Cryptography and Network Security: An Introduction
- Length: 500 pages
- Edition: 1
- Language: English
- Publisher: Mercury Learning and Information
- Publication Date: 2021-08-30
- ISBN-10: 1683926919
- ISBN-13: 9781683926917
- Sales Rank: #0 (See Top 100 Books)
This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design andimplementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts:Cryptography, Security Systems, Network Security Applications, and SystemSecurity. Numerous diagrams and examples throughout the book are used toexplain cryptography and network security concepts.
FEATURES:
- Covers key conceptsrelated to cryptography and network security
- Includes chapters on modernsymmetric key block cipher algorithms, information security, message integrity,authentication, digital signature, key management, intruder detection, networklayer security, data link layer security, NSM, firewall design, and more.
Preface xiii Part 1: Cryptography Chapter 1: Introduction 1.1 Introduction 1.2 Security Needs 1.3 Security Attacks 1.4 Types of Attacks 1.5 Security Services 1.6 Security Mechanisms Summary Review Questions Multiple Choice Questions Chapter 2: Conventional Encryption and Message Confidentiality 2.1 Introduction 2.2 Conventional Encryption Principles 2.3 Cryptography 2.4 Cryptanalysis 2.5 Location of Encryption Devices Summary Review Questions Multiple Choice Questions Chapter 3: Symmetric Key Encryption 3.1 Introduction 3.2 General Idea of Symmetric Key Encryption 3.3 Symmetric Key Encryption 3.4 Classifications of Traditional Ciphers 3.5 Stream and Block Ciphers Summary Review Questions Multiple Choice Questions Chapter 4: Modern Block Ciphers 4.1 Introduction 4.2 General Idea of Modern Block Ciphers 4.3 Types of Modern Block Ciphers 4.4 Components of Modern Block Ciphers 4.5 Circular Shifting 4.6 Product Ciphers 4.7 Feistel and Non-feistel Ciphers 4.8 Attacks on Block Ciphers Summary Review Questions Multiple Choice Questions Chapter 5: Data Encryption Standard (DES) 5.1 Introduction 5.2 DES Structure 5.3 Round Key Generation: To Generate 16 Sub-Keys (K1, K2 …K16) 5.4 Encoding Each 64 Bit Block of Plaintext 5.5 DES Cryptanalysis 5.6 Triple Data Encryption Standard (TDES) 5.7 International Data Encryption Algorithm (IDEA) 5.8 Blowfish Algorithm Summary Review Questions Multiple Choice Questions Chapter 6: Advanced Encryption Standard (AES) 6.1 Introduction 6.2 Data Representation 6.3 Structure of AES 6.4 AES Key Expansion 6.5 AES Decryption 6.6 AES Encryption and Decryption Example 6.7 Advantages of AES Algorithm 6.8 Comparison Between AES and DES Algorithms Summary Review Questions Multiple Choice Questions Chapter 7: Asymmetric Key Encryption 7.1 Introduction 7.2 Public Key Cryptography 7.3 RSA Algorithm 7.4 Rabin Cryptosystem 7.5 Diffie-Hellman Key Exchange 7.6 ElGamal Public Key Cryptosystem 7.7 Elliptical Curve Cryptosystem (ECC) 7.8 ElGamal Encryption using Elliptic Curve Cryptography 7.9 Elliptic Cryptography and Diffie-Hellman Key Exchange Summary Review Questions Multiple Choice Questions Part 2: Security Systems Chapter 8: Message Integrity and Message Authentication 8.1 Introduction 8.2 Message Integrity 8.3 Hash Function 8.4 Random Oracle Model 8.5 Message Authentication Summary Review Questions Multiple Choice Questions Chapter 9: Hash Functions 9.1 Introduction 9.2 Constructions of Hash Functions 9.3 Message Digest 9.4 Secure Hash Algorithm (SHA) Summary Review Questions Multiple Choice Questions Chapter 10: Digital Signature 10.1 Introduction 10.2 Digital Signature 10.3 Digital Envelope 10.4 Digital Signature Standard (DSS) Summary Review Questions Multiple Choice Questions Chapter 11: Entity Authentication 11.1 Introduction 11.2 Entity Authentication 11.3 Password Authentication 11.4 Challenge-Response Identification 11.5 Biometric Security Systems Summary Review Questions Multiple Choice Questions Chapter 12: Authentication and Key Management Applications 12.1 Introduction 12.2 Public Key Distribution 12.3 Public Key Infrastructure (PKI) 12.4 Kerberos 12.5 Pluggable Authentication Module (PAM) 12.6 Key Distribution Center (KDC) Summary Review Questions Multiple Choice Questions Part 3: Network Security Applications Chapter 13: Network Security and Protocols 13.1 Introduction 13.2 Internet 13.3 Vulnerability and Attacks in Networks 13.4 Network Communication Architecture and Protocols Summary Review Questions Multiple Choice Questions Chapter 14: Network Attacks and Security Threats 14.1 Introduction 14.2 Different Types of Network Attacks and Security Threats Summary Review Questions Multiple Choice Questions Chapter 15: Application Layer Security 15.1 Introduction 15.2 E-mail Security 15.3 E-Mail Security Service 15.4 E-Mail Security Mechanisms Summary Review Questions Multiple Choice Questions Chapter 16: Transport Layer Security 16.1 Introduction 16.2 Secure Socket Layer (SSL) 16.3 Transport Layer Security (TLS) 16.4 Hypertext Transfer Protocol Secure (HTTPS) – HTTP over SSL 16.5 SSH – Secure Shell Summary Review Questions Multiple Choice Questions Chapter 17: Network Layer Security 17.1 Introduction 17.2 Need of Network Layer Security 17.3 Internet Protocol Security (IPsec) 17.4 IPsec Core Protocol 17.5 Operations of Transport and Tunnel Mode 17.6 Security Association and Encryption Strength 17.7 Key Distribution Summary Review Questions Multiple Choice Questions Chapter 18: Data Link Layer Security 18.1 Introduction 18.2 ARP Spoofing 18.3 MAC Flooding 18.4 Port Stealing 18.5 DHCP Attacks 18.6 CAM Overflow Attacks 18.7 VLAN Hopping 18.8 Spanning Tree Protocol (STP) Manipulation Attacks Summary Review Questions Multiple Choice Questions Chapter 19: Intruders, Viruses, Worms, and Trojan Horses 19.1 Introduction 19.2 Viruses 19.3 Worms 19.4 Trojan Horses 19.5 Adware 19.6 Malicious Software 19.7 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 19.8 Honeypots Summary Review Questions Multiple Choice Questions Chapter 20: Firewalls and Virtual Private Networks (VPN) 20.1 Introduction 20.2 Packet Filtering Routers and Bastion Hosts 20.3 Proxy Filter (Server) 20.4 Network Address Translation (NAT) 20.5 Port Address Translation (PAT) 20.6 Virtual Private Network (VPN) 20.7 Tunneling Protocols Summary Review Questions Multiple Choice Questions Appendix A: Answers for Multiple Choice Questions Appendix B: References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.