With current network, Internet, and distributed systems, cryptography has become a key technology to ensure the security of today’s web-Software Applications. Nowadays information systems security services involve more complexity because of their heterogeneity involving very big threats and attacks on such kind of networks, which are widely spread, open and interconnected. The security attacks and the technologies to exploit security attacks are growing continuously. The importance of providing and maintaining the data and information security across networks is a major enterprise business activity, resulting in a big demand and need to ensure and maintain information security.
This book contains some of the critical security challenges faced by today’s computing world and provides insights to possible mechanisms to defend against these attacks. It contains eleven chapters dealing with the issues occurred in the security and privacy in computing and communication networks, and quantum cryptography. The book starts to highlight on the development of a DNA Cryptographic Keys Based on Evolutionary Models, for the integration in our DNA Provider as Java Cryptographic Extension (JCE) with DNA Encryption (DNAE) system for use in security of our developed Web-based Software Applications. Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications. Consequently, security requirements related to vehicular networks are more complex as compared to mobile networks and conventional wireless networks. This book presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. In this book, we also demonstrate how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile applications. The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system.
Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or operating systems versions which had significant progress. Herein, we provide time and energy benchmarks of reference implementations for different platforms and operating systems and analyze their impact. Readers will gain an insight of network architecture, security issues, and hardware implementation of a home area network for smart grid. Moreover, in this book, a security enhanced and adaptive TCP, namely SA-TCP, has been proposed for wireless ad hoc networks. The information contained in this book will be useful for students, researchers, engineers dealing with cryptography and security related fields.