The block cipher companion:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIV, 267 S. graph. Darst. |
ISBN: | 9783642173417 3642173411 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039752182 | ||
003 | DE-604 | ||
005 | 20160405 | ||
007 | t | ||
008 | 111209s2011 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 100777763X |2 DE-101 | |
020 | |a 9783642173417 |9 978-3-642-17341-7 | ||
020 | |a 3642173411 |9 3-642-17341-1 | ||
035 | |a (OCoLC)772635605 | ||
035 | |a (DE-599)DNB100777763X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-11 |a DE-634 |a DE-739 |a DE-Aug4 |a DE-898 |a DE-91 | ||
082 | 0 | |a 005.82 |2 22//ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Knudsen, Lars R. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The block cipher companion |c Lars R. Knudsen ; Matthew J. B. Robshaw |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 267 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
650 | 0 | 7 | |a Differentielle Kryptoanalyse |0 (DE-588)4367918-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Encryption Standard |0 (DE-588)4340509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Lineare Kryptoanalyse |0 (DE-588)4581647-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | 1 | |a Data Encryption Standard |0 (DE-588)4340509-5 |D s |
689 | 0 | 2 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |D s |
689 | 0 | 3 | |a Differentielle Kryptoanalyse |0 (DE-588)4367918-3 |D s |
689 | 0 | 4 | |a Lineare Kryptoanalyse |0 (DE-588)4581647-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Robshaw, Matthew |e Verfasser |0 (DE-588)132111136 |4 aut | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024599610 |
Datensatz im Suchindex
_version_ | 1805145708028755968 |
---|---|
adam_text |
IMAGE 1
CONTENTS
INTRODUCTION 1
1. 1 CRYPTOGRAPHIC ALGORITHMS 3
1.2 BLOCK CIPHERS 4
1.3 CRYPTOGRAPHER AND CRYPTANALYST 5
1.4 SECURITY 10
1.5 SUMMARY 11
DES 13
2.1 DES DESCRIPTION 14
2.1.1 THE ROUND FUNCTION 17
2.2 DESIGN FEATURES 23
2.3 STRUCTURAL PROPERTIES 27
2.3.1 THE COMPLEMENTATION PROPERTY 27
2.3.2 WEAK AND SEMI-WEAK KEYS 28
2.4 DES VARIANTS 29
2.4.1 TRIPLE-DES 30
2.4.2 DESX 32
2.5 DES IN CONTEXT 33
2.6 GETTING TO THE SOURCE 34
AES 35
3.1 AES DESCRIPTION 36
3.1.1 ARITHMETIC IN GF(2") 37
3.1.2 ENCRYPTION WITH THE AES 38
3.1.3 DECRYPTION WITH THE AES . 42
3.1.4 AES KEY SCHEDULE 45
3.1.5 AES DESIGN FEATURES 50
3.2 AES STATE OF THE ART 54
3.2.1 DIFFERENTIAL AND LINEAR CRYPTANALYSIS 54
3.2.2 STRUCTURAL ATTACKS 54
3.2.3 ALGEBRAIC ANALYSIS 59
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/100777763X
DIGITALISIERT DURCH
IMAGE 2
X CONTENTS
3.2.4 RELATED-KEY CRYPTANALYSIS 62
3.2.5 SIDE-CHANNEL CRYPTANALYSIS 63
3.3 AES IN CONTEXT 63
3.4 GETTING TO THE SOURCE 64
4 USING BLOCK CIPHERS 65
4.1 BLOCK ENCRYPTION 66
4.1.1 ELECTRONIC CODE BOOK MODE 66
4.1.2 CIPHER BLOCK CHAINING MODE 67
4.2 STREAM ENCRYPTION 69
4.2.1 CIPHER FEEDBACK MODE 69
4.2.2 OUTPUT FEEDBACK MODE 70
4.2.3 COUNTER MODE 73
4.3 STARTING AND FINISHING 74
4.3.1 CHOOSING THE IV 74
4.3.2 PADDING 75
4.3.3 CIPHERTEXT STEALING 76
4.4 AUTHENTICATION 77
4.4.1 CBC-MAC 78
4.4.2 OMAC 80
4.5 AUTHENTICATED ENCRYPTION 82
4.5.1 CCMMODE 83
4.5.2 EAX MODE 84
4.6 HASHING 86
