Not Available / Digital Item
Condition: USED (All books are in used condition)
Condition - Very Good The item shows wear from consistent use, but it remains in good condition and functions properly. Item may arrive with damaged packaging or be repackaged. It may be marked, have identifying markings on it, or have minor cosmetic damage. It may also be missing some parts/accessories or bundled items.
Cryptography
★ ★ ★ ★ ★ WAGmob: Over One million paying customer ★ ★ ★ ★ ★
WAGmob brings you Simple 'n Easy, on-the-go learning ebook for "Cryptography".
The ebook provides:
Snack sized chapters for easy learning.
Designed for both students and adults.
This ebook provides a quick summary of essential concepts of Cryptography by following snack sized chapters:
Introduction:
• Secret Writing
• Cryptography
• Historical usage
• Encryption
• Plain – Text and Cipher – Text
• Decryption
• Steganography
• Cryptanalysis
Symmetric Cryptography:
• Cryptography Methods
• Symmetric (Secret – Key) Encryption
• Block and Stream Ciphers
• Encryption Algorithms
• Data Encryption Standard (DES)
• Triple DES
• Advanced Encryption Standard (AES)
• International Data Encryption Algorithm (IDEA)
• Twofish
• Blowfish
• Rivest Cipher
• Public Key Infrastructure (PKI)
• Certificate Authority (CA)
• Certificate Revocation List (CRL)
• Registration Authority
• Trust Models - Single/Hierarchical AND Web of Trust etc.
Digital Certificates and Signatures:
• Digital Certificates
• Digital Signatures
• X.509 digital certificate
• Structure of a X.509 digital certificate
Hash Algorithms:
• Hashing
• Cryptographic hash function
• Applications of Cryptographic hash function
• MD-5
• SHA
• SHA-1
• SHA-1 (160 bit message) Algorithm Framework
• SHA-2
Encrypted Communication:
• Introduction to Secure Communication
• Encryption of Data at Rest
• Encryption of Data in Transit
• SSH
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• Internet Protocol security (IPsec)
• The Point-to-Point Tunneling Protocol (PPTP)
Cryptographic attacks:
• Introduction
• Cryptographic Attack Methods
• Known Plaintext and Ciphertext-Only Attacks
• Chosen Plaintext and Chosen Ciphertext Attacks
• Adaptive Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
• Replay Attack
• Man-in-the-middle Attack
• Brute Force Attack
Cryptography Terms:
• Cryptography Terms
About WAGmob ebooks:
1) A companion ebook for on-the-go, bite-sized learning.
2) Offers value for money (a lifetime of free updates).
3) Over One million paying customers from 175+ countries.
Our Vision: A platform to create, amplify & distribute SIMPLE ’N EASY ebookS for a lifetime of on-the-go learning.
Our Mission: A simple ’n easy WAGmob ebooks in every hand.
visit us: www.WAGmob.com
Please write to us at [email protected]. We would love to improve this ebook.