Skip to:Content
|
Bottom
Cover image for Cryptography, information theory, and error-correction : a handbook for the 21st century
Title:
Cryptography, information theory, and error-correction : a handbook for the 21st century
Personal Author:
Publication Information:
Hoboken, N.J. : Wiley-Interscience, 2005
ISBN:
9780471653172

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004988709 QA76.9.A25 B79 2005 Open Access Book Book
Searching...
Searching...
30000010076852 QA 76.9.A25 B79 2005 Open Access Book Book
Searching...

On Order

Summary

Summary

Discover the first unified treatment of today's most essential information technologies-- Compressing, Encrypting, and Encoding

With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three cornerstones of the information age.

Stressing the interconnections of the disciplines, Cryptography, Information Theory, and Error-Correction offers a complete, yet accessible account of the technologies shaping the 21st century. This book contains the most up-to-date, detailed, and balanced treatment available on these subjects. The authors draw on their experience both in the classroom and in industry, giving the book's material and presentation a unique real-world orientation.

With its reader-friendly style and interdisciplinary emphasis, Cryptography, Information Theory, and Error-Correction serves as both an admirable teaching text and a tool for self-learning. The chapter structure allows for anyone with a high school mathematics education to gain a strong conceptual understanding, and provides higher-level students with more mathematically advanced topics. The authors clearly map out paths through the book for readers of all levels to maximize their learning.

This book:

Is suitable for courses in cryptography, information theory, or error-correction as well as courses discussing all three areas Provides over 300 example problems with solutions Presents new and exciting algorithms adopted by industry Discusses potential applications in cell biology Details a new characterization of perfect secrecy Features in-depth coverage of linear feedback shift registers (LFSR), a staple of modern computing Follows a layered approach to facilitate discussion, with summaries followed by more detailed explanations Provides a new perspective on the RSA algorithm

Cryptography, Information Theory, and Error-Correction is an excellent in-depth text for both graduate and undergraduate students of mathematics, computer science, and engineering. It is also an authoritative overview for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, entrepreneurs, and the generally curious.


Author Notes

AIDEN A. BRUEN, PHD, is a Professor of Mathematics and Statistics at the University of Calgary in Calgary, Alberta, Canada. He has over 100 published articles in refereed journals and has served for many years on the Editorial Board of Designs, Codes and Cryptography. His research interests include error-correcting codes, number theory, algebraic geometry, algebra finite geometries, information theory, and cryptography.

MARIO A. FORCINITO, PHD, is a professional engineer with over ten years' experience as an industrial consultant. He is President of SUR Consultants in Engineering Science Inc., a member of the IEEE Computer Society, and has published extensively in peer-reviewed journals. Dr. Forcinito has experience lecturing on cryptography and numerical methods at several technical meetings.


Reviews 1

Choice Review

This book introduces three interrelated subjects of central importance to our computer- and communication-driven culture. Cryptology, information theory, and error-correcting codes are essential to the smooth working of the many gadgets that surround us. These topics are usually treated in separate works. It was an excellent idea to cover them in a single volume. The authors should have gone still further and interwoven them more, rather than giving each a separate section. Bruen and Forcinito (both, Univ. of Calgary) write with outstanding enthusiasm. The material, whose origin in a dynamic set of class lectures is clear, bubbles off the page. The result, however, is a lot of redundancy: many terms and concepts are multiply presented. The book is clearly written, at a very high level. The major ideas of communication theory are discussed broadly with simple examples. Details of the implementation of algorithms and of the proof of theorems are supplied rather sparingly, however. In summary, readers of this book will find their enthusiasm for communication theory greatly stimulated, although they will need to look elsewhere for more mathematical and algorithmic details. ^BSumming Up: Recommended. General readers; lower-division undergraduates through graduate students. M. Henle Oberlin College


Table of Contents

Preface
I Cryptography
1 History and ClaudeE. Shannon
1.1 Historical Background
1.2 Brief Biography of ClaudeE. Shannon
1.3 Career
1.4 Personal - Professional
1.5 Scientific Legacy
1.6 Modern Developments
2 Classical Ciphers and Their Cryptanalysis
2.1 Introduction
2.2 The Caesar Cipher
2.3 The Scytale Cipher
2.4 The Vigenere Cipher
2.5 Affine Ciphers
2.6 The Enigma Machine and its Mathematics
2.7 Frequency Analysis
2.8 Breaking the Vigenere Cipher
2.9 Modern Enciphering Systems
2.10 Problems
2.11 Solutions
3 RSA and Key Searches
3.1 Background
3.2 The Basic Idea
3.3 Public-key Cryptography and RSA on a Calculator
3.4 The General RSA Algorithm
3.5 Public Key Versus Symmetric Key
3.6 Attacks, Security of DES
3.7 Summary
3.8 Problems
3.9 Solutions
4 The Fundamentals of Modern Cryptography
4.1 Encryption Re-visited
4.2 Block Ciphers, Shannon's Confusion and Diffusion
4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad
4.4 Hash Functions
4.5 Message Integrity Using Symmetric Cryptography
4.6 General Public-Key Cryptosystems
4.7 Electronic Signatures
4.8 The Diffie-Hellman Key Exchange
4.9 Quantum Encryption
4.10 Key Management and Kerberos
4.11 DES
4.12 Problems
4.13 Solutions
5 DES, AES and Operating Modes
5.1 The Data Encryption Standard Code
5.2 Triple DES
5.3 DES and Unix
5.4 The Advanced Encryption Standard Code
5.5 Problems
5.6 Solutions
6 Elliptic Curve Cryptography (ECC)
6.1 Abelian Integrals, Fields, Groups
6.2 Curves, Cryptography
6.3 Non-singularity
6.4 The Hasse Theorem, and an Example
6.5 More Examples
6.6 The Group Law on Elliptic Curves
6.7 Key Exchange Using Elliptic Curves
6.8 Elliptic Curves Mod n
6.9 Encoding Plain Text
6.10 Security of ECC
6.11 More Geometry of Cubic Curves
6.12 Cubic Curves and Arcs
6.13 Homogeneous Coordinates
6.14 Fermat's Last Theorem, Elliptic Curves
Gerhard Frey
6.15 Problems
6.16 Solutions
7 General and Mathematical Attacks in Cryptography
7.1 Cryptanalysis
7.2 Soft Attacks
7.3 Brute Force Attacks
7.4 Man-In-The-Middle Attacks
7.5 Known Plain-Text Attacks
7.6 Known Cipher-Text Attacks
7.7 Chosen Plain-Text Attacks
7.8 Chosen Cipher-Text Attacks
7.9 Replay Attacks
7.10 Birthday Attacks
7.11 Birthday Attack on Digital Signatures
7.12 Birthday Attack on the Discrete Log-Problem
7.13 Attacks on RSA
7.14 Attacks on RSA Using Low-Exponents
7.15 Timing-Attack
7.16 Differential Cryptanalysis
7.17 Implementation Errors and Unforeseen States
8 Topical Issues in Cryptography and Communications
8.1 Introduction
8.2 Hot Issues
8.3 Authentication
8.4 e-commerce
8.5 e-government
8.6 Key Lengths
8.7 Digital Rights
8.8 Wireless Networks
8.9 Communication Protocols
II Information Theory
9 Information Theory and Its Applications
9.1 Axioms, Physics, Computation
9.2 Entropy
9.3 Information Gained, Cryptography
9.4 Practical Applications of Information Theory
9.5 Information Theory and Physics
9.6 Axiomatics
9.7 Number Bases, Erdos and the Hand of God
9.8 Weighing Problems and Your MBA
9.9 Shannon Bits, the Big Picture
10 Random Variables and Entropy
10.1 Random Variables
10.2 Mathematics of Entropy
10.3 Calculating Entropy
Go to:Top of Page