Algorithmic Cryptanalysis als Buch (gebunden)
PORTO-
FREI

Algorithmic Cryptanalysis

200+; 22 Tables, black and white; 22 Illustrations, black and white. Sprache: Englisch.
Buch (gebunden)
Ihr 12%-Rabatt auf alle Spielwaren, Hörbücher, Filme, Musik u.v.m
 
12% Rabatt³ sichern mit Gutscheincode: MAI12
 
Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in … weiterlesen
Buch (gebunden)

97,99 *

inkl. MwSt.
Portofrei
Lieferbar innerhalb von 5 bis 7 Werktagen
Algorithmic Cryptanalysis als Buch (gebunden)

Produktdetails

Titel: Algorithmic Cryptanalysis
Autor/en: Antoine (Universite de Versailles Saint-Quentin-en-Yvelines, France) Joux

ISBN: 1420070029
EAN: 9781420070026
200+; 22 Tables, black and white; 22 Illustrations, black and white.
Sprache: Englisch.
Taylor & Francis Ltd

15. Juni 2009 - gebunden - 520 Seiten

Beschreibung

Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.

Inhaltsverzeichnis

BACKGROUND

A Bird's-Eye View of Modern Cryptography

Preliminaries

Defining security in cryptography

Elementary Number Theory and Algebra Background

Integers and rational numbers

Greatest common divisors in Z

Modular arithmetic

Univariate polynomials and rational fractions

Finite fields

Vectors spaces and linear maps

The RSA and Diffie-Hellman cryptosystems

ALGORITHMS

Linear Algebra

Introductory example: multiplication of small matrices over F2

Dense matrix multiplication

Gaussian elimination algorithms

Sparse linear algebra

Sieve Algorithms

Introductory example: Eratosthenes's sieve

Sieving for smooth composites

Brute Force Cryptanalysis

Introductory example: dictionary attacks

Brute force and the DES algorithm

Brute force as a security mechanism

Brute force steps in advanced cryptanalysis

Brute force and parallel computers

The Birthday Paradox: Sorting or Not?

Introductory example: birthday attacks on modes of operation

Analysis of birthday paradox bounds

Finding collisions

Application to discrete logarithms in generic groups

Birthday-Based Algorithms for Functions

Algorithmic aspects

Analysis of random functions

Number theoretic applications

A direct cryptographic application in the context of blockwise security

Collisions in hash functions

Hellman's time memory tradeoff

Birthday Attacks through Quadrisection

Introductory example: subset sum problems

General setting for reduced memory birthday attacks

Extensions of the technique

Some direct applications

Fourier and Hadamard-Walsh Transforms

Introductory example: studying S-boxes

Algebraic normal forms of boolean functions

Goldreich-Levin theorem

Generalization of the Walsh transform to Fp

Fast Fourier transforms

Lattice Reduction

Definitions

Introductory example: Gauss reduction

Higher dimensions

Shortest vectors and improved lattice reduction

Dual and orthogonal lattices

Polynomial Systems and Grobner Bases Computations

General framework

Bivariate systems of equations

Definitions: multivariate ideals, monomial orderings, and Grobner bases

Buchberger algorithm

Macaulay's matrices

Faugere's algorithms

Algebraic attacks on multivariate cryptography

On the complexity of Grobner bases computation

APPLICATIONS

Attacks on Stream Ciphers

LFSR-based keystream generators

Correlation attacks

Algebraic attacks

Extension to some nonlinear shift registers

The cube attack

Time memory data tradeoffs

Lattice-Based Cryptanalysis

Direct attacks using lattice reduction

Coppersmith's small roots attacks

Elliptic Curves and Pairings

Introduction to elliptic curves

The Weil pairing

The elliptic curve factoring method

Index Calculus Algorithms

Introduction to index calculus

A simple finite field example

Generalization to finite fields with small enough characteristics

Introduction to the number field sieve

Smoothness probabilities

References

Portrait

Antoine Joux is associate professor at Universite de Versailles Saint-Quentin-en-Yvelines.

