-1)/2 = 6\).
6.4 Distance-Regular Graphs
Setting \(a_i = k - b_i - c_i\) (the number of neighbours at the same distance), we get \(A^2\) and higher powers of \(A\) expressible in terms of the tridiagonal recurrence given by the intersection array. This gives a \((D+1)\)-class association scheme.
From the intersection array, the adjacency matrix \(A\) satisfies a polynomial relation: \(A^2 = 3I + 2(J-I-A) = 3I + 2J - 2I - 2A = I - 2A + 2J\). Hence \(A^2 + 2A - I = 2J\), so the minimal polynomial of \(A\) divides \(\det(xI - A - J) = ...\) — equivalently, the eigenvalues of \(A\) satisfy \(\lambda^2 + 2\lambda - 1 = 2v_J\) where \(v_J\) is the eigenvalue of \(J\). With \(J \mathbf{1} = 10 \mathbf{1}\) and \(J v = 0\) for \(v \perp \mathbf{1}\): eigenvalue \(\lambda = 3\) (for \(\mathbf{1}\)); for \(v \perp \mathbf{1}\): \(\lambda^2 + 2\lambda - 1 = 0\), giving \(\lambda = -1 \pm \sqrt{2}\). But the Petersen graph has eigenvalues \(3, 1, -2\) — let me recompute. From \(A^2 = I + \mu(J-I-A)\) (the SRG equation with \(\mu = 1\)): \(A^2 = I + J - I - A = J - A\). So \(A^2 + A = J\). Eigenvalue of \(J\) on \(\mathbf{1}\) is 10, so \(\lambda^2 + \lambda = 10\), giving \(\lambda = 3\). For \(v \perp \mathbf{1}\): \(\lambda^2 + \lambda = 0\), so \(\lambda = 0\) or \(\lambda = -1\). The Petersen graph has eigenvalues \(3\) (multiplicity 1), \(1\) (multiplicity 5), and \(-2\) (multiplicity 4). The discrepancy is because I confused \(\lambda_{SRG} = 0\) (adjacent common neighbours) — the SRG equation is \(A^2 = kI + \lambda_{srg} A + \mu(J - I - A)\) with \(k = 3, \lambda_{srg} = 0, \mu = 1\): \(A^2 = 3I + 0 + (J - I - A) = 2I + J - A\), giving \(A^2 + A - 2I = J\). Eigenvalues: for \(\mathbf{1}\): \(9 + 3 - 2 = 10 = 10\), \(\checkmark\). For \(v \perp \mathbf{1}\): \(\lambda^2 + \lambda - 2 = 0\), so \((\lambda+2)(\lambda-1) = 0\), giving \(\lambda \in \{-2, 1\}\). \(\checkmark\)
- The Hamming graph \(H(d, n)\) has vertices the words in \(\{0,\ldots,n-1\}^d\), adjacent if they differ in exactly one coordinate. Its intersection array is \(\{d(n-1), (d-1)(n-1), \ldots; 1, 2, \ldots, d\}\).
- The Johnson graph \(J(n, k)\) has vertices the \(k\)-subsets of an \(n\)-set, adjacent if their symmetric difference has size 2. Its intersection array is \(\{k(n-k), (k-1)(n-k-1), \ldots; 1, 4, \ldots\}\).
Distance-regular graphs arise as coset graphs of codes, orbital graphs of permutation groups, and geometries. The Delsarte–Goethals–Seidel bound on the size of codes in Johnson schemes connects designs to distance-regular graphs in a fundamental way.
6.5 Delsarte’s Linear Programming Bound
The Bose–Mesner algebra and the \(Q\)-matrix lead to Delsarte’s celebrated bound.
Delsarte’s LP bound (1973) unified and improved previously known bounds on error-correcting codes, and its dual gives lower bounds on designs (the “Fisher-type” bound on the number of blocks, and later the absolute bound on equiangular lines). It is a cornerstone of algebraic combinatorics.
More explicitly, for \(n = 7\), \(d = 3\) (the Hamming code): the LP bound gives \(|C| \leq 16 = 2^{7-3}\). The \([7,4,3]\) Hamming code achieves this with 16 codewords. The LP bound is tight, confirming the Hamming code is optimal among all binary codes of length 7 and minimum distance 3.
