Home > Computing and Information Technology > Computer security > Data encryption > Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions
18%
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions

Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions. The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components and their most relevant constructions. Second, it describes and provides insights on the most popular cryptanalysis and proof techniques for analyzing the security of the above algorithms. A selected number of future directions, such as post-quantum security or design of ciphers for modern needs and particular applications, are also discussed. We believe that the two volumes of this work will be of interest to researchers, to master’s and PhD students studying or working in the field of cryptography, as well as to all professionals working in the field of cybersecurity.

Table of Contents:
Preface xiii Christina Boura and María Naya-Plasencia Part 1 Cryptanalysis of Symmetric-key Algorithms 1 Chapter 1 Differential Cryptanalysis 3 Henri Gilbert and Jérémy Jean 1.1. Statistical attacks on block ciphers: preliminaries 4 1.2. Principle of differential cryptanalysis and application to DES 7 1.2.1. Differential transitions and differential characteristics 7 1.2.2. Derivation of non-trivial differential characteristics 10 1.2.3. Leveraging characteristics to mount a key-recovery attack 14 1.3. Some refinements and generalizations 18 1.3.1. Differential effect 18 1.3.2. Truncated differentials 19 1.4. Design strategies and evaluation 20 1.4.1 Case of the AES 21 1.4.2. Automated analysis 23 1.5. Further notes and references 23 1.6. References 26 Chapter 2 Linear Cryptanalysis 29 Kaisa Nyberg and Antonio Flórez-Gutiérrez 2.1. History 29 2.2. Correlation and linear hull 30 2.3. Multidimensional linear approximation 31 2.4. Walsh-Hadamard transform 32 2.5. Linear approximation of an iterative block cipher 32 2.6. Matsui’s Algorithm 1 type of key recovery 33 2.7. Matsui’s Algorithm 2 type of key recovery 34 2.8. Searching for linear approximations and estimating correlations 35 2.9. Speeding up key recovery 36 2.10. Key-recovery distinguisher 38 2.11. Classical model of Algorithm 2 39 2.12. Algorithm 2 with distinct known plaintext and randomized key 40 2.13. Multiple linear approximations 40 2.14. Multidimensional linear cryptanalysis 42 2.15. References 43 Chapter 3 Impossible Differential Cryptanalysis 47 Christina Boura and María Naya-Plasencia 3.1. Finding impossible differentials 48 3.2. Key recovery 49 3.2.1. Data, time and memory complexities 50 3.3. Some improvements 52 3.3.1. Early abort technique 52 3.3.2. Multiple impossible differentials or multiple extension paths 53 3.4. Applications 54 3.5. References 54 Chapter 4 Zero-Correlation Cryptanalysis 57 Vincent Rijmen 4.1. Correlation and linear cryptanalysis 57 4.1.1. Correlation matrix 57 4.1.2. Linear trails and linear hulls 58 4.1.3. Approximations of linear functions 59 4.1.4. Computing the correlations over a permutation 60 4.2. Attacks using a linear hull with correlation zero 60 4.2.1. Correlation zero in random permutations 61 4.2.2. Distinguisher 61 4.2.3. Reducing the data complexity 62 4.3. Linear hulls with correlation zero 62 4.3.1. Feistel ciphers 63 4.3.2. AES 64 4.3.3 Extended result on AES 64 4.4. References 64 Chapter 5 Differential-Linear Cryptanalysis 67 Yosuke Todo 5.1. Brief introduction of differential-linear attacks 67 5.2. How to estimate correlations of a differential-linear distinguisher 69 5.3. On the key recovery 71 5.4. State of the art for differential-linear attacks 72 5.4.1. Differential-linear connecting table 72 5.4.2. Three techniques to improve differential-linear attacks 73 5.5. References 76 Chapter 6 Boomerang Cryptanalysis 77 Ling Song 6.1. Basic boomerang attack 77 6.2. Variants and refinements 79 6.3. Tricks and failures 80 6.4. Formalize the dependency 83 6.5. References 86 Chapter 7 Meet-in-the-Middle Cryptanalysis 89 Brice Minaud 7.1. Introduction 89 7.2. Basic meet-in-the-middle framework 90 7.2.1. The 2DES attack 90 7.2.2. Algorithmic framework 91 7.2.3. Complexity analysis and memory usage 92 7.3. Meet-in-the-middle techniques 94 7.3.1. Filtering 94 7.3.2. Splice-and-cut 96 7.3.3. Bicliques 97 7.4. Automatic tools 98 7.5. References 98 Chapter 8 Meet-in-the-Middle Demirci-Selçuk Cryptanalysis 101 Patrick Derbez 8.1. Original Demirci-Selçuk attack 101 8.2. Improvements 103 8.2.1. Data/time/memory trade-off 104 8.2.2. Difference instead of value 104 8.2.3. Multiset 105 8.2.4. Linear combinations 105 8.2.5. Differential enumeration technique 106 8.3. Finding the best attacks 108 8.3.1. Tools 108 8.3.2. Results 109 8.4. References 109 Chapter 9 Invariant Cryptanalysis 111 Christof Beierle 9.1. Introduction 111 9.2. Invariants for permutations and block ciphers 112 9.2.1. Invariant subspaces 113 9.2.2. Quadratic invariants 117 9.3. On design criteria to prevent attacks based on invariants 117 9.4. A link to linear approximations 119 9.5. References 121 Chapter 10 Higher Order Differentials, Integral Attacks and Variants 123 Anne Canteaut 10.1. Integrals and higher order derivatives 123 10.2. Algebraic degree of an iterated function 126 10.3. Division property 128 10.4. Attacks based on integrals 130 10.4.1. Distinguishers 130 10.4.2. Attacks 130 10.5. References 131 Chapter 11 Cube Attacks and Distinguishers 133 Itai Dinur 11.1. Cube attacks and cube testers 133 11.1.1. Terminology 134 11.1.2. Main observation 135 11.1.3. The basic cube attack 136 11.1.4. The preprocessing phase on cube attacks 137 11.1.5. Cube testers 138 11.1.6. Applications 139 11.2. Conditional differential attacks and dynamic cube attacks 140 11.2.1. Conditional differential attacks 140 11.2.2. Dynamic cube attacks 140 11.2.3. A toy example 140 11.3. References 141 Chapter 12 Correlation Attacks on Stream Ciphers 143 Thomas Johansson 12.1. Correlation attacks on the nonlinear combination generator 144 12.2. Correlation attacks and decoding linear codes 145 12.3. Fast correlation attacks 146 12.3.1. Fast correlation attacks and low weight feedback polynomials 147 12.3.2. Finding low weight multiples of the feedback polynomial 148 12.3.3. Fast correlation attacks by reducing the code dimension 150 12.4. Generalizing fast correlation attacks 151 12.4.1. The E0 stream cipher 151 12.4.2. The A5/1 stream cipher 152 12.5. References 153 Chapter 13 Addition, Rotation, XOR 155 Léo Perrin 13.1. What is ARX? 155 13.1.1. Structure of an ARX-based primitive 156 13.1.2. Development of ARX 156 13.2. Understanding modular addition 157 13.2.1. Expressing modular addition in Fn2 158 13.2.2. Cryptographic properties of modular addition 158 13.3. Analyzing ARX-based primitives 160 13.3.1. Searching for differential and linear trails 160 13.3.2. Proving security against differential and linear attacks 161 13.3.3. Other cryptanalysis techniques 162 13.4. References 163 Chapter 14 SHA-3 Contest Related Cryptanalysis 167 Yu S Asaki 14.1. Chapter overview 167 14.2. Differences between attacks against keyed and keyless primitives 168 14.3. Rebound attack 169 14.3.1. Basic strategy of the rebound attack 169 14.3.2. Rebound attack against AES-like structures 171 14.4. Improving rebound attacks with Super-Sbox 173 14.5. References for further reading about rebound attacks 175 14.6. Brief introduction of other cryptanalysis 176 14.6.1. Internal differential cryptanalysis 176 14.6.2. Rotational cryptanalysis 177 14.7. References 177 Chapter 15 Cryptanalysis of SHA-1 181 Marc Stevens 15.1. Design of SHA-1 181 15.2. SHA-1 compression function 182 15.3. Differential analysis 184 15.4. Near-collision attacks 184 15.5. Near-collision search 185 15.6. Message expansion differences 186 15.7. Differential trail 187 15.8. Local collisions 187 15.9. Disturbance vector 188 15.10. Disturbance vector selection 189 15.11. Differential trail construction 190 15.12. Message modification techniques 190 15.13. Overview of published collision attacks 191 15.14. References 192 Part 2 Future Directions 195 Chapter 16 Lightweight Cryptography 197 Meltem Sönmez Turan 16.1. Lightweight cryptography standardization efforts 197 16.2. Desired features 198 16.3. Design approaches in lightweight cryptography 200 16.4. References 202 Chapter 17 Post-Quantum Symmetric Cryptography 203 María Naya-Plasencia 17.1. Different considered models 204 17.1.1. With respect to the queries 204 17.1.2. With respect to memory 205 17.2. On Simon’s and Q2 attacks 206 17.2.1. Off-line Simon’s attack 207 17.3. Quantizing classical attacks in Q 1 207 17.3.1. About collisions 207 17.4. On the design of quantum-safe primitives 208 17.5. Perspectives and conclusion 209 17.5.1. About losing the quantum and classical surname 209 17.5.2. No panic 209 17.6. References 209 Chapter 18 New Fields in Symmetric Cryptography 215 Léo Perrin 18.1. Arithmetization-oriented symmetric primitives (ZK proof systems) 216 18.1.1. The current understanding of this new language 217 18.1.2. The first attempts 218 18.1.3. Cryptanalysis 219 18.2. Symmetric ciphers for hybrid homomorphic encryption 220 18.2.1. The current understanding of this new language 221 18.2.2. First design strategies 221 18.3. Parting thoughts 223 18.4. References 223 Chapter 19 Deck-function-based Cryptography 227 Joan Daemen 19.1. Block-cipher centric cryptography 227 19.2. Permutation-based cryptography 227 19.3. The problem of the random permutation security model 228 19.4. Deck functions 228 19.5. Modes of deck functions and instances 229 19.6. References 230 List of Authors 231 Index 233 Summary of Volume 1 239


Best Sellers


Product Details
  • ISBN-13: 9781789451474
  • Publisher: ISTE Ltd
  • Publisher Imprint: ISTE Ltd
  • Height: 234 mm
  • No of Pages: 272
  • Spine Width: 16 mm
  • Weight: 544 gr
  • ISBN-10: 1789451477
  • Publisher Date: 13 Dec 2023
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Sub Title: Cryptanalysis and Future Directions
  • Width: 156 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions
ISTE Ltd -
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA