๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Advanced Linear Cryptanalysis of Block and Stream Ciphers

โœ Scribed by P Junod, A. Canteaut


Publisher
IOS Press
Year
2011
Tongue
English
Leaves
144
Series
Cryptology and Information Security
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline, as well as taking a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cryptanalysis and their consequences for the design of modern block ciphers; part two explores a theory of multi-dimensional linear attacks on block ciphers; the third part covers how linear attacks can be applied to stream ciphers, and gives an overview of the development of linear attacks as well as a theoretical explanation of their current use. Part four details interesting and useful links between linear cryptanalysis and coding theory, and the fifth and final part discusses how correlation analysis can be conducted at the level of elements of GF (2n) without the need to deal with field representation issues. This book will be of interest to anybody who wishes to explore this fascinating yet complex part of symmetrical cryptanalysis.

IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.

Some of the areas we publish in:

-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences


๐Ÿ“œ SIMILAR VOLUMES


Cryptanalysis of Number Theoretic Cipher
โœ Samuel S. Wagstaff, Jr. (Author) ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Chapman and Hall/CRC

<p>At the heart of modern cryptographic algorithms lies computational number theory. Whether you`re encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers tak

Design and Cryptanalysis of ZUC: A Strea
โœ Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<span>This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how strea

New Stream Cipher Designs: The eSTREAM F
โœ Matthew Robshaw (auth.), Matthew Robshaw, Olivier Billet (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). </p><p>The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on a