Cryptography and Network Security: Principles and Practice, Global Edition, 8th Edition
- Length: 832 pages
- Edition: 8
- Language: English
- Publisher: Pearson
- Publication Date: 2022-06-14
- ISBN-10: 1292437480
- ISBN-13: 9781292437484
- Sales Rank: #4680287 (See Top 100 Books)
Keep pacewith the fast-moving field of cryptography and network security
Stallings’ Cryptographyand Network Security: Principles and Practice introduces studentsto the compelling and evolving field of cryptography and network security. Inan age of viruses and hackers, electronic eavesdropping, and electronic fraudon a global scale, security is paramount. The purpose of this book is to providea practical survey of both the principles and practice of cryptography andnetwork security. The first part of the book explores the basic issues to beaddressed by a network security capability and provides a tutorial and surveyof cryptography and network security technology. The latter part of the bookdeals with the practice of network security, covering practical applicationsthat have been implemented and are in use to provide network security.
Cover Title Page Copyright Dedication Contents Notation Preface About the Author Part One: Background Chapter 1. Information and Network Security Concepts 1.1 Cybersecurity, Information Security, and Network Security 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 Cryptography 1.7 Network Security 1.8 Trust and Trustworthiness 1.9 Standards 1.10 Key Terms, Review Questions, and Problems Chapter 2. Introduction to Number Theory 2.1 Divisibility and the Division Algorithm 2.2 The Euclidean Algorithm 2.3 Modular Arithmetic 2.4 Prime Numbers 2.5 Fermat’s and Euler’s Theorems 2.6 Testing for Primality 2.7 The Chinese Remainder Theorem 2.8 Discrete Logarithms 2.9 Key Terms, Review Questions, and Problems Appendix 2A The Meaning of Mod Part Two: Symmetric Ciphers Chapter 3. Classical Encryption Techniques 3.1 Symmetric Cipher Model 3.2 Substitution Techniques 3.3 Transposition Techniques 3.4 Key Terms, Review Questions, and Problems Chapter 4. Block Ciphers and the Data Encryption Standard 4.1 Traditional Block Cipher Structure 4.2 The Data Encryption Standard 4.3 A DES Example 4.4 The Strength of DES 4.5 Block Cipher Design Principles 4.6 Key Terms, Review Questions, and Problems Chapter 5. Finite Fields 5.1 Groups 5.2 Rings 5.3 Fields 5.4 Finite Fields of the Form GF(p) 5.5 Polynomial Arithmetic 5.6 Finite Fields of the Form GF(2n) 5.7 Key Terms, Review Questions, and Problems Chapter 6. Advanced Encryption Standard 6.1 Finite Field Arithmetic 6.2 AES Structure 6.3 AES Transformation Functions 6.4 AES Key Expansion 6.5 An AES Example 6.6 AES Implementation 6.7 Key Terms, Review Questions, and Problems Appendix 6A Polynomials with Coefficients in GF(28) Chapter 7. Block Cipher Operation 7.1 Multiple Encryption and Triple DES 7.2 Electronic CodeBook 7.3 Cipher Block Chaining Mode 7.4 Cipher Feedback Mode 7.5 Output Feedback Mode 7.6 Counter Mode 7.7 XTS-AES Mode for Block-Oriented Storage Devices 7.8 Format-Preserving Encryption 7.9 Key Terms, Review Questions, and Problems Chapter 8. Random Bit Generation and Stream Ciphers 8.1 Principles of Pseudorandom Number Generation 8.2 Pseudorandom Number Generators 8.3 Pseudorandom Number Generation Using a Block Cipher 8.4 Stream Ciphers 8.5 RC4 8.6 Stream Ciphers Using Feedback Shift Registers 8.7 True Random Number Generators 8.8 Key Terms, Review Questions, and Problems Part Three: Asymmetric Ciphers Chapter 9. Public-Key Cryptography and RSA 9.1 Principles of Public-Key Cryptosystems 9.2 The RSA Algorithm 9.3 Key Terms, Review Questions, and Problems Chapter 10. Other Public-Key Cryptosystems 10.1 Diffie–Hellman Key Exchange 10.2 Elgamal Cryptographic System 10.3 Elliptic Curve Arithmetic 10.4 Elliptic Curve Cryptography 10.5 Key Terms, Review Questions, and Problems Part Four: Cryptographic Data Integrity Algorithms Chapter 11. Cryptographic Hash Functions 11.1 Applications of Cryptographic Hash Functions 11.2 Two Simple Hash Functions 11.3 Requirements and Security 11.4 Secure Hash Algorithm (SHA) 11.5 SHA-3 11.6 Key Terms, Review