[GEMATMW] Module 4: Mathematics in Digital Communications

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Cryptosystem

relay an information from one place to another without anyone else being able to know it

2
New cards

Encryption

process of using an algorithm to transform information into a format that cannot be read

3
New cards

Decryption

process of using another algorithm to transform encrypted information back into a readable format

4
New cards

plain text

original information

5
New cards

cipher text

encrypted version

6
New cards

Confidentiality
Integrity
Authenticity
Non-repudiation

4 Objectives of Encryption

7
New cards

Confidentiality

sender and receiver can be assured that no third party can read the message

8
New cards

Integrity

sender and receiver can be sure that no third party can make changes in the message

9
New cards

Authenticity

receiver can be sure that it is the sender who sent the message

10
New cards

Non-repudiation

receiver can prove to any third party that the sender sent the message

11
New cards

Caesar’s Cipher

cipher that shifts letters to 3 (A → D)

12
New cards

Vigenère Cipher

substitution cipher where a different alphabet was used for the next letter of the message, with the alphabets repeating periodically according to some key

13
New cards

Mono-Alphabetic Cipher System

cipher system that shifts all letters n times

14
New cards

Poly-Alphabetic Cipher System

shifting of letters are not defined

15
New cards

Symmetric encryption

secret key encryption; uses one key for encryption and decryption

16
New cards

Asymmetric encryption

public key cryptosystem; uses a public key for encryption and a separate private key for decryption

17
New cards

Public Key Cryptosystem

(1976) W. Diffie and M. Hellman

18
New cards

Public Key Cryptosystem

each individual is assigned public and private keys to encrypt and decrypt information; a message encrypted by the public key can only be decrypted by the private key

19
New cards

Public key

available for others to use when encrypting information; people can use that individual's key to decrypt information

20
New cards

Private key

accessible only to the individual; the individual can use this key to decrypt any message encrypted with the other key

21
New cards

Modular arithmetic

a ≡ b (mod n); a is congruent to b modulo n

22
New cards

RSA Cryptosystem

Rivest, Shamir, Adleman

23
New cards

RSA Cryptosystem

based on the assumption that factoring large integers is computationally hard

24
New cards

Trap door function

one-way function; a function that is easy to compute “forwards” but difficult to compute “backwards”

25
New cards

Trap door function

it is fairly cheap to compute the output from the input but computationally infeasible to find the input from the output

26
New cards

Encryption Process

C = Me mod n

27
New cards

Decryption Process

M = Cd mod n

28
New cards

Alan Turing

Father of Computer Science

29
New cards

Error Detection
Error Correction

2 Goals of Coding Theory

30
New cards

Source coding

changing the message source to a suitable code for transmission through the channel

31
New cards

Source encoder

transforms the source output into a sequence of symbols or message

32
New cards

Codeword

a string of 0’s and 1’s representing an actual message

33
New cards

Length

number of digits in a codeword

34
New cards

Code

the collection or set of all codewords

35
New cards

Encode

message → codeword

36
New cards

Decode

received word → message

37
New cards

Parity

a single bit is appended to a bit string; either odd or even

38
New cards

Repetition

simplest possible error-correcting code

39
New cards

Hamming distance

number of bits where the two words differ

40
New cards

Nearest Neighbor Decoding

If the distance between the closest codewords in C is large enough and if sufficiently few errors were made in transmission, this codeword should be x

41
New cards

Minimum distance

smallest distance between any two distinct codewords in the code

42
New cards

2e + 1

Minimum distance

43
New cards

2e

Errors detected at minimum distance

44
New cards

e

Errors corrected at minimum distance

45
New cards

Product tags

used for easy identification of products as well as for tracking and inventory purposes

46
New cards

Universal Product Code

originally created to help grocery stores speed up the checkout process and keep better track of inventory

47
New cards

Check digit scheme

appends an extra digit or digits to the product tag

48
New cards

Check digit scheme

given the eleven-digit string x1x2 ... x11, x12 is appended such that the whole twelve-digit codeword satisfies:

3𝑥1 + 𝑥2 + 3𝑥3 + 𝑥4 + ⋯ + 3𝑥11 + 𝑥12 ≡ 0 mod 10

49
New cards

Quick response code

was in Japan by Denso-Wave in 1994

50
New cards

Quick response code

designed to allow high speed component scanning

51
New cards

Quick response code

detected as a 2-dimensional digital image by a semi-conductor image sensor