Muutke küpsiste eelistusi

Block Cipher Companion [Pehme köide]

  • Formaat: Paperback / softback, 270 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, XIV, 270 p., 1 Paperback / softback
  • Sari: Information Security and Cryptography
  • Ilmumisaeg: 29-Nov-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642271111
  • ISBN-13: 9783642271113
  • Pehme köide
  • Hind: 71,86 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 84,54 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 270 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, XIV, 270 p., 1 Paperback / softback
  • Sari: Information Security and Cryptography
  • Ilmumisaeg: 29-Nov-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642271111
  • ISBN-13: 9783642271113

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms.

In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.

The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.



This volume provides a detailed account of block cipher analysis, design, and deployment. The authors describe the most prominent block ciphers and give insights into their design.

Arvustused

From the reviews:

"Overall, this book provides a historical view of the essential work on the design and analysis of block ciphers. The book is well written and is appropriate for both beginners and experienced readers. Those who want more details about the rationale and philosophy behind block cipher design can use this book as an up-to-date reference." (Zheng Gong, ACM Computing Reviews, July 2012)

The block cipher companion is a well written handbook, wholly recommended. An excellent choice of examples and informal language make this handbook an excellent choice for beginners, guiding the reader from simple cipher techniques and cryptanalysis towards more advanced ideas. Professionals will find the book to be a systematic collection of ideas, and, in particular, a thorough bibliography and a short survey of block ciphers evolution. (Jerzy urawiecki, Zentralblatt MATH, Vol. 1243, 2012)

1 Introduction
1(12)
1.1 Cryptographic Algorithms
3(1)
1.2 Block Ciphers
4(1)
1.3 Cryptographer and Cryptanalyst
5(5)
1.4 Security
10(1)
1.5 Summary
11(2)
2 DES
13(22)
2.1 DES Description
14(9)
2.1.1 The Round Function
17(6)
2.2 Design Features
23(4)
2.3 Structural Properties
27(2)
2.3.1 The Complementation Property
27(1)
2.3.2 Weak and Semi-Weak Keys
28(1)
2.4 DES Variants
29(4)
2.4.1 Triple-DES
30(2)
2.4.2 DESX
32(1)
2.5 DES in Context
33(1)
2.6 Getting to the Source
34(1)
3 AES
35(30)
3.1 AES Description
36(18)
3.1.1 Arithmetic in GF(2n)
37(1)
3.1.2 Encryption with the AES
38(4)
3.1.3 Decryption with the AES
42(3)
3.1.4 AES Key Schedule
45(5)
3.1.5 AES Design Features
50(4)
3.2 AES State of the Art
54(9)
3.2.1 Differential and Linear Cryptanalysis
54(1)
3.2.2 Structural Attacks
54(5)
3.2.3 Algebraic Analysis
59(3)
3.2.4 Related-Key Cryptanalysis
62(1)
3.2.5 Side-Channel Cryptanalysis
63(1)
3.3 AES in Context
63(1)
3.4 Getting to the Source
64(1)
4 Using Block Ciphers
65(30)
4.1 Block Encryption
66(3)
4.1.1 Electronic Code Book Mode
66(1)
4.1.2 Cipher Block Chaining Mode
67(2)
4.2 Stream Encryption
69(5)
4.2.1 Cipher Feedback Mode
69(1)
4.2.2 Output Feedback Mode
70(3)
4.2.3 Counter Mode
73(1)
4.3 Starting and Finishing
74(3)
4.3.1 Choosing the IV
74(1)
4.3.2 Padding
75(1)
4.3.3 Ciphertext Stealing
76(1)
4.4 Authentication
77(5)
4.4.1 CBC-MAC
78(2)
4.4.2 OMAC
80(2)
4.5 Authenticated Encryption
82(4)
4.5.1 CCM Mode
83(1)
4.5.2 EAX Mode
84(2)
4.6 Hashing
86(7)
4.6.1 Three Important Constructions
86(4)
4.6.2 Double Block Length Constructions
90(2)
4.6.3 The SHA-3 Competition
92(1)
4.7 Getting to the Source
93(2)
5 Brute Force Attacks
95(14)
5.1 Time-Memory Trade-offs
96(7)
5.1.1 Hellman's Time-Memory Trade-off
96(4)
5.1.2 More Advanced Considerations
100(3)
5.2 Meet-in-the-Middle Attacks
103(5)
5.2.1 Double Encryption
103(2)
5.2.2 Triple Encryption
105(3)
5.3 Getting to the Source
108(1)
6 Differential Cryptanalysis: The Idea
109(18)
6.1 Getting Started
110(6)
6.1.1 Working with Less Certainty
113(3)
6.2 Introducing Characteristics
116(8)
6.2.1 Joining Characteristics
117(5)
6.2.2 Introducing Differentials
122(2)
6.3 Filtering
124(2)
6.3.1 Recovering Key Information
125(1)
6.4 Getting to the Source
126(1)
7 Linear Cryptanalysis: The Idea
127(18)
7.1 Getting Started
128(3)
7.2 Joining Approximations
131(6)
7.2.1 Deducing More Key
135(2)
7.3 Putting Things Together
137(7)
7.3.1 Introducing Linear Hulls
141(2)
7.3.2 A Unified Measure
143(1)
7.4 Getting to the Source
144(1)
8 Advanced Topics
145(48)
8.1 Differential Cryptanalysis Revisited
145(20)
8.1.1 Joining Components
146(2)
8.1.2 Key Equivalence
148(1)
8.1.3 Key Recovery and Data Complexity
148(6)
8.1.4 Enhancements to the Basic Differential Attack
154(11)
8.2 Linear Cryptanalysis Revisited
165(9)
8.2.1 Joining Components
166(2)
8.2.2 Key Equivalence
168(1)
8.2.3 Key Recovery and Data Complexity
169(3)
8.2.4 Enhancements to the Basic Linear Attack
172(2)
8.3 Differential-Linear Cryptanalysis
174(3)
8.4 The Interpolation Attack
177(1)
8.5 The Key Schedule
178(2)
8.6 The Impact of Analysis on Design
180(12)
8.6.1 Block Cipher Topology
181(3)
8.6.2 Resistance to Differential and Linear Cryptanalysis
184(3)
8.6.3 S-Box Properties
187(5)
8.7 Getting to the Source
192(1)
9 A Short Survey and Six Prominent Ciphers
193(28)
9.1 From DES to the AES
193(3)
9.2 The AES Process and Finalists
196(1)
9.3 After the AES
197(4)
9.3.1 Other Competitions and Standardisation Efforts
197(2)
9.3.2 Niche Proposals
199(1)
9.3.3 Lightweight Block Ciphers
199(2)
9.4 Six Prominent Block Ciphers
201(18)
9.4.1 FEAL
202(3)
9.4.2 IDEA
205(2)
9.4.3 KASUMI
207(5)
9.4.4 RC5
212(2)
9.4.5 Skipjack
214(3)
9.4.6 PRESENT
217(2)
9.5 Getting to the Source
219(2)
Index 221(4)
References 225
The first author is a professor in the Department of Mathematics and head of the Crypto Group at the Technical University of Denmark; his main interests are the analysis and design of block ciphers, hash functions, and message authentication codes. The second author is a researcher in the Cryptography Research Group of Orange (France Télécom); his main interests are the design and analysis of symmetric cryptographic primitives, cryptographic techniques for constrained devices, and the deployment of cryptographic solutions. Both authors have taken lead roles in the related professional associations and academic conferences.