Details

Hashing in Computer Science


Hashing in Computer Science

Fifty Years of Slicing and Dicing
1. Aufl.

von: Alan G. Konheim

134,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 11.05.2010
ISBN/EAN: 9780470630600
Sprache: englisch
Anzahl Seiten: 408

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.
PREFACE. <p><b>PART I: MATHEMATICAL PRELIMINARIES.</b></p> <p><b>1. Counting.</b></p> <p>1.1: The Sum and Product Rules.</p> <p>1.2: Mathematical Induction.</p> <p>1.3: Factorial.</p> <p>1.4: Binomial Coefficients.</p> <p>1.5: Multinomial Coefficients.</p> <p>1.6: Permutations.</p> <p>1.7: Combinations.</p> <p>1.8: The Principle of Inclusion-Exclusion.</p> <p>1.9: Partitions.</p> <p>1.10: Relations.</p> <p>1.11: Inverse Relations.</p> <p>Appendix 1: Summations Involving Binomial Coefficients.</p> <p><b>2. Recurrence and Generating Functions.</b></p> <p>2.1: Recursions.</p> <p>2.2: Generating Functions.</p> <p>2.3: Linear Constant Coefficient Recursions.</p> <p>2.4: Solving Homogeneous LCCRs Using Generating Functions.</p> <p>2.5: The Catalan Recursion.</p> <p>2.6: The Umbral Calculus.</p> <p>2.7: Exponential Generating Functions.</p> <p>2.8: Partitions of a Set: The Bell and Stirling Numbers.</p> <p>2.9: Rouché’s Theorem and the Lagrange’s Inversion Formula.</p> <p><b>3. Asymptotic Analysis.</b></p> <p>3.1: Growth Notation for Sequences.</p> <p>3.2: Asymptotic Sequences and Expansions.</p> <p>3.3: Saddle Points.</p> <p>3.4: Laplace’s Method.</p> <p>3.5: The Saddle Point Method.</p> <p>3.6: When Will the Saddle Point Method Work?</p> <p>3.7: The Saddle Point Bounds.</p> <p>3.8: Examples of Saddle Point Analysis.</p> <p><b>4. Discrete Probability Theory.</b></p> <p>4.1: The Origins of Probability Theory.</p> <p>4.2: Chance Experiments, Sample Points, Spaces, and Events.</p> <p>4.3: Random Variables.</p> <p>4.4: Moments—Expectation and Variance.</p> <p>4.5: The Birthday Paradox.</p> <p>4.6: Conditional Probability and Independence.</p> <p>4.7: The Law of Large Numbers (LLN).</p> <p>4.8: The Central Limit Theorem (CLT).</p> <p>4.9: Random Processes and Markov Chains.</p> <p><b>5. Number Theory and Modern Algebra.</b></p> <p>5.1: Prime Numbers.</p> <p>5.2: Modular Arithmetic and the Euclidean Algorithm.</p> <p>5.3: Modular Multiplication.</p> <p>5.4: The Theorems of Fermat and Euler.</p> <p>5.5: Fields and Extension Fields.</p> <p>5.6: Factorization of Integers.</p> <p>5.7: Testing Primality.</p> <p><b>6. Basic Concepts of Cryptography.</b></p> <p>6.1: The Lexicon of Cryptography.</p> <p>6.2: Stream Ciphers.</p> <p>6.3: Block Ciphers.</p> <p>6.4: Secrecy Systems and Cryptanalysis.</p> <p>6.5: Symmetric and Two-Key Cryptographic Systems.</p> <p>6.6: The Appearance of Public Key Cryptographic systems.</p> <p>6.7: A Multitude of Keys.</p> <p>6.8: The RSA Cryptosystem.</p> <p>6.9: Does PKC Solve the Problem of Key Distribution?</p> <p>6.10: Elliptic Groups Over the Reals.</p> <p>6.11: Elliptic Groups Over the Field Z<sub><i>m</i>,2 .</sub></p> <p><sub>6.12: Elliptic Group Cryptosystems.</sub></p> <p>6.13: The Menezes-Vanstone Elliptic Curve Cryptosystem.</p> <p>6.14: Super-Singular Elliptic Curves.</p> <p><b>PART II: HASHING FOR STORAGE: DATA MANAGEMENT.</b></p> <p><b>7. Basic Concepts.</b></p> <p>7.1: Overview of the Records Management Problem.</p> <p>7.2: A Simple Storage Management Protocol: Plain Vanilla Chaining.</p> <p>7.3: Record-Management with Sorted Keys.</p> <p><b>8. Hash Functions.</b></p> <p>8.1: The Origin of Hashing.</p> <p>8.2: Hash Tables.</p> <p>8.3: A Statistical Model for Hashing.</p> <p>8.4: The Likelihood of Collisions.</p> <p><b>9. Hashing Functions: Examples and Evaluation.</b></p> <p>9.1: Overview: The Tradeoff of Randomization Versus Computational Simplicity.</p> <p>9.2: Some Examples of Hashing Functions.</p> <p>9.3: Performance of Hash Functions: Formulation.