𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cryptography and Network Security: Principles and Practice

✍ Scribed by William Stallings


Publisher
Pearson
Year
2019
Tongue
English
Leaves
1750
Edition
Eighth
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Preface
Cover
Title
Copyright
Preface
Notation
Books by William Stallings
About the Author
Contents
Contents
1: Information and Network Security Concepts
Introduction: Information and Network Security Concepts
1.1: Cybersecurity, Information Security, and Network Security
1.2: The OSI Security Architecture
1.3: Security Attacks
1.4: Security Services
1.5: Security Mechanisms
1.6: Cryptography
1.7: Network Security
1.8: Trust and Trustworthiness
1.9: Standards
Chapter 1: Key Terms
Chapter 1: Review Questions
Chapter 1: Problems
2: Introduction to Number Theory
Introduction: Introduction to Number Theory
2.1: Divisibility and the Division Algorithm
2.2: The Euclidean Algorithm
2.3: Modular Arithmetic
2.4: Prime Numbers
2.5: Fermat's and Euler's Theorems
2.6: Testing for Primality
2.7: The Chinese Remainder Theorem
2.8: Discrete Logarithms
Chapter 2: Key Terms
Chapter 2: Review Questions
Chapter 2: Problems
Chapter 2: Programming Problems
Appendix 2A: The Meaning of Mod
3: Classical Encryption Techniques
Introduction: Classical Encryption Techniques
3.1: Symmetric Cipher Model
3.2: Substitution Techniques
3.3: Transposition Techniques
Chapter 3: Key Terms
Chapter 3: Review Questions
Chapter 3: Problems
Chapter 3: Programming Problems
4: Block Ciphers and the Data Encryption Standard
Introduction: Block Ciphers and the Data Encryption Standard
4.1: Traditional Block Cipher Structure
4.2: The Data Encryption Standard (DES)
4.3: A DES Example
4.4: The Strength of DES
4.5: Block Cipher Design Principles
Chapter 4: Key Terms
Chapter 4: Review Questions
Chapter 4: Programming Problems
Chapter 4: Problems
5: Finite Fields
Introduction: Finite Fields
5.1: Groups
5.2: Rings
5.3: Fields
5.4: Finite Fields of the Form GF(p)
5.5: Polynomial Arithmetic
5.6: Finite Fields of the Form GF2^n
Chapter 5: Key Terms
Chapter 5: Programming Problems
Chapter 5: Review Questions
Chapter 5: Problems
6: Advanced Encryption Standard
Introduction: Advanced Encryption Standard
6.1: Finite Field Arithmetic
6.2: AES Structure
6.3: AES Transformation Functions
6.4: AES Key Expansion
6.5: An AES Example
6.6: AES Implementation
Chapter 6: Programming Problems
Chapter 6: Key Terms
Chapter 6: Review Questions
Chapter 6: Problems
Appendix 6A: Polynomials with Coefficients in GF2_8
7: Block Cipher Operation
Introduction: Block Cipher Operation
7.1: Multiple Encryption and Triple DES
7.2: Electronic Codebook
7.3: Cipher Block Chaining Mode
7.4: Cipher Feedback Mode
7.5: Output Feedback Mode
7.6: Counter Mode
7.7: XTS-AES Mode for Block-Oriented Storage Devices
Chapter 7: Programming Problems
7.8: Format-Preserving Encryption
Chapter 7: Key Terms
Chapter 7: Review Questions
Chapter 7: Problems
8: Random Bit Generation and Stream Ciphers
Introduction: Random Bit Generation and Stream Ciphers
8.1: Principles of Pseudorandom Number Generation
8.2: Pseudorandom Number Generators
8.3: Pseudorandom Number Generation Using a Block Cipher
8.4: Stream Ciphers
8.5: RC4
8.6: Stream Ciphers Using Feedback Shift Registers
8.7: True Random Number Generators
Chapter 8: Key Terms
Chapter 8: Review Questions
Chapter 8: Problems
9: Public-Key Cryptography and RSA
Introduction: Public-Key Cryptography and RSA
