Cryptography And Network Security

By GUPTA, PRAKASH C. more
5279 Views
₹303.75 ₹450.00 You will save ₹146.25 after 33% Discount

Add to Wish List

Save extra with 3 Offers

Get ₹ 50 Instant Cashback on the purchase of ₹ 400 or above
SAVE10 Already Applied

NEW50

Get Flat 50% Off on your First Order

Product Specifications

Publisher PHI Learning
ISBN 9788120350458
Author: GUPTA, PRAKASH C.
Number of Pages 480
Available
Available in all digital devices
  • Snapshot
  • About the book

About The Book Cryptography And Network Security
Book Summary:

The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.

Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.


Key Features

The subject matter is illustrated with about 200 figures and numerous examples at every stage of learning.
The list of recommended books, technical articles, and standards is included chapter-wise at the end of the book.
An exhaustive glossary and a list of frequently used acronyms are also given.
The book is based on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509 etc.).


Table of Contents:

Preface Abbreviations

1. Introduction to Network Security

2. Mathematical Foundations I (Modular Arithmetic)

3. Classical Encryption Techniques

4. Symmetric-key Ciphers I: Data Encryption Standard

5. Mathematical Foundations II (Finite Fields)

6. Symmetric-key Ciphers II: Advanced Encryption Standard

7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)

8. Mathematical Foundations III (Prime Numbers)

9. Asymmetric-key Cryptosystems

10. Elliptic Curve Cryptography

11. Message Authentication

12. Digital Signatures

13. Entity Authentication

14. Symmetric-key Distribution

15. Public-key Distribution

16. Email Security

17. Transport Layer Security (TLS)

18. IP Security

19. Internet Key Exchange (IKE)

20. Wireless LAN Security

21. Network Vulnerabilities

22. Firewalls and Intrusion Detection Systems

23. Malware

Appendix A1: Prime Numbers, Primitive Roots, Irreducible Polynomials

Appendix A2: Birthday Problems

Appendix A3: Networking Protocols for User Authentication

Glossary Answers to Selected Problems Index

 

x