Network Security and CryptographyNetwork Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. FEATURES: • Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more • Features separate chapters on the mathematics related to network security and cryptography • Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security • Includes end of chapter review questions |
Contents
Mathematical Foundations for Computer Networks | |
Overview of Cryptography | |
Mathematical Foundations for Cryptography | |
Classical Cipher Schemes | |
Modern Symmetric Ciphers | |
PublicKey Cryptography for Data Confidentiality | |
Authentication Schemes | |
Public Key Infrastructure PKI | |
Pretty Good Privacy | |
Internet Security Services | |
System Security | |
Security of Emerging Technology | |
Centralized Authentication Service | |
Other editions - View all
Common terms and phrases
adversary attacks bastion host big data bits Blockchain byte Centralized Authentication Service Cipher cipher-text block client communication Cryptanalysis Cryptography data confidentiality determine devices Digital Signature distribution Elliptic Curve Encryption Algorithm encryption/decryption Example FIGURE Firewall Hash Function hash value Header input integer intended recipient Internet IP address IPSec Kerberos key Ks Key-Exchange Layer letters Message Digest mod q Mode multiplicative inverse node number of customers OSI model output packet parameters password performed Permutation plaintext block Poisson prime number primitive root private key probability Protocol provides Public Key Certificate Public Key Cryptography queue random number random process random variable recipient end relatively prime round router S-Box SCADA schematic diagram scheme secret key session key smart city Smart Grid Step sub-keys substitution cipher Symmetric Encryption Table theorem Ticket Tickettgs topology transformation verify virus