Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography and network security: principle and practice
Bookmark Share

Text

Cryptography and network security: principle and practice

Stallings, William - Personal Name;

Contents:

Chapter 0. Reader's Guide 1
0.1. Outline of this Book
0.2. A Roadmap for Readers and Instructors
0.3. Internet and Web Resources
0.4. Standards

Chapter 1. Overview
1.1. Computer Security Concepts
1.2. The OSI Security Architecture
1.3. Security Attacks
1.4. Security Services
1.5. Security Mechanisms
1.6. A Model for Network Security
1.7. Recommended Reading and Web Sites
1.8. Key Terms, Review Questions, and Problems

Part One: Symmetric Ciphers
Chapter 2. Classical Encryption Techniques
2.1. Symmetric Cipher Model
2.2. Substritution Techniques
2.3. Transpotition Techniques
2.4. Rotor Machines
2.5. Steganography
2.6. Recommended Reading and Web Sites
2.7. Key Terms, Review Questions, and Problems

Chapter 3. Block Ciphers and the Data Encryption Standard
3.1. Block Cipher Principles
3.2. The Data Encryption Standard (DES)
3.3. A DES Example
3.4. The Strength of DES
3.5. Differential and Linier Cryptanalysis
3.6. Block Cipher Design Principles
3.7. Recommended Reading and Web Sites
3.8. Key Terms, Review Questions, and Problems

Chapter 4. Basic Concepts in Number Theory and Finite Fields
4.1. Divisibility and the Division Algorithm
4.2. The Euclidean Algorithm
4.3. Modular Arithmetic
4.4. Groups, Rings, and Fields
4.5. Finite Field of the Form GF(p)
4.6. Polynominal Arithmetic
4.7. Finite Field of the Form GF(2n)
4.8. Recommended Reading and Web Sites
4.9. Key Terms, Review Questions, and Problems

Chapter 5. Advances Encryption Standard
5.1. The Origin AES
5.2. AES Structure
5.3. AES Around Functions
5.4. AES Key Expansion
5.5. An AES Example
5.6. AES Implementation
5.7. Recommended Reading and Web Sites
5.8. Key Terms, Review Questions, and Problems

Chapter 6. Block Cipher Operation
6.1. Multiple Encryption and Triple DES
6.2. Electronic Code Book Mode
6.3. Cipher Block Chaining Mode
6.4. Cipher Feedback Mode
6.5. Output Feedback Mode
6.6. Counter Mode
6.7. XTS Mode for Block-Oriented Storage Devices
6.8. Recommended Reading and Web Sites
6.9. Key Terms, Review Questions, and Problems

Chapter 7. Pseudorandom Number Generation and Stream Ciphers
7.1. Principle of Pseudorandom Number Generation
7.2. Pseudorandom Number Generators
7.3. Pseudorandom Number Generation Using a Block Cipher
7.4. Stream Cipher
7.5. RC4 234
7.6. True Random Numbers
7.7. Recommended Reading
7.8. Key Terms, Review Questions, and Problems

Part Two: Asymmetric Ciphers
Chapter 8. More Number Theory
8.1. Prime Numbers
8.2. Fermat's and Euler's Theorems
8.3. Testing for Primality
8.4. The Chinese Remainder Theorem
8.5. Discrete Logarithms
8.6. Recommended Reading and Web Sites
8.7. Key Terms, Review Questions, and Problems

Chapter 9. Public-Key Cryptography and RSA
9.1. Principles of Public-Key Cryptosystems
9.2. The RSA Algorithm
9.3. Recommended Reading and Web Sites
9.4. Key Terms, Review Questions, and Problems

Chapter 10. Other Public-Key Cryptosystems
10.1. Diffie-Hellman Key Exchange
10.2. ElGamal Cryptosystem
10.3. Elliptic Curve Arithmetic
10.4. Elliptic Curve Cryptography
10.5. Pseudorandom Number Generation Based on an Asymmetric Cipher
10.6. Recommended Reading and Web Sites
10.7. Key Terms, Review Questions, and Problems

