000 04534nam a22005895i 4500
001 978-3-031-32959-3
003 DE-He213
005 20240423125544.0
007 cr nn 008mamaa
008 230624s2023 sz | s |||| 0|eng d
020 _a9783031329593
_9978-3-031-32959-3
024 7 _a10.1007/978-3-031-32959-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aBanoth, Rajkumar.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aClassical and Modern Cryptography for Beginners
_h[electronic resource] /
_cby Rajkumar Banoth, Rekha Regar.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXXI, 215 p. 84 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security.
520 _aThis textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection
_xLaw and legislation.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 1 4 _aCryptology.
650 2 4 _aPrivacy.
650 2 4 _aMobile and Network Security.
650 2 4 _aData and Information Security.
700 1 _aRegar, Rekha.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031329586
776 0 8 _iPrinted edition:
_z9783031329609
776 0 8 _iPrinted edition:
_z9783031329616
856 4 0 _uhttps://doi.org/10.1007/978-3-031-32959-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c179228
_d179228