Emerging security algorithms and techniques Ahmad – Ebook Instant Download/Delivery ISBN(s): 9780815361459, 0815361459
Product details:
- ISBN-10 : 0815361459
- ISBN-13 : 978-0815361459
- Author:
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.
Table of contents:
1. Modular Arithmetic
2. Finite Fields
3. Prime Number
4. Discrete Logarithm Problem
5. Integer Factorization Problem
6. Symmetric Algorithms I
7. Symmetric Algorithms II
8. Asymmetric Cryptography
9. Post-Quantum Cryptography
10. Identity-Based Encryption
11. Attribute-Based Encryption
12. Key Management
13. Entity Authentication
14. Message Authentication
15. Digital Signatures
16. Applications
17. Hands-On “SageMath”
People also search:
emerging security threats in the aviation industry
emerging security threats
nato emerging security challenges division
emerging security technologies
world emerging security forum