Preface
In this age of extremely high connectivity, cloud computing, ransomware, and hackers, digital assets are changing the way we live our lives, so cryptography and cybersecurity are crucial.
The changes in processing and storing data has required adequate evolution in cryptographic algorithms to advance in the eternal battle against information piracy.
This book is a good tool for students and professionals who want to focus on the next generation of cryptography algorithms.
Starting from the basics of symmetric and asymmetric algorithms, the book describes all the modern techniques of authentication, transmission, and searching on encrypted data to shelter from spies and hackers. You'll encounter Evolute algorithms with zero knowledge, consensus on the blockchain, elliptic curves, quantum cryptography, and homomorphic search.
The book even gives some focus to attacks and cryptoanalysis of the main algorithms adopted in computer science. The main purpose of this book is to train you to deeply understand this complex topic. Indeed, particular attention has been paid to present examples and suggestions are given to help you better understand the concepts.