What is included with this book?
Richard M. Low, PhD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.
Acknowledgments | |
Classic Ciphers | |
Introduction | |
Good Guys and Bad Guys | |
Terminology | |
Selected Classic Crypto Topics | |
Transposition Ciphers | |
Substitution Ciphers | |
One-Time Pad | |
Codebook Ciphers | |
Summary | |
Problems | |
World War II Ciphers | |
Introduction | |
Enigma | |
Enigma Cipher Machine | |
Enigma Keyspace | |
Rotors | |
Enigma Attack | |
More Secure Enigma | |
Purple | |
Purple Cipher Machine | |
Purple Keyspace | |
Purple Diagnosis | |
Decrypting Purple | |
Purple versus Enigma | |
Sigaba | |
Sigaba Cipher Machine | |
Sigaba Keyspace | |
Sigaba Attack | |
Sigaba Conclusion | |
Summary | |
Problems | |
Stream Ciphers | |
Introduction | |
Shift Registers | |
Berlekamp-Massey Algorithm | |
Cryptographically Strong Sequences | |
Shift Register-Based Stream Ciphers | |
Correlation Attack | |
ORYX | |
ORYX Cipher | |
ORYX Attack | |
Secure ORYX | |
RC4 | |
RC4 Algorithm | |
RC4 Attack | |
Preventing the RC4 Attack | |
PKZIP | |
PKZIP Cipher | |
PKZIP Attack | |
Improved PKZIP | |
Summary | |
Problems | |
Block Ciphers | |
Introduction | |
Block Cipher Modes | |
Feistel Cipher | |
Hellman's Time-Memory Trade-Off | |
Cryptanalytic TMTO | |
Bad Chains | |
Success Probability | |
Distributed TMTO | |
TMTO Conclusions | |
CMEA | |
CMEA Cipher | |
SCMEA Cipher | |
SCMEA Chosen Plaintext Attack | |
CMEA Chosen Plaintext Attack | |
SCMEA Known Plaintext Attack | |
CMEA Known Plaintext Attack | |
More Secure CMEA | |
Akelarre | |
Akelarre Cipher | |
Akelarre Attack | |
Improved Akelarre? | |
FEAL | |
FEAL-4 Cipher | |
FEAL-4 Differential Attack | |
FEAL-4 Linear Attack | |
Confusion and Diffusion | |
Summary | |
Problems | |
Hash Functions | |
Introduction | |
Birthdays and Hashing | |
The Birthday Problem | |
Birthday Attacks on Hash Functions | |
Digital Signature Birthday Attack | |
Nostradamus Attack | |
MD4 | |
MD4 Algorithm | |
MD4 Attack | |
A Meaningful Collision | |
MD5 | |
MD5 Algorithm | |
A Precise Differential | |
Outline of Wang?s Attack | |
Wang's MD5 Differentials | |
Reverse Engineering Wang's Attack | |
Stevens' Attack | |
A Practical Attack | |
Summary | |
Problems | |
Public Key Systems | |
Introduction | |
Merkle-Hellman Knapsack | |
Lattice-Reduction Attack | |
Knapsack Conclusion | |
Diffie-Hellman Key Exchange | |
Man-in-the-Middle Attack | |
Diffie-Hellman Conclusion | |
Arithmetica Key Exchange | |
Hughes-Tannenbaum Length Attack | |
Arithmetica Conclusion | |
RSA | |
Mathematical Issues | |
RSA Conclusion | |
Rabin Cipher | |
Chosen Ciphertext Attack | |
Rabin Cryptosystem Conclusion | |
NTRU Cipher | |
Meet-in-the-Middle Attack | |
Multiple Transmission Attack | |
Chosen Ciphertext Attack | |
NTRU Conclusion | |
ElGamal Signature Scheme | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.