Security Standards for Classical and Modern Cryptography

  • Chapter
  • First Online:
Classical and Modern Cryptography for Beginners
  • 764 Accesses

Abstract

Today in this world of data, we transmit a huge amount of data on the network on daily basis. We are not sure that this transmission of data over the network is safe or not. This arises a need of security. We must ensure that the data that we are transmitting is secure, valid, and is reaching to its destination without getting altered. The best way to secure the data is to encrypt the data and then send it over the network. Encryption is the method by which information is converted into secret code that hides the information’s true meaning. We can use different Encryption standards(rules) to achieve this. This chapter introduces us to such various Encryption standards as such as Data Encryption Standard (DES), Triple DES and modes of operation well as some ciphers like Stream Cipher and some mathematical background, Abstract Algebra and Number Theory. This chapter will explain how the concepts are working with some easy calculations and examples. Hence, this chapter provides theoretical concepts with its working and examples which will help readers thoroughly understand how the things are working behind every encryption standard algorithm and will be able to understand the mathematical concepts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 74.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 69.54
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 96.29
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  1. Stallings, William. Cryptography and network security, 4/E. Pearson Education India, 2006.

    Google Scholar 

  2. Karate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.

    Google Scholar 

  3. Frozen, Behrouz A., and Debdeep Mukhopadhyay. Cryptography and network security. Vol. 12. New York, NY, USA: McGraw Hill Education (India) Private Limited, 2015.

    Google Scholar 

  4. Easttom, C. (2015). Modern cryptography. Applied mathematics for encryption and information security. McGraw-Hill Publishing.

    MATH  Google Scholar 

  5. Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography. CRC Press.

    Book  MATH  Google Scholar 

  6. Bellare, M., & Rogaway, P. (2005). Introduction to modern cryptography. Ucsd Cse, 207, 207.

    Google Scholar 

  7. Zheng, Z. (2022). Modern Cryptography Volume 1: A Classical Introduction to Informational and Mathematical Principle.

    Book  MATH  Google Scholar 

  8. Shemanske, T. R. (2017). Modern Cryptography and Elliptic Curves (Vol. 83). American Mathematical Soc.

    Google Scholar 

  9. Bhat, Bawna, Abdul Wahid Ali, and Apurva Gupta. “DES and AES performance evaluation.” International Conference on Computing, Communication & Automation. IEEE, 2015.

    Google Scholar 

  10. Rihan, Shaza D., Ahmed Khalid, and Saife Eldin F. Osman. “A performance comparison of encryption algorithms AES and DES.” International Journal of Engineering Research & Technology (IJERT) 4.12 (2015): 151–154.

    Google Scholar 

  11. Mahajan, Prerna, and Abhishek Sachdeva. “A study of encryption algorithms AES, DES and RSA for security.” Global Journal of Computer Science and Technology (2013).

    Google Scholar 

  12. Mao, Wenbo. Modern cryptography: theory and practice. Pearson Education India, 2003.

    MATH  Google Scholar 

  13. B Rajkumar “Vulnerability Analysis and Defense Against Attacks: Implications of Trust – Based Cross – Layer Security Protocol for Mobile Adhoc Networks” presented at the International” Conference on IT FWP 09, Andhra Pradesh, India. in 2009.

    Google Scholar 

  14. B Rajkumar, G Arunakranthi, “Implementation and Mitigation for Cyber Attacks with proposed OCR Process Model” in Int. J. of Natural Volatiles & Essential Oils, 2021; vol. 8(5): 2149–2160.

    Google Scholar 

  15. Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael.

    MATH  Google Scholar 

  16. Zodpe, H., & Shaikh, A. (2021). A Survey on Various Cryptanalytic Attacks on the AES Algorithm. International Journal of Next-Generation Computing, 115–123.

    Google Scholar 

  17. Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science, 8(4).

    Google Scholar 

  18. Gupta, A., & Walia, N. K. (2014). Cryptography Algorithms: a review.

    Google Scholar 

  19. Amalraj, A. J., & Jose, J. J. R. (2016). A survey paper on cryptography techniques. International Journal of Computer Science and mobile computing, 5(8), 55–59.

    Google Scholar 

  20. Pachghare, V. K. (2019). Cryptography and information security. PHI Learning Pvt. Ltd.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Banoth, R., Regar, R. (2023). Security Standards for Classical and Modern Cryptography. In: Classical and Modern Cryptography for Beginners. Springer, Cham. https://doi.org/10.1007/978-3-031-32959-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-32959-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-32958-6

  • Online ISBN: 978-3-031-32959-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation