000851541 000__ 04419cam\a2200457Ii\4500 000851541 001__ 851541 000851541 005__ 20230306145021.0 000851541 006__ m\\\\\o\\d\\\\\\\\ 000851541 007__ cr\cn\nnnunnun 000851541 008__ 181022s2018\\\\sz\\\\\\ob\\\\001\0\eng\d 000851541 020__ $$a9783319682730$$q(electronic book) 000851541 020__ $$a3319682733$$q(electronic book) 000851541 020__ $$z9783319682723 000851541 0247_ $$a10.1007/978-3-319-68273-0$$2doi 000851541 035__ $$aSP(OCoLC)on1057471411 000851541 035__ $$aSP(OCoLC)1057471411 000851541 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF 000851541 049__ $$aISEA 000851541 050_4 $$aZ104 000851541 08204 $$a652/.8$$223 000851541 1001_ $$aNakahara, Jorge,$$eauthor. 000851541 24510 $$aLai-Massey cipher designs :$$bhistory, design criteria and cryptanalysis /$$cJorge Nakahara Jr. 000851541 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000851541 300__ $$a1 online resource (xvii, 726 pages) 000851541 336__ $$atext$$btxt$$2rdacontent 000851541 337__ $$acomputer$$bc$$2rdamedia 000851541 338__ $$aonline resource$$bcr$$2rdacarrier 000851541 504__ $$aIncludes bibliographical references and index. 000851541 5050_ $$aIntro; Preface; List of Acronyms; List of Symbols; Contents; Chapter 1 Introduction; Abstract; 1.1 Symmetric and Asymmetric Ciphers; 1.2 Iterated (or Product) Ciphers; 1.3 Symmetric Cryptosystems; 1.4 Entropy; 1.5 Confusion and Diffusion; 1.6 Security Assumptions and Threat Models; 1.7 PRP and SPRP; 1.8 Modes of Operation; 1.9 Unconditional Security; 1.10 The Origins of the MESH Ciphers; References; Chapter 2 Lai-Massey Block Ciphers; Abstract; 2.1 The PES Block Cipher; 2.1.1 Encryption and Decryption Frameworks; 2.1.2 Key Schedule Algorithm; 2.2 The IDEA Block Cipher 000851541 5058_ $$a2.2.1 Encryption and Decryption Frameworks2.2.2 Key Schedule Algorithm; 2.3 The MESH Block Ciphers; 2.3.1 Encryption and Decryption Frameworks of MESH-64; 2.3.2 Key Schedule Algorithm of MESH-64; 2.3.3 Encryption and Decryption Frameworks of MESH-96; 2.3.4 Key Schedule Algorithm of MESH-96; 2.3.5 Encryption and Decryption Frameworks of MESH-128; 2.3.6 Key Schedule Algorithm of MESH-128; 2.3.7 Encryption and Decryption Frameworks of MESH-64(8); 2.3.8 Key Schedule Algorithm of MESH-64(8); 2.3.9 Encryption and Decryption Frameworks of MESH-128(8); 2.3.10 Key Schedule Algorithm of MESH-128(8) 000851541 5058_ $$a2.4 The RIDEA Block Cipher2.4.1 Encryption and Decryption Frameworks; 2.4.2 Key Schedule Algorithm; 2.5 The WIDEA- Block Ciphers; 2.5.1 Encryption and Decryption Frameworks; 2.5.2 Key Schedule Algorithms; 2.6 The FOX/IDEA-NXT Block Ciphers; 2.6.1 Encryption and Decryption Frameworks; 2.6.2 Key Schedule Algorithms; 2.7 The REESSE3+ Block Cipher; 2.7.1 Encryption and Decryption Frameworks; 2.7.2 Key Schedule Algorithm; 2.8 The IDEA* Block Cipher; 2.8.1 Encryption and Decryption Frameworks; 2.8.2 Key Schedule Algorithm; 2.9 The Yi's Block Cipher; 2.9.1 Encryption and Decryption Frameworks 000851541 5058_ $$a2.9.2 Key Schedule Algorithm2.10 The Bel-T Block Cipher; 2.10.1 Encryption and Decryption Frameworks; 2.10.2 Key Schedule Algorithm; References; Chapter 3 Attacks; Abstract; 3.1 Exhaustive Search (Brute Force) Attack; 3.2 Dictionary Attack; 3.3 Birthday-Paradox Attacks; 3.3.1 Generalized Birthday Paradox Attack; 3.4 Time-Memory Trade-Off Attacks; 3.4.1 Hellman's Attack; 3.4.2 Time/Memory/Data Trade-Off Attacks; 3.5 Differential Cryptanalysis; 3.5.1 DC of PES Under Weak-Key Assumptions; 3.5.1.1 Key-Recovery Attacks; 3.5.2 DC of IDEA Under Weak-Key Assumptions; 3.5.2.1 Key-Recovery Attacks 000851541 5058_ $$a3.5.3 DC of MESH-64 Under Weak-Key Assumptions3.5.4 DC of MESH-96 Under Weak-Key Assumptions; 3.5.5 DC of MESH-128 Under Weak-Key Assumptions; 3.5.6 DC of MESH-64(8) Under Weak-Key Assumptions; 3.5.7 DC of MESH-128(8) Under Weak-Key Assumptions; 3.5.8 DC of WIDEA-n Under Weak-Key Assumptions; 3.5.8.1 Differential Attack Using One IDEA Instance Only; 3.5.8.2 Differential Attack Using All IDEA Instances; 3.5.8.3 WIDEA-n in Davies-Meyer Mode; 3.5.8.4 Weak Keys; 3.5.8.5 Weak Keys in WIDEA-4; 3.5.8.6 Weak keys in WIDEA-8; 3.5.9 DC of RIDEA Under Weak-Key Assumptions 000851541 506__ $$aAccess limited to authorized users. 000851541 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 22, 2018). 000851541 650_0 $$aCryptography. 000851541 650_0 $$aCiphers. 000851541 852__ $$bebk 000851541 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-68273-0$$zOnline Access$$91397441.1 000851541 909CO $$ooai:library.usi.edu:851541$$pGLOBAL_SET 000851541 980__ $$aEBOOK 000851541 980__ $$aBIB 000851541 982__ $$aEbook 000851541 983__ $$aOnline 000851541 994__ $$a92$$bISE