eBooks-it.org Logo
eBooks-IT.org Inner Image

Public Key Cryptography

Applications and Attacks

Public Key Cryptography Image

Book Details:

Publisher:Wiley-Blackwell
Series: Wiley
Author:Lynn Margaret Batten
Edition:1
ISBN-10:1118317122
ISBN-13:9781118317129
Pages:224
Published:Mar 12 2013
Posted:Apr 28 2017
Language:English
Book format:PDF
Book size:3.82 MB

Book Description:

This book covers publickey cryptography, describing in depth all major publickey cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using publickey systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional).

Download Link:

Related Books:

Cryptography for Internet and Database Applications

Developing Secret and Public Key Techniques with Java
Cryptography for Internet and Database Applications Image
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applications such as e-mail, databases, and browsers store a tremendous amount of personal and financial information, but frequently the data is left unprotected. Traditional network security is frequently less effective at preventing hackers from accessing this data. For instance, once-private databases are now completely exposed on the Internet. It turns out that ge...

Quantum Attacks on Public-Key Cryptosystems

Quantum Attacks on Public-Key Cryptosystems Image
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosys...

Wi-Fi Hotspots

Setting Up Public Wireless Internet Access
Wi-Fi Hotspots Image
Wi-Fi Hotspots Setting Up Public Wireless Internet Access Installing and operating a Wi-Fi hotspot allows you to attract customers and differentiate your business. Deploying even a small wireless network has proven to be a difficult task for the average consumer, however. With this book as your guide, you can painlessly figure out the requirements for your Wi-Fi hotspot, how to properly set it up, how to operate it, and how to optimize it for the needs and security of your customers. Wi-Fi Hotspots helps you throughout the entire process of setting up a hotspot to offer free or fee-based Internet access to the general public: Understand the benefits to your business of hosting a hotspot Decide what type of hotspot you should implement Examine w...



2007 - 2021 © eBooks-IT.org