The Block Cipher Companion
Springer Science & Business Media, Oct 25, 2011 - Computers - 284 pages
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Advances in Cryptology algorithm analysis Areas in Cryptography ASIACRYPT authentication b-bit block bias Biham Biryukov bitwise block cipher block cipher design byte Chap chosen messages chosen plaintexts CIPHERFOUR ciphertext block Computer Science consider construction counter CRYPTO Cryptography decryption denote differential and linear differential attack differential cryptanalysis Dunkelman editor ENCk equations EUROCRYPT exclusive-or exhaustive search Fast Software Encryption Feistel cipher Feistel network four-bit four-round given guess hash function holds with probability implementation KASUMI key bits key material key schedule L.R. Knudsen Lecture Notes linear approximation linear characteristic linear cryptanalysis linear hull MixColumns Notes in Computer OFB mode operations permutation Preneel properties random recover related-key Rijmen Rijndael Robshaw round function round keys rounds of encryption S-box s-round secret key Selected Areas Springer stream cipher structure subkeys texts time–memory trade-off tion triple encryption triple-DES user-supplied key variants volume weak keys