Cryptography and Network Security
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.
Chapter 0 - Reader's Guide
Chapter 1 - Overview
PART ONE SYMMETRIC CIPHERS
Chapter 2 - Classical Encryption Techniques
Chapter 3 - Block Ciphers and the Data Encryption Standard
Chapter 4 - Basic Concepts in Number Theory and Finite Fields
Chapter 5 - Advanced Encryption Standard
Chapter 6 - Block Cipher Operation
Chapter 7 - Pseudorandom Number Generation and Stream Ciphers
PART TWO ASYMMETRIC CIPHERS
Chapter 8 - More Number Theory
Chapter 9 - Public-Key Cryptography and RSA
Chapter 10 - Other Public-Key Cryptosystems
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 - Cryptographic Hash Functions
Chapter 12 - Message Authentication Codes
Chapter 13 - Digital Signatures
PART FOUR MUTUAL TRUST
Chapter 14 - Key Management and Distribution
Chapter 15 - User Authentication Protocols
PART FIVE NETWORK AND INTERNET SECURITY
Chapter 16 - Transport-Level Security
Chapter 17 - Wireless Network Security
Chapter 18 - Electronic Mail Security
Chapter 19 - IP Security
APPENDICES
Appendix A - Projects for Teaching Cryptography and Network Security
Appendix B - Sage Examples
Appendix C - Sage Problems
ONLINE CHAPTERS
PART SIX SYSTEM SECURITY
Chapter 20 - Intruders
Chapter 21 - Malicious Software
Chapter 22 - Firewalls
PART SEVEN LEGAL AND ETHICAL ISSUES
Chapter 23 - Legal and Ethical Issues
ONLINE APPENDICES
APPENDIX D - Standards and Standards-Setting Organizations
APPENDIX E - Basic Concepts from Linear Algebra
APPENDIX F - Measures of Security and Secrecy
APPENDIX G - Simplified DES
APPENDIX H - Evaluation Criteria for AES
APPENDIX I - More on Simplified AES
APPENDIX J - Knapsack Public-Key Algorithm
APPENDIX K - Proof of the Digital Signature Algorithm
APPENDIX L - TCP/IP and OSI
APPENDIX M - Java Cryptographic APIs
APPENDIX N - The Whirlpool Hash Function
APPENDIX O - Data Compression Using ZIP
APPENDIX P - PGP Random Number Generation
GLOSSARY
REFERENCES
INDEX