![](images/graphics/blank.gif)
Symmetric key cryptography
-
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
11p
visergeyne
18-06-2024
3
0
Download
-
The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.
12p
visergeyne
18-06-2024
1
0
Download
-
Ebook "Complexity & cryptography: An introduction" provides that knowledge, combining an informal style with rigorous proofs of the key results to give an accessible introduction. It comes with plenty of examples and exercises (many with hints and solutions), and is based on a highly successful course developed and taught over many years to undergraduate and graduate students in mathematics and computer science.
305p
zizaybay1103
29-05-2024
5
2
Download
-
The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.
372p
zizaybay1103
29-05-2024
5
2
Download
-
Welcome to the second book from RSA Press, RSA Security’s Official Guide to Cryptography! As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated with this activity. Effective use of cryptographic techniques is at the core of many of these risk-management strategies.
449p
zizaybay1103
29-05-2024
3
2
Download
-
The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
20p
vigojek
02-02-2024
2
0
Download
-
Part 1 of ebook "A graduate course in applied cryptography" develops symmetric encryption which explains how two parties, Alice and Bob, can securely exchange information when they have a shared key unknown to the attacker. We discuss data confidentiality, data integrity, and the important concept of authenticated encryption.
411p
tieulangtran
28-09-2023
11
3
Download
-
Chapter 1- secure communication in modern information societies, chapter 2 - public key cryptography, chapter 3 - symmetric key cryptography, chapter 4 - security protocol design and analysis, chapter 5 - optimal public key encryption with RSA, chapter 6 - analysis of secure information flow.
297p
haojiubujain06
05-09-2023
6
2
Download
-
Ebook Foundations of security - What every programmer needs to know: Part 2 includes contents: Chapter 9 password security, chapter 10 cross-domain security in web applications, chapter 11 exercises for part 2, chapter 12 symmetric key cryptography, chapter 13 asymmetric key cryptography, chapter 14 key management and exchange, chapter 15 macs and signatures, chapter 16 exercises for part 3.
152p
haojiubujain06
05-09-2023
4
3
Download
-
Ebook Information security: Principles and practice includes contents: Chapter 1: introduction; chapter 2: classic cryptography; chapter 3: symmetric key crypto; chapter 4: public key crypto; chapter 5: hash functions; chapter 6: advanced cryptanalysis; chapter 7: authentication; chapter 8: authorization; chapter 9: authentication protocols; chapter 10: real-world protocols; chapter 11: software flaws and malware; chapter 12: insecurity in software; chapter 13: os and security.
413p
haojiubujain06
05-09-2023
4
3
Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p
visirius
19-01-2023
7
2
Download
-
Lecture Cryptography and network security: Chapter 3 after studying this section will help you understand: To define the terms and the concepts of symmetric key ciphers; To emphasize the two categories of traditional ciphers: substitution and transposition ciphers; To describe the categories of cryptanalysis used to break the symmetric ciphers;
67p
hoathachthao090
10-02-2022
18
4
Download
-
Lecture Cryptography and network security: Chapter 5 after studying this section will help you understand: To distinguish between traditional and modern symmetric-key ciphers; To introduce modern block ciphers and discuss their characteristics; To explain why modern block ciphers need to be designed as substitution ciphers.
67p
hoathachthao090
10-02-2022
21
4
Download
-
Lecture Cryptography and network security: Chapter 8 after studying this section will help you understand: To show how modern standard ciphers, such as DES or AES, can be used to encipher long messages. To discuss five modes of operation designed to be used with modern block ciphers. To define which mode of operation creates stream ciphers out of the underlying block ciphers.
41p
hoathachthao090
10-02-2022
20
4
Download
-
Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...
59p
hoathachthao090
10-02-2022
19
4
Download
-
The paper proposes a solution to construct symmetric–key cryptographic algorithms based on OTP cipher developed based on the cipher One – Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,...).
10p
luuhongdung
09-09-2021
65
41
Download
-
(BQ) The followings will be discussed in Ebook Network security essentials: Applications and standards – Part 1: Introduction, symmetric encryption and message confidentiality, public-key cryptography and message authentication, key distribution and user authentication, transport-level security, wireless network security, electronic mail security, IP Security.
319p
lovebychance04
20-05-2021
25
5
Download
-
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...
576p
lovebychance04
20-05-2021
35
5
Download
-
"Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...
372p
haphuonglan2021
25-04-2021
36
16
Download
-
Chapter 31 - Network security. In this chapter, we first introduce the security services we typically expect in a network. We then show how these services can be provided using cryptography. At the end of the chapter, we also touch on the issue of distributing symmetric and asymmetric keys.
49p
koxih_kothogmih5
01-09-2020
27
4
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)