Emerging Security Algorithms and Techniques e-bog
436,85 DKK
(inkl. moms 546,06 DKK)
Cyber security is the protection of information systems, hardware,a software, anda information as well from theft, damages, interruption or misdirectiona toa any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengtheninga ...
E-bog
436,85 DKK
Forlag
Chapman and Hall/CRC
Udgivet
20 maj 2019
Længde
318 sider
Genrer
Information technology: general topics
Sprog
English
Format
epub
Beskyttelse
LCP
ISBN
9781351021685
Cyber security is the protection of information systems, hardware,a software, anda information as well from theft, damages, interruption or misdirectiona toa any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengtheninga the security and resilience of cyberspacea has becomea a vital homeland security mission.Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption.There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.The book offers comprehensive coverage of the most essential topics, including:Modular Arithmetic, Finite FieldsPrime Number, DLP, Integer Factorization ProblemSymmetric CryptographyAsymmetric CryptographyPost-Quantum CryptographyIdentity Based EncryptionAttribute Based EncryptionKey ManagementEntity Authentication, Message AuthenticationDigital SignaturesHands-On "e;SageMath"e; a This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.