Chapter 7: Lines, Spherical Designs, and Mutually Unbiased Bases
7.1 Equiangular Lines
Sets of equiangular lines are equivalent to certain association schemes, and their study connects design theory to spectral graph theory and quantum information. The Gram matrix \(G_{ij} = \langle u_i, u_j \rangle\) (where we choose unit vectors \(u_i\) for each line, choosing the sign to make the Gram matrix as uniform as possible) satisfies a polynomial equation constraining the spectrum of \(G\), which in turn bounds \(m\).
In \(\mathbb{R}^3\), the maximum is \(\binom{4}{2} = 6\). Six equiangular lines in \(\mathbb{R}^3\) with angle \(\arccos(1/\sqrt{5})\) exist and correspond to the six faces of the icosahedron paired with their opposite faces (or equivalently, the 6 diagonals of the icosahedron). These lines are also related to the root system of the Lie algebra \(A_3\) (or equivalently \(D_3\)) after projectivisation.
Proof. Each line \(\ell_i\) determines a rank-1 matrix \(u_i u_i^T \in \mathrm{Sym}^2(\mathbb{R}^d)\). The space of symmetric \(d \times d\) matrices has dimension \(\binom{d+1}{2}\). One shows the matrices \(u_i u_i^T\) are linearly independent (using the equiangularity condition and the Gram matrix argument), giving the bound.
The problem of determining the maximum number of equiangular lines in \(\mathbb{R}^d\) for all \(d\) is currently active research. Bukh (2016) and Lin–Yu (2020) proved asymptotic bounds; the exact answer is known for small \(d\) and for specific infinite families.
7.2 Spherical Designs
Spherical designs generalise the notion of a design from finite sets to the unit sphere, providing a framework for numerical integration that is exact for polynomials up to a given degree.
In other words, \(X\) is a spherical \(t\)-design if and only if the average of every harmonic polynomial of degree at most \(t\) over \(X\) is zero. This is the continuous analogue of the discrete uniformity condition in a \(t\)-design.
Tight spherical designs are the analogues of Steiner systems in the spherical setting. They are rare and beautiful: examples include the vertices of the regular simplex (tight 2-design in \(S^{d-1}\)), the vertices of the regular icosahedron (tight 5-design in \(S^2\)), and the minimal vectors of the \(E_8\) lattice (a tight 7-design on \(S^7\) with 240 points).
7.3 Mutually Unbiased Bases
Mutually unbiased bases (MUBs) arise in quantum mechanics as measurement bases that are maximally incompatible: measuring in one basis gives no information about the outcome of measuring in the other.
Proof. Consider the \(d^2 - 1\) traceless Hermitian matrices of unit Frobenius norm that are rank-1 projectors \(\{u_i u_i^* : u_i \in \mathcal{B}\} \setminus \{I/d\}\). Vectors from different MUBs are orthogonal in the Hilbert–Schmidt inner product (up to the identity), and there are \(d-1\) non-trivial projectors per basis. Since the traceless part of the space of Hermitian matrices has dimension \(d^2 - 1\), we can fit at most \((d^2-1)/(d-1) = d+1\) bases.
Construction. Use the finite field \(\mathbb{F}_d\). Index the standard basis by \(\mathbb{F}_d\). For each \(a \in \mathbb{F}_d\), define the basis \(\mathcal{B}_a\) with vectors \[ v_s^{(a)} = \frac{1}{\sqrt{d}} \sum_{t \in \mathbb{F}_d} \omega^{\mathrm{tr}(at^2 + st)} e_t, \quad s \in \mathbb{F}_d, \] where \(\omega = e^{2\pi i/p}\) and \(\mathrm{tr}\) is the trace from \(\mathbb{F}_d\) to \(\mathbb{F}_p\). Together with the standard basis \(\mathcal{B}_\infty = \{e_t\}\), these give \(d + 1\) MUBs.
