The block cipher companion:
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Information security and cryptography
|
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XIV, 267 S. graph. Darst. |
ISBN: | 9783642173417 3642173411 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039752182 | ||
003 | DE-604 | ||
005 | 20160405 | ||
007 | t| | ||
008 | 111209s2011 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 100777763X |2 DE-101 | |
020 | |a 9783642173417 |9 978-3-642-17341-7 | ||
020 | |a 3642173411 |9 3-642-17341-1 | ||
035 | |a (OCoLC)772635605 | ||
035 | |a (DE-599)DNB100777763X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-11 |a DE-634 |a DE-739 |a DE-Aug4 |a DE-898 |a DE-91 | ||
082 | 0 | |a 005.82 |2 22//ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Knudsen, Lars R. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The block cipher companion |c Lars R. Knudsen ; Matthew J. B. Robshaw |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 267 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
650 | 0 | 7 | |a Differentielle Kryptoanalyse |0 (DE-588)4367918-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Lineare Kryptoanalyse |0 (DE-588)4581647-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Encryption Standard |0 (DE-588)4340509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | 1 | |a Data Encryption Standard |0 (DE-588)4340509-5 |D s |
689 | 0 | 2 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |D s |
689 | 0 | 3 | |a Differentielle Kryptoanalyse |0 (DE-588)4367918-3 |D s |
689 | 0 | 4 | |a Lineare Kryptoanalyse |0 (DE-588)4581647-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Robshaw, Matthew |e Verfasser |0 (DE-588)132111136 |4 aut | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024599610 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0002 DAT 465f 2016 A 2156 |
---|---|
DE-BY-TUM_katkey | 2189556 |
DE-BY-TUM_location | 00 |
DE-BY-TUM_media_number | 040008020655 |
_version_ | 1821932861186375680 |
adam_text | IMAGE 1
CONTENTS
INTRODUCTION 1
1. 1 CRYPTOGRAPHIC ALGORITHMS 3
1.2 BLOCK CIPHERS 4
1.3 CRYPTOGRAPHER AND CRYPTANALYST 5
1.4 SECURITY 10
1.5 SUMMARY 11
DES 13
2.1 DES DESCRIPTION 14
2.1.1 THE ROUND FUNCTION 17
2.2 DESIGN FEATURES 23
2.3 STRUCTURAL PROPERTIES 27
2.3.1 THE COMPLEMENTATION PROPERTY 27
2.3.2 WEAK AND SEMI-WEAK KEYS 28
2.4 DES VARIANTS 29
2.4.1 TRIPLE-DES 30
2.4.2 DESX 32
2.5 DES IN CONTEXT 33
2.6 GETTING TO THE SOURCE 34
AES 35
3.1 AES DESCRIPTION 36
3.1.1 ARITHMETIC IN GF(2 ) 37
3.1.2 ENCRYPTION WITH THE AES 38
3.1.3 DECRYPTION WITH THE AES . 42
3.1.4 AES KEY SCHEDULE 45
3.1.5 AES DESIGN FEATURES 50
3.2 AES STATE OF THE ART 54
3.2.1 DIFFERENTIAL AND LINEAR CRYPTANALYSIS 54
3.2.2 STRUCTURAL ATTACKS 54
3.2.3 ALGEBRAIC ANALYSIS 59
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/100777763X
DIGITALISIERT DURCH
IMAGE 2
X CONTENTS
3.2.4 RELATED-KEY CRYPTANALYSIS 62
3.2.5 SIDE-CHANNEL CRYPTANALYSIS 63
3.3 AES IN CONTEXT 63
3.4 GETTING TO THE SOURCE 64
4 USING BLOCK CIPHERS 65
4.1 BLOCK ENCRYPTION 66
4.1.1 ELECTRONIC CODE BOOK MODE 66
4.1.2 CIPHER BLOCK CHAINING MODE 67
4.2 STREAM ENCRYPTION 69
4.2.1 CIPHER FEEDBACK MODE 69
4.2.2 OUTPUT FEEDBACK MODE 70
4.2.3 COUNTER MODE 73
4.3 STARTING AND FINISHING 74
4.3.1 CHOOSING THE IV 74
4.3.2 PADDING 75
4.3.3 CIPHERTEXT STEALING 76
4.4 AUTHENTICATION 77
4.4.1 CBC-MAC 78
4.4.2 OMAC 80
4.5 AUTHENTICATED ENCRYPTION 82
4.5.1 CCMMODE 83
4.5.2 EAX MODE 84
4.6 HASHING 86
4.6.1 THREE IMPORTANT CONSTRUCTIONS 86
4.6.2 DOUBLE BLOCK LENGTH CONSTRUCTIONS 90
4.6.3 THE SHA-3 COMPETITION 92
4.7 GETTING TO THE SOURCE 93
5 BRUTE FORCE ATTACKS 95
5.1 TIME-MEMORY TRADE-OFFS 96
5.1.1 HELLMAN S TIME-MEMORY TRADE-OFF 96
5.1.2 MORE ADVANCED CONSIDERATIONS 100
5.2 MEET-IN-THE-MIDDLE ATTACKS 103
5.2.1 DOUBLE ENCRYPTION 103
5.2.2 TRIPLE ENCRYPTION 105
5.3 GETTING TO THE SOURCE 108
6 DIFFERENTIAL CRYPTANALYSIS: THE IDEA 109
6.1 GETTING STARTED 110
6.1.1 WORKING WITH LESS CERTAINTY 113
6.2 INTRODUCING CHARACTERISTICS 116
6.2.1 JOINING CHARACTERISTICS 117
6.2.2 INTRODUCING DIFFERENTIALS 122
6.3 FILTERING 124
IMAGE 3
CONTENTS
6.3.1 RECOVERING KEY INFORMATION 125
6.4 GETTING TO THE SOURCE 126
LINEAR CRYPTANALYSIS: THE IDEA 127
7.1 GETTING STARTED 128
7.2 JOINING APPROXIMATIONS 131
7.2.1 DEDUCING MORE KEY 135
7.3 PUTTING THINGS TOGETHER 137
7.3.1 INTRODUCING LINEAR HULLS 141
7.3.2 A UNIFIED MEASURE 143
7.4 GETTING TO THE SOURCE 144
ADVANCED TOPICS 145
8.1 DIFFERENTIAL CRYPTANALYSIS REVISITED 145
8.1.1 JOINING COMPONENTS 146
8.1.2 KEY EQUIVALENCE 148
8.1.3 KEY RECOVERY AND DATA COMPLEXITY 148
8.1.4 ENHANCEMENTS TO THE BASIC DIFFERENTIAL ATTACK 154 8.2 LINEAR
CRYPTANALYSIS REVISITED 165
