Cryptography and Cryptanalysis in MATLAB
اسم المؤلف
Marius Iulian Mihailescu, Stefania Loredana Nita
التاريخ
المشاهدات
654
التقييم
(لا توجد تقييمات)
Loading...
التحميل

Cryptography and Cryptanalysis in MATLAB
Creating and Programming Advanced Algorithms
Marius Iulian Mihailescu, Stefania Loredana Nita
Table of Contents
About the Authors
Technical Reviewer Chapter 1: Getting Started in Cryptography and Cryptanalysis Cryptography and Cryptanalysis
Book Structure
Conclusion
References
Chapter 2: MATLAB Cryptography Functions Conclusion
References
Chapter 3: Conversions Used in MATLAB for Cryptography Conclusion
References
Chapter 4: Basic Arithmetic Foundations Euclid’s Division Lemma
Greatest Common
Divisor (gcd) Euclid’s Algorithm
The Extended
Euclidean Algorithm Practical
Implementations The
Extended Euclidean Algorithm Prime Factors
in MATLAB Computing the
Modular Inverse Conclusion
References
Index
A
Advanced Encryption System
(AES), 103, 114
AES S-box, 116
encrypt, 115
expansion, 118
mixcolumn operation, 117–119
round key operation, 118
rules, 117
shiftrows operation, 117
SubBytes, 119
Algebraic structures, 47, 48
Asymmetric encryption, 125–127, 131
Asymptotic bound, 146
B
Bayes’ Theorem, 144
Beth-Piper Generator, 74
Big integers, 25–27, 47
BinEdges, 78
Birthday attack, 84, 85, 87
Birthday paradox, 88
Birthday problem, 145
Bitand, 7
Bitcmp, 7
Bitget, 7
Bitor, 7
Bitset, 7
Bitshift, 7
Bitwise functions, 8–10
Bitxor, 8
Blum-Blum-Shub (BBS), 73, 74
C
Caesar Cipher
cryptanalysis, 54
encryption/decryption
operations, 53, 54
implementation, 55–57
mathematical function, 54
procedure, 53
Chaos-based cryptography, 159
vs. algorithms, 160
origin, 159
Chaos functions, 160
Chaos maps, 160
Chaotic cryptanalysis, 159
Chaotic cryptology, 159
Chaotic dynamic system, 162
Chinese Remainder Theorem, 39
Chosen-plaintext attack (CPA), 108
Congruency, 38, 39
Conversion mechanism
integers into lowercase strings, 17, 18
integers into uppercase strings, 18, 19
lowercase string into array of
integers, 19, 20
lowercase strings into integers, 18, 19
uppercase string into array of integers, 21192
Coprime numbers, 27, 36
Correlation coefficients
analysis (CCA), 169–171
Cryptanalysis, 3, 54, 64
Cryptographic primitive, 3, 49
Cryptography, 2–6, 143
Cryptology, 2
D
Data Encryption System (DES), 103
decryption output, 113
description, 109
encryption output, 113
implementation, 110
NIST standard, 112
script output, 111
Decryption algorithm, 126, 127
Differential cryptanalysis, 107, 108
E
Echo hiding, 180
eig functions, 13
Electronic communications, 1
ElGamal, 132, 133, 136, 137
Encryption algorithm, 108, 127
Encryption function, 3, 54, 60, 61, 94
Entropy, 67, 147, 151, 168, 169
Equivocation, 148
Euclid algorithm, 26
Euclid’s Division Lemma, 26, 27
Extended Euclidean
algorithm, 26, 28–30
F
factor function, 30, 31
Factorization algorithms, 25, 26
Federal Information Processing Standards
(FIPS), 109
Feistel cipher, 109
flip function, 13
From scratch implementation, 96
G
generate_coprime function, 46
getInstance method, 99
Gollmann Generator, 74
Greatest Common Divisor (gcd), 27
H
Hash class, 83
Hash function, 83
Command Window, 100
computing values, 101
cryptographic, 84, 85
