Differential Cryptanalysis of the Data Encryption Standard
Autor Eli Biham, Adi Shamiren Limba Engleză Paperback – 9 noi 2011
Preț: 692.24 lei
Preț vechi: 814.40 lei
-15% Nou
Puncte Express: 1038
Preț estimativ în valută:
132.46€ • 138.67$ • 109.60£
132.46€ • 138.67$ • 109.60£
Carte tipărită la comandă
Livrare economică 05-19 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461393160
ISBN-10: 1461393167
Pagini: 204
Ilustrații: IX, 188 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.29 kg
Ediția:Softcover reprint of the original 1st ed. 1993
Editura: Springer
Colecția Springer
Locul publicării:New York, NY, United States
ISBN-10: 1461393167
Pagini: 204
Ilustrații: IX, 188 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.29 kg
Ediția:Softcover reprint of the original 1st ed. 1993
Editura: Springer
Colecția Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1 Introduction.- 2 Results.- 3 Introduction to Differential Cryptanalysis.- 3.1 Notations and Definitions.- 3.2 Overview.- 3.3 Characteristics.- 3.4 The Signal to Noise Ratio.- 3.5 Known Plaintext Attacks.- 3.6 Structures.- 4 Differential Cryptanalysis of DES Variants.- 4.1 DES Reduced to Four Rounds.- 4.2 DES Reduced to Six Rounds.- 4.3 DES Reduced to Eight Rounds.- 4.4 DES with an Arbitrary Number of Rounds.- 4.5 Modified Variants of DES.- 4.6 DES with Independent Keys.- 4.7 The Generalized DES Scheme (GDES).- 5 Differential Cryptanalysis of the Full 16-Round DES.- 5.1 Variants of the Attack.- 6 Differential Cryptanalysis of FEAL.- 6.1 Cryptanalysis of FEAL-8.- 6.2 Cryptanalysis of FEAL-N and FEAL-NX with N ? 31 Rounds.- 6.3 Other Properties of FEAL.- 7 Differential Cryptanalysis of Other Cryptosystems.- 7.1 Cryptanalysis of Khafre.- 7.2 Cryptanalysis of REDOC-II.- 7.3 Cryptanalysis of LOKI.- 7.4 Cryptanalysis of Lucifer.- 8 Differential Cryptanalysis of Hash Functions.- 8.1 Cryptanalysis of Snefru.- 8.2 Cryptanalysis of N-Hash.- 9 Non-Differential Cryptanalysis of DES with a Small Number of Rounds.- 9.1 Ciphertext Only Attacks.- 9.2 Known Plaintext Attacks.- 9.3 Statistical Known Plaintext Attacks.- A Description of DES.- A.1 The Key Scheduling Algorithm.- A.2 DES Modes of Operation.- B The Difference Distribution Tables of DES.