
Více o knize
This work covers a wide range of topics in cryptography, including hash function cryptanalysis and design, with a focus on producing collisions for Panama and analyzing FORK-256. It delves into stream cipher cryptanalysis, examining attacks on ciphers like VEST and Achterbahn-128/80, and discusses differential-linear attacks against Phelix. The text also explores methods to enrich message spaces in ciphers and analyzes the security of constructions that combine FIL random oracles. It highlights both effective and ineffective post-processing techniques for biased physical random numbers and presents fast talks on block cipher cryptanalysis and design. The 128-bit block cipher CLEFIA is introduced, along with new lightweight DES variants and various block cipher attacks, including a novel attack on 6-round IDEA and related-key rectangle attacks on reduced AES-192 and AES-256. Further discussions include the security of IV-dependent stream ciphers, general attacks on Pomaranch-like keystream generators, and a thorough analysis of QUAD. The work also addresses hash function cryptanalysis, particularly message freedom in MD4 and MD5 collisions, and presents algebraic cryptanalysis of 58-round SHA-1. Additionally, it covers side channel attacks, time-driven cache attack models, and improvements in MAC security through randomized message preprocessing, concluding with new bounds for PMAC, TMAC, and XCBC, and the concept of perfect bl
Nákup knihy
Fast software encryption, Alex Biryukov
- Jazyk
- Rok vydání
- 2007
Doručení
Platební metody
Nikdo zatím neohodnotil.