LEADER 04846nam 2200469 450 001 9910503003203321 005 20220618135926.0 010 $a1-4842-7334-6 035 $a(CKB)4100000012025963 035 $a(MiAaPQ)EBC6725083 035 $a(Au-PeEL)EBL6725083 035 $a(OCoLC)1268205909 035 $a(CaSebORM)9781484273340 035 $a(PPN)25805834X 035 $a(EXLCZ)994100000012025963 100 $a20220618d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography and cryptanalysis in MATLAB $ecreating and programming advanced algorithms /$fMarius Iulian Mihailescu, Stefania Loredana Nita 210 1$aNew York, NY :$cApress,$d[2021] 210 4$d©2021 215 $a1 online resource (201 pages) 311 $a1-4842-7333-8 327 $aIntro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Getting Started in Cryptography and Cryptanalysis -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: MATLAB Cryptography Functions -- Conclusion -- References -- Chapter 3: Conversions Used in MATLAB for Cryptography -- Conclusion -- References -- Chapter 4: Basic Arithmetic Foundations -- Euclid's Division Lemma -- Greatest Common Divisor (gcd) -- Euclid's Algorithm -- The Extended Euclidean Algorithm -- Practical Implementations -- The Extended Euclidean Algorithm -- Prime Factors in MATLAB -- Computing the Modular Inverse -- Conclusion -- References -- Chapter 5: Number Theory -- Primality and Factorization -- Prime Numbers -- The Prime Number Theorem -- Congruency -- Inverse -- Chinese Remainder Theorem -- Primality Tests -- The Wilson Primality Test -- The Little Fermat Primality Test -- The Miller-Rabin Primality Test -- Algebraic Structures -- Conclusion -- References -- Chapter 6: Classic Cryptography -- Symmetric Cryptography -- Classic Ciphers -- The Caesar Cipher -- Example -- Mathematical Background -- Cryptanalysis -- Implementing the Caesar Cipher -- The Vigenère Cipher -- Example -- Mathematical Background -- Implementing the Vigenère Cipher -- The Hill Cipher -- Example -- Cryptanalysis -- Implementing the Hill Cipher -- Conclusion -- References -- Chapter 7: Pseudo-Random Number Generators -- Simple PRNGs -- Linear Congruential Generators -- Ranrot Generators -- Blum-Blum-Shub Generator -- Linear Circuit PRNGs -- Other PRNGs -- Practical Implementations -- Conclusion -- References -- Chapter 8: Hash Functions -- Security of Hash Functions -- Cryptographic Hash Functions -- Birthday Attack -- MD4 Function -- MD4 Function Description -- Cryptanalysis of MD4 -- MD5 Function -- SHA1 Function. 327 $aImplementing Hash Functions -- Implementing SHA-1/256/368/512, MD2, and MD5 -- Conclusion -- References -- Chapter 9: Block Ciphers: DES and AES -- Preliminaries -- Networks Based on Substitution and Permutation -- Attacks Based on Linear Cryptanalysis -- Attacks Based on Differential Cryptanalysis -- The Data Encryption Standard (DES) -- DES Description -- Implementation of DES -- The Advanced Encryption System (AES) -- SubBytes Operations -- The ShiftRows Operation -- The MixColumn Operation -- The AddRoundKey Operation -- Key Expansion -- InvSubBytes Operation -- InvShiftRows Operation -- InvMixColumns Operation -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- Knapsack Approach -- The Algorithms -- Conclusion -- References -- Chapter 11: Formal Techniques for Cryptography -- Probability Theory -- Random Variables -- Birthday Problem -- Entropy -- Randomness in Cryptography -- Conclusion -- References -- Chapter 12: Visual Cryptography -- Conclusion -- References -- Chapter 13: Chaos-Based Cryptography -- Chaos Maps and Functions -- Logistic Map -- Chaos Theory in Cryptography -- Sensitivity to Initial Conditions -- Conclusion -- References -- Chapter 14: Steganography -- Algorithms and Methods for Different Steganography Types -- Steganography for Image Files -- Steganography for Audio Files -- Steganography for Video Files -- Practical Implementation -- Implementing the Least Significant Bit (LSB) Method -- Implementing the Histogram Analysis Method -- Conclusion -- References -- Index. 606 $aCryptography$xStandards 606 $aCryptography 615 0$aCryptography$xStandards. 615 0$aCryptography. 676 $a005.8 700 $aMihailescu$b Marius Iulian$01070283 702 $aNita$b Stefania Loredana 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910503003203321 996 $aCryptography and cryptanalysis in MATLAB$92877681 997 $aUNINA