Innovative cryptography / (Record no. 1559)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080320s2007 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006009839
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781584504672
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u244
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 22
245 10 - TITLE STATEMENT
Title Innovative cryptography /
Statement of responsibility, etc. Nick Moldovyan, Alex Moldovyan.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Charles River Media,
Date of publication, distribution, etc. c2007.
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 386 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Charles River Media programming series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 371-376) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Chapter 1: Cryptography in the Information Age -- 1.1 Information Protection Problems in Computer Systems -- 1.2 Problems in Cryptography -- 1.3 The Fundamentals of the One-Key Cryptography -- 1.4 Two-Key Cryptosystems -- 1.5 Probabilistic Ciphers -- 1.6 Using Encryption in Practice -- Chapter 2: Flexible Software Ciphers -- 2.1 The Principles of Designing Software Ciphers -- 2.2 Initializing Software Ciphers -- 2.3 Non-Deterministic Software Ciphers -- 2.4 The Combinational-Probabilistic Model -- Chapter 3: Controlled Permutation -- 3.1 The Concept of a Controlled Permutation -- 3.2 The Design of Operational Controlled Permutation Boxes with a Specified Speed and Hardware Complexity -- 3.3 Designing Controlled Permutation Boxes with Specified Algebraic and Probability-Statistical Properties -- 3.4 Linear Crytanalysis of Controlled Permutations -- 3.5 Generating Control Vectors -- 3.6 Summary -- Chapter 4: Controlled Operational Substitutions -- 4.1 The Main Features of Controlled Operational Substitutions -- 4.2 Mathematical Properties of Cryptographic Transformations -- 4.3 Models of Controlled Operational Substitutions -- 4.4 The Influence of Controlled Operational Substitutions on the Security of Block Ciphers against Cryptanalysis -- 4.5 The Practical Use of Controlled Operational Substitutions -- 4.6 Summary -- Chapter 5: Designing Fast Ciphers Based on Controlled Operations -- 5.1 Basic Cryptoschemes and Key System -- 5.2 The SPECTR-H64 Block Cipher -- 5.3 The SPECTR-128 Cipher (Algorithm); 5.4 The CIKS-128 Cipher (Algorithm); 5.5 Prospective Program Ciphers Based on Controlled Permutations -- Chapter 6: Elements of the Cryptanalysis of Ciphers Based on Controlled Operations -- 6.1 Estimating Flexible Ciphers -- 6.2 Differential Characteristics of Controlled Permutation Boxes -- 6.3 Analysis of the SPECTR-H64 Cryptosystem -- 6.4 Differential Cryptanalysis of the SPECTR-128 Cipher -- 6.5 Main Differential Characteristics of the DDP-S64 and DDP-S128 Ciphers -- 6.6 Estimating the Security of the COBRA-F64a and COBRA-F64b Ciphers -- 6.7 Attacks Based on Hardware Errors -- Conclusion -- Glossary -- References -- Index
520 ## - SUMMARY, ETC.
Summary, etc. nnovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations. In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type. Innovative Cryptography, Second Edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
9 (RLIN) 4509
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Telecommunication
General subdivision Security measures.
9 (RLIN) 4510
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 378
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Moldovyan, Alex.
9 (RLIN) 4511
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.82 / MO.I 2007 000416 11/24/2019 1 11/24/2019 Books