Stream Ciphers

In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.   Unlike block ciphers, stream ciphers work on single bits or s...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Klein, Andreas (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: London : Springer London : Imprint: Springer, 2013.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03550nam a22004335i 4500
001 978-1-4471-5079-4
003 DE-He213
005 20151204174907.0
007 cr nn 008mamaa
008 130409s2013 xxk| s |||| 0|eng d
020 |a 9781447150794  |9 978-1-4471-5079-4 
024 7 |a 10.1007/978-1-4471-5079-4  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A43 
072 7 |a PBKS  |2 bicssc 
072 7 |a COM051300  |2 bisacsh 
082 0 4 |a 518.1  |2 23 
100 1 |a Klein, Andreas.  |e author. 
245 1 0 |a Stream Ciphers  |h [electronic resource] /  |c by Andreas Klein. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2013. 
300 |a XIX, 399 p. 71 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction to Stream Ciphers -- Linear Feedback Shift Registers -- Non-linear Combinations of LFSRs -- Correlation Attacks -- BDD-Based Attacks -- Algebraic Attacks -- Irregular Clocked Shift Registers -- The Security of Mobile Phones (GSM) -- RC4 and Related Ciphers -- The eStream Project -- The Blum-Blum-Shub Generator and Related Ciphers -- Mathematical Background -- Part IV Exercises with Solutions. 
520 |a In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.   Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.   Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.   Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.   Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science. 
650 0 |a Mathematics. 
650 0 |a Computer science  |x Mathematics. 
650 0 |a Algorithms. 
650 1 4 |a Mathematics. 
650 2 4 |a Algorithms. 
650 2 4 |a Discrete Mathematics in Computer Science. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781447150787 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4471-5079-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SMA 
950 |a Mathematics and Statistics (Springer-11649)