Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction

Здесь есть возможность читать онлайн «Aiden A. Bruen - Cryptography, Information Theory, and Error-Correction» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cryptography, Information Theory, and Error-Correction: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cryptography, Information Theory, and Error-Correction»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century
Cryptography, Information Theory, and Error-Correction

Cryptography, Information Theory, and Error-Correction — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cryptography, Information Theory, and Error-Correction», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

What we mean by “not unique” is that there may be more than one value of картинка 232such that the remainder of картинка 233, on division by Cryptography Information Theory and ErrorCorrection - изображение 234, is Cryptography Information Theory and ErrorCorrection - изображение 235. The reason for nonuniqueness is that, instead of working with Cryptography Information Theory and ErrorCorrection - изображение 236, we can work with any number картинка 237that is divisible by картинка 238and Cryptography Information Theory and ErrorCorrection - изображение 239, as explained in the algorithm description and in Chapter 19. It is often possible to find Cryptography Information Theory and ErrorCorrection - изображение 240so that the calculations are simplified, and we get a shortcut even if the resulting картинка 241is the same.

We present new insights on public key and symmetric encryption.

3.1 The Basic Idea of Cryptography

Cryptography is an old subject dating back at least as far as 1500 BCE. A technique developed by Porta associated also with Vigenère in the Middle Ages is close to the cutting edge of part of modern cryptography. Additionally, cryptography is closely connected to information theory and error‐correction, with many fundamental ideas going back to Claude Shannon. Further details about Shannon and the history of cryptography are provided in Chapter 1.

Cryptography is the art of keeping messages secret. Imagine that A, Bare two entities who wish to communicate in secret. Assume Awants to send a secret message to B.

The procedure is as follows ( Figure 3.1). First, Ascrambles the message using a cryptographic key . The process of scrambling the message is called encryption : alternatively, A enciphers the message.

Figure 31General encryption The encryption or enciphering scrambles the - фото 242

Figure 3.1General encryption.

The encryption or enciphering scrambles the message картинка 243, that is, the plain text, into unintelligible output called the cipher text. Next, the sender Atransmits in the open (publicly) the cipher text картинка 244to the receiver B. When Breceives the cipher text, Bdescrambles or deciphers the cipher text using a key that may or may not be the same as the original key used by A. Bcan now recover the original message картинка 245that was transmitted by A.

In summary, the sender Aencrypts or enciphers the message картинка 246into unintelligible cipher text картинка 247using an encrypting or enciphering key. The enciphering is done by a specific procedure involving a sequence of steps or rules called the enciphering algorithm (or encryption algorithm ).

Using the decryption or deciphering key , and using the deciphering algorithm ( decryption algorithm ), the receiver Bthen decrypts or deciphers картинка 248and thus recovers the original message картинка 249that was transmitted by the transmitter A. Moreover, at least in theory, an intruder Eve cannot access the message картинка 250since Eve will not have the decryption key that is needed for decrypting (deciphering, inverting) картинка 251to recover картинка 252.

Evidently, everything depends on Bbeing the sole possessor of the decryption key, apart possibly from A. (If the decryption and encryption keys are the same – as they are in symmetric encryption, then Aalso has the decryption key).

Generally speaking, a key is a mathematical object such as a number (or several numbers) or a string of zeros and ones, i.e. a binary string such as the binary string (1 1 0 1) of length 4.

The enciphering and deciphering operations are usually mathematical procedures. For example, let us suppose that the enciphering key is the number 7 and that the enciphering operation is “add 7.” Suppose the secret message that Awants to transmit to Bis the number 6. (For example Amight be directing her stockbroker Bto buy six thousand shares of a given security on the stock market).

Then, Acalculates the cipher text 13 ( = 6 plus 7) and transmits this to B. Now, Bknows that the enciphering transformation is “add 7.” To undo, or invert this, Bsubtracts 7 from 13 (as this is the deciphering operation) and ends up recovering the original message transmitted by A, namely 6.

It should be mentioned that the cryptographic keys above need not be mathematical objects: in fact, historically, they often were not. A famous example, mentioned in Chapter 1, occurred in World War II when, in effect, the key was an entire language! This was the Navajo language used by the Navajo tribe in Arizona and adapted for encryption purposes by the US armed forces around 1942. Enciphering consisted of translating messages from English into the Navajo language, while deciphering simply meant translating Navajo back to English at the other end. At that time, this symmetric encryption was extremely effective.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cryptography, Information Theory, and Error-Correction»

Представляем Вашему вниманию похожие книги на «Cryptography, Information Theory, and Error-Correction» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cryptography, Information Theory, and Error-Correction»

Обсуждение, отзывы о книге «Cryptography, Information Theory, and Error-Correction» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x