1 option
Cryptography and cryptanalysis in MATLAB : creating and programming advanced algorithms / Marius Iulian Mihailescu, Stefania Loredana Nita.
- Format:
- Book
- Author/Creator:
- Mihailescu, Marius Iulian, author.
- Nita, Stefania Loredana, author.
- Language:
- English
- Subjects (All):
- Cryptography--Standards.
- Cryptography.
- Physical Description:
- 1 online resource (201 pages)
- Place of Publication:
- New York, NY : Apress, [2021]
- Summary:
- Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB. Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB. What You Will Learn * Discover MATLAB's cryptography functions * Work with conversion mechanisms in MATLAB * Implement cryptographic algorithms using arithmetic operations * Understand the classical, simple cryptosystems that form the basis of modern cryptography * Develop fully working solutions (encryption/decryption operations) * Study pseudo-random generators and their real-life implementations * Utilize hash functions by way of practical examples * Implement solutions to defend against practical cryptanalysis methods and attacks * Understand asymmetric and symmetric encryption systems and how to use them * Leverage visual cryptography, steganography, and chaos-based cryptography Who This Book Is For Those who are new to cryptography/analysis. Some prior exposure to MATLAB recommended.
- Contents:
- Intro
- Table of Contents
- About the Authors
- About the Technical Reviewer
- Chapter 1: Getting Started in Cryptography and Cryptanalysis
- Cryptography and Cryptanalysis
- Book Structure
- Conclusion
- References
- Chapter 2: MATLAB Cryptography Functions
- Chapter 3: Conversions Used in MATLAB for Cryptography
- Chapter 4: Basic Arithmetic Foundations
- Euclid's Division Lemma
- Greatest Common Divisor (gcd)
- Euclid's Algorithm
- The Extended Euclidean Algorithm
- Practical Implementations
- Prime Factors in MATLAB
- Computing the Modular Inverse
- Chapter 5: Number Theory
- Primality and Factorization
- Prime Numbers
- The Prime Number Theorem
- Congruency
- Inverse
- Chinese Remainder Theorem
- Primality Tests
- The Wilson Primality Test
- The Little Fermat Primality Test
- The Miller-Rabin Primality Test
- Algebraic Structures
- Chapter 6: Classic Cryptography
- Symmetric Cryptography
- Classic Ciphers
- The Caesar Cipher
- Example
- Mathematical Background
- Cryptanalysis
- Implementing the Caesar Cipher
- The Vigenère Cipher
- Implementing the Vigenère Cipher
- The Hill Cipher
- Implementing the Hill Cipher
- Chapter 7: Pseudo-Random Number Generators
- Simple PRNGs
- Linear Congruential Generators
- Ranrot Generators
- Blum-Blum-Shub Generator
- Linear Circuit PRNGs
- Other PRNGs
- Chapter 8: Hash Functions
- Security of Hash Functions
- Cryptographic Hash Functions
- Birthday Attack
- MD4 Function
- MD4 Function Description
- Cryptanalysis of MD4
- MD5 Function
- SHA1 Function.
- Implementing Hash Functions
- Implementing SHA-1/256/368/512, MD2, and MD5
- Chapter 9: Block Ciphers: DES and AES
- Preliminaries
- Networks Based on Substitution and Permutation
- Attacks Based on Linear Cryptanalysis
- Attacks Based on Differential Cryptanalysis
- The Data Encryption Standard (DES)
- DES Description
- Implementation of DES
- The Advanced Encryption System (AES)
- SubBytes Operations
- The ShiftRows Operation
- The MixColumn Operation
- The AddRoundKey Operation
- Key Expansion
- InvSubBytes Operation
- InvShiftRows Operation
- InvMixColumns Operation
- Chapter 10: Asymmetric Encryption Schemes
- RSA
- ElGamal
- Merkle-Hellman
- Knapsack Approach
- The Algorithms
- Chapter 11: Formal Techniques for Cryptography
- Probability Theory
- Random Variables
- Birthday Problem
- Entropy
- Randomness in Cryptography
- Chapter 12: Visual Cryptography
- Chapter 13: Chaos-Based Cryptography
- Chaos Maps and Functions
- Logistic Map
- Chaos Theory in Cryptography
- Sensitivity to Initial Conditions
- Chapter 14: Steganography
- Algorithms and Methods for Different Steganography Types
- Steganography for Image Files
- Steganography for Audio Files
- Steganography for Video Files
- Practical Implementation
- Implementing the Least Significant Bit (LSB) Method
- Implementing the Histogram Analysis Method
- Index.
- Notes:
- Description based on print version record.
- ISBN:
- 9781484273340
- 1484273346
- OCLC:
- 1268205909
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.