Admin مدير المنتدى
عدد المساهمات : 18994 التقييم : 35488 تاريخ التسجيل : 01/07/2009 الدولة : مصر العمل : مدير منتدى هندسة الإنتاج والتصميم الميكانيكى
| موضوع: كتاب Cryptography and Cryptanalysis in MATLAB الجمعة 24 سبتمبر 2021, 9:42 pm | |
|
أخواني في الله أحضرت لكم كتاب Cryptography and Cryptanalysis in MATLAB Creating and Programming Advanced Algorithms Marius Iulian Mihailescu, Stefania Loredana Nita
و المحتوى كما يلي :
Table of Contents About the Authors Technical Reviewer Chapter 1: Getting Started in Cryptography and Cryptanalysis Cryptography and Cryptanalysis Book Structure Conclusion References Chapter 2: MATLAB Cryptography Functions Conclusion References Chapter 3: Conversions Used in MATLAB for Cryptography Conclusion References Chapter 4: Basic Arithmetic Foundations Euclid’s Division Lemma Greatest Common Divisor (gcd) Euclid’s Algorithm The Extended Euclidean Algorithm Practical Implementations The Extended Euclidean Algorithm Prime Factors in MATLAB Computing the Modular Inverse Conclusion References Index A Advanced Encryption System (AES), 103, 114 AES S-box, 116 encrypt, 115 expansion, 118 mixcolumn operation, 117–119 round key operation, 118 rules, 117 shiftrows operation, 117 SubBytes, 119 Algebraic structures, 47, 48 Asymmetric encryption, 125–127, 131 Asymptotic bound, 146 B Bayes’ Theorem, 144 Beth-Piper Generator, 74 Big integers, 25–27, 47 BinEdges, 78 Birthday attack, 84, 85, 87 Birthday paradox, 88 Birthday problem, 145 Bitand, 7 Bitcmp, 7 Bitget, 7 Bitor, 7 Bitset, 7 Bitshift, 7 Bitwise functions, 8–10 Bitxor, 8 Blum-Blum-Shub (BBS), 73, 74 C Caesar Cipher cryptanalysis, 54 encryption/decryption operations, 53, 54 implementation, 55–57 mathematical function, 54 procedure, 53 Chaos-based cryptography, 159 vs. algorithms, 160 origin, 159 Chaos functions, 160 Chaos maps, 160 Chaotic cryptanalysis, 159 Chaotic cryptology, 159 Chaotic dynamic system, 162 Chinese Remainder Theorem, 39 Chosen-plaintext attack (CPA), 108 Congruency, 38, 39 Conversion mechanism integers into lowercase strings, 17, 18 integers into uppercase strings, 18, 19 lowercase string into array of integers, 19, 20 lowercase strings into integers, 18, 19 uppercase string into array of integers, 21192 Coprime numbers, 27, 36 Correlation coefficients analysis (CCA), 169–171 Cryptanalysis, 3, 54, 64 Cryptographic primitive, 3, 49 Cryptography, 2–6, 143 Cryptology, 2 D Data Encryption System (DES), 103 decryption output, 113 description, 109 encryption output, 113 implementation, 110 NIST standard, 112 script output, 111 Decryption algorithm, 126, 127 Differential cryptanalysis, 107, 108 E Echo hiding, 180 eig functions, 13 Electronic communications, 1 ElGamal, 132, 133, 136, 137 Encryption algorithm, 108, 127 Encryption function, 3, 54, 60, 61, 94 Entropy, 67, 147, 151, 168, 169 Equivocation, 148 Euclid algorithm, 26 Euclid’s Division Lemma, 26, 27 Extended Euclidean algorithm, 26, 28–30 F factor function, 30, 31 Factorization algorithms, 25, 26 Federal Information Processing Standards (FIPS), 109 Feistel cipher, 109 flip function, 13 From scratch implementation, 96 G generate_coprime function, 46 getInstance method, 99 Gollmann Generator, 74 Greatest Common Divisor (gcd), 27 H Hash class, 83 Hash function, 83 Command Window, 100 computing values, 101 cryptographic, 84, 85 implementation, 97 libraries/namespaces, 96 MATLAB, 96 workflow, 97 Hill Cipher cryptanalysis, 64 decryption, 64 implementation, 65 matrix multiplication, 64 matrix structure, 63 Histogram analysis, 166, 167, 173, 187 Homomorphic encryption, 48, 126, 131 Homomorphism, 48 I Initial permutation (IP), 109 Integer Factorization Problem (IFP), 25 Iterated cipher, 103, 105 Index193 J Joint entropy, 147 K Key generation algorithm, 127, 130, 132 Key schedule, 103, 105 Key space, 169, 173 Knapsack problem, 138 Knowledge secure, 2 L Least significant bit (LSB) method, 181 hiding, 181, 184 histogram, 187, 189 Linear approximations, S-boxes, 107 Linear cryptanalysis, 106, 107 Linear feedback shift register (LFSR), 74 Little Fermat Primality Test description, 42 implementation, 42, 43 pseudoprime, 44 result, 44, 46 variation, 44, 45 Logistic map, 161 Lyapunov Exponent, 172, 173 M Maclaurin Series, 86, 87 Matrices, 11, 12 MD4 function, 89, 90 cryptanalysis, 93 phases, 93 MD5 function, 94 Merkle-Hellman cryptosystem, 138 algorithm, 138 knapsack, 138 Mersenne prime, 37 Message Digest (MD), 89 Miller-Rabin Primality Test, 47 MixColumns operation, 119 Modular inverse, 31, 32 N Number of Pixel Change Rate (NPCR), 162–164 numel function, 12 O Occupancy problem, 146, 147 P Parity coding, 180 Partially homomorphic encryption, 132, 137 Permutation ciphers, 51 Phase coding, 180 Piling-up Lemma, 107 poly functions, 13, 14 Primality tests, 40 Little Fermat Primality Test, 42–44, 46 Miller-Rabin primality test, 47 Wilson Primality Test, 40–42 Prime factors, MATLAB, 30, 31 Prime numbers conjectures, 38 definitions, 35 for loop, 37 function, 38 is_prime function, 37 Mersenne prime, 37 primality, 36, 37 Index194 Prime number theorem, 38 Probability theory, 143, 144 Pseudo-random number generators (PRNGs), 69, 70, 148, 149 Blum-Micali, 75 congruential, 71, 72 histogram, 78 linear circuits, 74 MATLAB workspace, 80 practical implementations, 75–77 Public key cryptography (PKC), 125, 126 Q Quadratic residual generator, 73 R rand function, 10 Random numbers, 21, 22, 69 Random variables, 145 Ranrot generators, 72, 73 Real-time video steganography, 181 roots functions, 13, 15 Round function, 103 Round key mixing, 106 Round keys, 103 RSA cryptosystem, 127, 128, 130, 131 S Second-type Stirling number, 146 Security solution, 1 Sensitivity analysis, 169 Sensitivity, initial conditions, 172 SHA1 function, 95 ShiftRows operation, 119 Spread spectrum, 180 State compromise extensions, 70 Steganography, 179, 180 audio files, 180 encryption/scattering, 180 filtering/masking, 180 LSB, 180 video files, 181 Stego-image, 179 Substitution ciphers, 51 Swapbytes, 7, 8 Symmetric cryptography, 51, 66 Symmetric encryption, 51, 52, 125 T True random number generators (TRNG), 148 U Unified Average Changing Intensity (UACI), 165, 166 V Vigenère Cipher encryption process, 58, 59 implementation, 61–63 mathematical aspects, 60 plaintext, 60 Shift Encryption function, 62 tabula recta, 57, 58 Visual cryptography, 153, 154, 156, 157 W, X, Y, Z Wilson Primality Test, 40–42 #ماتلاب,#متلاب,#Matlab,
كلمة سر فك الضغط : books-world.net The Unzip Password : books-world.net أتمنى أن تستفيدوا من محتوى الموضوع وأن ينال إعجابكم رابط من موقع عالم الكتب لتنزيل كتاب Cryptography and Cryptanalysis in MATLAB رابط مباشر لتنزيل كتاب Cryptography and Cryptanalysis in MATLAB
|
|