Codes: an introduction to information communication and cryptography
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Springer
2008
|
Schriftenreihe: | Springer undergraduate mathematics series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | X, 273 S. graph. Darst. |
ISBN: | 1848002726 9781848002722 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023398065 | ||
003 | DE-604 | ||
005 | 20081121 | ||
007 | t | ||
008 | 080716s2008 gw d||| |||| 00||| eng d | ||
015 | |a 08,N15,0378 |2 dnb | ||
016 | 7 | |a 988023849 |2 DE-101 | |
020 | |a 1848002726 |c Pb. : ca. EUR 32.05 (freier Pr.) |9 1-8480-0272-6 | ||
020 | |a 9781848002722 |c Pb. : ca. EUR 32.05 (freier Pr.) |9 978-1-84800-272-2 | ||
024 | 3 | |a 9781848002722 | |
028 | 5 | 2 | |a 12237326 |
035 | |a (OCoLC)226976116 | ||
035 | |a (DE-599)DNB988023849 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-20 |a DE-703 |a DE-355 |a DE-29T |a DE-824 |a DE-706 |a DE-11 | ||
050 | 0 | |a QA268 | |
082 | 0 | |a 003.54 |2 22 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 510 |2 sdnb | ||
100 | 1 | |a Biggs, Norman |d 1941- |e Verfasser |0 (DE-588)136105580 |4 aut | |
245 | 1 | 0 | |a Codes |b an introduction to information communication and cryptography |c Norman L. Biggs |
264 | 1 | |a London |b Springer |c 2008 | |
300 | |a X, 273 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Springer undergraduate mathematics series | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-84800-273-9 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016580896&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016580896 |
Datensatz im Suchindex
_version_ | 1804137779448250368 |
---|---|
adam_text | Contents
Preface
.........................................................
v
1.
Coding and its uses
......................................... 1
1.1
Messages
................................................ 1
1.2
Coding
.................................................. 3
1.3
Bask; definitions
.......................................... 4
1.4
Coding for economy
...................................... 7
1.5
Coding for reliability
...................................... 8
1.6
Coding for security
....................................... 9
2.
Prefix-free codes
............................................ 13
2.1
The decoding problem
.................................... 13
2.2
Representing codes by trees
................................ 16
2.3
The Kraft-McMillan number
............................... 18
2.4
Unique decodability implies
К
<
.......................... 21
2.5
Proof of the Counting Principle
............................ 24
3.
Economical coding
.......................................... 27
3.1
The concept of a source
................................... 27
3.2
The optimization problem
................................. 30
3.3
Entropy
................................................. 32
3.4
Entropy, uncertainty, and information
....................... 34
3.5
Optimal codes the fundamental theorems
.................. 38
3.6
Huffman s rule
........................................... 40
3.7
Optimality of Huffman codes
............................... 44
4.
Data compression
........................................... 47
4.1
Coding in blocks
......................................... 47
4.2
Distributions on product sets
.............................. 49
4.3
Stationary sources
........................................ 52
4.4
Coding a stationary source
................................ 55
4.5
Algorithms for data compression
........................... 58
4.6
Using numbers as codewords
............................... 59
4.7
Arithmetic coding
........................................ 62
4.8
The properties of arithmetic coding
......................... 65
4.9
Coding with a dynamic dictionary
.......................... 67
5.
Noisy channels
.............................................. 73
5.1
The definition of a channel
................................ 73
5.2
Transmitting a source through a channel
.................... 76
5.3
Conditional entropy
...................................... 78
5.4
The capacity of a channel
................................. 81
5.5
Calculating the capacity of a channel
....................... 83
6.
The problem of reliable communication
..................... 89
6.1
Communication using a noisy channel
....................... 89
6.2
The extended
BSC ....................................... 94
6.3
Decision rules
............................................ 96
6.4
Error correction
..........................................100
6.5
The packing bound
.......................................102
7.
The noisy coding theorems
.................................107
7.1
The probability of a mistake
...............................107
7.2
Coding at a given rate
....................................
Ill
7.3
Transmission using the extended
BSC.......................113
7.4
The rate should not exceed the capacity
.....................117
7.5
Shannon s theorem
.......................................119
7.6
Proof of
Fano
s
inequality
.................................120
8.
Linear codes
................................................123
8.1
Introduction to linear codes
................................123
8.2
Construction of linear codes using matrices
..................126
8.3
The check matrix of a linear code
...........................128
8.4
Constructing l-error-correcting codes
.......................131
8.5
Tho decoding problem
....................................135
Contents
¡χ
9.
Algebraic coding theory
....................................141
9.1
Hamming codes
..........................................141
9.2
Cyclic codes
.............................................145
9.3
Classification and properties of cyclic codes
..................149
9.4
Codes that can correct more than one error
..................153
9.5
Definition of a family of BCH codes
.........................155
9.6
Properties of the BCH codes
...............................158
10.
