Cryptography and Network Security. (Record no. 25567)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05134nam a22003493i 4500 |
001 - CONTROL NUMBER | |
control field | EBC5125073 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190105103915.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181231s2012 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131797662 |
Qualifying information | (electronic bk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC5125073 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL5125073 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL475817 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1024267353 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.82 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | ESL, ITL. |
245 10 - TITLE STATEMENT | |
Title | Cryptography and Network Security. |
250 ## - EDITION STATEMENT | |
Edition statement | 0 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (197 pages) |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Contents -- Preface -- Chapter 1: Overview of Network Security -- Passive Attacks -- Active Attacks -- Multiple-choice Questions -- Answers -- Chapter 2: Cryptography and Finite Fields -- Symmetric-key Encipherment -- Asymmetric-key Encipherment -- Algorithm -- Group -- Ring -- Field -- Algorithm -- Multiple-choice Questions -- Answers -- Chapter 3: Symmetric-key Ciphers -- Additive cipher -- Shift cipher -- Caesar cipher -- Multiplicative cipher -- Affine cipher -- Autokey cipher -- Playfair cipher -- Vigenere cipher -- Hill cipher -- Basic model -- Final design of the Feistel cipher -- Encryption -- Decryption -- Encryption -- Decryption -- Multiple-choice Questions -- Answers -- Chapter 4: Symmetric-key Algorithms -- DES Structure -- DES Function -- Weakness in the Cipher Design -- Weakness in the Cipher Key -- Meet-in-the-middle Attack -- 3-DES with Two Keys -- 3-DES with Three Keys -- Working of IDEA -- Encryption Round -- Output Transformation -- Decryption -- Strength of IDEA -- General Design of AES -- Structure of Encryption Round -- Transformations -- Key Expansion in AES-128 -- Electronic Code Book (ECB) Mode -- Cipher Block Chaining (CBC) Mode -- Cipher Feedback (CFB) Mode -- Output Feedback (OFB) Mode -- Multiple-choice Questions -- Answers -- Chapter 5: Number Theory -- Proof -- Miller-Rabin algorithm -- Multiple-choice Questions -- Answers -- Chapter 6: Asymmetric-key Algorithms -- RSA Key Generation -- RSA Encryption and Decryption -- Distribution of Public Keys -- Distribution of Secret Keys using Public-key Cryptography -- Diffie-Hellman algorithm -- Proof of algorithm -- Security of the Diffie-Hellman algorithm -- ElGamal key generation -- ElGamal encryption -- ElGamal decryption -- Proof of decryption -- ECC with Diffie-Hellman key exchange -- ECC encryption -- ECC decryption -- Security of ECC. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Multiple-choice Questions -- Answers -- Chapter 7: Message Authentication and Hash Functions -- Simple Hash Function -- Whirlpool Hash Function -- Whirlpool Cipher -- Design Objectives of HMAC -- HMAC Implementation -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 8: Digital Signatures and Authentication Protocols -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 9: Network Security -- Authentication only -- Confidentiality only -- Confidentiality and Authentication -- Compression -- E-mail Compatibility -- Segmentation and Reassembly -- MIME Overview -- S/MIME Functionality -- S/MIME Messages -- S/MIME Certificate Processing -- S/MIME Enhanced Security Services -- AH Transport Mode -- AH Tunnel Mode -- Transport Mode ESP -- Tunnel Mode ESP -- SSL architecture -- Working of SET -- Dual Signatures -- Multiple-choice Questions -- Answers -- Chapter 10: System Security -- Intrusion Techniques -- Antivirus Approaches -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Multiple-choice Questions -- Answers -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Cryptography and Network Security is designed as quick reference guide for important undergraduate computer courses. The organized and accessible format of this book allows students to learn the important concepts in an easy-to-understand, question-and-answer format. These portable learning tools have been designed as one-stop references for students to understand and master the subjects by themselves. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | ESL, ITL |
Title | Cryptography and Network Security |
Place, publisher, and date of publication | Noida : Pearson India,c2012 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125073">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125073</a> |
Public note | Click to View |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Online access | CENTRAL LIBRARY | Digital Library | Digital Library | 05/01/2019 | 005.82 CRY | E0033 | 05/01/2019 | 05/01/2019 | E- Books |