Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cybercryptography : applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5)
Date Reviewed: May 3 2019

In the last 40 years, “cyberspace” has become a common buzzword. Cyberspace has tremendous potential for human development in many sectors. The security of cyberspace is of utmost importance and poses a great challenge for security experts. So, what is cyberspace security and how is it done? This book, in nine chapters, provides answers to such questions, including modern developments in the mathematical area of the subject.

Chapter 1 covers the basics of cyberspace security, including the strategies of different countries. Chapter 2 collects the mathematical preliminaries needed to understand the rest of the material. Computational preliminaries, including quantum computing and complexity, are addressed in chapter 3. Secret-key and public-key cryptography are covered in chapter 4, which also discusses well-known ciphers, the data encryption standard (DES) and the advanced encryption standard (AES).

Chapter 5 describes the integer factorization-based cryptosystem and its attacks in the era of quantum computing. Cryptosystems based on the discrete log problem are described in chapter 6, including quantum attacks on such systems. Next, chapter 7 discusses elliptic-curve-based cryptosystems and quantum attacks. The cryptosystems presented in chapters 5, 6, and 7 are not quantum safe. However, post-quantum cryptosystems such as coding theory cryptosystems and lattice-based cryptosystems, which are safe even if quantum computers are there, are discussed in chapter 8. Even quantum cryptosystems and deoxyribonucleic acid (DNA) biological systems are touched on here. Finally, chapter 9 discusses malware. Each chapter concludes with notes, further reading, and references. Many sections include a problem set and all sections include examples.

This is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it.

Reviewer:  Manish Gupta Review #: CR146559 (1907-0260)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Computational Logic (F.4.1 ... )
 
 
Network Architecture And Design (C.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy