03899nam 22005655 450 991025483830332120200629155449.010.1007/978-3-319-49530-9(CKB)3710000001072426(DE-He213)978-3-319-49530-9(MiAaPQ)EBC4811135(PPN)19887300X(EXLCZ)99371000000107242620170221d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierFeistel Ciphers Security Proofs and Cryptanalysis /by Valerie Nachef, Jacques Patarin, Emmanuel Volte1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XV, 309 p. 39 illus., 6 illus. in color.) 3-319-49528-3 3-319-49530-5 Includes bibliographical references at the end of each chapters.Part 1 Definitions and first security results -- Chapter 1 Classical Feistel ciphers, first properties -- Chapter 2 Generalized Feistel ciphers, first properties -- Chapter 3 Luby-Rackoff Theorems -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis -- Chapter 6 Classical Feistel ciphers -- Chapter 7 Contracting Feistel ciphers -- Chapter 8 Expanding Feistel ciphers -- Chapter 9 Generalized Feistel ciphers -- Chapter 10 Classical Feistel ciphers with internal permutations -- Part 3: DES and other specific Feistel ciphers -- Chapter 11 DES (Definition, differential and linear cryptanalysis of DES) -- Chapter 12 3DES with 2 keys -- Chapter 13: XDES, 3DES with 3 keys -- Chapter 14 Bear-Lion, Cast, RC6, MARS, Coconut, Simon, Lucifer -- Part 4 Improved security results -- Chapter 15 Proofs beyond the birthday bound with the coupling method -- Chapter 16 Proofs beyond the birthday bound with the coefficient H method -- Chapter 17 Proofs based on games -- Chapter 18 Indifferentiability.This book provides a comprehensive survey of different kinds of Feistel ciphers, including their definition and mathematical/computational properties. Feistel Networks form the base design of the Data Encryption Standard algorithm, a former US NIST standard block cipher, originally released in 1977, and the framework used by several other symmetric ciphers ever since. The results consolidated in this volume provide an overview of this important cipher design to researchers and practitioners willing to understand the design and security analysis of Feistel ciphers.Data encryption (Computer science)Mathematical statisticsComputer science—MathematicsComputer mathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Probability and Statistics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17036Mathematical Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/M13110Data encryption (Computer science).Mathematical statistics.Computer science—Mathematics.Computer mathematics.Cryptology.Probability and Statistics in Computer Science.Mathematical Applications in Computer Science.005.82Nachef Valerieauthttp://id.loc.gov/vocabulary/relators/aut1058796Patarin Jacquesauthttp://id.loc.gov/vocabulary/relators/autVolte Emmanuelauthttp://id.loc.gov/vocabulary/relators/autBOOK9910254838303321Feistel Ciphers2502517UNINA