Cybersecurity Lightweight Cryptographic Techniques » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Cybersecurity Lightweight Cryptographic Techniques
Cybersecurity Lightweight Cryptographic TechniquesНазвание: Cybersecurity Lightweight Cryptographic Techniques
Автор: Srinivasan Ramakrishnan
Издательство: ITexLi
Год: 2023
Страниц: 129
Язык: английский
Формат: pdf (true)
Размер: 13.2 MB

This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT).

In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book includes chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.

The term “keyless cryptography” as it is commonly adopted, applies to secure message transmission either directly without any key distribution in advance or as key sharing protocol between communicating users, based on physical layer security, before ordinary encryption/decryption procedures. In the current chapter the results are presented concerning to keyless cryptography that have been obtained by authors recently. Firstly Shamir’s protocol of secure communication is considered where commutative encryption procedure is executed. It has been found out which of the public key algorithms can be used with such protocol. Next item of consideration concerns Dean’s and Goldsmith’s cryptosystem based on multiple-input, multiple-output (MIMO) technology. It has been established under which conditions this cryptosystem is in fact secure.

1. Lightweight Cryptographic Techniques in 5G Software-Defined Internet of Things Networking
2. A Survey of Lightweight Image Encryption for IoT
3. The Importance of Pipeline in Modern Cryptosystem
4. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity
5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems
6. Advance in Keyless Cryptography
7. Distinguishing Encrypted from Non-Encrypted Data

Скачать Cybersecurity Lightweight Cryptographic Techniques

Комментарии 0
Комментариев пока нет. Стань первым!