Coding and cryptography : synergy for a robust communication /
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The int...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
München :
Oldenbourg Wissenschaftsverlag,
[2013]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion.
- 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes.
- 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions.
- 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations.