Focusing on the analysis and design of the RC4 stream cipher, this book provides an in-depth exploration of its variants and related algorithms like HC-128. It begins with fundamental concepts of cryptography, including key cryptosystems and cipher types, before delving into advanced topics. Each chapter presents open research problems, fostering further inquiry, while a comprehensive bibliography serves as a valuable resource for RC4 literature. The authors leverage their extensive expertise in stream cipher cryptanalysis to offer insights into this widely used encryption method.
This work covers a range of topics in cryptography, including invited talks on Abelian varieties and their applications. It discusses sequences and presents a proof related to the joint linear complexity profile of multisequences. The period of the stream cipher Edon80 is analyzed alongside Boolean functions and S-boxes, focusing on the algebraic immunity of symmetric Boolean functions and the properties of highly nonlinear S-boxes against DPA attacks. The construction of universal one-way hash functions and optimal double-length hash functions is explored, alongside design principles for algorithms solving differential equations and combiners with memory.
Cryptanalysis is addressed through various methods, including attacks on the quadratic generator and the F-FCSRs, as well as the cryptanalysis of the Barni watermarking scheme and vulnerabilities in Oleshchuk’s public key cryptosystem. New constructions are introduced, such as an optimal subset cover for broadcast encryption and a novel NTRU-based cryptosystem. The work also revisits the security of identity-based encryption schemes and presents short undeniable signatures without random oracles.
Applications include attacks on asynchronous multi-party contract signing protocols and discussions on e-cash, featuring a universally composable scheme. Finally, implementations are examined, focusing on energy-privacy trade-offs in VLSI computations and efficient scalar multipli
Dieses Buch diskutiert modernste Techniken im Bereich der Contact-Tracing-Anwendungen. Dieses in der Medizin gut bekannte Thema hat aufgrund der COVID-19-Pandemie Aufmerksamkeit von Regierungen, verschiedenen Industrien und der akademischen Welt erhalten. Das Buch stellt eine Verbindung zwischen neuen Vorschlägen zu Contact-Tracing-Anwendungen und einer Kontext-Literaturübersicht hauptsächlich aus kryptologischer Sicht her. Da diese Anwendungen die Sicherheit und Privatsphäre von Personen betreffen, ist ihre Analyse aus kryptologischer Sicht von höchster Bedeutung. Daher werden die aktuellen Entwicklungen der weltweiten Vorschläge, einschließlich Singapur, Europa, USA, Australien und Indien, diskutiert. Durch eine eingehende Untersuchung der Designprinzipien jedes Protokolls ist dieses Buch für Forscher, Studierende und Fachleute gleichermaßen wertvoll. Inhaltsverzeichnis 1. Einführung und Vorbemerkungen.- 2. zentralisierte Systeme.- 3. dezentralisierte Protokolle zur Ermittlung von Kontaktpersonen.- 4. ein neues Protokoll zur Ermittlung von Kontaktpersonen.