Cryptography and Network Security: Principles and Practice, 8th Edition
- Length: 1513 pages
- Edition: 8
- Language: English
- Publisher: Pearson
- Publication Date: 2019-06-25
- ISBN-10: 0135764033
- ISBN-13: 9780135764039
- Sales Rank: #1227215 (See Top 100 Books)
Keep pace with the fast-moving field of cryptography and network security
Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.
For courses in Cryptography, Computer Security, and Network Security.
Pearson eText is an easy-to-use digital textbook that you can purchase on your own or instructors can assign for their course. The mobile app lets you keep on learning, no matter where your day takes you, even offline. You can also add highlights, bookmarks, and notes in your Pearson eText to study how you like.
NOTE: This ISBN is for the Pearson eText access card. Pearson eText is a fully digital delivery of Pearson content. Before purchasing, check that you have the correct ISBN. To register for and use Pearson eText, you may also need a course invite link, which your instructor will provide. Follow the instructions provided on the access card to learn more.
Preface Cover Title Copyright Preface Notation Books by William Stallings About the Author Contents Contents 1: Information and Network Security Concepts Introduction: Information and Network Security Concepts 1.1: Cybersecurity, Information Security, and Network Security 1.2: The OSI Security Architecture 1.3: Security Attacks 1.4: Security Services 1.5: Security Mechanisms 1.6: Cryptography 1.7: Network Security 1.8: Trust and Trustworthiness 1.9: Standards Chapter 1: Key Terms Chapter 1: Review Questions Chapter 1: Problems 2: Introduction to Number Theory Introduction: Introduction to Number Theory 2.1: Divisibility and the Division Algorithm 2.2: The Euclidean Algorithm 2.3: Modular Arithmetic 2.4: Prime Numbers 2.5: Fermat's and Euler's Theorems 2.6: Testing for Primality 2.7: The Chinese Remainder Theorem 2.8: Discrete Logarithms Chapter 2: Key Terms Chapter 2: Review Questions Chapter 2: Problems Chapter 2: Programming Problems Appendix 2A: The Meaning of Mod 3: Classical Encryption Techniques Introduction: Classical Encryption Techniques 3.1: Symmetric Cipher Model 3.2: Substitution Techniques 3.3: Transposition Techniques Chapter 3: Key Terms Chapter 3: Review Questions Chapter 3: Problems Chapter 3: Programming Problems 4: Block Ciphers and the Data Encryption Standard Introduction: Block Ciphers and the Data Encryption Standard 4.1: Traditional Block Cipher Structure 4.2: The Data Encryption Standard (DES) 4.3: A DES Example 4.4: The Strength of DES 4.5: Block Cipher Design Principles Chapter 4: Key Terms Chapter 4: Review Questions Chapter 4: Programming Problems Chapter 4: Problems 5: Finite Fields Introduction: Finite Fields 5.1: Groups 5.2: Rings 5.3: Fields 5.4: Finite Fields of the Form GF(p) 5.5: Polynomial Arithmetic 5.6: Finite Fields of the Form GF2^n Chapter 5: Key Terms Chapter 5: Programming Problems Chapter 5: Review Questions Chapter 5: Problems 6: Advanced Encryption Standard Introduction: Advanced Encryption Standard 6.1: Finite Field Arithmetic 6.2: AES Structure 6.3: AES Transformation Functions 6.4: AES Key Expansion 6.5: An AES Example 6.6: AES Implementation Chapter 6: Programming Problems Chapter 6: Key Terms Chapter 6: Review Questions Chapter 6: Problems Appendix 6A: Polynomials with Coefficients in GF2_8 7: Block Cipher Operation Introduction: Block Cipher Operation 7.1: Multiple Encryption and Triple DES 7.2: Electronic Codebook 7.3: Cipher Block Chaining Mode 7.4: Cipher Feedback Mode 7.5: Output Feedback Mode 7.6: Counter Mode 7.7: XTS-AES Mode for Block-Oriented Storage Devices Chapter 7: Programming Problems 7.8: Format-Preserving Encryption Chapter 7: Key Terms Chapter 7: Review Questions Chapter 7: Problems 8: Random Bit Generation and Stream Ciphers Introduction: Random Bit Generation and Stream Ciphers 8.1: Principles of Pseudorandom Number Generation 8.2: Pseudorandom Number Generators 8.3: Pseudorandom Number Generation Using a Block Cipher 8.4: Stream Ciphers 8.5: RC4 8.6: Stream Ciphers Using Feedback Shift Registers 8.7: True Random Number Generators Chapter 8: Key Terms Chapter 8: Review Questions Chapter 8: Problems 9: Public-Key Cryptography and RSA Introduction: Public-Key Cryptography and RSA 9.1: Principles of Public-Key Cryptosystems 9.2: The RSA Algorithm Chapter 9: Key Terms Chapter 9: Review Questions Chapter 9: Problems 10: Other Public-Key Cryptosystems Introduction: Other Public-Key Cryptosystems 10.1: Diffie-Hellman Key Exchange 10.2: Elgamal Cryptographic System 10.3: Elliptic Curve Arithmetic 10.4: Elliptic Curve