The Block Cipher Companion (Google eBook)
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 DES
Chapter 3 AES
Chapter 4 Using Block Ciphers
Chapter 5 Brute Force Attacks
Chapter 6 Differential Cryptanalysis The Idea
Chapter 7 Linear Cryptanalysis The Idea
Chapter 8 Advanced Topics
Chapter 9 A Short Survey and Six Prominent Ciphers
Other editions - View all
AddRoundKey Advances in Cryptology algorithm analysis Areas in Cryptography ASIACRYPT authentication b-bit block bias Biham Biryukov bitwise block cipher block cipher design byte Chap chosen messages chosen plaintexts CIPHERFOUR ciphertext block Computer Science consider construction counter CRYPTO Cryptography decryption denote differential and linear differential attack differential cryptanalysis Dunkelman editor equations EUROCRYPT exclusive-or exhaustive search Fast Software Encryption Feistel cipher Feistel network four-bit four-round given guess hash function holds with probability implementation KASUMI key bits key material key schedule L.R. Knudsen Lecture Notes linear approximation linear characteristic linear cryptanalysis linear hull MixColumns Notes in Computer OFB mode operations permutation Preneel properties random recover related-key Rijmen Rijndael Robshaw round function round keys rounds of encryption S-box s-round secret key Springer stream cipher structure subkeys texts time–memory trade-off tion triple encryption triple-DES truncated user-supplied key variants volume weak keys