Progress in cryptology
- 454pages
- 16 heures de lecture
The annotation covers a range of topics in cryptography, including symmetric and public-key cryptography, various attacks, and security protocols. It discusses symmetric cryptography attacks, focusing on non-randomness in eSTREAM candidates like Salsa20 and TSC-4, as well as differential and algebraic attacks on specific ciphers. The text also presents an algorithm for solving the LPN problem, which aids in evaluating the security of RFID authentication protocols. Updates on hash functions, including a new one based on RC4, are provided, alongside a discussion on the real-world security of VSH. The concept of provable security is examined through key agreement and cryptanalysis of secure cross-realm protocols. The importance of public-key validation in key agreement protocols is emphasized, along with efficient constructions for password-based authenticated key exchange. Further exploration includes symmetric cryptography design, the use of algorithms to compute immunity against algebraic attacks, and the enumeration of rotation symmetric Boolean functions. New enciphering schemes and authentication methods are introduced, alongside discussions on identity-based cryptography and secure cryptographic workflows. The annotation concludes with insights into embedded systems and side-channel attacks, highlighting vulnerabilities in AES implementations on ARM7TDMI and Galois LFSR.
