Modern Cryptanalysis Techniques for Advanced Code Breaking

ISBN-10: 047013593X
ISBN-13: 9780470135938
Edition: 2008
List price: $50.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: While traditional cryptanalysis books have discussed breaking codes before the advent of computers, Modern Cryptanalysis sheds light on the latest techniques that utilize cutting-edge technology Covers general-purpose cryptanalysis techniques such  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $50.00
Copyright year: 2008
Publisher: John Wiley & Sons, Incorporated
Publication date: 3/17/2008
Binding: Hardcover
Pages: 264
Size: 9.75" wide x 7.50" long x 0.75" tall
Weight: 0.550

While traditional cryptanalysis books have discussed breaking codes before the advent of computers, Modern Cryptanalysis sheds light on the latest techniques that utilize cutting-edge technology Covers general-purpose cryptanalysis techniques such as Rainbow tables and collision attacks, followed by Linear and Differential Cryptanalysis and their offspring Focuses on specific cryptanalysis techniques as well as some of the mathematics behind these techniques Provides a solid introduction to the field before delving into more advanced concepts

Acknowledgments
Introduction
Simple Ciphers
Monoalphabetic Ciphers
Keying
Keyed Alphabets
ROT13
Klingon
Polyalphabetic Ciphers
Vigenere Tableau
Transposition Ciphers
Columnar Transpositions
Double Columnar Transpositions
Cryptanalysis
Breaking Monoalphabetic Ciphers
Frequency Analysis
Index of Coincidence
Other Issues
Breaking Polyalphabetic Ciphers
Breaking Columnar Transposition Ciphers
Breaking Double Columnar Transposition Ciphers
Summary
Exercises
Number Theoretical Ciphers
Probability
Permutations and Choices
Dependence
Fun with Poker
The Birthday Paradox
Cryptographic Hashes
Number Theory Refresher Course
Divisibility and Prime Numbers
Congruences
Algebra Refresher Course
Definitions
Finite Field Inverses
Factoring-Based Cryptography
The RSA Algorithm
Discrete Logarithm-Based Cryptography
The Diffie-Hellman Algorithm
Elliptic Curves
Addition of Points
Elliptic Curve Cryptography
Elliptic Curve Diffie-Hellman
Summary
Exercises
Factoring and Discrete Logarithms
Factorization
Algorithm Theory
Notation
A Crash Course in Python
Exponential Factoring Methods
Brute-Force
Analysis
Fermat's Difference of Squares
Analysis of Fermat's Difference of Squares
Pollard's [rho]
Analysis of Pollard's [rho]
Pollard's p - 1
Analysis of Pollard's p - 1
Square Forms Factorization
Analysis of SQUFOF
Elliptic Curve Factorization Method
Analysis of ECM
Subexponential Factoring Methods
Continued Fraction Factorization
Analysis of CFRAC
Sieving Methods
Discrete Logarithms
Brute-Force-Methods
Baby-Step Giant-Step Method
Baby-Step Giant-Step Analysis
Pollard's [rho] for Discrete Logarithms
Analysis of Pollard's [rho] for Discrete Logarithms
Pollard's [gamma] for Discrete Logarithms
Analysis of Pollard's [gamma]
Index Calculus Method
Summary
Exercises
Block Ciphers
Operations on Bits, Bytes, Words
Operations
Code
Product Ciphers
Substitutions and Permutations
S-Box
P-Box
Shift Registers
Substitution-Permutation Network
EASY1 Cipher
Python Implementation
Feistel Structures
DES
DES Key Schedule
DES Round Function
Triple DES
DESX
FEAL
S-function
Key-Generating Function: f[subscript K]
Round Function: f
Key Scheduling
Blowfish
Blowfish Key Schedule
Blowfish Algorithm
Blowfish Round Function
Notes on Blowfish
AES / Rijndael
Rijndael Encryption Algorithm
SubBytes
ShiftRows
MixColumns
AddRoundKey
Rijndael Decryption Algorithm
Key Expansion
Notes on Rijndael
Block Cipher Modes
Electronic Code Book
Cipher Block Chaining
Cipher Feedback
Output Feedback
Counter Mode
Skipjack
Skipjack Encryption Algorithm
Skipjack Decryption Algorithm
Permutations
Message Digests and Hashes
Checksums
Cyclic Redundancy Checks
MD5
SHA-1
Random Number Generators
Bias
Linear Congruential Random Number Generator
One-Time Pad
Summary
Exercises
General Cryptanalytic Methods
Brute-Force
Time-Space Trade-offs
Meet-in-the-Middle Attack
Hellman Time-Space Trade-off
Time-Space Trade-off Success
Flaws
Multi-Table Trade-off
Rivest's Distinguished Endpoints
Rainbow Tables
Advantages of Rainbow Tables
Microsoft LAN Manager Password Hash
Slide Attacks
Slide Attacks on Feistel Ciphers
Advanced Slide Attacks
Cryptanalysis of Hash Functions
Cryptanalysis of Random Number Generators
Summary
Exercises
Linear Cryptanalysis
Overview
Matsui's Algorithms
Linear Expressions for S-Boxes
Matsui's Piling-up Lemma
Easy1 Cipher
Linear Expressions and Key Recovery
Linear Cryptanalysis of DES
Multiple Linear Approximations
Finding Linear Expressions
Linear Cryptanalysis Code
Summary
Exercises
Differential Cryptanalysis
Overview
Notation
S-Box Differentials
Combining S-Box Characteristics
Key Derivation
Differential Cryptanalysis Code
Differential Cryptanalysis of Feistel Ciphers
Differential Cryptanalysis of FEAL
Differential Cryptanalysis of DES
Analysis
Differential-Linear Cryptanalysis
Conditional Characteristics
Higher-Order Differentials
Truncated Differentials
Impossible Differentials
Boomerang Attack
Interpolation Attack
Related-Key Attack
Related-Key Attack on GOST
Related-Key Attack on 3DES
Summary
Exercises
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×