CRYPTOGRAPHY AND NETWORK SECURITY


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

Book contain Concept OF Introduction  to  the  Concepts  of  Security:  The  need  for  security  Security  Approaches Principles  of  Security  Types  of  Attacks.  Cryptographic  Techniques:  Plain  Text  and  Cipher Text  Substitution  Techniques  Transposition  Techniques  Encryption  and  Decryption Symmetric  and  Asymmetric  Key  Cryptography  Steganography  Key  Range  and  Key  Size Possible Types of Attacks. Computer-based Symmetric Key Cryptographic Algorithms: Algorithm Types and Modes An  overview  of  Symmetric  Key  Cryptography  DES  International  Data  Encryption Algorithm (IDEA)  RC5 Blowfish AES Differential and Linear Cryptanalysis. Computer-based  Asymmetric  Key  Cryptography:  Brief  History  of  Asymmetric  Key Cryptography  An  overview  of  Asymmetric  Key  Cryptography  The  RSA  Algorithm Symmetric  and  Asymmetric  Key  Cryptography  Together  Digital  Signatures  Knapsack Algorithm Some other Algorithms.
downArrow

Details