Classical and Modern Cryptography for Beginners / by Rajkumar Banoth, Rekha Regar
データ種別 | 電子ブック |
---|---|
版 | 1st ed. 2023. |
出版者 | (Cham : Springer Nature Switzerland : Imprint: Springer) |
出版年 | 2023 |
大きさ | XXI, 215 p. 84 illus : online resource |
著者標目 | *Banoth, Rajkumar author Regar, Rekha author SpringerLink (Online service) |
書誌詳細を非表示
一般注記 | Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful HTTP:URL=https://doi.org/10.1007/978-3-031-32959-3 |
---|---|
件 名 | LCSH:Cryptography LCSH:Data encryption (Computer science) LCSH:Data protection -- Law and legislation 全ての件名で検索 LCSH:Computer networks -- Security measures 全ての件名で検索 LCSH:Data protection FREE:Cryptology FREE:Privacy FREE:Mobile and Network Security FREE:Data and Information Security |
分 類 | LCC:QA268 DC23:005.824 |
書誌ID | EB00002276 |
ISBN | 9783031329593 |
類似資料
この資料の利用統計
このページへのアクセス回数:2回
※2019年3月27日以降
全貸出数:0回
(1年以内の貸出:0回)
※2019年3月27日以降