Whether \(d+1\) MUBs exist in \(\mathbb{C}^d\) for non-prime-power \(d\) is a major open question in quantum information theory. The smallest unresolved case is \(d = 6\): it is unknown whether 7 MUBs exist in \(\mathbb{C}^6\). Numerical and algebraic evidence strongly suggests the answer is no (only 3 MUBs are known), but no proof exists.
- \(\mathcal{B}_Z = \{\vert 0 \rangle, \vert 1 \rangle\}\) (the \(Z\)-eigenbasis / standard basis),
- \(\mathcal{B}_X = \{\frac{1}{\sqrt{2}}(\vert 0 \rangle + \vert 1 \rangle), \frac{1}{\sqrt{2}}(\vert 0 \rangle - \vert 1 \rangle)\}\) (the Hadamard basis),
- \(\mathcal{B}_Y = \{\frac{1}{\sqrt{2}}(\vert 0 \rangle + i\vert 1 \rangle), \frac{1}{\sqrt{2}}(\vert 0 \rangle - i\vert 1 \rangle)\}\) (the \(Y\)-eigenbasis).
7.4 Complex Equiangular Lines and SIC-POVMs
In \(\mathbb{C}^d\), the analogue of equiangular lines is SIC-POVMs (symmetric informationally complete positive operator-valued measures) — a concept from quantum information theory.
SIC-POVMs are the complex analogues of tight spherical 2-designs in \(\mathbb{C}^d\). They achieve the absolute bound \(d^2\) for equiangular lines in \(\mathbb{C}^d\).
Proved for infinitely many values of \(d\) (Appleby, Flammia, McConnell, Yard, 2017 and subsequent work), with numerical evidence for \(d \leq 2208\). No general proof is known.
Zauner’s conjecture connects to deep number theory (class field theory over real quadratic fields), and understanding it is one of the outstanding open problems bridging quantum information and pure mathematics. Godsil’s course treats this from the perspective of complex Hadamard matrices and association schemes.
7.5 Hadamard Matrices and Quantum Information
The connection between Hadamard matrices and quantum information theory runs deep. The Walsh-Hadamard transform is the quantum Fourier transform over \(\mathbb{Z}_2^n\), and real Hadamard matrices correspond to unitary designs.
The framework of association schemes provides the correct language: MUBs and SIC-POVMs correspond to specific “coherent configurations” (generalised association schemes where the symmetry is not required to be transitive), and the eigenvalue conditions for these configurations encode the design property. Godsil’s approach to CO 434 uses this algebraic language throughout.
7.5 Connections and the Broader Picture
The objects studied in this course are deeply interconnected:
| Object | Key Connection |
|---|---|
| Symmetric \((v,k,\lambda)\)-design | Difference sets, projective planes, Hadamard designs |
| Hadamard matrix \(H_n\) | Hadamard 2-designs, Walsh codes, SIC-POVMs |
| \(\mathrm{OA}(t, k, n)\) | MOLS, orthogonal codes, factorial experiments |
| Witt design \(\mathcal{W}_{24}\) | Golay code, Leech lattice, Mathieu groups |
| Association scheme | Distance-regular graphs, Bose-Mesner algebra, Delsarte bounds |
| Equiangular lines | Strongly regular graphs, root systems, ETFs |
| Spherical \(t\)-design | Numerical integration, lattices, coding theory |
| MUBs | SIC-POVMs, quantum tomography, Latin squares |
The unifying theme throughout is the interplay between regularity (uniformity conditions on combinatorial structures), linear algebra (eigenvalue methods, Gram matrices, quadratic forms), and geometry (finite projective spaces, spheres, lattices). Godsil’s approach in Geometry: Finite, Real, Imaginary is to see all these objects as special cases of a geometric philosophy: finite analogues of the great continuous geometries of Euclidean and projective space.
7.6 Open Problems and Future Directions
Combinatorial design theory is a field with a wealth of open problems at all levels of difficulty. We close with a brief survey of the major open questions.
