Text
Cryptography and network security: principle and practice
Contents:
Chapter 0. Reader's Guide 1
0.1. Outline of this Book
0.2. A Roadmap for Readers and Instructors
0.3. Internet and Web Resources
0.4. Standards
Chapter 1. Overview
1.1. Computer Security Concepts
1.2. The OSI Security Architecture
1.3. Security Attacks
1.4. Security Services
1.5. Security Mechanisms
1.6. A Model for Network Security
1.7. Recommended Reading and Web Sites
1.8. Key Terms, Review Questions, and Problems
Part One: Symmetric Ciphers
Chapter 2. Classical Encryption Techniques
2.1. Symmetric Cipher Model
2.2. Substritution Techniques
2.3. Transpotition Techniques
2.4. Rotor Machines
2.5. Steganography
2.6. Recommended Reading and Web Sites
2.7. Key Terms, Review Questions, and Problems
Chapter 3. Block Ciphers and the Data Encryption Standard
3.1. Block Cipher Principles
3.2. The Data Encryption Standard (DES)
3.3. A DES Example
3.4. The Strength of DES
3.5. Differential and Linier Cryptanalysis
3.6. Block Cipher Design Principles
3.7. Recommended Reading and Web Sites
3.8. Key Terms, Review Questions, and Problems
Chapter 4. Basic Concepts in Number Theory and Finite Fields
4.1. Divisibility and the Division Algorithm
4.2. The Euclidean Algorithm
4.3. Modular Arithmetic
4.4. Groups, Rings, and Fields
4.5. Finite Field of the Form GF(p)
4.6. Polynominal Arithmetic
4.7. Finite Field of the Form GF(2n)
4.8. Recommended Reading and Web Sites
4.9. Key Terms, Review Questions, and Problems
Chapter 5. Advances Encryption Standard
5.1. The Origin AES
5.2. AES Structure
5.3. AES Around Functions
5.4. AES Key Expansion
5.5. An AES Example
5.6. AES Implementation
5.7. Recommended Reading and Web Sites
5.8. Key Terms, Review Questions, and Problems
Chapter 6. Block Cipher Operation
6.1. Multiple Encryption and Triple DES
6.2. Electronic Code Book Mode
6.3. Cipher Block Chaining Mode
6.4. Cipher Feedback Mode
6.5. Output Feedback Mode
6.6. Counter Mode
6.7. XTS Mode for Block-Oriented Storage Devices
6.8. Recommended Reading and Web Sites
6.9. Key Terms, Review Questions, and Problems
Chapter 7. Pseudorandom Number Generation and Stream Ciphers
7.1. Principle of Pseudorandom Number Generation
7.2. Pseudorandom Number Generators
7.3. Pseudorandom Number Generation Using a Block Cipher
7.4. Stream Cipher
7.5. RC4 234
7.6. True Random Numbers
7.7. Recommended Reading
7.8. Key Terms, Review Questions, and Problems
Part Two: Asymmetric Ciphers
Chapter 8. More Number Theory
8.1. Prime Numbers
8.2. Fermat's and Euler's Theorems
8.3. Testing for Primality
8.4. The Chinese Remainder Theorem
8.5. Discrete Logarithms
8.6. Recommended Reading and Web Sites
8.7. Key Terms, Review Questions, and Problems
Chapter 9. Public-Key Cryptography and RSA
9.1. Principles of Public-Key Cryptosystems
9.2. The RSA Algorithm
9.3. Recommended Reading and Web Sites
9.4. Key Terms, Review Questions, and Problems
Chapter 10. Other Public-Key Cryptosystems
10.1. Diffie-Hellman Key Exchange
10.2. ElGamal Cryptosystem
10.3. Elliptic Curve Arithmetic
10.4. Elliptic Curve Cryptography
10.5. Pseudorandom Number Generation Based on an Asymmetric Cipher
10.6. Recommended Reading and Web Sites
10.7. Key Terms, Review Questions, and Problems
Part Three: Cryptographic Data Integrity Algorithm
11.1. Applications of Cryptographic Hash Functions
11.2. Two Simple Hash Function
11.3. Requirements and Security
11.4. Hash Function Based on Cipher Block Chaining
11.5. Secure Hash Algorithm
11.6. SHA-3 352
11.7. Recommended Reading and Web Sites
11.8. Key Terms, Review Questions, and Problems
Chapter 12. Message Authentication Codes
12.1. Message Authentication Requirements
12.2. Message Authentication Functions
12.3. Message Authentication Codes
12.4. Security of MACs
12.5. MACs Based on Hash Function: HMAC
12.6. MACs Based on Block Ciphers: DDA and CMAC
12.7. Authenticated Encryption : CCM and GCM
12.8. Pseudorandom Number Generation Using Hash Function and MACs
12.9. Recommended Reading and Web Sites
12.10. Key Terms, Review Questions, and Problems
Chapter 13. Digital Signatures
13.1. Digital Signatures
13.2. ElGamal Digital Signature Scheme
13.3. Schnorr Digital Signature Scheme
13.4. Digital Signature Standard (DSS)
13.5. Recommended Reading and Web Sites
13.6. Key Terms, Review Questions, and Problems
Part Four: Mutual Trust
Chapter 14. Key Management and Distribution
14.1. Symmetric Key Distribution Using Symmetric Encryption
14.2. Symmetric Key Distribution Using Asymmetric Encryption
14.3. Distribution of Public Key
14.4. X.509 Certificates
14.5. Public Key Infrastructure
14.6. Recommended Reading and Web Sites
14.7. Key Terms, Review Questions, and Problems
Chapter 15. User Authentication Protocols
15.1. Remote User Authentication Principle
15.2. Remote User Authentication Using Symmetric Encryption
15.3. Kerberos
15.4. Remote User Authentication Using Asymmetric Encryption
15.5. Federal Identity Management
15.6. Recommended Reading and Web Sites
15.7. Key Terms, Review Questions, and Problems
Part Five: Network and Internet Security
Chapter 16. Transport-Level Security
16.1. Web Security Issues
16.2. Secure Sockets Layers (SSL)
16.3. Transport Layer security (TLS)
16.4. HTTPS 506
16.5. Secure Shell (SSH)
16.6. Recommended Reading and Web Sites
16.7. Key Terms, Review Questions, and Problems
Chapter 17. Wireless Network Security
17.1. IEEE 802.11 Wireless LAN Overview
17.2. IEEE 802.11i Wireless LAN Secuirity
17.3. Wireless Application Protocol Overview
17.4. Wireless Transport Layer Security
17.5. WAP End-to-End Security
17.6. Recommended Reading and Web Sites
17.7. Key Terms, Review Questions, and Problems
Chapter 18. Electronic Mail Security
18.1. Pretty Good Privacy (PGP)
18.2. S/MIME
18.3. DomainKeys Identified Mail (DKIM)
18.4. Recommended Reading
18.5. Key Terms, Review Questions, and Problems
Chapter 19. IP Security
19.1. IP Security Overview
19.2. IP Security Policy
19.3. Encapsulating Security Payload
19.4. Combining Security Associations
19.5. Internet Key Exchange
19.6. Cryptographic Suites
19.7. Recommended Reading and Web Sites
19.8. Key Terms, Review Questions, and Problems
No other version available