Cryptography Group 03
Cryptography Group 03
Cryptography Group 03
TAYYABA 18104017-072
TAHREEM
SADIA NIAZ 18104017-058
AHMED
AYESHA SIDDIQA 18104017-067
“BOOK REVIEW”
Chuck Easttom
“UNIVERSITY OF SIALKOT”
Description:
A Practical Guide to Cryptography Principles and Security Practices
Employ cryptography in real-world security situations using the
hands-on information contained in this book. InfoSec expert Chuck
Easttom lays out essential math skills and fully explains how to
implement cryptographic algorithms in today's data protection
landscape. Find out how to use ciphers and hashes, generate
random keys, handle VPN and WiFi security, and encrypt VoIP,
Email, and Web communications.
Modern Cryptography: Applied Mathematics for Encryption and
Information Security covers cryptanalysis, steganography, and
cryptographic backdoors.
Learn the necessary number theory, discrete math, and algebra
Employ symmetric ciphers, including Feistel and substitution-
permutation ciphers Understand asymmetric cryptography algorithms
Design s-boxes that maximize output non-linearity Deploy
cryptographic hashes Create cryptographic keys using pseudo
random number generators Encrypt Web traffic using SSL/TLS
Secure VPN, WiFi, and SSH communications Work with
cryptanalysis and steganography Explore government, military, and
intelligence agency applications.
Articles:
PART I Foundations:
o CHAPTER 1 History of Cryptography to the 1800s
o CHAPTER 2 History of Cryptography from the 1800s
o CHAPTER 3 Basic Information Theory
o CHAPTER 4 Essential Number Theory and Discrete Math
o CHAPTER 5 Essential Algebra
PART II Symmetric Ciphers and Hashes:
o CHAPTER 6 Feistel Networks
o CHAPTER 7 Substitution-Permutation Networks
o CHAPTER 8 S-Box Design
o CHAPTER 9 Cryptographic Hashes
PART III Asymmetric Ciphers:
o CHAPTER 10 Common Algorithms
o CHAPTER 11 Elliptic Curve Cryptography
PART IV Applications:
Introduction:
Published: 16-10-2015
Publisher: McGraw-Hill Education, 1 edition (October 12, 2015)
ISBN: 9781259588082
Number of pages: 416 pages.
Weight: 716 g
Dimensions: 231 x 185 x 20 mm
ASIN: 1259588084
Language: English
Author:
Easttom is an internationally acclaimed
computer security expert. He has been in the
IT industry for over 20 years and training for
over 15. He holds over 37 industry
certifications including: CISSP, ISSAP,
CEH, MCT, CCFP, and others. He has
published 19 books, many of which are
computer security textbooks used at
universities around the world. His books are
cited in scores of research papers, and in
multiple Ph.D. dissertations. He also holds 6
patents. He conducts training in security for
law enforcement, federal agencies, and
friendly foreign governments.
Easttom has been a speaker at the Harvard Computer Society, Columba
University ACM Chapter, Southern Methodist University, University of Texas
at Dallas, Takedown con, Hacker Halted, ISC2 congress, and other locations.
Research Area:
Easttom, C. (2020). On the Application of Algebraic Graph Theory
to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing
and Communication Conference.
February 11, 2019. Dr. Easttom has been invited to speak at
Seton Hall University on the application of graph theory to digital
forensics and network investigations.
Conclusion:
This book was designed to bring cryptography to the general security
community. You need not have any mathematics background beyond basic
secondary school algebra. The book will cover the math you need.
Furthermore, the book includes chapters on topics rarely covered in
cryptography texts: cryptographic backdoors, military cryptography, and
applied cryptography.
The book is really a journey through cryptography, starting with historical
cryptography and then moving into the mathematical foundations necessary to
understand modern cryptography. The book then moves on to the symmetric
and asymmetric algorithms used today. It also includes chapters on Secure
Sockets Layer (SSL), cryptanalysis, military applications for cryptography, and
the future of cryptography. The book is replete with links to external sources
where you can get additional information, particularly in the chapters on
mathematics and number theory. Each chapter ends with a series of questions
to test your knowledge. The Appendix includes a set of tutorials for using some
cryptography tools. These make excellent labs if this book is used as a
textbook.
References:
http://www.chuckeasttom.com/
[email protected]
[email protected]
http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118
https://www.bankinfosecurity.com/authors/chuck-easttom-i-1450