Appendix: Key Notation and Parameter Summary
| Symbol | Meaning |
|---|---|
| \((v, b, r, k, \lambda)\) | Parameters of a 2-design |
| \(N\) | Incidence matrix (\(v \times b\) or \(v \times v\) for symmetric) |
| \(J\) | All-ones matrix |
| \(\mathrm{PG}(d, q)\) | Projective space over \(\mathbb{F}_q\) |
| \(\mathrm{OA}(t, k, n)\) | Orthogonal array of strength \(t\) |
| \(N(n)\) | Maximum number of MOLS of order \(n\) |
| \(\mathcal{W}_{24}\) | Large Witt design, 5-(24,8,1) |
| \(\mathcal{W}_{12}\) | Small Witt design, 5-(12,6,1) |
| \(p^k_{ij}\) | Intersection numbers of an association scheme |
| \(\mathrm{srg}(n,k,\lambda,\mu)\) | Strongly regular graph parameters |
| \(H_n\) | Hadamard matrix of order \(n\) |
| \(\chi\) | Quadratic character of \(\mathbb{F}_q\) |
Chapter 8: Difference Sets and Cyclic Designs
8.1 The Concept of a Difference Set
Among all methods for constructing block designs, the theory of difference sets is at once the most elegant and the most powerful. It reduces the problem of building a design with the right intersection structure to a purely group-theoretic condition, turning combinatorics into number theory.
The name comes from the original setting of cyclic groups \(G = \mathbb{Z}_v\): the “differences” are \(d_i - d_j \pmod{v}\) for \(d_i \neq d_j \in D\). The condition that each nonzero difference appears exactly \(\lambda\) times is the key regularity property.
The connection to design theory is immediate: if \(D \subseteq G\) is a \((v,k,\lambda)\)-difference set, then the development of \(D\) — the collection of translates \(\{D + g : g \in G\}\) — forms a symmetric \((v, k, \lambda)\)-design. Each translate is a block, and the regularity condition on differences guarantees that any two points appear together in exactly \(\lambda\) blocks.
8.2 Singer’s Theorem and Planar Difference Sets
The most important family of difference sets comes from finite projective geometry. A Singer cycle is a cyclic group that acts regularly on the points of a projective space.
For \(d = 2\), this gives a \((q^2+q+1,\, q+1,\, 1)\)-difference set — the planar difference set corresponding to the Desarguesian projective plane \(\mathrm{PG}(2,q)\).
The Singer construction is foundational because it shows that the “combinatorial” structure of a projective plane is completely captured by a single cyclic group element. This is why Hamming codes (whose parity check matrices are constructed from Singer cycles) have such elegant structure.
8.3 Multipliers and the Hall-Paige Condition
The multiplier theorem is a powerful tool for proving uniqueness of difference sets.
The multiplier theorem gives a way to show that a potential difference set (if it exists) must be invariant under multiplication by \(p\). This greatly restricts the search space for difference sets and is used to prove non-existence: if the multiplier group acts on the potential difference set in a way inconsistent with the required parameters, then the difference set cannot exist.
(For completeness: a projective plane of order 4 DOES exist — it is \(\mathrm{PG}(2, 4)\), isomorphic to the unique projective plane of order 4. The point here is about \(\mathbb{Z}_{21}\) specifically, not the existence of the plane.)
8.4 Hadamard Difference Sets
A \((v, k, \lambda)\)-difference set with \(v = 4\mu\), \(k = 2\mu - 1\), \(\lambda = \mu - 1\) (so \(k - \lambda = \mu\)) is called a Hadamard difference set or \((4\mu-1, 2\mu-1, \mu-1)\)-difference set. Its development gives a Hadamard design — a symmetric \((4\mu-1, 2\mu-1, \mu-1)\)-design, which is the “residual” of a Hadamard matrix.
For \(p = 11\): \(D = \{1, 3, 4, 5, 9\}\) (the quadratic residues mod 11). This is a \((11, 5, 2)\)-difference set, giving a symmetric \((11, 5, 2)\)-design — the unique such design, whose points and blocks are the 11 points and 11 lines of a “biplane.”
Chapter 9: Resolutions and Parallelisms
9.1 Resolvable Designs
A resolution of a design adds further structure: it partitions the blocks into “parallel classes,” each class itself forming a partition of the point set. This concept has classical roots in Kirkman’s 1847 schoolgirl problem.
