Partition-Based Trapdoor Ciphers

Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that cou...

Full description

Saved in:
Bibliographic Details
Other Authors: Bannier, Arnaud (Editor), Filiol, Eric (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2017
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_129577
005 20231201
003 oapen
006 m o d
007 cr|mn|---annan
008 20231201s2017 xx |||||o ||| 0|eng d
020 |a intechopen.69485 
020 |a 9789535133858 
020 |a 9789535133865 
020 |a 9789535146582 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.69485  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UTN  |2 bicssc 
100 1 |a Bannier, Arnaud  |4 edt 
700 1 |a Filiol, Eric  |4 edt 
700 1 |a Bannier, Arnaud  |4 oth 
700 1 |a Filiol, Eric  |4 oth 
245 1 0 |a Partition-Based Trapdoor Ciphers 
260 |b IntechOpen  |c 2017 
300 |a 1 electronic resource (92 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that could enable an attacker to break those systems in an operational way. Such features are called backdoors or trapdoors. The present book intends to address the feasibility of a particular class of such backdoors based on partitionning the plaintext and ciphertext message spaces. Going from the theory to the practical aspects, it is shown that mathematical backdoors in encryption systems are possible. This book, thus, intends to initiate a new field of research. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc/4.0/ 
546 |a English 
650 7 |a Network security  |2 bicssc 
653 |a cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/6309/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/129577  |7 0  |z DOAB: description of the publication