The Design of Rijndael: AES - The Advanced Encryption StandardSpringer Science & Business Media, 14. 2. 2002 - 238 strán (strany) Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be ginning in January 1997; Rijndael was announced as the winner in October 2000. It was the "surprise winner" because many observers (and even some participants) expressed scepticism that the D.S. government would adopt as an encryption standard any algorithm that was not designed by D.S. citizens. Yet NIST ran an open, international, selection process that should serve as model for other standards organizations. For example, NIST held their 1999 AES meeting in Rome, Italy. The five finalist algorithms were designed by teams from all over the world. In the end, the elegance, efficiency, security, and principled design of Rijndael won the day for its two Belgian designers, Joan Daemen and Vincent Rijmen, over the competing finalist designs from RSA, IBM, Counterpane Systems, and an EnglishjIsraelijDanish team. This book is the story of the design of Rijndael, as told by the designers themselves. It outlines the foundations of Rijndael in relation to the previous ciphers the authors have designed. It explains the mathematics needed to and the operation of Rijndael, and it provides reference C code and underst test vectors for the cipher. |
Obsah
I | 5 |
III | 6 |
IV | 7 |
V | 8 |
VI | 9 |
VII | 10 |
VIII | 11 |
X | 13 |
XCIV | 107 |
XCV | 108 |
XCVI | 109 |
XCVII | 110 |
XCVIII | 113 |
XCIX | 115 |
C | 117 |
CI | 118 |
XI | 14 |
XIII | 15 |
XIV | 17 |
XVI | 18 |
XVII | 19 |
XVIII | 20 |
XIX | 21 |
XX | 23 |
XXI | 24 |
XXII | 25 |
XXIII | 26 |
XXV | 27 |
XXVI | 28 |
XXVII | 29 |
XXVIII | 31 |
XXIX | 32 |
XXX | 33 |
XXXII | 35 |
XXXIV | 37 |
XXXVI | 38 |
XXXVII | 41 |
XXXVIII | 42 |
XXXIX | 44 |
XL | 45 |
XLI | 47 |
XLII | 49 |
XLIII | 50 |
XLIV | 54 |
XLV | 57 |
XLVI | 58 |
XLVII | 59 |
XLVIII | 60 |
XLIX | 63 |
L | 64 |
LI | 65 |
LII | 66 |
LIII | 67 |
LVI | 68 |
LVII | 69 |
LVIII | 70 |
LIX | 71 |
LX | 72 |
LXIII | 73 |
LXIV | 74 |
LXV | 75 |
LXVI | 76 |
LXVII | 77 |
LXIX | 78 |
LXX | 81 |
LXXII | 82 |
LXXIII | 83 |
LXXIV | 85 |
LXXVI | 87 |
LXXVII | 89 |
LXXVIII | 91 |
LXXIX | 93 |
LXXXI | 94 |
LXXXII | 95 |
LXXXIII | 97 |
LXXXV | 98 |
LXXXVII | 99 |
LXXXVIII | 100 |
LXXXIX | 102 |
XC | 103 |
XCI | 104 |
XCII | 105 |
XCIII | 106 |
CIV | 119 |
CVI | 121 |
CVII | 122 |
CVIII | 123 |
CX | 124 |
CXI | 126 |
CXII | 127 |
CXIII | 129 |
CXIV | 130 |
CXV | 131 |
CXVI | 133 |
CXVII | 134 |
CXVIII | 135 |
CXIX | 137 |
CXXI | 138 |
CXXII | 140 |
CXXIV | 141 |
CXXV | 142 |
CXXVI | 146 |
CXXVII | 147 |
CXXVIII | 149 |
CXXIX | 151 |
CXXXI | 153 |
CXXXII | 154 |
CXXXIV | 156 |
CXXXV | 157 |
CXXXVII | 158 |
CXXXVIII | 159 |
CXXXIX | 160 |
CXLI | 161 |
CXLIII | 162 |
CXLIV | 164 |
CXLV | 165 |
CXLVII | 166 |
CXLVIII | 167 |
CXLIX | 169 |
CL | 173 |
CLII | 175 |
CLIII | 177 |
CLIV | 178 |
CLV | 179 |
CLVI | 181 |
CLVII | 182 |
CLVIII | 183 |
CLIX | 184 |
CLXII | 185 |
CLXIII | 186 |
CLXV | 187 |
CLXVI | 188 |
CLXVIII | 189 |
CLXXI | 192 |
CLXXII | 197 |
CLXXIII | 198 |
CLXXIV | 201 |
CLXXV | 202 |
CLXXVI | 204 |
CLXXVII | 206 |
CLXXVIII | 207 |
CLXXIX | 209 |
CLXXX | 213 |
CLXXXII | 214 |
CLXXXIV | 217 |
CLXXXV | 219 |
CLXXXVI | 223 |
231 | |
237 | |
Iné vydania - Zobraziť všetky
The Design of Rijndael: AES - The Advanced Encryption Standard Joan Daemen,Vincent Rijmen Obmedzený náhľad - 2013 |
Časté výrazy a frázy
active bundles active bytes active columns AddRoundKey affine transformation applied binary Boolean functions block cipher block length Boolean permutation bundle weight Chap cipher key ciphertext components computed correlation contribution correlation matrix criteria cryptographic defined denoted difference pattern difference propagation probability differential and linear differential branch number differential cryptanalysis differential trail efficient elements encryption expanded key finite field for(i for(j four rounds GF(p given Hence implementation independent inverse InvMixColumns key addition key expansion key length key schedule key-alternating cipher linear branch number linear codes linear cryptanalysis linear expressions linear over GF(2 linear trails linear transformation lower bounded maximum MixColumns mixing step multiplication non-linear step number of active number of rounds operation output parity pairs plaintext polynomial related-key attacks representation Rijndael round key round transformation Sect sequence ShiftRows specified structure SubBytes symmetry Theorem two-round Twofish upper bound weak keys word8
Populárne pasáže
Strana 229 - M.-L. Akkar and C. Giraud. An implementation of DES and AES, secure against some attacks.