Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
Les mer
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.
Les mer
Introduction.- Data Encryption Standard (DES).- Advanced Encryption Standard (AES).- Using Block Ciphers.- Brute-Force Attacks.- Differential Cryptanalysis.- Linear Cryptanalysis.- Advanced Topics.- A Short Survey and Five Prominent Ciphers.- Bibliography.
Les mer
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
Les mer
From the reviews:"Overall, this book provides a historical view of the essential work on the design and analysis of block ciphers. The book is well written and is appropriate for both beginners and experienced readers. Those who want more details about the rationale and philosophy behind block cipher design can use this book as an up-to-date reference." (Zheng Gong, ACM Computing Reviews, July 2012)“‘The block cipher companion’ is a well written handbook, wholly recommended. An excellent choice of examples and informal language make this handbook an excellent choice for beginners, guiding the reader from simple cipher techniques and cryptanalysis towards more advanced ideas. … Professionals will find the book to be a systematic collection of ideas, and, in particular, a thorough bibliography and a short survey of block ciphers evolution.” (Jerzy Żurawiecki, Zentralblatt MATH, Vol. 1243, 2012)
Les mer
Written by established experts Is the most comprehensive reference on the subject The authors include an exhaustive bibliography of the field with over 750 references
Produktdetaljer
ISBN
9783642173417
Publisert
2011-10-26
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Graduate, P, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Biographical note
The first author is a professor in the Department of Mathematics and head of the Crypto Group at the Technical University of Denmark; his main interests are the analysis and design of block ciphers, hash functions, and message authentication codes. The second author is a researcher in the Cryptography Research Group of Orange (France Télécom); his main interests are the design and analysis of symmetric cryptographic primitives, cryptographic techniques for constrained devices, and the deployment of cryptographic solutions. Both authors have taken lead roles in the related professional associations and academic conferences.