29,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
15 °P sammeln
  • Broschiertes Buch

Block cipher algorithms are commonly used to secure confidential information in everyday user applications like smart cards. However, it is quite common for ignorant users to use familiar dictionary words or even names as their personal passwords. Two optimisation heuristic cryptanalytic attack methods (Tabu Search and Genetic Algorithm) are used to conduct intelligent keysearch attacks on classical ciphers and modern ciphers. The classical ciphers examined are the Hill Cipher (a substitution cipher) and the Columnar Transposition Cipher (a permutation / transposition cipher). The algorithm…mehr

Produktbeschreibung
Block cipher algorithms are commonly used to secure confidential information in everyday user applications like smart cards. However, it is quite common for ignorant users to use familiar dictionary words or even names as their personal passwords. Two optimisation heuristic cryptanalytic attack methods (Tabu Search and Genetic Algorithm) are used to conduct intelligent keysearch attacks on classical ciphers and modern ciphers. The classical ciphers examined are the Hill Cipher (a substitution cipher) and the Columnar Transposition Cipher (a permutation / transposition cipher). The algorithm chosen to represent modern block ciphers is the Advanced Encryption Standard (AES) algorithm (also known as "Rijndael"). Find out how a password encrypted with AES can be broken within a few hours!
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
The author has been teaching Computer Security subjects for more than 10 years at Multimedia University in Malaysia but this work was done at Universiti Sains Malaysia.She also has several professional qualifications including GIAC Security Essentials (GSEC), Computer Hacking Forensic Investigator (CHFI) and Cisco Certified Network Associate(CCNA).