4.6.1 THREE IMPORTANT CONSTRUCTIONS 86
4.6.2 DOUBLE BLOCK LENGTH CONSTRUCTIONS 90
4.6.3 THE SHA-3 COMPETITION 92
4.7 GETTING TO THE SOURCE 93
5 BRUTE FORCE ATTACKS 95
5.1 TIME-MEMORY TRADE-OFFS 96
5.1.1 HELLMAN'S TIME-MEMORY TRADE-OFF 96
5.1.2 MORE ADVANCED CONSIDERATIONS 100
5.2 MEET-IN-THE-MIDDLE ATTACKS 103
5.2.1 DOUBLE ENCRYPTION 103
5.2.2 TRIPLE ENCRYPTION 105
5.3 GETTING TO THE SOURCE 108
6 DIFFERENTIAL CRYPTANALYSIS: THE IDEA 109
6.1 GETTING STARTED 110
6.1.1 WORKING WITH LESS CERTAINTY 113
6.2 INTRODUCING CHARACTERISTICS 116
6.2.1 JOINING CHARACTERISTICS 117
6.2.2 INTRODUCING DIFFERENTIALS 122
6.3 FILTERING 124
IMAGE 3
CONTENTS
6.3.1 RECOVERING KEY INFORMATION 125
6.4 GETTING TO THE SOURCE 126
LINEAR CRYPTANALYSIS: THE IDEA 127
7.1 GETTING STARTED 128
7.2 JOINING APPROXIMATIONS 131
7.2.1 DEDUCING MORE KEY 135
7.3 PUTTING THINGS TOGETHER 137
7.3.1 INTRODUCING LINEAR HULLS 141
7.3.2 A UNIFIED MEASURE 143
7.4 GETTING TO THE SOURCE 144
ADVANCED TOPICS 145
8.1 DIFFERENTIAL CRYPTANALYSIS REVISITED 145
8.1.1 JOINING COMPONENTS 146
8.1.2 KEY EQUIVALENCE 148
8.1.3 KEY RECOVERY AND DATA COMPLEXITY 148
8.1.4 ENHANCEMENTS TO THE BASIC DIFFERENTIAL ATTACK 154 8.2 LINEAR
CRYPTANALYSIS REVISITED 165
8.2.1 JOINING COMPONENTS 166
8.2.2 KEY EQUIVALENCE 168
8.2.3 KEY RECOVERY AND DATA COMPLEXITY 169
8.2.4 ENHANCEMENTS TO THE BASIC LINEAR ATTACK 172
8.3 DIFFERENTIAL-LINEAR CRYPTANALYSIS 174
8.4 THE INTERPOLATION ATTACK 177
8.5 THE KEY SCHEDULE 178
8.6 THE IMPACT OF ANALYSIS ON DESIGN 180
8.6.1 BLOCK CIPHER TOPOLOGY 181
8.6.2 RESISTANCE TO DIFFERENTIAL AND LINEAR CRYPTANALYSIS 184 8.6.3
S-BOX PROPERTIES 187
8.7 GETTING TO THE SOURCE 192
A SHORT SURVEY AND SIX PROMINENT CIPHERS 193
9.1 FROM DES TO THE AES 193
9.2 THE AES PROCESS AND FINALISTS 196
9.3 AFTER THE AES 197
9.3.1 OTHER COMPETITIONS AND STANDARDISATION EFFORTS 197 9.3.2 NICHE
PROPOSALS 199
9.3.3 LIGHTWEIGHT BLOCK CIPHERS 199
9.4 SIX PROMINENT BLOCK CIPHERS 201
9.4.1 FEAL 202
9.4.2 IDEA 205
9.4.3 KASUMI 207
9.4.4 RC5 212
9.4.5 SKIPJACK 214
IMAGE 4
XIV CONTENTS
9.4.6 PRESENT 217
9.5 GETTING TO THE SOURCE 219
INDEX 221
REFERENCES 225 |
any_adam_object | 1 |
author | Knudsen, Lars R. Robshaw, Matthew |
author_GND | (DE-588)132111136 |
author_facet | Knudsen, Lars R. Robshaw, Matthew |
author_role | aut aut |
author_sort | Knudsen, Lars R. |
author_variant | l r k lr lrk m r mr |
building | Verbundindex |
bvnumber | BV039752182 |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)772635605 (DE-599)DNB100777763X |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV039752182</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160405</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111209s2011 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">100777763X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642173417</subfield><subfield code="9">978-3-642-17341-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642173411</subfield><subfield code="9">3-642-17341-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772635605</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB100777763X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knudsen, Lars R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The block