Book description
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.Table of contents
- Cover
- Title Page
- Contents
- Foreword - 1
- Foreword - 2
- Preface
- Acknowledgements
- CHAPTER 1 Cryptography
- CHAPTER 2 Mathematics of Modern Cryptography
- CHAPTER 3 Classical Encryption Techniques
- CHAPTER 4 Data Encryption Standard
- Chapter 5 Secure Block Cipher and Stream Cipher Technique
- Chapter 6 Advanced Encryption Standard (AES)187
- Chapter 7 Public Key Cryptosystem
-
Chapter 8 Key Management and Key Distribution
- 8.1 Introduction to Key Management
- 8.2 Centralized vs Distributed Key Management
- 8.3 Diffie–Hellman Key Exchange
- 8.4 Computing Discrete Logarithms
- 8.5 Man-In-The-Middle Attack
- 8.6 JAVA Implementation of Diffie–HellmanKey Exchange Algorithm
- 8.7 Secure Multicast Communication Based onDiffie–Hellman Key Exchange
- 8.8 Computation-Efficient Secure Multicast KeyManagement Based on Greatest Common Divisor
- 8.9 JAVA Implementation of Secure Multicast KeyManagement Based on GCD
- Key Terms
- Summary
- Summary
- References
- Chapter 9 Elliptic Curve Cryptography
- Chapter 10 Authentication Techniques
-
Chapter 11 Digital Signature
- 11.1 Introduction to Digital Signature
-
11.2 Digital Signature Schemes
- 11.2.1 ElGamal Signature Scheme299
- 11.2.2 DSA Signature Scheme
- 11.2.3 RSA Signature Scheme
- 11.2.4 Fiat–Shamir Signature Scheme
- 11.2.5 Lamport Signature Scheme
- 11.2.6 Chaum–Antwerpen Undeniable Signature Scheme
- 11.2.7 Chaum’s Blind Signature Scheme
- 11.2.8 Ong–Schnorr–Shamir Subliminal ChannelSignature Scheme
- 11.2.9 Heyst–Pedersen Signature Scheme
- 11.2.10 Probabilistic Signature Scheme
- 11.3 Batch Digital Signature Algorithm
- 11.4 Attacks On Digital Signature
- 11.5 Merits and Demerits of Digital Signature Schemes
- 11.6 Java Implementation of DSA
- Key Terms
- Summary
- Summary
- Chapter 12 Authentication Applications
- Chapter 13 Application Layer Security
- Chapter 14 Transport Layer Security
- Chapter 15 IP Security
- Chapter 16 System Security
- Appendix: Frequently Asked University Questions with Solutions
Product information
- Title: Cryptography and Network Security
- Author(s):
- Release date: March 2016
- Publisher(s): Pearson Education India
- ISBN: 9789332579125
You might also like
book
Network Defense and Countermeasures: Principles and Practices, Third edition
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, …
book
Introduction to Network Security, 2nd Edition
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers …
book
Computer Security Fundamentals, 4th Edition
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The …
book
Practical Cryptography
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, …