De som köpt den här boken har ofta också köpt Sound and Recording av Francis Rumsey (häftad).
Köp båda 2 för 2378 kr"...a very good book for students and people who want to learn some real cryptanalysis..." (Computing Reviews.com, October 1, 2007) "...this is not a book to be merely read or studied, but a field manual to be followed." (Computing Reviews.com, August 14, 2007)
Mark Stamp, PhD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice. Richard M. Low, PhD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.
Preface.
About The Authors .
Acknowledgments.
1. Classic Ciphers.
1.1 Introduction .
1.2 Good Guys and Bad Guys.
1.3 Terminology .
1.4 Selected Classic Crypto Topics.
1.4.1 Transposition Ciphers .
1.4.2 Substitution Ciphers.
1.4.3 One-Time Pad .
1.4.4 Codebook Ciphers .
1.5 Summary.
1.6 Problems .
2. World War II Ciphers.
2.1 Introduction .
2.2 Enigma .
2.2.1 Enigma Cipher Machine .
2.2.2 Enigma Keyspace .
2.2.3 Rotors .
2.2.4 Enigma Attack .
2.2.5 More Secure Enigma.
2.3 Purple.
2.3.1 Purple Cipher Machine .
2.3.2 Purple Keyspace .
2.3.3 Purple Diagnosis .
2.3.4 Decrypting Purple.
2.3.5 Purple versus Enigma .
2.4 Sigaba .
2.4.1 Sigaba Cipher Machine.
2.4.2 Sigaba Keyspace .
2.4.3 Sigaba Attack .
2.4.4 Sigaba Conclusion .
2.5 Summary .
2.6 Problems .
3. Stream Ciphers.
3.1 Introduction .
3.2 Shift Registers .
3.2.1 Berlekamp-Massey Algorithm .
3.2.2 Cryptographically Strong Sequences .
3.2.3 Shift Register-Based Stream Ciphers.
3.2.4 Correlation Attack.
3.3 ORYX .
3.3.1 ORYX Cipher.
3.3.2 ORYX Attack.
3.3.3 Secure ORYX.
3.4 RC4.
3.4.1 RC4 Algorithm .
3.4.2 RC4 Attack .
3.4.3 Preventing the RC4 Attack.
3.5 PKZIP.
3.5.1 PKZIP Cipher.
3.5.2 PKZIP Attack.
3.5.3 Improved PKZIP.
3.6 Summary.
3.7 Problems.
4. Block Ciphers.
4.1 Introduction .
4.2 Block Cipher Modes .
4.3 Feistel Cipher.
4.4 Hellmans Time-Memory Trade-Off.
4.4.1 Cryptanalytic TMTO.
4.4.2 Bad Chains.
4.4.3 Success Probability.
4.4.4 Distributed TMTO.
4.4.5 TMTO Conclusions.
4.5 CMEA.
4.5.1 CMEA Cipher.
4.5.2 SCMEA Cipher.
4.5.3 SCMEA
4.5.4 CMEA
4.5.5 SCMEA Known Plaintext Attack.
4.5.6 CMEA Known Plaintext Attack.
4.5.7 More Secure CMEA.
4.6 Akelarre .
4.6.1 Akelarre Cipher.
4.6.2 Akelarre Attack.
4.6.3 Improved Akelarre?
4.7 FEAL .
4.7.1 FEAL-4 Cipher.
4.7.2 FEAL-4 Differential Attack.
4.7.3 FEAL-4 Linear Attack.
4.7.4 Confusion and Diffusion.
4.8 Summary.
4.9 Problems.
5. Hash Functions.
5.1 Introduction .
5.2 Birthdays and Hashing.
5.2.1 The Birthday Problem.
5.2.2 Birthday Attacks on Hash Functions.
5.2.3 Digital Signature Birthday Attack.
5.2.4 Nostradamus Attack.
5.3 MD4.
5.3.1 MD4 Algorithm.
5.3.2 MD4 Attack.
5.3.3 A Meaningful Collision .
5.4 MD5 .
5.4.1 MD5 Algorithm. ...