46,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
23 °P sammeln
  • Broschiertes Buch

This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we…mehr

Produktbeschreibung
This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we are using pseudo-random bit generator for re-keying. Simulation is performed using Java 1.6 and IDE Netbeans 6.3, tested the same with sample data and obtained results are presented. This mechanism adopted as a communication service in a chat application and simulated the Man-in-the-Middle-Attack. Analysis reports of various tests performed are also presented. We have taken at most care to avoid errors, but there could be few minor errors. We will be very much grateful those who point out the errors and bring to our notice with relevant suggestions for improvements of the book in all aspects.
Autorenporträt
Penchalaiah, Dr. Padugupati
Dr. P Penchalaiah received Ph.D in computer science, got qualified UGC-NET and AP-SET in Computer Science / Applications. He has more than 12 years of experience (Academic and Industry). His research papers were published in various UGC approved journals and authored two books. His area of interest are Information Security and Data mining.