000 | 05134nam a22003493i 4500 | ||
---|---|---|---|
999 |
_c25567 _d25567 |
||
001 | EBC5125073 | ||
003 | MiAaPQ | ||
005 | 20190105103915.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 181231s2012 xx o ||||0 eng d | ||
020 |
_a9788131797662 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC5125073 | ||
035 | _a(Au-PeEL)EBL5125073 | ||
035 | _a(CaONFJC)MIL475817 | ||
035 | _a(OCoLC)1024267353 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
082 |
_223 _a 005.82 |
||
100 | 1 | _aESL, ITL. | |
245 | 1 | 0 | _aCryptography and Network Security. |
250 | _a0 | ||
300 | _a1 online resource (197 pages) | ||
505 | 0 | _aCover -- Contents -- Preface -- Chapter 1: Overview of Network Security -- Passive Attacks -- Active Attacks -- Multiple-choice Questions -- Answers -- Chapter 2: Cryptography and Finite Fields -- Symmetric-key Encipherment -- Asymmetric-key Encipherment -- Algorithm -- Group -- Ring -- Field -- Algorithm -- Multiple-choice Questions -- Answers -- Chapter 3: Symmetric-key Ciphers -- Additive cipher -- Shift cipher -- Caesar cipher -- Multiplicative cipher -- Affine cipher -- Autokey cipher -- Playfair cipher -- Vigenere cipher -- Hill cipher -- Basic model -- Final design of the Feistel cipher -- Encryption -- Decryption -- Encryption -- Decryption -- Multiple-choice Questions -- Answers -- Chapter 4: Symmetric-key Algorithms -- DES Structure -- DES Function -- Weakness in the Cipher Design -- Weakness in the Cipher Key -- Meet-in-the-middle Attack -- 3-DES with Two Keys -- 3-DES with Three Keys -- Working of IDEA -- Encryption Round -- Output Transformation -- Decryption -- Strength of IDEA -- General Design of AES -- Structure of Encryption Round -- Transformations -- Key Expansion in AES-128 -- Electronic Code Book (ECB) Mode -- Cipher Block Chaining (CBC) Mode -- Cipher Feedback (CFB) Mode -- Output Feedback (OFB) Mode -- Multiple-choice Questions -- Answers -- Chapter 5: Number Theory -- Proof -- Miller-Rabin algorithm -- Multiple-choice Questions -- Answers -- Chapter 6: Asymmetric-key Algorithms -- RSA Key Generation -- RSA Encryption and Decryption -- Distribution of Public Keys -- Distribution of Secret Keys using Public-key Cryptography -- Diffie-Hellman algorithm -- Proof of algorithm -- Security of the Diffie-Hellman algorithm -- ElGamal key generation -- ElGamal encryption -- ElGamal decryption -- Proof of decryption -- ECC with Diffie-Hellman key exchange -- ECC encryption -- ECC decryption -- Security of ECC. | |
505 | 8 | _aMultiple-choice Questions -- Answers -- Chapter 7: Message Authentication and Hash Functions -- Simple Hash Function -- Whirlpool Hash Function -- Whirlpool Cipher -- Design Objectives of HMAC -- HMAC Implementation -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 8: Digital Signatures and Authentication Protocols -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 9: Network Security -- Authentication only -- Confidentiality only -- Confidentiality and Authentication -- Compression -- E-mail Compatibility -- Segmentation and Reassembly -- MIME Overview -- S/MIME Functionality -- S/MIME Messages -- S/MIME Certificate Processing -- S/MIME Enhanced Security Services -- AH Transport Mode -- AH Tunnel Mode -- Transport Mode ESP -- Tunnel Mode ESP -- SSL architecture -- Working of SET -- Dual Signatures -- Multiple-choice Questions -- Answers -- Chapter 10: System Security -- Intrusion Techniques -- Antivirus Approaches -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Multiple-choice Questions -- Answers -- Index. | |
520 | _aCryptography and Network Security is designed as quick reference guide for important undergraduate computer courses. The organized and accessible format of this book allows students to learn the important concepts in an easy-to-understand, question-and-answer format. These portable learning tools have been designed as one-stop references for students to understand and master the subjects by themselves. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aESL, ITL _tCryptography and Network Security _dNoida : Pearson India,c2012 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125073 _zClick to View |
942 |
_2ddc _cBK |