Скачать книгу

24.8 Some Details on the Random Permutation 24.9 The Case Where Eve Has Nonzero Initial Information 24.10 Hash Functions Using Block Designs 24.11 Concluding Remarks Note Chapter 25: New Identities for the Shannon Function with Applications 25.1 Extensions of a Binary Symmetric Channel 25.2 A Basic Entropy Equality 25.3 The New Identities 25.4 Applications to Cryptography and a Shannon‐Type Limit 25.5 Problems 25.6 Solutions Chapter 26: Blockchain and Bitcoin 26.1 Ledgers, Blockchains 26.2 Hash Functions, Cryptographic Hashes 26.3 Digital Signatures 26.4 Bitcoin and Cryptocurrencies 26.5 The Append‐Only Network, Identities, Timestamp, Definition of a Bitcoin 26.6 The Bitcoin Blockchain and Merkle Roots 26.7 Mining, Proof‐of‐Work, Consensus 26.8 Thwarting Double Spending Chapter 27: IoT, The Internet of Things 27.1 Introduction 27.2 Analog to Digital (A/D) Converters 27.3 Programmable Logic Controller 27.4 Embedded Operating Systems 27.5 Evolution, From SCADA to the Internet of Things 27.6 Everything is Fun and Games until Somebody Releases a Stuxnet 27.7 Securing the IoT, a Mammoth Task 27.8 Privacy and Security Notes Chapter 28: In the Cloud 28.1 Introduction 28.2 Distributed Systems 28.3 Cloud Storage – Availability and Copyset Replication 28.4 Homomorphic Encryption 28.5 Cybersecurity 28.6 Problems 28.7 Solutions Chapter 29: Review Problems and Solutions 29.1 Problems 29.2 Solutions

      13  Appendix A A.1 ASCII

      14  Appendix B B.1 Shannon's Entropy Table

      15  Glossary

      16  References

      17  Index

      18  End User License Agreement

      List of Tables

      1 Chapter 2Table 2.1 Approximate frequencies of letters in the English language.Table 2.2 Number of character coincidences corresponding to displacement

      2 Chapter 21Table 21.1 Factorization of

over

      3 Chapter 24Table 24.1 Bit agreements between two remnant stringsTable 24.2 Expressions for

for
Table 24.3 Expressions for
for
Table 24.4 Optimal values for
Table 24.5 Reconciling two 400 bit keys

      4 Appendix ATable A.1 ASCII table

      5 Appendix BTable B.1 Shannon's entropy table.

      List of Illustrations

      1 Chapter 1Figure 1.1 (a) Claude E. Shannon, Theseus, and the maze (see Section 1.4). (...

      2 Chapter 2Figure 2.1 Caesar cipher wheel.Figure 2.2 The German Enigma machine. (a) the Enigma machine type‐K, (b) the...Figure 2.3 Block diagram of the Enigma machine.Figure 2.4 Simplified Enigma model.

      3 Chapter 3Figure 3.1 General encryption.Figure 3.2 Symmetric encryption.Figure

Скачать книгу