Coding natural languages
...................................163
10.1
Natural languages as sources
...............................163
10.2
The uncertainty of english
................................165
10.3
Redundancy and meaning
.................................168
10.4
Introduction to cryptography
..............................170
10.5
Frequency analysis
........................................174
11.
The development of cryptography
..........................179
11.1
Symmetric, key cryptosystems
..............................179
11.2
Poly-alphabetic encryption
................................180
11.3
The
Playfair
system
......................................183
11.4
Mathematical algorithms in cryptography
...................185
11.5
Methods of attack
........................................187
12.
Cryptography in theory and practice
.......................191
12.1
Encryption in terms of a channel
...........................191
12.2
Perfect secrecy
...........................................195
12.3
The one-time pad
........................................197
12.4
Iterative methods
.........................................198
12.5
Encryption standards
.....................................201
12.6
The key distribution problem
..............................203
13.
The RSA
cryptoSystem
.....................................207
13.1
A new approach to cryptography
...........................207
13.2
Outline of the RSA system
................................209
13.3
Feasibility of RSA
........................................212
13.4
Correctness of RSA
.......................................215
13.5
Confidentiality of RSA
....................................217
14.
Cryptography and calculation
..............................221
14.1
The scope of cryptography
.................................221
14.2
Hashing
.................................................222
14.3
Calculations in the field ¥p
................................224
14.4
The discrete logarithm
....................................226
14.5
The ElGamal cryptosystem
................................228
14.6
The Diffie-Hellman key distribution system
..................230
14.7
Signature schemes
........................................232
15.
Elliptic curve cryptography
.................................287
15.1
Calculations in finite groups
...............................237
15.2
The general ElGamal cryptosystem
.........................239
15.3
Elliptic curves
............................................241
15.4
The group of an elliptic curve
..............................245
15.5
Improving the efficiency of exponentiation
...................248
15.6
A final word
.............................................250
Answers to odd-numbered exercises
............................255
Index
...........................................................271
|
adam_txt |
Contents
Preface
.
v
1.
Coding and its uses
. 1
1.1
Messages
. 1
1.2
Coding
. 3
1.3
Bask; definitions
. 4
1.4
Coding for economy
. 7
1.5
Coding for reliability
. 8
1.6
Coding for security
. 9
2.
Prefix-free codes
. 13
2.1
The decoding problem
. 13
2.2
Representing codes by trees
. 16
2.3
The Kraft-McMillan number
. 18
2.4
Unique decodability implies
К
<\
. 21
2.5
Proof of the Counting Principle
. 24
3.
Economical coding
. 27
3.1
The concept of a source
. 27
3.2
The optimization problem
. 30
3.3
Entropy
. 32
3.4
Entropy, uncertainty, and information
. 34
3.5
Optimal codes the fundamental theorems
. 38
3.6
Huffman's rule
. 40
3.7
Optimality of Huffman codes
. 44
4.
Data compression
. 47
4.1
Coding in blocks
. 47
4.2
Distributions on product sets
. 49
4.3
Stationary sources
. 52
4.4
Coding a stationary source
. 55
4.5
Algorithms for data compression
. 58
4.6
Using numbers as codewords
. 59
4.7
Arithmetic coding
. 62
4.8
The properties of arithmetic coding
. 65
4.9
Coding with a dynamic dictionary
. 67
5.
Noisy channels
. 73
5.1
The definition of a channel
. 73
5.2
Transmitting a source through a channel
. 76
5.3
Conditional entropy
. 78
5.4
The capacity of a channel
. 81
5.5
Calculating the capacity of a channel
. 83
6.
The problem of reliable communication
. 89
6.1
Communication using a noisy channel
. 89
6.2
The extended
BSC . 94
6.3
Decision rules
. 96
6.4
Error correction
.100
6.5
The packing bound
.102
7.
The noisy coding theorems
.107
7.1
The probability of a mistake
.107
7.2
Coding at a given rate
.
Ill
7.3
Transmission using the extended
BSC.113
7.4
The rate should not exceed the capacity
.117
7.5
Shannon's theorem
.119
7.6
Proof of
Fano
s
inequality
.120
8.
Linear codes
.123
8.1
Introduction to linear codes
.123
8.2
Construction of linear codes using matrices
.126
8.3
The check matrix of a linear code
.128
8.4
Constructing l-error-correcting codes
.131
8.5
Tho decoding problem
.135
Contents
¡χ
9.
Algebraic coding theory
.141
9.1
Hamming codes
.141
9.2
Cyclic codes
.145
9.3
Classification and properties of cyclic codes
.149
9.4
Codes that can correct more than one error
.153
9.5
Definition of a family of BCH codes
.155
9.6
Properties of the BCH codes
.158
10.
Coding natural languages
.163
10.1
Natural languages as sources
.163
10.2
The uncertainty of english
.165
10.3
Redundancy and meaning
.168
10.4
Introduction to cryptography
.170
10.5
Frequency analysis
.174
11.
