Boura C. Symmetric Cryptography 2. Cryptanalysis and Future Directions 2023
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 2.86 MiB (2996590 Bytes)
- Uploaded:
- 2023-12-13 11:41 GMT
- By:
- andryold1
- Seeders:
- 38
- Leechers:
- 8
- Info Hash: 6AA949099297AF61FE02234C89FAEC46BA1AE27E
Textbook in PDF format Symmetric-key cryptology is one of the two main branches of modern cryptology. It comprises all primitives, modes and constructions used to ensure the confidentiality, authenticity and integrity of communications by means of a single key shared between the two communicating parties. Hash functions and some other keyless constructions are equally considered as symmetric constructions because of the similarity in the design and analysis with classical keyed symmetric ciphers. Symmetric algorithms are essential for establishing secure communications, as they can have very compact implementations and achieve high speed in both software and hardware. Furthermore, compared to public-key algorithms, keys used in symmetric cryptography are short, typically of 128 or 256 bits only. The goal of this two-volume project is to provide a thorough overview of the most important design, cryptanalysis and proof techniques for symmetric designs. The first volume is dedicated to the most popular design trends for symmetric primitives, modes and constructions, and to the presentation of the most important proof techniques. On the other hand, the current volume describes and analyzes some of the most well-established and powerful cryptanalysis techniques against symmetric constructions Preface Part 1. Cryptanalysis of Symmetric-key Algorithms Differential Cryptanalysis Linear Cryptanalysis Impossible Differential Cryptanalysis Zero-Correlation Cryptanalysis Differential-Linear Cryptanalysis Boomerang Cryptanalysis Meet-in-the-Middle Cryptanalysis Meet-in-the-Middle Demirci-Selçuk Cryptanalysis Invariant Cryptanalysis Higher Order Differentials, Integral Attacksand Variants Cube Attacks and Distinguishers Correlation Attacks on Stream Ciphers Addition, Rotation, XOR SHA-3 Contest Related Cryptanalysis Cryptanalysis of SHA-1 Part 2. Future Directions Lightweight Cryptography Post-Quantum Symmetric Cryptography New Fields in Symmetric Cryptography Deck-function-based Cryptography