July 2018: Information Theory, Coding and Cryptography

Start Date
30/07/2018

End Date
21/10/2018

Enrollment End Date
21/10/2018

No. of
Enrollments
1576 students

No course
syllabus uploaded

Created by

Ranjan Bose
Indian Institute of Technology - Delhi
0
out of 5
Based on 0 rating
5 star 0
4 star 0
3 star 0
2 star 0
1 star 0
Course Language
English
Course Type
Scheduled
Video transcripts
English
Course Category
Engineering
Learning Path
Undergraduate
Course Length
30 Hours
Weekly time commitments
60 Hours
Course Completion
Yes, after passing all tests.
Exam Date
To be announced
Credits
0

23

Tutorials

0

Test

0

Assignment

0

Article

0

Weekly Reading list

Overview

For certification please: click here

Last Date For Enrollment:30 July, 2018.

ABOUT THE COURSE:

Information theory, coding and cryptography are the three load‐bearing pillars of any digital communication system. In this introductory course, we will start with the basics of information theory and source coding. Subsequently, we will discuss the theory of linear block codes (including cyclic codes, BCH codes, RS codes and LDPC codes), convolutional codes, Turbo codes, TCM and space time codes. Finally, we will introduce the basics of secure communications by focusing on cyptography and physical layer security. Wherever possible, applications of the theory in real world scenarios have been provided. The underlying aim of this course is to arouse the curiosity of the students. 
 
INTENDED AUDIENCE:
This course is intended for final‐year undergraduate students and first‐year postgraduate students of the electrical engineering or the computer science programs. The course will help in forming a strong foundation for the broad areas of information theory, coding and cryptography. It emphasizes on the basic concepts, lays stress on the fundamental principles and motivates their application to practical problems. By design, the mathematical complexity of the course remains at a level well within the grasp of engineering college students. The course can also be used by practicing engineers as a means for a quick brush‐up of the fundamentals. 

CORE/ELECTIVE: Elective

UG/PG: Final year UG and 1st year PG

PREREQUISITES: Basic exposure to linear algebra and probability theory, as well as, a course in digital communications. 

INDUSTRY SUPPORT: Telecommunication companies, Internet companies, Information security companies

 

To access the content, please enroll in the course.

Faculty

Ranjan Bose


Ranjan Bose received his B.Tech. degree in electrical engineering from the Indian Institute of Technology (IIT), Kanpur, India in 1992 and the M.S. and Ph.D. degrees in electrical engineering from the University of Pennsylvania, Philadelphia, USA in 1993 and 1995, respectively. He worked at Alliance Semiconductor Inc., San Jose, CA, as a Senior Design Engineer from 1996 to 1997. Since November 1997 he has been with the Department of Electrical Engineering at Indian Institute of Technology, Delhi, where currently he is the Microsoft Chair Professor. His research interests lie in the areas of secure communications, coding theory, ultra‐wideband (UWB) communications, broadband wireless access and wireless security. He currently heads the Wireless Research Lab in IIT Delhi. His lectures on wireless communications form a part of the video courses offered by the National Program on Technology Enhanced Learning (NPTEL). 

COURSE LAYOUT:

Week 1  :  Lecture 1: Introduction to Information Theory Lecture 2: Entropy, Mutual Information, Conditional and Joint Entropy Lecture 3: Measures for Continuous Random Variable, Relative Entropy 
Week 2  :   Lecture 4: Variable Length Codes, Prefix Codes Lecture 5: Source Coding Theorem Lecture 6: Various source coding techniques: Huffman, Arithmetic, Lempel Ziv, Run Length
Week 3  : Lecture 7: Optimum Quantizer, Practical Application of Source Coding: JPEG Compression Lecture 8: Introduction to Super Information Lecture 9: Channel Models and Channel Capacity 
Week 4  :  Lecture 10: Noisy Channel Coding Theorem Lecture 11: Gaussian Channel and Information Capacity Theorem Lecture 12: Capacity of MIMO channels 
Week 5  :  Lecture 13: Introduction to Error Control Coding Lecture 14: Introduction to Galois Field Lecture 15: Equivalent Codes, Generator Matrix and Parity Check Matrix 
Week 6  :  Lecture 16: Systematic Codes, Error Detections and Correction Lecture 17: Erasure and Errors, Standard Array and Syndrome Decoding Lecture 18: Probability of Error, Coding Gain and Hamming Bound
Week 7  :  Lecture 19: Hamming Codes, LDPC Codes and MDS Codes Lecture 20: Introduction to Cyclic Codes Lecture 21: Generator Polynomial, Syndrome Polynomial and Matrix Representation 
Week 8  :  Lecture 22: Fire Code, Golay Code, CRC Codes and Circuit Implementation of Cyclic Codes Lecture 23: Introduction to BCH Codes: Generator Polynomials Lecture 24: Multiple Error Correcting BCH Codes, Decoding of BCH Codes 
Week 9  :  Lecture 25: Introduction to Reed Solomon (RS) Codes Lecture 26: Introduction to Convolutional Codes Lecture 27: Trellis Codes: Generator Polynomial Matrix and Encoding using Trellis 
Week 10  :  Lecture 28: Vitrebi Decoding and Known good convolutional Codes Lecture 29: Introduction to Turbo Codes Lecture 30: Introduction to Trellis Coded Modulation (TCM) 
Week 11  :  Lecture 31: Ungerboek‘s design rules and Performance Evaluation of TCM schemes Lecture 32: TCM for fading channels and Space Time Trellis Codes (STTC) Lecture 33: Introduction to Space Time Block Codes (STBC)
Week 12  :  Lecture 34: Real Orthogonal Design and Complex Orthogonal Design Lecture 35: Generalized Real Orthogonal Design and Generalized Complex Orthogonal Design Lecture 36: Introduction to Cryptography: Symmetric Key and Asymmetric Key Cryptography
Week 13  :  Lecture 37: Some well‐known Algorithms: DES, IDEA, PGP, RSA, DH Protocol Lecture 38: Introduction to Physical Layer Security: Notion of Secrecy Capacity Lecture 39: Secrecy Outage capacity, Secrecy Outage probability, Cooperative jamming


 


FAQs

No FAQ has been added to this course yet.

Download App

Download SWAYAM applications from popular app stores