Algebraic Cryptanalysis

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three co...

Full description

Bibliographic Details
Main Author: Bard, Gregory V. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Boston, MA : Springer US, 2009.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-88757-9
Table of Contents:
  • Preface
  • Introduction: How to Use this Book
  • The Block-Cipher Keeloq and Algebraic Attacks
  • The Fixed-Point Attack
  • Iterated Permutations
  • Stream Ciphers
  • Some Basic Facts about Linear Algebra over GF(2)
  • The Complexity of GF(2)-Matrix Operations
  • On the Exponent of Certain Matrix Operations
  • The Method of Four Russians
  • The Quadratic Sieve
  • Strategies for Polynomial Systems
  • Algorithms for Solving Polynomial Systems
  • Converting MQ to CNF-SAT
  • How Do SAT-Solvers Operate?
  • Applying SAT-Solvers to Extension Fields of Low Degree
  • Appendix
  • Index.