Emerging Security Algorithms and Techniques (e-bog) af -
Singh, Manu Pratap (redaktør)

Emerging Security Algorithms and Techniques e-bog

436,85 DKK (inkl. moms 546,06 DKK)
Cyber security is the protection of information systems, hardware,a software, anda information as well from theft, damages, interruption or misdirectiona toa any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengtheninga ...
E-bog 436,85 DKK
Forfattere Singh, Manu Pratap (redaktør)
Udgivet 20 maj 2019
Længde 318 sider
Genrer Information technology: general topics
Sprog English
Format pdf
Beskyttelse LCP
ISBN 9781351021692
Cyber security is the protection of information systems, hardware,a software, anda information as well from theft, damages, interruption or misdirectiona toa any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengtheninga the security and resilience of cyberspacea has becomea a vital homeland security mission.Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption.There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.The book offers comprehensive coverage of the most essential topics, including:Modular Arithmetic, Finite FieldsPrime Number, DLP, Integer Factorization ProblemSymmetric CryptographyAsymmetric CryptographyPost-Quantum CryptographyIdentity Based EncryptionAttribute Based EncryptionKey ManagementEntity Authentication, Message AuthenticationDigital SignaturesHands-On "e;SageMath"e; a This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.