Table of Contents


   
book cover
  
• Table of Contents
• Index
Cryptography and Network Security Principles and Practices, Fourth Edition
By William Stallings
Publisher: Prentice Hall
Pub Date: November 16, 2005
Print ISBN-10: 0-13-187316-4
Print ISBN-13: 978-0-13-187316-2
eText ISBN-10: 0-13-187319-9
eText ISBN-13: 978-0-13-187319-3
Pages: 592
 


   Copyright
   Notationxi
   Prefacexiii
      Objectivesxiii
      Intended Audiencexiii
      Plan of the Bookxiv
      Internet Services for Instructors and Studentsxiv
      Projects for Teaching Cryptography and Network Securityxiv
      What's New in the Fourth Editionxv
      Acknowledgmentsxvi
    Chapter 0.  Reader's Guide1
      Section 0.1.  Outline of this Book2
      Section 0.2.  Roadmap2
      Section 0.3.  Internet and Web Resources4
    Chapter 1.  Introduction6
      Section 1.1.  Security Trends9
      Section 1.2.  The OSI Security Architecture12
      Section 1.3.  Security Attacks13
      Section 1.4.  Security Services16
      Section 1.5.  Security Mechanisms19
      Section 1.6.  A Model for Network Security22
      Section 1.7.  Recommended Reading and Web Sites24
      Section 1.8.  Key Terms, Review Questions, and Problems25
    Part One:  Symmetric Ciphers26
      Chapter 2.  Classical Encryption Techniques28
      Section 2.1.  Symmetric Cipher Model30
      Section 2.2.  Substitution Techniques35
      Section 2.3.  Transposition Techniques49
      Section 2.4.  Rotor Machines51
      Section 2.5.  Steganography53
      Section 2.6.  Recommended Reading and Web Sites55
      Section 2.7.  Key Terms, Review Questions, and Problems56
      Chapter 3.  Block Ciphers and the Data Encryption Standard62
      Section 3.1.  Block Cipher Principles64
      Section 3.2.  The Data Encryption Standard72
      Section 3.3.  The Strength of Des82
      Section 3.4.  Differential and Linear Cryptanalysis83
      Section 3.5.  Block Cipher Design Principles86
      Section 3.6.  Recommended Reading90
      Section 3.7.  Key Terms, Review Questions, and Problems90
      Chapter 4.  Finite Fields95
      Section 4.1.  Groups, Rings, and Fields97
      Section 4.2.  Modular Arithmetic101
      Section 4.3.  The Euclidean Algorithm107
      Section 4.4.  Finite Fields of The Form GF(p)109
      Section 4.5.  Polynomial Arithmetic113
      Section 4.6.  Finite Fields Of the Form GF(2n)119
      Section 4.7.  Recommended Reading and Web Sites129
      Section 4.8.  Key Terms, Review Questions, and Problems130
      Chapter 5.  Advanced Encryption Standard134
      Section 5.1.  Evaluation Criteria For AES135
      Section 5.2.  The AES Cipher140
      Section 5.3.  Recommended Reading and Web Sites160
      Section 5.4.  Key Terms, Review Questions, and Problems161
      Appendix 5A Polynomials with Coefficients in GF(28)163
      Appendix 5B Simplified AES165
      Chapter 6.  More on Symmetric Ciphers174
      Section 6.1.  Multiple Encryption and Triple DES175
      Section 6.2.  Block Cipher Modes of Operation181
      Section 6.3.  Stream Ciphers and RC4189
      Section 6.4.  Recommended Reading and Web Site194
      Section 6.5.  Key Terms, Review Questions, and Problems194
      Chapter 7.  Confidentiality Using Symmetric Encryption199
      Section 7.1.  Placement of Encryption Function201
      Section 7.2.  Traffic Confidentiality209
      Section 7.3.  Key Distribution210
      Section 7.4.  Random Number Generation218
      Section 7.5.  Recommended Reading and Web Sites227
      Section 7.6.  Key Terms, Review Questions, and Problems228
    Part Two:  Public-Key Encryption and Hash Functions232
      Chapter 8.  Introduction to Number Theory234
      Section 8.1.  Prime Numbers236
      Section 8.2.  Fermat's and Euler's Theorems238
      Section 8.3.  Testing for Primality242
      Section 8.4.  The Chinese Remainder Theorem245
      Section 8.5.  Discrete Logarithms247
      Section 8.6.  Recommended Reading and Web Sites253
      Section 8.7.  Key Terms, Review Questions, and Problems254
      Chapter 9.  Public-Key Cryptography and RSA257
      Section 9.1.  Principles of Public-Key Cryptosystems259
      Section 9.2.  The RSA Algorithm268
      Section 9.3.  Recommended Reading and Web Sites280
      Section 9.4.  Key Terms, Review Questions, and Problems281
      Appendix 9A Proof of the RSA Algorithm285
      Appendix 9B The Complexity of Algorithms286
      Chapter 10.  Key Management; Other Public-Key Cryptosystems289
      Section 10.1.  Key Management290
      Section 10.2.  Diffie-Hellman Key Exchange298
      Section 10.3.  Elliptic Curve Arithmetic301
