Cryptography and Information Security

Pachghare, V. K.

Cryptography and Information Security V. K. Pachghare - 2ne ed. - New Delhi : PHI Learning, 2017. - xix, 393 p.: ill.; 24 cm,

Data Encryption Techniques
Data Encryption Standards

Advanced Encryption Standard

Symmetric Ciphers

Number Theory


Public Key Cryptosystems



Key Management



Authentication



Digital Signatures



Electronic Mail Security




IP Security



Web Security




Intrusion





Malicious Software






Firewall







Computer Forensics









This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed.

This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter.

The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).

9788120350823


Computer science
Data encryption (Computer science)
Computer security
Cryptography

005.82 / PAC

Powered by Koha