did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470114865

Applied Cryptanalysis Breaking Ciphers in the Real World

by ;
  • ISBN13:

    9780470114865

  • ISBN10:

    047011486X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2007-04-25
  • Publisher: Wiley-IEEE Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $146.08 Save up to $0.73
  • Buy New
    $145.35
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

Author Biography

Mark Stamp, PhD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice.

Richard M. Low, PhD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.

Table of Contents

Acknowledgments
Classic Ciphers
Introduction
Good Guys and Bad Guys
Terminology
Selected Classic Crypto Topics
Transposition Ciphers
Substitution Ciphers
One-Time Pad
Codebook Ciphers
Summary
Problems
World War II Ciphers
Introduction
Enigma
Enigma Cipher Machine
Enigma Keyspace
Rotors
Enigma Attack
More Secure Enigma
Purple
Purple Cipher Machine
Purple Keyspace
Purple Diagnosis
Decrypting Purple
Purple versus Enigma
Sigaba
Sigaba Cipher Machine
Sigaba Keyspace
Sigaba Attack
Sigaba Conclusion
Summary
Problems
Stream Ciphers
Introduction
Shift Registers
Berlekamp-Massey Algorithm
Cryptographically Strong Sequences
Shift Register-Based Stream Ciphers
Correlation Attack
ORYX
ORYX Cipher
ORYX Attack
Secure ORYX
RC4
RC4 Algorithm
RC4 Attack
Preventing the RC4 Attack
PKZIP
PKZIP Cipher
PKZIP Attack
Improved PKZIP
Summary
Problems
Block Ciphers
Introduction
Block Cipher Modes
Feistel Cipher
Hellman's Time-Memory Trade-Off
Cryptanalytic TMTO
Bad Chains
Success Probability
Distributed TMTO
TMTO Conclusions
CMEA
CMEA Cipher
SCMEA Cipher
SCMEA Chosen Plaintext Attack
CMEA Chosen Plaintext Attack
SCMEA Known Plaintext Attack
CMEA Known Plaintext Attack
More Secure CMEA
Akelarre
Akelarre Cipher
Akelarre Attack
Improved Akelarre?
FEAL
FEAL-4 Cipher
FEAL-4 Differential Attack
FEAL-4 Linear Attack
Confusion and Diffusion
Summary
Problems
Hash Functions
Introduction
Birthdays and Hashing
The Birthday Problem
Birthday Attacks on Hash Functions
Digital Signature Birthday Attack
Nostradamus Attack
MD4
MD4 Algorithm
MD4 Attack
A Meaningful Collision
MD5
MD5 Algorithm
A Precise Differential
Outline of Wang?s Attack
Wang's MD5 Differentials
Reverse Engineering Wang's Attack
Stevens' Attack
A Practical Attack
Summary
Problems
Public Key Systems
Introduction
Merkle-Hellman Knapsack
Lattice-Reduction Attack
Knapsack Conclusion
Diffie-Hellman Key Exchange
Man-in-the-Middle Attack
Diffie-Hellman Conclusion
Arithmetica Key Exchange
Hughes-Tannenbaum Length Attack
Arithmetica Conclusion
RSA
Mathematical Issues
RSA Conclusion
Rabin Cipher
Chosen Ciphertext Attack
Rabin Cryptosystem Conclusion
NTRU Cipher
Meet-in-the-Middle Attack
Multiple Transmission Attack
Chosen Ciphertext Attack
NTRU Conclusion
ElGamal Signature Scheme
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program