Cryptography, Information Theory, and Error–Correc tion: A Handbook for the 21st Century
Home > Mathematics and Science Textbooks > Mathematics > Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)

Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Discover the first unified treatment of today's most essential information technologies— Compressing, Encrypting, and Encoding With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three cornerstones of the information age. Stressing the interconnections of the disciplines, Cryptography, Information Theory, and Error-Correction offers a complete, yet accessible account of the technologies shaping the 21st century. This book contains the most up-to-date, detailed, and balanced treatment available on these subjects. The authors draw on their experience both in the classroom and in industry, giving the book's material and presentation a unique real-world orientation. With its reader-friendly style and interdisciplinary emphasis, Cryptography, Information Theory, and Error-Correction serves as both an admirable teaching text and a tool for self-learning. The chapter structure allows for anyone with a high school mathematics education to gain a strong conceptual understanding, and provides higher-level students with more mathematically advanced topics. The authors clearly map out paths through the book for readers of all levels to maximize their learning. This book: Is suitable for courses in cryptography, information theory, or error-correction as well as courses discussing all three areas Provides over 300 example problems with solutions Presents new and exciting algorithms adopted by industry Discusses potential applications in cell biology Details a new characterization of perfect secrecy Features in-depth coverage of linear feedback shift registers (LFSR), a staple of modern computing Follows a layered approach to facilitate discussion, with summaries followed by more detailed explanations Provides a new perspective on the RSA algorithm Cryptography, Information Theory, and Error-Correction is an excellent in-depth text for both graduate and undergraduate students of mathematics, computer science, and engineering. It is also an authoritative overview for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, entrepreneurs, and the generally curious.

