Narrow your search

Library

KU Leuven (2)

KBC (1)

ULiège (1)


Resource type

book (2)

dissertation (1)


Language

English (3)


Year
From To Submit

2019 (1)

2018 (1)

2006 (1)

Listing 1 - 3 of 3
Sort by

Dissertation
Elementary statistical methods of cryptography
Authors: --- --- --- ---
Year: 2019 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of this thesis is to study the statistical methods allowing to decrypt messages where a brute attack will be unfeasible. 

After the description of encryption techniques used in pre-modern cryptography and in the Second World War, we will present methods for breaking these classical ciphers with a brief presentation of the cryptanalysis needed to break wartime ciphers. Then, a bayesian method introduced by Turing in a wartime paper for breaking Vigenère cipher will be developed. This work will also investigate the use of Markov Chain Monte Carlo to attack substitution cipher and transposition cipher. Finally, we will discuss how to measure the performances of some techniques presented in the previous chapters based on simulations.


Book
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption
Author:
ISBN: 0691184550 Year: 2018 Publisher: Princeton, NJ : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Keywords

Cryptography --- Ciphers. --- Computer security. --- Mathematics. --- Adaptive chosen-ciphertext attack. --- Advanced Encryption Standard. --- Affine cipher. --- Alice and Bob. --- Autokey cipher. --- Block cipher mode of operation. --- Block cipher. --- Block size (cryptography). --- Brute-force attack. --- Brute-force search. --- Caesar cipher. --- Calculation. --- Chosen-ciphertext attack. --- Chosen-plaintext attack. --- Cipher. --- Ciphertext-only attack. --- Ciphertext. --- Codebook. --- Communication Theory of Secrecy Systems. --- Computational problem. --- Confusion and diffusion. --- Correlation attack. --- Craig Gentry (computer scientist). --- Cryptanalysis. --- Cryptogram. --- Cryptographic engineering. --- Cryptographic hash function. --- Cryptography Research. --- Cryptography. --- Cryptosystem. --- Data Encryption Standard. --- Differential cryptanalysis. --- Diffie–Hellman key exchange. --- Discrete logarithm. --- Disquisitiones Arithmeticae. --- Dual EC DRBG. --- ElGamal encryption. --- Elliptic curve cryptography. --- Encryption. --- Enigma machine. --- Euler's theorem. --- Fast Software Encryption. --- Feistel cipher. --- Fermat's little theorem. --- Forward secrecy. --- Grover's algorithm. --- Hill cipher. --- Homomorphic encryption. --- Hyperelliptic curve cryptography. --- Information theory. --- Initialization vector. --- International Association for Cryptologic Research. --- Kerckhoffs's principle. --- Key (cryptography). --- Key schedule. --- Key size. --- Keystream. --- Known-plaintext attack. --- Lattice problem. --- Linear cryptanalysis. --- Logjam (computer security). --- Mathematical problem. --- Mathematician. --- Mental poker. --- Merkle's Puzzles. --- Monte Carlo algorithm. --- Multiple encryption. --- NSA Suite B Cryptography. --- Nonlinear feedback shift register. --- Number theory. --- Padding (cryptography). --- Permutation box. --- Permutation. --- Plaintext. --- Polyalphabetic cipher. --- Post-quantum cryptography. --- Precomputation. --- Probabilistic encryption. --- Product cipher. --- Public-key cryptography. --- Quantum algorithm. --- Quantum cryptography. --- Quantum key distribution. --- RSA (cryptosystem). --- RSA problem. --- Related-key attack. --- S-box. --- Security level. --- Shor's algorithm. --- Sign (mathematics). --- Spyware. --- Stream cipher. --- Substitution cipher. --- Symmetric-key algorithm. --- Transposition cipher. --- VIC cipher. --- Variable (computer science). --- Vigenère cipher. --- Vulnerability (computing).


Book
Information science
Author:
ISBN: 1282608045 9786612608049 1400829283 Year: 2006 Publisher: Princeton ; Oxford : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University. Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication. To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions. The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual

Keywords

Information science. --- Information theory. --- Addition. --- Algorithm. --- Alice and Bob. --- Amplitude. --- Approximation. --- Bandwidth (signal processing). --- Bibliography. --- Binary code. --- Binary number. --- Binary search tree. --- Binary tree. --- Bit. --- Block code. --- Bubble sort. --- Caesar cipher. --- Calculation. --- Channel capacity. --- Cipher. --- Ciphertext. --- Comma code. --- Commodity. --- Common knowledge (logic). --- Competition. --- Computation. --- Computer. --- Conditional entropy. --- Conditional probability. --- Consideration. --- Consumer. --- Cryptanalysis. --- Cryptogram. --- Cryptography. --- Customer. --- Data mining. --- Data structure. --- Database. --- Demand curve. --- Digital signature. --- Discounts and allowances. --- Economic surplus. --- Encryption. --- Estimation. --- Expected value. --- Fourier series. --- Fourier transform. --- Frequency analysis. --- Functional dependency. --- Heapsort. --- Huffman coding. --- Hyperplane. --- Information retrieval. --- Insertion sort. --- Instance (computer science). --- Integer. --- Inverted index. --- Key size. --- Letter frequency. --- Logarithm. --- Marginal cost. --- Measurement. --- Modulation. --- Notation. --- Nyquist–Shannon sampling theorem. --- One-time pad. --- Parity bit. --- Percentage. --- Pricing. --- Probability. --- Public-key cryptography. --- Quantity. --- Quicksort. --- Radio wave. --- Random variable. --- Ranking (information retrieval). --- Requirement. --- Result. --- Run-length encoding. --- Shift register. --- Sine wave. --- Sorting algorithm. --- Special case. --- Spectral density. --- Spreadsheet. --- Standard deviation. --- Subset. --- Substitution cipher. --- Summation. --- Technology. --- Theorem. --- Theory. --- Time complexity. --- Transmitter. --- Transposition cipher. --- Tree (data structure). --- Tuple. --- Uncertainty. --- Value (economics). --- Word (computer architecture).

Listing 1 - 3 of 3
Sort by