Text
Cryptography and network security
Anak judul: principles and practice.
Termasuk bibliografi dan indeks.
CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers
Chapter 2 Classical Encryption Techniques
< >2.1 Symmetric Cipher Model
< >2.2 Substitution Techniques
< >2.3 Transposition Techniques
< >2.4 Rotor Machines
< >2.5 Steganography
< >2.6 Recommended Reading
< >2.7 Key Terms, Review Questions, and Problems
Chapter 3 Block Ciphers and the Data Encryption Standard
< >3.1 Traditional Block Cipher Structure
< >3.2 The Data Encryption Standard
< >3.3 A DES Example
< >3.4 The Strength of DES
< >3.5 Block Cipher Design Principles
< >3.6 Recommended Reading
< >3.7 Key Terms, Review Questions, and Problems
Chapter 4 Basic Concepts in Number Theory and Finite Fields
< >4.1 Divisibility and the Division Algorithm
< >4.2 The Euclidean Algorithm
< >4.3 Modular Arithmetic
< >4.4 Groups, Rings, and Fields
< >4.5 Finite Fields of the Form GF( p )
< >4.6 Polynomial Arithmetic
< >4.7 Finite Fields of the Form GF(2n )
< >4.8 Recommended Reading
< >4.9 Key Terms, Review Questions, and Problems
Chapter 5 Advanced Encryption Standard
< >5.1 Finite Field Arithmetic
< >5.2 AES Structure
< >5.3 AES Transformation Functions
< >5.4 AES Key Expansion
< >5.5 An AES Example
< >5.6 AES Implementation
< >5.7 Recommended Reading
< >5.8 Key Terms, Review Questions, and Problems
Chapter 6 Block Cipher Operation
< >6.1 Multiple Encryption and Triple DES
< >6.2 Electronic Code book
< >6.3 Cipher Block Chaining Mode
< >6.4 Cipher Feedback Mode
< >6.5 Output Feedback Mode
< >6.6 Counter Mode
< >6.7 XTS-AES Mode for Block-Oriented Storage Devices
< >6.8 Recommended Reading
< >6.9 Key Terms, Review Questions, and Problems
< >Chapter 7 Pseudorandom Number Generation and Stream Ciphers
< >7.1 Principles of Pseudorandom Number Generation
< >7.2 Pseudorandom Number Generators
< >7.3 Pseudorandom Number Generation Using a Block Cipher
< >7.4 Stream Ciphers
< >7.5 RC4
< >7.6 True Random Number Generators
< >7.7 Recommended Reading
< >7.8 Key Terms, Review Questions, and Problems
Chapter 8 More Number Theory
< >8.1 Prime Numbers
< >8.2 Fermat
No other version available