Internet Security: Cryptographic Principles, Algorithms and Protocols / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $7.99
Usually ships in 1-2 business days
(Save 93%)
Other sellers (Hardcover)
  • All (5) from $7.99   
  • New (2) from $125.00   
  • Used (3) from $7.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$125.00
Seller since 2010

Feedback rating:

(53)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
"New, ships through UPS and DHL. Excellent customer service. Satisfaction guaranteed!! "

Ships from: STERLING HEIGHTS, MI

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$152.01
Seller since 2014

Feedback rating:

(0)

Condition: New
Hardcover New in new dust jacket. Brand New US edition, 3-5 days shipping!

Ships from: foxboro, MA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. This book takes a long-term view. It is not a 'how-to' implementation guide for today's practitioners. It is a training text for the engineers of the future. As well as providing an in-depth introduction to relevant cryptographic principles, algorithms and protocols, Internet Security links them to the technologies in use on the Internet today. State-of-the-art analyses of IETF standards plus summaries and explanations of RFC documents, numerous examples and a list of frequently used acronyms make this book a comprehensive and valuable reference for students, researchers and professional engineers alike -- anyone engaged in the long-term development of secure systems.
Read More Show Less

Product Details

  • ISBN-13: 9780470852859
  • Publisher: Wiley
  • Publication date: 4/11/2003
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 424
  • Product dimensions: 6.95 (w) x 9.76 (h) x 1.23 (d)

