Description |
1 online resource |
Contents |
Shift Register-Based Stream Ciphers. Linear Feedback Shift Registers -- Non-linear Combinations of LFSRs -- Correlation Attacks -- BDD-Based Attacks -- Algebraic Attacks -- Irregular Clocked Shift Registers -- Some Special Ciphers. The Security of Mobile Phones (GSM) -- RC4 and Related Ciphers -- The eStream Project -- The Blum-Blum-Shub Generator and Related Ciphers -- Mathematical Background. Computational Aspects -- Number Theory -- Finite Fields -- Statistics -- Combinatorics -- Exercises with Solutions. Exercises -- Solutions -- Programs. An Overview of the Programs -- Literate Programming |
Summary |
In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones. Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understa |
Analysis |
Mathematics |
|
Computational complexity |
|
Algorithms |
|
Discrete Mathematics in Computer Science |
Bibliography |
Includes bibliographical references and index |
Subject |
Stream ciphers.
|
|
Data encryption (Computer science)
|
|
Criptografía (Informática)
|
|
Data encryption (Computer science)
|
|
Stream ciphers
|
|
Kryptologie
|
Form |
Electronic book
|
ISBN |
9781447150794 |
|
1447150791 |
|
1447150783 |
|
9781447150787 |
|