Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Читать онлайн книгу.24.8 Some Details on the Random Permutation 24.9 The Case Where Eve Has Nonzero Initial Information 24.10 Hash Functions Using Block Designs 24.11 Concluding Remarks Note Chapter 25: New Identities for the Shannon Function with Applications 25.1 Extensions of a Binary Symmetric Channel 25.2 A Basic Entropy Equality 25.3 The New Identities 25.4 Applications to Cryptography and a Shannon‐Type Limit 25.5 Problems 25.6 Solutions Chapter 26: Blockchain and Bitcoin 26.1 Ledgers, Blockchains 26.2 Hash Functions, Cryptographic Hashes 26.3 Digital Signatures 26.4 Bitcoin and Cryptocurrencies 26.5 The Append‐Only Network, Identities, Timestamp, Definition of a Bitcoin 26.6 The Bitcoin Blockchain and Merkle Roots 26.7 Mining, Proof‐of‐Work, Consensus 26.8 Thwarting Double Spending Chapter 27: IoT, The Internet of Things 27.1 Introduction 27.2 Analog to Digital (A/D) Converters 27.3 Programmable Logic Controller 27.4 Embedded Operating Systems 27.5 Evolution, From SCADA to the Internet of Things 27.6 Everything is Fun and Games until Somebody Releases a Stuxnet 27.7 Securing the IoT, a Mammoth Task 27.8 Privacy and Security Notes Chapter 28: In the Cloud 28.1 Introduction 28.2 Distributed Systems 28.3 Cloud Storage – Availability and Copyset Replication 28.4 Homomorphic Encryption 28.5 Cybersecurity 28.6 Problems 28.7 Solutions Chapter 29: Review Problems and Solutions 29.1 Problems 29.2 Solutions
13 Appendix A A.1 ASCII
14 Appendix B B.1 Shannon's Entropy Table
15 Glossary
16 References
17 Index
List of Tables
1 Chapter 2Table 2.1 Approximate frequencies of letters in the English language.Table 2.2 Number of character coincidences corresponding to displacement
2 Chapter 21Table 21.1 Factorization of
over3 Chapter 24Table 24.1 Bit agreements between two remnant stringsTable 24.2 Expressions for
for Table 24.3 Expressions for for Table 24.4 Optimal values for Table 24.5 Reconciling two 400 bit keys4 Appendix ATable A.1 ASCII table
5 Appendix BTable B.1 Shannon's entropy table.
List of Illustrations
1 Chapter 1Figure 1.1 (a) Claude E. Shannon, Theseus, and the maze (see Section 1.4). (...
2 Chapter 2Figure 2.1 Caesar cipher wheel.Figure 2.2 The German Enigma machine. (a) the Enigma machine type‐K, (b) the...Figure 2.3 Block diagram of the Enigma machine.Figure 2.4 Simplified Enigma model.
3 Chapter 3Figure 3.1 General encryption.Figure 3.2 Symmetric encryption.Figure