Perfect Secrecy in IoT (eBook)

A Hybrid Combinatorial-Boolean Approach
eBook Download: PDF
2022 | 1st ed. 2022
XIII, 115 Seiten
Springer International Publishing (Verlag)
978-3-031-13191-2 (ISBN)

Lese- und Medienproben

Perfect Secrecy in IoT - Behrouz Zolfaghari, Khodakhast Bibak
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT.

In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.

This book is organized in two parts. The first part studies information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.



Behrouz Zolfaghari has received his Ph.D in Computer Engineering from Amirkabir University, Tehran, Iran. He has done a postdoc at IIT (Indian Institute of Technology) Guwahati, India.He is currently doing another postdoc in the University of Guelph, Canada. His research areas includes VLSI Design, High-Performance Computing, Information-Theoretic Cryptography,Hardware-Oriented Cryptography,  AI-assisted Cryptographyand Secure AI.

Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, Khodakhast was a Postdoctoral Research Fellow (May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). He earned a Master of Mathematics degree (April 2013) at the Department of Combinatorics and Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhast's research interests are Cybersecurity, Applied Cryptography, Quantum Information Science (QIS), Artificial Intelligence, and the related areas.

Erscheint lt. Verlag 27.9.2022
Reihe/Serie Signals and Communication Technology
Signals and Communication Technology
Zusatzinfo XIII, 115 p. 26 illus., 25 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Schlagworte Boolean functions • Cryptographic Boolean Functions • information-theoretic cryptography • Perfectly-Secure Cryptography • perfect secrecy
ISBN-10 3-031-13191-6 / 3031131916
ISBN-13 978-3-031-13191-2 / 9783031131912
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99