Abstract
Today in this world of data, we transmit a huge amount of data on the network on daily basis. We are not sure that this transmission of data over the network is safe or not. This arises a need of security. We must ensure that the data that we are transmitting is secure, valid, and is reaching to its destination without getting altered. The best way to secure the data is to encrypt the data and then send it over the network. Encryption is the method by which information is converted into secret code that hides the information’s true meaning. We can use different Encryption standards(rules) to achieve this. This chapter introduces us to such various Encryption standards as such as Data Encryption Standard (DES), Triple DES and modes of operation well as some ciphers like Stream Cipher and some mathematical background, Abstract Algebra and Number Theory. This chapter will explain how the concepts are working with some easy calculations and examples. Hence, this chapter provides theoretical concepts with its working and examples which will help readers thoroughly understand how the things are working behind every encryption standard algorithm and will be able to understand the mathematical concepts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Stallings, William. Cryptography and network security, 4/E. Pearson Education India, 2006.
Karate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
Frozen, Behrouz A., and Debdeep Mukhopadhyay. Cryptography and network security. Vol. 12. New York, NY, USA: McGraw Hill Education (India) Private Limited, 2015.
Easttom, C. (2015). Modern cryptography. Applied mathematics for encryption and information security. McGraw-Hill Publishing.
Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography. CRC Press.
Bellare, M., & Rogaway, P. (2005). Introduction to modern cryptography. Ucsd Cse, 207, 207.
Zheng, Z. (2022). Modern Cryptography Volume 1: A Classical Introduction to Informational and Mathematical Principle.
Shemanske, T. R. (2017). Modern Cryptography and Elliptic Curves (Vol. 83). American Mathematical Soc.
Bhat, Bawna, Abdul Wahid Ali, and Apurva Gupta. “DES and AES performance evaluation.” International Conference on Computing, Communication & Automation. IEEE, 2015.
Rihan, Shaza D., Ahmed Khalid, and Saife Eldin F. Osman. “A performance comparison of encryption algorithms AES and DES.” International Journal of Engineering Research & Technology (IJERT) 4.12 (2015): 151–154.
Mahajan, Prerna, and Abhishek Sachdeva. “A study of encryption algorithms AES, DES and RSA for security.” Global Journal of Computer Science and Technology (2013).
Mao, Wenbo. Modern cryptography: theory and practice. Pearson Education India, 2003.
B Rajkumar “Vulnerability Analysis and Defense Against Attacks: Implications of Trust – Based Cross – Layer Security Protocol for Mobile Adhoc Networks” presented at the International” Conference on IT FWP 09, Andhra Pradesh, India. in 2009.
B Rajkumar, G Arunakranthi, “Implementation and Mitigation for Cyber Attacks with proposed OCR Process Model” in Int. J. of Natural Volatiles & Essential Oils, 2021; vol. 8(5): 2149–2160.
Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael.
Zodpe, H., & Shaikh, A. (2021). A Survey on Various Cryptanalytic Attacks on the AES Algorithm. International Journal of Next-Generation Computing, 115–123.
Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science, 8(4).
Gupta, A., & Walia, N. K. (2014). Cryptography Algorithms: a review.
Amalraj, A. J., & Jose, J. J. R. (2016). A survey paper on cryptography techniques. International Journal of Computer Science and mobile computing, 5(8), 55–59.
Pachghare, V. K. (2019). Cryptography and information security. PHI Learning Pvt. Ltd.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Banoth, R., Regar, R. (2023). Security Standards for Classical and Modern Cryptography. In: Classical and Modern Cryptography for Beginners. Springer, Cham. https://doi.org/10.1007/978-3-031-32959-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-32959-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-32958-6
Online ISBN: 978-3-031-32959-3
eBook Packages: Computer ScienceComputer Science (R0)