Algebraic Cryptanalysis
Autor Gregory Barden Limba Engleză Paperback – 6 sep 2014
Topics include:
Analytic Combinatorics, and its application to cryptanalysis
The equicomplexity of linear algebra operations
Graph coloring
Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA
Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics or practitioners working for security and communications companies.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1532.19 lei 6-8 săpt. | |
Springer Us – 6 sep 2014 | 1532.19 lei 6-8 săpt. | |
Hardback (1) | 1538.11 lei 6-8 săpt. | |
Springer Us – 24 aug 2009 | 1538.11 lei 6-8 săpt. |
Preț: 1532.19 lei
Preț vechi: 1915.24 lei
-20% Nou
Puncte Express: 2298
Preț estimativ în valută:
293.28€ • 315.34$ • 244.50£
293.28€ • 315.34$ • 244.50£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781489984500
ISBN-10: 148998450X
Pagini: 392
Ilustrații: XXXIII, 356 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2009
Editura: Springer Us
Colecția Springer
Locul publicării:New York, NY, United States
ISBN-10: 148998450X
Pagini: 392
Ilustrații: XXXIII, 356 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2009
Editura: Springer Us
Colecția Springer
Locul publicării:New York, NY, United States
Public țintă
Professional/practitionerCuprins
Introduction: How to Use this Book.- Cryptanalysis.- The Block Cipher Keeloq and Algebraic Attacks.- The Fixed-Point Attack.- Iterated Permutations.- Stream Ciphers.- Linear Systems Mod 2.- Some Basic Facts about Linear Algebra over (2).- The Complexity of (2)-Matrix Operations.- On the Exponent of Certain Matrix Operations.- The Method of Four Russians.- The Quadratic Sieve.- Polynomial Systems and Satisfiability.- Strategies for Polynomial Systems.- Algorithms for Solving Polynomial Systems.- Converting MQ to CNF-SAT.- How do SAT-Solvers Operate?.- Applying SAT-Solvers to Extension Fields of Low Degree.
Recenzii
From the reviews:
“Algebraic cryptanalysis is a well-titled book. The theme is the reduction of attacks on ciphers (cryptosystems) to systems of polynomial equations over finite fields and subsequent heuristics for efficiently solving these systems. The book is written from the standpoint of real-world computational algebra, and contains numerous gems concerning details on how various algorithms and the heuristics using them really work. The book has an overall tripartite structure.” (Bruce Litow, ACM Computing Reviews, April, 2010)
“The book contains of 3 parts, each having 5 chapters, and 5 Appendices which describe code-breaking by solving equation systems. The author explains the mathematical background of the breaking method and exemplifies it on various ciphers. … The entire work is well structured having a good mathematical background. … recommended to graduate students who want to do their dissertation in any part of cryptanalysis. It is also useful to researchers in Applied Abstract Algebra, cryptography or any other area of these domains.” (Nicolae Constantinescu, Zentralblatt MATH, Vol. 1183, 2010)
“This book gives an overview of algebraic cryptanalysis. … the book seems to be the only broad treatise on the subject available. … it can show a graduate student where to look further … .” (Safuat Hamdy, Mathematical Reviews, Issue 2012 k)
“Algebraic cryptanalysis is a well-titled book. The theme is the reduction of attacks on ciphers (cryptosystems) to systems of polynomial equations over finite fields and subsequent heuristics for efficiently solving these systems. The book is written from the standpoint of real-world computational algebra, and contains numerous gems concerning details on how various algorithms and the heuristics using them really work. The book has an overall tripartite structure.” (Bruce Litow, ACM Computing Reviews, April, 2010)
“The book contains of 3 parts, each having 5 chapters, and 5 Appendices which describe code-breaking by solving equation systems. The author explains the mathematical background of the breaking method and exemplifies it on various ciphers. … The entire work is well structured having a good mathematical background. … recommended to graduate students who want to do their dissertation in any part of cryptanalysis. It is also useful to researchers in Applied Abstract Algebra, cryptography or any other area of these domains.” (Nicolae Constantinescu, Zentralblatt MATH, Vol. 1183, 2010)
“This book gives an overview of algebraic cryptanalysis. … the book seems to be the only broad treatise on the subject available. … it can show a graduate student where to look further … .” (Safuat Hamdy, Mathematical Reviews, Issue 2012 k)
Textul de pe ultima copertă
Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois.
The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks.
Additional topics include:
Analytic Combinatorics, and its application to cryptanalysis
The equicomplexity of linear algebra operations
Graph coloring
Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA
Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies.
The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks.
Additional topics include:
Analytic Combinatorics, and its application to cryptanalysis
The equicomplexity of linear algebra operations
Graph coloring
Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA
Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies.
Caracteristici
One of first books to cover SAT-solvers, and how it can be used in cryptanalysis; plus chapters on finite field linear algebra and the cipher Keeloq Excellent guide for advanced-level students, researchers and practitioners entering the algebraic cryptanalysis field Bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature, among academics and industry practitioners Includes supplementary material: sn.pub/extras