51,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
26 °P sammeln
  • Broschiertes Buch

This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s utilities. Starting from introductory definitions, six symmetric techniques RCA, RKR, RSKA, CAOPB, RMOPB and CRKRTAB, their analysis and usages are described. Five are cyclic and rest is cascaded in nature. Various parametric tests such as Chi Square, frequency distribution are applied and analyzed along with secrete and session key based encryption process. For the purpose of easy understanding examples are associated with each along with the…mehr

Produktbeschreibung
This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s utilities. Starting from introductory definitions, six symmetric techniques RCA, RKR, RSKA, CAOPB, RMOPB and CRKRTAB, their analysis and usages are described. Five are cyclic and rest is cascaded in nature. Various parametric tests such as Chi Square, frequency distribution are applied and analyzed along with secrete and session key based encryption process. For the purpose of easy understanding examples are associated with each along with the algorithmic presentation of the techniques. Comparisons are also made to visualize the relative performances. The book is aimed at the graduate students, researchers and practicing professionals. Features presented make the book ideal text for computer science, computer applications, electronics people and practicing engineer s valuable reference source.
Autorenporträt
P.K.Jha M.Sc.(Elec.), M.C.A. Ph.D. (CS, NBU),Asso. Prof. CSE, Purbanchal University, Nepal,12 yrs teaching with 50 publications,2 scholars pursing Ph.D. J. K. Mandal, M. Tech. ((CS), C.U.)),Ph.D.(Engg.,JU), Dean, FETM, Prof. CSE, University of Kalyani, India, 25 yrs teaching,179 publications, 8 scholars awarded Ph.D.,8 pursuing.