Analysis and Implementation of Secure Lightweight Crypto Algorithm

Author:   Renita J
Publisher:   Mohammed Abdul Sattar
ISBN:  

9798224870851


Pages:   176
Publication Date:   03 January 2024
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $87.09 Quantity:  
Add to Cart

Share |

Analysis and Implementation of Secure Lightweight Crypto Algorithm


Add your own review!

Overview

Cryptography has become an integral part of the globe. The need to secure things has become a necessity as the world leaps towards technology enhancements. Modern security systems use cryptography for secure transactions and communications, to secure personal information and other confidential data, to create trust between different servers etc. Weak cryptography may expose the infrastructure to vulnerabilities. This may cause information leakage and brand destruction. Hence, the latest development in technologies should also sternly focus on how cryptography is employed and managed throughout the innovations. With these novelties, it is very safe to transmit sensitive information since they become unreadable and unmodifiable. The plaintext is in a readable format which is then encrypted to get the cipher text. The cipher text is the encrypted data which is in a non-readable format. The cipher text is then decrypted to get the plaintext back which is in the readable format. The major aspects to be included in a crypto module includes the algorithms, the keys, libraries and the certificates that are being used. The use of cryptographic keys is to protect sensitive information. The length of the keys should be maintained as suggested by the NIST (National Institute of Standards and Technology) and private keys must be kept secret to be effective. The use of insecure keys or disclosing the secret keys makes the crypto algorithm obsolete. Crypto algorithms have the basic mathematical foundation to maintain the confidentiality, integrity and authenticity of sensitive information. It is important to choose reliable, standardized and mathematically secure crypto algorithms to prevent data exposure, data tampering, or repudiation. In the present time, cryptography has become a mandatory source for digital business. The organizations and technologies that provide crypto security should follow the techniques suggested by standard groups such as NIST and ISO (International Organization for Standardization). This leads to crypto agility which is the key to keeping pace with the latest cryptographic compliance requirements, standards, and recommendations that sustain and secure digital business. Cryptography has become an integral part of the globe. The need to secure things has become a necessity as the world leaps towards technology enhancements. Modern security systems use cryptography for secure transactions and communications, to secure personal information and other confidential data, to create trust between different servers etc. Weak cryptography may expose the infrastructure to vulnerabilities. This may cause information leakage and brand destruction. Hence, the latest development in technologies should also sternly focus on how cryptography is employed and managed throughout the innovations. With these novelties, it is very safe to transmit sensitive information since they become unreadable and unmodifiable. The plaintext is in a readable format which is then encrypted to get the cipher text. The cipher text is the encrypted data which is in a non-readable format. The cipher text is then decrypted to get the plaintext back which is in the readable format. The major aspects to be included in a crypto module includes the algorithms, the keys, libraries and the certificates that are being used. The use of cryptographic keys is to protect sensitive information. The length of the keys should be maintained as suggested by the NIST (National Institute of Standards and Technology) and private keys must be kept secret to be effective. The use of insecure keys or disclosing the secret keys makes the crypto algorithm obsolete.

Full Product Details

Author:   Renita J
Publisher:   Mohammed Abdul Sattar
Imprint:   Mohammed Abdul Sattar
Dimensions:   Width: 21.60cm , Height: 1.00cm , Length: 27.90cm
Weight:   0.422kg
ISBN:  

9798224870851


Pages:   176
Publication Date:   03 January 2024
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List