Features
Cryptography and Network Security offers the following features to facilitate learning:
- NEW! Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.
- NEW! A tremendous amount of original supporting material for students is available online, at two Web locations:
- The Companion Web site
- The Premium Content site
- NEW! Fundamental security design principles in Chapter 1 includes a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security.
- NEW! Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats.
- NEW! Email Security: Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. These discussions include:
- Email threats and a comprehensive approach to email security.
- How STARTTLS provides confidentiality and authentication for SMTP.
- DNSSEC and its role in supporting email security.
- DNS-based Authentication of Named Entities (DANE) and the use of this approach to enhance security for certificate use in SMTP and S/MIME.
- Sender Policy Framework (SPF), the standardized way for a sending domain to identify and assert the mail senders for a given domain.
- Domain-based Message Authentication, Reporting, and Conformance (DMARC), which allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent.
- Treatment of S/MIME reflects the latest version 3.2.
- DomainKeys Identified Mail (DKIM) is updated.
- NEW! The narrative throughout has been clarified and tightened while the illustrations are new and improved.
- UPDATED! Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject.
- UPDATED! Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses.
- Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each better.
- A unified, comprehensive treatment of mutual trust topics explore key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
- Approximately 300 problems reinforce material in the text and introduce new concepts and techniques at the end of each chapter.
- A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability. This gives the student a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.
- UPDATED! Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards.
- Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level.
- UPDATED! A comprehensive and unified discussion of the threats of intruders (hackers) and viruses looks at the distinctions and similarities of the two. Students gain a greater understanding of both topics by exploring the both in the same chapter.
- UPDATED! The material on number theory is consolidated into a single chapter, Chapter 2. This makes for a convenient reference and relevant portions of it can be assigned as needed.
- UPDATED! The chapter on finite fields is updated and expanded with additional text and new figures to enhance understanding.
- UPDATED! The relatively new format-preserving encryption mode of encryption is covered in a new section in Chapter 7. The format is seeing increasing commercial success, which is covered thoroughly in the section.
- Conditioning and health testing for true random number generators provides coverage of these important topics in Chapter 8.
- UPDATED! The user authentication model in Chapter 15 includes a new description of a general model for user authentication, which helps to unify the discussion of the various approaches.
- UPDATED! The material on cloud security in Chapter 16 is updated and expanded in the new edition to reflect its importance and recent developments.
- UPDATED! The treatment of Transport Layer Security (TLS) in Chapter 17 is updated and reorganized to improve clarity. It now includes a discussion of the new TLS version 1.3.
The Seventh Edition offers a tremendous amount of original supporting material for students online at two Web locations:
- The Companion Web site, at WilliamStallings.com/Cryptography (click on Student Resources link), includes a list of relevant links organized by chapter and an errata sheet for the book.
- The purchase of this textbook also grants access to the Premium Content site for six months. It includes the following materials:
- Online chapters: To limit the size and cost of the book, four chapters of the book are provided in PDF format. This includes three chapters on computer and one on legal and ethical issues. The chapters are listed in this book’s table of contents.
- Online appendices: There are numerous interesting topics that support material found in the text but whose inclusion is not warranted in the printed text. A total of 20 online appendices cover these topics for the interested student. The appendices are listed in this book’s table of contents.
- Homework problems and solutions: To aid the student in understanding the material, a separate set of homework problems with solutions are available.
- Key papers: A number of papers from the professional literature, many hard to find, are provided for further reading.
- Supporting documents: A variety of other useful documents are referenced in the text and provided online.
- Sage code: The Sage code from the examples in Appendix B is useful in case the student wants to play around with the examples.
The text is accompanied by the following supplementary material to aid instruction:
- Solutions manual: Solutions to all end-of-chapter Review Questions and Problems.
- Projects manual: Suggested project assignments for all of the project categories listed below.
- PowerPoint slides: A set of slides covering all chapters, suitable for use in lecturing.
- PDF files: Reproductions of all figures and tables from the book.
- Test bank: A chapter-by-chapter set of questions with a separate file of answers.
- Sample syllabuses: The text contains more material than can be conveniently covered in one semester. Accordingly, instructors are provided with several sample syllabuses that guide the use of the text within limited time. These samples are based on real-world experience by professors with the fifth edition.
- Copyright 2017
- Dimensions: 7" x 9-1/8"
- Pages: 768
- Edition: 7th
-
Book
- ISBN-10: 0-13-444428-0
- ISBN-13: 978-0-13-444428-4
The Principles and Practice of Cryptography and Network Security
Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.
The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience.
Table of Contents
1. Computer and Network Security Concepts
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Key Management and Distribution
15. User Authentication Protocols
16. Network Access Control and Cloud Security
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
Appendix A Projects for Teaching Cryptography and Network Security
Appendix B Sage Examples