Applied Cryptanalysis:Breaking Ciphers in the Real World

Cover Image Copyright Year: 2007
Author(s): Mark Stamp; Richard M. Low
Book Type: Wiley-IEEE Press
Content Type : Books & eBooks
Topics: Communication, Networking & Broadcasting ;  Computing & Processing
  • Print

Abstract

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

  •   Click to expandTable of Contents

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    World War II Ciphers

    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Enigma

  • Purple

  • Sigaba

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Stream Ciphers

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Shift Registers

  • ORYX

  • RC4

  • PKZIP

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Block Ciphers

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Block Cipher Modes

  • Feistel Cipher

  • Hellman's Time-Memory Trade-off

  • CMEA

  • Akelarre

  • FEAL

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Hash Functions

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Birthdays and Hashing

  • MD4

  • MD5

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Public Key Systems

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Merkle-Hellman Knapsack

  • Diffie-Hellman Key Exchange

  • Arithmetica Key Exchange

  • RSA

  • Rabin Cipher

  • NTRU Cipher

  • ElGamal Signature Scheme

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Public Key Attacks

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Introduction

  • Factoring Algorithms

  • Discrete Log Algorithms

  • RSA Implementation Attacks

  • Summary

  • Problems

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Appendix

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Page(s): 361 - 374
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    MD5 Tables
    Math View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Annotated Bibliography

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Page(s): 375 - 392
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Index

    Applied Cryptanalysis:Breaking Ciphers in the Real World
    Page(s): 393 - 401
    Copyright Year: 2007

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»



  • On This Page

    Recently Published

    Learn More About