[Tccc] CFC: Cryptography with C++ for Networking and Communications - Theory and/or Code

Al-Sakib Khan Pathan sakib.pathanatgmail.com
Tue Jul 23 11:18:48 EDT 2013



 [Apologies, if you receive multiple copies of this call]

Dear Colleagues, Programmers, and Practitioners,  

We are currently writing/editing a book on the various kinds of
implementations of cryptographic algorithms and techniques in networking
and communications technologies with C++ programming language. Some coding
parts have been already done.

Though we are mainly looking for book chapters with C++ codes, solid
theoretical works on the mentioned topics or surveys or general viewpoints,
and different styles of coding are also within our interest. Please find
the Call for Chapters (CFC) below for details. Deadlines should be
considered strict for each case. Thank you.

Regards,
Sakib

=============================================
*CALL FOR BOOK CHAPTERS
*
*
Tentative TITLE: Cryptography: Algorithms & Implementations using C++
Editors:* Saiful Azad and Al-Sakib Khan Pathan*
To be Published by: CRC Press, Taylor & Francis Group, USA
*
URL: http://cfc-crypt.weebly.com/index.html
*Alternative URL:
http://www.infosectoday.com/Call_for_Book_Chapters_Cryptography.htm
*
*
Overview

Cryptography is the science which employs mathematic*al logic to keep the
information secure. It enables someone to securely store sensitive
information or transmit information securely through insecure networks from
being hacked, masquerade, or alter. The history of cryptography starts from
the ancient era when it was practice*d by the secret societies or by the
troops in the battle field. The necessity of such approach increases with
time. In current Information era, there is indeed no time at which
information security is not necessary and hence, cryptography. From
military to civilian or from government to individual, information security
is tremendously necessary. Consequently, several algorithms are proposed
and they are implemented with various hardware. The basic idea of a
cryptographic algorithm is to scramble information in such a way that
illegitimate entities cannot unearth the concealed information.
Cryptographic algorithms are also used to preserve the integrity of a
message. Generally, a key or a set of keys is involved in encrypting a
message. On the other hand, identical key or a set of identical keys is
used by the legitimate party to decrypt the message. This book will detail
all those state of art cryptographic algorithms and will also detail their
implementations using C++ programming language.

Objectives of the Book

The main objective of this book is not only to describe the state of art
cryptographic algorithms, but also to demonstrate how they can be
implemented using a programming language, i.e., C++. Generally, the books
which discuss cryptographic algorithms do not elaborate the implementation
issues. Therefore, a gap between the understanding and the implementation
remains unattained. The motivation of this book is to seal that leakage and
to cater someone in such way that he/she will be capable of developing and
implementing his/her own designed cryptographic algorithm.

Target Audiences

This book will be written for the graduate students of the universities. It
can be utilized as a reference book to teach the courses like,
cryptography, network security and other security related courses. It will
also help professionals and researchers working in the field of computer
and network security. Moreover, the book is expected to include some
chapters written in tutorial style so that the general readers can be able
to easily grasp some of the ideas in the relevant areas.

Tentative Chapters

The tentative chapters of the book is mentioned below, but not limited to:

Part A: Symmetric Key Algorithms
- Advanced Encryption Standard (AES) (description, algorithm &
implementation)
.  .   .   .   .   .

Part B: Asymmetric Key Algorithms
- Public Key Algorithms (general overview)
- ElGamal & Elliptic Curve Cryptography (descriptions, algorithms &
implementations)
.  .   .   .   .   .

Part C: Data Integrity Algorithms
- Authentication Functions & Hash Functions (general overview)
- Secured Hash Algorithm (description, algorithm & implementation)
- HMAC and CMAC (descriptions, algorithms & implementations)
- MD5 (description, algorithm & implementation)
.  .   .   .   .   .

Part D: Authentication
- Authentication Protocols (general overview)
- Digital Signature Standard (description, algorithm & implementation)
.  .   .   .   .   .

Submission Guidelines

Since the primary audience of this book is the graduate students of the
universities, authors must take this into consideration when they prepare
their chapters. All the algorithms in a chapter must include the related
codes except the chapters for general overview. Each chapter must be
written in a tutorial style. Manuscripts submitted for the book must be
original.

Please follow A4 page format, single column with 11 point Times New Roman
font with 1.5 line spacing while submitting your manuscript as MS-Office
(i.e., doc or docx) document. If you have references in your chapter,
please follow number style referencing as usually used for regular research
papers, e.g., [1], [2], [3].

If you are planning to submit a chapter, please submit a proposal first
before the relative deadline. The abstract/proposal could be within 500
words. The initial proposal must be submitted to the corresponding editor
at sazadm... at gmail.com (A CC to the co-editor at sakib.pat... at gmail.com is
welcome) with the subject CRC_Crypt. Deadline will be strictly followed
in every case.

Submission Deadlines

Chapter Writing Proposal Submission Due: September 15, 2013
Full Manuscript Due: December 15, 2013
Notification of Acceptance/Revision/Rejection: January 15, 2013
Final/Revised Chapter Submission: February 28, 2014
Publication Time: 1st half of 2014 (tentative)

*
*EDITORS
*
*
Saiful Azad, Ph.D. (Corresponding Editor)
Department of Computer Science
American International University  Bangladesh
House #55/B, Road # 21
Kemal Ataturk Avenue, Banani,
Dhaka - 1213, Bangladesh
Mobile: +8801719438821
Work phone: +8808814462, +8808816173-4
Email: sazadm... at gmail.com, sazadm... at aiub.edu, a... at dei.unipd.it
Website: http://www.saifulazad.weebly.com

AND,

Al-Sakib Khan Pathan, Ph.D.
Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, Malaysia
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
Email: sakib.pat... at gmail.com, sa... at iium.edu.my
Website: http://staff.iium.edu.my/sakib/*

=============================================




-- 
Al-Sakib Khan Pathan, Ph.D.
Founding Head, NDC
Laboratory<http://staff.iium.edu.my/sakib/ndclab/index.html>,
KICT, IIUM

Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel:  +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: spat... at ieee.org, sa... at iium.edu.my

Personal URL: http://staff.iium.edu.my/sakib/
NDC Lab URL: http://staff.iium.edu.my/sakib/ndclab/
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
 




More information about the Tccc mailing list