For a resolvable \((v, k, 1)\)-design (a Steiner system \(S(2, k, v)\)), each parallel class has exactly \(v/k\) blocks, and the number of parallel classes is \(r = \lambda(v-1)/(k-1) = (v-1)/(k-1)\). The necessary condition for resolvability is \(k \mid v\).
Concretely, one resolution is:
\[ \begin{array}{ccccc} \text{Day 1:} & \{1,2,3\} & \{4,5,6\} & \{7,8,9\} & \{10,11,12\} & \{13,14,15\} \\ \text{Day 2:} & \{1,4,7\} & \{2,5,8\} & \{3,6,9\} & \{10,13, ??\} & \ldots \end{array} \](The full solution requires careful arithmetic to ensure every pair meets exactly once. There are 80 non-isomorphic resolutions for \(v = 15\).)
9.2 Ray-Chaudhuri-Wilson Theorem
The Ray-Chaudhuri-Wilson theorem (1971) is the definitive resolvability result for Steiner triple systems:
The necessity is arithmetic: \(v \equiv 1\) or \(3 \pmod 6\) is needed for an STS to exist; the extra condition \(v \equiv 3 \pmod 6\) (not \(v \equiv 1\)) ensures that 3 divides \(v\), which is required for each parallel class to partition all \(v\) points into groups of 3.
The sufficiency proof is constructive: for any \(v \equiv 3 \pmod 6\), one constructs an explicit resolvable STS using a “direct” construction (algebraic methods over \(\mathbb{Z}_v\) for prime \(v\)) and a “recursive” construction (combining smaller resolvable STSs into larger ones via product constructions).
9.3 The Existence Theorem for Resolvable Designs
Wilson’s asymptotic existence theorem (1975) extends the Rödl nibble packing result to a sharp statement:
The proof uses the theory of transversals in Latin squares (essentially, a large “balanced” Latin square can be resolved into subsquares) combined with a direct counting argument. Wilson’s theorem was a landmark: it showed that the necessary conditions for the existence of a resolvable design are (asymptotically) also sufficient, mirroring the pattern for non-resolvable designs established by the same author.
9.4 Room Squares
A Room square of order \(2n\) (named after Thomas Room, 1955) is a symmetric Latin square of order \(2n-1\) with special structure: a \((2n-1) \times (2n-1)\) array where each cell contains either a pair \(\{i,j\} \subseteq \{1, \ldots, 2n\}\) or is empty, such that:
- Each of the \(2n\) symbols appears in exactly one cell per row and one cell per column.
- Each pair \(\{i,j\}\) appears in exactly one cell.
Room squares generalize to starter-adder constructions over cyclic groups, which provide a unified framework for tournament scheduling, round-robin tournaments, and other combinatorial designs with rotational symmetry. They are equivalent to 1-factorizations of complete graphs, connecting design theory to graph theory.
Chapter 10: Codes from Designs
10.1 The Code of a Design
Every design has a natural associated linear code, obtained by viewing the incidence matrix over a finite field.
The parameters of \(C_p(\mathcal{D})\) — its length \(n = b\), its dimension \(k = \mathrm{rank}_p(N)\), and its minimum distance \(d\) — carry deep information about the design. In particular:
- The minimum distance of \(C_p(\mathcal{D})\) is related to the minimum number of blocks needed to cover all points an odd number of times.
- The dual code \(C_p(\mathcal{D})^\perp\) is often the code of a complementary or “derived” design.
10.2 Reed-Muller Codes from Affine Geometry
The Reed-Muller codes are among the most important codes in both theory and practice. They arise naturally from the geometry of affine spaces.
The parameters of \(\mathcal{R}(r, m)\) are:
\[ [2^m,\, \sum_{i=0}^r \binom{m}{i},\, 2^{m-r}]. \]The connection is deep: the weight enumerator of a Reed-Muller code can be computed from the design-theoretic parameters of the associated hyperplane design, and vice versa. The Assmus-Mattson theorem (1969) formalizes this: certain codes automatically contain designs among their minimum-weight codewords.
10.3 The MacWilliams Transform
If \(C\) is a linear code with weight enumerator \(W_C(x, y) = \sum_{w} A_w x^{n-w} y^w\), then the weight enumerator of the dual code \(C^\perp\) is determined by the MacWilliams transform:
This formula has a clean interpretation: the weight distribution of the dual code is the Krawtchouk (discrete Fourier) transform of the weight distribution of the original code. It is the discrete analogue of the Poisson summation formula.
