Text
Cryptography and network security: principle and practices
Contents:
Chapter 1. Introduction
Section 1.1. Security Trends
Section 1.2. The OSI Security Architecture
Section 1.3. Security Attacks
Section 1.4. Security Services
Section 1.5. Security Mechanisms
Section 1.6. A Model for Network Security
Section 1.7. Recommended Reading and Web Sites
Section 1.8. Key Terms, Review Questions, and Problems
Part One: Symmetric Ciphers
Chapter 2. Classical Encryption Techniques
Section 2.1. Symmetric Cipher Model
Section 2.2. Substitution Techniques
Section 2.3. Transposition Techniques
Section 2.4. Rotor Machines
Section 2.5. Steganography
Section 2.6. Recommended Reading and Web Sites
Section 2.7. Key Terms, Review Questions, and Problems
Chapter 3. Block Ciphers and the Data Encryption Standard
Section 3.1. Block Cipher Principles
Section 3.2. The Data Encryption Standard
Section 3.3. The Strength of Des
Section 3.4. Differential and Linear Cryptanalysis
Section 3.5. Block Cipher Design Principles
Section 3.6. Recommended Reading
Section 3.7. Key Terms, Review Questions, and Problems
Chapter 4. Finite Fields
Section 4.1. Groups, Rings, and Fields
Section 4.2. Modular Arithmetic
Section 4.3. The Euclidean Algorithm
Section 4.4. Finite Fields of The Form GF(p)
Section 4.5. Polynomial Arithmetic
Section 4.6. Finite Fields Of the Form GF(2n)
Section 4.7. Recommended Reading and Web Sites
Section 4.8. Key Terms, Review Questions, and Problems
Chapter 5. Advanced Encryption Standard
Section 5.1. Evaluation Criteria For AES
Section 5.2. The AES Cipher
Section 5.3. Recommended Reading and Web Sites
Section 5.4. Key Terms, Review Questions, and Problems
Appendix 5A Polynomials with Coefficients in GF(28)
Appendix 5B Simplified AES
Chapter 6. More on Symmetric Ciphers
Section 6.1. Multiple Encryption and Triple DES
Section 6.2. Block Cipher Modes of Operation
Section 6.3. Stream Ciphers and RC4
Section 6.4. Recommended Reading and Web Site
Section 6.5. Key Terms, Review Questions, and Problems
Chapter 7. Confidentiality Using Symmetric Encryption
Section 7.1. Placement of Encryption Function
Section 7.2. Traffic Confidentiality
Section 7.3. Key Distribution
Section 7.4. Random Number Generation
Section 7.5. Recommended Reading and Web Sites
Section 7.6. Key Terms, Review Questions, and Problems
Part Two: Public-Key Encryption and Hash Functions
Chapter 8. Introduction to Number Theory
Section 8.1. Prime Numbers
Section 8.2. Fermat's and Euler's Theorems
Section 8.3. Testing for Primality
Section 8.4. The Chinese Remainder Theorem
Section 8.5. Discrete Logarithms
Section 8.6. Recommended Reading and Web Sites
Section 8.7. Key Terms, Review Questions, and Problems
Chapter 9. Public-Key Cryptography and RSA
Section 9.1. Principles of Public-Key Cryptosystems
Section 9.2. The RSA Algorithm
Section 9.3. Recommended Reading and Web Sites
Section 9.4. Key Terms, Review Questions, and Problems
Appendix 9A Proof of the RSA Algorithm
Appendix 9B The Complexity of Algorithms
Chapter 10. Key Management; Other Public-Key Cryptosystems
Section 10.1. Key Management
Section 10.2. Diffie-Hellman Key Exchange
Section 10.3. Elliptic Curve Arithmetic
Section 10.4. Elliptic Curve Cryptography
Section 10.5. Recommended Reading and Web Sites
Section 10.6. Key Terms, Review Questions, and Problems
Chapter 11. Message Authentication and Hash Functions
Section 11.1. Authentication Requirements
Section 11.2. Authentication Functions
Section 11.3. Message Authentication Codes
Section 11.4. Hash Functions
Section 11.5. Security of Hash Functions and Macs
Section 11.6. Recommended Reading
Section 11.7. Key Terms, Review Questions, and Problems
Appendix 11A Mathematical Basis of the Birthday Attack
Chapter 12. Hash and MAC Algorithms
Section 12.1. Secure Hash Algorithm
Section 12.2. Whirlpool
Section 12.3. HMAC
Section 12.4. CMAC
Section 12.5. Recommended Reading and Web Sites
Section 12.6. Key Terms, Review Questions, and Problems
Chapter 13. Digital Signatures and Authentication Protocols
Section 13.1. Digital Signatures
Section 13.2. Authentication Protocols
Section 13.3. Digital Signature Standard
Section 13.4. Recommended Reading and Web Sites
Section 13.5. Key Terms, Review Questions, and Problems
Part Three: Network Security Applications
Chapter 14. Authentication Applications
Section 14.1. Kerberos
Section 14.2. X.509 Authentication Service
Section 14.3. Public-Key Infrastructure
Section 14.4. Recommended Reading and Web Sites
Section 14.5. Key Terms, Review Questions, and Problems
Appendix 14A Kerberos Encryption Techniques
Chapter 15. Electronic Mail Security
Section 15.1. Pretty Good Privacy
Section 15.2. S/MIME
Section 15.3. Key Terms, Review Questions, and Problems
Appendix 15A Data Compression Using Zip
Appendix 15B Radix-64 Conversion
Appendix 15C PGP Random Number Generation
Chapter 16. IP Security
Section 16.1. IP Security Overview
Section 16.2. IP Security Architecture
Section 16.3. Authentication Header
Section 16.4. Encapsulating Security Payload
Section 16.5. Combining Security Associations
Section 16.6. Key Management
Section 16.7. Recommended Reading and Web Site
Section 16.8. Key Terms, Review Questions, and Problems
Appendix 16A Internetworking and Internet Protocols
Chapter 17. Web Security
Section 17.1. Web Security Considerations
Section 17.2. Secure Socket Layer and Transport Layer Security
Section 17.3. Secure Electronic Transaction
Section 17.4. Recommended Reading and Web Sites
Section 17.5. Key Terms, Review Questions, and Problems
Part Four: System Security
Chapter 18. Intruders
Section 18.1. Intruders
Section 18.2. Intrusion Detection
Section 18.3. Password Management
Section 18.4. Recommended Reading and Web Sites
Section 18.5. Key Terms, Review Questions, and Problems
Appendix 18A The Base-Rate Fallacy
Chapter 19. Malicious Software
Section 19.1. Viruses and Related Threats
Section 19.2. Virus Countermeasures
Section 19.3. Distributed Denial of Service Attacks
Section 19.4. Recommended Reading and Web Sites
Section 19.5. Key Terms, Review Questions, and Problems
Chapter 20. Firewalls
Section 20.1. Firewall Design Principles
Section 20.2. Trusted Systems
Section 20.3. Common Criteria for Information Technology Security Evaluation
Section 20.4. Recommended Reading and Web Sites
Section 20.5. Key Terms, Review Questions, and Problems
Appendix A. Standards and Standards-Setting Organizations
Section A.1. The Importance of Standards
Section A.2. Internet Standards and the Internet Society
Section A.3. National Institute of Standards and Technology
Appendix B. Projects for Teaching Cryptography and Netwok Security
Section B.1. Research Projects
Section B.2. Programming Projects
Section B.3. Laboratory Exercises
Section B.4. Writing Assignments
Section B.5. Reading/Report Assignments
Glossary
References
Abbreviations
Index
No other version available