Cryptography Chapter 10: Key Terms Chapter 10: Review Questions Chapter 10: Problems 11: Cryptographic Hash Functions Introduction: Cryptographic Hash Functions 11.1: Applications of Cryptographic Hash Functions 11.2: Two Simple Hash Functions 11.3: Requirements and Security 11.4: Secure Hash Algorithm (SHA) 11.5: SHA-3 Chapter 11: Key Terms Chapter 11: Review Questions Chapter 11: Problems 12: Message Authentication Codes Introduction: Message Authentication Codes 12.1: Message Authentication Requirements 12.2: Message Authentication Functions 12.3: Requirements for Message Authentication Codes 12.4: Security of MACs 12.5: MACs Based on Hash Functions: HMAC 12.6: MACs Based on Block Ciphers: DAA and CMAC 12.7: Authenticated Encryption: CCM and GCM 12.8: Key Wrapping 12.9: Pseudorandom Number Generation Using Hash Functions and MACS Chapter 12: Key Terms Chapter 12: Review Questions Chapter 12: Problems 13: Digital Signatures Introduction: Digital Signatures 13.1: Digital Signatures 13.2: Elgamal Digital Signature Scheme 13.3: Schnorr Digital Signature Scheme 13.4: NIST Digital Signature Algorithm 13.5: Elliptic Curve Digital Signature Algorithm 13.6: RSA-PSS Digital Signature Algorithm Chapter 13: Key Terms Chapter 13: Review Questions Chapter 13: Problems 14: Lightweight Cryptography and Post-Quantum Cryptography Introduction: Lightweight Cryptography and Post-Quantum Cryptography 14.1: Lightweight Cryptography Concepts 14.2: Lightweight Cryptographic Algorithms 14.3: Post-Quantum Cryptography Concepts 14.4: Post-Quantum Cryptographic Algorithms Chapter 14: Key Terms Chapter 14: Review Questions 15: Cryptographic Key Management and Distribution Introduction: Cryptographic Key Management and Distribution 15.1: Symmetric Key Distribution Using Symmetric Encryption 15.2: Symmetric Key Distribution Using Asymmetric Encryption 15.3: Distribution of Public Keys 15.4: X.509 Certificates 15.5: Public-Key Infrastructure Chapter 15: Key Terms Chapter 15: Review Questions Chapter 15: Problems 16: User Authentication Introduction: User Authentication 16.1: Remote User-Authentication Principles 16.2: Remote User-Authentication Using Symmetric Encryption 16.3: Kerberos 16.4: Remote User-Authentication Using Asymmetric Encryption 16.5: Federated Identity Management Chapter 16: Key Terms Chapter 16: Review Questions Chapter 16: Problems 17: Transport-Level Security Introduction: Transport-Level Security 17.1: Web Security Issues 17.2: Transport Layer Security 17.3: HTTPS 17.4: Secure Shell (SSH) Chapter 17: Review Questions Chapter 17: Problems 18: Wireless Network Security Introduction: Wireless Network Security 18.1: Wireless Security 18.2: Mobile Device Security 18.3: IEEE 802.11 Wireless LAN Overview 18.4: IEEE 802.11i Wireless LAN Security Chapter 18: Key Terms Chapter 18: Review Questions Chapter 18: Problems 19: Electronic Mail Security Introduction: Electronic Mail Security 19.1: Internet Mail Architecture 19.2: Email Formats 19.3: Email Threats and Comprehensive Email Security 19.4: S/MIME 19.5: DNSSEC 19.6: DNS-Based Authentication of Named Entities 19.7: Sender Policy Framework 19.8: DomainKeys Identified Mail 19.9: Domain-Based Message Authentication, Reporting, and Conformance Chapter 19: Key Terms Chapter 19: Review Questions Chapter 19: Problems 20: IP Security Introduction: IP Security 20.1: IP Security Overview 20.2: IP Security Policy 20.3: Encapsulating Security Payload 20.4: Combining Security Associations 20.5: Internet Key Exchange Chapter 20: Key Terms Chapter 20: Review Questions Chapter 20: Problems 21: Network Endpoint Security Introduction: Network Endpoint Security 21.1: Firewalls 21.2: Intrusion Detection Systems 21.3: Malicious Software 21.4: Distributed Denial of Service Attacks Chapter 21: Key Terms Chapter 21: Review Questions Chapter 21: Problems 22: Cloud Security Introduction: Cloud Security 22.1: Cloud Computing 22.2: Cloud Security Concepts 22.3: Cloud Security Risks and Countermeasures 22.4: Cloud Security as a Service 22.5: On Open-Source Cloud Security Module Chapter 22: Key Terms Chapter 22: Review Questions 23: Internet of Things (IoT) Security Introduction: Internet of Things (IoT) Security 23.1: The Internet of Things 23.2: IoT Security Concepts and Objectives 23.3: An Open-Source IoT Security Module Chapter 23: Key Terms Chapter 23: Review Questions Backmatter Appendix A: Basic Concepts from Linear Algebra Appendix B: Measures of Security and Secrecy Appendix C: Data Encryption Standard (DES) Appendix D: Simplified AES Appendix E: Mathematical Basis of The Birthday Attack References List of Acronyms Glossary
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.