My Account Log in

1 option

Cryptography and cryptanalysis in MATLAB : creating and programming advanced algorithms / Marius Iulian Mihailescu, Stefania Loredana Nita.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Mihailescu, Marius Iulian, author.
Nita, Stefania Loredana, author.
Language:
English
Subjects (All):
Cryptography--Standards.
Cryptography.
Physical Description:
1 online resource (201 pages)
Place of Publication:
New York, NY : Apress, [2021]
Summary:
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB. Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB. What You Will Learn * Discover MATLAB's cryptography functions * Work with conversion mechanisms in MATLAB * Implement cryptographic algorithms using arithmetic operations * Understand the classical, simple cryptosystems that form the basis of modern cryptography * Develop fully working solutions (encryption/decryption operations) * Study pseudo-random generators and their real-life implementations * Utilize hash functions by way of practical examples * Implement solutions to defend against practical cryptanalysis methods and attacks * Understand asymmetric and symmetric encryption systems and how to use them * Leverage visual cryptography, steganography, and chaos-based cryptography Who This Book Is For Those who are new to cryptography/analysis. Some prior exposure to MATLAB recommended.
Contents:
Intro
Table of Contents
About the Authors
About the Technical Reviewer
Chapter 1: Getting Started in Cryptography and Cryptanalysis
Cryptography and Cryptanalysis
Book Structure
Conclusion
References
Chapter 2: MATLAB Cryptography Functions
Chapter 3: Conversions Used in MATLAB for Cryptography
Chapter 4: Basic Arithmetic Foundations
Euclid's Division Lemma
Greatest Common Divisor (gcd)
Euclid's Algorithm
The Extended Euclidean Algorithm
Practical Implementations
Prime Factors in MATLAB
Computing the Modular Inverse
Chapter 5: Number Theory
Primality and Factorization
Prime Numbers
The Prime Number Theorem
Congruency
Inverse
Chinese Remainder Theorem
Primality Tests
The Wilson Primality Test
The Little Fermat Primality Test
The Miller-Rabin Primality Test
Algebraic Structures
Chapter 6: Classic Cryptography
Symmetric Cryptography
Classic Ciphers
The Caesar Cipher
Example
Mathematical Background
Cryptanalysis
Implementing the Caesar Cipher
The Vigenère Cipher
Implementing the Vigenère Cipher
The Hill Cipher
Implementing the Hill Cipher
Chapter 7: Pseudo-Random Number Generators
Simple PRNGs
Linear Congruential Generators
Ranrot Generators
Blum-Blum-Shub Generator
Linear Circuit PRNGs
Other PRNGs
Chapter 8: Hash Functions
Security of Hash Functions
Cryptographic Hash Functions
Birthday Attack
MD4 Function
MD4 Function Description
Cryptanalysis of MD4
MD5 Function
SHA1 Function.
Implementing Hash Functions
Implementing SHA-1/256/368/512, MD2, and MD5
Chapter 9: Block Ciphers: DES and AES
Preliminaries
Networks Based on Substitution and Permutation
Attacks Based on Linear Cryptanalysis
Attacks Based on Differential Cryptanalysis
The Data Encryption Standard (DES)
DES Description
Implementation of DES
The Advanced Encryption System (AES)
SubBytes Operations
The ShiftRows Operation
The MixColumn Operation
The AddRoundKey Operation
Key Expansion
InvSubBytes Operation
InvShiftRows Operation
InvMixColumns Operation
Chapter 10: Asymmetric Encryption Schemes
RSA
ElGamal
Merkle-Hellman
Knapsack Approach
The Algorithms
Chapter 11: Formal Techniques for Cryptography
Probability Theory
Random Variables
Birthday Problem
Entropy
Randomness in Cryptography
Chapter 12: Visual Cryptography
Chapter 13: Chaos-Based Cryptography
Chaos Maps and Functions
Logistic Map
Chaos Theory in Cryptography
Sensitivity to Initial Conditions
Chapter 14: Steganography
Algorithms and Methods for Different Steganography Types
Steganography for Image Files
Steganography for Audio Files
Steganography for Video Files
Practical Implementation
Implementing the Least Significant Bit (LSB) Method
Implementing the Histogram Analysis Method
Index.
Notes:
Description based on print version record.
ISBN:
9781484273340
1484273346
OCLC:
1268205909

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account