RC4 Stream Cipher and Its Variants
Autor Goutam Paul, Subhamoy Maitraen Limba Engleză Paperback – 19 sep 2019
After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4.
With open research problems in each chapter, this book offers a complete account of the most current research on RC4.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 368.14 lei 6-8 săpt. | |
CRC Press – 19 sep 2019 | 368.14 lei 6-8 săpt. | |
Hardback (1) | 983.65 lei 6-8 săpt. | |
CRC Press – 16 noi 2011 | 983.65 lei 6-8 săpt. |
Preț: 368.14 lei
Preț vechi: 477.19 lei
-23% Nou
Puncte Express: 552
Preț estimativ în valută:
70.45€ • 74.28$ • 58.65£
70.45€ • 74.28$ • 58.65£
Carte tipărită la comandă
Livrare economică 11-25 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367382162
ISBN-10: 0367382164
Pagini: 311
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 0367382164
Pagini: 311
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Public țintă
Professional Practice & DevelopmentCuprins
Introduction to Cryptography. Stream Ciphers and RC4. Analysis of Key Scheduling. Key Recovery from State Information. Analysis of Keystream Generation. Distinguishing Attacks. WEP and WPA Attacks. Fault Attacks. Variants of RC4. Stream Cipher HC-128. Conclusion. Appendices. Bibliography. Index.
Notă biografică
Goutam Paul is an assistant professor in the Department of Computer Science and Engineering at Jadavpur University. Dr. Paul has published articles in numerous refereed journals, including Discrete Applied Mathematics, Journal of Mathematical Cryptology, and Designs, Codes and Cryptography. His research interests include cryptography, security, steganography, and combinatorial algorithms.
Subhamoy Maitra is a professor at the Indian Statistical Institute. Dr. Maitra has contributed extensively to many peer-reviewed journals, such as IEEE Transactions on Information Theory, Discrete Mathematics, and Designs, Codes and Cryptography. He is also on the editorial board of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences. His research interests include cryptographically significant Boolean functions, design and cryptanalysis of stream ciphers, analysis of RSA and factorization, and cryptanalysis of digital watermarking schemes.
Subhamoy Maitra is a professor at the Indian Statistical Institute. Dr. Maitra has contributed extensively to many peer-reviewed journals, such as IEEE Transactions on Information Theory, Discrete Mathematics, and Designs, Codes and Cryptography. He is also on the editorial board of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences. His research interests include cryptographically significant Boolean functions, design and cryptanalysis of stream ciphers, analysis of RSA and factorization, and cryptanalysis of digital watermarking schemes.
Descriere
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. The text introduces basic concepts, such as private/public key cryptosystems and block/stream ciphers, before covering advanced material. It includes open research problems in each chapter and offers a comprehensive bibliography of RC4 literature.