Limit search to available items
Book Cover
E-book
Author Manz, Olaf.

Title Encrypt, sign, attack : a compact introduction to cryptography / Olaf Manz
Published Berlin, Germany : Springer, 2023

Copies

Description 1 online resource (140 p.)
Series Mathematics Study Resources
Mathematics study resources.
Contents Intro -- Preface -- Contents -- 1: Basics and History -- 1.1 What It Is About: The Scenario -- 1.1.1 An Initial Overview -- 1.1.2 Sending and Storing Information -- 1.1.3 Receiving and Reading Information -- 1.2 Alphabets and Digitisation -- 1.2.1 Alphabets and Modulo Calculation -- 1.2.2 Digitisation and Bytes -- 1.3 Caesar Cipher -- 1.3.1 Shift Cipher -- 1.3.2 Affine Cipher -- 1.4 Secret Writing of the Illuminati -- 1.4.1 Illuminati Alphabet and Secret Writing -- 1.4.2 Monoalphabetic Ciphers -- 1.5 Vigenère Cipher -- 1.5.1 Polyalphabetic Ciphers -- 1.5.2 Vigenère Tableau
1.5.3 Smoothing of Statistical Frequencies -- 1.6 Kasiski and Friedman Attack -- 1.6.1 Kasiski Attack -- 1.6.2 Friedman Coincidence Index -- 1.6.3 Friedman Attack -- 1.7 Enigma Machine -- 1.7.1 Structure of the Enigma Machine -- 1.7.2 Configuration of the Enigma Machine -- 1.7.3 Deciphering and Security with Enigma -- 2: Symmetric Ciphers -- 2.1 Keys and Attack Strategies -- 2.1.1 Algorithm and Key -- 2.1.2 Symmetric and Asymmetric Ciphers -- 2.1.3 Kerckhoff's Principle -- 2.1.4 Military Secrets -- 2.1.5 Attack Strategies -- 2.2 Vernam Cipher and Pseudo-Randomness
2.2.1 Vernam Cipher -- 2.2.2 Shift Registers -- 2.2.3 Pseudo-Randomness and Cryptanalysis -- 2.3 GSM Mobile Communications -- 2.3.1 The GSM Mobile Communications Standard -- 2.3.2 GSM Data Encryption -- 2.3.3 A5 Cipher of Version A5/1 -- 2.4 Feistel Cipher -- 2.4.1 Stream Ciphers and Block Ciphers -- 2.4.2 Confusion and Diffusion -- 2.4.3 Construction Principle of a Feistel Cipher -- 2.5 Data Encryption Standard DES -- 2.5.1 From LUCIFER to DES -- 2.5.2 DES as Feistel Cipher -- 2.5.3 DES Expansion -- 2.5.4 DES Key Addition -- 2.5.5 DES S-Boxes -- 2.5.6 DES Permutation
2.5.7 DES Key Selection -- 2.5.8 Security of the DES -- 2.5.9 Differential Cryptanalysis Using the Example of DES -- 2.5.10 Linear Cryptanalysis Using the Example of DES -- 2.5.11 Brute-Force Attack and Triple-DES -- 2.6 Operating Modes of Block Ciphers -- 2.6.1 Electronic Codebook Mode -- 2.6.2 Cipher Block Chaining Mode -- 2.6.3 Cipher Feedback Mode -- 2.6.4 Output Feedback Mode -- 2.6.5 Counter Mode -- 2.7 UMTS/LTE Mobile Communications and Digital Television -- 2.7.1 The UMTS/LTE Mobile Communications Standard -- 2.7.2 A5 Cipher of Versions A5/3 and A5/4 -- 2.7.3 DVB and MPEG2
2.7.4 CSA Encryption -- 2.8 Advanced Encryption Standard AES -- 2.8.1 Rijndael Procedure and AES -- 2.8.2 Addition and Multiplication of Bytes -- 2.8.3 AES State Matrix -- 2.8.4 AES Subbyte -- 2.8.5 AES ShiftRow -- 2.8.6 AES MixColumn -- 2.8.7 AES AddRoundKey -- 2.8.8 AES Decryption -- 2.8.9 Security of the AES -- 2.9 Hard Disk and ZIP Archive -- 2.9.1 Hard Disk -- 2.9.2 CBC-AES Hard Disk Encryption -- 2.9.3 XTS-AES Hard Disk Encryption -- 2.9.4 ZIP Archive -- 3: Public-Key Ciphers -- 3.1 Factorization and RSA Cipher -- 3.1.1 Prime Numbers and Factorization
Summary This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data that require protection. The focus is on the description of the historically and for practice important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults. The author Dr. Olaf Manz first worked as a research assistant and Heisenberg professor at the mathematical institutes of the universities of Mainz and Heidelberg. He then worked for many years at Siemens in IT product management and knows cryptography from the practical side. He is also the author of the book "Error-Correcting Codes", also published by Springer. This book is a translation of the original German 1st edition Verschlusseln, Signieren, Angreifen by Olaf Manz, published by Springer-Verlag. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors
Notes 3.1.2 Fermat's Little Theorem
Online resource; title from PDF title page (SpringerLink, viewed January 6, 2023)
Subject Data encryption (Computer science)
Cryptography.
Criptografía (Informática)
Criptografía
Cryptography
Data encryption (Computer science)
Form Electronic book
ISBN 9783662660157
3662660156
Other Titles Verschlüsseln, Signieren, Angreifen. English