      Section 10.4.  Elliptic Curve Cryptography310
      Section 10.5.  Recommended Reading and Web Sites313
      Section 10.6.  Key Terms, Review Questions, and Problems314
      Chapter 11.  Message Authentication and Hash Functions317
      Section 11.1.  Authentication Requirements319
      Section 11.2.  Authentication Functions320
      Section 11.3.  Message Authentication Codes331
      Section 11.4.  Hash Functions334
      Section 11.5.  Security of Hash Functions and Macs340
      Section 11.6.  Recommended Reading344
      Section 11.7.  Key Terms, Review Questions, and Problems344
      Appendix 11A Mathematical Basis of the Birthday Attack346
      Chapter 12.  Hash and MAC Algorithms351
      Section 12.1.  Secure Hash Algorithm353
      Section 12.2.  Whirlpool 358
      Section 12.3.  HMAC368
      Section 12.4.  CMAC372
      Section 12.5.  Recommended Reading and Web Sites374
      Section 12.6.  Key Terms, Review Questions, and Problems374
      Chapter 13.  Digital Signatures and Authentication Protocols377
      Section 13.1.  Digital Signatures378
      Section 13.2.  Authentication Protocols382
      Section 13.3.  Digital Signature Standard390
      Section 13.4.  Recommended Reading and Web Sites393
      Section 13.5.  Key Terms, Review Questions, and Problems393
    Part Three:  Network Security Applications398
      Chapter 14.  Authentication Applications400
      Section 14.1.  Kerberos401
      Section 14.2.  X.509 Authentication Service419
      Section 14.3.  Public-Key Infrastructure428
      Section 14.4.  Recommended Reading and Web Sites430
      Section 14.5.  Key Terms, Review Questions, and Problems431
      Appendix 14A Kerberos Encryption Techniques433
      Chapter 15.  Electronic Mail Security436
      Section 15.1.  Pretty Good Privacy438
      Section 15.2.  S/MIME457
      Section 15.3.  Key Terms, Review Questions, and Problems474
      Appendix 15A Data Compression Using Zip475
      Appendix 15B Radix-64 Conversion478
      Appendix 15C PGP Random Number Generation479
      Chapter 16.  IP Security483
      Section 16.1.  IP Security Overview485
      Section 16.2.  IP Security Architecture487
      Section 16.3.  Authentication Header493
      Section 16.4.  Encapsulating Security Payload498
      Section 16.5.  Combining Security Associations503
      Section 16.6.  Key Management506
      Section 16.7.  Recommended Reading and Web Site516
      Section 16.8.  Key Terms, Review Questions, and Problems517
      Appendix 16A Internetworking and Internet Protocols518
      Chapter 17.  Web Security527
      Section 17.1.  Web Security Considerations528
      Section 17.2.  Secure Socket Layer and Transport Layer Security531
      Section 17.3.  Secure Electronic Transaction549
      Section 17.4.  Recommended Reading and Web Sites560
      Section 17.5.  Key Terms, Review Questions, and Problems561
    Part Four:  System Security563
      Chapter 18.  Intruders565
      Section 18.1.  Intruders567
      Section 18.2.  Intrusion Detection570
      Section 18.3.  Password Management582
      Section 18.4.  Recommended Reading and Web Sites591
      Section 18.5.  Key Terms, Review Questions, and Problems592
      Appendix 18A The Base-Rate Fallacy594
      Chapter 19.  Malicious Software598
      Section 19.1.  Viruses and Related Threats599
      Section 19.2.  Virus Countermeasures610
      Section 19.3.  Distributed Denial of Service Attacks614
      Section 19.4.  Recommended Reading and Web Sites619
      Section 19.5.  Key Terms, Review Questions, and Problems620
      Chapter 20.  Firewalls621
      Section 20.1.  Firewall Design Principles622
      Section 20.2.  Trusted Systems634
      Section 20.3.  Common Criteria for Information Technology Security Evaluation640
      Section 20.4.  Recommended Reading and Web Sites644
      Section 20.5.  Key Terms, Review Questions, and Problems645
    Appendix A.  Standards and Standards-Setting Organizations647
      Section A.1.  The Importance of Standards648
      Section A.2.  Internet Standards and the Internet Society649
      Section A.3.  National Institute of Standards and Technology652
    Appendix B.  Projects for Teaching Cryptography and Network Security653
      Section B.1.  Research Projects654
      Section B.2.  Programming Projects655
      Section B.3.  Laboratory Exercises655
      Section B.4.  Writing Assignments655
      Section B.5.  Reading/Report Assignments656
   Glossary657
   References663
      Abbreviations663
   Inside Front CoverInsideFrontCover
   Inside Back CoverInsideBackCover
   Index



Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net