The Block Cipher Companion [recurso electrónico] / by Lars R. Knudsen, Matthew J.B. Robshaw.
Tipo de material: TextoSeries Information Security and CryptographyEditor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIV, 270 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642173424Tema(s): Computer science | Data structures (Computer science) | Computer Science | Data Structures, Cryptology and Information Theory | Mathematics of ComputingFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.74 Clasificación LoC:QA76.9.D35Recursos en línea: Libro electrónicoTipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .D35 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 375480-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .D35 Towards Hardware-Intrinsic Security | QA76.9 .D35 Critical Infrastructure Protection IV | QA76.9 .D35 Policies and Research in Identity Management | QA76.9 .D35 The Block Cipher Companion | QA76.9 .D35 Spatial Information Theory | QA76.9 .D37 B68 2009 EB Pentaho solutions | QA76.9 .D37 D38 2008 EB The data warehouse lifecycle toolkit |
Introduction -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Using Block Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics -- A Short Survey and Five Prominent Ciphers -- Bibliography.
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
19