Skip to main content

Abstract

The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern cryptosystem solutions to achieve enhanced information integrity and confidentiality with minimum impact to system performance. Cryptosystems have evolved leaps and bounds striving to achieve this. However, a paradigm shift is to be unearthed with the great pervasiveness of the attacker knowledge and attack surfaces. Generation and use of large volumes of data has made this a topic of great importance especially in this era. This book gives the reader a tour through the evolution of cryptosystems, their achievements, and the growth of more sophisticated systems that have affordable time and space complexities. Our mission is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition toward the modern tamper evident systems. We hope this book can provide both a fundamental understanding of what is security and its requirements to finally how it can be achieved so that business organizations and individuals can understand the ways and means to secure large volumes of generated data and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity, and provenance of data.

The book provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.

We thus hope that this book titled “The Evolution of Tamper evident Secure Systems for the Cyber Era” is the perfect ally for industry experts, researchers, students, and others who are interested in securing their information and systems from the prying eyes of attackers. This book provides a wealth of information for the audience with the necessary information and tools that can be used to design a tamper evident and secure ecology in this highly vulnerable cyber era.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. An early evidence of the use of cryptography. (n.d.). Retrieved from https://intensecrypto.org/public/lec_01_introduction.pdf

  2. Milanov, Evgeny. “The RSA algorithm.” RSA Laboratories (2009): 1–11.

    Google Scholar 

  3. Goldwasser, Shafi, and Silvio Micali. “Probabilistic encryption.” Journal of computer and system sciences 28, no. 2 (1984): 270–299.

    Article  MathSciNet  Google Scholar 

  4. Greenberg, A. (2017, June 03). Hacker lexicon: What is homomorphic encryption? Retrieved April 07, 2021, from https://www.wired.com/2014/11/hacker-lexicon-homomorphic-encryption/

    Google Scholar 

  5. Crane, C. (2021, March 12). What is homomorphic encryption? Retrieved April 07, 2021, from https://www.thesslstore.com/blog/what-is-homomorphic-encryption/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sniatala, P., Iyengar, S., Ramani, S.K. (2021). Introduction. In: Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer, Cham. https://doi.org/10.1007/978-3-030-77764-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77764-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77763-0

  • Online ISBN: 978-3-030-77764-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics