Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen

Читать онлайн книгу.

Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen


Скачать книгу
24.8 Some Details on the Random Permutation 24.9 The Case Where Eve Has Nonzero Initial Information 24.10 Hash Functions Using Block Designs 24.11 Concluding Remarks Note Chapter 25: New Identities for the Shannon Function with Applications 25.1 Extensions of a Binary Symmetric Channel 25.2 A Basic Entropy Equality 25.3 The New Identities 25.4 Applications to Cryptography and a Shannon‐Type Limit 25.5 Problems 25.6 Solutions Chapter 26: Blockchain and Bitcoin 26.1 Ledgers, Blockchains 26.2 Hash Functions, Cryptographic Hashes 26.3 Digital Signatures 26.4 Bitcoin and Cryptocurrencies 26.5 The Append‐Only Network, Identities, Timestamp, Definition of a Bitcoin 26.6 The Bitcoin Blockchain and Merkle Roots 26.7 Mining, Proof‐of‐Work, Consensus 26.8 Thwarting Double Spending Chapter 27: IoT, The Internet of Things 27.1 Introduction 27.2 Analog to Digital (A/D) Converters 27.3 Programmable Logic Controller 27.4 Embedded Operating Systems 27.5 Evolution, From SCADA to the Internet of Things 27.6 Everything is Fun and Games until Somebody Releases a Stuxnet 27.7 Securing the IoT, a Mammoth Task 27.8 Privacy and Security Notes Chapter 28: In the Cloud 28.1 Introduction 28.2 Distributed Systems 28.3 Cloud Storage – Availability and Copyset Replication 28.4 Homomorphic Encryption 28.5 Cybersecurity 28.6 Problems 28.7 Solutions Chapter 29: Review Problems and Solutions 29.1 Problems 29.2 Solutions

      13  Appendix A A.1 ASCII

      14  Appendix B B.1 Shannon's Entropy Table

      15  Glossary

      16  References

      17  Index

      18  End User License Agreement

      List of Tables

      1 Chapter 2Table 2.1 Approximate frequencies of letters in the English language.Table 2.2 Number of character coincidences corresponding to displacement

      2 Chapter 21Table 21.1 Factorization of

over

      3 Chapter 24Table 24.1 Bit agreements between two remnant stringsTable 24.2 Expressions for

for
Table 24.3 Expressions for
for
Table 24.4 Optimal values for
Table 24.5 Reconciling two 400 bit keys

      4 Appendix ATable A.1 ASCII table

      5 Appendix BTable B.1 Shannon's entropy table.

      List of Illustrations

      1 Chapter 1Figure 1.1 (a) Claude E. Shannon, Theseus, and the maze (see Section 1.4). (...

      2 Chapter 2Figure 2.1 Caesar cipher wheel.Figure 2.2 The German Enigma machine. (a) the Enigma machine type‐K, (b) the...Figure 2.3 Block diagram of the Enigma machine.Figure 2.4 Simplified Enigma model.

      3 Chapter 3Figure 3.1 General encryption.Figure 3.2 Symmetric encryption.Figure


Скачать книгу