Next Generation Mechanisms for Data Encryption - Kumar, Keshav; Pandey, Bishwajeet Kumar; (ed.) - Prospero Internet Bookshop

Next Generation Mechanisms for Data Encryption

 
Edition number: 1
Publisher: CRC Press
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 120.00
Estimated price in HUF:
63 000 HUF (60 000 HUF + 5% VAT)
Why estimated?
 
Your price:

50 400 (48 000 HUF + 5% VAT )
discount is: 20% (approx 12 600 HUF off)
Discount is valid until: 31 December 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Short description:

This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data such as asymmetry encryption, digital signatures, and hash functions. It also covers the mathematics behind the use of algorithms for encryption and decryption. 

Long description:

This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption.


Features



  • Presents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption.

  • Discusses algorithms such as symmetric encryption, asymmetric encryption, digital signatures, and hash functions used for encryption.

  • Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption.

  • Illustrates software methods to implement cryptography algorithms.

  • Highlights a comparative analysis of models that are used in implementing cryptography algorithms.

The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.

Table of Contents:

1. Oepning the Vault for Securing the Communication: An Introduction to Cryptography.  2. Guardians of Privacy: Unrevaling Public-Key Cryptography.  3. Cryptography Algorithms to Prevent the Different Security Attacks.  4. Hash Functions and Message Digest.  5. Quantum Cryptography.  6. Cryptanalysis using Crypt Tool and Alpha Peeler.  7. Quantum Cryptography: An In-Depth Exploration of Principles and Techniques.  8. Securing Patient Information: A Multi-layered Cryptographic Approach in IoT Healthcare.  9. Exploring Advancements, Applications, and Challenges in the Realm of Quantum Cryptography.  10. Cryptography in Industry: Safeguarding Digital Assets and Transactions.  11. Cryptography in Practice.  12. Output Load Capacitance Scaling Based Low Power Design of ECC Algorithm.  13. Implementation of Lattice Based Cryptography Cyber Forensic System.  14. Cryptography in Digital Forensics.  15. Cryptography Tools in Ethical Hacking.  16. Exploring the Future Trends of Cryptography.  17. Safeguarding the Future through the Prevention of Cybercrime in the Quantum Computing Era.  18. Low Power Design of DES Encryption Algorithm on 28 nm FPGA Using HSTL IO Standard.