Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "The Design of Rijndael", Joan Daemen/Vincent Rijmen

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Han
    BKDRJNDL.RVW 20091129 The Design of Rijndael , Joan Daemen/Vincent Rijmen, 2002, 3-540-42580-2 %A Joan Daemen %A Vincent Rijmen %C 233 Spring St., New
    Message 1 of 1 , Jul 22, 2010
    • 0 Attachment
      BKDRJNDL.RVW 20091129

      "The Design of Rijndael", Joan Daemen/Vincent Rijmen, 2002,
      3-540-42580-2
      %A Joan Daemen
      %A Vincent Rijmen
      %C 233 Spring St., New York, NY 10013
      %D 2002
      %G 3-540-42580-2
      %I Springer-Verlag
      %O 212-460-1500 800-777-4643 service-ny@...
      %O http://www.amazon.com/exec/obidos/ASIN/3540425802/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/3540425802/robsladesinte-21
      %O http://www.amazon.ca/exec/obidos/ASIN/3540425802/robsladesin03-20
      %O Audience s- Tech 3 Writing 1 (see revfaq.htm for explanation)
      %P 238 p.
      %T "The Design of Rijndael: AES - The Advanced Encryption Standard"

      This book, written by the authors of the Rijndael encryption
      algorithm, (the engine underlying the Advanced Encryption Standard)
      explains how Rijndael works, discusses some implementation factors,
      and presents the approach to its design. Daemen and Rijmen note the
      linear and differential cryptanalytic attacks to which DES (the Data
      Encryption Standard) was subject, the design strategy that resulted
      from their analysis, the possibilities of reduce round attacks, and
      the details of related ciphers.

      Chapter one is a history of the AES assessment and decision process.
      It is interesting to note the requirements specified, particularly the
      fact that AES was intended to protect "sensitive but unclassified"
      material. Background in regard to mathematical and block cipher
      concepts is given in chapter two. The specifications of Rijndael sub-
      functions and rounds are detailed in chapter three. Chapter four
      notes implementation considerations in small platforms and dedicated
      hardware. The design philosophy underlying the work is outlined in
      chapter five: much of it concentrates on simplicity and symmetry.
      Differential and linear cryptanalysis mounted against DES is examined
      in chapter six. Chapter seven reviews the use of correlation matrices
      in cryptanalysis. If differences between pairs of plaintext can be
      calculated as they propagate through the boolean functions used for
      intermediate and resultant ciphertext, then chapter eight shows how
      this can be used as the basis of differential cryptanalysis. Using
      the concepts from these two chapters, chapter nine examines how the
      wide trail design diffuses cipher operations and data to prevent
      strong linear correlations or differential propagation. There is also
      formal proof of Rijndael's resistant construction. Chapter ten looks
      at a number of cryptanalytic attacks and problems (including the
      infamous weak and semi-weak keys of DES) and notes the protections
      provided in the design of Rijndael. Cryptographic algorithms that
      made a contribution to, or are descended from, Rijndael are described
      in chapter eleven.

      This book is intended for serious students of cryptographic algorithm
      design: it is highly demanding text, and requires a background in the
      formal study of number theory and logic. Given that, it does provide
      some fascinating examination of both the advanced cryptanalytic
      attacks, and the design of algorithms to resist them.

      copyright Robert M. Slade, 2009 BKDRJNDL.RVW 20091129


      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      Concerning the above message, you think Rob Slade is responsible?
      Heavens, no! I think Rob Slade is terribly *ir*responsible!
      victoria.tc.ca/techrev/rms.htm blog.isc2.org/isc2_blog/slade/index.html
      http://blogs.securiteam.com/index.php/archives/author/p1/
      http://www.infosecbc.org/links http://twitter.com/rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.