語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Classical and modern cryptography fo...
~
Banoth, Rajkumar.
FindBook
Google Book
Amazon
博客來
Classical and modern cryptography for beginners
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Classical and modern cryptography for beginners/ by Rajkumar Banoth, Rekha Regar.
作者:
Banoth, Rajkumar.
其他作者:
Regar, Rekha.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xxi, 215 p. :ill., digital ;24 cm.
內容註:
Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security.
Contained By:
Springer Nature eBook
標題:
Cryptography. -
電子資源:
https://doi.org/10.1007/978-3-031-32959-3
ISBN:
9783031329593
Classical and modern cryptography for beginners
Banoth, Rajkumar.
Classical and modern cryptography for beginners
[electronic resource] /by Rajkumar Banoth, Rekha Regar. - Cham :Springer Nature Switzerland :2023. - xxi, 215 p. :ill., digital ;24 cm.
Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security.
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook. The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
ISBN: 9783031329593
Standard No.: 10.1007/978-3-031-32959-3doiSubjects--Topical Terms:
532586
Cryptography.
LC Class. No.: QA268
Dewey Class. No.: 52.8
Classical and modern cryptography for beginners
LDR
:03532nmm a2200349 a 4500
001
2332038
003
DE-He213
005
20230624152335.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031329593
$q
(electronic bk.)
020
$a
9783031329586
$q
(paper)
024
7
$a
10.1007/978-3-031-32959-3
$2
doi
035
$a
978-3-031-32959-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA268
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
52.8
$2
23
090
$a
QA268
$b
.B219 2023
100
1
$a
Banoth, Rajkumar.
$3
3661563
245
1 0
$a
Classical and modern cryptography for beginners
$h
[electronic resource] /
$c
by Rajkumar Banoth, Rekha Regar.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xxi, 215 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security.
520
$a
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook. The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Privacy.
$3
528582
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Regar, Rekha.
$3
3661564
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-32959-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9458243
電子資源
11.線上閱覽_V
電子書
EB QA268
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入