Cryptography and Network Security
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptogra...
Autor principal: | |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Noida :
Pearson India
2016.
|
Edición: | 1st ed |
Colección: | Always learning.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009820526006719 |
Tabla de Contenidos:
- 3.3.2 Column Transposition
- 3.4 Steganography
- 3.4.1 Modern Steganography Techniques
- 3.4.2 Attacks on Steganography
- 3.4.3 Applications
- 3.5 Linear Feedback Shift Registers
- 3.5.1 Linear Recurrence Relation
- 3.5.2 LFSR Operation
- Key Terms
- Summary
- Review Questions
- CHAPTER 4 Data Encryption Standard
- 4.1 Simplified Data Encryption Standard
- 4.1.1 S-DES Encryption
- 4.1.2 Key Expansion Process
- 4.1.3 S-DES Decryption
- 4.2 Data Encryption Standard
- 4.2.1 DES Encryption and Decryption
- 4.2.2 DES Key Expansion
- 4.2.3 DES Decryption
- 4.3 Strength of DES
- 4.3.1 Brute-force Attack
- 4.3.2 Differential Cryptanalysis
- 4.3.3 Linear Cryptanalysis
- 4.4 Modes of Operation
- 4.4.1 Electronic Code Book Mode
- 4.4.2 Cipher Block Chaining Mode
- 4.4.3 Cipher Feedback Mode
- 4.4.4 Output Feedback Mode
- 4.4.5 Counter Mode
- Key Terms
- Summary
- Review Questions
- References
- CHAPTER 5 Secure Block Cipher and Stream Cipher Technique
- 5.1 Need for Double DES and Triple DES
- 5.2 Double DES
- 5.2.1 Meet-in-the-Middle Attack
- 5.2.2 Attacking Scenario
- 5.3 Triple DES
- 5.4 Pseudo Random Number Generator
- 5.4.1 Linear Congruential Generator
- 5.4.2 Blum Blum Shub Generator
- 5.5 RC4
- 5.5.1 Principle of RC4
- 5.5.2 The Key-scheduling Algorithm
- 5.5.3 The Pseudo Random Generation Algorithm
- 5.5.4 Encryption and Decryption
- 5.6 RC5
- 5.6.1 Principles of RC5
- 5.6.2 RC5 Key Expansion
- 5.6.3 RC5 Encryption
- 5.6.4 RC5 Decryption
- 5.7 International Data Encryption Algorithm
- 5.7.1 Principles of IDEA
- 5.7.2 Key Expansion
- 5.7.3 IDEA Encryption and Decryption
- 5.8 Blowfish Encryption
- 5.8.1 Principles of Blowfish
- 5.8.2 Key Expansion
- 5.8.3 Encryption and Decryption
- 5.9 CAST-128
- 5.9.1 CAST-128 Algorithm
- 5.9.2 Strength of CAST
- 5.10 RC2
- 5.10.1 Key Expansion Process.
- 15.2 IP Security Architecture.