Text
Cryptography and network security: principle and practice
Anak judul: principles and practice.
Termasuk bibliografi dan indeks.
CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers
Chapter 2 Classical Encryption Techniques
2.1 Symmetric Cipher Model
2.2 Substitution Techniques
2.3 Transposition Techniques
2.4 Rotor Machines
2.5 Steganography
2.6 Recommended Reading
2.7 Key Terms, Review Questions, and Problems
Chapter 3 Block Ciphers and the Data Encryption Standard
3.1 Traditional Block Cipher Structure
3.2 The Data Encryption Standard
3.3 A DES Example
3.4 The Strength of DES
3.5 Block Cipher Design Principles
3.6 Recommended Reading
3.7 Key Terms, Review Questions, and Problems
Chapter 4 Basic Concepts in Number Theory and Finite Fields
4.1 Divisibility and the Division Algorithm
4.2 The Euclidean Algorithm
4.3 Modular Arithmetic
4.4 Groups, Rings, and Fields
4.5 Finite Fields of the Form GF( p )
4.6 Polynomial Arithmetic
4.7 Finite Fields of the Form GF(2n )
4.8 Recommended Reading
4.9 Key Terms, Review Questions, and Problems
Chapter 5 Advanced Encryption Standard
5.1 Finite Field Arithmetic
5.2 AES Structure
5.3 AES Transformation Functions
5.4 AES Key Expansion
5.5 An AES Example
5.6 AES Implementation
5.7 Recommended Reading
5.8 Key Terms, Review Questions, and Problems
Chapter 6 Block Cipher Operation
6.1 Multiple Encryption and Triple DES
6.2 Electronic Code book
6.3 Cipher Block Chaining Mode
6.4 Cipher Feedback Mode
6.5 Output Feedback Mode
6.6 Counter Mode
6.7 XTS-AES Mode for Block-Oriented Storage Devices
6.8 Recommended Reading
6.9 Key Terms, Review Questions, and Problems
Chapter 7 Pseudorandom Number Generation and Stream Ciphers
7.1 Principles of Pseudorandom Number Generation
7.2 Pseudorandom Number Generators
7.3 Pseudorandom Number Generation Using a Block Cipher
7.4 Stream Ciphers
7.5 RC4
7.6 True Random Number Generators
7.7 Recommended Reading
7.8 Key Terms, Review Questions, and Problems
Chapter 8 More Number Theory
8.1 Prime Numbers
8.2 Fermat
No other version available