Book description
As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis-so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on number theory, explores block ciphers, and teaches the basis of all modern cryptanalysis: linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security.
Table of contents
- Copyright
- About the Author
- Credits
- Acknowledgments
- Introduction
- 1. Simple Ciphers
- 2. Number Theoretical Ciphers
-
3. Factoring and Discrete Logarithms
- 3.1. Factorization
- 3.2. Algorithm Theory
- 3.3. Exponential Factoring Methods
- 3.4. Subexponential Factoring Methods
- 3.5. Discrete Logarithms
- 3.6. Summary
- 3.7. Exercises
-
4. Block Ciphers
- 4.1. Operations on Bits, Bytes, Words
- 4.2. Product Ciphers
- 4.3. Substitutions and Permutations
- 4.4. Substitution–Permutation Network
- 4.5. Feistel Structures
- 4.6. DES
- 4.7. FEAL
- 4.8. Blowfish
- 4.9. AES/Rijndael
- 4.10. Block Cipher Modes
- 4.11. Skipjack
- 4.12. Message Digests and Hashes
- 4.13. Random Number Generators
- 4.14. One-Time Pad
- 4.15. Summary
- 4.16. Exercises
- 5. General Cryptanalytic Methods
-
6. Linear Cryptanalysis
- 6.1. Overview
- 6.2. Matsui's Algorithms
- 6.3. Linear Expressions for S-Boxes
- 6.4. Matsui's Piling-up Lemma
- 6.5. EASY1 Cipher
- 6.6. Linear Expressions and Key Recovery
- 6.7. Linear Cryptanalysis of DES
- 6.8. Multiple Linear Approximations
- 6.9. Finding Linear Expressions
- 6.10. Linear Cryptanalysis Code
- 6.11. Summary
- 6.12. Exercises
-
7. Differential Cryptanalysis
- 7.1. Overview
- 7.2. Notation
- 7.3. S-Box Differentials
- 7.4. Combining S-Box Characteristics
- 7.5. Key Derivation
- 7.6. Differential Cryptanalysis Code
- 7.7. Differential Cryptanalysis of Feistel Ciphers
- 7.8. Analysis
- 7.9. Differential-Linear Cryptanalysis
- 7.10. Conditional Characteristics
- 7.11. Higher-Order Differentials
- 7.12. Truncated Differentials
- 7.13. Impossible Differentials
- 7.14. Boomerang Attack
- 7.15. Interpolation Attack
- 7.16. Related-Key Attack
- 7.17. Summary
- 7.18. Exercises
Product information
- Title: Modern Cryptanalysis: Techniques for Advanced Code Breaking
- Author(s):
- Release date: March 2008
- Publisher(s): Wiley
- ISBN: 9780470135938
You might also like
book
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
". . .the best introduction to cryptography I've ever seen. . . . The book the …
book
Real-Time Embedded Systems
This book integrates new ideas and topics from real time systems, embedded systems, and software engineering …
book
Embedded Linux®: Hardware, Software, and Interfacing
Embedded Linux will help the user: select an Embedded Linux platform based on hardware requirements; build …
book
Linux Appliance Design
Modern appliances are complex machines with processors, operating systems, and application software. While there are books …