Cover image for Practical cryptography: algorithms and implementations using C++
Title:
Practical cryptography: algorithms and implementations using C++
Publication Information:
Boca Raton: CRC Press/Taylor & Francis, 2015
Physical Description:
xix, 345pages. : illustrations ; 25 cm.
ISBN:
9781482228892

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010340783 QA76.9 A25 P725 2015 Open Access Book Book
Searching...

On Order

Summary

Summary

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.

Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.

Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.


Author Notes

Saiful Azad received his PhD in information engineering at University of Padova, Italy in 2013. He completed his B.Sc. from IUT, Bangladesh in computer and information technology, and M.Sc. from IIUM, Malaysia in computer and information engineering. After completion of his PhD, he joined as a faculty member in the Department of Computer Science at American International University - Bangladesh (AIUB). He started working on Underwater Acoustic Networks during his PhD and still it remains his main focus of research. His research interests also lie in designing and implementing communication protocols for any network architecture, QoS issues, network security, and simulator design. He is one of the developers of the DESERT underwater simulator. He is also the author of more than 30 scientific papers published in international peer-reviewed journals or conferences. He has served as a technical program committee member in numerous international conferences/workshops. He also serves as a reviewer of a couple of renowned peer-reviewed journals and conferences.

Al-Sakib Khan Pathan earned his PhD (MS leading to PhD) in computer engineering in 2009 from Kyung Hee University in South Korea. He earned his BS in computer science and information technology from IUT, Bangladesh, in 2003. He is currently an assistant professor in the Computer Science Department of IIUM. Until June 2010, he served as an assistant professor in the Computer Science and Engineering Department of BRAC University, Bangladesh. Prior to holding this position, he worked as a researcher at the networking lab of Kyung Hee University, South Korea, until August 2009.

Dr. Pathan's research interests include wireless sensor networks, network security, and e-services technologies. He has been a recipient of several awards/best paper awards and has several publications in these areas. He has served as chair, an organizing committee member, and a technical program committ


Table of Contents

Al-Sakib Khan PathanSheikh Shaugat Abdullah and Saiful AzadSheikpi Shaugat Abdullah and Saiful AzadTanveer Ahmed and Mohammad Abul Kashem and Saiful AzadEzazul Islam and Saiful AzadAsif Ur Rahman and Saef Ullah Miah and Satful AzadNasrin Sultana and Saiful AzadSaad Andalib and Saiful AzadHafizur Rahman and Saiful AzadBayzid Ashik HossainSaddam Hossain Mukta and Saiful AzadAymen Boudguiga and Maryline Laurent and Mohamed HamdiGiovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele ScandaleMarat Zhanikeev
Prefacep. ix
Acknowledgmentsp. xi
About the Editorsp. xiii
Contributorsp. xvii
Chapter 1 Basics of Security and Cryptographyp. 1
Chapter 2 Classical Cryptographic Algorithmsp. 11
Chapter 3 Rotor Machinep. 35
Chapter 4 Block Cipherp. 45
Chapter 5 Data Encryption Standardp. 57
Chapter 6 Advanced Encryption Standardp. 91
Chapter 7 Asymmetric Key Algorithmsp. 127
Chapter 8 The RSA Algorithmp. 135
Chapter 9 Elliptic Curve Cryptographyp. 147
Chapter 10 Message Digest Algorithm 5p. 183
Chapter 11 Secure Hash Algorithmp. 207
Chapter 12 Fundamentals of Identity-Based Cryptographyp. 225
Chapter 13 Symmetric Key Encryption Acceleration on Heterogeneous Many-Core Architecturesp. 251
Chapter 14 Methods and Algorithms for Fast Hashing in Data Streamingp. 299
Indexp. 335