LEADER 00845nas a2200229 i 4500 001 991003650059707536 008 190522d20032006njumr p 0 a0eng d 022 $a1552-4892$l1552-4884 035 $ab14366058-39ule_inst 040 $aDi.S.Te.B.A.$beng 229 4$aInorganic chemistry. - 2003-2006 245 04$aInorganic chemistry$h[online]. - 2003-2006 310 $aMonthly 650 $aAnatomy$vPeriodicals 710 2 $aAmerican Association of Anatomists 776 1 $aAlso issued in print: Inorganic chemistry 856 41$uhttp://onlinelibrary.wiley.com/journal/10.1002/%28ISSN%291932-8494/issues$zE-journal available from 1996- on Publisher Site 907 $a.b14366058$b24-02-22$c22-05-19 912 $a991003650059707536 996 $aGanic chemistry$91750021 997 $aUNISALENTO 998 $ale003$b04-08-05$cs$dm $e-$feng$gnju$h0$i0 LEADER 04485nam 22006375 450 001 996546825903316 005 20230624152335.0 010 $a3-031-32959-7 024 7 $a10.1007/978-3-031-32959-3 035 $a(CKB)27240626400041 035 $a(MiAaPQ)EBC30611000 035 $a(Au-PeEL)EBL30611000 035 $a(DE-He213)978-3-031-32959-3 035 $a(PPN)272273287 035 $a(EXLCZ)9927240626400041 100 $a20230624d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aClassical and Modern Cryptography for Beginners$b[electronic resource] /$fby Rajkumar Banoth, Rekha Regar 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (230 pages) 311 $a9783031329586 327 $aChapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security. 330 $aThis textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful. 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection?Law and legislation 606 $aComputer networks?Security measures 606 $aData protection 606 $aCryptology 606 $aPrivacy 606 $aMobile and Network Security 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection?Law and legislation. 615 0$aComputer networks?Security measures. 615 0$aData protection. 615 14$aCryptology. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 676 $a005.824 700 $aBanoth$b Rajkumar$01373735 701 $aRegar$b Rekha$01373736 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546825903316 996 $aClassical and Modern Cryptography for Beginners$93404866 997 $aUNISA LEADER 01038nas 2200373 c 450 001 9910892077103321 005 20201026154529.0 035 $a(CKB)5280000000205407 035 $a(DE-599)ZDB3002383-X 035 $a(DE-101)1201105544 035 $a(EXLCZ)995280000000205407 100 $a20191205a20139999 |y | 101 0 $aspa 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aJandiekua$erevista mexicana de educacio?n ambiental 210 31$aSan Luis Potosi?, Me?xico$cUniversidad Auto?noma de San Luis Potosi?$d[2013]- 215 $aOnline-Ressource 300 $aGesehen am 5. Dezember 2019 300 $aFortsetzung der Druck-Ausgabe 517 $aJandiekua 608 $aZeitschrift$2gnd-content 676 $a333.7 676 $a300 686 $aLATAM$qDE-204$2fid 801 0$b0204 801 1$bDE-101 801 2$b9001 906 $aJOURNAL 912 $a9910892077103321 996 $aJandiekua$94254336 997 $aUNINA