Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography and network security: principle and practices
Bookmark Share

Text

Cryptography and network security: principle and practices

Stallings, William - Personal Name;

Contents:

Chapter 1. Introduction
Section 1.1. Security Trends
Section 1.2. The OSI Security Architecture
Section 1.3. Security Attacks
Section 1.4. Security Services
Section 1.5. Security Mechanisms
Section 1.6. A Model for Network Security
Section 1.7. Recommended Reading and Web Sites
Section 1.8. Key Terms, Review Questions, and Problems

Part One: Symmetric Ciphers

Chapter 2. Classical Encryption Techniques
Section 2.1. Symmetric Cipher Model
Section 2.2. Substitution Techniques
Section 2.3. Transposition Techniques
Section 2.4. Rotor Machines
Section 2.5. Steganography
Section 2.6. Recommended Reading and Web Sites
Section 2.7. Key Terms, Review Questions, and Problems

Chapter 3. Block Ciphers and the Data Encryption Standard
Section 3.1. Block Cipher Principles
Section 3.2. The Data Encryption Standard
Section 3.3. The Strength of Des
Section 3.4. Differential and Linear Cryptanalysis
Section 3.5. Block Cipher Design Principles
Section 3.6. Recommended Reading
Section 3.7. Key Terms, Review Questions, and Problems

Chapter 4. Finite Fields
Section 4.1. Groups, Rings, and Fields
Section 4.2. Modular Arithmetic
Section 4.3. The Euclidean Algorithm
Section 4.4. Finite Fields of The Form GF(p)
Section 4.5. Polynomial Arithmetic
Section 4.6. Finite Fields Of the Form GF(2n)
Section 4.7. Recommended Reading and Web Sites
Section 4.8. Key Terms, Review Questions, and Problems

Chapter 5. Advanced Encryption Standard
Section 5.1. Evaluation Criteria For AES
Section 5.2. The AES Cipher
Section 5.3. Recommended Reading and Web Sites
Section 5.4. Key Terms, Review Questions, and Problems
Appendix 5A Polynomials with Coefficients in GF(28)
Appendix 5B Simplified AES

Chapter 6. More on Symmetric Ciphers
Section 6.1. Multiple Encryption and Triple DES
Section 6.2. Block Cipher Modes of Operation
Section 6.3. Stream Ciphers and RC4
Section 6.4. Recommended Reading and Web Site
Section 6.5. Key Terms, Review Questions, and Problems

Chapter 7. Confidentiality Using Symmetric Encryption
Section 7.1. Placement of Encryption Function
Section 7.2. Traffic Confidentiality
Section 7.3. Key Distribution
Section 7.4. Random Number Generation
Section 7.5. Recommended Reading and Web Sites
Section 7.6. Key Terms, Review Questions, and Problems

Part Two: Public-Key Encryption and Hash Functions

Chapter 8. Introduction to Number Theory
Section 8.1. Prime Numbers
Section 8.2. Fermat's and Euler's Theorems
Section 8.3. Testing for Primality
Section 8.4. The Chinese Remainder Theorem
Section 8.5. Discrete Logarithms
Section 8.6. Recommended Reading and Web Sites
Section 8.7. Key Terms, Review Questions, and Problems

Chapter 9. Public-Key Cryptography and RSA
Section 9.1. Principles of Public-Key Cryptosystems
Section 9.2. The RSA Algorithm
Section 9.3. Recommended Reading and Web Sites
Section 9.4. Key Terms, Review Questions, and Problems
Appendix 9A Proof of the RSA Algorithm
Appendix 9B The Complexity of Algorithms

Chapter 10. Key Management; Other Public-Key Cryptosystems
Section 10.1. Key Management
Section 10.2. Diffie-Hellman Key Exchange
Section 10.3. Elliptic Curve Arithmetic
Section 10.4. Elliptic Curve Cryptography
Section 10.5. Recommended Reading and Web Sites
Section 10.6. Key Terms, Review Questions, and Problems