Pressestimmen

... this book is a must-read/must-have-in-your-shelf for anybody seriously involved in the field of cryptography if only to give an overview of the range of techniques that can be applied to break cryptographic schemes and the cryptographic hurdles that one needs to get over to design secure systems. Also parts of the book can also easily be used as the basis for a cryptography course since every chapter contains exercises (hints and solution to some of them can be found on the author's website). I particularly appreciated the focus on the practicality of the provided material: after an overview in plain English, every algorithm is clearly stated in the form of pseudo-code and many of them are also provided in C code. In that way the reader can easily follow the careful complexity analysis to convince himself that it is the algorithm he wants to use and then write an implementation of that algorithm from the book. The practical aspect of book shines as well through the effort of always presenting the most efficient algorithms for a given task with particular constraints in mind. To sum it up, this book is a mine of information on cryptanalysis and goes above and beyond to provide the reader with everything he needs to become a better cryptographer. -Alexandre Anzala-Yamajako, SIGACT News, 2012 With a plethora of algorithms available to them, readers will be ready to appreciate a number of their applications. ... The book also provides a number of downloadable codes in C. ... Suggestions are made on how to use the book to meet a variety of teaching needs - including accommodating readers with a stronger computer science background. The flexibility in this approach to learning is a welcome feature of the book and makes it an attractive option for those who may need to deliver pertinent material to a variety of audiences. Such audiences will be provided with a clear presentation of key aspects of this vital scientific discipline. The clarity of exposition should also serve well those who use this book as a handbook. -Contemporary Physics, Volume 52, Issue 3, 2011 ... very nice to see the connection between cryptography and the different algorithms. ... A convenient extra of the book are the good references. ... Algorithmic Cryptanalysis is a high level book that covers many interesting topics. I would recommend this book for graduate students with a strong mathematical background, a cryptographic background, knowledge in C-programming and an interest in implementing cryptanalytic attacks. As mentioned before, the book covers interesting topics when it comes to implementing an attack which I haven't seen in any other book before in this combination. ... -IACR Book Reviews, October 2010 ... The aim of the book is to survey work on cryptanalysis (both for symmetric and public key cryptography) and to present background on all major cryptanalytic tools. The author is a leading authority who has made major research contributions in most aspects of the subject. To have such a wide-ranging survey of the area written by someone with such depth of experience will be extremely valuable to students and researchers. ... Chapters 3, 4 and 15 give an excellent survey of index calculus algorithms for the discrete logarithm problem in finite fields ... the book will certainly be useful to postgraduates and researchers in cryptography and cryptanalysis. -Mathematical Reviews, Issue 2010h The book under review presents a complete panoramic of the different methods and techniques used in modern cryptanalysis ... emphasis is in the algorithms, in fact one of the main attractions of the book is the great quantity of algorithms that it presents: some described in pseudocode (listed as algorithms) and others as programs in C language (listed as programs). Additional C implementations can be downloaded from the website www.joux.biz/algcrypt ... -Zentralblatt MATH 1172 ... This book takes an algorithmic approach to the topic and covers a number of algorithms that might be used in the cryptanalysis of different systems. ... There is quite a bit of interesting material in the book ... The material is very well presented most of the time ... This book could be a very good introduction to cryptanalysis for graduate students who have already been introduced to cryptography and have a fair amount of mathematical background. The book could be used in an advanced undergraduate course as well ... It would also be quite an interesting read for those studying algorithms, as some of the algorithms presented are quite intriguing ... -Jeffrey Putnam, Computing Reviews, May 2010 This is a work suitable for first-year graduate students or advanced undergraduates. ... the addition of the online materials makes this book usable by independent readers or industry algorithm implementers in need of a reference work. ... Combining practical algorithms and supported by explanation of the relevant theory, this is a good introduction to cryptanalysis that improves on that good recipe by including key details on current computer architecture. This makes this work succeed as both handbook and textbook. -Tom Schulte, MAA Reviews, April 2010

Mehr aus dieser Reihe

zurück
Introduction to Modern Cryptography
Buch (gebunden)
von Jonathan Katz, Y…
Lattice-based Cryptography
- 6%
Buch (gebunden)
von Jonathan (Univer…
Statt € 82,49
Cryptanalysis of RSA and Its Variants
Buch (gebunden)
von M. Jason (iCORE …
Cryptology
Buch (gebunden)
von Richard (Appalac…
Introduction to Network Security
Buch (gebunden)
von Douglas (Iowa St…
vor
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
1 Mängelexemplare sind Bücher mit leichten Beschädigungen, die das Lesen aber nicht einschränken. Mängelexemplare sind durch einen Stempel als solche gekennzeichnet. Die frühere Buchpreisbindung ist aufgehoben. Angaben zu Preissenkungen beziehen sich auf den gebundenen Preis eines mangelfreien Exemplars.

2 Diese Artikel unterliegen nicht der Preisbindung, die Preisbindung dieser Artikel wurde aufgehoben oder der Preis wurde vom Verlag gesenkt. Die jeweils zutreffende Alternative wird Ihnen auf der Artikelseite dargestellt. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

3 Ihr Gutschein MAI12 gilt bis einschließlich 26.05.2020. Sie können den Gutschein ausschließlich online einlösen unter www.hugendubel.de. Keine Bestellung zur Abholung in der Buchhandlung möglich. Der Gutschein ist nicht gültig für gesetzlich preisgebundene Artikel (deutschsprachige Bücher und eBooks) sowie für preisgebundene Kalender, tonies-Produkte, tolino eReader und tolino select. Der Gutschein ist nicht mit anderen Gutscheinen und Geschenkkarten kombinierbar. Eine Barauszahlung ist nicht möglich. Ein Weiterverkauf und der Handel des Gutscheincodes sind nicht gestattet.

4 Der gebundene Preis dieses Artikels wird nach Ablauf des auf der Artikelseite dargestellten Datums vom Verlag angehoben.

5 Der Preisvergleich bezieht sich auf die unverbindliche Preisempfehlung (UVP) des Herstellers.

6 Der gebundene Preis dieses Artikels wurde vom Verlag gesenkt. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

7 Die Preisbindung dieses Artikels wurde aufgehoben. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.