Atjaunināt sīkdatņu piekrišanu

E-grāmata: Block Cipher Companion

  • Formāts: PDF+DRM
  • Sērija : Information Security and Cryptography
  • Izdošanas datums: 25-Oct-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642173424
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Information Security and Cryptography
  • Izdošanas datums: 25-Oct-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642173424

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms.

In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.

The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.



This volume provides a detailed account of block cipher analysis, design, and deployment. The authors describe the most prominent block ciphers and give insights into their design.

Recenzijas

From the reviews:

"Overall, this book provides a historical view of the essential work on the design and analysis of block ciphers. The book is well written and is appropriate for both beginners and experienced readers. Those who want more details about the rationale and philosophy behind block cipher design can use this book as an up-to-date reference." (Zheng Gong, ACM Computing Reviews, July 2012)

The block cipher companion is a well written handbook, wholly recommended. An excellent choice of examples and informal language make this handbook an excellent choice for beginners, guiding the reader from simple cipher techniques and cryptanalysis towards more advanced ideas. Professionals will find the book to be a systematic collection of ideas, and, in particular, a thorough bibliography and a short survey of block ciphers evolution. (Jerzy urawiecki, Zentralblatt MATH, Vol. 1243, 2012)

1 Introduction
1(12)
1.1 Cryptographic Algorithms
3(1)
1.2 Block Ciphers
4(1)
1.3 Cryptographer and Cryptanalyst
5(5)
1.4 Security
10(1)
1.5 Summary
11(2)
2 DES
13(22)
2.1 DES Description
14(9)
2.1.1 The Round Function
17(6)
2.2 Design Features
23(4)
2.3 Structural Properties
27(2)
2.3.1 The Complementation Property
27(1)
2.3.2 Weak and Semi-Weak Keys
28(1)
2.4 DES Variants
29(4)
2.4.1 Triple-DES
30(2)
2.4.2 DESX
32(1)
2.5 DES in Context
33(1)
2.6 Getting to the Source
34(1)
3 AES
35(30)
3.1 AES Description
36(18)
3.1.1 Arithmetic in GF(2n)
37(1)
3.1.2 Encryption with the AES
38(4)
3.1.3 Decryption with the AES
42(3)
3.1.4 AES Key Schedule
45(5)
3.1.5 AES Design Features
50(4)
3.2 AES State of the Art
54(9)
3.2.1 Differential and Linear Cryptanalysis
54(1)
3.2.2 Structural Attacks
54(5)
3.2.3 Algebraic Analysis
59(3)
3.2.4 Related-Key Cryptanalysis
62(1)
3.2.5 Side-Channel Cryptanalysis
63(1)
3.3 AES in Context
63(1)
3.4 Getting to the Source
64(1)
4 Using Block Ciphers
65(30)
4.1 Block Encryption
66(3)
4.1.1 Electronic Code Book Mode
66(1)
4.1.2 Cipher Block Chaining Mode
67(2)
4.2 Stream Encryption
69(5)
4.2.1 Cipher Feedback Mode
69(1)
4.2.2 Output Feedback Mode
70(3)
4.2.3 Counter Mode
73(1)
4.3 Starting and Finishing
74(3)
4.3.1 Choosing the IV
74(1)
4.3.2 Padding
75(1)
4.3.3 Ciphertext Stealing
76(1)
4.4 Authentication
77(5)
4.4.1 CBC-MAC
78(2)
4.4.2 OMAC
80(2)
4.5 Authenticated Encryption
82(4)
4.5.1 CCM Mode
83(1)
4.5.2 EAX Mode
84(2)
4.6 Hashing
86(7)
4.6.1 Three Important Constructions
86(4)
4.6.2 Double Block Length Constructions
90(2)
4.6.3 The SHA-3 Competition
92(1)
4.7 Getting to the Source
93(2)
5 Brute Force Attacks
95(14)
5.1 Time-Memory Trade-offs
96(7)
5.1.1 Hellman's Time-Memory Trade-off
96(4)
5.1.2 More Advanced Considerations
100(3)
5.2 Meet-in-the-Middle Attacks
103(5)
5.2.1 Double Encryption
103(2)
5.2.2 Triple Encryption
105(3)
5.3 Getting to the Source
108(1)
6 Differential Cryptanalysis: The Idea
109(18)
6.1 Getting Started
110(6)
6.1.1 Working with Less Certainty
113(3)
6.2 Introducing Characteristics
116(8)
6.2.1 Joining Characteristics
117(5)
6.2.2 Introducing Differentials
122(2)
6.3 Filtering
124(2)
6.3.1 Recovering Key Information
125(1)
6.4 Getting to the Source
126(1)
7 Linear Cryptanalysis: The Idea
127(18)
7.1 Getting Started
128(3)
7.2 Joining Approximations
131(6)
7.2.1 Deducing More Key
135(2)
7.3 Putting Things Together
137(7)
7.3.1 Introducing Linear Hulls
141(2)
7.3.2 A Unified Measure
143(1)
7.4 Getting to the Source
144(1)
8 Advanced Topics
145(48)
8.1 Differential Cryptanalysis Revisited
145(20)
8.1.1 Joining Components
146(2)
8.1.2 Key Equivalence
148(1)
8.1.3 Key Recovery and Data Complexity
148(6)
8.1.4 Enhancements to the Basic Differential Attack
154(11)
8.2 Linear Cryptanalysis Revisited
165(9)
8.2.1 Joining Components
166(2)
8.2.2 Key Equivalence
168(1)
8.2.3 Key Recovery and Data Complexity
169(3)
8.2.4 Enhancements to the Basic Linear Attack
172(2)
8.3 Differential-Linear Cryptanalysis
174(3)
8.4 The Interpolation Attack
177(1)
8.5 The Key Schedule
178(2)
8.6 The Impact of Analysis on Design
180(12)
8.6.1 Block Cipher Topology
181(3)
8.6.2 Resistance to Differential and Linear Cryptanalysis
184(3)
8.6.3 S-Box Properties
187(5)
8.7 Getting to the Source
192(1)
9 A Short Survey and Six Prominent Ciphers
193(28)
9.1 From DES to the AES
193(3)
9.2 The AES Process and Finalists
196(1)
9.3 After the AES
197(4)
9.3.1 Other Competitions and Standardisation Efforts
197(2)
9.3.2 Niche Proposals
199(1)
9.3.3 Lightweight Block Ciphers
199(2)
9.4 Six Prominent Block Ciphers
201(18)
9.4.1 FEAL
202(3)
9.4.2 IDEA
205(2)
9.4.3 KASUMI
207(5)
9.4.4 RC5
212(2)
9.4.5 Skipjack
214(3)
9.4.6 PRESENT
217(2)
9.5 Getting to the Source
219(2)
Index 221(4)
References 225
The first author is a professor in the Department of Mathematics and head of the Crypto Group at the Technical University of Denmark; his main interests are the analysis and design of block ciphers, hash functions, and message authentication codes. The second author is a researcher in the Cryptography Research Group of Orange (France Télécom); his main interests are the design and analysis of symmetric cryptographic primitives, cryptographic techniques for constrained devices, and the deployment of cryptographic solutions. Both authors have taken lead roles in the related professional associations and academic conferences.