Mohammed et al., 2024 - Google Patents
Cryptography and Network Security in Modern EraMohammed et al., 2024
- Document ID
- 7815132695236909810
- Author
- Mohammed S
- Chhajed K
- Nichat M
- Kute V
- Publication year
External Links
Snippet
Cryptography and Network Security in the Modern Era is a comprehensive guide that explores the foundational and advanced aspects of securing digital systems. The book begins by introducing the basics of cryptography, tracing its historical evolution and practical …
- 238000000034 method 0 abstract description 205
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pachghare | Cryptography and information security | |
Qadir et al. | A review paper on cryptography | |
AbuTaha et al. | Survey paper: cryptography is the science of information security | |
Banoth et al. | Classical and Modern Cryptography for Beginners | |
Saikumar | DES-Data Encryption Standard | |
Widiasari | Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security | |
Banoth et al. | An introduction to classical and modern cryptography | |
Erondu et al. | An encryption and decryption model for data security using vigenere with advanced encryption standard | |
Achary | Cryptography and network security: an introduction | |
Onwutalobi | Overview of cryptography | |
Mohammed et al. | Cryptography and Network Security in Modern Era | |
Kaur et al. | Cryptography in cloud computing | |
Radhakrishnan et al. | Biometrics and Cryptography | |
Ketha | The Evolution of Cryptography and a Contextual Analysis of the Major Modern Schemes | |
Bhatia | Cryptography-The Hidden Message | |
Chandurkar et al. | Case Study on Cryptography | |
Zahra et al. | The Art of Secrecy: Hybridizing Caesar and Columnar Ciphers for Enhanced Data Security | |
Baftiu | ANALYSIS AND USE OF CRYPTOGRAPHY TECHNIQUES IN PROGRAMMING LANGUAGE C | |
Mutabaruka | Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman) | |
Hellwig et al. | Blockchain Cryptography: Part 1 | |
Mishra et al. | Understanding the Aspect of Cryptography and Internet Security: A Practical Approach | |
Kadri | Enhancement of Advanced Encryption Standard Performance on Hidden Data Using Residue Number System | |
Midha et al. | Cryptography in Network Security | |
Schmied | Cryptology for Engineers: An Application-Oriented Mathematical Introduction | |
NEACȘU et al. | A Security Analysis of Public Key Cryptographic Systems Used For Electronic Signature |