<p>Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the
Cryptography and Cryptanalysis in MATLAB: Creating and Programming Advanced Algorithms
✍ Scribed by Marius Iulian Mihailescu, Stefania Loredana Nita
- Publisher
- Apress
- Year
- 2021
- Tongue
- English
- Leaves
- 201
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB.
Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB.
What You Will Learn
- Discover MATLAB’s cryptography functions
- Work with conversion mechanisms in MATLAB Implement cryptographic algorithms using arithmetic operations
- Understand the classical, simple cryptosystems that form the basis of modern cryptography
- Develop fully working solutions (encryption/decryption operations)
- Study pseudo-random generators and their real-life implementations
- Utilize hash functions by way of practical examples
- Implement solutions to defend against practical cryptanalysis methods and attacks
- Understand asymmetric and symmetric encryption systems and how to use them Leverage visual cryptography, steganography, and chaos-based cryptography
Who This Book Is For
Those who are new to cryptography/analysis. Some prior exposure to MATLAB recommended.
✦ Table of Contents
Table of Contents
About the Authors
About the Technical Reviewer
Chapter 1: Getting Started in Cryptography and Cryptanalysis
Cryptography and Cryptanalysis
Book Structure
Conclusion
References
Chapter 2: MATLAB Cryptography Functions
Conclusion
References
Chapter 3: Conversions Used in MATLAB for Cryptography
Conclusion
References
Chapter 4: Basic Arithmetic Foundations
Euclid’s Division Lemma
Greatest Common Divisor (gcd)
Euclid’s Algorithm
The Extended Euclidean Algorithm
Practical Implementations
The Extended Euclidean Algorithm
Prime Factors in MATLAB
Computing the Modular Inverse
Conclusion
References
Chapter 5: Number Theory
Primality and Factorization
Prime Numbers
The Prime Number Theorem
Congruency
Inverse
Chinese Remainder Theorem
Primality Tests
The Wilson Primality Test
The Little Fermat Primality Test
The Miller-Rabin Primality Test
Algebraic Structures
Conclusion
References
Chapter 6: Classic Cryptography
Symmetric Cryptography
Classic Ciphers
The Caesar Cipher
Example
Mathematical Background
Cryptanalysis
Implementing the Caesar Cipher
The Vigenère Cipher
Example
Mathematical Background
Implementing the Vigenère Cipher
The Hill Cipher
Example
Cryptanalysis
Implementing the Hill Cipher
Conclusion
References
Chapter 7: Pseudo-Random Number Generators
Simple PRNGs
Linear Congruential Generators
Ranrot Generators
Blum-Blum-Shub Generator
Linear Circuit PRNGs
Other PRNGs
Practical Implementations
Conclusion
References
Chapter 8: Hash Functions
Security of Hash Functions
Cryptographic Hash Functions
Birthday Attack
MD4 Function
MD4 Function Description
Cryptanalysis of MD4
MD5 Function
SHA1 Function
Implementing Hash Functions
Implementing SHA-1/256/368/512, MD2, and MD5
Conclusion
References
Chapter 9: Block Ciphers: DES and AES
Preliminaries
Networks Based on Substitution and Permutation
Attacks Based on Linear Cryptanalysis
Attacks Based on Differential Cryptanalysis
The Data Encryption Standard (DES)
DES Description
Implementation of DES
The Advanced Encryption System (AES)
SubBytes Operations
The ShiftRows Operation
The MixColumn Operation
The AddRoundKey Operation
Key Expansion
InvSubBytes Operation
InvShiftRows Operation
InvMixColumns Operation
Conclusion
References
Chapter 10: Asymmetric Encryption Schemes
RSA
ElGamal
Merkle-Hellman
Knapsack Approach
The Algorithms
Conclusion
References
Chapter 11: Formal Techniques for Cryptography
Probability Theory
Random Variables
Birthday Problem
Entropy
Randomness in Cryptography
Conclusion
References
Chapter 12: Visual Cryptography
Conclusion
References
Chapter 13: Chaos-Based Cryptography
Chaos Maps and Functions
Logistic Map
Chaos Theory in Cryptography
Sensitivity to Initial Conditions
Conclusion
References
Chapter 14: Steganography
Algorithms and Methods for Different Steganography Types
Steganography for Image Files
Steganography for Audio Files
Steganography for Video Files
Practical Implementation
Implementing the Least Significant Bit (LSB) Method
Implementing the Histogram Analysis Method
Conclusion
References
Index
📜 SIMILAR VOLUMES
<span><br></span>
Intermediate-Advanced user level
<p></p><p><span>Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptog
<p><span>Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, sea
<p><span>Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, sea