Applied Cryptanalysis: Breaking Ciphers in the Real WorldThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic. |
Other editions - View all
Applied Cryptanalysis: Breaking Ciphers in the Real World Mark Stamp,Richard M. Low Limited preview - 2007 |
Applied Cryptanalysis: Breaking Ciphers in the Real World Mark Stamp,Richard M. Low No preview available - 2007 |
Common terms and phrases
32-bit words Akelarre algorithm Alice and Bob attack discussed bits block cipher Cave Table chapter chosen plaintext chosen plaintext attack cipher rotors ciphertext Cited on pages CMEA CMEA cipher codebook collision compute consider control rotors corresponding cryptanalysis crypto cryptosystem decryption defined definition denoted determine differential attack efficient encryption Enigma equations example factor base first five given hash function implementation index rotors initial fill input integer keyspace keystream keystream byte knapsack known plaintext attack LFSR linear complexity MD5 attack mod q modification modular exponentiation modulo multiplication NTRU obtain one-time pad ORYX output pairs permutation PKZIP plaintext blocks plaintext letter plugboard polynomial possible primary phase problem public key Purple quadratic sieve random recover reduce the number repeated squaring result rotor settings rotor steps satisfied Section sequence shift registers Sigaba significant solve specified stecker stream cipher subkey Suppose TMTO transposition cipher Trudy vector Vigenere cipher Z-lists


