This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption.
Features
Presents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption.
Discusses algorithms such as symmetric encryption, asymmetry encryption, digital signatures, and hash functions used for encryption.
Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption.
Illustrates software methods to implement cryptography algorithms.
Highlights a comparative analysis of models that are used in implementing cryptography algorithms.
The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.