Online Library TheLib.net » Stream Ciphers
cover of the book Stream Ciphers

Ebook: Stream Ciphers

00
27.01.2024
0
0

In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.

Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.

Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.

Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.

Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.




In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.

Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.

Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.

Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.

Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.




In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.

Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.

Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.

Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.

Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.


Content:
Front Matter....Pages I-XIX
Front Matter....Pages 15-15
Linear Feedback Shift Registers....Pages 17-58
Non-linear Combinations of LFSRs....Pages 59-89
Correlation Attacks....Pages 91-115
BDD-Based Attacks....Pages 117-130
Algebraic Attacks....Pages 131-154
Irregular Clocked Shift Registers....Pages 155-165
Front Matter....Pages 167-167
The Security of Mobile Phones (GSM)....Pages 169-181
RC4 and Related Ciphers....Pages 183-228
The eStream Project....Pages 229-239
The Blum-Blum-Shub Generator and Related Ciphers....Pages 241-257
Front Matter....Pages 259-259
Computational Aspects....Pages 261-292
Number Theory....Pages 293-303
Finite Fields....Pages 305-310
Statistics....Pages 311-327
Combinatorics....Pages 329-335
Front Matter....Pages 337-337
Exercises....Pages 339-345
Solutions....Pages 347-362
Front Matter....Pages 363-363
An Overview of the Programs....Pages 365-370
Literate Programming....Pages 371-378
Introduction to Stream Ciphers....Pages 1-13
Back Matter....Pages 379-399


In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.

Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.

Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.

Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.

Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.


Content:
Front Matter....Pages I-XIX
Front Matter....Pages 15-15
Linear Feedback Shift Registers....Pages 17-58
Non-linear Combinations of LFSRs....Pages 59-89
Correlation Attacks....Pages 91-115
BDD-Based Attacks....Pages 117-130
Algebraic Attacks....Pages 131-154
Irregular Clocked Shift Registers....Pages 155-165
Front Matter....Pages 167-167
The Security of Mobile Phones (GSM)....Pages 169-181
RC4 and Related Ciphers....Pages 183-228
The eStream Project....Pages 229-239
The Blum-Blum-Shub Generator and Related Ciphers....Pages 241-257
Front Matter....Pages 259-259
Computational Aspects....Pages 261-292
Number Theory....Pages 293-303
Finite Fields....Pages 305-310
Statistics....Pages 311-327
Combinatorics....Pages 329-335
Front Matter....Pages 337-337
Exercises....Pages 339-345
Solutions....Pages 347-362
Front Matter....Pages 363-363
An Overview of the Programs....Pages 365-370
Literate Programming....Pages 371-378
Introduction to Stream Ciphers....Pages 1-13
Back Matter....Pages 379-399
....
Download the book Stream Ciphers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen