
Coding and Cryptography : Synergy for a Robust Communication.
Title:
Coding and Cryptography : Synergy for a Robust Communication.
Author:
Zivic, Natasa.
ISBN:
9783486781267
Personal Author:
Physical Description:
1 online resource (134 pages)
Contents:
Abstract -- 1 Introduction -- 2 Fundamentals -- 2.1 Components of a Transmission System -- 2.2 Message Authentication Codes -- 2.2.1 General -- 2.2.2 Generation using a symmetric Block Cipher -- 2.2.3 Generation using a Dedicated Hash Function -- 2.2.4 Security Aspects of Message Authentication Codes -- 2.2.5 Message Authentication Codes and Digital Signatures -- 2.3 Channel Coding -- 2.3.1 Reed-Solomon Codes -- 2.3.2 Convolutional and Turbo Codes -- 2.3.3 Soft Input Soft Output Decoding -- 2.3.4 Concatenated Codes -- 2.4 Joint Source and Channel Coding -- 3 Related Work -- 3.1 Channel Coding with Bit Inversion -- 3.2 Error tolerant Cryptographic Checksums -- 3.3 Authentication over Noisy Channels -- 4 Soft Input Hard Verification -- 4.1 Correction by Iterative Bit Inversion -- 4.2 Security Aspects of Soft Input Hard Verification -- 4.3 Correction Improvement by Interleaving and Feedback -- 4.4 Correction by Insertion of Known Bits -- 5 Applications of Soft Input Bit Inversion -- 5.1 Correction of Reed-Solomon Decoding Errors -- 5.2 HARQ IBF Algorithm -- 5.3 N-Channel STOP and WAIT Protocol of WiMAX -- 5.4 Enhanced Packet Combining over HYBRID-ARQ -- 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes -- 6 Soft Verification of the Message Authentication Codes -- 6.1 Soft Verification versus Hard Verification -- 6.2 Soft Input Soft Verification -- 6.3 Calculation of the Threshold -- 6.3.1 Probability Distribution Function of the Hamming Distance -- 6.3.2 Analysis of the Hamming Distance and the Threshold -- 6.3.3 Simulative Specification of the Threshold -- 6.4 Verification Gain -- 7 Security Aspects of Soft Input Soft Verification -- 7.1 Forgery Attacks -- 7.1.1 Birthday Paradox for Near Collisions.
7.1.2 Compensation of the Reduced Complexity of a Forgery Attack -- 7.2 Wrong Decisions -- 7.2.1 Probability of a Wrong Decision -- 7.2.2 Compensation of the Increased Probability of Wrong Decision -- 7.3 Total Compensation -- 7.4 Selection of the Algorithmic Parameters -- 8 Soft Output of Soft Input Soft Verification -- 9 Applications of Soft Input Soft Verification -- 10 Summary and Future Work -- Epilogue -- Works Cited -- List of Abbreviations.
Abstract:
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesnt́ allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or "hard" verification, but even more after the introduction of "soft" verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from "hard" to "soft", which results in much better results.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Electronic Access:
Click to View