Book description
NoneTable of contents
- Cover
- Title Page
- Contents
- Foreword - 1
- Foreword - 2
- Preface
- Acknowledgements
- CHAPTER 1 Cryptography
- CHAPTER 2 Mathematics of Modern Cryptography
- CHAPTER 3 Classical Encryption Techniques
- CHAPTER 4 Data Encryption Standard
- Chapter 5 Secure Block Cipher and Stream Cipher Technique
- Chapter 6 Advanced Encryption Standard (AES)187
- Chapter 7 Public Key Cryptosystem
-
Chapter 8 Key Management and Key Distribution
- 8.1 Introduction to Key Management
- 8.2 Centralized vs Distributed Key Management
- 8.3 DiffieâHellman Key Exchange
- 8.4 Computing Discrete Logarithms
- 8.5 Man-In-The-Middle Attack
- 8.6 JAVA Implementation of DiffieâHellmanKey Exchange Algorithm
- 8.7 Secure Multicast Communication Based onDiffieâHellman Key Exchange
- 8.8 Computation-Efficient Secure Multicast KeyManagement Based on Greatest Common Divisor
- 8.9 JAVA Implementation of Secure Multicast KeyManagement Based on GCD
- Key Terms
- Summary
- Summary
- References
- Chapter 9 Elliptic Curve Cryptography
- Chapter 10 Authentication Techniques
-
Chapter 11 Digital Signature
- 11.1 Introduction to Digital Signature
-
11.2 Digital Signature Schemes
- 11.2.1 ElGamal Signature Scheme299
- 11.2.2 DSA Signature Scheme
- 11.2.3 RSA Signature Scheme
- 11.2.4 FiatâShamir Signature Scheme
- 11.2.5 Lamport Signature Scheme
- 11.2.6 ChaumâAntwerpen Undeniable Signature Scheme
- 11.2.7 Chaumâs Blind Signature Scheme
- 11.2.8 OngâSchnorrâShamir Subliminal ChannelSignature Scheme
- 11.2.9 HeystâPedersen Signature Scheme
- 11.2.10 Probabilistic Signature Scheme
- 11.3 Batch Digital Signature Algorithm
- 11.4 Attacks On Digital Signature
- 11.5 Merits and Demerits of Digital Signature Schemes
- 11.6 Java Implementation of DSA
- Key Terms
- Summary
- Summary
- Chapter 12 Authentication Applications
- Chapter 13 Application Layer Security
- Chapter 14 Transport Layer Security
- Chapter 15 IP Security
- Chapter 16 System Security
- Appendix: Frequently Asked University Questions with Solutions
Product information
- Title: Cryptography and Network Security
- Author(s):
- Release date:
- Publisher(s):
- ISBN: None
You might also like
book
Practical Artificial Intelligence: Machine Learning, Bots, and Agent Solutions Using C#
Discover how all levels Artificial Intelligence (AI) can be present in the most unimaginable scenarios of …
book
Python Crash Course, 2nd Edition
This is the second edition of the best selling Python book in the world. Python Crash …
book
Learning SQL, 3rd Edition
As data floods into your company, you need to put it to work right away—and SQL …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …