Image from Google Jackets

Cryptography and network security : principles and practice

By: Publication details: Pearson Education 2003 New DelhiEdition: Ed.3Description: xiv,681pISBN:
  • 9788178089027
Subject(s):
DDC classification:
  • 005.8 STA
Contents:
CONTENTS CHAPTER 1 OVERVIEW 1 1.1 Services, Mechanisms, and Attacks 4 1.2 The OSI Security Architecture 7 1.3 A Model for Network Security 14 1.4 Outline of This Book 17 1.5 Recommended Reading 17 1.6 Internet and Web Resources 18 PART ONE SYMMETRIC CIPHERS 21 CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES 23 2.1 Symmetric Cipher Model 24 2.2 Substitution Techniques 30 2.3 Transposition Techniques 44 2.4 Rotor Machines 46 2.5 Steganography 47 2.6 Recommended Reading and Web Sites 49 2.7 Key Terms, Review Questions, and Problems 50 CHAPTER 3 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD 55 3.1 Simplified DES 56 3.2 Block Cipher Principles 63 3.3 The Data Encryption Standard 72 3.4 The Strength of DES 82 3.5 Differential and Linear Cryptanalysis 83 3.6 Block Cipher Design Principles 86 3.7 Block Cipher Modes of Operation 90 3.8 Recommended Reading 98 . 3.9 Key Terms, Review Questions, and Problems 99 CHAPTER 4 INTRODUCTION TO FINITE FIELDS 103 4.1 Groups, Rings, and Fields 104 4.2 Modular Arithmetic 107 4.3 Euclid's Algorithm 115 4.4 Finite Fields of the Form GF(p) 117 4.5 Polynomial Arithmetic 121 4.6 Finite Fields of the Form GF(2") 126 4.7 Recommended Reading and Web Sites 134 4.8 Key Terms, Review Questions, and Problems 134 CHAPTER 5 ADVANCED ENCRYPTION STANDARD 139 5.1 Evaluation Criteria for AES 140 5.2 The AES Cipher 143 5.3 Recommended Reading and Web Sites 167 5.4 Key Terms, Review Questions, and Problems 167 Appendix 5A Polynomials with Coefficients in GF(28) 169 CHAPTER 6 CONTEMPORARY SYMMETRIC CIPHERS 173 6.1 Triple DES 174 6.2 Blowfish 179 6.3 RC5 185 6.4 Characteristics of Advanced Symmetric Block Ciphers 6.5 RC4 Stream Ciper 192 6.6 Recommended Reading and Web Sites 197 6.7 Key Terms, Review Questions, and Problems 197 CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION 201 7.1 Placement of Encryption Function 202 7.2 Traffic Confidentiality 210 7.3 Key Distribution 211 7.4 Random Number Generation 220 7.5 Recommended Reading and Web Site 227 7.6 Key Terms, Review Questions, and Problems 228 PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 233 CHAPTER 8 INTRODUCTION TO NUMBER THEORY 235 8.1 Prime Numbers 236 8.2 Fermat's and Euler's Theorems 239 8.3 Testing for Primality 243 8.4 The Chinese Remainder Theorem 245 8.5 Discrete Logarithms 248 8.6 Recommended Reading and Web Site 252 8.7 Key Terms, Review Questions, and Problems 253 CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA 257 9.1 Principles of Public-Key Cryptosystems 259 9.2 The RSA Algorithm 268 9.3 Recommended Reading and Web Site 278 9.4 Key Terms, Review Questions, and Problems 279 Appendix 9A The Complexity of Algorithms 282 CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS 285 10.1 Key Management 286 10.2 Diffie-Hellman Key Exchange 293 10.3 Elliptic Curve Arithmetic 297 10.4 Elliptic Curve Cryptography 304 10.5 Recommended Reading and Web Site 308 10.6 Key Terms, Review Questions, and Problems 308 CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS 311 11.1 Authentication Requirements 312 11.2 Authentication Functions 313 11.3 Message Authentication Codes 324 11.4 Hash Functions 328 11.5 Security of Hash Functions and MACs 335 11.6 Recommended Reading 338 11.7 Key Terms, Review Questions, and Problems 339 Appendix 11A Mathematical Basis of the Birthday Attack 340 CHAPTER 12 HASH ALGORITHMS 347 12.1 MD5 Message Digest Algorithm 348 12.2 Secure Hash Algorithm 357 12.3 RIPEMD-160 365 12.4 HMAC 372 12.5 Recommended Reading and Web Sites 377 12.6 Key Terms, Review Questions, and Problems 377 CHAPTER 13 DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS 379 13.1 Digital Signatures 380 13.2 Authentication Protocols 384 13.3 Digital Signature Standard 392 13.4 Recommended Reading 395 13.5 Key Terms, Review Questions, and Problems 395 PART THREE NETWORK SECURITY PRACTICE 399 CHAPTER 14 AUTHENTICATION APPLICATIONS 401 14.1 Kerberos 402 14.2 X.509 Authentication Service 419 14.3 Recommended Reading and Web Sites 428 14.4 Key Terms, Review Questions, and Problems 429 Appendix 14A Kerberos Encryption Techniques 431 CHAPTER 15 ELECTRONIC MAIL SECURITY 435 15.1 Pretty Good Privacy 436 15.2 S/MIME 455 15.3 Recommended Web Sites 472 15.4 Key Terms, Review Questions, and Problems 472 Appendix 15A Data Compression Using ZIP 473 Appendix 15B Radix-64 Conversion 476 Appendix 15C PGP Random Number Generation 478 CHAPTER 16 IP SECURITY 481 16.1 IP Security Overview 482 16.2 IP Security Architecture 485 16.3 Authentication Header 491 16.4 Encapsulating Security Payload 496 16.5 Combining Security Associations 501 16.6 Key Management 504 16.7 Recommended Reading and Web Sites 515 16.8 Key Terms, Review Questions, and Problems 516 Appendix 16A Internetworking and Internet Protocols 517 CHAPTER 17 WEB SECURITY 527 17.1 Web Security Considerations 528 17.2 Secure Sockets Layer and Transport Layer Security 531 17.3 Secure Electronic Transaction 548 17.4 Recommended Reading and Web Sites 560 17.5 Key Terms, Review Questions, and Problems 560 PART FOUR SYSTEM SECURITY 563 CHAPTER 18 INTRUDERS 565 18.1 Intruders 566 18.2 Intrusion Detection 569 18.3 Password Management 581 18.4 Recommended Reading and Web Sites 591 18.5 Key Terms, Review Questions, and Problems 592 Appendix 18A The Base-Rate Fallacy 594 CHAPTER 19 MALICIOUS SOFTWARE 597 19.1 Viruses and Related Threats 598 19.2 Virus Countermeasures 609 19.3 Recommended Reading and Web Site 613 19.4 Key Terms, Review Questions, and Problems 614 CHAPTER 20 FIREWALLS 615 20.1 Firewall Design Principles 616 20.2 Trusted Systems 628 20.3 Recommended Reading and Web Site 634 20.4 Key Terms, Review Questions, and Problems 634 APPENDICES APPENDIX A STANDARDS AND STANDARDS-SETTING ORGANIZATIONS 637 A.l The Importance of Standards 638 A.2 Standards and Regulation 639 A.3 Internet Standards and the Internet Society 640 A.4 National Institute of Standards and Technology 634 A.5 Standards and Specifications Cited in this Book 644 APPENDIX B PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY 647 B.l Research Projects 648 B.2 Programming Projects 649 B.3 Reading/Report Assignments 649 GLOSSARY 651 REFERENCES 657 INDEX 670
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book CEPT Library BK 005.8 STA Available 015755
Total holds: 0

CONTENTS
CHAPTER 1 OVERVIEW 1
1.1 Services, Mechanisms, and Attacks 4
1.2 The OSI Security Architecture 7
1.3 A Model for Network Security 14
1.4 Outline of This Book 17
1.5 Recommended Reading 17
1.6 Internet and Web Resources 18
PART ONE SYMMETRIC CIPHERS 21
CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES 23
2.1 Symmetric Cipher Model 24
2.2 Substitution Techniques 30
2.3 Transposition Techniques 44
2.4 Rotor Machines 46
2.5 Steganography 47
2.6 Recommended Reading and Web Sites 49
2.7 Key Terms, Review Questions, and Problems 50
CHAPTER 3 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD 55
3.1 Simplified DES 56
3.2 Block Cipher Principles 63
3.3 The Data Encryption Standard 72
3.4 The Strength of DES 82
3.5 Differential and Linear Cryptanalysis 83
3.6 Block Cipher Design Principles 86
3.7 Block Cipher Modes of Operation 90
3.8 Recommended Reading 98 .
3.9 Key Terms, Review Questions, and Problems 99
CHAPTER 4 INTRODUCTION TO FINITE FIELDS 103
4.1 Groups, Rings, and Fields 104
4.2 Modular Arithmetic 107
4.3 Euclid's Algorithm 115
4.4 Finite Fields of the Form GF(p) 117
4.5 Polynomial Arithmetic 121
4.6 Finite Fields of the Form GF(2") 126
4.7 Recommended Reading and Web Sites 134
4.8 Key Terms, Review Questions, and Problems 134
CHAPTER 5 ADVANCED ENCRYPTION STANDARD 139
5.1 Evaluation Criteria for AES 140
5.2 The AES Cipher 143
5.3 Recommended Reading and Web Sites 167
5.4 Key Terms, Review Questions, and Problems 167
Appendix 5A Polynomials with Coefficients in GF(28) 169
CHAPTER 6 CONTEMPORARY SYMMETRIC CIPHERS 173
6.1 Triple DES 174
6.2 Blowfish 179
6.3 RC5 185
6.4 Characteristics of Advanced Symmetric Block Ciphers
6.5 RC4 Stream Ciper 192
6.6 Recommended Reading and Web Sites 197
6.7 Key Terms, Review Questions, and Problems 197
CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION 201
7.1 Placement of Encryption Function 202
7.2 Traffic Confidentiality 210
7.3 Key Distribution 211
7.4 Random Number Generation 220
7.5 Recommended Reading and Web Site 227
7.6 Key Terms, Review Questions, and Problems 228
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 233
CHAPTER 8 INTRODUCTION TO NUMBER THEORY 235
8.1 Prime Numbers 236
8.2 Fermat's and Euler's Theorems 239
8.3 Testing for Primality 243
8.4 The Chinese Remainder Theorem 245
8.5 Discrete Logarithms 248
8.6 Recommended Reading and Web Site 252
8.7 Key Terms, Review Questions, and Problems 253
CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA 257
9.1 Principles of Public-Key Cryptosystems 259
9.2 The RSA Algorithm 268
9.3 Recommended Reading and Web Site 278
9.4 Key Terms, Review Questions, and Problems 279
Appendix 9A The Complexity of Algorithms 282
CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS 285
10.1 Key Management 286
10.2 Diffie-Hellman Key Exchange 293
10.3 Elliptic Curve Arithmetic 297
10.4 Elliptic Curve Cryptography 304
10.5 Recommended Reading and Web Site 308
10.6 Key Terms, Review Questions, and Problems 308
CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS 311
11.1 Authentication Requirements 312
11.2 Authentication Functions 313
11.3 Message Authentication Codes 324
11.4 Hash Functions 328
11.5 Security of Hash Functions and MACs 335
11.6 Recommended Reading 338
11.7 Key Terms, Review Questions, and Problems 339
Appendix 11A Mathematical Basis of the Birthday Attack 340
CHAPTER 12 HASH ALGORITHMS 347
12.1 MD5 Message Digest Algorithm 348
12.2 Secure Hash Algorithm 357
12.3 RIPEMD-160 365
12.4 HMAC 372
12.5 Recommended Reading and Web Sites 377
12.6 Key Terms, Review Questions, and Problems 377
CHAPTER 13 DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS 379
13.1 Digital Signatures 380
13.2 Authentication Protocols 384
13.3 Digital Signature Standard 392
13.4 Recommended Reading 395
13.5 Key Terms, Review Questions, and Problems 395
PART THREE NETWORK SECURITY PRACTICE 399
CHAPTER 14 AUTHENTICATION APPLICATIONS 401
14.1 Kerberos 402
14.2 X.509 Authentication Service 419
14.3 Recommended Reading and Web Sites 428
14.4 Key Terms, Review Questions, and Problems 429
Appendix 14A Kerberos Encryption Techniques 431
CHAPTER 15 ELECTRONIC MAIL SECURITY 435
15.1 Pretty Good Privacy 436
15.2 S/MIME 455
15.3 Recommended Web Sites 472
15.4 Key Terms, Review Questions, and Problems 472
Appendix 15A Data Compression Using ZIP 473
Appendix 15B Radix-64 Conversion 476
Appendix 15C PGP Random Number Generation 478
CHAPTER 16 IP SECURITY 481
16.1 IP Security Overview 482
16.2 IP Security Architecture 485
16.3 Authentication Header 491
16.4 Encapsulating Security Payload 496
16.5 Combining Security Associations 501
16.6 Key Management 504
16.7 Recommended Reading and Web Sites 515
16.8 Key Terms, Review Questions, and Problems 516
Appendix 16A Internetworking and Internet Protocols 517
CHAPTER 17 WEB SECURITY 527
17.1 Web Security Considerations 528
17.2 Secure Sockets Layer and Transport Layer Security 531
17.3 Secure Electronic Transaction 548
17.4 Recommended Reading and Web Sites 560
17.5 Key Terms, Review Questions, and Problems 560
PART FOUR SYSTEM SECURITY 563
CHAPTER 18 INTRUDERS 565
18.1 Intruders 566
18.2 Intrusion Detection 569
18.3 Password Management 581
18.4 Recommended Reading and Web Sites 591
18.5 Key Terms, Review Questions, and Problems 592
Appendix 18A The Base-Rate Fallacy 594
CHAPTER 19 MALICIOUS SOFTWARE 597
19.1 Viruses and Related Threats 598
19.2 Virus Countermeasures 609
19.3 Recommended Reading and Web Site 613
19.4 Key Terms, Review Questions, and Problems 614
CHAPTER 20 FIREWALLS 615
20.1 Firewall Design Principles 616
20.2 Trusted Systems 628
20.3 Recommended Reading and Web Site 634
20.4 Key Terms, Review Questions, and Problems 634
APPENDICES
APPENDIX A STANDARDS AND STANDARDS-SETTING ORGANIZATIONS 637
A.l The Importance of Standards 638
A.2 Standards and Regulation 639
A.3 Internet Standards and the Internet Society 640
A.4 National Institute of Standards and Technology 634
A.5 Standards and Specifications Cited in this Book 644
APPENDIX B PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY 647
B.l Research Projects 648
B.2 Programming Projects 649
B.3 Reading/Report Assignments 649
GLOSSARY 651
REFERENCES 657
INDEX 670


There are no comments on this title.

to post a comment.
Excel To HTML using codebeautify.org Sheet Name :- Location Chart
Location Chart Basement 1 (B1) Class No. 600 - 649, 660 - 699
(B1) :Mezzanine 1 Class No. 700 - 728
(B1) :Mezzanine 2 Class No. 728.1 - 799, 650 - 659, Reference Books, Faculty work
Basement 2 (B2) Class No. 000 - 599, 800-999
Basement 3 (B3) (Please Inquire at the Counter for resources) Theses, Students' works, Bound Journals, Drawings, Atlas, Oversize Books, Rare Books, IS codes, Non-book Materials