3.6. Recommended Reading
There is a wealth of information on symmetric encryption. Some
of the more worthwhile references are listed here. An essential reference work
is [SCHN96]. This remarkable work
contains descriptions of virtually every cryptographic algorithm and protocol
published up to the time of the writing of the book. The author pulls together
results from journals, conference proceedings, government publications, and
standards documents and organizes these into a comprehensive and comprehensible
survey. Another worthwhile and detailed survey is [MENE97]. A rigorous
mathematical treatment is [STIN02].
The foregoing references provide coverage of public-key as well
as symmetric encryption.
Perhaps the most detailed description of DES is [SIMO95]; the book also contains an
extensive discussion of differential and linear cryptanalysis of DES. [BARK91] provides a readable and
interesting analysis of the structure of DES and of potential cryptanalytic
approaches to DES. [EFF98] details the most effective
brute-force attack on DES. [COPP94] looks at the inherent
strength of DES and its ability to stand up to cryptanalysis.
No comments:
Post a Comment