Table of Contents

Author biography xi
Preface xiii
1 Internetworking and Layered Models 1
1.1 Networking Technology 2
1.1.1 Local Area Networks (LANs) 2
1.1.2 Wide Area Networks (WANs) 3
1.2 Connecting Devices 5
1.2.1 Switches 5
1.2.2 Repeaters 6
1.2.3 Bridges 6
1.2.4 Routers 7
1.2.5 Gateways 8
1.3 The OSI Model 8
1.4 TCP/IP Model 12
1.4.1 Network Access Layer 13
1.4.2 Internet Layer 13
1.4.3 Transport Layer 13
1.4.4 Application Layer 13
2 TCP/IP Suite and Internet Stack Protocols 15
2.1 Network Layer Protocols 15
2.1.1 Internet Protocol (IP) 15
2.1.2 Address Resolution Protocol (ARP) 28
2.1.3 Reverse Address Resolution Protocol (RARP) 31
2.1.4 Classless Interdomain Routing (CIDR) 32
2.1.5 IP Version 6 (IPv6, or IPng) 33
2.1.6 Internet Control Message Protocol (ICMP) 41
2.1.7 Internet Group Management Protocol (IGMP) 41
2.2 Transport Layer Protocols 42
2.2.1 Transmission Control Protocol (TCP) 42
2.2.2 User Datagram Protocol (UDP) 45
2.3 World Wide Web 47
2.3.1 Hypertext Transfer Protocol (HTTP) 48
2.3.2 Hypertext Markup Language (HTML) 48
2.3.3 Common Gateway Interface (CGI) 49
2.3.4 Java 49
2.4 File Transfer 50
2.4.1 File Transfer Protocol (FTP) 50
2.4.2 Trivial File Transfer Protocol (TFTP) 50
2.4.3 Network File System (NFS) 50
2.5 Electronic Mail 51
2.5.1 Simple Mail Transfer Protocol (SMTP) 51
2.5.2 Post Office Protocol Version 3 (POP3) 52
2.5.3 Internet Message Access Protocol (IMAP) 52
2.5.4 Multipurpose Internet Mail Extension (MIME) 52
2.6 Network Management Service 53
2.6.1 Simple Network Management Protocol (SNMP) 53
2.7 Converting IP Addresses 54
2.7.1 Domain Name System (DNS) 54
2.8 Routing Protocols 54
2.8.1 Routing Information Protocol (RIP) 54
2.8.2 Open Shortest Path First (OSPF) 55
2.8.3 Border Gateway Protocol (BGP) 55
2.9 Remote System Programs 56
2.9.1 TELNET 56
2.9.2 Remote Login (Rlogin) 56
3 Symmetric Block Ciphers 57
3.1 Data Encryption Standard (DES) 57
3.1.1 Description of the Algorithm 58
3.1.2 Key Schedule 60
3.1.3 DES Encryption 62
3.1.4 DES Decryption 67
3.1.5 Triple DES 71
3.1.6 DES-CBC Cipher Algorithm with IV 73
3.2 International Data Encryption Algorithm (IDEA) 75
3.2.1 Subkey Generation and Assignment 76
3.2.2 IDEA Encryption 77
3.2.3 IDEA Decryption 82
3.3 RC5 Algorithm 84
3.3.1 Description of RC5 85
3.3.2 Key Expansion 86
3.3.3 Encryption 91
3.3.4 Decryption 92
3.4 RC6 Algorithm 95
3.4.1 Description of RC6 95
3.4.2 Key Schedule 96
3.4.3 Encryption 97
3.4.4 Decryption 100
3.5 AES (Rijndael) Algorithm 107
3.5.1 Notational Conventions 107
3.5.2 Mathematical Operations 108
3.5.3 AES Algorithm Specification 111
4 Hash Function, Message Digest and Message Authentication Code 123
4.1 DMDC Algorithm 123
4.1.1 Key Schedule 124
4.1.2 Computation of Message Digests 128
4.2 Advanced DMDC Algorithm 133
4.2.1 Key Schedule 133
4.2.2 Computation of Message Digests 136
4.3 MD5 Message-digest Algorithm 138
4.3.1 Append Padding Bits 138
4.3.2 Append Length 138
4.3.3 Initialise MD Buffer 138
4.3.4 Define Four Auxiliary Functions (F, G, H, I) 139
4.3.5 FF, GG, HH and II Transformations for Rounds 1, 2, 3 and 4 139
4.3.6 Computation of Four Rounds (64 Steps) 140
4.4 Secure Hash Algorithm (SHA-1) 149
4.4.1 Message Padding 149
4.4.2 Initialise 160-Bit Buffer 150
4.4.3 Functions Used 150
4.4.4 Constants Used 150
4.4.5 Computing the Message Digest 151
4.5 Hashed Message Authentication Codes (HMAC) 155
5 Asymmetric Public-key Cryptosystems 161
5.1 Diffie--Hellman Exponential Key Exchange 161
5.2 RSA Public-key Cryptosystem 165
5.2.1 RSA Encryption Algorithm 165
5.2.2 RSA Signature Scheme 170
5.3 ElGamals Public-key Cryptosystem 172
5.3.1 ElGamal Encryption 173
5.3.2 ElGamal Signatures 175
5.3.3 ElGamal Authentication Scheme 177
5.4 Schnorr's Public-key Cryptosystem 179
5.4.1 Schnorr's Authentication Algorithm 179
