The book "Cryptography And Public Key Infrastructure" explains symmetric key encryption, public-key encryption, cryptographic hashing, Key Agreement Protocols, Public Key Infrastructure (PKI) in detail. The book also explains how some widely used encryption algorithms like AES, DES, RC4, Blowfish, RSA, ElGamal, etc. work. It also discusses how some protocols like TLS, SSH, FTPS, SFTP, DNSSEC, DNSCrypt, etc. use these cryptographic algorithms to secure our data. The book also explains how various cryptographic attacks work and what we can do to secure our data.
Amrita Mitra is an entrepreneur and security researcher who has a passion for writing. Her areas of interest are cyber security and mathematics. She has authored the books "A Guide To Cyber Security", "Phishing: Detection, Analysis And Prevention" and "Web Application Vulnerabilities And Prevention".