Skip to main content

Cryptanalysis Attacks and Techniques

  • Chapter
  • First Online:
Pro Cryptography and Cryptanalysis with C++23

Abstract

This chapter covers the most important and useful cryptanalytic and cryptanalysis standards, validation methods, classification, and operations of cryptanalysis attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    CMVP, https://csrc.nist.gov/projects/cryptographic-module-validation-program

  2. 2.

    FIPS 140-2, https://csrc.nist.gov/publications/detail/fips/140/2/final

  3. 3.

    FIPS 140-3, https://csrc.nist.gov/publications/detail/fips/140/3/final

  4. 4.

    Claude Elwood Shannon, https://www.itsoc.org/about/shannon

References

  1. A. Atanasiu, Matematici in criptografie. Universul Stiintific, 2015. [Romanian Language]

    Google Scholar 

  2. A. Atanasiu, Securitatea Informatiei, vol. 1 (Criptografie), InfoData, 2007. [Romanian Language]

    Google Scholar 

  3. A. Atanasiu, Securitatea Informatiei, vol. 2 (Protocoale de securitate), InfoData, 2009. [Romanian Language]

    Google Scholar 

  4. S. J. Knapskog, “Formal specification and verification of secure communication protocols”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 58–73.

    Google Scholar 

  5. K. Koyama, “Direct demonstration of the power to break public-key cryptosystems”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 14–21.

    Google Scholar 

  6. P. J. Lee, “Secure user access control for public networks”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 45–57.

    Google Scholar 

  7. R. Lidl and W. B. Müller, “A note on strong Fibonacci pseudoprimes”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 311–317. doi: 10.1007/BFb0030371.

    Google Scholar 

  8. A. J. Menezes and S. A. Vanstone, “Elliptic curve cryptosystems and their implementation”, J. Cryptology, vol. 6, no. 4, pp. 209–224, Sep. 1993, doi: 10.1007/BF00203817.

    Google Scholar 

  9. M. J. Mihaljevic and J. Dj. Golic, ‘A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence’, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 165–175.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mihailescu, M.I., Nita, S.L. (2023). Cryptanalysis Attacks and Techniques. In: Pro Cryptography and Cryptanalysis with C++23. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9450-5_18

Download citation

Publish with us

Policies and ethics