Download This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. Symmetric key cryptography. It discusses stream and block cipher and the various chaining modes. It dis cus ses alg ori thm mod es, the ir lim ita tio ns and comparison among them based on their features. This cha pte r als o dis cus ses maj or sym met ric key cryptography algorithm in detail such as DES, Double DES, IDE A, RC4, RC5 andBlowf ish. Cha pte r 4 exa min es the con cep ts, iss ues in asy mmet ric key cryptography with history. This chapter discusses major asymmetri c key crypt ograp hy algor ithm in detail such as RSA, SHA and HMAC. This chapter introduce concept of digital envelop, digital signature and message digest. This chapter describes the MD5 alg ori thm wit h its str eng th and att ack s lau nch ed again st MD5. Chapter 5 provides information of upcoming popular technology of Public Key Infrastructure (PKI). This cha pte r dis cus s abo ut dig ita l cer tif ica tes, how the y can be created, distributed, maintained and used. This chapter discusses the role of Certificate Authorities (CA ) and Reg ist rat ion Autho rit ies (RA ) and als o introduces the Public Key Cryptography Standards (PKCS). Chapter 6 deals with the important security protocols for the internet. Different internet protocols are SSL, SHTTP, TSP, SET and 3-D secure. This chapter also dis cus ses wor kin g of ele ctr oni c mon ey, dan ger s in vo lv ed in it an d ho w be st we ca n ma ke us e of it. Th is chapter covers email security, detailed discussion of the key ema il sec uri ty pro toc olssuch as PGP, PEM and S/MIM E. This chapt er also discu sses wirel ess secur ity. Cha pte r 7 dea ls wit h the aut hen tic ati on of a use r. Vinyson usb joypad driver windows 7. The re are var iou s way s to do thi s. Thi s cha pte r exa min es eac h one of them in detail with their pros and cons. This chapt er discu ss pass word- base d auth enti catio n, authentication based on something derived from the password, authentication tokens, certificate based authentication. This chapter also discusses popular Kerbe ros prot ocol. Chapter 8 deals with the practical issues related to cryptography. Currently there are three main ways to Crypt ograp hy & netw ork security is propo sed for anyone interested knowing about security. Security is used today in every field. It introduces the concept of security. This book has been structured to serve as an ideal text book for various introductory courses of cryptography & network security, fundamentals of cryptography for cours es Engi neeri ng. The layou t, orga nizat ion and contents of the books are designed to project the funda menta l conce pts of crypt ograp hy and netwo rk secur ity in an inter esti ng, logi cal and infor mativ e manner. In general, the book provides insights on the fun cti ons and usa ge pri nci pal app lic abl e to all typ es of net wor k sec uri ty sys tem. The con cep ts are wel l ill ust rat ed wit h sui tab le exa mpl es and num ero us di ag ra ms fo r be tt er il lu st ra ti on s. Th e bo ok ha s attempted to avoid overloading to a reader who is inter ested in intr oduct ory conce pts. The book has been auth orize d by Atul Kahate. Atu l kah ate has 12 yea rs of exp eri enc e in Inf orm ati on T echnology in India and abroad in various capacities. He ha s do ne hi s Ba ch el or of Sc ie nc e de gr ee in Sta tis tic s andhis Mas terof Bus ine ss. Thi s boo k is div ide d int o 10 cha pte rs. Cha pte r 1 introduces the basic concept and need of security. It describes the security models, principles of security with practical example. It discusses ethical issues and different types of attacks with theoretical concept and exa mpl e. It als o dis cus ses dif fer ent pro gra ms of attac ks, viru ses and secur ity manage ment pract ices.
0 Comments
Leave a Reply. |