Book
Licensed
Unlicensed
Requires Authentication
Coding and Cryptography
Synergy for a Robust Communication
-
Natasa Zivic
Language:
English
Published/Copyright:
2013
About this book
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today’s distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or “hard” verification, but even more after the introduction of “soft” verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from “hard” to “soft”, which results in much better results.
New directions for the interoperability between different components of a communication system
Topics
-
Download PDFPublicly Available
Frontmatter
I -
Download PDFRequires Authentication UnlicensedLicensed
Abstract
V -
Download PDFPublicly Available
Table of Contents
VII -
Download PDFRequires Authentication UnlicensedLicensed
1. Introduction
1 -
Download PDFRequires Authentication UnlicensedLicensed
2. Fundamentals
5 -
Download PDFRequires Authentication UnlicensedLicensed
3. Related Work
27 -
Download PDFRequires Authentication UnlicensedLicensed
4. Soft Input Hard Verification
33 -
Download PDFRequires Authentication UnlicensedLicensed
5. Applications of Soft Input Bit Inversion
47 -
Download PDFRequires Authentication UnlicensedLicensed
6. Soft Verification of the Message Authentication Codes
61 -
Download PDFRequires Authentication UnlicensedLicensed
7. Security Aspects of Soft Input Soft Verification
89 -
Download PDFRequires Authentication UnlicensedLicensed
8. Soft Output of Soft Input Soft Verification
109 -
Download PDFRequires Authentication UnlicensedLicensed
9. Applications of Soft Input Soft Verification
113 -
Download PDFRequires Authentication UnlicensedLicensed
10. Summary and Future Work
115 -
Download PDFRequires Authentication UnlicensedLicensed
Epilogue
117 -
Download PDFRequires Authentication UnlicensedLicensed
Works Cited
119 -
Download PDFRequires Authentication UnlicensedLicensed
List of Abbreviations
125
Publishing information
Pages and Images/Illustrations in book
eBook published on:
October 24, 2013
eBook ISBN:
9783486781267
Hardcover published on:
September 26, 2013
Hardcover ISBN:
9783486752120
Pages and Images/Illustrations in book
Front matter:
8
Main content:
126
Illustrations:
101
Tables:
12
Audience(s) for this book
For graduate students of electrical engineering, mathematics and computer science as well as engineers and developers in the field of secure communication systems
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com