Mohammed et al., 2024 - Google Patents

Cryptography and Network Security in Modern Era

Mohammed et al., 2024

Document ID
7815132695236909810
Author
Mohammed S
Chhajed K
Nichat M
Kute V
Publication year

External Links

Snippet

Cryptography and Network Security in the Modern Era is a comprehensive guide that explores the foundational and advanced aspects of securing digital systems. The book begins by introducing the basics of cryptography, tracing its historical evolution and practical …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Similar Documents

Publication Publication Date Title
Pachghare Cryptography and information security
Qadir et al. A review paper on cryptography
AbuTaha et al. Survey paper: cryptography is the science of information security
Banoth et al. Classical and Modern Cryptography for Beginners
Saikumar DES-Data Encryption Standard
Widiasari Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security
Banoth et al. An introduction to classical and modern cryptography
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
Achary Cryptography and network security: an introduction
Onwutalobi Overview of cryptography
Mohammed et al. Cryptography and Network Security in Modern Era
Kaur et al. Cryptography in cloud computing
Radhakrishnan et al. Biometrics and Cryptography
Ketha The Evolution of Cryptography and a Contextual Analysis of the Major Modern Schemes
Bhatia Cryptography-The Hidden Message
Chandurkar et al. Case Study on Cryptography
Zahra et al. The Art of Secrecy: Hybridizing Caesar and Columnar Ciphers for Enhanced Data Security
Baftiu ANALYSIS AND USE OF CRYPTOGRAPHY TECHNIQUES IN PROGRAMMING LANGUAGE C
Mutabaruka Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman)
Hellwig et al. Blockchain Cryptography: Part 1
Mishra et al. Understanding the Aspect of Cryptography and Internet Security: A Practical Approach
Kadri Enhancement of Advanced Encryption Standard Performance on Hidden Data Using Residue Number System
Midha et al. Cryptography in Network Security
Schmied Cryptology for Engineers: An Application-Oriented Mathematical Introduction
NEACȘU et al. A Security Analysis of Public Key Cryptographic Systems Used For Electronic Signature