Insight into Information Security and Cryptography Essentials

Insight into Information Security and Cryptography Essentials
Author :
Publisher : Shashwat Publication
Total Pages : 324
Release :
ISBN-10 : 9789390761647
ISBN-13 : 9390761646
Rating : 4/5 (646 Downloads)

Book Synopsis Insight into Information Security and Cryptography Essentials by : Dr. Poornima G. Naik Dr. Girish R. Naik

Download or read book Insight into Information Security and Cryptography Essentials written by Dr. Poornima G. Naik Dr. Girish R. Naik and published by Shashwat Publication. This book was released on 2023-11-22 with total page 324 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book is intended for serious learners of Cyber Security and Cryptography which provides more insight into working of different cryptographic algorithms. Chapter 1 deals with different security threats and measures, specific attacks on crypto systems, different types of cryptography are discussed at length and demonstrated with the help of different case studies which are implemented in java using Java Cryptography Architecture (JCA). The salient of features of this chapter are demonstration of working of digital signature, digital certificate and discussion on various digital certificate file formats. Chapter 2 focuses on classical cryptography algorithms based primarily on transposition and substitution. Both keyed and keyless algorithms such as Rail Fence Cipher, Vigenere monoalphabetic and polyalphabetic ciphers, Playfair Cipher to name a few, are discussed in detail. Few algorithms from modern cryptography, Hill Cipher, RSA, ElGamal, Merkle–Hellman Knapsack are explored as well. All the algorithms are modelled in Excel and implemented in java. The chapter concludes with the exploration of modern cryptography algorithms using Cryp Tool. The final chapter Chapter 3 explores hashing which is central to working of MAC and digital signature. Properties of hash functions and popular hash functions are dealt with. Various applications of hash functions are mentioned. The chapter concludes with some selected case studies on hashing.


Insight into Information Security and Cryptography Essentials Related Books

Insight into Information Security and Cryptography Essentials
Language: en
Pages: 324
Authors: Dr. Poornima G. Naik Dr. Girish R. Naik
Categories: Education
Type: BOOK - Published: 2023-11-22 - Publisher: Shashwat Publication

DOWNLOAD EBOOK

The book is intended for serious learners of Cyber Security and Cryptography which provides more insight into working of different cryptographic algorithms. Cha
Information Security Essentials
Language: en
Pages: 165
Authors: Susan E. McGregor
Categories: Language Arts & Disciplines
Type: BOOK - Published: 2021-06-01 - Publisher: Columbia University Press

DOWNLOAD EBOOK

As technological and legal changes have hollowed out the protections that reporters and news organizations have depended upon for decades, information security
Computer and Network Security Essentials
Language: en
Pages: 618
Authors: Kevin Daimi
Categories: Technology & Engineering
Type: BOOK - Published: 2017-08-12 - Publisher: Springer

DOWNLOAD EBOOK

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book co
OECD Skills Studies Building a Skilled Cyber Security Workforce in Europe Insights from France, Germany and Poland
Language: en
Pages: 117
Authors: OECD
Categories:
Type: BOOK - Published: 2024-02-06 - Publisher: OECD Publishing

DOWNLOAD EBOOK

This report delves into the demand for cyber security expertise by analysing online job postings in France, Germany and Poland in between 2018 and 2023. It exam
Cybersecurity Law, Standards and Regulations, 2nd Edition
Language: en
Pages: 324
Authors: Tari Schreider
Categories: Law
Type: BOOK - Published: 2020-02-22 - Publisher: Rothstein Publishing

DOWNLOAD EBOOK

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are