Skip to main content

2011 | Buch

The Block Cipher Companion

verfasst von: Lars R. Knudsen, Matthew J.B. Robshaw

Verlag: Springer Berlin Heidelberg

Buchreihe : Information Security and Cryptography

insite
SUCHEN

Über dieses Buch

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms.

In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.

The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
As our personal and commercial transactions are routinely transmitted around the world, the need to protect information has never been greater. One of the best single line descriptions of cryptography is due to Rivest [636]: Cryptography is about communication in the presence of an adversary.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 2. DES
Abstract
In this chapter we will describe one particular block cipher, the Data Encryption Algorithm (DEA) or the Data Encryption Standard (DES).The importance of DES cannot be overstated and it has been said that “DES trained a generation of cryptographers”.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 3. AES
Abstract
The influence of DES on the development of secret-key cryptography is immense. Its success inspired many closely related designs, though improving on DES was always a rather lofty ambition. Indeed, very few of these DES-relatives offered any serious advantages and many ended up being weaker than the original.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 4. Using Block Ciphers
Abstract
A block cipher on its own is rather limited.It takes a b-bit string and outputs a b-bit string under the action of a secret key. But what happens when the message we wish to encrypt is 37 bits long and is too small to fill an entire block? What happens if the message is too long for a single block?
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 5. Brute Force Attacks
Abstract
The one attack that can always be mounted against any block cipher is a search for the key. No amount of clever design can prevent this attack and the designers’ aim is to ensure that this is the best attack available to the adversary.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 6. Differential Cryptanalysis: The Idea
Abstract
Differential cryptanalysis is one of the most powerful attacks available to the block cipher cryptanalyst. Invented by Biham and Shamir [81] but identified more than ten years earlier by the designers of DES [167], this attack has been used widely on many different cryptographic primitives.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 7. Linear Cryptanalysis: The Idea
Abstract
After differential cryptanalysis, linear cryptanalysis provides the most important general technique for analysing a block cipher. Generally speaking it tends to be far less successful than differential cryptanalysis, the most prominent exception to this rule of thumb being DES; see Chap. 2. It is an important technique and has one very specific advantage over differential cryptanalysis, namely that the cryptanalysis requires only known plaintext rather than chosen plaintext.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 8. Advanced Topics
Abstract
In this chapter we will be looking at several issues in depth. First we will return to differential and linear cryptanalysis. In Chaps. 6 and 7 our descriptions were driven by example but there are more formal foundations to these topics. So in this chapter we will provide pointers to these foundations and other work in the area. We will also use this chapter to emphasize links between analysis and design and we illustrate how block cipher design has advanced over the years, often in response to increasingly sophisticated attacks.
Lars R. Knudsen, Matthew J. B. Robshaw
Chapter 9. A Short Survey and Six Prominent Ciphers
Abstract
Four events provided much of the inspiration for the design and the cryptanalysis of block ciphers. The first and most significant development was the invention and publication of DES. This was such an intriguing design, particularly given its provenance, that it lead to the development and foundation of the increasingly sophisticated science of block cipher design and cryptanalysis in the open community.
Lars R. Knudsen, Matthew J. B. Robshaw
Backmatter
Metadaten
Titel
The Block Cipher Companion
verfasst von
Lars R. Knudsen
Matthew J.B. Robshaw
Copyright-Jahr
2011
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-17342-4
Print ISBN
978-3-642-17341-7
DOI
https://doi.org/10.1007/978-3-642-17342-4

Premium Partner