Skip to main content
  • Book
  • © 2014

Symmetric Cryptographic Protocols

  • Provides a detailed coverage of symmetric key protocols

  • Presents the applications of symmetric building blocks

  • Discusses in-depth coverage on the topic of symmetric key protocols

  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xvii
  2. Introduction

    • Mahalingam Ramkumar
    Pages 1-10
  3. Some Useful Constructions

    • Mahalingam Ramkumar
    Pages 11-17
  4. Nonscalable Key Distribution Schemes

    • Mahalingam Ramkumar
    Pages 19-29
  5. MLS for Internet Security Protocols

    • Mahalingam Ramkumar
    Pages 31-62
  6. Scalable Key Distribution Schemes

    • Mahalingam Ramkumar
    Pages 63-80
  7. Scalable Extensions of Nonscalable Schemes

    • Mahalingam Ramkumar
    Pages 81-101
  8. Using PKPSs with Tamper-Responsive Modules

    • Mahalingam Ramkumar
    Pages 103-133
  9. Broadcast Authentication and Broadcast Encryption

    • Mahalingam Ramkumar
    Pages 135-162
  10. Authenticated Data Structures

    • Mahalingam Ramkumar
    Pages 163-193
  11. Universal Trusted Computing Bases

    • Mahalingam Ramkumar
    Pages 195-222
  12. Conclusions

    • Mahalingam Ramkumar
    Pages 223-225
  13. Back Matter

    Pages 227-234

About this book

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.

Reviews

From the book reviews:

“Experienced security practitioners and cryptography researchers will benefit from reading this book. … the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios.” (Zubair Baig, Computing Reviews, February, 2015)

Authors and Affiliations

  • Mississippi State University, Mississippi State, USA

    Mahalingam Ramkumar

About the author

Dr. Ramkumar is an Associate Professor, at the Dept. of CSE, MSU since August 2009.

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access