Title Details: | |
Foundations and Applications of Modern Cryptography |
|
Other Titles: |
A review of the main applications of modern cryptography |
Authors: |
Drosatos, George Mavridis, Ioannis Rantos, Konstantinos |
Reviewer: |
Gritzalis, Dimitrios |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > FOUNDATIONAL CONCEPTS IN SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > NETWORK SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > WEB SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > PLATFORM SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > OPERATING SYSTEMS > SECURITY AND PROTECTION ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > SECURE COMMUNICATIONS MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > SOCIAL ISSUES AND PROFESSIONAL PRACTICE > PRIVACY AND CIVIL LIBERTIES |
Keywords: |
Information security
Cryptography Privacy Symmetric Cryptography Public Key Cryptography Hash functions Digital signatures Data protection Privacy-enhancing technologies Blockchains Post-quantum Cryptography Quantum Cryptography |
Description: | |
Abstract: |
The book "Foundations and Applications of Modern Cryptography" provides an in-depth analysis of modern cryptographic algorithms, mechanisms, and applications that ensure data confidentiality, integrity, authentication, and key management. Through its 15 standalone chapters, it offers a comprehensive overview of fundamental cryptographic principles, including Symmetric and Asymmetric Encryption, hash functions, random number generators, and data integrity and authentication mechanisms. Additionally, it explores practical cryptographic applications, such as data protection, blockchain, and privacy-enhancing solutions. The book also includes laboratory exercises and interactive educational material using CrypTool2 and Java/Eclipse, making it a valuable learning resource. In its final section, the book delves into specialized topics such as Lightweight Cryptography, Quantum Cryptography, and Post-quantum Cryptography. Aimed at meeting the needs of information security and privacy courses, it provides a balanced approach between theoretical foundations and practical implementation. Furthermore, it can serve as a complementary resource to existing textbooks in the field, aiding in the understanding and evaluation of cryptographic implementation alternatives.
|
Linguistic Editors: |
Triantafyllidou, Georgia |
Technical Editors: |
Drosatos, George Mavridis, Ioannis Rantos, Konstantinos |
Graphic Editors: |
Drosatos, George Mavridis, Ioannis Rantos, Konstantinos |
Type: |
Undergraduate textbook |
Creation Date: | 21-01-2025 |
Item Details: | |
ISBN |
978-618-228-316-5 |
License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
DOI | http://dx.doi.org/10.57713/kallipos-1067 |
Handle | http://hdl.handle.net/11419/14387 |
Bibliographic Reference: | Drosatos, G., Mavridis, I., & Rantos, K. (2025). Foundations and Applications of Modern Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-1067 |
Language: |
Greek |
Consists of: |
1. Symmetric Cryptography 2. Public Key Cryptography 3. Hash Functions 4. Pseudorandom Number Generators 5. Data Integrity and Authentication 6. Cryptographic Key Management 7. Public Key Infrastructures and Trust Services 8. Privacy Enhancement Mechanisms 9. Data Protection at Rest 10. Data Protection in Transit 11. Blockchains 12. Confidentiality and Privacy Assurance 13. Lightweight Cryptography 14. Applied Quantum Cryptography 15. Post-Quantum Cryptography |
Number of pages |
438 |
Publication Origin: |
Kallipos, Open Academic Editions |
You can also view | |
User comments | |
There are no published comments available! | |