Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
1.1 Cryptographic Algorithms 3 ...................................
1.2 Block Ciphers 4 .............................................
1.3 Cryptographer and Cryptanalyst 5 ..............................
1.4 Security 10 ..................................................
1.5 Summary 11 .................................................
2 DES
2.1 DES Description 14 ...........................................
2.1.1 The Round Function 17 ..................................
2.2 Design Features
2.3 Structural Properties
2.3.2 Weak and Semi-Weak Keys 28 ............................
2.4 DES Variants
2.4.1 Triple-DES 30 .........................................
2.4.2 DESX 32 ..............................................
2.5 DES in Context
2.6 Getting to the Source
3 AES
3.1 AES Description
3.1.1 Arithmetic in GF(2")
3.1.2 Encryption with the AES
3.1.3 Decryption with the AES
3.1.4 AES Key Schedule
3.1.5 AES Design Features
3.2 AES State of the Art
3.2.3 Algebraic Analysis
3.2.4 Related-Key Cryptanalysis
3.2.5 Side-Channel Cryptanalysis
3.4 Getting to the Source
4 Using Block Ciphers
4.1 Block Encryption
4.1.2 Cipher Block Chaining Mode
4.2 Stream Encryption
4.2.2 Output Feedback Mode
4.2.3 Counter Mode
4.3 Starting and Finishing
4.3.2 Padding
4.3.3 Ciphertext Stealing
4.4 Authentication
4.4.1 CBC-MAC
4.4.2 OMAC
4.5 Authenticated Encryption
4.5.1 CCM Mode
4.5.2 EAX Mode
4.6 Hashing
4.6.2 Double Block Length Constructions
4.6.3 The SHA-3 Competition
4.7 Getting to the Source
5 Brute Force Attacks
5.1 Time-Memory Trade-offs
← Prev
Back
Next →
← Prev
Back
Next →