Part Three: Cryptographic Data Integrity Algorithm
11.1. Applications of Cryptographic Hash Functions
11.2. Two Simple Hash Function
11.3. Requirements and Security
11.4. Hash Function Based on Cipher Block Chaining
11.5. Secure Hash Algorithm
11.6. SHA-3 352
11.7. Recommended Reading and Web Sites
11.8. Key Terms, Review Questions, and Problems

Chapter 12. Message Authentication Codes
12.1. Message Authentication Requirements
12.2. Message Authentication Functions
12.3. Message Authentication Codes
12.4. Security of MACs
12.5. MACs Based on Hash Function: HMAC
12.6. MACs Based on Block Ciphers: DDA and CMAC
12.7. Authenticated Encryption : CCM and GCM
12.8. Pseudorandom Number Generation Using Hash Function and MACs
12.9. Recommended Reading and Web Sites
12.10. Key Terms, Review Questions, and Problems

Chapter 13. Digital Signatures
13.1. Digital Signatures
13.2. ElGamal Digital Signature Scheme
13.3. Schnorr Digital Signature Scheme
13.4. Digital Signature Standard (DSS)
13.5. Recommended Reading and Web Sites
13.6. Key Terms, Review Questions, and Problems

Part Four: Mutual Trust
Chapter 14. Key Management and Distribution
14.1. Symmetric Key Distribution Using Symmetric Encryption
14.2. Symmetric Key Distribution Using Asymmetric Encryption
14.3. Distribution of Public Key
14.4. X.509 Certificates
14.5. Public Key Infrastructure
14.6. Recommended Reading and Web Sites
14.7. Key Terms, Review Questions, and Problems

Chapter 15. User Authentication Protocols
15.1. Remote User Authentication Principle
15.2. Remote User Authentication Using Symmetric Encryption
15.3. Kerberos
15.4. Remote User Authentication Using Asymmetric Encryption
15.5. Federal Identity Management
15.6. Recommended Reading and Web Sites
15.7. Key Terms, Review Questions, and Problems

Part Five: Network and Internet Security
Chapter 16. Transport-Level Security
16.1. Web Security Issues
16.2. Secure Sockets Layers (SSL)
16.3. Transport Layer security (TLS)
16.4. HTTPS 506
16.5. Secure Shell (SSH)
16.6. Recommended Reading and Web Sites
16.7. Key Terms, Review Questions, and Problems

Chapter 17. Wireless Network Security
17.1. IEEE 802.11 Wireless LAN Overview
17.2. IEEE 802.11i Wireless LAN Secuirity
17.3. Wireless Application Protocol Overview
17.4. Wireless Transport Layer Security
17.5. WAP End-to-End Security
17.6. Recommended Reading and Web Sites
17.7. Key Terms, Review Questions, and Problems

Chapter 18. Electronic Mail Security
18.1. Pretty Good Privacy (PGP)
18.2. S/MIME
18.3. DomainKeys Identified Mail (DKIM)
18.4. Recommended Reading
18.5. Key Terms, Review Questions, and Problems

Chapter 19. IP Security
19.1. IP Security Overview
19.2. IP Security Policy
19.3. Encapsulating Security Payload
19.4. Combining Security Associations
19.5. Internet Key Exchange
19.6. Cryptographic Suites
19.7. Recommended Reading and Web Sites
19.8. Key Terms, Review Questions, and Problems


Availability
#
Perpustakaan Poltek SSN 652.8 STA C Fc1-2
000 01062
Available but not for loan - Missing
#
Perpustakaan Poltek SSN 005.8 STA C Fc1-2
600 02167
Available but not for loan - Missing
#
Perpustakaan Poltek SSN (Running Number) 247
600 02751
Available - Circulation
Detail Information
Series Title
--
Call Number
005.8 STA C Fc1-2
Publisher
USA : Pearson., 2011
Collation
xxiii, 870 hal.; ilus.; 26 cm
Language
English
ISBN/ISSN
9780136097044
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
Fifth Edition
Subject(s)
-
Specific Detail Info
--
Statement of Responsibility
William Stallings
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?