Table of Contents:
Preface. I. CRYPTOGRAPHY. 1. History and Claude E. Shannon. 1.1 Historical Background. 1.2 Brief Biography of Claude E. Shannon. 1.3 Career. 1.4 Personal – Professional. 1.5 Scientific Legacy. 1.6 Modern Developments. 2. Classical Ciphers and Their Cryptanalysis. 2.1 Introduction. 2.2 The Caesar Cipher. 2.3 The Scytale Cipher. 2.4 The Vigenère Cipher. 2.5 Affine Ciphers. 2.6 The Enigma Machine and its Mathematics. 2.7 Frequency Analysis. 2.8 Breaking the Vigenère Cipher. 2.9 Modern Enciphering Systems. 2.10 Problems. 2.11 Solutions. 3. RSA and Key Searches. 3.1 Background. 3.2 The Basic Idea. 3.3 Public-key Cryptography and RSA on a Calculator. 3.4 The General RSA Algorithm. 3.5 Public Key Versus Symmetric Key. 3.6 Attacks, Security of DES. 3.7 Summary. 3.8 Problems. 3.9 Solutions. 4. The Fundamentals of Modern Cryptography. 4.1 Encryption Re-visited. 4.2 Block Ciphers, Shannon’s Confusion and Diffusion. 4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad. 4.4 Hash Functions. 4.5 Message Integrity Using Symmetric Cryptography. 4.6 General Public-Key Cryptosystems. 4.7 Electronic Signatures. 4.8 The Diffie-Hellman Key Exchange. 4.9 Quantum Encryption. 4.10 Key Management and Kerberos. 4.11 DES. 4.12 Problems. 4.13 Solutions. 5. DES, AES and Operating Modes. 5.1 The Data Encryption Standard Code. 5.2 Triple DES. 5.3 DES and Unix. 5.4 The Advanced Encryption Standard Code. 5.5 Problems. 5.6 Solutions. 6. Elliptic Curve Cryptography (ECC). 6.1 Abelian Integrals, Fields, Groups. 6.2 Curves, Cryptography. 6.3 Non-singularity. 6.4 The Hasse Theorem, and an Example. 6.5 More Examples. 6.6 The Group Law on Elliptic Curves. 6.7 Key Exchange Using Elliptic Curves. 6.8 Elliptic Curves Mod n. 6.9 Encoding Plain Text. 6.10 Security of ECC. 6.11 More Geometry of Cubic Curves. 6.12 Cubic Curves and Arcs. 6.13 Homogeneous Coordinates. 6.14 Fermat’s Last Theorem, Elliptic Curves. Gerhard Frey. 6.15 Problems. 6.16 Solutions. 7. General and Mathematical Attacks in Cryptography. 7.1 Cryptanalysis. 7.2 Soft Attacks. 7.3 Brute Force Attacks. 7.4 Man-In-The-Middle Attacks. 7.5 Known Plain-Text Attacks. 7.6 Known Cipher-Text Attacks. 7.7 Chosen Plain-Text Attacks. 7.8 Chosen Cipher-Text Attacks. 7.9 Replay Attacks. 7.10 Birthday Attacks. 7.11 Birthday Attack on Digital Signatures. 7.12 Birthday Attack on the Discrete Log-Problem. 7.13 Attacks on RSA. 7.14 Attacks on RSA Using Low-Exponents. 7.15 Timing-Attack. 7.16 Differential Cryptanalysis. 7.17 Implementation Errors and Unforeseen States. 8. Topical Issues in Cryptography and Communications. 8.1 Introduction. 8.2 Hot Issues. 8.3 Authentication. 8.4 e-commerce. 8.5 e-government. 8.6 Key Lengths. 8.7 Digital Rights. 8.8 Wireless Networks. 8.9 Communication Protocols. II. INFORMATION THEORY. 9. Information Theory and Its Applications. 9.1 Axioms, Physics, Computation. 9.2 Entropy. 9.3 Information Gained, Cryptography. 9.4 Practical Applications of Information Theory. 9.5 Information Theory and Physics. 9.6 Axiomatics. 9.7 Number Bases, Erdos and the Hand of God. 9.8 Weighing Problems and Your MBA. 9.9 Shannon Bits, the Big Picture. 10. Random Variables and Entropy. 10.1 Random Variables. 10.2 Mathematics of Entropy. 10.3 Calculating Entropy. 10.4 Conditional Probability. 10.5 Bernoulli Trials. 10.6 Typical Sequences. 10.7 Law of Large Numbers. 10.8 Joint and Conditional Entropy. 10.9 Applications of Entropy. 10.10 Calculation of Mutual Information. 10.11 Mutual Information and Channels. 10.12 The Entropy of X + Y. 10.13 Subadditivity of the Function x log x. 10.14 Entropy and Cryptography. 10.15 Problems. 10.16 Solutions. 11. Source Coding, Data Compression, Redundancy. 11.1 Introduction, Source Extensions. 11.2 Encodings, Kraft, McMillan. 11.3 Block Coding, The Oracle, 20 Questions. 11.4 Optimal Codes. 11.5 Huffman Coding. 11.6 Optimality of Huffman Encoding. 11.7 Data Compression, Lempel-Ziv Coding, Redundancy. 11.8 Problems. 11.9 Solutions. 12. Channels, Capacity, the Fundamental Theorem. 12.1 Abstract Channels. 12.2 More Specific Channels. 12.3 New Channels from Old, Cascades. 12.4 Input Probability, Channel Capacity. 12.5 Capacity for General Binary Channels, Entropy. 12.6 Hamming Distance. 12.7 Improving Reliability of a Binary Symmetric Channel. 12.8 Error Correction, Error Reduction, Good Redundancy. 12.9 The Fundamental Theorem of Information Theory. 12.10 Summary, the Big Picture. 12.11 Problems. 12.12 Solutions. 13. Signals, Sampling, S/N Ratio, Coding Gain. 13.1 Continuous Signals, Shannon’s Sampling Theorem. 13.2 The Band-limited Capacity Theorem. 13.3 The Coding Gain. 14. Ergodic and Markov Sources, Language Entropy. 14.1 General and Stationary Sources. 14.2 Ergodic Sources. 14.3 Markov Chains and Markov Sources. 14.4 Irreducible Markov Sources, Adjoint Source. 14.5 Markov Chains, Cascades, the Data Processing Theorem. 14.6 The Redundancy of Languages. 14.7 Problems. 14.8 Solutions. 15. Perfect Secrecy: The New Paradigm. 15.1 Introduction. 15.2 Perfect Secrecy and Equiprobable Keys. 15.3 Perfect Secrecy and Latin Squares. 15.4 The Abstract Approach to Perfect Secrecy. 15.5 Cryptography, Information Theory, Shannon. 15.6 Problems. 15.7 Solutions. 16. Linear Feedback Shift Registers (LFSR). 16.1 Introduction. 16.2 Construction of Feedback Shift Registers. 16.3 Periodicity. 16.4 Maximal Periods and Pseudo Random Sequences. 16.5 Determining the Output From 2m Bits. 16.6 The Tap Polynomial and the Period. 16.7 Berlekamp-Massey Algorithm. 16.8 Problems. 16.9 Solutions. 17. The Genetic Code. 17.1 Introduction. 17.2 History of Genetics. 17.3 Structure and Purpose of DNA. 17.4 The Double Helix, Replication. 17.5 Protein Synthesis. 17.6 Viruses. 17.7 Criminology. 17.8 Entropy and Compression in Genetics. 17.9 Channel Capacity of the Genetic Code. III. ERROR-CORRECTION. 18. Error-Correction, Hadamard, and Bruen-Ott. 18.1 Introduction. 18.2 Error Detection, Error Correction. 18.3 A Formula for Correction and Detection. 18.4 Hadamard Matrices. 18.5 Mariner, Hadamard and Reed-Muller. 18.6 Reed-Muller Codes. 18.7 Block Designs. 18.8 A Problem of Lander, the Bruen-Ott Theorem. 18.9 The Main Coding Theory Problem, Bounds. 19. Finite Fields, Linear Algebra, and Number Theory. 19.1 Modular Arithmetic. 19.2 A Little Linear Algebra. 19.3 Applications to RSA. 19.4 Primitive Roots for Primes and Diffie-Hellman. 19.5 The Extended Euclidean Algorithm. 19.6 Proof that the RSA Algorithm Works. 19.7 Constructing Finite Fields. 19.8 Problems. 19.9 Solutions. 20. Introduction to Linear Codes. 20.1 Introduction. 20.2 Details of Linear Codes. 20.3 Parity Checks, the Syndrome, Weights. 20.4 Hamming Codes. 20.5 Perfect Codes, Errors and the BSC. 20.6 Generalizations of Binary Hamming Codes. 20.7 The Football Pools Problem, Extended Hamming Codes. 20.8 Golay Codes. 20.9 McEliece Cryptosystem. 20.10 CRC32. 20.11 Problems. 20.12 Solutions. 21. Linear Cyclic Codes and Shift Registers. 21.1 Cyclic Linear Codes. 21.2 Generators for Cyclic Codes. 21.3 The Dual Code and The Two Methods. 21.4 Linear Feedback Shift Registers and Codes. 21.5 Finding the Period of a LFSR. 21.6 Problems. 21.7 Solutions. 22. Reed Solomon and MDS Codes, Bruen-Thas-Blockhuis. 22.1 Cyclic Linear Codes and the Vandermonde Matrix. 22.2 The Singleton Bound. 22.3 Reed-Solomon Codes. 22.4 Reed-Solomon Codes and the Fourier Transform Approach. 22.5 Correcting Burst Errors, Interleaving. 22.6 Decoding Reed-Solomon, Ramanujan, Berlekamp-Massey. 22.7 An Algorithm and an Example. 22.8 MDS Codes and a Solution of the Fifty Year-old Problem. 22.9 Problems. 22.10 Solutions. 23. MDS Codes, Secret Sharing, Invariant Theory. 23.1 General MDS codes. 23.2 The Case k=2, Bruck Nets. 23.3 Upper Bounds, Bruck-Ryser. 23.4 MDS Codes and Secret Sharing Schemes. 23.5 MacWilliams Identities, Invariant Theory. 23.6 Codes, Planes, Blocking Sets. 23.7 Binary Linear Codes of Minimum Distance 4. 24. Key Reconciliation, Linear Codes, New Algorithms. 24.1 Introduction. 24.2 General Background. 24.3 The Secret Key and The Reconciliation Algorithm. 24.4 Equality of Remnant Keys: The Halting Criterion. 24.5 Convergence of Keys: The Checking Hash Function. 24.6 Convergence and Length of Keys. 24.7 Main Results. 24.8 Some Details on the Random Permutation. 24.9 The Case where Eve has Non-zero Initial Information. 24.10 Hash, Functions using Block Designs. 24.11 Concluding Remarks. ASCII. Shannon’s Entropy Table. Glossary. Bibliography. Index.