The development of cryptography
.179
11.1
Symmetric, key cryptosystems
.179
11.2
Poly-alphabetic encryption
.180
11.3
The
Playfair
system
.183
11.4
Mathematical algorithms in cryptography
.185
11.5
Methods of attack
.187
12.
Cryptography in theory and practice
.191
12.1
Encryption in terms of a channel
.191
12.2
Perfect secrecy
.195
12.3
The one-time pad
.197
12.4
Iterative methods
.198
12.5
Encryption standards
.201
12.6
The key distribution problem
.203
13.
The RSA
cryptoSystem
.207
13.1
A new approach to cryptography
.207
13.2
Outline of the RSA system
.209
13.3
Feasibility of RSA
.212
13.4
Correctness of RSA
.215
13.5
Confidentiality of RSA
.217
14.
Cryptography and calculation
.221
14.1
The scope of cryptography
.221
14.2
Hashing
.222
14.3
Calculations in the field ¥p
.224
14.4
The discrete logarithm
.226
14.5
The ElGamal cryptosystem
.228
14.6
The Diffie-Hellman key distribution system
.230
14.7
Signature schemes
.232
15.
Elliptic curve cryptography
.287
15.1
Calculations in finite groups
.237
15.2
The general ElGamal cryptosystem
.239
15.3
Elliptic curves
.241
15.4
The group of an elliptic curve
.245
15.5
Improving the efficiency of exponentiation
.248
15.6
A final word
.250
Answers to odd-numbered exercises
.255
Index
.271 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Biggs, Norman 1941- |
author_GND | (DE-588)136105580 |
author_facet | Biggs, Norman 1941- |
author_role | aut |
author_sort | Biggs, Norman 1941- |
author_variant | n b nb |
building | Verbundindex |
bvnumber | BV023398065 |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 |
callnumber-search | QA268 |
callnumber-sort | QA 3268 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)226976116 (DE-599)DNB988023849 |
dewey-full | 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.54 |
dewey-search | 003.54 |
dewey-sort | 13.54 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02018nam a2200529 c 4500</leader><controlfield tag="001">BV023398065</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081121 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080716s2008 gw d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N15,0378</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">988023849</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1848002726</subfield><subfield code="c">Pb. : ca. EUR 32.05 (freier Pr.)</subfield><subfield code="9">1-8480-0272-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848002722</subfield><subfield code="c">Pb. : ca. EUR 32.05 (freier Pr.)</subfield><subfield code="9">978-1-84800-272-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781848002722</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12237326</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)226976116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB988023849</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA268</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">510</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Biggs, Norman</subfield><subfield code="d">1941-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136105580</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Codes</subfield><subfield code="b">an introduction to information communication and cryptography</subfield><subfield code="c">Norman L. Biggs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 273 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Springer undergraduate mathematics series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-84800-273-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016580896&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016580896</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV023398065 |
illustrated | Illustrated |
index_date | 2024-07-02T21:22:44Z |
indexdate | 2024-07-09T21:17:43Z |
institution | BVB |
isbn | 1848002726 9781848002722 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016580896 |
oclc_num | 226976116 |
open_access_boolean | |
owner | DE-20 DE-703 DE-355 DE-BY-UBR DE-29T DE-824 DE-706 DE-11 |
owner_facet | DE-20 DE-703 DE-355 DE-BY-UBR DE-29T DE-824 DE-706 DE-11 |
physical | X, 273 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series2 | Springer undergraduate mathematics series |
spelling | Biggs, Norman 1941- Verfasser (DE-588)136105580 aut Codes an introduction to information communication and cryptography Norman L. Biggs London Springer 2008 X, 273 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Springer undergraduate mathematics series Coding theory Cryptography Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Codierungstheorie (DE-588)4139405-7 s Erscheint auch als Online-Ausgabe 978-1-84800-273-9 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016580896&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Biggs, Norman 1941- Codes an introduction to information communication and cryptography Coding theory Cryptography Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4139405-7 (DE-588)4033329-2 (DE-588)4151278-9 |
title | Codes an introduction to information communication and cryptography |
title_auth | Codes an introduction to information communication and cryptography |
title_exact_search | Codes an introduction to information communication and cryptography |
title_exact_search_txtP | Codes an introduction to information communication and cryptography |
title_full | Codes an introduction to information communication and cryptography Norman L. Biggs |
title_fullStr | Codes an introduction to information communication and cryptography Norman L. Biggs |
title_full_unstemmed | Codes an introduction to information communication and cryptography Norman L. Biggs |
title_short | Codes |
title_sort | codes an introduction to information communication and cryptography |
title_sub | an introduction to information communication and cryptography |
topic | Coding theory Cryptography Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Coding theory Cryptography Codierungstheorie Kryptologie Einführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016580896&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT biggsnorman codesanintroductiontoinformationcommunicationandcryptography |