Algebraic Cryptanalysis

  • Gregory V.┬áBard

Table of contents

  1. Front Matter
    Pages 1-26
  2. Gregory V. Bard
    Pages 1-6
  3. Cryptanalysis

    1. Front Matter
      Pages 8-8
    2. Gregory V. Bard
      Pages 17-28
    3. Gregory V. Bard
      Pages 29-54
    4. Gregory V. Bard
      Pages 55-78
  4. Linear Systems Mod 2

    1. Front Matter
      Pages 80-80
    2. Gregory V. Bard
      Pages 107-132
    3. Gregory V. Bard
      Pages 133-158
    4. Gregory V. Bard
      Pages 159-183
  5. Polynomial Systems and Satisfiability

    1. Front Matter
      Pages 186-186
    2. Gregory V. Bard
      Pages 187-207
    3. Gregory V. Bard
      Pages 209-244
    4. Gregory V. Bard
      Pages 245-262
    5. Gregory V. Bard
      Pages 263-277
  6. Back Matter
    Pages 1-52

About this book

Introduction

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois.

The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks.

Additional topics include:

Analytic Combinatorics, and its application to cryptanalysis

The equicomplexity of linear algebra operations

Graph coloring

Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA

Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies.

Keywords

Abstract algebra Matrix algebraic cipher Keeloq computer science cryptanalysis cryptoanalysis cryptography currentjm linear algebra polynomial systems security

Authors and affiliations

  • Gregory V.┬áBard
    • 1
  1. 1.Dept. MathematicsFordham UniversityBronxU.S.A.

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-88757-9
  • Copyright Information Springer-Verlag US 2009
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-88756-2
  • Online ISBN 978-0-387-88757-9
  • About this book