Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the…mehr
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
After graduating in electromechanical engineering Joan Daemen was awarded his PhD in 1995 from KU Leuven. After his contract ended at COSIC, he privately continued his crypto research and contacted Vincent Rijmen to continue their collaboration that would lead to the Rijndael block cipher, and this was selected by NIST as the new Advanced Encryption Standard in 2000. After over 20 years of security industry experience, including work as a security architect and cryptographer for STMicroelectronics, he is now a professor in the Digital Security Group at Radboud University Nijmegen. He codesigned the Keccak cryptographic hash which was selected as the SHA-3 hash standard by NIST in 2012 and is one of the founders of the permutation-based cryptography movement. In 2017 he won the Levchin Prize for Real World Cryptography "for the development of AES and SHA3". In 2018 he was awarded an ERC advanced grant for research on the foundations of security in symmetric cryptography. After graduating in electronics engineering, Vincent Rijmen was awarded his PhD in 1997 from KU Leuven. Researching there in the ESAT/COSIC lab he developed the Rijndael algorithm with Joan Daemen, and this was selected by NIST as the new Advanced Encryption Standard in 2000. After work in the security industry, as chief cryptographer at Cryptomathic, he was first a professor at Technische Universität Graz and now in the COSIC Lab in Leuven. He is also an adjunct professor at the Selmer Center (University of Bergen). In 2019, he was named a Fellow of the International Association for Cryptologic Research for "co-designing AES, contributions to the design and cryptanalysis of symmetric primitives, and service to the IACR". His research interests include symmetric cryptography and cryptanalysis, side-channel attacks, and mathematical theories for the design of symmetric cryptography primitives.
Inhaltsangabe
The Advanced Encryption Standard Process.- Preliminaries.- Specification of Rijndael.- Implementation Aspects.- Design Philosophy.- The Data Encryption Standard.- Correlation Matrices.- Difference Propagation.- The Wide Trail Strategy.- Cryptanalysis.- The Road to Rijndael.- Correlation Analysis in GF(2n).- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls.- Two-Round Differential Trail Clustering.- Plateau Trails.- App. A, Substitution Tables.- App. B, Test Vectors.- App. C, Reference Code.- Bibliography.- Index.
The Advanced Encryption Standard Process.- Preliminaries.- Specification of Rijndael.- Implementation Aspects.- Design Philosophy.- The Data Encryption Standard.- Correlation Matrices.- Difference Propagation.- The Wide Trail Strategy.- Cryptanalysis.- The Road to Rijndael.- Correlation Analysis in GF(2n).- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls.- Two-Round Differential Trail Clustering.- Plateau Trails.- App. A, Substitution Tables.- App. B, Test Vectors.- App. C, Reference Code.- Bibliography.- Index.
The Advanced Encryption Standard Process.- Preliminaries.- Specification of Rijndael.- Implementation Aspects.- Design Philosophy.- The Data Encryption Standard.- Correlation Matrices.- Difference Propagation.- The Wide Trail Strategy.- Cryptanalysis.- The Road to Rijndael.- Correlation Analysis in GF(2n).- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls.- Two-Round Differential Trail Clustering.- Plateau Trails.- App. A, Substitution Tables.- App. B, Test Vectors.- App. C, Reference Code.- Bibliography.- Index.
The Advanced Encryption Standard Process.- Preliminaries.- Specification of Rijndael.- Implementation Aspects.- Design Philosophy.- The Data Encryption Standard.- Correlation Matrices.- Difference Propagation.- The Wide Trail Strategy.- Cryptanalysis.- The Road to Rijndael.- Correlation Analysis in GF(2n).- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls.- Two-Round Differential Trail Clustering.- Plateau Trails.- App. A, Substitution Tables.- App. B, Test Vectors.- App. C, Reference Code.- Bibliography.- Index.
Rezensionen
"I enjoyed reading this book, which is now sitting on my new office bookshelves, as it brought back memories of the late 1990 and early 2000s crypto waiting game, going from round to round in the NIST competition." (Sven Dietrich, Cipher, ieee-security.org, March 21, 2021)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309