Publicado por LAP LAMBERT Academic Publishing, 2010
ISBN 10: 3838345746 ISBN 13: 9783838345741
Idioma: Inglés
Librería: preigu, Osnabrück, Alemania
EUR 43,95
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Dynamic Cryptography Algorithm | Design, Implementation and Analysis with Applications | Sourabh Ghose | Taschenbuch | 92 S. | Englisch | 2010 | LAP LAMBERT Academic Publishing | EAN 9783838345741 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Publicado por LAP Lambert Academic Publishing, 2010
ISBN 10: 3838345746 ISBN 13: 9783838345741
Idioma: Inglés
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 112,81
Cantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Publicado por LAP LAMBERT Academic Publishing, 2010
ISBN 10: 3838345746 ISBN 13: 9783838345741
Idioma: Inglés
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 49,00
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cryptographers need to provide the world with a new encryption standard. DES, the major encryption algorithm for the past fifteen years, is nearing the end of its useful life. A more recent attack called XSL, proposes a new attack against AES and Serpent. Ciphers with small S-boxes and simple structures are particularly vulnerable. Serpent has small S-boxes and a simple structure. AES has larger S-boxes, but a very simple algebraic description. Many of the other unbroken algorithms Khufu, REDOC II, and IDEA-are protected by patents. RC2 is broken. The U.S. government has declassified the Skipjack algorithm in the Clipper and Capstone chips. If the world is to have a secure and freely- available encryption algorithm, we need to develop several candidate encryption algorithms now. These algorithms can then be subjected to years of public scrutiny and cryptanalysis. The book proposes a private-key block cipher algorithm. The block size is user defined, and the key can be of infinite length. The algorithm is a first of its kind dynamic algorithm in which almost all components change depending of the password itself used to generate a key or encrypt a file.