Questions, and Problems Chapter 12. Message Authentication Codes 12.1 Message Authentication Requirements 12.2 Message Authentication Functions 12.3 Requirements for Message Authentication Codes 12.4 Security of MACs 12.5 MACs Based on Hash Functions: HMAC 12.6 MACs Based on Block Ciphers: DAA and CMAC 12.7 Authenticated Encryption: CCM and GCM 12.8 Key Wrapping 12.9 Pseudorandom Number Generation Using Hash Functions and MACs 12.10 Key Terms, Review Questions, and Problems Chapter 13. Digital Signatures 13.1 Digital Signatures 13.2 ElGamal Digital Signature Scheme 13.3 Schnorr Digital Signature Scheme 13.4 NIST Digital Signature Algorithm 13.5 Elliptic Curve Digital Signature Algorithm 13.6 RSA-PSS Digital Signature Algorithm 13.7 Key Terms, Review Questions, and Problems Chapter 14. Lightweight Cryptography and Post-Quantum Cryptography 14.1 Lightweight Cryptography Concepts 14.2 Lightweight Cryptographic Algorithms 14.3 Post-Quantum Cryptography Concepts 14.4 Post-Quantum Cryptographic Algorithms 14.5 Key Terms and Review Questions Part Five: Mutual Trust Chapter 15. Cryptographic Key Management and Distribution 15.1 Symmetric Key Distribution Using Symmetric Encryption 15.2 Symmetric Key Distribution Using Asymmetric Encryption 15.3 Distribution of Public Keys 15.4 X.509 Certificates 15.5 Public-Key Infrastructure 15.6 Key Terms, Review Questions, and Problems Chapter 16. User Authentication 16.1 Remote User-Authentication Principles 16.2 Remote User-Authentication Using Symmetric Encryption 16.3 Kerberos 16.4 Remote User-Authentication Using Asymmetric Encryption 16.5 Federated Identity Management 16.6 Key Terms, Review Questions, and Problems Part Six: Network And Internet Security Chapter 17. Transport-Level Security 17.1 Web Security Considerations 17.2 Transport Layer Security 17.3 HTTPS 17.4 Secure Shell (SSH) 17.5 Review Questions and Problems Chapter 18. Wireless Network Security 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless Lan Overview 18.4 IEEE 802.11i Wireless Lan Security 18.5 Key Terms, Review Questions, and Problems Chapter 19. Electronic Mail Security 19.1 Internet Mail Architecture 19.2 Email Formats 19.3 Email Threats and Comprehensive Email Security 19.4 S/MIME 19.5 DNSSEC 19.6 DNS-Based Authentication of Named Entities 19.7 Sender Policy Framework 19.8 DomainKeys Identified Mail 19.9 Domain-Based Message Authentication, Reporting, and Conformance 19.10 Key Terms, Review Questions, and Problems Chapter 20. IP Security 20.1 IP Security Overview 20.2 IP Security Policy 20.3 Encapsulating Security Payload 20.4 Combining Security Associations 20.5 Internet Key Exchange 20.6 Key Terms, Review Questions, and Problems Chapter 21. Network Endpoint Security 21.1 Firewalls 21.2 Intrusion Detection Systems 21.3 Malicious Software 21.4 Distributed Denial of Service Attacks 21.5 Key Terms, Review Questions, and Problems Chapter 22. Cloud Security 22.1 Cloud Computing 22.2 Cloud Security Concepts 22.3 Cloud Security Risks and Countermeasures 22.4 Cloud Security as a Service 22.5 An Open-Source Cloud Security Module 22.6 Key Terms and Review Questions Chapter 23. Internet of Things (IoT) Security 23.1 The Internet of Things 23.2 IoT Security Concepts and Objectives 23.3 An Open-Source IoT Security Module 23.4 Key Terms and Review Questions Appendix A. Basic Concepts from Linear Algebra A.1 Operations on Vectors and Matrices A.2 Linear Algebra Operations over Zn Appendix B. Measures of Secrecy and Security B.1 Conditional Probability B.2 Perfect Secrecy B.3 Information and Entropy B.4 Entropy and Secrecy B.5 Min-Entropy Appendix C. Data Encryption Standard Appendix D. Simplified AES D.1 Overview D.2 S-AES Encryption and Decryption D.3 Key Expansion D.4 The S-Box D.5 S-AES Structure Annex D.1 Arithmetic in GF(24) Annex D.2 The Mix Column Function Appendix E. Mathematical Basis of the Birthday Attack E.1 Related Problem E.2 The Birthday Paradox E.3 Useful Inequality E.4 The General Case of Duplications E.5 Overlap Between Two Sets Glossary References Index A B C D E F G H I K L M N O P Q R S T U V W X Z Acronyms
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.