Applied cryptanalysis: breaking ciphers in the real world
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley-Interscience
2007
|
Schlagworte: | |
Online-Zugang: | Table of contents only Contributor biographical information Publisher description Inhaltsverzeichnis |
Beschreibung: | "A John Wiley & Sons, Inc., publication." Includes bibliographical references (p. 375-392) and index |
Beschreibung: | XIX, 401 S. Ill., graph. Darst. |
ISBN: | 9780470114865 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035994675 | ||
003 | DE-604 | ||
005 | 20120802 | ||
007 | t | ||
008 | 100203s2007 xxuad|| |||| 00||| eng d | ||
010 | |a 2007001277 | ||
015 | |a GBA718562 |2 dnb | ||
020 | |a 9780470114865 |c hbk. |9 978-0-470-11486-5 | ||
035 | |a (OCoLC)79002489 | ||
035 | |a (DE-599)BVBBV035994675 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-898 |a DE-11 |a DE-1046 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Stamp, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Applied cryptanalysis |b breaking ciphers in the real world |c Mark Stamp ; Richard M. Low |
264 | 1 | |a Hoboken, NJ |b Wiley-Interscience |c 2007 | |
300 | |a XIX, 401 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "A John Wiley & Sons, Inc., publication." | ||
500 | |a Includes bibliographical references (p. 375-392) and index | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Low, Richard M. |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip078/2007001277.html |3 Table of contents only | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0741/2007001277-b.html |3 Contributor biographical information | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0741/2007001277-d.html |3 Publisher description | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018887321&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018887321 |
Datensatz im Suchindex
_version_ | 1804141021481664512 |
---|---|
adam_text | Contents
Preface
xiii
About the Authors
xvii
Acknowledgments
xix
1
Classic Ciphers
1
1.1
Introduction
............................ 1
1.2
Good Guys and Bad Guys
.................... 1
1.3
Terminology
............................ 2
1.4
Selected Classic Crypto Topics
................. 4
1.4.1
Transposition Ciphers
.................. 5
1.4.2
Substitution Ciphers
................... 8
1.4.3
One-Time Pad
...................... 18
1.4.4 Codebook
Ciphers
.................... 20
1.5
Summary
............................. 21
1.6
Problems
............................. 22
2
World War II Ciphers
25
2.1
Introduction
............................ 25
2.2
Enigma
.............................. 26
2.2.1
Enigma Cipher Machine
................. 26
2.2.2
Enigma
Keyspace..................... 29
2.2.3
Rotors
........................... 31
2.2.4
Enigma Attack
...................... 34
2.2.5
More Secure Enigma?
.................. 37
2.3
Purple
............................... 38
2.3.1
Purple Cipher Machine
................. 38
2.3.2
Purple
Keyspace..................... 44
2.3.3
Purple Diagnosis
..................... 45
2.3.4
Decrypting Purple
.................... 49
2.3.5
Purple versus Enigma
.................. 50
2.4
Sigaba
............................... 52
2.4.1
Sigaba Cipher Machine
................. 52
2.4.2
Sigaba
Keyspace..................... 57
2.4.3
Sigaba Attack
....................... 59
2.4.4
Sigaba Conclusion
.................... 67
2.5
Summary
............................. 68
2.6
Problems
............................. 69
Stream Ciphers
79
3.1
Introduction
............................ 79
3.2
Shift Registers
.......................... 81
3.2.1
Berlekamp-Massey Algorithm
.............. 83
3.2.2
Cryptographically Strong Sequences
.......... 85
3.2.3
Shift Register-Based Stream Ciphers
.......... 89
3.2.4
Correlation Attack
.................... 90
3.3
ORYX
............................... 93
3.3.1
ORYX Cipher
....................... 94
3.3.2
ORYX Attack
....................... 97
3.3.3
Secure ORYX?
...................... 102
3.4
RC4
................................ 103
3.4.1
RC4 Algorithm
...................... 105
3.4.2
RC4 Attack
........................ 105
3.4.3
Preventing the RC4 Attack
............... 110
3.5
PKZIP
............................... 110
3.5.1
PKZIP Cipher
......................
Ill
3.5.2
PKZIP Attack
...................... 113
3.5.3
Improved PKZIP?
