Cryptography and Network Security

This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptogra...

Descripción completa

Detalles Bibliográficos
Autor principal: Ajay, Kumar (-)
Autor Corporativo: Kumar Ajay (-)
Otros Autores: S., Bose
Formato: Libro electrónico
Idioma:Inglés
Publicado: Noida : Pearson India 2016.
Edición:1st ed
Colección:Always learning.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009820526006719
Tabla de Contenidos:
  • 3.3.2 Column Transposition
  • 3.4 Steganography
  • 3.4.1 Modern Steganography Techniques
  • 3.4.2 Attacks on Steganography
  • 3.4.3 Applications
  • 3.5 Linear Feedback Shift Registers
  • 3.5.1 Linear Recurrence Relation
  • 3.5.2 LFSR Operation
  • Key Terms
  • Summary
  • Review Questions
  • CHAPTER 4 Data Encryption Standard
  • 4.1 Simplified Data Encryption Standard
  • 4.1.1 S-DES Encryption
  • 4.1.2 Key Expansion Process
  • 4.1.3 S-DES Decryption
  • 4.2 Data Encryption Standard
  • 4.2.1 DES Encryption and Decryption
  • 4.2.2 DES Key Expansion
  • 4.2.3 DES Decryption
  • 4.3 Strength of DES
  • 4.3.1 Brute-force Attack
  • 4.3.2 Differential Cryptanalysis
  • 4.3.3 Linear Cryptanalysis
  • 4.4 Modes of Operation
  • 4.4.1 Electronic Code Book Mode
  • 4.4.2 Cipher Block Chaining Mode
  • 4.4.3 Cipher Feedback Mode
  • 4.4.4 Output Feedback Mode
  • 4.4.5 Counter Mode
  • Key Terms
  • Summary
  • Review Questions
  • References
  • CHAPTER 5 Secure Block Cipher and Stream Cipher Technique
  • 5.1 Need for Double DES and Triple DES
  • 5.2 Double DES
  • 5.2.1 Meet-in-the-Middle Attack
  • 5.2.2 Attacking Scenario
  • 5.3 Triple DES
  • 5.4 Pseudo Random Number Generator
  • 5.4.1 Linear Congruential Generator
  • 5.4.2 Blum Blum Shub Generator
  • 5.5 RC4
  • 5.5.1 Principle of RC4
  • 5.5.2 The Key-scheduling Algorithm
  • 5.5.3 The Pseudo Random Generation Algorithm
  • 5.5.4 Encryption and Decryption
  • 5.6 RC5
  • 5.6.1 Principles of RC5
  • 5.6.2 RC5 Key Expansion
  • 5.6.3 RC5 Encryption
  • 5.6.4 RC5 Decryption
  • 5.7 International Data Encryption Algorithm
  • 5.7.1 Principles of IDEA
  • 5.7.2 Key Expansion
  • 5.7.3 IDEA Encryption and Decryption
  • 5.8 Blowfish Encryption
  • 5.8.1 Principles of Blowfish
  • 5.8.2 Key Expansion
  • 5.8.3 Encryption and Decryption
  • 5.9 CAST-128
  • 5.9.1 CAST-128 Algorithm
  • 5.9.2 Strength of CAST
  • 5.10 RC2
  • 5.10.1 Key Expansion Process.
  • 15.2 IP Security Architecture.