The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.Preface.
About The Authors .
Acknowledgments.
1. Classic Ciphers. 1.1 Introduction .
1.2 Good Guys and Bad Guys.
1.3 Terminology .
1.4 Selected Classic Crypto Topics.
1.4.1 Transposition Ciphers .
1.4.2 Substitution Ciphers.
1.4.3 One-Time Pad .
1.4.4 Codebook Ciphers .
1.5 Summary.
1.6 Problems .
2. World War II Ciphers. 2.1 Introduction .
2.2 Enigma .
2.2.1 Enigma Cipher Machine .
2.2.2 Enigma Keyspace .
2.2.3 Rotors .
2.2.4 Enigma Attack .
2.2.5 More Secure Enigma.
2.3 Purple.
2.3.1 Purple Cipher Machine .
2.3.2 Purple Keyspace .
2.3.3 Purple Diagnosis .
2.3.4 Decrypting Purple.
2.3.5 Purple versus Enigma .
2.4 Sigaba .
2.4.1 Sigaba Cipher Machine.
2.4.2 Sigaba Keyspace .
2.4.3 Sigaba Attack .
2.4.4 Sigaba Conclusion .
2.5 Summary .
2.6 Problems .
3. Stream Ciphers. 3.1 Introduction .
3.2 Shift Registers .
3.2.1 Berlekamp-Massey Algorithm .
3.2.2 Cryptographically Strong Sequences .
3.2.3 Shift Register-Based Stream Ciphers.