Book description
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.
Table of contents
- Cover
- Title Page
- Contents
- Foreword - 1
- Foreword - 2
- Preface
- Acknowledgements
- CHAPTER 1 Cryptography
- CHAPTER 2 Mathematics of Modern Cryptography
- CHAPTER 3 Classical Encryption Techniques
- CHAPTER 4 Data Encryption Standard
- Chapter 5 Secure Block Cipher and Stream Cipher Technique
- Chapter 6 Advanced Encryption Standard (AES)187
- Chapter 7 Public Key Cryptosystem
-
Chapter 8 Key Management and Key Distribution
- 8.1 Introduction to Key Management
- 8.2 Centralized vs Distributed Key Management
- 8.3 Diffie–Hellman Key Exchange
- 8.4 Computing Discrete Logarithms
- 8.5 Man-In-The-Middle Attack
- 8.6 JAVA Implementation of Diffie–HellmanKey Exchange Algorithm
- 8.7 Secure Multicast Communication Based onDiffie–Hellman Key Exchange
- 8.8 Computation-Efficient Secure Multicast KeyManagement Based on Greatest Common Divisor
- 8.9 JAVA Implementation of Secure Multicast KeyManagement Based on GCD
- Key Terms
- Summary
- Summary
- References
- Chapter 9 Elliptic Curve Cryptography
- Chapter 10 Authentication Techniques
-
Chapter 11 Digital Signature
- 11.1 Introduction to Digital Signature
-
11.2 Digital Signature Schemes
- 11.2.1 ElGamal Signature Scheme299
- 11.2.2 DSA Signature Scheme
- 11.2.3 RSA Signature Scheme
- 11.2.4 Fiat–Shamir Signature Scheme
- 11.2.5 Lamport Signature Scheme
- 11.2.6 Chaum–Antwerpen Undeniable Signature Scheme
- 11.2.7 Chaum’s Blind Signature Scheme
- 11.2.8 Ong–Schnorr–Shamir Subliminal ChannelSignature Scheme
- 11.2.9 Heyst–Pedersen Signature Scheme
- 11.2.10 Probabilistic Signature Scheme
- 11.3 Batch Digital Signature Algorithm
- 11.4 Attacks On Digital Signature
- 11.5 Merits and Demerits of Digital Signature Schemes
- 11.6 Java Implementation of DSA
- Key Terms
- Summary
- Summary
- Chapter 12 Authentication Applications
- Chapter 13 Application Layer Security
- Chapter 14 Transport Layer Security
- Chapter 15 IP Security
- Chapter 16 System Security
- Appendix: Frequently Asked University Questions with Solutions
Product information
- Title: Cryptography and Network Security
- Author(s):
- Release date: March 2016
- Publisher(s): Pearson Education India
- ISBN: 9789332579125
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devices …
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …