Shannon 9ġ.6 The Data Encryption Standard Code, DES, 1977–2005 14Ģ Classical Ciphers and Their Cryptanalysis 21Ģ.6 Breaking the Vigen`ere Cipher, Babbage–Kasiski 27Ģ.7 The Enigma Machine and Its Mathematics 33ģ RSA, Key Searches, TLS, and Encrypting Email 47ģ.2 Public Key Cryptography and RSA on a Calculator 53ģ.5 Attacks, Security, Catch-22 of Cryptography 62ģ.8 Intruder-in-the-Middle Attack on the Diffie–Hellman (or Elliptic Curve) Key-Exchange 69Ĥ The Fundamentals of Modern Cryptography 83Ĥ.2 Block Ciphers, Shannon’s Confusion and Diffusion 86Ĥ.3 Perfect Secrecy, Stream Ciphers, One-Time Pad 87Ĥ.5 Message Integrity Using Symmetric Cryptography 93Ĥ.8 Modifying Encrypted Data and Homomorphic Encryption 99Ĥ.9 Quantum Encryption Using Polarized Photons 99Ĥ.10 Quantum Encryption Using Entanglement 102Ĥ.11 Quantum Key Distribution is Not a Silver Bullet 103ĥ Modes of Operation for AES and Symmetric Algorithms 109ĥ.2 The Advanced Encryption Standard Code 111Ħ.1 Abelian Integrals, Fields, Groups 126Ħ.3 The Hasse Theorem, and an Example 129Ħ.6 Key Exchange with Elliptic Curves 134Ħ.13 Fermat’s Last Theorem, Elliptic Curves, Gerhard Frey 137Ħ.14 A Modification of the Standard Version of Elliptic Curve Cryptography 138ħ General and Mathematical Attacks in Cryptography 143ħ.9 Chosen Cipher Text Attacks, Digital Signatures 151ħ.12 Birthday Attack on Digital Signatures 154ħ.13 Birthday Attack on the Discrete Log Problem 154ħ.15 Attacks on RSA using Low-Exponents 156ħ.19 Cold Boot Attacks on Encryption Keys 159ħ.20 Implementation Errors and Unforeseen States 159ħ.21 Tracking. Shannon 3ġ.2 Brief Biography of Claude E. Includes over 350 worked examples and problems for greater understanding of ideas.Ĭryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.Īcknowledgments for the Second Edition xxiiiġ Historical Introduction and the Life and Work of Claude E.Shares vital, new research in the field of information theory.Increased security and applicable research in elliptic curve cryptography are also featured. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs. The book’s discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions.
It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. This book is geared toward a broad audience. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTIONĪ rich examination of the technologies supporting secure digital information transfers from respected leaders in the fieldĪs technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21 ST Century is an indispensable resource for anyone interested in the secure exchange of financial information.