Public Key Cryptosystems : Cyber Shorts - Esra Bas

Public Key Cryptosystems

By: Esra Bas

Paperback | 30 December 2024

At a Glance

Paperback


$165.75

or 4 interest-free payments of $41.44 with

 or 

Available: 30th December 2024

Preorder. Will ship when available.

This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapter 1 and Chapter 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.

Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.

The book's distinctive features:

  • The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book.
  • The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms.
  • The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning.
  • The concepts and algorithms are illustrated with examples some of which are revisited multiple times to present alternative approaches.
  • The details of the topics covered in the book are intentionally not presented, however several references are provided at the end of each chapter so that the reader can read those references for more details.

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$32.75

51%
OFF
Cyber Wars : Hacks that Shocked the Business World - Charles Arthur

BLACK FRIDAY

Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Crafting an Information Security Playbook - Jeff Bollinger

RRP $95.00

$43.25

54%
OFF
How to Measure Anything in Cybersecurity Risk - Douglas W. Hubbard

RRP $99.95

$64.50

35%
OFF
Cloud Security For Dummies : For Dummies (Computer/Tech) - Ted Coombs