Emerging Security Algorithms and Techniques -

Emerging Security Algorithms and Techniques

Buch | Hardcover
318 Seiten
2019
Crc Press Inc (Verlag)
978-0-8153-6145-9 (ISBN)
159,95 inkl. MwSt
This book covers symmetric, asymmetric and post quantum cryptography algorithms and its modern applications in developing secure systems: digital watermarking, digital signature, entity authentication, message authentication, cyber security, hardware security, web security, cloud security, smart card technology, Internet of Things, and CAPTCHA.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:






Modular Arithmetic, Finite Fields



Prime Number, DLP, Integer Factorization Problem



Symmetric Cryptography



Asymmetric Cryptography



Post-Quantum Cryptography



Identity Based Encryption



Attribute Based Encryption



Key Management



Entity Authentication, Message Authentication



Digital Signatures



Hands-On "SageMath"

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Khaleel Ahmad, Manu Pratap Singh

Modular Arithmetic. Finite fields. Prime Number. Discrete Logarithm Problem. Integer Factorization Problem. Symmetric Algorithms-I. Symmetric Algorithms -II. Asymmetric Cryptography. Post-Quantum Cryptography. Identity Based Encryption. Attribute Based Encryption. Key Management. Entity authentication. Message Authentication. Digital Signatures. Applications. Hands-On "SageMath".

Erscheinungsdatum
Zusatzinfo 55 Tables, black and white; 151 Illustrations, black and white
Verlagsort Bosa Roca
Sprache englisch
Maße 178 x 254 mm
Gewicht 748 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 0-8153-6145-9 / 0815361459
ISBN-13 978-0-8153-6145-9 / 9780815361459
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00