|
|
1 | (12) |
|
1.1 Cryptographic Algorithms |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.3 Cryptographer and Cryptanalyst |
|
|
5 | (5) |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
13 | (22) |
|
|
14 | (9) |
|
|
17 | (6) |
|
|
23 | (4) |
|
2.3 Structural Properties |
|
|
27 | (2) |
|
2.3.1 The Complementation Property |
|
|
27 | (1) |
|
2.3.2 Weak and Semi-Weak Keys |
|
|
28 | (1) |
|
|
29 | (4) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
2.6 Getting to the Source |
|
|
34 | (1) |
|
|
35 | (30) |
|
|
36 | (18) |
|
3.1.1 Arithmetic in GF(2n) |
|
|
37 | (1) |
|
3.1.2 Encryption with the AES |
|
|
38 | (4) |
|
3.1.3 Decryption with the AES |
|
|
42 | (3) |
|
|
45 | (5) |
|
3.1.5 AES Design Features |
|
|
50 | (4) |
|
|
54 | (9) |
|
3.2.1 Differential and Linear Cryptanalysis |
|
|
54 | (1) |
|
|
54 | (5) |
|
|
59 | (3) |
|
3.2.4 Related-Key Cryptanalysis |
|
|
62 | (1) |
|
3.2.5 Side-Channel Cryptanalysis |
|
|
63 | (1) |
|
|
63 | (1) |
|
3.4 Getting to the Source |
|
|
64 | (1) |
|
|
65 | (30) |
|
|
66 | (3) |
|
4.1.1 Electronic Code Book Mode |
|
|
66 | (1) |
|
4.1.2 Cipher Block Chaining Mode |
|
|
67 | (2) |
|
|
69 | (5) |
|
4.2.1 Cipher Feedback Mode |
|
|
69 | (1) |
|
4.2.2 Output Feedback Mode |
|
|
70 | (3) |
|
|
73 | (1) |
|
4.3 Starting and Finishing |
|
|
74 | (3) |
|
|
74 | (1) |
|
|
75 | (1) |
|
4.3.3 Ciphertext Stealing |
|
|
76 | (1) |
|
|
77 | (5) |
|
|
78 | (2) |
|
|
80 | (2) |
|
4.5 Authenticated Encryption |
|
|
82 | (4) |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
86 | (7) |
|
4.6.1 Three Important Constructions |
|
|
86 | (4) |
|
4.6.2 Double Block Length Constructions |
|
|
90 | (2) |
|
4.6.3 The SHA-3 Competition |
|
|
92 | (1) |
|
4.7 Getting to the Source |
|
|
93 | (2) |
|
|
95 | (14) |
|
5.1 Time-Memory Trade-offs |
|
|
96 | (7) |
|
5.1.1 Hellman's Time-Memory Trade-off |
|
|
96 | (4) |
|
5.1.2 More Advanced Considerations |
|
|
100 | (3) |
|
5.2 Meet-in-the-Middle Attacks |
|
|
103 | (5) |
|
|
103 | (2) |
|
|
105 | (3) |
|
5.3 Getting to the Source |
|
|
108 | (1) |
|
6 Differential Cryptanalysis: The Idea |
|
|
109 | (18) |
|
|
110 | (6) |
|
6.1.1 Working with Less Certainty |
|
|
113 | (3) |
|
6.2 Introducing Characteristics |
|
|
116 | (8) |
|
6.2.1 Joining Characteristics |
|
|
117 | (5) |
|
6.2.2 Introducing Differentials |
|
|
122 | (2) |
|
|
124 | (2) |
|
6.3.1 Recovering Key Information |
|
|
125 | (1) |
|
6.4 Getting to the Source |
|
|
126 | (1) |
|
7 Linear Cryptanalysis: The Idea |
|
|
127 | (18) |
|
|
128 | (3) |
|
7.2 Joining Approximations |
|
|
131 | (6) |
|
|
135 | (2) |
|
7.3 Putting Things Together |
|
|
137 | (7) |
|
7.3.1 Introducing Linear Hulls |
|
|
141 | (2) |
|
|
143 | (1) |
|
7.4 Getting to the Source |
|
|
144 | (1) |
|
|
145 | (48) |
|
8.1 Differential Cryptanalysis Revisited |
|
|
145 | (20) |
|
|
146 | (2) |
|
|
148 | (1) |
|
8.1.3 Key Recovery and Data Complexity |
|
|
148 | (6) |
|
8.1.4 Enhancements to the Basic Differential Attack |
|
|
154 | (11) |
|
8.2 Linear Cryptanalysis Revisited |
|
|
165 | (9) |
|
|
166 | (2) |
|
|
168 | (1) |
|
8.2.3 Key Recovery and Data Complexity |
|
|
169 | (3) |
|
8.2.4 Enhancements to the Basic Linear Attack |
|
|
172 | (2) |
|
8.3 Differential-Linear Cryptanalysis |
|
|
174 | (3) |
|
8.4 The Interpolation Attack |
|
|
177 | (1) |
|
|
178 | (2) |
|
8.6 The Impact of Analysis on Design |
|
|
180 | (12) |
|
8.6.1 Block Cipher Topology |
|
|
181 | (3) |
|
8.6.2 Resistance to Differential and Linear Cryptanalysis |
|
|
184 | (3) |
|
|
187 | (5) |
|
8.7 Getting to the Source |
|
|
192 | (1) |
|
9 A Short Survey and Six Prominent Ciphers |
|
|
193 | (28) |
|
|
193 | (3) |
|
9.2 The AES Process and Finalists |
|
|
196 | (1) |
|
|
197 | (4) |
|
9.3.1 Other Competitions and Standardisation Efforts |
|
|
197 | (2) |
|
|
199 | (1) |
|
9.3.3 Lightweight Block Ciphers |
|
|
199 | (2) |
|
9.4 Six Prominent Block Ciphers |
|
|
201 | (18) |
|
|
202 | (3) |
|
|
205 | (2) |
|
|
207 | (5) |
|
|
212 | (2) |
|
|
214 | (3) |
|
|
217 | (2) |
|
9.5 Getting to the Source |
|
|
219 | (2) |
Index |
|
221 | (4) |
References |
|
225 | |