Cargando…

Algebraic Cryptanalysis

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three co...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bard, Gregory (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-88757-9
003 DE-He213
005 20220113000203.0
007 cr nn 008mamaa
008 100715s2009 xxu| s |||| 0|eng d
020 |a 9780387887579  |9 978-0-387-88757-9 
024 7 |a 10.1007/978-0-387-88757-9  |2 doi 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a GPF  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
082 0 4 |a 003.54  |2 23 
100 1 |a Bard, Gregory.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Algebraic Cryptanalysis  |h [electronic resource] /  |c by Gregory Bard. 
250 |a 1st ed. 2009. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2009. 
300 |a XXXIII, 356 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic Attacks -- The Fixed-Point Attack -- Iterated Permutations -- Stream Ciphers -- Linear Systems Mod 2 -- Some Basic Facts about Linear Algebra over (2) -- The Complexity of (2)-Matrix Operations -- On the Exponent of Certain Matrix Operations -- The Method of Four Russians -- The Quadratic Sieve -- Polynomial Systems and Satisfiability -- Strategies for Polynomial Systems -- Algorithms for Solving Polynomial Systems -- Converting MQ to CNF-SAT -- How do SAT-Solvers Operate? -- Applying SAT-Solvers to Extension Fields of Low Degree. 
520 |a Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks. Additional topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Algebraic fields. 
650 0 |a Polynomials. 
650 0 |a Algebras, Linear. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algebraic geometry. 
650 0 |a Data protection. 
650 1 4 |a Data Structures and Information Theory. 
650 2 4 |a Field Theory and Polynomials. 
650 2 4 |a Linear Algebra. 
650 2 4 |a Cryptology. 
650 2 4 |a Algebraic Geometry. 
650 2 4 |a Data and Information Security. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441910196 
776 0 8 |i Printed edition:  |z 9780387887562 
776 0 8 |i Printed edition:  |z 9781489984500 
776 0 8 |i Printed edition:  |z 9781493999132 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-0-387-88757-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)