Techniques for Cryptanalysis of Block Ciphers
Seiten
2099
|
1st ed. 2099
Springer Berlin (Verlag)
978-3-642-17231-1 (ISBN)
Springer Berlin (Verlag)
978-3-642-17231-1 (ISBN)
- Noch nicht erschienen - erscheint am 12.10.2099
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
Block ciphers are widely used to protect information over the Internet, so assessing their strength in the case of malicious adversaries is critical to public trust. Such security evaluations, called cryptanalysis, expose weak points of the ciphers and can be used to develop attack techniques, thus cryptanalytic techniques also direct designers on ways to develop more secure block ciphers. In this book the authors describe the cryptanalytic toolbox for block ciphers. The book starts with the differential and linear attacks, and their extensions and generalizations. Then the more advanced attacks such as the boomerang and rectangle attacks are discussed, along with their related-key variants. Finally, other attacks are explored, in particular combined attacks that are built on top of other attacks. The book covers both the underlying concepts at the heart of these attacks and the mathematical foundations of the analysis itself. These are complemented by an extensive bibliography and numerous examples, mainly involving widely deployed block ciphers. The book is intended as a reference book for graduate students and researchers in the field of cryptography. Block ciphers are widely used to protect information over the Internet, so assessing their strength in the case of malicious adversaries is critical to public trust. Such security evaluations, called cryptanalysis, expose weak points of the ciphers and can be used to develop attack techniques, thus cryptanalytic techniques also direct designers on ways to develop more secure block ciphers. In this book the authors describe the cryptanalytic toolbox for block ciphers. The book starts with the differential and linear attacks, and their extensions and generalizations. Then the more advanced attacks such as the boomerang and rectangle attacks are discussed, along with their related-key variants. Finally, other attacks are explored, in particular combined attacks that are built on top of other attacks. The book covers both the underlying concepts at the heart of these attacks and the mathematical foundations of the analysis itself. These are complemented by an extensive bibliography and numerous examples, mainly involving widely deployed block ciphers. The book is intended as a reference book for graduate students and researchers in the field of cryptography.
The first author cowrote a related textbook in 1993, and he's among the top researchers on this topic; the second author has developed cryptanalytic techniques related to the subject of the book.
Introduction .- Differential Cryptanalysis .- Linear Cryptanalysis .- More Cryptanalytic Methods .- Boomerangs and Rectangles .- Other Combined Attacks .- Appendix .- References.
Erscheint lt. Verlag | 12.10.2099 |
---|---|
Zusatzinfo | X, 260 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Block Ciphers • boomerang attack • Cryptanalysis • cryptography • Cryptology • differential cryptanalysis • Kryptographie / Kryptologie • Linear Cryptanalysis • Related-key variants • security protocols |
ISBN-10 | 3-642-17231-8 / 3642172318 |
ISBN-13 | 978-3-642-17231-1 / 9783642172311 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Softcover (2024)
Lehmanns Media (Verlag)
39,99 €
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media
Buch | Softcover (2021)
Springer (Verlag)
29,99 €
Interlingua zur Gewährleistung semantischer Interoperabilität in der …
Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99 €