Автор: Prashant Pranav, Sandip Dutta, Soubhik Chakraborty
Издательство: Nova Science Publishers
Серия: Computer Science, Technology and Applications
Год: 2023
Страниц: 128
Язык: английский
Формат: pdf (true)
Размер: 13.9 MB
The book will introduce readers to the broader concept of cryptography and its allied areas. Introduction to various cryptographic protocols such as symmetric and asymmetric encryption algorithms are provided in this book. New techniques such as blockchain and lightweight cryptography are also discussed in this book. The book additionally focuses on the musical cryptography concept and many new algorithms to secure communication are shown to be achieved using Indian music. Integer factorization is also discussed in this book with a plausible algorithm to break it in polynomial time. The book should be found useful to advanced undergraduate and post-graduate students, researchers and practitioners of Computing Science.
Cryptography is the art of writing something secretly. Cryptographic algorithms are the basis of carefree transactions over the internet today. Confidential information of a government or private agency or department is secured by cryptography. From doing secure communication to transferring information of national importance, cryptographic algorithms play the sole role in confidentiality. Cryptography is basically a mathematical model used for hiding confidential information. With the advancement in internet technologies and reliance of everyone on the use of internet in day-to-day life, it has become of utmost importance to hide the confidential information shared over the internet in a form that cannot be read by an intruder.
Chapter 1 gives an overview of different types of cryptographic algorithms. Symmetric key cryptography, asymmetric key cryptography and hash functions are discussed in this chapter.
Chapter 2 provides a note and asymmetric cryptographic algorithms. Various algorithms which use two keys to secure communication have been discussed in this chapter. Diffie-Hellman key exchange algorithm, RSA, El Gamal algorithms are discussed with their underlying steps. Also, the chapter provides a sneak into elliptic curve cryptography.
Chapter 3 gives an insight into symmetric cryptographic algorithms. Algorithms such as AES – 128, DES, Blowfish are discussed in this chapter with a brief overview on to PRESENT 80 algorithms more suitable for lightweight applications.
Chapter 4 discusses in depth the cryptographically secure pseudo random number. These numbers are more suitable to be used in cryptographic applications.
...
Chapter 9 deals with a fuzzy rule-based system to secure messages suing musical cryptography. The chapter also compares the worthiness of the proposed system with respect to AES and RSA.
Скачать Applied Cryptography for Researchers and Practitioners