Description |
1 online resource (xiv, 431 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Series |
North-Holland mathematical library ; v. 55 |
|
North-Holland mathematical library ; v. 55.
|
Summary |
This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called <IT>additive natural stream ciphers</IT>. These ciphers use a <IT>natural sequence generator</IT> to produce a periodic keystream. Full definitions of these concepts are given in Chapter 2. This book focuses on keystream sequences which can be analysed using number theory. It turns out that a great deal of information can be deducted about the cryptographic properties of many classes of sequences by applying the terminology and theorems of number theory. These connections can be explicitly made by describing three kinds of <IT>bridges</IT> between stream ciphering problems and number theory problems. A detailed summary of these ideas is given in the introductory Chapter 1. Many results in the book are new, and over seventy percent of these results described in this book are based on recent research results. |
Contents |
Section Headings only. Preface. Introduction. Stream Ciphers. Primes, Primitive Roots and Sequences. Cyclotomy and Cryptographic Functions. Special Primes and Sequences. Difference Sets and Cryptographic Functions. Difference Sets and Sequences. Binary Cyclotomic Generators. Analysis of Cyclotomic Generators of Order 2. Nonbinary Cyclotomic Generators. Generators Based on Permutations. Quadratic Partitions and Cryptography. Group Characters and Cryptography. <IT>P</IT>-Adic Numbers, Class Number and Sequences. Prime Ciphering Algorithms. Cryptographic Problems and Philosophies. A. More About Cyclotomic Numbers. B. Cyclotomic Formulae of Orders 6,8 and 10, C. Finding Practical Primes. D. List of Research Problems. E. Exercises. F. List of Mathematical Symbols. Bibliography. Index. |
Bibliography |
Includes bibliographical references (pages 401-428) and index. |
Note |
Print version record. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Reproduction |
Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Language |
English. |
Subject |
Number theory.
|
|
Ciphers.
|
|
Théorie des nombres.
|
|
Chiffres (Cryptographie)
|
|
ciphers (codes)
|
|
MATHEMATICS -- Number Theory.
|
|
Ciphers
|
|
Number theory
|
|
Arithmétique.
|
|
Nombres, Théorie des.
|
|
Cryptographie.
|
|
Cyclotomie.
|
|
Nombres premiers.
|
|
Nombres p-adiques.
|
Added Author |
Ding, C. (Cunsheng), 1962-
|
|
Renvall, Ari, 1963-
|
Other Form: |
Print version: Cusick, Thomas W., 1943- Stream ciphers and number theory. Amsterdam ; New York : Elsevier, 1998 0444828737 9780444828736 (DLC) 98010345 (OCoLC)38438523 |
ISBN |
9780444828736 |
|
0444828737 |
|
9780080541846 (electronic bk.) |
|
0080541844 (electronic bk.) |
|
9786611058531 |
|
6611058532 |
Standard No. |
AU@ 000048130684 |
|
CHNEW 001006723 |
|
DEBBG BV036962372 |
|
DEBBG BV039830240 |
|
DEBBG BV042317359 |
|
DEBSZ 276234561 |
|
DEBSZ 482356553 |
|
GBVCP 878886583 |
|
NZ1 12433681 |
|
NZ1 15192911 |
|