WELCOME TO TECHNICAL PUBLICATIONS
You have no items in your shopping cart.
Close
Filters
Search

Information and Network Security

V. S. Bagad, I. A. Dhotre ISBN-9789333220316
10% Discount
₹ 90.00
₹ 81.00
+ -

Module - 1
Introduction. How to Speak Crypto. Classic Crypto. Simple Substitution Cipher. Cryptanalysis of a Simple Substitution. Definition of Secure. Double Transposition Cipher. One-time Pad. Project VENONA. Codebook Chiper. Ciphers of the Election of 1876. Modern Crypto History. Taxonomy of Cryptography. Taxonomy of Cryptanalysis. (Chapter - 1)
Module - 2
What is a Hash Function ? The Birthday Problern. Non-cryptographic Hashes. Tiger Hash. HMAC. Uses of Hash Functions. Online Bids. Spam Reduction. Other Crypto-Related Topics. Secret Sharing. Key Escrow. Random Numbers. Texas Hold'em Poker. Generating Random Bits. Information Hiding : (Chapter - 2)
Module - 3
Random number generation Providing freshness Fundamentals of entity authentication Passwords Dynamic password schemes Zero-knowledge mechanisms Further reading Cryptographic Protocols Protocol basics From objectives to a protocol Analysing a simple protocol Authentication and key establishment protocols. (Chapter - 3)
Module - 4
Key management fundamentals Key lengths and lifetimes Key generation Key establishment Key storage Key usage Governing key management Public-Key Management Certification of public keys The certificate lifecycle Public-key management models Alternative approaches. (Chapter - 4)
Module-5
Cryptographic Applications Cryptography on the Internet Cryptography for wireless local area networks Cryptography for mobile telecommunications Cryptography for secure payment card transactions Cryptography for video broadcasting Cryptography for identity cards Cryptography for horne users. (Chapter - 5)

 

Module - 1
Introduction. How to Speak Crypto. Classic Crypto. Simple Substitution Cipher. Cryptanalysis of a Simple Substitution. Definition of Secure. Double Transposition Cipher. One-time Pad. Project VENONA. Codebook Chiper. Ciphers of the Election of 1876. Modern Crypto History. Taxonomy of Cryptography. Taxonomy of Cryptanalysis. (Chapter - 1)
Module - 2
What is a Hash Function ? The Birthday Problern. Non-cryptographic Hashes. Tiger Hash. HMAC. Uses of Hash Functions. Online Bids. Spam Reduction. Other Crypto-Related Topics. Secret Sharing. Key Escrow. Random Numbers. Texas Hold'em Poker. Generating Random Bits. Information Hiding : (Chapter - 2)
Module - 3
Random number generation Providing freshness Fundamentals of entity authentication Passwords Dynamic password schemes Zero-knowledge mechanisms Further reading Cryptographic Protocols Protocol basics From objectives to a protocol Analysing a simple protocol Authentication and key establishment protocols. (Chapter - 3)
Module - 4
Key management fundamentals Key lengths and lifetimes Key generation Key establishment Key storage Key usage Governing key management Public-Key Management Certification of public keys The certificate lifecycle Public-key management models Alternative approaches. (Chapter - 4)
Module-5
Cryptographic Applications Cryptography on the Internet Cryptography for wireless local area networks Cryptography for mobile telecommunications Cryptography for secure payment card transactions Cryptography for video broadcasting Cryptography for identity cards Cryptography for horne users. (Chapter - 5)

 

Write your own review
  • Only registered users can write reviews
  • Bad
  • Excellent
Customers who bought this item also bought

Advanced Computer Architectures

I. A. Dhotre ISBN-9789333220071
10% Discount
₹ 117.00 ₹ 130.00

Machine Learning

I. A. Dhotre ISBN-9789333220187
10% Discount
₹ 68.00 ₹ 75.00

Web Technology and its Applications

A. A. Puntambekar ISBN-9789333220309
10% Discount
₹ 261.00 ₹ 290.00