Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Techniques for Cryptanalysis of Block Ciphers

Techniques for Cryptanalysis of Block Ciphers

Biham, Eli, Dunkelman, Orr

2014, X, 260 p.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


ISBN 978-3-642-17232-8

digitally watermarked, no DRM

The eBook version of this title will be available soon

learn more about Springer eBooks

add to marked items


Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

approx. $79.95

(net) price for USA

ISBN 978-3-642-17231-1

free shipping for individuals worldwide

Due: July 10, 2016

add to marked items

  • Useful reference for graduate students and researchers
  • Describes techniques that are key to modern security
  • Written by established experts

Block ciphers are widely used to protect information over the Internet, so assessing their strength in the case of malicious adversaries is critical to public trust. Such security evaluations, called cryptanalysis, expose weak points of the ciphers and can be used to develop attack techniques, thus cryptanalytic techniques also direct designers on ways to develop more secure block ciphers.


In this book the authors describe the cryptanalytic toolbox for block ciphers. The book starts with the differential and linear attacks, and their extensions and generalizations. Then the more advanced attacks such as the boomerang and rectangle attacks are discussed, along with their related-key variants. Finally, other attacks are explored, in particular combined attacks that are built on top of other attacks. The book covers both the underlying concepts at the heart of these attacks and the mathematical foundations of the analysis itself. These are complemented by an extensive bibliography and numerous examples, mainly involving widely deployed block ciphers.


The book is intended as a reference book for graduate students and researchers in the field of cryptography.


Content Level » Graduate

Keywords » Block ciphers - Boomerang attack - Cryptanalysis - Cryptography - Cryptology - Differential cryptanalysis - Linear cryptanalysis - Related-key variants - Security protocols

Related subjects » Security and Cryptology - Theoretical Computer Science

Table of contents 

Introduction .- Differential Cryptanalysis .- Linear Cryptanalysis .- More Cryptanalytic Methods .- Boomerangs and Rectangles .- Other Combined Attacks .- Appendix .- References.

Popular Content within this publication 



Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Structures, Cryptology and Information Theory.