Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure and symmetry of these topics needs a whole bunch of non trivial knowledge of algebra and geometry that will be used to both, evaluate those methods and search for new codes and cryptographic applications. This book shows those methods in a self-contained form.
There are two basic methods of error control for communication, both involving coding of the messages. With forward error correction, the codes are used to detect and correct errors. In a repeat request system, the codes are used to detect errors and, if there are errors, request a retransmission. Error detection is usually much simpler to implement than error correction and is widely used. However, it is given a very cursory treatment in almost all textbooks on coding theory. Only a few older books are devoted to error detecting codes. This book begins with a short introduction to the theory of block codes with emphasis on the parts important for error detection. The weight distribution is particularly important for this application and is treated in more detail than in most books on error correction. A detailed account of the known results on the probability of undetected error on the q-ary symmetric channel is also given.
Information, Coding and Mathematics is a classic reference for both professional and academic researchers working in error-correction coding and decoding, Shannon theory, cryptography, digital communications, information security, and electronic engineering. The work represents a collection of contributions from leading experts in turbo coding, cryptography and sequences, Shannon theory and coding bounds, and decoding theory and applications. All of the contributors have individually and collectively dedicated their work as a tribute to the outstanding work of Robert J. McEliece. Information, Coding and Mathematics covers the latest advances in the widely used and rapidly developing field of information and communication technology.
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security. Contents:Extremal Problems of Coding Theory (A Barg)Analysis and Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson)Quantum Error-Correcting Codes (K Feng)Public Key Infrastructures (D Gollmann)Computational Methods in Public Key Cryptology (A K Lenstra)Detecting and Revoking Compromised Keys (T Matsumoto)Algebraic Function Fields Over Finite Fields (H Niederreiter)Authentication Schemes (D Y Pei)Exponential Sums in Coding Theory, Cryptology and Algorithms (I E Shparlinski)Distributed Authorization: Principles and Practice (V Varadharajan)Introduction to Algebraic Geometry Codes (C P Xing) Readership: Graduate students and researchers in number theory, discrete mathematics, coding theory, cryptology and IT security. Keywords:Coding Theory;Cryptology;Number Theory;Algebraic-Geometry Codes;Public-Key Infrastructures;Error-Correcting Codes
Discover the first unified treatment of today's most essentialinformation technologies— Compressing, Encrypting, andEncoding With identity theft, cybercrime, and digital file sharingproliferating in today's wired world, providing safe and accurateinformation transfers has become a paramount concern. The issuesand problems raised in this endeavor are encompassed within threedisciplines: cryptography, information theory, anderror-correction. As technology continues to develop, these fieldshave converged at a practical level, increasing the need for aunified treatment of these three cornerstones of the informationage. Stressing the interconnections of the disciplines, Cryptography,Information Theory, and Error-Correction offers a complete, yetaccessible account of the technologies shaping the 21st century.This book contains the most up-to-date, detailed, and balancedtreatment available on these subjects. The authors draw on theirexperience both in the classroom and in industry, giving the book'smaterial and presentation a unique real-world orientation. With its reader-friendly style and interdisciplinary emphasis,Cryptography, Information Theory, and Error-Correction serves asboth an admirable teaching text and a tool for self-learning. Thechapter structure allows for anyone with a high school mathematicseducation to gain a strong conceptual understanding, and provideshigher-level students with more mathematically advanced topics. Theauthors clearly map out paths through the book for readers of alllevels to maximize their learning. This book: Is suitable for courses in cryptography, information theory, orerror-correction as well as courses discussing all three areas Provides over 300 example problems with solutions Presents new and exciting algorithms adopted by industry Discusses potential applications in cell biology Details a new characterization of perfect secrecy Features in-depth coverage of linear feedback shift registers(LFSR), a staple of modern computing Follows a layered approach to facilitate discussion, withsummaries followed by more detailed explanations Provides a new perspective on the RSA algorithm Cryptography, Information Theory, and Error-Correction is anexcellent in-depth text for both graduate and undergraduatestudents of mathematics, computer science, and engineering. It isalso an authoritative overview for IT professionals, statisticians,mathematicians, computer scientists, electrical engineers,entrepreneurs, and the generally curious.
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involvedare quite ‘cl- sical’, such as Fourier analysis and di?erential equations. In fact, a great deal of the mathematical background is part of what used to be called ‘pure’ ma- ematics, indicating that it was created in order to deal with problems that originated within mathematics itself. It has taken many years for mathema- cians to come to terms with this situation, and some of them are still not entirely happy about it. Thisbookisanintegratedintroductionto Coding.Bythis Imeanreplacing symbolic information, such as a sequence of bits or a message written in a naturallanguage,byanother messageusing (possibly) di?erentsymbols.There are three main reasons for doing this: Economy (data compression), Reliability (correction of errors), and Security (cryptography). I have tried to cover each of these three areas in su?cient depth so that the reader can grasp the basic problems and go on to more advanced study. The mathematical theory is introduced in a way that enables the basic problems to bestatedcarefully,butwithoutunnecessaryabstraction.Theprerequisites(sets andfunctions,matrices,?niteprobability)shouldbefamiliartoanyonewhohas taken a standard course in mathematical methods or discrete mathematics. A course in elementary abstract algebra and/or number theory would be helpful, but the book contains the essential facts, and readers without this background should be able to understand what is going on. vi Thereareafewplaceswherereferenceismadetocomputeralgebrasystems.
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.
Offers a comprehensive introduction to the fundamentalstructures and applications of a wide range of contemporary codingoperations This book offers a comprehensive introduction to the fundamentalstructures and applications of a wide range of contemporary codingoperations. This text focuses on the ways to structure informationso that its transmission will be in the safest, quickest, and mostefficient and error-free manner possible. All coding operations arecovered in a single framework, with initial chapters addressingearly mathematical models and algorithmic developments which led tothe structure of code. After discussing the general foundations ofcode, chapters proceed to cover individual topics such as notionsof compression, cryptography, detection, and correction codes. Bothclassical coding theories and the most cutting-edge models areaddressed, along with helpful exercises of varying complexities toenhance comprehension. Explains how to structure coding information so that itstransmission is safe, error-free, efficient, and fast Includes a pseudo-code that readers may implement in theirpreferential programming language Features descriptive diagrams and illustrations, and almost 150exercises, with corrections, of varying complexity to enhancecomprehension Foundations of Coding: Compression, Encryption,Error-Correction is an invaluable resource for understandingthe various ways information is structured for its secure andreliable transmission in the 21st-century world.