Overview
- Presents key security ideas for cryptographic algorithms utilized for security
- Includes teaching-learning materials and research methodologies
- Provides graphs, tables, block diagrams, and illustrations to help readers
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.
Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet.
This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
Keywords
- Classical Cryptography
- Modern Cryptography
- Mathematical Foundation of Cryptography
- Cryptography algorithms for encryption and decryption
- Network Security
- Key management
- Security attacks
- Encryption – Decryption
- Cipher – Decipher
- PGP
- S/MIME
- SSL and TLS
- RSA
- ElGamal
- Digital Signature
- Hashing
- Cryptanalysis
- Blockchain and Bitcoin
Table of contents (5 chapters)
Authors and Affiliations
About the authors
He has granted the patents titled with” System and Method for Providing Cyber Security in Big Data”, “Smart Bathroom System and Method”, “Machine Learning BasedWireless Network Modelling Based on Genetic Algorithm for Robotic”. He has Published eight text books comprising domains Networking, Computer Organization and Architecture and Computer Forensic, Published Hi-indexed IEEE,SCI and Scopus Journals and Presented nine Conference papers.
He awarded as “INSC Research Excellence Award -2022”, “CISCO Instructor Excellence Advanced award”, “IBM Certified Academic Associate – DB2 9 Database”, “IBM Certified Deployment Professional - Tivoli Directory Server V6.1”.
He Established Artificial Intelligence (AI) and Machine Learning (ML) integrated (IoT)) Laboratory in Warangal, India, CISCO Networking Academy at SREC, Vaagdevi Engineering College and Shreyas Institute of Engineering and Technology India, IBM Centre of Excellence at SREC, Warangal.
Rekha Regar, B.Tech, M.Tech, (PhD), She is a PhD Scholar at Centre of Excellence in Artificial Intelligence, Indian Institute of Technology, Kharagpur,India. She has done Master of Technology in Information Security from National Institute of Technology, Jalandhar, India. She has done Bachelor of Engineering in Computer Science & Engineering from M. B. M. Engineering college, Jodhpur, India
Bibliographic Information
Book Title: Classical and Modern Cryptography for Beginners
Authors: Rajkumar Banoth, Rekha Regar
DOI: https://doi.org/10.1007/978-3-031-32959-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Hardcover ISBN: 978-3-031-32958-6Published: 25 June 2023
Softcover ISBN: 978-3-031-32961-6Published: 26 June 2024
eBook ISBN: 978-3-031-32959-3Published: 24 June 2023
Edition Number: 1
Number of Pages: XXI, 215
Number of Illustrations: 84 b/w illustrations
Topics: Cryptology, Privacy, Mobile and Network Security, Systems and Data Security