implementation, 97
libraries/namespaces, 96
MATLAB, 96
workflow, 97
Hill Cipher
cryptanalysis, 64
decryption, 64
implementation, 65
matrix multiplication, 64
matrix structure, 63
Histogram analysis, 166, 167, 173, 187
Homomorphic encryption, 48, 126, 131
Homomorphism, 48
I
Initial permutation (IP), 109
Integer Factorization Problem (IFP), 25
Iterated cipher, 103, 105
Index193
J
Joint entropy, 147
K
Key generation algorithm, 127, 130, 132
Key schedule, 103, 105
Key space, 169, 173
Knapsack problem, 138
Knowledge secure, 2
L
Least significant bit (LSB) method, 181
hiding, 181, 184
histogram, 187, 189
Linear approximations, S-boxes, 107
Linear cryptanalysis, 106, 107
Linear feedback shift register (LFSR), 74
Little Fermat Primality Test
description, 42
implementation, 42, 43
pseudoprime, 44
result, 44, 46
variation, 44, 45
Logistic map, 161
Lyapunov Exponent, 172, 173
M
Maclaurin Series, 86, 87
Matrices, 11, 12
MD4 function, 89, 90
cryptanalysis, 93
phases, 93
MD5 function, 94
Merkle-Hellman cryptosystem, 138
algorithm, 138
knapsack, 138
Mersenne prime, 37
Message Digest (MD), 89
Miller-Rabin Primality Test, 47
MixColumns operation, 119
Modular inverse, 31, 32
N
Number of Pixel Change Rate (NPCR),
162–164
numel function, 12
O
Occupancy problem, 146, 147
P
Parity coding, 180
Partially homomorphic
encryption, 132, 137
Permutation ciphers, 51
Phase coding, 180
Piling-up Lemma, 107
poly functions, 13, 14
Primality tests, 40
Little Fermat Primality Test, 42–44, 46
Miller-Rabin primality test, 47
Wilson Primality Test, 40–42
Prime factors, MATLAB, 30, 31
Prime numbers
conjectures, 38
definitions, 35
for loop, 37
function, 38
is_prime function, 37
Mersenne prime, 37
primality, 36, 37
Index194
Prime number theorem, 38
Probability theory, 143, 144
Pseudo-random number generators
(PRNGs), 69, 70, 148, 149
Blum-Micali, 75
congruential, 71, 72
histogram, 78
linear circuits, 74
MATLAB workspace, 80
practical implementations, 75–77
Public key cryptography
(PKC), 125, 126
Q
Quadratic residual generator, 73
R
rand function, 10
Random numbers, 21, 22, 69
Random variables, 145
Ranrot generators, 72, 73
Real-time video steganography, 181
roots functions, 13, 15
Round function, 103
Round key mixing, 106
Round keys, 103
RSA cryptosystem, 127, 128, 130, 131
S
Second-type Stirling number, 146
Security solution, 1
Sensitivity analysis, 169
Sensitivity, initial conditions, 172
SHA1 function, 95
ShiftRows operation, 119
Spread spectrum, 180
State compromise extensions, 70
Steganography, 179, 180
audio files, 180
encryption/scattering, 180
filtering/masking, 180
LSB, 180
video files, 181
Stego-image, 179
Substitution ciphers, 51
Swapbytes, 7, 8
Symmetric cryptography, 51, 66
Symmetric encryption, 51, 52, 125
T
True random number
generators (TRNG), 148
U
Unified Average Changing Intensity
(UACI), 165, 166
V
Vigenère Cipher
encryption process, 58, 59
implementation, 61–63
mathematical aspects, 60
plaintext, 60
Shift Encryption function, 62
tabula recta, 57, 58
Visual cryptography, 153, 154, 156, 157
W, X, Y, Z
Wilson Primality Test, 40–42

كلمة سر فك الضغط : books-world.net
The Unzip Password : books-world.net

تحميل

يجب عليك التسجيل في الموقع لكي تتمكن من التحميل

تسجيل | تسجيل الدخول