Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

  • Modular Arithmetic, Finite Fields
  • Prime Number, DLP, Integer Factorization Problem
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Post-Quantum Cryptography
  • Identity Based Encryption
  • Attribute Based Encryption
  • Key Management
  • Entity Authentication, Message Authentication
  • Digital Signatures
  • Hands-On "SageMath"


This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

chapter 1|10 pages

Modular Arithmetic

ByAfroz Afroz

chapter 2|16 pages

Finite Fields

ByAfroz Afroz

chapter 3|19 pages

Prime Number

ByKhaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad

chapter 4|11 pages

Discrete Logarithm Problem

ByKhaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad

chapter 5|19 pages

Integer Factorization Problem

ByPinkimani Goswami, Madan Mohan Singh

chapter 6|17 pages

Symmetric Algorithms I

ByFaheem Syeed Masoodi, Mohammad Ubaidullah Bokhari

chapter 7|21 pages

Symmetric Algorithms II

ByVivek Kapoor, Shubhamoy Dey

chapter 8|19 pages

Asymmetric Cryptography

ByRajiv Ranjan, Abir Mukherjee, Pankaj Rai, Khaleel Ahmad

chapter 9|20 pages

Post-Quantum Cryptography

ByAmandeep Singh Bhatia, Ajay Kumar

chapter 10|23 pages

Identity—Based Encryption

ByTanvi Gautam, Aditya Thakkar, Nitish Pathak

chapter 11|13 pages

Attribute-Based Encryption

ByTanvi Gautam, Aditya Thakkar, Nitish Pathak

chapter 12|15 pages

Key Management

ByJyotsna Verma

chapter 13|12 pages

Entity Authentication

ByHamza Mutaher, Pradeep Kumar

chapter 14|23 pages

Message Authentication

ByAjay Prasad, Jatin Sethi

chapter 15|24 pages

Digital Signatures

ByAjay Prasad, Keshav Kaushik

chapter 16|20 pages


ByM. A. Rizvi, Ifra Iqbal Khan

chapter 17|16 pages

Hands-On “SageMath”

ByUma N. Dulhare, Khaleel Ahmad