Register your product to gain access to bonus material or receive a coupon.
• Consistent chapter pedagogy – Each chapter includes homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites.
• Detailed, chapter-by-chapter summary of each part – Appears at the beginning of that part.
• Abundant homework and class-work assignment material:
– Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report
– Programming Projects: A series of programming projects that cover a broad range of topics and that can be implemented in any suitable language on any platform
– Lab exercises: A series of projects that involve programming and experimenting with concepts from the book.
– Writing assignments: A set of suggested writing assignments, by chapter.
– Reading/Report Assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to read and then write a short report.
• An extensive glossary, a list of frequently used acronyms, and a bibliography.
• Full spectrum of instructor resources – Includes solutions to all the homework problems and review questions in the book; list of suggested research projects; list of programming projects; list of suggested reading assignments; list of suggested writing assignments; and a set of lab assignments.
• Companion Website -- Access textbook-related resources and support materials for students and instructors maintained by the author.
Includes:
– Links to important sites, organized by chapter so that the student can visit sites related to the material currently being studied to get up-to-date and supplementary information
– A number of online Appendices
– Links to course pages by professors teaching from the book. This can give other instructors useful ideas
– Transparency masters of figures and tables from the book in PDF (Adobe Acrobat) format
– A set of PowerPoint slides for use in lecturing
– A set of course notes in PDF that can be used as a handout.
– An errata sheet for the book, updated monthly as needed.
• Student Resource Site -- Access a wealth of computer science-related information including mathematics reviews, how-to documents, research resources, and career explorations maintained by the author.
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. KEY TOPICS: Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. MARKET: A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
NOTATION
PREFACE
CHAPTER 0 READER'S GUIDE
CHAPTER 1 OVERVIEW
PART ONE SYMMETRIC CIPHERS
CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES
CHAPTER 3 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD
CHAPTER 4 INTRODUCTION TO FINITE FIELDS
CHAPTER 5 ADVANCED ENCRYPTION STANDARD
CHAPTER 6 MORE ON SYMMETRIC CIPHERS
CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS
CHAPTER 8 INTRODUCTION TO NUMBER THEORY
CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA
CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS
CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS
1
CHAPTER 12 HASH AND MAC ALGORITHMS
CHAPTER 13 DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS
PART THREE NETWORK SECURITY PRACTICE
CHAPTER 14 AUTHENTICATION APPLICATIONS
CHAPTER 15 ELECTRONIC MAIL SECURITY
CHAPTER 16 IP SECURITY
CHAPTER 17 WEB SECURITY
PART FOUR SYSTEM SECURITY
CHAPTER 18 INTRUDERS
CHAPTER 19 MALICIOUS SOFTWARE
CHAPTER 20 FIREWALLS
APPENDICES
APPENDIX A STANDARDS AND STANDARD-SETTING ORGANIZATIONS
APPENDIX B PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY
ONLINE APPENDICES
APPENDIX C SIMPLIFIED DES
APPENDIX D THE MEANING OF mod
APPENDIX E MORE ON SIMPLIFIED AES
APPENDIX F KNAPSACK PUBLIC-KEY ALGORITHM
APPENDIX G PROOF OF THE DIGITAL SIGNATURE ALGORITHM
GLOSSARY
REFERENCES
INDEX
LIST OF ACRONYMS