Innovative cryptography / Nick Moldovyan, Alex Moldovyan.
Material type:
TextSeries: Charles River Media programming seriesPublication details: Boston : Charles River Media, c2007.Edition: 2nd edDescription: xiii, 386 p. : ill. ; 24 cmISBN: - 9781584504672
- 005.82 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.82 / MO.I 2007 (Browse shelf(Opens below)) | 1 | Available | 000416 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / WO.S 2012 Security metrics : | 005.8 / WY.A 2007 The art of software security testing : | 005.8 / XI.W 2007 Wireless network security / | 005.82 / MO.I 2007 Innovative cryptography / | 005.82 RH.I / 2003 Internet security : | 005.82 RH.I / 2003 Internet security : | 005.82 / WO.C 2007 Cryptology unlocked / |
Includes bibliographical references (p. 371-376) and index.
Introduction -- Chapter 1: Cryptography in the Information Age -- 1.1 Information Protection Problems in Computer Systems -- 1.2 Problems in Cryptography -- 1.3 The Fundamentals of the One-Key Cryptography -- 1.4 Two-Key Cryptosystems -- 1.5 Probabilistic Ciphers -- 1.6 Using Encryption in Practice -- Chapter 2: Flexible Software Ciphers -- 2.1 The Principles of Designing Software Ciphers -- 2.2 Initializing Software Ciphers -- 2.3 Non-Deterministic Software Ciphers -- 2.4 The Combinational-Probabilistic Model -- Chapter 3: Controlled Permutation -- 3.1 The Concept of a Controlled Permutation -- 3.2 The Design of Operational Controlled Permutation Boxes with a Specified Speed and Hardware Complexity -- 3.3 Designing Controlled Permutation Boxes with Specified Algebraic and Probability-Statistical Properties -- 3.4 Linear Crytanalysis of Controlled Permutations -- 3.5 Generating Control Vectors -- 3.6 Summary -- Chapter 4: Controlled Operational Substitutions -- 4.1 The Main Features of Controlled Operational Substitutions -- 4.2 Mathematical Properties of Cryptographic Transformations -- 4.3 Models of Controlled Operational Substitutions -- 4.4 The Influence of Controlled Operational Substitutions on the Security of Block Ciphers against Cryptanalysis -- 4.5 The Practical Use of Controlled Operational Substitutions -- 4.6 Summary -- Chapter 5: Designing Fast Ciphers Based on Controlled Operations -- 5.1 Basic Cryptoschemes and Key System -- 5.2 The SPECTR-H64 Block Cipher -- 5.3 The SPECTR-128 Cipher (Algorithm); 5.4 The CIKS-128 Cipher (Algorithm); 5.5 Prospective Program Ciphers Based on Controlled Permutations -- Chapter 6: Elements of the Cryptanalysis of Ciphers Based on Controlled Operations -- 6.1 Estimating Flexible Ciphers -- 6.2 Differential Characteristics of Controlled Permutation Boxes -- 6.3 Analysis of the SPECTR-H64 Cryptosystem -- 6.4 Differential Cryptanalysis of the SPECTR-128 Cipher -- 6.5 Main Differential Characteristics of the DDP-S64 and DDP-S128 Ciphers -- 6.6 Estimating the Security of the COBRA-F64a and COBRA-F64b Ciphers -- 6.7 Attacks Based on Hardware Errors -- Conclusion -- Glossary -- References -- Index
nnovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations. In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type. Innovative Cryptography, Second Edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals
1
There are no comments on this title.