1st Edition

# Emerging Security Algorithms and Techniques

330 Pages 151 B/W Illustrations
by Chapman & Hall

330 Pages 151 B/W Illustrations
by Chapman & Hall

Also available as eBook on:

Cyber security is the protection of information systems, hardware,　software, and　information as well from theft, damages, interruption or misdirection　to　any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening　the security and resilience of cyberspace　has become　a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

• Modular Arithmetic, Finite Fields
• Prime Number, DLP, Integer Factorization Problem
• Symmetric Cryptography
• Asymmetric Cryptography
• Post-Quantum Cryptography
• Identity Based Encryption
• Attribute Based Encryption
• Key Management
• Entity Authentication, Message Authentication
• Digital Signatures
• Hands-On "SageMath"

This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Chapter 1: Modular Arithmetic

Afroz

Chapter 2: Finite fields

Afroz

Chapter 3: Prime Number

Chapter 4: Discrete Logarithm Problem

Chapter 5: Integer Factorization Problem

Chapter 6: Symmetric Algorithms-I

Faheem Syeed Masoodi, Mohammad Ubaidullah Bokhari

Chapter 7: Symmetric Algorithms -II

Vivek Kapoor, Shubhamoy Dey

Chapter 8: Asymmetric Cryptography

Rajiv Ranjan, Abir Mukherjee, Khaleel Ahmad, Pankaj Rai

Chapter 9: Post-Quantum Cryptography

Amandeep Singh Bhatia, Ajay Kumar

Chapter 10: Identity Based Encryption

Tanvi Gautam, Aditya Thakkar, Nitish Pathak

Chapter 11: Attribute Based Encryption

Tanvi Gautam, Aditya Thakkar, Nitish Pathak

Chapter 12: Key Management

Jyotsna Verma

Chapter 13: Entity authentication

Chapter 14: Message Authentication

Chapter 15: Digital Signatures