fb noscript

PHI Learning

Helping Teachers to Teach and Students to Learn

Helping Teachers to Teach and Students to Learn

loading image

PHI Learning
Cryptography and Information Security

Share on
Share on TwitterShare on MailShare on LinkedInPinterestShare on Other Networks


Pages : 520

Print Book ISBN : 9789389347104
Binding : Paperback
Print Book Status : Available
Print Book Price : 795.00  636
You Save : (159)

eBook ISBN : 9789389347111
Ebook Status : Available
Ebook Price : 795.00  636
You Save : (159)


The main objective of this book is to cater to the need of a quality textbook for education in the field of information security. The present third edition of the book covers the principles, design, and implementation of various algorithms in cryptography and information security domain. The book is a comprehensive work with a perfect balance and systematic presentation of the theoretical and practical aspects. The pre-requisite of the cryptography are the fundamentals of the mathematical background. The book covers all such relevant methods and theorems, which are helpful to the readers to get the necessary mathematical base for the understanding of the cryptographic algorithms. It provides a clear analysis of different algorithms and techniques.


• New chapters on

o Cyber Laws

o Vulnerabilities in TCP/IP Model

• Revised sections on

o Digital signature

o Attacks against digital signature

• Introduction to some open source tools like Nmap, Zenmap, port scanner, network scanner and wireshark

• Revised section on block cipher modes of operation

• Coverage of Simplified Data Encryption Standard (S-DES) and Simplified Advanced Encryption Standard (S-AES) with examples

• Elaborated section on Linear Cryptanalysis and Differential Cryptanalysis

• New solved problems and a topic “primitive roots” in number theory

• Chapter on public key cryptosystems with various attacks against RSA algorithm

• New topics on Ransomware, Darknet, and Darkweb as per the current academic requirement

• Revised chapter on Digital Forensics

The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech/M.Tech), undergraduate and postgraduate students of computer science (B.Sc. / M.Sc. Computer Science), and information technology (B.Sc. / M.Sc. IT) and the students of Master of Computer Applications (MCA).

Review the Book

Book ISBN :
Title :
Author :
Name :
Affiliation :
Contact No.
Email :
Correspondence Address :
Review :
Rate :
Empty StarEmpty StarEmpty StarEmpty StarEmpty Star
Enter your membership number.

loading image