5.4.2 Schnorr's Signature Algorithm 181
5.5 Digital Signature Algorithm 184
5.6 The Elliptic Curve Cryptosystem (ECC) 187
5.6.1 Elliptic Curves 187
5.6.2 Elliptic Curve Cryptosystem Applied to the ElGamal Algorithm 195
5.6.3 Elliptic Curve Digital Signature Algorithm 196
5.6.4 ECDSA Signature Computation 198
6 Public-key Infrastructure 201
6.1 Internet Publications for Standards 202
6.2 Digital Signing Techniques 203
6.3 Functional Roles of PKI Entities 210
6.3.1 Policy Approval Authority 210
6.3.2 Policy Certification Authority 212
6.3.3 Certification Authority 213
6.3.4 Organisational Registration Authority 214
6.4 Key Elements for PKI Operations 215
6.4.1 Hierarchical Tree Structures 216
6.4.2 Policy-making Authority 217
6.4.3 Cross-certification 218
6.4.4 X.500 Distinguished Naming 221
6.4.5 Secure Key Generation and Distribution 222
6.5 X.509 Certificate Formats 222
6.5.1 X.509 v1 Certificate Format 223
6.5.2 X.509 v2 Certificate Format 225
6.5.3 X.509 v3 Certificate Format 226
6.6 Certificate Revocation List 233
6.6.1 CRL Fields 234
6.6.2 CRL Extensions 235
6.6.3 CRL Entry Extensions 237
6.7 Certification Path Validation 238
6.7.1 Basic Path Validation 239
6.7.2 Extending Path Validation 240
7 Network Layer Security 243
7.1 IPsec Protocol 243
7.1.1 IPsec Protocol Documents 244
7.1.2 Security Associations (SAs) 246
7.1.3 Hashed Message Authentication Code (HMAC) 248
7.2 IP Authentication Header 250
7.2.1 AH Format 251
7.2.2 AH Location 253
7.3 IP ESP 253
7.3.1 ESP Packet Format 254
7.3.2 ESP Header Location 256
7.3.3 Encryption and Authentication Algorithms 258
7.4 Key Management Protocol for IPsec 260
7.4.1 OAKLEY Key Determination Protocol 260
7.4.2 ISAKMP 261
8 Transport Layer Security: SSLv3 and TLSv1 277
8.1 SSL Protocol 277
8.1.1 Session and Connection States 278
8.1.2 SSL Record Protocol 279
8.1.3 SSL Change Cipher Spec Protocol 282
8.1.4 SSL Alert Protocol 283
8.1.5 SSL Handshake Protocol 284
8.2 Cryptographic Computations 290
8.2.1 Computing the Master Secret 290
8.2.2 Converting the Master Secret into Cryptographic Parameters 291
8.3 TLS Protocol 293
8.3.1 HMAC Algorithm 293
8.3.2 Pseudo-random Function 296
8.3.3 Error Alerts 300
8.3.4 Certificate Verify Message 302
8.3.5 Finished Message 302
8.3.6 Cryptographic Computations (For TLS) 302
9 Electronic Mail Security: PGP, S/MIME 305
9.1 PGP 305
9.1.1 Confidentiality via Encryption 306
9.1.2 Authentication via Digital Signature 307
9.1.3 Compression 308
9.1.4 Radix-64 Conversion 309
9.1.5 Packet Headers 313
9.1.6 PGP Packet Structure 315
9.1.7 Key Material Packet 319
9.1.8 Algorithms for PGP 5.x 323
9.2 S/MIME 324
9.2.1 MIME 325
9.2.2 S/MIME 331
9.2.3 Enhanced Security Services for S/MIME 335
10 Internet Firewalls for Trusted Systems 339
10.1 Role of Firewalls 339
10.2 Firewall-Related Terminology 340
10.2.1 Bastion Host 341
10.2.2 Proxy Server 341
10.2.3 SOCKS 342
10.2.4 Choke Point 343
10.2.5 De-militarised Zone (DMZ) 343
10.2.6 Logging and Alarms 343
10.2.7 VPN 344
10.3 Types of Firewalls 344
10.3.1 Packet Filters 344
10.3.2 Circuit-level Gateways 349
10.3.3 Application-level Gateways 349
10.4 Firewall Designs 350
10.4.1 Screened Host Firewall (Single-homed Bastion Host) 351
10.4.2 Screened Host Firewall (Dual-homed Bastion Host) 351
10.4.3 Screened Subnet Firewall 352
11 SET for E-commerce Transactions 355
11.1 Business Requirements for SET 355
11.2 SET System Participants 357
11.3 Cryptographic Operation Principles 358
11.4 Dual Signature and Signature Verification 359
11.5 Authentication and Message Integrity 363
11.6 Payment Processing 366
11.6.1 Cardholder Registration 366
11.6.2 Merchant Registration 371
11.6.3 Purchase Request 373
11.6.4 Payment Authorisation 374
11.6.5 Payment Capture 376
Acronyms 379
Bibliography 383
Index 391
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)