0

Cryptography and Cryptanalysis in MATLAB

eBook - Creating and Programming Advanced Algorithms

Erschienen am 11.09.2021, 1. Auflage 2021
73,95 €
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9781484273340
Sprache: Englisch
Umfang: 0 S., 6.81 MB
E-Book
Format: PDF
DRM: Digitales Wasserzeichen

Beschreibung

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB.

Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB.

What You Will Learn

Discover MATLABs cryptography functionsWork with conversion mechanisms in MATLAB Implement cryptographic algorithms using arithmetic operationsUnderstand the classical, simple cryptosystems that form the basis of modern cryptographyDevelop fully working solutions (encryption/decryption operations)Study pseudo-random generators and their real-life implementationsUtilize hash functions by way of practical examplesImplement solutions to defend against practical cryptanalysis methods and attacksUnderstand asymmetric and symmetric encryption systems and how to use them Leverage visual cryptography, steganography, and chaos-based cryptography

Who This Book Is For

Those who are new to cryptography/analysis.  Some prior exposure to MATLAB recommended. 

Autorenportrait

Marius Iulian Mihailescu, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, Titu Maiorescu University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT Officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructures, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.

Stefania Loredana Nita, PhD is a software developer at the Institute of Computer Science of the Romanian Academy and a Fellow PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such asAdvanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.

Inhalt

1. Introduction.- 2. MATLAB Cryptography Functions.- 3. Conversions used in Cryptography.- 4. Basic Arithmetic Foundations.- 5. Number Theory.- 6. Classical Cryptography.- 7. Pseudo Random Generators.- 8. Hash Functions.- 9. Formal Techniques for Cryptography.- 10. Symmetric Encryption Schemes with Case Studies.- 11. Asymmetric Encryption Schemes.- 12. Visual Cryptography.- 13. Steganography.- 14. Chaos-based Cryptography.


--------------------------------------------------------------------------------------------------------------

OLD ToC below

PART 1 - FOUNDATIONS.

1. Cryptography Fundamentals.- 2. Mathematical Background and Its Applicability.- 3. Large Integer Arithmetic.- 4. Floating-point Arithmetic.- 5. New Features in MATLAB 10.- 6. Secure Coding Guidelines.- 7. Cryptography Libraries in MATLAB

PART 2 PRO CRYPTOGRAPHY.

8. Elliptic-curve Cryptography and Public Key Algorithms.- 9. Lattice-based Cryptography.- 10. Searchable Encryption.- 11. Homomorphic Encryption.- 12. Learning with Errors and Ring Learning with Errors Cryptography.- 13. Chaos-based Cryptography.- 14. Big Data Cryptography.- 15. Cloud Computing Cryptography.

PART 3 PRO CRYPTANALYSIS.

16. Introduction to Cryptanalysis.- 17. General notions for Conducting Cryptanalysis Attacks.- 18. Linear and Differential Cryptanalysis.- 19. Integral Cryptanalysis.- 20. Attacks.- 21. Text Characterization.- 22. Basic Implementations of Cryptanalysis Methods.

Informationen zu E-Books

„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.

Von uns werden digitale Bücher in drei Formaten ausgeliefert:
Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.

Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.

Die Fortsetzung der 'Elfenerbe'-Reihe

 
ELFENERBE - Der gefangene Prinz

ELFENERBE - Der gefangene Prinz

von Black, Holly

Zum Artikel