Data Security : Master Post

Information hidden from unauthorised access – Confidentiality Information protected from unauthorised change – Integrity Information entity from unauthorised bandwitdth hijacking – Availability Threat to Confidentiality Snooping – Someone wants to look through your data Traffic Analysis Threat to Intrgrity Modification Masquerading Replaying Repudiation Threat to Availability Denial of Service DoS Ceasar Cipher is one of […]

Information Theory, Coding and Cryptography.

Ranjan Bose’s chapter about cyclic codes begins with a riveting quote by Pascal, Blaise “We arrive at the truth, not by reason only, but also by the heart.” Quotes like this make a comprehensive book about information theory even more captivating. Linear Block Codes, block codes –every message m (size k) corresponds to a codeword c (size […]

BCH code. Bose–Chaudhuri–Hocquenghem codes.

1950’s, the age of contemporary mathematics. This was the age when the mathematics in information theory boomed. From Claude Shannon developing the notion of Information theory in 1949 to BCH code being independently invented by three scientists in 1959, the era did see some really significant inputs in that era. ref Fun tangent, quick sort […]