Chapter 11. Message Authentication and Hash Functions
Section 11.1. Authentication Requirements
Section 11.2. Authentication Functions
Section 11.3. Message Authentication Codes
Section 11.4. Hash Functions
Section 11.5. Security of Hash Functions and Macs
Section 11.6. Recommended Reading
Section 11.7. Key Terms, Review Questions, and Problems
Appendix 11A Mathematical Basis of the Birthday Attack

Chapter 12. Hash and MAC Algorithms
Section 12.1. Secure Hash Algorithm
Section 12.2. Whirlpool
Section 12.3. HMAC
Section 12.4. CMAC
Section 12.5. Recommended Reading and Web Sites
Section 12.6. Key Terms, Review Questions, and Problems
Chapter 13. Digital Signatures and Authentication Protocols

Section 13.1. Digital Signatures
Section 13.2. Authentication Protocols
Section 13.3. Digital Signature Standard
Section 13.4. Recommended Reading and Web Sites
Section 13.5. Key Terms, Review Questions, and Problems

Part Three: Network Security Applications

Chapter 14. Authentication Applications
Section 14.1. Kerberos
Section 14.2. X.509 Authentication Service
Section 14.3. Public-Key Infrastructure
Section 14.4. Recommended Reading and Web Sites
Section 14.5. Key Terms, Review Questions, and Problems
Appendix 14A Kerberos Encryption Techniques

Chapter 15. Electronic Mail Security
Section 15.1. Pretty Good Privacy
Section 15.2. S/MIME
Section 15.3. Key Terms, Review Questions, and Problems
Appendix 15A Data Compression Using Zip
Appendix 15B Radix-64 Conversion
Appendix 15C PGP Random Number Generation

Chapter 16. IP Security
Section 16.1. IP Security Overview
Section 16.2. IP Security Architecture
Section 16.3. Authentication Header
Section 16.4. Encapsulating Security Payload
Section 16.5. Combining Security Associations
Section 16.6. Key Management
Section 16.7. Recommended Reading and Web Site
Section 16.8. Key Terms, Review Questions, and Problems
Appendix 16A Internetworking and Internet Protocols

Chapter 17. Web Security
Section 17.1. Web Security Considerations
Section 17.2. Secure Socket Layer and Transport Layer Security
Section 17.3. Secure Electronic Transaction
Section 17.4. Recommended Reading and Web Sites
Section 17.5. Key Terms, Review Questions, and Problems
Part Four: System Security

Chapter 18. Intruders
Section 18.1. Intruders
Section 18.2. Intrusion Detection
Section 18.3. Password Management
Section 18.4. Recommended Reading and Web Sites
Section 18.5. Key Terms, Review Questions, and Problems
Appendix 18A The Base-Rate Fallacy

Chapter 19. Malicious Software
Section 19.1. Viruses and Related Threats
Section 19.2. Virus Countermeasures
Section 19.3. Distributed Denial of Service Attacks
Section 19.4. Recommended Reading and Web Sites
Section 19.5. Key Terms, Review Questions, and Problems

Chapter 20. Firewalls
Section 20.1. Firewall Design Principles
Section 20.2. Trusted Systems
Section 20.3. Common Criteria for Information Technology Security Evaluation
Section 20.4. Recommended Reading and Web Sites
Section 20.5. Key Terms, Review Questions, and Problems

Appendix A. Standards and Standards-Setting Organizations
Section A.1. The Importance of Standards
Section A.2. Internet Standards and the Internet Society
Section A.3. National Institute of Standards and Technology

Appendix B. Projects for Teaching Cryptography and Netwok Security
Section B.1. Research Projects
Section B.2. Programming Projects
Section B.3. Laboratory Exercises
Section B.4. Writing Assignments
Section B.5. Reading/Report Assignments

Glossary
References
Abbreviations
Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 STA C
00000702
Available
Detail Information
Series Title
--
Call Number
005.8 STA C
Publisher
New Jersey : Pearson., 2006
Collation
xvi, 680 hlm.; ilus.; 21 cm
Language
English
ISBN/ISSN
9780131873162
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
Fourth Edition
Subject(s)
Kriptografi
Komputer, Jaringan -- Keamanan
Specific Detail Info
-
Statement of Responsibility
William Stallings
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?