cipher companion</subfield><subfield code="c">Lars R. Knudsen ; Matthew J. B. Robshaw</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 267 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Lineare Kryptoanalyse</subfield><subfield code="0">(DE-588)4581647-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Lineare Kryptoanalyse</subfield><subfield code="0">(DE-588)4581647-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robshaw, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132111136</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024599610</subfield></datafield></record></collection> |
id | DE-604.BV039752182 |
illustrated | Illustrated |
indexdate | 2024-07-21T00:18:18Z |
institution | BVB |
isbn | 9783642173417 3642173411 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024599610 |
oclc_num | 772635605 |
open_access_boolean | |
owner | DE-11 DE-634 DE-739 DE-Aug4 DE-898 DE-BY-UBR DE-91 DE-BY-TUM |
owner_facet | DE-11 DE-634 DE-739 DE-Aug4 DE-898 DE-BY-UBR DE-91 DE-BY-TUM |
physical | XIV, 267 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Knudsen, Lars R. Verfasser aut The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw Berlin [u.a.] Springer 2011 XIV, 267 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Information security and cryptography Differentielle Kryptoanalyse (DE-588)4367918-3 gnd rswk-swf Advanced Encryption Standard (DE-588)4680201-0 gnd rswk-swf Data Encryption Standard (DE-588)4340509-5 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Lineare Kryptoanalyse (DE-588)4581647-5 gnd rswk-swf Blockchiffre (DE-588)4323693-5 s Data Encryption Standard (DE-588)4340509-5 s Advanced Encryption Standard (DE-588)4680201-0 s Differentielle Kryptoanalyse (DE-588)4367918-3 s Lineare Kryptoanalyse (DE-588)4581647-5 s DE-604 Robshaw, Matthew Verfasser (DE-588)132111136 aut X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Knudsen, Lars R. Robshaw, Matthew The block cipher companion Differentielle Kryptoanalyse (DE-588)4367918-3 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd Data Encryption Standard (DE-588)4340509-5 gnd Blockchiffre (DE-588)4323693-5 gnd Lineare Kryptoanalyse (DE-588)4581647-5 gnd |
subject_GND | (DE-588)4367918-3 (DE-588)4680201-0 (DE-588)4340509-5 (DE-588)4323693-5 (DE-588)4581647-5 |
title | The block cipher companion |
title_auth | The block cipher companion |
title_exact_search | The block cipher companion |
title_full | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_fullStr | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_full_unstemmed | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_short | The block cipher companion |
title_sort | the block cipher companion |
topic | Differentielle Kryptoanalyse (DE-588)4367918-3 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd Data Encryption Standard (DE-588)4340509-5 gnd Blockchiffre (DE-588)4323693-5 gnd Lineare Kryptoanalyse (DE-588)4581647-5 gnd |
topic_facet | Differentielle Kryptoanalyse Advanced Encryption Standard Data Encryption Standard Blockchiffre Lineare Kryptoanalyse |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT knudsenlarsr theblockciphercompanion AT robshawmatthew theblockciphercompanion |