1st Edition

Emerging Security Algorithms and Techniques

    330 Pages 151 B/W Illustrations
    by Chapman & Hall

    330 Pages 151 B/W Illustrations
    by Chapman & Hall

    Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

    Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

    There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

    The book offers comprehensive coverage of the most essential topics, including:

    • Modular Arithmetic, Finite Fields
    • Prime Number, DLP, Integer Factorization Problem
    • Symmetric Cryptography
    • Asymmetric Cryptography
    • Post-Quantum Cryptography
    • Identity Based Encryption
    • Attribute Based Encryption
    • Key Management
    • Entity Authentication, Message Authentication
    • Digital Signatures
    • Hands-On "SageMath"


    This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

    Chapter 1: Modular Arithmetic


    Chapter 2: Finite fields


    Chapter 3: Prime Number

    Khaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad

    Chapter 4: Discrete Logarithm Problem

    Khaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad

    Chapter 5: Integer Factorization Problem

    Pinkimani Goswami, Madan Mohan Singh

    Chapter 6: Symmetric Algorithms-I

    Faheem Syeed Masoodi, Mohammad Ubaidullah Bokhari

    Chapter 7: Symmetric Algorithms -II

    Vivek Kapoor, Shubhamoy Dey

    Chapter 8: Asymmetric Cryptography

    Rajiv Ranjan, Abir Mukherjee, Khaleel Ahmad, Pankaj Rai

    Chapter 9: Post-Quantum Cryptography

    Amandeep Singh Bhatia, Ajay Kumar

    Chapter 10: Identity Based Encryption

    Tanvi Gautam, Aditya Thakkar, Nitish Pathak

    Chapter 11: Attribute Based Encryption

    Tanvi Gautam, Aditya Thakkar, Nitish Pathak

    Chapter 12: Key Management

    Jyotsna Verma

    Chapter 13: Entity authentication

    Hamza Mutaher, Pradeep Kumar

    Chapter 14: Message Authentication

    Ajay Prasad, Jatin Sethi

    Chapter 15: Digital Signatures

    Ajay Prasad, Keshav Kaushik

    Chapter 16: Applications

    M.A. Rizvi, Ifra Khan

    Chapter 17: Hands-On "SageMath"

    Uma N Dulhare, Khaleel Ahmad


    Khaleel Ahmad, Manu Pratap Singh