.................... 120
3.6
Summary
............................. 120
3.7
Problems
............................. 121
Block Ciphers
127
4.1
Introduction
............................ 127
4.2
Block Cipher Modes
....................... 128
4.3
Feistel Cipher
........................... 131
4.4
Hellman s Time-Memory Trade-Off
............... 133
4.4.1
Cryptanalytic TMTO
.................. 133
4.4.2
Bad Chains
........................ 137
4.4.3
Success Probability
.................... 141
4.4.4
Distributed TMTO
.................... 142
4.4.5
TMTO Conclusions
................... 143
4.5
CMEA
............................... 144
4.5.1
CMEA Cipher
. . ,................... 144
4.5.2
SCMEA Cipher
...................... 146
4.5.3
SCMEA Chosen Plaintext Attack
........... 147
4.5.4
CMEA Chosen Plaintext Attack
............ 148
4.5.5
SCMEA Known Plaintext Attack
........... 151
4.5.6
CMEA Known Plaintext Attack
............ 158
4.5.7
More Secure CMEA?
................... 159
4.6
Akelarre
.............................. 160
4.6.1
Akelarre Cipher
...................... 160
4.6.2
Akelarre Attack
...................... 166
4.6.3
Improved Akelarre?
................... 169
4.7
FEAL
............................... 170
4.7.1
FEAL-4 Cipher
...................... 171
4.7.2
FEAL-4 Differential Attack
............... 172
4.7.3
FEAL-4 Linear Attack
.................. 177
4.7.4
Confusion and Diffusion
................. 182
4.8
Summary
............................. 183
4.9
Problems
............................. 183
Hash Functions
193
5.1
Introduction
............................ 193
5.2
Birthdays and Hashing
...................... 200
5.2.1
The Birthday Problem
.................. 200
5.2.2
Birthday Attacks on Hash Functions
.......... 201
5.2.3
Digital Signature Birthday Attack
........... 202
5.2.4
Nostradamus Attack
................... 203
5.3
MD4
................................ 208
5.3.1
MD4 Algorithm
...................... 208
5.3.2
MD4 Attack
...................... . 210
5.3.3
A Meaningful Collision
.................. 224
5.4
MD5
................................ 225
5.4.1
MD5 Algorithm
...................... 225
5.4.2
A Precise Differential
.................. 231
5.4.3
Outline of Wang s Attack
................ 233
5.4.4
Wang s MD5 Differentials
................ 235
5.4.5
Reverse Engineering Wang s Attack
.......... 238
5.4.6
Stevens Implementation of Wang s Attack
...... 252
5.4.7
A Practical Attack
................... 253
5.5
Summary
............................. 256
5.6
Problems
............................. 257
Public Key Systems
265
6.1
Introduction
............................ 265
6.2
Merkle-Hellman Knapsack
.................... 267
6.2.1
Lattice-Reduction Attack
................ 270
6.2.2
Knapsack Conclusion
.................. 275
6.3 Diffie-Hellman Key Exchange.................. 275
6.3.1 Man-in-the-Middle
Attack
................ 277
6.3.2 Diffie-Hellman
Conclusion
................ 278
6.4 Arithmetica Key Exchange ................... 279
6.4.1 Hughes-Tannenbaum
Length Attack..........
283
6.4.2 Arithmetica
Conclusion.................
284
6.5
RSA
................................ 284
6.5.1
Mathematical Issues
................... 285
6.5.2
RSA
Conclusion
..................... 288
6.6
Rabin Cipher
........................... 289
6.6.1
Chosen Ciphertext Attack
............... 291
6.6.2
Rabin Cryptosystem Conclusion
............ 292
6.7
NTRU Cipher
........................... 293
6.7.1
Meet-in-the-Middle Attack
............... 299
6.7.2
Multiple Transmission Attack
............. 301
6.7.3
Chosen Ciphertext Attack
............... 302
6.7.4
NTRU Conclusion
.................... 304
6.8
ElGamal Signature Scheme
................... 305
6.8.1
Mathematical Issues
................... 308
6.8.2
ElGamal Signature Conclusion
............. 308
6.9
Summary
............................. 309
6.10
Problems
............................. 309
Public Key Attacks
315
7.1
Introduction
............................ 315
7.2
Factoring Algorithms
....................... 316
7.2.1
Trial Division
....................... 316
7.2.2
Dixon s Algorithm
.................... 317
7.2.3
Quadratic Sieve
...................... 323
7.2.4
Factoring Conclusions
.................. 327
7.3
Discrete Log Algorithms
..................... 330
7.3.1
Trial Multiplication
................... 330
7.3.2
Baby-Step Giant-Step
.................. 331
7.3.3
Index Calculus
...................... 332
7.3.4
Discrete Log Conclusions
................ 333
7.4
RSA Implementation Attacks
.................. 334
7.4.1
Timing Attacks
..................... 334
7.4.2
Glitching Attack
..................... 353
7.4.3
Implementation Attacks Conclusions
.......... 354
7.5
Summary
............................. 355
7.6
Problems
............................. 355
Appendix
361
A-I MD5
Tables
............................ 361
A-2
Math................................ 371
A-2.1
Number Theory
..................... 371
A-2.
2
Group
Theory ......................
372
A-2.3
Ring Theory
....................... 372
A-2.4
Linear
Algebra
...................... 373
Annotated Bibliography
375
Index
393
|
any_adam_object | 1 |
author | Stamp, Mark |
author_facet | Stamp, Mark |
author_role | aut |
author_sort | Stamp, Mark |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV035994675 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)79002489 (DE-599)BVBBV035994675 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02009nam a2200493zc 4500</leader><controlfield tag="001">BV035994675</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120802 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100203s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007001277</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA718562</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470114865</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-0-470-11486-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)79002489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035994675</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-1046</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stamp, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cryptanalysis</subfield><subfield code="b">breaking ciphers in the real world</subfield><subfield code="c">Mark Stamp ; Richard M. Low</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 401 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A John Wiley & Sons, Inc., publication."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 375-392) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Low, Richard M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip078/2007001277.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0741/2007001277-b.html</subfield><subfield code="3">Contributor biographical information</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0741/2007001277-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018887321&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018887321</subfield></datafield></record></collection> |
id | DE-604.BV035994675 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:09:15Z |
institution | BVB |
isbn | 9780470114865 |
language | English |
lccn | 2007001277 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018887321 |
oclc_num | 79002489 |
open_access_boolean | |
owner | DE-739 DE-898 DE-BY-UBR DE-11 DE-1046 |
owner_facet | DE-739 DE-898 DE-BY-UBR DE-11 DE-1046 |
physical | XIX, 401 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley-Interscience |
record_format | marc |
spelling | Stamp, Mark Verfasser aut Applied cryptanalysis breaking ciphers in the real world Mark Stamp ; Richard M. Low Hoboken, NJ Wiley-Interscience 2007 XIX, 401 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier "A John Wiley & Sons, Inc., publication." Includes bibliographical references (p. 375-392) and index Computer security Data encryption (Computer science) Cryptography Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 s DE-604 Low, Richard M. Sonstige oth http://www.loc.gov/catdir/toc/ecip078/2007001277.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0741/2007001277-b.html Contributor biographical information http://www.loc.gov/catdir/enhancements/fy0741/2007001277-d.html Publisher description Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018887321&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stamp, Mark Applied cryptanalysis breaking ciphers in the real world Computer security Data encryption (Computer science) Cryptography Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4830502-9 |
title | Applied cryptanalysis breaking ciphers in the real world |
title_auth | Applied cryptanalysis breaking ciphers in the real world |
title_exact_search | Applied cryptanalysis breaking ciphers in the real world |
title_full | Applied cryptanalysis breaking ciphers in the real world Mark Stamp ; Richard M. Low |
title_fullStr | Applied cryptanalysis breaking ciphers in the real world Mark Stamp ; Richard M. Low |
title_full_unstemmed | Applied cryptanalysis breaking ciphers in the real world Mark Stamp ; Richard M. Low |
title_short | Applied cryptanalysis |
title_sort | applied cryptanalysis breaking ciphers in the real world |
title_sub | breaking ciphers in the real world |
topic | Computer security Data encryption (Computer science) Cryptography Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Computer security Data encryption (Computer science) Cryptography Kryptoanalyse |
url | http://www.loc.gov/catdir/toc/ecip078/2007001277.html http://www.loc.gov/catdir/enhancements/fy0741/2007001277-b.html http://www.loc.gov/catdir/enhancements/fy0741/2007001277-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018887321&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stampmark appliedcryptanalysisbreakingciphersintherealworld AT lowrichardm appliedcryptanalysisbreakingciphersintherealworld |