Ahmad / Doja / Udzir | Emerging Security Algorithms and Techniques | Buch | 978-0-8153-6145-9 | sack.de

Buch, Englisch, 330 Seiten, Format (B × H): 183 mm x 260 mm, Gewicht: 821 g

Ahmad / Doja / Udzir

Emerging Security Algorithms and Techniques


1. Auflage 2019
ISBN: 978-0-8153-6145-9
Verlag: Chapman and Hall/CRC

Buch, Englisch, 330 Seiten, Format (B × H): 183 mm x 260 mm, Gewicht: 821 g

ISBN: 978-0-8153-6145-9
Verlag: Chapman and Hall/CRC


Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

- Modular Arithmetic, Finite Fields

- Prime Number, DLP, Integer Factorization Problem

- Symmetric Cryptography

- Asymmetric Cryptography

- Post-Quantum Cryptography

- Identity Based Encryption

- Attribute Based Encryption

- Key Management

- Entity Authentication, Message Authentication

- Digital Signatures

- Hands-On "SageMath"

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Ahmad / Doja / Udzir Emerging Security Algorithms and Techniques jetzt bestellen!

Weitere Infos & Material


Modular Arithmetic. Finite fields. Prime Number. Discrete Logarithm Problem. Integer Factorization Problem. Symmetric Algorithms-I. Symmetric Algorithms -II. Asymmetric Cryptography. Post-Quantum Cryptography. Identity Based Encryption. Attribute Based Encryption. Key Management. Entity authentication. Message Authentication. Digital Signatures. Applications. Hands-On "SageMath".


Khaleel Ahmad, Manu Pratap Singh



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.