Emerging Security Algorithms and Techniques
Author: Khaleel Ahmad (Editor), M. N. Doja (Editor), Nur Izura Udzir (Editor), Manu Pratap Singh (Editor)
Publisher finelybook 出版社: Chapman and Hall/CRC
Edition 版本: 1st
Publication Date 出版日期: 2019-06-04
Language 语言: English
Print Length 页数: 318 pages
ISBN-10: 0815361459
ISBN-13: 9780815361459
Book Description
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.
The book offers comprehensive coverage of the most essential topics, including:
- Modular Arithmetic, Finite Fields
- Prime Number, DLP, Integer Factorization Problem
- Symmetric Cryptography
- Asymmetric Cryptography
- Post-Quantum Cryptography
- Identity Based Encryption
- Attribute Based Encryption
- Key Management
- Entity Authentication, Message Authentication
- Digital Signatures
- Hands-On “SageMath”
This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.
About the Author
相关文件下载地址
相关推荐
- Hands-On Machine Learning with C++: Build, train, and deploy end-to-end machine learning and deep learning pipelines, 2nd Edition
- Mastering QuickBooks® 2025: Bookkeeping for small businesses with US QuickBooks® Online, 6th Edition
- IDS and IPS with Snort 3: Get up and running with Snort 3 and discover effective solutions to your security issues
- Microsoft 365 Administration Cookbook: Enhance your Microsoft 365 productivity to manage and optimize its apps and services, 2nd Edition
- Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix setup, 3rd Edition
- Refactoring with C++: Explore modern ways of developing maintainable and efficient applications