You are on page 1of 5

Modern Cryptography (Applied GROUP-III

Mathematics for Encryption and Group Members. Roll Numbers.


Information Security)
HINA KANWAL 18104017-035

TAYYABA 18104017-072
TAHREEM
SADIA NIAZ 18104017-058
AHMED
AYESHA SIDDIQA 18104017-067

HINA NASEEB 18104017-008

SANA TARIQ 18104017-048

SUNEEL QADEER 18104017-029

RESPECTED Ma’am : “AYESHA NAFEES”

“BOOK REVIEW”

Chuck Easttom
“UNIVERSITY OF SIALKOT”
Description:
A Practical Guide to Cryptography Principles and Security Practices
Employ cryptography in real-world security situations using the
hands-on information contained in this book. InfoSec expert Chuck
Easttom lays out essential math skills and fully explains how to
implement cryptographic algorithms in today's data protection
landscape. Find out how to use ciphers and hashes, generate
random keys, handle VPN and WiFi security, and encrypt VoIP,
Email, and Web communications.
Modern Cryptography: Applied Mathematics for Encryption and
Information Security covers cryptanalysis, steganography, and
cryptographic backdoors.
Learn the necessary number theory, discrete math, and algebra
Employ symmetric ciphers, including Feistel and substitution-
permutation ciphers Understand asymmetric cryptography algorithms
Design s-boxes that maximize output non-linearity Deploy
cryptographic hashes Create cryptographic keys using pseudo
random number generators Encrypt Web traffic using SSL/TLS
Secure VPN, WiFi, and SSH communications Work with
cryptanalysis and steganography Explore government, military, and
intelligence agency applications.

Articles:
 PART I Foundations:
o CHAPTER 1 History of Cryptography to the 1800s
o CHAPTER 2 History of Cryptography from the 1800s
o CHAPTER 3 Basic Information Theory
o CHAPTER 4 Essential Number Theory and Discrete Math
o CHAPTER 5 Essential Algebra
 PART II Symmetric Ciphers and Hashes:
o CHAPTER 6 Feistel Networks
o CHAPTER 7 Substitution-Permutation Networks
o CHAPTER 8 S-Box Design
o CHAPTER 9 Cryptographic Hashes
PART III Asymmetric Ciphers:
o CHAPTER 10 Common Algorithms
o CHAPTER 11 Elliptic Curve Cryptography
 PART IV Applications:
Introduction:
Published: 16-10-2015
Publisher: McGraw-Hill Education, 1 edition (October 12, 2015)
ISBN: 9781259588082
Number of pages: 416 pages.
Weight: 716 g
Dimensions: 231 x 185 x 20 mm
ASIN: 1259588084

Language: English

Author:
Easttom is an internationally acclaimed
computer security expert. He has been in the
IT industry for over 20 years and training for
over 15. He holds over 37 industry
certifications including: CISSP, ISSAP,
CEH, MCT, CCFP, and others. He has
published 19 books, many of which are
computer security textbooks used at
universities around the world. His books are
cited in scores of research papers, and in
multiple Ph.D. dissertations. He also holds 6
patents. He conducts training in security for
law enforcement, federal agencies, and
friendly foreign governments.
Easttom has been a speaker at the Harvard Computer Society, Columba
University ACM Chapter, Southern Methodist University, University of Texas
at Dallas, Takedown con, Hacker Halted, ISC2 congress, and other locations.

Research Area:
 Easttom, C. (2020). On the Application of Algebraic Graph Theory
to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing
and Communication Conference.
 February 11, 2019. Dr. Easttom has been invited to speak at
Seton Hall University on the application of graph theory to digital
forensics and network investigations.

 Easttom, C. (2018). How to model digital forensics investigations


with graph theory. Digital Forensics Magazine, 37.

 Easttom, C. (2018). "A Systems Approach To Indicators Of


Compromise Utilizing Graph Theory". 2018 IEEE International
Symposium on Technologies for Homeland Security.

 Presenting "Applying Graph Theory to Digital Forensics" 6 May


2018 Princess Sumaya University for Technology in Amman Jordan
as part of the Distinguished Speakers of the ACM program.

 Easttom, C. (2016). Multi-Dimensional Analysis for Cyber


Investigations. Forensic Examiner Journal,25 (4).

 Easttom, C. (2016). Applying Graph Theory to Evidence


Evaluation. Research Gate DOI: RG.2.2.23391.0528.

 Easttom, C. (2017). Utilizing Graph Theory to Model Forensic


Examinations- Presentation for the 2nd Annual International
Congress of the International Association of Law and Forensic
Science (IAFLS). - Cairo Egypt, January 2017. DOI:
RG.2.2.33025.66407

 Easttom, C. (2017). Utilizing Graph Theory to Model Forensic


Examination. International Journal of Innovative Research in
Information Security (IJIRIS), 4(2).

 Easttom, C. (2017). Applications of Graph Theory to Forensic


Investigations- Presentation for the University of North Texas
March 3, 2017. RG.2.2.16685.69609

Conclusion:
This book was designed to bring cryptography to the general security
community. You need not have any mathematics background beyond basic
secondary school algebra. The book will cover the math you need.
Furthermore, the book includes chapters on topics rarely covered in
cryptography texts: cryptographic backdoors, military cryptography, and
applied cryptography.
The book is really a journey through cryptography, starting with historical
cryptography and then moving into the mathematical foundations necessary to
understand modern cryptography. The book then moves on to the symmetric
and asymmetric algorithms used today. It also includes chapters on Secure
Sockets Layer (SSL), cryptanalysis, military applications for cryptography, and
the future of cryptography. The book is replete with links to external sources
where you can get additional information, particularly in the chapters on
mathematics and number theory. Each chapter ends with a series of questions
to test your knowledge. The Appendix includes a set of tutorials for using some
cryptography tools. These make excellent labs if this book is used as a
textbook.

References:
http://www.chuckeasttom.com/
chuckeasttom@gmail.com
chuck@chuckeasttom.com
http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118
https://www.bankinfosecurity.com/authors/chuck-easttom-i-1450

You might also like