Algebraic Cryptanalysis
Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three co...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2009.
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-88757-9 |
Table of Contents:
- Preface
- Introduction: How to Use this Book
- The Block-Cipher Keeloq and Algebraic Attacks
- The Fixed-Point Attack
- Iterated Permutations
- Stream Ciphers
- Some Basic Facts about Linear Algebra over GF(2)
- The Complexity of GF(2)-Matrix Operations
- On the Exponent of Certain Matrix Operations
- The Method of Four Russians
- The Quadratic Sieve
- Strategies for Polynomial Systems
- Algorithms for Solving Polynomial Systems
- Converting MQ to CNF-SAT
- How Do SAT-Solvers Operate?
- Applying SAT-Solvers to Extension Fields of Low Degree
- Appendix
- Index.