Cryptography algorithms : explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography

Book Cover
Average Rating
Published
Birmingham, UK : Packt Publishing Ltd., 2024.
Status
Available Online

Description

Loading Description...

More Details

Format
Edition
Second edition.
Language
English
ISBN
9781835087978, 1835087973

Notes

Bibliography
Includes bibliographical references and index.
Description
This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Bertaccini, M. (2024). Cryptography algorithms: explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography (Second edition.). Packt Publishing Ltd..

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Bertaccini, Massimo. 2024. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography. Birmingham, UK: Packt Publishing Ltd.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Bertaccini, Massimo. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography Birmingham, UK: Packt Publishing Ltd, 2024.

Harvard Citation (style guide)

Bertaccini, M. (2024). Cryptography algorithms: explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography. Second edn. Birmingham, UK: Packt Publishing Ltd.

MLA Citation, 9th Edition (style guide)

Bertaccini, Massimo. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography Second edition., Packt Publishing Ltd., 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
9dc27505-3113-8450-d1d0-4fe969530883-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID9dc27505-3113-8450-d1d0-4fe969530883-eng
Full titlecryptography algorithms explore new algorithms in zero knowledge homomorphic encryption and quantum cryptography
Authorbertaccini massimo
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-02-27 03:31:17AM

Book Cover Information

Image Sourcedefault
First LoadedFeb 6, 2025
Last UsedFeb 6, 2025

Marc Record

First DetectedDec 16, 2024 11:30:28 PM
Last File Modification TimeDec 17, 2024 08:39:29 AM
SuppressedRecord had no items

MARC Record

LEADER05864cam a22005057i 4500
001on1452741462
003OCoLC
00520241217082840.0
006m     o  d        
007cr cnu|||unuuu
008240820s2024    enka    ob    001 0 eng d
019 |a 1451795990
020 |a 9781835087978
020 |a 1835087973
035 |a (OCoLC)1452741462|z (OCoLC)1451795990
037 |a 9781835080030|b O'Reilly Media
040 |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCO|d EBLCP|d OCLCQ
049 |a MAIN
050 4|a QA268
08204|a 005.8/24|2 23/eng/20240820
1001 |a Bertaccini, Massimo,|e author.
24510|a Cryptography algorithms :|b explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography /|c Massimo Bertaccini.
250 |a Second edition.
264 1|a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024.
300 |a 1 online resource (410 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
4901 |a Expert insight
504 |a Includes bibliographical references and index.
5050 |a Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption)
5058 |a Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm
5058 |a Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1
5058 |a Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work? -- Digital signatures with the ElGamal algorithm -- Blind signatures -- Blind signature with RSA -- Notes on the blind signature protocol -- Summary -- Section 3: New Cryptography Algorithms and Protocols -- Chapter 5: Zero-Knowledge Protocols -- The main scenario of a ZKP -- the digital cave -- Non-interactive ZKPs -- Demonstration of a non-interactive ZKP -- Demonstrating an attack on an RSA ZKP -- Schnorr's interactive ZKP -- A demonstration of an interactive ZKP
5058 |a A challenge for a disruptive attack on an interactive ZKP -- One-round ZKP -- How it works mathematically -- Numerical example -- Notes on the one-round protocol -- An introduction to zk-SNARKs -- spooky moon math -- Understanding how a zk-SNARK works -- Demonstrating an attack on a zk-SNARK protocol -- ZK13 -- a ZKP for authentication and key exchange -- ZK13 explained -- Demonstrating the ZK13 protocol -- Notes and possible attacks on the ZK13 protocol -- Possible attacks on ZK13 -- Summary -- Chapter 6: New Inventions in Cryptography and Logical Attacks
520 |a This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Cryptography.|9 35279
650 0|a Computer security.|9 65527
77608|i Print version:|a Bertaccini, Massimo|t Cryptography Algorithms|d Birmingham : Packt Publishing, Limited,c2024|z 9781835080030
830 0|a Expert insight.
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781835080030/?ar|x O'Reilly|z eBook
938 |a ProQuest Ebook Central|b EBLB|n EBL31591424
994 |a 92|b VIA
999 |c 361236|d 361236