ShopSpell

Applied Cryptanalysis Breaking Ciphers in the Real World [Hardcover]

$127.99     $133.00    4% Off      (Free Shipping)
94 available
  • Category: Books (Computers)
  • Author:  Stamp, Mark, Low, Richard M.
  • Author:  Stamp, Mark, Low, Richard M.
  • ISBN-10:  047011486X
  • ISBN-10:  047011486X
  • ISBN-13:  9780470114865
  • ISBN-13:  9780470114865
  • Publisher:  Wiley-IEEE Press
  • Publisher:  Wiley-IEEE Press
  • Pages:  424
  • Pages:  424
  • Binding:  Hardcover
  • Binding:  Hardcover
  • Pub Date:  01-Mar-2007
  • Pub Date:  01-Mar-2007
  • SKU:  047011486X-11-MPOD
  • SKU:  047011486X-11-MPOD
  • Item ID: 101341205
  • List Price: $133.00
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 18 to Dec 20
  • Notes: Brand New Book. Order Now.
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.Preface.

About The Authors .

Acknowledgments.

1. Classic Ciphers.

1.1 Introduction .

1.2 Good Guys and Bad Guys.

1.3 Terminology .

1.4 Selected Classic Crypto Topics.

1.4.1 Transposition Ciphers .

1.4.2 Substitution Ciphers.

1.4.3 One-Time Pad .

1.4.4 Codebook Ciphers .

1.5 Summary.

1.6 Problems .

2. World War II Ciphers.

2.1 Introduction .

2.2 Enigma .

2.2.1 Enigma Cipher Machine .

2.2.2 Enigma Keyspace .

2.2.3 Rotors .

2.2.4 Enigma Attack .

2.2.5 More Secure Enigma.

2.3 Purple.

2.3.1 Purple Cipher Machine .

2.3.2 Purple Keyspace .

2.3.3 Purple Diagnosis .

2.3.4 Decrypting Purple.

2.3.5 Purple versus Enigma .

2.4 Sigaba .

2.4.1 Sigaba Cipher Machine.

2.4.2 Sigaba Keyspace .

2.4.3 Sigaba Attack .

2.4.4 Sigaba Conclusion .

2.5 Summary .

2.6 Problems .

3. Stream Ciphers.

3.1 Introduction .

3.2 Shift Registers .

3.2.1 Berlekamp-Massey Algorithm .

3.2.2 Cryptographically Strong Sequences .

3.2.3 Shift Register-Based Stream Ciphers.