Actually the simplex code \([7, 3, 4]_2\) has all nonzero codewords of weight 4, giving \(W_{C^\perp} = x^7 + 7y^4 x^3\) — a constant-weight code. The MacWilliams transform confirms this: the weight distribution of the simplex code (all weights equal to 4) corresponds, via the transform, to the highly non-constant weight distribution of the Hamming code. This duality between “flat” and “peaked” weight distributions is a recurrent theme in the algebraic theory of codes and designs.
10.4 The Assmus-Mattson Theorem
The Assmus-Mattson theorem (1969) gives a systematic way to extract designs from codes.
The theorem is used to prove, for example, that the weight-8 codewords of the Golay code \(\mathcal{G}_{24}\) form the Witt design \(5-(24, 8, 1)\) — indeed, the Assmus-Mattson theorem applied to \(\mathcal{G}_{24}\) gives \(t = 5\), consistent with the 5-design structure. Similarly, the weight-12 codewords of the ternary Golay code \(\mathcal{G}_{12}\) form the small Witt design \(5-(12, 6, 1) = \mathcal{W}_{12}\). This beautiful correspondence — codes determine designs, and designs determine codes — is the unifying theme of Assmus and Key’s monograph.
10.5 The Sphere-Covering and Sphere-Packing Bounds
The design-theoretic parameters of a code are constrained by two classical bounds.
A code achieving equality in the Hamming bound is called perfect. Perfect binary codes are fully classified: the only nontrivial ones are the Hamming codes \([2^r - 1, 2^r - r - 1, 3]\) and the Golay code \([23, 12, 7]\). This classification (Lloyd 1957, van Lint-Tietäväinen 1973) is one of the deepest results in coding theory, and it provides a characterization of the Hamming and Golay designs in purely coding-theoretic terms.
Chapter 11: The Linear Algebra Bound and Fisher-Type Inequalities
11.1 Ray-Chaudhuri-Wilson and the Absolute Bound
The most powerful bounds in design theory come from linear algebra. The general philosophy is: embed the blocks (or points) of a design as vectors in a vector space, then use the rank of the resulting matrix to bound the number of vectors.
The RCW theorem is a vast generalization of Fisher’s inequality (which is the case \(s = 1, L = \{\lambda\}\)) and the Delsarte-Goethals-Seidel bound. Its specializations give the best-known bounds on:
- Two-distance sets in \(\mathbb{R}^n\): at most \(\binom{n+2}{2}\) points.
- \(s\)-distance sets (sets where all pairwise distances take only \(s\) values): at most \(\binom{n+s}{s}\) points.
- Equiangular lines: at most \(\binom{n+1}{2}\) lines (the absolute bound from Chapter 7).
11.2 Oddtown and Eventown
The “oddtown/eventown” results are elegant applications of the linear algebra method to purely combinatorial problems.
These results have become the prototypical examples of the linear algebra method in combinatorics — a collection of techniques where one assigns vectors to combinatorial objects and uses linear independence to bound their number. The method is closely related to the Delsarte LP bound: both exploit the fact that objects with limited intersection structure must be “nearly orthogonal.”
11.3 The Frankl-Wilson Theorem
The Frankl-Wilson theorem combines the linear algebra method with the Ray-Chaudhuri-Wilson theorem to give striking bounds in discrete geometry.
The most spectacular application is the chromatic number of the unit-distance graph. Let \(G_n\) be the graph on \(\{0,1\}^n\) where two vectors are adjacent if their Hamming distance is exactly \(n/2\) (for even \(n\)). Frankl and Wilson show \(\chi(G_n) \geq (1.2)^n\) by the modular intersection bound. More dramatically: the chromatic number of \(\mathbb{R}^n\) (the Hadwiger-Nelson-type problem in higher dimensions) satisfies \(\chi(\mathbb{R}^n) \geq (1.2389...)^n\), proved by the Frankl-Wilson construction of a set in \(\{0,1\}^n\) with no two points at distance 1 whose chromatic number forces many colors.
Chapter 12: Sharply Transitive Sets and the Cayley Graph Connection
12.1 Group Actions on Designs
The automorphism group of a design acts on both its point set and block set. The interplay between a design’s symmetry group and its combinatorial structure is one of the deepest themes in the subject. When the automorphism group acts transitively — or even sharply transitively — on points, blocks, or flags, the design acquires an algebraic structure that greatly simplifies both construction and analysis.
Flag-transitive designs are precisely those for which every point-block pair \((p, B)\) looks the same — a very strong symmetry condition. The classification of flag-transitive 2-designs is a major open problem, with progress tied to the classification of finite simple groups (CFSG). Using CFSG, O’Nan and Scott (1980) and later Buekenhout (1990) gave a partial classification of flag-transitive designs.
12.2 Cayley Graphs and Difference Sets
Every difference set \(D\) in a group \(G\) defines a Cayley graph \(\mathrm{Cay}(G, D - D^{-1})\) where two group elements \(g, h\) are adjacent iff \(gh^{-1} \in D \cup D^{-1}\). This graph is strongly regular when \(D\) is a \((v, k, \lambda)\)-difference set.
The Paley graph \(P(q)\) for a prime power \(q \equiv 1 \pmod 4\) is the Cayley graph \(\mathrm{Cay}(\mathbb{F}_q, Q)\) where \(Q\) is the set of nonzero quadratic residues. Since \(|Q| = (q-1)/2\), the Paley graph is a conference graph — it is a self-complementary strongly regular graph with parameters \((q, (q-1)/2, (q-5)/4, (q-1)/4)\). The Paley graphs are the canonical examples of Ramsey graphs: by the second-moment method, the clique and independence numbers of \(P(q)\) are both \(O(\sqrt{q} \log q)\), giving the largest known explicit constructions avoiding large cliques or independent sets.
12.3 Planar Functions and Semifields
A planar function over \(\mathbb{F}_q\) (for odd prime power \(q\)) is a function \(f: \mathbb{F}_q \to \mathbb{F}_q\) such that the map \(x \mapsto f(x+a) - f(x)\) is a bijection for every nonzero \(a \in \mathbb{F}_q\). Planar functions generalize difference sets to the non-abelian setting.
More exotic planar functions (like \(f(x) = x^{(3^k+1)/2}\) over \(\mathbb{F}_{3^n}\) for appropriate \(k, n\)) give rise to non-Desarguesian projective planes — planes that cannot be coordinatized by a field but only by a semifield (a division ring that may not satisfy associativity of multiplication). The classification of semifields, and hence of non-Desarguesian planes, remains an active research area.
12.4 The Polynomial Method for Designs
Polynomial methods, developed in Chapter 13 of CO 448 (Combinatorial Nullstellensatz), also apply to design theory. The cleanest application is the proof of Wilson’s theorem via the permanent of a polynomial matrix.
12.5 Concluding Perspective
The three strands woven throughout this course — linear algebra, finite geometry, and probabilistic/algebraic combinatorics — converge at the deepest results. Fisher’s inequality and the Delsarte LP bound use linear algebra to constrain parameters. Projective planes and difference sets use finite field arithmetic to provide constructions. The Witt designs and Golay codes exist at the intersection of all three, requiring group theory (Mathieu groups), coding theory (Golay codes), and algebraic combinatorics (association schemes) for a complete understanding.
The field continues to develop rapidly. Recent breakthroughs — Keevash’s existence theorem for designs (2014), the resolution of the Existence Conjecture for resolvable designs (Glock-Kühn-Lo-Osthus, 2020), and progress on Zauner’s conjecture via class field theory (Appleby et al., 2017) — show that the classical questions of design existence, uniqueness, and structure are far from exhausted. The interaction between high-powered algebraic machinery (representation theory, algebraic number theory) and elementary combinatorial structure (intersection numbers, regularity) remains the defining feature of the subject.
| Subject | Key Tool | Main Open Problem |
|---|---|---|
| Existence of designs | Probabilistic/algebraic | Sharp thresholds for small \(v\) |
| Uniqueness | Automorphism groups, codes | Classification of flag-transitive designs |
| Hadamard matrices | Sylvester, Paley, cocyclic | Hadamard conjecture (\(n = 4m\)) |
| Projective planes | Finite fields, difference sets | Non-prime-power order planes |
| Equiangular lines | SDP, algebraic number theory | Tight bounds for \(d \geq 15\) |
| SIC-POVMs | Class field theory | Zauner’s conjecture (all \(d\)) |
| MUBs | Unitary designs, Latin squares | 7 MUBs in \(\mathbb{C}^6\) |
Appendix B: Notable Designs and Their Parameters
The following table collects the most important specific designs appearing in the course.
| Design | Parameters | Automorphism Group | Notes |
|---|---|---|---|
| Fano plane | \(2-(7,3,1)\) | \(\mathrm{PSL}(2,7)\), order 168 | Unique; projective plane of order 2 |
| Petersen graph | Not a design, but related | \(S_5\), order 120 | Kneser graph \(K(5,2)\) |
| \(\mathrm{AG}(2,3)\) | \(2-(9,3,1)\) | \(\mathrm{AGL}(2,3)\), order 432 | Unique; 4 parallel classes |
| Desargues \(\mathrm{PG}(2,3)\) | \(2-(13,4,1)\) | \(\mathrm{PSL}(3,3)\), order 5616 | Unique |
| Petersen design | \(3-(10,4,1)\) | \(S_6\), order 720 | Unique |
| \(\mathcal{W}_{12}\) | \(5-(12,6,1)\) | \(M_{12}\), order 95040 | Unique |
| \(\mathcal{W}_{24}\) | \(5-(24,8,1)\) | \(M_{24}\), order 244823040 | Unique |
| Hadamard design | \(2-(11,5,2)\) | \(M_{11}\), order 7920 | Biplane from Paley \(\mathrm{QR}(11)\) |
| \(H_{12}\) design | \(5-(12,6,1)\) = \(\mathcal{W}_{12}\) | \(M_{12}\) | From Hadamard matrix of order 12 |
| \(\mathrm{PG}(3,2)\) | \(2-(15,3,1)\) (lines) | \(\mathrm{PSL}(4,2) = A_8\) | 35 lines, 15 points |
| Biplane \((11,5,2)\) | \(2-(11,5,2)\) | \(M_{11}\) | Unique |
| Biplane \((13,4,1)\) | = projective plane of order 3 | \(\mathrm{PSL}(3,3)\) | Unique |
| Steiner triple \(S(2,3,9)\) | = \(\mathrm{AG}(2,3)\) | \(\mathrm{AGL}(2,3)\) | Unique (up to isomorphism) |
The Mathieu groups \(M_{11}, M_{12}, M_{22}, M_{23}, M_{24}\) are the first five sporadic simple groups discovered and arise as automorphism groups of the Witt designs. Their existence is intimately tied to the richness of the Golay codes: the Golay codes are uniquely characterized by being the only doubly-even self-dual binary codes of their parameters, and this uniqueness forces the automorphism group to be extremely large.
| Code | Parameters | Design Content |
|---|---|---|
| Hamming code | \([7,4,3]_2\) | Weight-3 words form \(S(2,3,7)\) = Fano plane |
| Extended Hamming | \([8,4,4]_2\) | Weight-4 words form \(3-(8,4,1)\) = \(\mathrm{AG}(3,2)\) |
| Golay code | \([23,12,7]_2\) | Weight-7 words form \(4-(23,7,1) = \mathcal{W}_{23}\) |
| Extended Golay | \([24,12,8]_2\) | Weight-8 words form \(5-(24,8,1) = \mathcal{W}_{24}\) |
| Ternary Golay | \([11,6,5]_3\) | Weight-5 words form \(4-(11,5,1)\) |
| Ext. ternary Golay | \([12,6,6]_3\) | Weight-6 words form \(5-(12,6,1) = \mathcal{W}_{12}\) |
| Reed-Muller \(\mathcal{R}(1,m)\) | \([2^m, m+1, 2^{m-1}]\) | Weight-\(2^{m-1}\) words form \(3-(2^m, 2^{m-1}, 2^{m-2}-1)\) |