Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptanalysis: Breaking Ciphers in the Real World

Buy
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

A case-based approach to cryptanalysis that explains how and why attacks can happen

Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.

The text is organized around four major themes:

  • Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.

  • Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).

  • Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.

  • Public Key Crypto includes an overview of several public key cryptosystems including the knapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.

Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.

About the Author

Mark Stamp, PhD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice.

Richard M. Low, PhD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.

(HTML tags aren't allowed.)

Introduction to Java and Software Design: Swing Update
Introduction to Java and Software Design: Swing Update
Introduction to Java and Software Design represents a significant transition in the development of the Dale series, with much that is new. This book has been developed from the ground up to be a Java text. It is not a Java translation of our previous texts. However, we have retained our familiar easy-to-read style and clear approach to introducing...
The Linux Programmer's Toolbox (Prentice Hall Open Source Software Development Series)
The Linux Programmer's Toolbox (Prentice Hall Open Source Software Development Series)
Master the Linux Tools That Will Make You a More Productive Programmer

Linux comes with an extraordinary collection of power tools for C and C++ developers. The Linux Programmer's Toolbox helps you leverage all that power and productivity--without mastering endless syntax options, tracking down hard-to-find...

Information Processing with Evolutionary Algorithms: From Industrial Applications to Academic Speculations
Information Processing with Evolutionary Algorithms: From Industrial Applications to Academic Speculations
The last decade of the twentieth century has witnessed a surge of interest in numerical, computational intensive approaches to information processing. The lines that draw the boundaries between statistics, optimization, artificial intelligence and information processing are disappearing and it is not uncommon to find well founded and sophisticated...

Operating Systems: Design and Implementation (Second Edition)
Operating Systems: Design and Implementation (Second Edition)

Most books on operating systems deal with theory while ignoring practice. While the usual principles are covered in detail, the book describes a small, but real UNIX-like operating system: MINIX. The book demonstrates how it works while illustrating the principles behind it. Operating Systems: Design and Implementation Second...

The Data Compression Book
The Data Compression Book
If you want to learn how programs like PKZIP and LHarc work, this book is for you. The compression techniques used in these programs are described in detail, accompanied by working code. After reading this book, even the novice C programmer will be able to write a complete compression/archiving program that can be ported to virtually any operating...
Release It!: Design and Deploy Production-Ready Software
Release It!: Design and Deploy Production-Ready Software

You’ve worked hard on the project for more than year. Finally, it looks like all the features are actually complete, and most even have unit tests. You can breathe a sigh of relief. You’re done.

Or are you?

Does “feature complete” mean “production ready”? Is your system
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy