|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
In der vorliegenden Arbeit werden die Einsatzmoglichkeiten
approximativer Verfahren fur Public-Key-Kryptosysteme untersucht.
Dazu werden in einer allgemeinverstandlichen Einleitung die
notwendigen Grundlagen erarbeitet. Im Anschluss daran werden
Resultate uber eine reellwertige Approximation periodischer und
nichtperiodischer Funktionen fur Verschlusselungssysteme mit
offentlichem Schlussel entwickelt. Weiterhin werden die
kryptologischen Eigenschaften rationaler Zahlen untersucht. Diese
fliessen in die Entwicklung eines neuen Konzeptes fur ein
Public-Key-Kryptosystem ein, die Public-Key-Hill-Chiffre, die auch
digitale Unterschriften zulasst. Zur Abrundung der Thematik werden
weitere Anwendungen in verwandten Gebieten dargestellt: die exakte
Arithmetik mit rationalen Zahlen auf der Basis von Gleitkommazahlen
und ein neuer Ansatz fur Faktorisierungsalgorithmen. Damit ist das
zentrale Ergebnis die Benutzung rationaler Zahlen in
Public-Key-Kryptosystemen, die eine neue Forschungsrichtung
innerhalb der Kryptologie eroffnen konnte. Der fachkundige Leser
erhalt Informationen uber neue Forschungsansatze und Methoden in
der Kryptologie, fachfremde Leser erhalten einen guten Uberblick
uber die Problemstellung der Entwicklung neuer
Public-Key-Kryptosysteme.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented
public key cryptography, an innovation that ultimately changed the
world. Today public key cryptography provides the primary basis for
secure communication over the internet, enabling online work,
socializing, shopping, government services, and much more. While
other books have documented the development of public key
cryptography, this is the first to provide a comprehensive
insiders' perspective on the full impacts of public key
cryptography, including six original chapters by nine distinguished
scholars. The book begins with an original joint biography of the
lives and careers of Diffie and Hellman, highlighting parallels and
intersections, and contextualizing their work. Subsequent chapters
show how public key cryptography helped establish an open
cryptography community and made lasting impacts on computer and
network security, theoretical computer science, mathematics, public
policy, and society. The volume includes particularly influential
articles by Diffie and Hellman, as well as newly transcribed
interviews and Turing Award Lectures by both Diffie and Hellman.
The contributed chapters provide new insights that are accessible
to a wide range of readers, from computer science students and
computer security professionals, to historians of technology and
members of the general public. The chapters can be readily
integrated into undergraduate and graduate courses on a range of
topics, including computer security, theoretical computer science
and mathematics, the history of computing, and science and
technology policy.
Discover how to take advantage of common cryptographic operations
to build safer apps that respect users' privacy with the help of
examples in JavaScript for Node.js and browsers Key Features
Understand how to implement common cryptographic operations in your
code with practical examples Learn about picking modern safe
algorithms, which libraries you should rely on, and how to use them
correctly Build modern and secure applications that respect your
users' privacy with cryptography Book DescriptionIf you're a
software developer, this book will give you an introduction to
cryptography, helping you understand how to make the most of it for
your applications. The book contains extensive code samples in
JavaScript, both for Node.js and for frontend apps running in a web
browser, although the core concepts can be used by developers
working with any programming language and framework. With a purely
hands-on approach that is focused on sharing actionable knowledge,
you'll learn about the common categories of cryptographic
operations that you can leverage in all apps you're developing,
including hashing, encryption with symmetric, asymmetric and hybrid
ciphers, and digital signatures. You'll learn when to use these
operations and how to choose and implement the most popular
algorithms to perform them, including SHA-2, Argon2, AES,
ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later,
you'll learn how to deal with password and key management. All code
in this book is written in JavaScript and designed to run in
Node.js or as part of frontend apps for web browsers. By the end of
this book, you'll be able to build solutions that leverage
cryptography to protect user privacy, offer better security against
an expanding and more complex threat landscape, help meet data
protection requirements, and unlock new opportunities. What you
will learn Write JavaScript code that uses cryptography running
within a Node.js environment for the server-side or in frontend
applications for web browsers Use modern, safe hashing functions
for calculating digests and key derivation, including SHA-2 and
Argon2 Practice encrypting messages and files with a symmetric key
using AES and ChaCha20-Poly1305 Use asymmetric and hybrid
encryption, leveraging RSA and Elliptic Curve Cryptography with
ECDH and ECIES Calculate and verify digital signatures using RSA
and ECDSA/EdDSA Manage passwords and encryption keys safely Who
this book is forThis cryptography book is an introductory guide for
software developers who don't necessarily have a background in
cryptography but are interested in learning how to integrate it in
their solutions, correctly and safely. You'll need to have at least
intermediate-level knowledge of building apps with JavaScript and
familiarity with Node.js to make the most of this book.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
|
|