Emerging Security Algorithms and Techniques


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

<p>Cyber security is the protection of information systems hardware software and information as well from theft damages interruption or misdirection to any of these resources. In other words cyber security focuses on protecting computers networks programs and data (in use in rest in motion) from unauthorized or unintended access change or destruction. Therefore strengthening the security and resilience of cyberspace has become a vital homeland security mission.</p><p>Cyber security attacks are growing exponentially. Security specialists must occupy in the lab concocting new schemes to preserve the resources and to control any new attacks. Therefore there are various emerging algorithms and techniques viz. DES AES IDEA WAKE CAST5 Serpent Algorithm Chaos-Based Cryptography McEliece Niederreiter NTRU Goldreich–Goldwasser–Halevi Identity Based Encryption and Attribute Based Encryption.</p><p>There are numerous applications of security algorithms like cyber security web security e-commerce database security smart card technology mobile security cloud security digital signature etc.</p><p>The book offers comprehensive coverage of the most essential topics including:</p><ul> <p> </p> <li>Modular Arithmetic Finite Fields</li> <p> </p> <li>Prime Number DLP Integer Factorization Problem</li> <p> </p> <li>Symmetric Cryptography</li> <p> </p> <li>Asymmetric Cryptography</li> <p> </p> <li>Post-Quantum Cryptography</li> <p> </p> <li>Identity Based Encryption</li> <p> </p> <li>Attribute Based Encryption</li> <p> </p> <li>Key Management</li> <p> </p> <li>Entity Authentication Message Authentication</li> <p> </p> <li>Digital Signatures</li> <p> </p> <li>Hands-On SageMath </li> </ul><p>This book serves as a textbook/reference book for UG PG PhD students Teachers Researchers and Engineers in the disciplines of Information Technology Computer Science and Engineering and Electronics and Communication Engineering.</p>
downArrow

Details