𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Applied cryptography for researchers and practitioners

✍ Scribed by Pranav P., et al.


Publisher
Nova Science
Year
2023
Tongue
English
Leaves
127
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Contents
Preface
Chapter 1
Introduction to Cryptography
1.1. Need for Security
1.2. Types of Attacks
1.3. Classification of Cryptography Algorithms
1.3.1. Symmetric Key Cryptography
1.3.2. Asymmetric Key Cryptography
1.3.3. Hash Functions
Chapter 2
A Note on Traditional and Asymmetric Algorithms
2.1. Key Exchange Algorithm
2.2. History of RSA
2.3. El Gamal Algorithm
2.4. Elliptic Curve Cryptography: Need of the Hour
Chapter 3
Symmetric Cryptography: From a Traditional Approach to Recent Trends
3.1. Most Used Symmetric Cryptography Algorithm
3.2. Need of Symmetric Cryptographic Algorithm
3.3. PRESENT 80: Need of the Hour
3.4. Traditional vs. Recent Symmetric Cryptographic Algorithm
Chapter 4
Cryptographically Secure Pseudo-Random Number Generator
4.1. Pseudo and True Random Number Generators
4.2. Properties of a Cryptographically Secure Pseudo–Random Number Generator
4.2.1. Definition 1: Cryptographically Secure Pseudo–Random Bit Generator
4.2.2. Definition 2: Next-Bit Unpredictable
4.3. A Note on Existing Pseudo–Random Number Generators and Proposing a New Cryptographically Secure Pseudo–Random Bits Generator
4.3.1. Randomized Number of Seconds Between Two Dates
4.3.2. Security of Proposed Approach
4.4. NIST Statistical Suit for Testing the Randomness of the Proposed Cryptographically Secure Pseudo–Random Bits Generator
Appendix: Sequence of Raga Bageshree for the Generation of TPM and Class Matrix
Chapter 5
Integer Factorization: Can Classical Machines Break the Unbreakable?
5.1. Types of Factorization Problems
5.2. A New Method to Factor Large and Positive Integers From The First Principle
5.2.1. Algorithm 1: Multiplication Subroutine
5.2.2. Algorithm 2: Subtraction Subroutine
5.2.3. Algorithm 3: Division Subroutine
5.2.4. Algorithm 4: Integer Square Root Subroutine
5.3. Discussion
5.3.1. Performance Comparison with Existing Factorization Algorithms
Chapter 6
Why Lightweight Cryptography after All?
6.1. Need for Lightweight Cryptographic Protocols
6.2. How Traditional Cryptographic Algorithms Differ from Lightweight Cryptographic Algorithms
6.3. Existing Symmetric Lightweight Cryptographic Algorithms
6.4. Existing Asymmetric Lightweight Cryptographic Algorithms
6.5. Existing Lightweight Key Exchange Algorithms
6.6. The Future of Lightweight Cryptography and Its Use in Relevant Domains
Chapter 7
Blockchain Technology and the Hype Behind It
7.1. How Blockchains Are Different from Traditional Ledger-Based Structures
7.2. Applications Adopting the Concept of Blockchain Technology
7.3. Hype Around Blockchain Technology and the Reason Behind It
7.4. How Blockchain Technology Is Going to Change the Future of Digital Payments
Chapter 8
Musical Cryptography: An Isolated But Challenging Research Domain
8.1. Securing Voice Communication Using SNC Algorithm
8.1.1. Algorithm: Musical Voice Cryptography
8.2. Empirical Complexity of the Proposed Approach
8.3. Discussion
Chapter 9
Design of a Fuzzy Rule-Based Expert System for Automatic Raga Selection for Cryptographic Applications
9.1. Fuzzy Set and Fuzzy Rule-Based Expert System
9.2. Design of a Fuzzy Rule-Based Expert System for Automatic Raga Selection for Cryptographic Applications
9.3. Discussion
Chapter 10
Conclusion
References
Index
About the Authors
Blank Page
Blank Page


πŸ“œ SIMILAR VOLUMES


Statistics for Applied Behavior Analysis
✍ David J. Cox and Jason C. Vladescu πŸ“‚ Library πŸ“… 2023 πŸ› Elsevier 🌐 English

Statistics for Applied Behavior Analysis Practitioners and Researchers provides practical and useful content for individuals who work directly with, or supervise those who work directly with, individuals with ASD. This book introduces core concepts and principles of modern statistical analysis that

Organisational Diagnosis : Tools and app
✍ Nico Martins; Ellen Caroline Martins; Rica Viljoen πŸ“‚ Library πŸ“… 2017 πŸ› KR Publishing 🌐 English

The highly experienced and knowledgeable authors of Organisational Diagnosis provide the reader with the necessary advice, tools and applications to conduct a successful organisational diagnosis. Readers will come to understand how to diagnose concerns/problems and leverage untapped possibilities in

Understanding Cryptography: A Textbook f
✍ Christof Paar; Jan Pelzl πŸ“‚ Library πŸ“… 2009 πŸ› Springer Science & Business Media 🌐 English

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medica

Understanding Cryptography: A Textbook f
✍ Christof Paar πŸ“‚ Library πŸ“… 2014 πŸ› Springer 🌐 English

<p>After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners.</p>

Understanding Cryptography: A Textbook f
✍ Christof Paar; Jan Pelzl πŸ“‚ Library πŸ“… 2011 πŸ› Springer 🌐 English

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medica