8.2.1 JOINING COMPONENTS 166
8.2.2 KEY EQUIVALENCE 168
8.2.3 KEY RECOVERY AND DATA COMPLEXITY 169
8.2.4 ENHANCEMENTS TO THE BASIC LINEAR ATTACK 172
8.3 DIFFERENTIAL-LINEAR CRYPTANALYSIS 174
8.4 THE INTERPOLATION ATTACK 177
8.5 THE KEY SCHEDULE 178
8.6 THE IMPACT OF ANALYSIS ON DESIGN 180
8.6.1 BLOCK CIPHER TOPOLOGY 181
8.6.2 RESISTANCE TO DIFFERENTIAL AND LINEAR CRYPTANALYSIS 184 8.6.3
S-BOX PROPERTIES 187
8.7 GETTING TO THE SOURCE 192
A SHORT SURVEY AND SIX PROMINENT CIPHERS 193
9.1 FROM DES TO THE AES 193
9.2 THE AES PROCESS AND FINALISTS 196
9.3 AFTER THE AES 197
9.3.1 OTHER COMPETITIONS AND STANDARDISATION EFFORTS 197 9.3.2 NICHE
PROPOSALS 199
9.3.3 LIGHTWEIGHT BLOCK CIPHERS 199
9.4 SIX PROMINENT BLOCK CIPHERS 201
9.4.1 FEAL 202
9.4.2 IDEA 205
9.4.3 KASUMI 207
9.4.4 RC5 212
9.4.5 SKIPJACK 214
IMAGE 4
XIV CONTENTS
9.4.6 PRESENT 217
9.5 GETTING TO THE SOURCE 219
INDEX 221
REFERENCES 225
|
any_adam_object | 1 |
author | Knudsen, Lars R. Robshaw, Matthew |
author_GND | (DE-588)132111136 |
author_facet | Knudsen, Lars R. Robshaw, Matthew |
author_role | aut aut |
author_sort | Knudsen, Lars R. |
author_variant | l r k lr lrk m r mr |
building | Verbundindex |
bvnumber | BV039752182 |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)772635605 (DE-599)DNB100777763X |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02205nam a2200517 c 4500</leader><controlfield tag="001">BV039752182</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160405 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111209s2011 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">100777763X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642173417</subfield><subfield code="9">978-3-642-17341-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642173411</subfield><subfield code="9">3-642-17341-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772635605</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB100777763X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knudsen, Lars R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The block cipher companion</subfield><subfield code="c">Lars R. Knudsen ; Matthew J. B. Robshaw</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 267 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Lineare Kryptoanalyse</subfield><subfield code="0">(DE-588)4581647-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Lineare Kryptoanalyse</subfield><subfield code="0">(DE-588)4581647-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robshaw, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132111136</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024599610</subfield></datafield></record></collection> |
id | DE-604.BV039752182 |
illustrated | Illustrated |
indexdate | 2024-12-20T16:01:31Z |
institution | BVB |
isbn | 9783642173417 3642173411 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024599610 |
oclc_num | 772635605 |
open_access_boolean | |
owner | DE-11 DE-634 DE-739 DE-Aug4 DE-898 DE-BY-UBR DE-91 DE-BY-TUM |
owner_facet | DE-11 DE-634 DE-739 DE-Aug4 DE-898 DE-BY-UBR DE-91 DE-BY-TUM |
physical | XIV, 267 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spellingShingle | Knudsen, Lars R. Robshaw, Matthew The block cipher companion Differentielle Kryptoanalyse (DE-588)4367918-3 gnd Blockchiffre (DE-588)4323693-5 gnd Lineare Kryptoanalyse (DE-588)4581647-5 gnd Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
subject_GND | (DE-588)4367918-3 (DE-588)4323693-5 (DE-588)4581647-5 (DE-588)4340509-5 (DE-588)4680201-0 |
title | The block cipher companion |
title_auth | The block cipher companion |
title_exact_search | The block cipher companion |
title_full | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_fullStr | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_full_unstemmed | The block cipher companion Lars R. Knudsen ; Matthew J. B. Robshaw |
title_short | The block cipher companion |
title_sort | the block cipher companion |
topic | Differentielle Kryptoanalyse (DE-588)4367918-3 gnd Blockchiffre (DE-588)4323693-5 gnd Lineare Kryptoanalyse (DE-588)4581647-5 gnd Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
topic_facet | Differentielle Kryptoanalyse Blockchiffre Lineare Kryptoanalyse Data Encryption Standard Advanced Encryption Standard |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3552164&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024599610&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT knudsenlarsr theblockciphercompanion AT robshawmatthew theblockciphercompanion |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Stammgelände
Signatur: |
0002 DAT 465f 2016 A 2156
Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |