logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

[eBook Code] Foundations of Coding

[eBook Code] Foundations of Coding (eBook Code, 1st)

(Compression, Encryption, Error Correction)

장 기욤 뒤마, Jean-louis Roch, Éric Tannier, Sébastien Varrette (지은이)
Wiley
173,530원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
138,820원 -20% 0원
0원
138,820원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

[eBook Code] Foundations of Coding
eBook 미리보기

책 정보

· 제목 : [eBook Code] Foundations of Coding (eBook Code, 1st) (Compression, Encryption, Error Correction)
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781118960868
· 쪽수 : 376쪽
· 출판일 : 2015-01-22

목차

List of Figures, Tables, Algorithms and Acronyms ix

Foreword xvii

Introduction 1

1 Foundations of Coding 5

1.1 From Julius Caesar to Telecopy 6

1.1.1 The Source: from an Image to a Sequence of Pixels 6

1.1.2 Message Compression 7

1.1.3 Error Detection 8

1.1.4 Encryption 9

1.1.5 Decryption 9

1.1.6 Drawbacks of the Fax Code 11

1.1.7 Orders of Magnitude and Complexity Bounds for Algorithms 12

1.2 Stream Ciphers and Probabilities 15

1.2.1 The Vernam Cipher and the One-Time-Pad Cryptosystem 15

1.2.2 Some Probability 16

1.2.3 Entropy 18

1.2.4 Steganography and Watermarking 23

1.2.5 Perfect Secrecy 24

1.2.6 Perfect Secrecy in Practice and Kerckhoffs’ Principles 24

1.3 Block Ciphers, Algebra, and Arithmetic 26

1.3.1 Blocks and Chaining Modes from CBC to CTR 27

1.3.2 Algebraic Structure of Codewords 30

1.3.3 Bijective Encoding of a Block 35

1.3.4 Construction of Prime Fields and Finite Fields 43

1.3.5 Implementation of Finite Fields 52

1.3.6 Curves Over Finite Fields 57

1.3.7 Pseudo-Random Number Generators (PRNG) 62

1.4 Decoding, Decryption, Attacks 68

1.4.1 Decoding without Ambiguity 68

1.4.2 Noninjective Codes 73

1.4.3 Cryptanalysis 84

2 Information Theory and Compression 99

2.1 Information Theory 100

2.1.1 Average Length of a Code 100

2.1.2 Entropy as a Measure of the Amount of Information 101

2.1.3 Shannon’s Theorem 102

2.2 Statistical Encoding 104

2.2.1 Huffman’s Algorithm 104

2.2.2 Arithmetic Encoding 109

2.2.3 Adaptive Codes 114

2.3 Heuristics of Entropy Reduction 117

2.3.1 Run-Length Encoding (RLE) 117

2.3.2 Move-to-Front 119

2.3.3 Burrows–Wheeler Transform (BWT) 120

2.4 Common Compression Codes 122

2.4.1 Lempel–Ziv’s Algorithm and gzip Variants 123

2.4.2 Comparisons of Compression Algorithms 126

2.4.3 GIF and PNG Formats for Image Compression 127

2.5 Lossy Compression 128

2.5.1 Deterioration of Information 128

2.5.2 Transformation of Audiovisual Information 128

2.5.3 JPEG Format 129

2.5.4 Motion Picture Experts Group (MPEG) Format 133

3 Cryptology 136

3.1 General Principles 137

3.1.1 Terminology 137

3.1.2 What is the Use of Cryptography? 138

3.1.3 Main Types of Threats 139

3.2 Secret Key Cryptography 141

3.2.1 Principle of Symmetric Cryptography 141

3.2.2 Classes of Symmetric Encryption Schemes 143

3.2.3 Data Encryption Standard (DES) System 145

3.2.4 Rijndael: Advanced Encryption Standard (AES) 151

3.3 Key Exchange 161

3.3.1 Diffie–Hellman Protocol and Man-in-the-Middle Attacks 161

3.3.2 Kerberos: a Secret Key Provider 163

3.4 Public Key Cryptography 167

3.4.1 Motivations and Main Principles 167

3.4.2 Rivest–Shamir–Adleman (RSA) Encryption 169

3.4.3 El Gamal Encryption 174

3.5 Authentication, Integrity, Nonrepudiation, Signatures 175

3.5.1 Cryptographic Hash Functions 176

3.5.2 Public Key Authentication 186

3.5.3 Electronic Signatures 187

3.6 Key Management 192

3.6.1 Generation of Cryptographically Secure Bits 192

3.6.2 Public Key Infrastructure (PKI) 192

3.6.3 Securing Channels with the SSH Tool 203

4 Error Detection and Correction 209

4.1 Principle of Error Detection and Error Correction 211

4.1.1 Block Coding 211

4.1.2 A Simple Example of Parity Detection 211

4.1.3 Correction Using Longitudinal and Transverse Parity 212

4.1.4 Encoding, Decoding, and Probability of Error 213

4.1.5 Shannon’s Second Theorem 214

4.2 Error Detection by Parity – CRC Codes 218

4.2.1 Parity Check on Integers: ISBN, EAN, LUHN 218

4.2.2 Cyclic Redundancy Checks (CRC) 221

4.3 Distance of a Code 222

4.3.1 Error Correction Code and Hamming Distance 222

4.3.2 Equivalent Codes, Extended Codes, and Shortened Codes 227

4.3.3 Perfect Codes 229

4.3.4 Binary Hamming Codes 230

4.4 Linear Codes and Cyclic Codes 232

4.4.1 Linear Codes and Minimum Redundancy 232

4.4.2 Encoding and Decoding of Linear Codes 234

4.4.3 Low Density Parity Check (LDPC) Codes 238

4.4.4 Cyclic Codes 250

4.4.5 Bose–Chaudhuri–Hocquenghem (BCH) Codes 254

4.4.6 Optimal BCH Codes: Reed–Solomon Codes 256

4.5 Bursts of Errors and Interleaving 262

4.5.1 Packets of Errors 262

4.5.2 Interleaving 263

4.5.3 Interleaving with Delay and Interleaving Table 264

4.5.4 Cross-Interleaved codes 265

4.6 Convolutional Codes and Turbo Codes 268

4.6.1 Encoding by Convolution 268

4.6.2 Shortest Path Decoding 269

4.6.3 Turbo Codes 273

Compression, Encryption, Correction: As a Conclusion 277

Problem Solutions 281

Bibliography 343

Index 345

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책