About the Author :
AIDEN A. BRUEN, PHD, is a Professor of Mathematics and Statistics at the University of Calgary in Calgary, Alberta, Canada. He has over 100 published articles in refereed journals and has served for many years on the Editorial Board of Designs, Codes and Cryptography. His research interests include error-correcting codes, number theory, algebraic geometry, algebra finite geometries, information theory, and cryptography. MARIO A. FORCINITO, PHD, is a professional engineer with over ten years' experience as an industrial consultant. He is President of SUR Consultants in Engineering Science Inc., a member of the IEEE Computer Society, and has published extensively in peer-reviewed journals. Dr. Forcinito has experience lecturing on cryptography and numerical methods at several technical meetings.

Review :
"…the book is a useful information source for all people interested in information security." (Computing Reviews.com, January 18, 2006) "The book is certainly to be recommended, and it can be used at various levels, as both a reference text an as a text for undergraduate and graduate courses…" (Mathematical Reviews, 2006b) "…readers of this book will find their enthusiasm for communication theory greatly stimulated…" (CHOICE, December 2005) "…although encyclopedic, is lively and engaging, written with palpable enthusiasm…a very readable text, one that encourages a reader to dip in and sample the treats." (MAA Reviews, June 23, 2005) "...one of the most outstanding works in this area; it will prove useful to a broad category of readers…" (Computing Reviews.com, October 28, 2005)


Best Sellers


Product Details
  • ISBN-13: 9781118033296
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Interscience
  • Height: 250 mm
  • No of Pages: 496
  • Spine Width: 15 mm
  • Weight: 666 gr
  • ISBN-10: 1118033299
  • Publisher Date: 30 Sep 2011
  • Binding: Digital online
  • Language: English
  • Series Title: Wiley Series in Discrete Mathematics and Optimization
  • Sub Title: A Handbook for the 21st Century
  • Width: 150 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)
John Wiley & Sons Inc -
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century(Wiley Series in Discrete Mathematics and Optimization)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!