Cryptography algorithms, protocols, and standards for computer security

Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is w...

Full description

Bibliographic Details
Main Author: Mammeri, Zoubir
Format: eBook
Language:English
Published: Hoboken, New Jersey John Wiley & Sons 2024
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03845nmm a2200445 u 4500
001 EB002207407
003 EBX01000000000000001344608
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240503 ||| eng
020 |a 1394207492 
020 |a 9781394207497 
020 |a 1394207506 
020 |a 1394207514 
020 |a 9781394207503 
020 |a 9781394207510 
050 4 |a QA268 
100 1 |a Mammeri, Zoubir 
245 0 0 |a Cryptography  |b algorithms, protocols, and standards for computer security  |c Zoubir Z Mammeri 
260 |a Hoboken, New Jersey  |b John Wiley & Sons  |c 2024 
300 |a 1 online resource 
505 0 |a Introduction to Computer Security -- Introduction to Cryptography -- Mathematical Basics and Computation Algorithms for Cryptography -- Symmetric Ciphering: Historical Ciphers -- Hash Functions, Message Authentication Codes, and Digital Signature -- Stream Ciphers -- Block Ciphers: Basics, TDEA, and AES -- Block Cipher Modes of Operation for Confidentiality -- Block Cipher Modes of Operation for Authentication and Confidentiality -- Introduction to Security Analysis of Blocks Ciphers -- Introduction to Cryptanalysis Attacks on Symmetric Ciphers -- Public-key Cryptosystems: RSA and Finite Field Cryptography Based Schemes -- Public-key Cryptosystems: Elliptic Curve Cryptography -- Key Management -- Digital Certificate, Public-key Infrastructure, TLS, and Kerberos -- Generation of Pseudorandom and Prime Numbers for Cryptographic -- Applications 
653 |a Sécurité informatique 
653 |a Cryptographie 
653 |a Cryptography / http://id.loc.gov/authorities/subjects/sh85034453 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
024 8 |a 10.1002/9781394207510 
776 |z 1394207514 
776 |z 1394207506 
776 |z 9781394207480 
776 |z 9781394207497 
776 |z 9781394207510 
776 |z 9781394207503 
776 |z 1394207484 
776 |z 1394207492 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781394207480/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8/24 
520 |a Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols