Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations. In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type. Innovative Cryptography, Second Edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Flexible Software Ciphers
SubstituionPermutation Networks with Minimal
Switched Controlled Operations
4 other sections not shown
active bits attack avalanche effect binary vector bit permutations blind signature block ciphers boolean functions building bytes ciphers based ciphertext control bits control vector controlled elements controlled operational substitutions controlled permutations block controlled substitution controlled substitution-permutation networks corresponding Crypt cryptographic primitive cryptoscheme cryptosystem data block data subblock data-dependent decryption depending differential characteristics differential cryptanalysis digital signature enciphering encryption algorithm encryption key encryption mode encryption procedures encryption rounds encryption speed ensure example extended key formed hardware implementation input bit input block involution key schedule left data subgroup linear cryptanalysis mechanism method Moldovyan mutually inverse nonlinear number of active output bits pairs parameters performed plaintext possible precomputations private key probabilistic probabilistic encryption probability protection pseudorandom public key random recursive round keys round transformation scheme secret key shown in Figure specified SPECTR-Z steganography structure subkeys switched controlled operational symmetric Table tion variables variants words