Partition-Based Trapdoor Ciphers
Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that cou...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2017
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_129577 | ||
005 | 20231201 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231201s2017 xx |||||o ||| 0|eng d | ||
020 | |a intechopen.69485 | ||
020 | |a 9789535133858 | ||
020 | |a 9789535133865 | ||
020 | |a 9789535146582 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/intechopen.69485 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTN |2 bicssc | |
100 | 1 | |a Bannier, Arnaud |4 edt | |
700 | 1 | |a Filiol, Eric |4 edt | |
700 | 1 | |a Bannier, Arnaud |4 oth | |
700 | 1 | |a Filiol, Eric |4 oth | |
245 | 1 | 0 | |a Partition-Based Trapdoor Ciphers |
260 | |b IntechOpen |c 2017 | ||
300 | |a 1 electronic resource (92 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that could enable an attacker to break those systems in an operational way. Such features are called backdoors or trapdoors. The present book intends to address the feasibility of a particular class of such backdoors based on partitionning the plaintext and ciphertext message spaces. Going from the theory to the practical aspects, it is shown that mathematical backdoors in encryption systems are possible. This book, thus, intends to initiate a new field of research. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Network security |2 bicssc | |
653 | |a cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/6309/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/129577 |7 0 |z DOAB: description of the publication |