About The Book
The book Cryptography And Public Key Infrastructure contains eight chapters. The first chapter gives a general introduction to cryptography. The second chapter explains how symmetric key encryption works. It also explains block cipher, stream cipher, and block cipher mode of operation and how various symmetric key encryption algorithms like DES, AES, IDEA, A5/1, RC4, etc. work.
The third chapter explains how public-key encryption and digital signature work. This chapter also explains how various algorithms like DSA, RSA, ElGamal, etc. work.
The fourth chapter explains how cryptographic hashing and various algorithms like MD5, SHA, Bcrypt, HMAC, etc. work.
The fifth chapter explains how various key exchange protocols like the Diffie-Hellman Key Exchange Protocol work.
The sixth chapter explains cryptanalysis and various cryptographic attacks.
The seventh chapter explains what Public Key Infrastructure and Digital Certificates are, why we need them and how they work.
And, the eighth and the last chapter explain how network protocols like TLS, SSH, DNSSEC, SFTP, FTPS, etc. use various cryptographic algorithms to secure our data.
About The Author
Ms. Amrita Mitra is an author and the founder of Asigosec Technologies, the company that owns The Security Buddy. Her areas of interest are cyber security, mathematics, and AI.
How To Buy The Book:
The paperback version of the cryptography book is available on the following Amazon marketplaces and the Kindle version is available on all Amazon marketplaces.
Reviews and Comments:
If you have read the cryptography book and want to give your valuable reviews, comments or feedback, please do so on Amazon or at the link mentioned below: