Home > Store

Cryptography and Network Security, 4th Edition

Register your product to gain access to bonus material or receive a coupon.

Cryptography and Network Security, 4th Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

Consistent chapter pedagogy – Each chapter includes homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites.

Detailed, chapter-by-chapter summary of each part – Appears at the beginning of that part.

• Abundant homework and class-work assignment material:

– Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report

Programming Projects: A series of programming projects that cover a broad range of topics and that can be implemented in any suitable language on any platform

Lab exercises: A series of projects that involve programming and experimenting with concepts from the book.

Writing assignments: A set of suggested writing assignments, by chapter.

Reading/Report Assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to read and then write a short report.

• An extensive glossary, a list of frequently used acronyms, and a bibliography.

• Full spectrum of instructor resources – Includes solutions to all the homework problems and review questions in the book; list of suggested research projects; list of programming projects; list of suggested reading assignments; list of suggested writing assignments; and a set of lab assignments.

• Companion Website -- Access textbook-related resources and support materials for students and instructors maintained by the author.

Includes:

– Links to important sites, organized by chapter so that the student can visit sites related to the material currently being studied to get up-to-date and supplementary information

– A number of online Appendices

– Links to course pages by professors teaching from the book. This can give other instructors useful ideas

– Transparency masters of figures and tables from the book in PDF (Adobe Acrobat) format

– A set of PowerPoint slides for use in lecturing

– A set of course notes in PDF that can be used as a   handout.

– An errata sheet for the book, updated monthly as needed.

• Student Resource Site -- Access a wealth of computer science-related information including mathematics reviews, how-to documents, research resources, and career explorations maintained by the author.

Description

  • Copyright 2006
  • Edition: 4th
  • Book
  • ISBN-10: 0-13-187316-4
  • ISBN-13: 978-0-13-187316-2

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. KEY TOPICS: Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. MARKET: A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Sample Content

Table of Contents

NOTATION

PREFACE

CHAPTER 0     READER'S GUIDE

CHAPTER 1     OVERVIEW

PART ONE  SYMMETRIC CIPHERS

CHAPTER 2     CLASSICAL ENCRYPTION TECHNIQUES

CHAPTER 3     BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD

    

CHAPTER 4     INTRODUCTION TO FINITE FIELDS

    

CHAPTER 5     ADVANCED ENCRYPTION STANDARD

CHAPTER 6     MORE ON SYMMETRIC CIPHERS

    

CHAPTER 7      CONFIDENTIALITY USING SYMMETRIC ENCRYPTION

PART TWO  PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS

CHAPTER 8     INTRODUCTION TO NUMBER THEORY

    

CHAPTER 9      PUBLIC-KEY CRYPTOGRAPHY AND RSA

    

CHAPTER 10   KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS

CHAPTER 11        MESSAGE AUTHENTICATION AND HASH FUNCTIONS

     1

CHAPTER 12        HASH AND MAC ALGORITHMS

    

CHAPTER 13        DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS

    

    

PART THREE  NETWORK SECURITY PRACTICE

CHAPTER 14        AUTHENTICATION APPLICATIONS

    

CHAPTER 15        ELECTRONIC MAIL SECURITY

CHAPTER 16        IP SECURITY

CHAPTER 17        WEB SECURITY

PART FOUR  SYSTEM SECURITY

CHAPTER 18        INTRUDERS

    

CHAPTER 19        MALICIOUS SOFTWARE

    

CHAPTER 20        FIREWALLS

    

APPENDICES

APPENDIX A   STANDARDS AND STANDARD-SETTING ORGANIZATIONS

APPENDIX B         PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY

ONLINE APPENDICES

APPENDIX C         SIMPLIFIED DES

    

APPENDIX D         THE MEANING OF mod

    

APPENDIX E         MORE ON SIMPLIFIED AES

    

APPENDIX F         KNAPSACK PUBLIC-KEY ALGORITHM

    

APPENDIX G     PROOF OF THE DIGITAL SIGNATURE ALGORITHM

GLOSSARY

REFERENCES

INDEX

LIST OF ACRONYMS

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.