Cryptography and Network Security: Principles and Practice / Edition 6

Cryptography and Network Security: Principles and Practice / Edition 6

5.0 1
by William Stallings
     
 

ISBN-10: 0133354695

ISBN-13: 9780133354690

Pub. Date: 03/20/2013

Publisher: Pearson

Fully updated to reflect the latest trends and technologies, this is the definitive guide to encryption and network security principles, techniques, and effective usage. Renowned author and consultant William Stallings systematically explains encryption concepts and standards; ciphers; symmetric and public key encryption; digital signatures; and much more. Next,…  See more details below

Overview

Fully updated to reflect the latest trends and technologies, this is the definitive guide to encryption and network security principles, techniques, and effective usage. Renowned author and consultant William Stallings systematically explains encryption concepts and standards; ciphers; symmetric and public key encryption; digital signatures; and much more. Next, Stallings turns to the practice of network security, introducing state-of-the-art applications for authentication, and for email, IP, and Web security. Finally, Stallings reviews the challenges of system security, covering leading attacks and today's best countermeasures. As always, Stallings provides unsurpassed support, including extensive supplements and online resources. For students, instructors, and working professionals alike, this Fourth Edition remains the field's best resource.

Product Details

ISBN-13:
9780133354690
Publisher:
Pearson
Publication date:
03/20/2013
Edition description:
Older Edition
Pages:
752
Sales rank:
204,945
Product dimensions:
7.20(w) x 9.20(h) x 1.20(d)

Table of Contents

Notationxi
Prefacexiii
Chapter 0Reader's Guide1
0.1Outline of This Book2
0.2Roadmap2
0.3Internet and Web Resources4
Chapter 1Introduction6
1.1Security Trends9
1.2The OSI Security Architecture12
1.3Security Attacks13
1.4Security Services16
1.5Security Mechanisms19
1.6A Model for Network Security22
1.7Recommended Reading and Web Sites24
1.8Key Terms, Review Questions, and Problems25
Part 1Symmetric Ciphers26
Chapter 2Classical Encryption Techniques28
2.1Symmetric Cipher Model30
2.2Substitution Techniques35
2.3Transposition Techniques49
2.4Rotor Machines51
2.5Steganography53
2.6Recommended Reading and Web Sites55
2.7Key Terms, Review Questions, and Problems56
Chapter 3Block Ciphers and the Data Encryption Standard62
3.1Block Cipher Principles64
3.2The Data Encryption Standard72
3.3The Strength of DES82
3.4Differential and Linear Cryptanalysis83
3.5Block Cipher Design Principles86
3.6Recommended Reading90
3.7Key Terms, Review Questions, and Problems90
Chapter 4Finite Fields95
4.1Groups, Rings, and Fields97
4.2Modular Arithmetic101
4.3The Euclidean Algorithm107
4.4Finite Fields of the Form GF(p)109
4.5Polynomial Arithmetic113
4.6Finite Fields of the Form GF(2")119
4.7Recommended Reading and Web Sites129
4.8Key Terms, Review Questions, and Problems130
Chapter 5Advanced Encryption Standard134
5.1Evaluation Criteria for AES135
5.2The AES Cipher140
5.3Recommended Reading and Web Sites160
5.4Key Terms, Review Questions, and Problems161
Appendix 5APolynomials with Coefficients in GF(2[superscript 8])163
Appendix 5BSimplified AES165
Chapter 6More on Symmetric Ciphers174
6.1Multiple Encryption and Triple DES175
6.2Block Cipher Modes of Operation181
6.3Stream Ciphers and RC4189
6.4Recommended Reading and Web Site194
6.5Key Terms, Review Questions, and Problems194
Chapter 7Confidentiality Using Symmetric Encryption199
7.1Placement of Encryption Function201
7.2Traffic Confidentiality209
7.3Key Distribution210
7.4Random Number Generation218
7.5Recommended Reading and Web Sites227
7.6Key Terms, Review Questions, and Problems228
Part 2Public-Key Encryption and Hash Functions232
Chapter 8Introduction to Number Theory234
8.1Prime Numbers236
8.2Fermat's and Euler's Theorems238
8.3Testing for Primality242
8.4The Chinese Remainder Theorem245
8.5Discrete Logarithms247
8.6Recommended Reading and Web Site253
8.7Key Terms, Review Questions, and Problems254
Chapter 9Public-Key Cryptography and RSA257
9.1Principles of Public-Key Cryptosystems259
9.2The RSA Algorithm268
9.3Recommended Reading and Web Site280
9.4Key Terms, Review Questions, and Problems281
Appendix 9AProof of the RSA Algorithm285
Appendix 9BThe Complexity of Algorithms286
Chapter 10Key Management; Other Public-Key Cryptosystems289
10.1Key Management290
10.2Diffie-Hellman Key Exchange298
10.3Elliptic Curve Arithmetic301
10.4Elliptic Curve Cryptography310
10.5Recommended Reading and Web Site313
10.6Key Terms, Review Questions, and Problems314
Chapter 11Message Authentication and Hash Functions317
11.1Authentication Requirements319
11.2Authentication Functions320
11.3Message Authentication Codes331
11.4Hash Functions334
11.5Security of Hash Functions and MACs340
11.6Recommended Reading344
11.7Key Terms, Review Questions, and Problems344
Appendix 11AMathematical Basis of the Birthday Attack346
Chapter 12Hash and MAC Algorithms351
12.1Secure Hash Algorithm353
12.2Whirlpool358
12.3HMAC368
12.4CMAC372
12.5Recommended Reading and Web Sites374
12.6Key Terms, Review Questions, and Problems375
Chapter 13Digital Signatures and Authentication Protocols377
13.1Digital Signatures378
13.2Authentication Protocols382
13.3Digital Signature Standard390
13.4Recommended Reading and Web Sites393
13.5Key Terms, Review Questions, and Problems393
Part 3Network Security Applications398
Chapter 14Authentication Applications400
14.1Kerberos401
14.2X.509 Authentication Service419
14.3Public-Key Infrastructure428
14.4Recommended Reading and Web Sites430
14.5Key Terms, Review Questions, and Problems431
Appendix 14AKerberos Encryption Techniques433
Chapter 15Electronic Mail Security436
15.1Pretty Good Privacy438
15.2S/MIME457
15.3Recommended Web Sites474
15.4Key Terms, Review Questions, and Problems474
Appendix 15AData Compression Using ZIP475
Appendix 15BRadix-64 Conversion478
Appendix 15CPGP Random Number Generation479
Chapter 16IP Security483
16.1IP Security Overview485
16.2IP Security Architecture487
16.3Authentication Header493
16.4Encapsulating Security Payload498
16.5Combining Security Associations503
16.6Key Management506
16.7Recommended Reading and Web Site516
16.8Key Terms, Review Questions, and Problems517
Appendix 16AInternetworking and Internet Protocols518
Chapter 17Web Security527
17.1Web Security Considerations528
17.2Secure Socket Layer and Transport Layer Security531
17.3Secure Electronic Transaction549
17.4Recommended Reading and Web Sites560
17.5Key Terms, Review Questions, and Problems561
Part 4System Security563
Chapter 18Intruders565
18.1Intruders567
18.2Intrusion Detection570
18.3Password Management582
18.4Recommended Reading and Web Sites591
18.5Key Terms, Review Questions, and Problems592
Appendix 18AThe Base-Rate Fallacy594
Chapter 19Malicious Software598
19.1Viruses and Related Threats599
19.2Virus Countermeasures610
19.3Distributed Denial of Service Attacks614
19.4Recommended Reading and Web Sites619
19.5Key Terms, Review Questions, and Problems620
Chapter 20Firewalls621
20.1Firewall Design Principles622
20.2Trusted Systems634
20.3Common Criteria for Information Technology Security Evaluation640
20.3Recommended Reading and Web Sites644
20.4Key Terms, Review Questions, and Problems645
Appendices647
Appendix AStandards and Standards-Setting Organizations647
A.1The Importance of Standards648
A.2Internet Standards and the Internet Society649
A.3National Institute of Standards and Technology652
Appendix BProjects for Teaching Cryptography and Network Security653
B.1Research Projects654
B.2Programming Projects655
B.3Laboratory Exercises655
B.4Writing Assignments655
B.5Reading/Report Assignments656
Glossary657
References663
Index673

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Cryptography and Network Security: Principles and Practice 5 out of 5 based on 0 ratings. 1 reviews.
Anonymous More than 1 year ago
This is an excellent book that provides both a basic tutorial of cryptography and network security principles as well as a very detailed reference. The book is readable at multiple levels with figures and tables that provide a visual explanation of how the cryptography takes place. If you just want to get a basic understanding of cyphers and algorithms, it is an easy read through the chapters (skipping the heavy details) to obtain that base level of knowledge. When you want to dive in deeper, the information is present to truly understand each of the cyphers and algorithms. This is definitely a book that can be used as a simple tutorial or a classroom text – and then kept long term as a much more detailed reference.