Advanced Linear Cryptanalysis of Block and Stream Ciphers
โ Scribed by P Junod, A. Canteaut
- Publisher
- IOS Press
- Year
- 2011
- Tongue
- English
- Leaves
- 144
- Series
- Cryptology and Information Security
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline, as well as taking a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cryptanalysis and their consequences for the design of modern block ciphers; part two explores a theory of multi-dimensional linear attacks on block ciphers; the third part covers how linear attacks can be applied to stream ciphers, and gives an overview of the development of linear attacks as well as a theoretical explanation of their current use. Part four details interesting and useful links between linear cryptanalysis and coding theory, and the fifth and final part discusses how correlation analysis can be conducted at the level of elements of GF (2n) without the need to deal with field representation issues. This book will be of interest to anybody who wishes to explore this fascinating yet complex part of symmetrical cryptanalysis.
IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.
Some of the areas we publish in:
-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences
๐ SIMILAR VOLUMES
<p>At the heart of modern cryptographic algorithms lies computational number theory. Whether you`re encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers tak
<span>This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how strea
<p><p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). </p><p>The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on a