Read more
Informationen zum Autor Christopher Swenson is a PhD candidate and a Department of Defense employee working in vulnerability analysis. He has received a coveted national scholarship award from the Information Assurance Scholarship Program and belongs to the International Association for Cryptologic Research (IACR) as well as the American Mathematical Society (AMS). Klappentext Fighting new threats with an old weapon As an instructor at the University of Tulsa! Christopher Swenson could find no relevant text for teaching modern cryptanalysis. So he wrote his own. You are holding the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis! examines ciphers based on number theory! explores block ciphers! and teaches the basis of all modern cryptanalysis -- linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security.* Refresh your knowledge of probability theory! number theory! and algebra as required for advanced cryptanalysis* Explore number theoretic and algebraic cipher techniques* Learn about concepts used in building modern block ciphers! including Feistel structures! substitution-permutation networks! and shift registers* See how various brute force techniques! complexity theory! and rainbow tables are applied* Become acquainted with linear and multilinear cryptanalysis and their derivatives* Examine differential cryptanalysis and its descendents Zusammenfassung Fighting new threats with an old weapon As an instructor at the University of Tulsa! Christopher Swenson could find no relevant text for teaching modern cryptanalysis. So he wrote his own. You are holding the first book that brings the study of cryptanalysis into the 21st century. Inhaltsverzeichnis Acknowledgments. Introduction. Chapter 1: Simple Ciphers. Chapter 2: Number Theoretical Ciphers. Chapter 3: Factoring and Discrete Algorithms. Chapter 4: Block Ciphers. Chapter 5: General Cryptanalytic Methods. Chapter 6: Linear Cryptanalysis. Chapter 7: Differential Cryptanalysis. Index. ...