Cryptography
eBook - ePub

Cryptography

Algorithms, Protocols, and Standards for Computer Security

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cryptography

Algorithms, Protocols, and Standards for Computer Security

About this book

Cryptography

An introduction to one of the backbones of the digital world

Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before.

This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come.

Readers will also find:

  • Over 450 problems with accompanying solutions to reinforce key concepts and test retention
  • Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more
  • Over 200 figures and tables that provide rich detail to the content

Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cryptography by Zoubir Z. Mammeri in PDF and/or ePUB format, as well as other popular books in Computer Science & Cryptography. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Wiley
Year
2024
Print ISBN
9781394207480
eBook ISBN
9781394207503

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Table of Contents
  5. Preface
  6. 1 Introduction to Computer Security
  7. 2 Introduction to Cryptography
  8. 3 Mathematical Basics and Computation Algorithms for Cryptography
  9. 4 Symmetric Ciphering: Historical Ciphers
  10. 5 Hash Functions, Message Authentication Codes, and Digital Signature
  11. 6 Stream Ciphers
  12. 7 Block Ciphers: Basics, TDEA, and AES
  13. 8 Block Cipher Modes of Operation for Confidentiality
  14. 9 Block Cipher Modes of Operation for Authentication and Confidentiality
  15. 10 Introduction to Security Analysis of Block Ciphers
  16. 11 Introduction to Cryptanalysis Attacks on Symmetric Ciphers
  17. 12 Public-Key Cryptosystems
  18. 13 Public-Key Cryptosystems: Elliptic Curve Cryptography
  19. 14 Key Management
  20. 15 Digital Certificate, Public-Key Infrastructure, TLS, and Kerberos
  21. 16 Generation of Pseudorandom and Prime Numbers for Cryptographic Applications
  22. Appendix: Multiple Choice Questions and Answers
  23. Index
  24. End User License Agreement