000 03803nam a22005175i 4500
001 978-0-387-88757-9
003 DE-He213
005 20251006084429.0
007 cr nn 008mamaa
008 100715s2009 xxu| s |||| 0|eng d
020 _a9780387887579
020 _a99780387887579
024 7 _a10.1007/978-0-387-88757-9
_2doi
082 0 4 _a005.74
_223
100 1 _aBard, Gregory V.
_eauthor.
245 1 0 _aAlgebraic Cryptanalysis
_h[electronic resource] /
_cby Gregory V. Bard.
264 1 _aBoston, MA :
_bSpringer US,
_c2009.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic Attacks -- The Fixed-Point Attack -- Iterated Permutations -- Stream Ciphers -- Linear Systems Mod 2 -- Some Basic Facts about Linear Algebra over (2) -- The Complexity of (2)-Matrix Operations -- On the Exponent of Certain Matrix Operations -- The Method of Four Russians -- The Quadratic Sieve -- Polynomial Systems and Satisfiability -- Strategies for Polynomial Systems -- Algorithms for Solving Polynomial Systems -- Converting MQ to CNF-SAT -- How do SAT-Solvers Operate? -- Applying SAT-Solvers to Extension Fields of Low Degree.
520 _aAlgebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks. Additional topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies.
650 0 _aCOMPUTER SCIENCE.
650 0 _aDATA PROTECTION.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aGEOMETRY, ALGEBRAIC.
650 0 _aFIELD THEORY (PHYSICS).
650 0 _aMATRIX THEORY.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aFIELD THEORY AND POLYNOMIALS.
650 2 4 _aLINEAR AND MULTILINEAR ALGEBRAS, MATRIX THEORY.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aALGEBRAIC GEOMETRY.
650 2 4 _aSYSTEMS AND DATA SECURITY.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387887562
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-88757-9
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c59402
_d59402