Coding and cryptography. Synergy for a robust communication (Q2851995)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Coding and cryptography. Synergy for a robust communication |
scientific article; zbMATH DE number 6213616
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Coding and cryptography. Synergy for a robust communication |
scientific article; zbMATH DE number 6213616 |
Statements
7 October 2013
0 references
message authentication codes
0 references
digital signatures
0 references
correction of Reed-Solomon decoding errors
0 references
security aspects
0 references
Coding and cryptography. Synergy for a robust communication (English)
0 references
This book comprises of 10 chapters. The first chapter provides a brief introduction of the subject connected with the theme of the book. Chapter 2 provides some basic techniques that are helpful for further understanding. Chapter 3 presents studies that are also related to the process of generating cryptographically secured messages for transmission over noisy channels. The algorithms of Soft Input Description originally published by the author (2008) are presented in Chapter 4. Chapter 5 describes various applications of the techniques of Chapter 4. The technique presented in Chapter 4 has been referred as Soft Input Hard Verification. This has been expanded in Chapter 6 to Soft Input Soft Verification providing additional improvement of the correction rate. Chapter 7 has been dedicated to the security properties of soft verification, to the reduction of the security level as well as the compensation of this reduction in order to assure the expected level of security.NEWLINENEWLINE Chapter 8 defines soft output. According to the author, it is a first approach to quantitatively express ``Trust'', i.e. ``Reliability'', which should lead to a new theory of trust. The remaining chapters describe possible applications, provide a summary and give an overview of the need for future research.NEWLINENEWLINE Overall, the book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. The book is based on new developments of coding and cryptography. In fact, the integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book provides a contribution to the improvement of the robustness of data communication.NEWLINENEWLINE The objective of the book is not merely the presentation of new research results, but a general presentation of the current situation of the use of cryptographic checksums, especially message authentication codes over noisy channels. The book should be useful for graduate students of electrical engineering, mathematics and computer science as well as engineers and developers in the field of secure communication systems.
0 references
0.7246274948120117
0 references
0.7195376753807068
0 references