If These Halls Could Talk: A Historical Tour through San Francisco Recording Studios (Paperback)
暫譯: 如果這些錄音室會說話:舊金山錄音室的歷史之旅 (平裝本)

Heather Johnson

  • 出版商: Course Technology
  • 出版日期: 2006-05-04
  • 定價: $900
  • 售價: 2.2$199
  • 語言: 英文
  • 頁數: 350
  • 裝訂: Paperback
  • ISBN: 1598631411
  • ISBN-13: 9781598631418
  • 相關分類: CiscoApple Developer
  • 立即出貨(限量) (庫存=4)

買這商品的人也買了...

商品描述

Description

Innovative Cryptography, second edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations.

In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational-probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type.

Innovative Cryptography, second edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.

 

Features

  • Provides analysis and evaluation of the results of using controlled substitution-permutation networks (CSPNs) and permutation networks (PNs) for implementing data-dependent operations
  • Discusses the issue of introducing a new command into universal processors, which will sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type
  • Covers the mathematical basics of symmetric and asymmetric cryptography, including the systems of public key distribution and digital signatures
  • Explores new advances in the development of the practical approaches to the synthesis of block ciphers based on controlled transforms
  • Provides classification and description of mathematical properties of new cryptographic primitives
  • Presents cryptoschemes oriented toward effective use of data-dependent operations, a range of new fast block ciphers, and evaluates their resistance to cryptanalysis.

 

Table of Contents

Introduction; Chapter 1:Cryptography in the Information Age; Chapter 2: Flexible Software Ciphers; Chapter 3:Controlled Permutation; Chapter 4:Controlled Operational Substitutions; Chapter 5: Designing Fast Ciphers Based on Controlled Operations; Chapter 6: Elements of the Cryptanalysis of Ciphers Based on Controlled Operations; Conclusion; Glossary;References; Index

商品描述(中文翻譯)

**描述**

《創新密碼學》第二版提供了對當前密碼學領域最新研究成果的前沿評估和回顧,並探討如何有效地實施這些新技術。書中涵蓋了當前的密碼學問題並提出實用的解決方案。該書還討論了對稱密碼和對稱區塊密碼的角色,並詳細說明了硬體(DES)、軟體(RC5、Blowfish)和通用(AES、RC6、Twofish、IDEA、GOST)實現中對快速對稱密碼的需求。

此外,該書還涵蓋了與軟體導向密碼的開發和設計相關的問題,包括基於根據秘密金鑰形成的算法的密碼。考慮了一些與具有靈活數據轉換算法的密碼的密碼強度相關的具體問題,並建議了一種組合概率模型,以獲得所考慮的軟體密碼的最小評估。書中還討論了一種被建議用於通用處理器的極具前景的新指令。這條指令執行受控的位元置換,預期將顯著提高包括任意類型位元置換在內的密碼算法的性能。

《創新密碼學》第二版是為所有參與密碼工具開發的人士而寫,包括工程師、研究人員、程式設計師和IT安全專業人士。

**特點**

- 提供對使用受控替代-置換網路(CSPNs)和置換網路(PNs)實施數據依賴操作結果的分析和評估
- 討論將新指令引入通用處理器的問題,這將顯著提高包括任意類型位元置換在內的密碼算法的性能
- 涵蓋對稱和非對稱密碼學的數學基礎,包括公鑰分發系統和數位簽名
- 探索基於受控變換的區塊密碼合成的實用方法的新進展
- 提供新密碼原語的數學性質的分類和描述
- 提出針對有效使用數據依賴操作的密碼方案、一系列新的快速區塊密碼,並評估其對密碼分析的抵抗力。

**目錄**

引言;第1章:信息時代的密碼學;第2章:靈活的軟體密碼;第3章:受控置換;第4章:受控操作替代;第5章:基於受控操作設計快速密碼;第6章:基於受控操作的密碼分析要素;結論;術語表;參考文獻;索引