000 05134nam a22003493i 4500
999 _c25567
_d25567
001 EBC5125073
003 MiAaPQ
005 20190105103915.0
006 m o d |
007 cr cnu||||||||
008 181231s2012 xx o ||||0 eng d
020 _a9788131797662
_q(electronic bk.)
035 _a(MiAaPQ)EBC5125073
035 _a(Au-PeEL)EBL5125073
035 _a(CaONFJC)MIL475817
035 _a(OCoLC)1024267353
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
082 _223
_a 005.82
100 1 _aESL, ITL.
245 1 0 _aCryptography and Network Security.
250 _a0
300 _a1 online resource (197 pages)
505 0 _aCover -- Contents -- Preface -- Chapter 1: Overview of Network Security -- Passive Attacks -- Active Attacks -- Multiple-choice Questions -- Answers -- Chapter 2: Cryptography and Finite Fields -- Symmetric-key Encipherment -- Asymmetric-key Encipherment -- Algorithm -- Group -- Ring -- Field -- Algorithm -- Multiple-choice Questions -- Answers -- Chapter 3: Symmetric-key Ciphers -- Additive cipher -- Shift cipher -- Caesar cipher -- Multiplicative cipher -- Affine cipher -- Autokey cipher -- Playfair cipher -- Vigenere cipher -- Hill cipher -- Basic model -- Final design of the Feistel cipher -- Encryption -- Decryption -- Encryption -- Decryption -- Multiple-choice Questions -- Answers -- Chapter 4: Symmetric-key Algorithms -- DES Structure -- DES Function -- Weakness in the Cipher Design -- Weakness in the Cipher Key -- Meet-in-the-middle Attack -- 3-DES with Two Keys -- 3-DES with Three Keys -- Working of IDEA -- Encryption Round -- Output Transformation -- Decryption -- Strength of IDEA -- General Design of AES -- Structure of Encryption Round -- Transformations -- Key Expansion in AES-128 -- Electronic Code Book (ECB) Mode -- Cipher Block Chaining (CBC) Mode -- Cipher Feedback (CFB) Mode -- Output Feedback (OFB) Mode -- Multiple-choice Questions -- Answers -- Chapter 5: Number Theory -- Proof -- Miller-Rabin algorithm -- Multiple-choice Questions -- Answers -- Chapter 6: Asymmetric-key Algorithms -- RSA Key Generation -- RSA Encryption and Decryption -- Distribution of Public Keys -- Distribution of Secret Keys using Public-key Cryptography -- Diffie-Hellman algorithm -- Proof of algorithm -- Security of the Diffie-Hellman algorithm -- ElGamal key generation -- ElGamal encryption -- ElGamal decryption -- Proof of decryption -- ECC with Diffie-Hellman key exchange -- ECC encryption -- ECC decryption -- Security of ECC.
505 8 _aMultiple-choice Questions -- Answers -- Chapter 7: Message Authentication and Hash Functions -- Simple Hash Function -- Whirlpool Hash Function -- Whirlpool Cipher -- Design Objectives of HMAC -- HMAC Implementation -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 8: Digital Signatures and Authentication Protocols -- Direct digital signature -- Arbitrated digital signature -- RSA digital signature scheme on a message digest -- Proof of the digital signature algorithm -- Symmetric-key encryption technique -- Public-key encryption technique -- Symmetric-key encryption technique -- Public-key encryption technique -- Multiple-choice Questions -- Answers -- Chapter 9: Network Security -- Authentication only -- Confidentiality only -- Confidentiality and Authentication -- Compression -- E-mail Compatibility -- Segmentation and Reassembly -- MIME Overview -- S/MIME Functionality -- S/MIME Messages -- S/MIME Certificate Processing -- S/MIME Enhanced Security Services -- AH Transport Mode -- AH Tunnel Mode -- Transport Mode ESP -- Tunnel Mode ESP -- SSL architecture -- Working of SET -- Dual Signatures -- Multiple-choice Questions -- Answers -- Chapter 10: System Security -- Intrusion Techniques -- Antivirus Approaches -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Advantages -- Disadvantages -- Multiple-choice Questions -- Answers -- Index.
520 _aCryptography and Network Security is designed as quick reference guide for important undergraduate computer courses. The organized and accessible format of this book allows students to learn the important concepts in an easy-to-understand, question-and-answer format. These portable learning tools have been designed as one-stop references for students to understand and master the subjects by themselves.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aESL, ITL
_tCryptography and Network Security
_dNoida : Pearson India,c2012
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125073
_zClick to View
942 _2ddc
_cBK