Book description
NoneTable of contents
- Cover
- Title Page
- Contents
- Foreword - 1
- Foreword - 2
- Preface
- Acknowledgements
- CHAPTER 1 Cryptography
- CHAPTER 2 Mathematics of Modern Cryptography
- CHAPTER 3 Classical Encryption Techniques
- CHAPTER 4 Data Encryption Standard
- Chapter 5 Secure Block Cipher and Stream Cipher Technique
- Chapter 6 Advanced Encryption Standard (AES)187
- Chapter 7 Public Key Cryptosystem
-
Chapter 8 Key Management and Key Distribution
- 8.1 Introduction to Key Management
- 8.2 Centralized vs Distributed Key Management
- 8.3 DiffieâHellman Key Exchange
- 8.4 Computing Discrete Logarithms
- 8.5 Man-In-The-Middle Attack
- 8.6 JAVA Implementation of DiffieâHellmanKey Exchange Algorithm
- 8.7 Secure Multicast Communication Based onDiffieâHellman Key Exchange
- 8.8 Computation-Efficient Secure Multicast KeyManagement Based on Greatest Common Divisor
- 8.9 JAVA Implementation of Secure Multicast KeyManagement Based on GCD
- Key Terms
- Summary
- Summary
- References
- Chapter 9 Elliptic Curve Cryptography
- Chapter 10 Authentication Techniques
-
Chapter 11 Digital Signature
- 11.1 Introduction to Digital Signature
-
11.2 Digital Signature Schemes
- 11.2.1 ElGamal Signature Scheme299
- 11.2.2 DSA Signature Scheme
- 11.2.3 RSA Signature Scheme
- 11.2.4 FiatâShamir Signature Scheme
- 11.2.5 Lamport Signature Scheme
- 11.2.6 ChaumâAntwerpen Undeniable Signature Scheme
- 11.2.7 Chaumâs Blind Signature Scheme
- 11.2.8 OngâSchnorrâShamir Subliminal ChannelSignature Scheme
- 11.2.9 HeystâPedersen Signature Scheme
- 11.2.10 Probabilistic Signature Scheme
- 11.3 Batch Digital Signature Algorithm
- 11.4 Attacks On Digital Signature
- 11.5 Merits and Demerits of Digital Signature Schemes
- 11.6 Java Implementation of DSA
- Key Terms
- Summary
- Summary
- Chapter 12 Authentication Applications
- Chapter 13 Application Layer Security
- Chapter 14 Transport Layer Security
- Chapter 15 IP Security
- Chapter 16 System Security
- Appendix: Frequently Asked University Questions with Solutions
Product information
- Title: Cryptography and Network Security
- Author(s):
- Release date:
- Publisher(s): Pearson Education India
- ISBN: None
You might also like
book
Express Learning: Cryptography and Network Security
Express Learning is a series of books designed as quick reference guides to important undergraduate computer …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …