You are previewing Multidisciplinary Perspectives in Cryptology and Information Security.
O'Reilly logo
Multidisciplinary Perspectives in Cryptology and Information Security

Book Description

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Preface
  7. Acknowledgment
  8. Chapter 1: Multidisciplinary in Cryptology
    1. ABSTRACT
    2. INTRODUCTION
    3. DISCIPLINE
    4. MULTIDISCIPLINARY
    5. TRANS-DISCIPLINARY
    6. INTERDISCIPLINARY
    7. CROSS-DISCIPLINARY
    8. SOME FACTS RELATED TO MULTIDISCIPLINARY
    9. COMMUNICATION AND INFORMATION SECURITY
    10. SECURITY TYPES
    11. OVERVIEW OF CRYPTOLOGY
    12. SYMMETRIC KEY CRYPTOGRAPHY
    13. A SYMMETRIC KEY CRYPTOGRAPHY
    14. CRYPTANALYSIS
    15. MULTIDISCIPLINARY COLLABORATION IN CRYPTOLOGY
    16. EVOLUTIONARY ALGORITHMS IN CRYPTANALYSIS
    17. FUZZY LOGIC IN SECURITY EVALUATION
    18. NEURAL CRYPTOGRAPHY
    19. REFERENCES
    20. ADDITIONAL READING
    21. KEY TERMS AND DEFINITIONS
  9. Chapter 2: Soft Computing-Based Information Security
    1. ABSTRACT
    2. INTRODUCTION TO INFORMATION SECURITY AND SPAM DETECTION
    3. INTRODUCTION TO CRYPTOGRAPHY
    4. SOFT COMPUTING METHODS
    5. CRYPTOGRAPHY BASED ON NEURAL NETWORK
    6. MODERN APPROACH TO SPAM DETECTION
    7. BRIEF SPAM FIGHTING HISTORY OVERVIEW
    8. BLACKLISTING
    9. HEURISTIC FILTERING
    10. WHITELISTING
    11. COLLABORATIVE FILTERING
    12. AUTHENTICATED SMTP
    13. SENDER POLICY FRAMEWORK
    14. SPAM FILTERING AT THE TRANSPORT LEVEL
    15. LANGUAGE CLASSIFICATION
    16. NEW WAYS OF SPAM DETECTION
    17. GENETIC PROGRAMMING WITH FEATURE DETECTION
    18. CONCLUSION
    19. ACKNOWLEDGMENT
    20. REFERENCES
    21. KEY TERMS AND DEFINITIONS
  10. Chapter 3: Quantum Key Distribution Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. STATE-OF-THE-ART IN QKDNS
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  11. Chapter 4: Chaos-Based Cryptography for Voice Secure Wireless Communication
    1. ABSTRACT
    2. INTRODUCTION
    3. MULTIDISCIPLINARY IN CHAOS BASED CRYPTOGRAPHY
    4. DIFFERENT CHAOS MAPS
    5. CHAOS BASED CRYPTOGRAPHY
    6. SECURE WIRELESS COMMUNICATION BASED ON CHAOS THEORY
    7. VOICE SECURE WIRELESS COMMUNICATION
    8. CONCLUSION
    9. REFERENCES
    10. ADDITIONAL READING
    11. KEY TERMS AND DEFINITIONS
  12. Chapter 5: Cryptography Based on Error Correcting Codes
    1. ABSTRACT
    2. INTRODUCTION
    3. CODE-BASED CRYPTOGRAPHY SURVEY
    4. POST-QUANTUM CRYPTOGRAPHY BASED ON ERROR-CORRECTING CODES
    5. IMPLEMENTATIONS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  13. Chapter 6: Fuzzy Logic-Based Security Evaluation of Stream Cipher
    1. ABSTRACT
    2. INTRODUCTION
    3. FUZZY LOGIC APPLICATIONS
    4. FUZZY LOGIC
    5. SECURITY EVALUATION OF CRYPTOSYSTEM
    6. SECURITY EVALUATION OF STREAM CIPHER
    7. CONCLUSION AND SUGGESTIONS FOR FUTURE WORKS
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  14. Chapter 7: Information Security-Based Nano- and Bio-Cryptography
    1. ABSTRACT
    2. INTRODUCTION
    3. NANO AND BIO-ASSEMBLIES
    4. CRYPTOGRAPHY AND INFORMATION SECURITY
    5. NANO-TECHNOLOGY APPLICATIONS IN INFORMATION SYSTEMS
    6. QUANTUM DOTS IN CRYPTOGRAPHY
    7. AUTHENTICATION BASED ON NANO AND BIOMETRIC TECHNIQUES
    8. NANO AND BIO IN CRYPTANALYSIS
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  15. Chapter 8: ICA and PCA-Based Cryptology
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. INDEPENDENT COMPONENT ANALYSIS (ICA)
    5. ICA ALGORITHMS
    6. PRINCIPAL COMPONENT ANALYSIS (PCA)
    7. PROPERTIES AND LIMITATIONS OF PCA
    8. INSTANTANEOUS LINEAR MIXTURES
    9. UNDERDETERMINED BSS
    10. ADVANTAGES OF BSS ENCRYPTION
    11. ENCRYPTION
    12. SEGMENT SPLITTER
    13. BSS MIXING
    14. SEGMENT INFORMATION
    15. DECRYPTION
    16. BSS DECRYPTION
    17. SEGMENT RECONSTRUCTION
    18. SPEECH SCRAMBLING
    19. PERFORMANCE ANALYSIS
    20. RESULTS AND DISCUSION
    21. FUTURE RESEARCH DIRECTIONS
    22. CONCLUSION
    23. REFERENCES
    24. ADDITIONAL READING
    25. KEY TERMS AND DEFINITIONS
  16. Chapter 9: An Area-Efficient Composite Field Inverter for Elliptic Curve Cryptosystems
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. OPTIMIZATION FOR ELLIPTIC CURVE HARDWARE CRYPTOSYSTEMS
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  17. Chapter 10: RSA-Public Key Cryptosystems Based on Quadratic Equations in Finite Field
    1. ABSTRACT
    2. INTRODUCTION
    3. THE SECOND ORDER EQUATION ON RSA-TYPE PUBLIC KEY CRYPTOSYSTEMS
    4. PROPOSED GENERALIZED FORMULA FOR RSA – SECOND ORDER TYPE
    5. PROPOSED DEVELOPMENT OF CRT
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  18. Chapter 11: Cryptographic Key Distribution and Management
    1. ABSTRACT
    2. INTRODUCTION
    3. GENERAL CONCEPTS IN KEY MANAGEMENT AND DISTRIBUTION
    4. SYMMETRIC KEY DISTRIBUTION AND MANAGEMENT
    5. PUBLIC KEY DISTRIBUTION AND MANAGEMENT
    6. COMPARISON OF PUBLIC KEY DISTRIBUTION APPROACHES
    7. REINFORCING THE EXISTING (TLS/SSL) X.509 PUBLIC KEY INFRASTRUCUTRE
    8. CONCLUSION
    9. REFERENCES
    10. ADDITIONAL READING
    11. KEY TERMS AND DEFINITIONS
    12. ENDNOTES
  19. Chapter 12: New Developments in Quasigroup-Based Cryptography
    1. ABSTRACT
    2. INTRODUCTION
    3. PRELIMINARIES
    4. QUASIGROUP BASED CRYPTOGRAPHIC ALGORITHMS
    5. MULTIVARIATE QUADRATIC QUASIGROUPS AND PUBLIC KEY CRYPTOSYSTEMS
    6. NEW APPLICATIONS OF QUASIGROUPS
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
    9. REFERENCES
    10. ADDITIONAL READING
    11. KEY TERMS AND DEFINITIONS
  20. Chapter 13: Influence of the Intra-Modal Facial Information for an Identification Approach
    1. ABSTRACT
    2. INTRODUCTION
    3. SOLUTIONS AND RECOMMENDATIONS
    4. FEATURE EXTRACTION
    5. EXPERIMENTAL RESULTS
    6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    7. ACKNOWLEDGMENT
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  21. Chapter 14: Biometrics
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND OF BIOMETRIC
    4. MAIN FOCUS OF THE CHAPTER
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  22. Chapter 15: Routing Based on Security
    1. ABSTRACT
    2. INTRODUCTION
    3. ROUTING METRICS
    4. SECURITY METRICS
    5. THE PROPOSED SECURITY METRICS
    6. THE ROUTING ALGORITHMS
    7. RESULTS
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  23. Chapter 16: Forensic Analysis, Cryptosystem Implementation, and Cryptology
    1. ABSTRACT
    2. INTRODUCTION
    3. FORENSIC ANALYSIS
    4. TECHNIQUES FOR OBTAINING ENCRYPTION KEYS
    5. ROLE OF CRYPTOLOGY
    6. ROLE OF INFORMATION TECHNOLOGY (CRYPTOSYSTEM IMPLEMENTATION)
    7. USE OF MEMORY POOL
    8. FUTURE RESEARCH DIRECTIONS
    9. CONCLUSION
    10. REFERENCES
    11. ADDITIONAL READING
    12. KEY TERMS AND DEFINITIONS
    13. ENDNOTES
  24. About the Contributors
  25. Compilation of References