applied cryptography - protocols, algorithms, and source code in c

Scott 75 straight permutation 275 strassen volker 259

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: –344 CRYPTO-MECCANO, 346 designing, 351 design theory, 346–351 Feistel networks, 347 group structure, 348 S-box, 349–351 simple relations, 347–348 strength against differential and linear cryptanalysis, 348–349 weak keys, 348 double encryption, 357–358 double OFB/counter, 363–364 doubling length, 363 electronic codebook mode, 189–191, 208–210 encryption speeds, 355 FEAL, 308–312 feedback, 193 GOST, 331–334 IDEA, 319–325 iterated, 347 Li-Wang algorithm, 346 LOKI, 314–316 Lucifer, 303–304 Madryga, 304–306 McEliece algorithm, 346 MMB, 325–327 multiple encryption, 357 NewDES, 306–308 Rao-Nam algorithm, 346 RC2, 318–319 RC5, 344–346 REDOC II, 311–313 REDOC III, 313 SAFER K-64, 339–341 security, based on one-way hash functions, 353–354 Skipjack, 328–329 versus stream ciphers, 210–211 SXAL8/MBAL, 344 triple encryption, 358–363 3–Way, 341–342 using one-way hash functions, 351–354 whitening, 366–367 xDES1, 365–366 Block length, doubling, 363 Block replay, 191–193 Blocks, 4 Blowfish, 336–339, 354, 647–654 Blum, Manuel, 89, 105, 108 Blum, Blum, and Shub generator, 417–418 Blum integers, 253 coin flipping, 543 zero-knowledge proofs, 549 Blum-Micali generator, 416–417 Boolean functions, in S-boxes, 350 Bosselaers, Antoon, 436, 441 Boyar, Joan, 369 Brassard, Gilles, 555, 557 Broadcasting: anonymous, 137–139 secret, 523–524 Brute-force attack, 8, 151–152 software-based, 154–155 time and cost estimates, 152–154 Bureau of Export Administration, 610–611 Burrows, Michael, 66 CA-1.1, 327–328 Cade algorithm, 500–501 Caesar Cipher, 11 CAFE, 606–607 CALC, 346 Cantwell Bill, 615–616 Capstone, 593–594 Cascade generators, 405 Cascades, Gollmann, 387–388 Cascading: multiple block algorithms, 367–368 multiple stream ciphers, 419–420 Cash, digital, see Digital cash Cassells, Ian, 381 CAST, 334–335 S-boxes, 349 CBC, see Cipher block chaining mode CCEP, 269, 598–599 CDMF, 366, 574 Cellhash, 446 Cellular automata, 500 Cellular automaton generator, 414 Certificates: Privacy-Enhanced Mail, 579 public-key, 185–187 X.509, 574–575 Certification authority, 186 Certification path, 576 Certified mail, digital, 122–123 Chaining variables, 436 Chambers, Bill, 385–386 Characteristics, 286–288 Chaum, David, 84, 115, 133, 137, 536, 549 Cheater, 27 sharing secrets with, 531 Chess Grandmaster Problem, 109 Chinese Lottery, 156–157 Chinese remainder theorem, 249–250, 470 Chor-Rivest knap...
View Full Document

Ask a homework question - tutors are online