Limit search to available items
Book Cover
E-book
Author Živić, Nataša

Title Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen
Published München : Oldenbourg Wissenschaftsverlag, [2013]
©2013

Copies

Description 1 online resource (134 pages) : illustrations
Contents Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion
3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes
6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions
7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations
Summary This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and
Bibliography Includes bibliographical references
Notes Online resource; title from PDF title page (ebrary, viewed January 31, 2014)
Subject Coding theory.
Cryptography
TECHNOLOGY & ENGINEERING -- Mechanical.
Coding theory
Cryptography
Form Electronic book
ISBN 9783486781267
348678126X
348675212X
9783486752120