Emerging Security Algorithms and Techniques

Nonfiction, Computers, Entertainment & Games, Game Programming - Graphics, Networking & Communications, Computer Security, General Computing
Cover of the book Emerging Security Algorithms and Techniques by , CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781351021685
Publisher: CRC Press Publication: May 20, 2019
Imprint: Chapman and Hall/CRC Language: English
Author:
ISBN: 9781351021685
Publisher: CRC Press
Publication: May 20, 2019
Imprint: Chapman and Hall/CRC
Language: English

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

  • Modular Arithmetic, Finite Fields
  • Prime Number, DLP, Integer Factorization Problem
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Post-Quantum Cryptography
  • Identity Based Encryption
  • Attribute Based Encryption
  • Key Management
  • Entity Authentication, Message Authentication
  • Digital Signatures
  • Hands-On "SageMath"

 

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

 

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

More books from CRC Press

Cover of the book Clinical Trials by
Cover of the book Learning from Accidents by
Cover of the book Microprocessor Technology by
Cover of the book Mechatronics by
Cover of the book Practical Health and Safety Management for Small Businesses by
Cover of the book Metal and Ceramic Biomaterials by
Cover of the book Mapping of Nervous System Diseases via MicroRNAs by
Cover of the book 3D Math Primer for Graphics and Game Development by
Cover of the book Real Estate and GIS by
Cover of the book Advances in Construction ICT and e-Business by
Cover of the book Instrument Engineers' Handbook, Volume 3 by
Cover of the book Applications of Electrodynamics in Theoretical Physics and Astrophysics by
Cover of the book Annotated Dictionary of Construction Safety and Health by
Cover of the book Photosensitization of Porphyrins and Phthalocyanines by
Cover of the book Ordinary and Partial Differential Equations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy