Atjaunināt sīkdatņu piekrišanu

Design of Rijndael: AES - The Advanced Encryption Standard Softcover reprint of the original 1st ed. 2002 [Mīkstie vāki]

4.22/5 (18 ratings by Goodreads)
  • Formāts: Paperback / softback, 238 pages, height x width: 235x155 mm, weight: 403 g, 17 Tables, black and white; XVII, 238 p., 1 Paperback / softback
  • Sērija : Information Security and Cryptography
  • Izdošanas datums: 12-Dec-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642076467
  • ISBN-13: 9783642076466
  • Mīkstie vāki
  • Cena: 81,15 €*
  • * Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
  • Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena.
  • Daudzums:
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 238 pages, height x width: 235x155 mm, weight: 403 g, 17 Tables, black and white; XVII, 238 p., 1 Paperback / softback
  • Sērija : Information Security and Cryptography
  • Izdošanas datums: 12-Dec-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642076467
  • ISBN-13: 9783642076466
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. In addition, other ciphers related to Rijndael are presented. An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attack

s against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or in

terested in data encryption will find it a valuable source of information and reference.

1. Introduction; 2. Preliminaries; 3. Specification of Rijndael; 4. Implementation Aspects; 5. DES; 6. Correlation Matrices; 7. Difference Propagation; 8. Design Strategy; 9. Cryptanalysis; 10. Related Block Ciphers; A. The S-box SRD; B. Test Vectors; Index.

Recenzijas

"an excellent choice for people who are interested in how Rijndael really works and who need more explanations than research papers usually contain. It is a book that readers will regularly consult when they need to look up details about Rijndael." Computing Reviews

Papildus informācija

Springer Book Archives
1. The Advanced Encryption Standard Process.-
2. Preliminaries.-
3.
Specification of Rijndael.-
4. Implementation Aspects.-
5. Design
Philosophy.-
6. The Data Encryption Standard.-
7. Correlation Matrices.-
8.
Difference Propagation.-
9. The Wide Trail Strategy.-
10. Cryptanalysis.-
11.
Related Block Ciphers.- Appendices.- A. Propagation Analysis in Galois
Fields.- A.1.1 Difference Propagation.- A.l.2 Correlation.- A. 1.4 Functions
that are Linear over GF(2).- A.2.1 Difference Propagation.- A.2.2
Correlation.- A.2.4 Functions that are Linear over GF(2).- A.3.3 Dual Bases.-
A.4.2 Relationship Between Trace Patterns and Selection Patterns.- A.4.4
Illustration.- A.5 Rijndael-GF.- B. Trail Clustering.- B.1 Transformations
with Maximum Branch Number.- B.2 Bounds for Two Rounds.- B.2.1 Difference
Propagation.- B.2.2 Correlation.- B.3 Bounds for Four Rounds.- B.4 Two Case
Studies.- B.4.1 Differential Trails.- B.4.2 Linear Trails.- C. Substitution
Tables.- C.1 SRD.- C.2 Other Tables.- C.2.1 xtime.- C.2.2 Round Constants.-
D. Test Vectors.- D.1 KeyExpansion.- D.2 Rijndael(128,128).- D.3 Other Block
Lengths and Key Lengths.- E. Reference Code.