Understanding and Applying Cryptography and Data Security

Regular price €74.99
Quantity:
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Adam J. Elbirt
advanced security protocols
Age Group_Uncategorized
Age Group_Uncategorized
algorithm implementation
Author_Adam J. Elbirt
automatic-update
Block Cipher
Category1=Non-Fiction
Category=PBCD
Category=UBL
Category=UR
Category=URY
Category=UY
Ccm Mode
Certifying Authority
Ciphers
Ciphertext Spaces
COP=United Kingdom
cryptanalysis techniques
cryptographic algorithm comparison guide
Cryptographic Protocols
Cryptography
Data Encryption Standard
Data Security
Delivery_Pre-order
DES
Discrete Logarithm
Discrete Logarithm Problem
Elliptic Curve
Embedded Systems
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Extended Euclidean Algorithm
hardware security design
Hash Function
Homework Problem
Index Calculus Method
information security engineering
Integer Factorization
Key Agreement Protocol
Key Stream
Language_English
LIBRARY Ieee
mathematical foundations of encryption
Message Authentication Code
Mod 13
PA=Temporarily unavailable
Price_€50 to €100
PS=Active
Public-Key Algorithms
RSA Cryptosystem
softlaunch
Stream Ciphers
Symmetric Key Cryptosystems
Symmetric-Key Algorithms
X1 Mod
XOR Operation

Product details

  • ISBN 9780367385798
  • Weight: 1240g
  • Dimensions: 156 x 234mm
  • Publication Date: 23 Oct 2019
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Paperback
  • Language: English
Secure checkout Fast Shipping Easy returns

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses.

Provides the Foundation for Constructing Cryptographic Protocols
The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols.

Offers Implementation Comparisons By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations.

A solutions manual is available to qualified instructors with course adoptions.

Elbirt, Adam J.

More from this author