</p> <p>9.4: The X<sup>2</sup>-Test.</p> <p>9.5: Testing a Hash Function.</p> <p>9.6: The McKenzie et al. Results.</p> <p><b>10. Record Chaining with Hash Tables.</b></p> <p>10.1: Separate Chaining of Records.</p> <p>10.2: Analysis of Separate Chaining Hashing Sequences and the Chains They Create.</p> <p>10.3: A Combinatorial Analysis of Separate Chaining.</p> <p>10.4: Coalesced Chaining.</p> <p>10.5: The Pittel-Yu Analysis of EICH Coalesced Chaining.</p> <p>10.6: To Separate or to Coalesce; and Which Version? That Is the Question.</p> <p><b>11. Perfect Hashing.</b></p> <p>11.1: Overview.</p> <p>11.2: Chichelli’s Construction.</p> <p><b>12. The Uniform Hashing Model.</b></p> <p>12.1: An Idealized Hashing Model.</p> <p>12.2: The Asymptotics of Uniform Hashing.</p> <p>12.3: Collision-Free Hashing.</p> <p><b>13. Hashing with Linear Probing.</b></p> <p>13.1: Formulation and Preliminaries.</p> <p>13.2: Performance Measures for LP Hashing.</p> <p>13.3: All Cells Other than HT<sub><i>n</i>-1</sub> in the Hash-Table of <i>n</i> Cells are Occupied.</p> <p>13.4: <i>m</i>-Keys Hashed into a Hash Table of <i>n</i> Cells Leaving Cell HT<sub><i>n</i>-1</sub> Unoccupied.</p> <p>13.5: The Probability Distribution for the Length of a Search.</p> <p>13.6: Asymptotics.</p> <p>13.7: Hashing with Linear Open Addressing: Coda.</p> <p>13.8: A Possible Improvement to Linear Probing.</p> <p><b>14. Double Hashing.</b></p> <p>14.1: Formulation of Double Hashing.</p> <p>14.2: Progressions and Strides.</p> <p>14.3: The Number of Progressions Which Fill a Hash-Table Cell.</p> <p>14.3.1: Progression Graphs.</p> <p>14.4: Dominance.</p> <p>14.5: Insertion-Cost Bounds Relating Uniform and Double Hashing.</p> <p>14.6: UsuallyDoubleHash.</p> <p>14.7: The UDH Chance Experiment and the Cost to Insert the Next Key by Double Hashing.</p> <p>14.8: Proof of Equation (14.12<i>a</i>).</p> <p>14.9: UsuallyDoubleHash.</p> <p>14.10: Proof of Equation (14.12<i>b</i>).</p> <p><b>15. Optimum Hashing.</b></p> <p>15.1: The Ullman–Yao Framework.</p> <p>15.1.1: The Ullman–Yao Hashing Functions.</p> <p>15.1.2: Ullman–Yao INSERT(k) and SEARCH(k).</p> <p>15.1.3: The Ullman–Yao Statistical Model.</p> <p>15.2: The Rates at Which a Cell is Probed and Occupied.</p> <p>15.3: Partitions of <sub>(<i>i</i>)</sub>Scenarios, <sub>(<i>i</i>)</sub>Subscenarios, and Their Skeletons.</p> <p>15.3.1: <sub>(<i>i</i>)</sub>Subscenarios.</p> <p>15.3.2: Skeletons.</p> <p>15.4: Randomly Generated <i>m</i>-Scenarios.</p> <p>15.5: Bounds on Random Sums.</p> <p>15.6: Completing the Proof of Theorem 15.1.</p> <p><b>PART III: SOME NOVEL APPLICATIONS OF HASHING.</b></p> <p><b>16. Karp-Rabin String Searching.</b></p> <p>16.1: Overview.</p> <p>16.2: The Basic Karp-Rabin Hash-Fingerprint Algorithm.</p> <p>16.3: The Plain Vanilla Karp-Rabin Fingerprint Algorithm.</p> <p>16.4: Some Estimates on Prime Numbers.</p> <p>16.5: The Cost of False Matches in the Plain Vanilla Karp-Rabin Fingerprint Algorithm.</p> <p>16.6: Variations on the Plain Vanilla Karp-Rabin Fingerprint Algorithm.</p> <p>16.7: A Nonhashing Karp-Rabin Fingerprint.</p> <p><b>17. Hashing Rock and Roll.</b></p> <p>17.1: Overview of Audio Fingerprinting .</p> <p>17.2: The Basics of Fingerprinting Music.</p> <p>17.3: Haar Wavelet Coding.</p> <p>17.4: Min-Hash.</p> <p>17.5: Some Commercial Fingerprinting Products.</p> <p><b>18. Hashing in E-Commerce.</b></p> <p>18.1: The Varied Applications of Cryptography.</p> <p>18.2: Authentication.</p> <p>18.3: The Need for Certificates.</p> <p>18.4: Cryptographic Hash Functions.</p> <p>18.5: X.509 Certificates and CCIT Standardization.</p> <p>18.6: The Secure Socket Layer (SSL).</p> <p>18.7: Trust on the Web ... Trust No One Over 40!</p> <p>18.8: MD5.</p> <p>18.9: Criticism of MD5.</p> <p>18.10: The Wang-Yu Collision Attack.</p> <p>18.11: Steven’s Improvement to the Wang-Yu Collision Attack.</p> <p>18.12: The Chosen-Prefix Attack on MD5.</p> <p>18.13: The Rogue CA Attack Scenario.</p> <p>18.14: The Secure Hash Algorithms.</p> <p>18.15: Criticism of SHA-1.</p> <p>18.16: SHA-2.</p> <p>18.17: What Now?</p> <p>Appendix 18: Sketch of the Steven’s Chosen Prefix Attack.</p> <p><b>19. Hashing and the Secure Distribution of Digital Media.</b></p> <p>19.1: Overview.</p> <p>19.2: Intellectual Property (Copyrights and Patents).</p> <p>19.3: Steganography.</p> <p>19.4: Boil, Boil, Toil ... and But First, Carefully Mix.</p> <p>19.5: Software Distribution Systems.</p> <p>19.6: Watermarks.</p> <p>19.7: An Image-Processing Technique for Watermarking.</p> <p>19.8: Using Geometric Hashing to Watermark Images.</p> <p>19.9: Biometrics and Hashing.</p> <p>19.10: The Dongle.</p> <p>Appendix 19: Reed-Solomon and Hadamard Coding.</p> <p><b>Exercises and Solutions.</b></p> <p><b>INDEX.</b></p>
"Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires." (Forums Digital Media Net, 27 October 2010)
<b>Alan G. Konheim, PhD,</b> is Professor Emeritus of Computer Science at the University of Californa, Santa Barbara. Dr. Konheim’s early work at IBM led to the Data Encryption Standard (DES), which was evaluated by his Yorktown Probability and Cryptography Group. DES was certified as a national standard in the 1970s. Dr. Konheim continues to consult the government in the area of cryptanalysis.
<b>Gain the Skills and Knowledge Needed to Understanding Data Security Systems</b> <p>A file of computer data is composed of records to each of which a key or identifier is associated. The key is used to search for the address of a desired record. When the file is a telephone directory, searching is easy—the key is the subscriber’s name and the records are naturally arranged in alphabetic order. For data whose records are not easily alphabetized, a hash function is used to arithmetically derive from the key record’s address. Hashing was invented during the design of the IBM 701 machine in the 1950s by Hans Peter Luhn. In the ensuing half century, the hashing concept has found a variety of applications. When combined with cryptography, hashing can be used to authenticate users in e-commerce on the Web.</p> <p>Professor Konheim is an authority on computer security and an early contributor to hashing technology. Based on courses taught by the author, this book unravels the complicated mathematics involved in hashing as it explains in detail the various hashing methods. It describes:</p> <ul> <li>Techniques for audio fingerprinting, the automated recognition of music</li> <li>The use of hashing in e-commerce to protect against identity theft</li> <li>How hashing is used to inhibit the unlawful copying and distribution of music, video, software, books, and data</li> </ul> <p>Key points are reinforced in the sample problems and solutions provided; also included are an accompanying instructor’s manual and extensive bibliography<i>. Hashing in Computer Science</i> is valuable reading for graduate students and researchers in mathematics, cryptography, and security. It can be used as a textbook in senior and graduate courses on cryptography and others that employ cryptanalysis, computer security, analysis of randomized and combinatorial algorithms, computer networks, compiler design, computational geometry, and theory of computation. </p>

Diese Produkte könnten Sie auch interessieren:

Foundations of Electromagnetic Compatibility
Foundations of Electromagnetic Compatibility
von: Bogdan Adamczyk
PDF ebook
117,99 €
Human Bond Communication
Human Bond Communication
von: Sudhir Dixit, Ramjee Prasad
EPUB ebook
105,99 €
Computer Vision in Vehicle Technology
Computer Vision in Vehicle Technology
von: Antonio M. López, Atsushi Imiya, Tomas Pajdla, Jose M. Álvarez
PDF ebook
81,99 €