9.1: Principles of Public-Key Cryptosystems
9.2: The RSA Algorithm
Chapter 9: Key Terms
Chapter 9: Review Questions
Chapter 9: Problems
10: Other Public-Key Cryptosystems
Introduction: Other Public-Key Cryptosystems
10.1: Diffie-Hellman Key Exchange
10.2: Elgamal Cryptographic System
10.3: Elliptic Curve Arithmetic
10.4: Elliptic Curve Cryptography
Chapter 10: Key Terms
Chapter 10: Review Questions
Chapter 10: Problems
11: Cryptographic Hash Functions
Introduction: Cryptographic Hash Functions
11.1: Applications of Cryptographic Hash Functions
11.2: Two Simple Hash Functions
11.3: Requirements and Security
11.4: Secure Hash Algorithm (SHA)
11.5: SHA-3
Chapter 11: Key Terms
Chapter 11: Review Questions
Chapter 11: Problems
12: Message Authentication Codes
Introduction: Message Authentication Codes
12.1: Message Authentication Requirements
12.2: Message Authentication Functions
12.3: Requirements for Message Authentication Codes
12.4: Security of MACs
12.5: MACs Based on Hash Functions: HMAC
12.6: MACs Based on Block Ciphers: DAA and CMAC
12.7: Authenticated Encryption: CCM and GCM
12.8: Key Wrapping
12.9: Pseudorandom Number Generation Using Hash Functions and MACS
Chapter 12: Key Terms
Chapter 12: Review Questions
Chapter 12: Problems
13: Digital Signatures
Introduction: Digital Signatures
13.1: Digital Signatures
13.2: Elgamal Digital Signature Scheme
13.3: Schnorr Digital Signature Scheme
13.4: NIST Digital Signature Algorithm
13.5: Elliptic Curve Digital Signature Algorithm
13.6: RSA-PSS Digital Signature Algorithm
Chapter 13: Key Terms
Chapter 13: Review Questions
Chapter 13: Problems
14: Lightweight Cryptography and Post-Quantum Cryptography
Introduction: Lightweight Cryptography and Post-Quantum Cryptography
14.1: Lightweight Cryptography Concepts
14.2: Lightweight Cryptographic Algorithms
14.3: Post-Quantum Cryptography Concepts
14.4: Post-Quantum Cryptographic Algorithms
Chapter 14: Key Terms
Chapter 14: Review Questions
15: Cryptographic Key Management and Distribution
Introduction: Cryptographic Key Management and Distribution
15.1: Symmetric Key Distribution Using Symmetric Encryption
15.2: Symmetric Key Distribution Using Asymmetric Encryption
15.3: Distribution of Public Keys
15.4: X.509 Certificates
15.5: Public-Key Infrastructure
Chapter 15: Key Terms
Chapter 15: Review Questions
Chapter 15: Problems
16: User Authentication
Introduction: User Authentication
16.1: Remote User-Authentication Principles
16.2: Remote User-Authentication Using Symmetric Encryption
16.3: Kerberos
16.4: Remote User-Authentication Using Asymmetric Encryption
16.5: Federated Identity Management
Chapter 16: Key Terms
Chapter 16: Review Questions
Chapter 16: Problems
17: Transport-Level Security
Introduction: Transport-Level Security
17.1: Web Security Issues
17.2: Transport Layer Security
17.3: HTTPS
17.4: Secure Shell (SSH)
Chapter 17: Review Questions
Chapter 17: Problems
18: Wireless Network Security
Introduction: Wireless Network Security
18.1: Wireless Security
18.2: Mobile Device Security
18.3: IEEE 802.11 Wireless LAN Overview
18.4: IEEE 802.11i Wireless LAN Security
Chapter 18: Key Terms
Chapter 18: Review Questions
Chapter 18: Problems
19: Electronic Mail Security
Introduction: Electronic Mail Security
19.1: Internet Mail Architecture
19.2: Email Formats
19.3: Email Threats and Comprehensive Email Security
19.4: S/MIME
19.5: DNSSEC
19.6: DNS-Based Authentication of Named Entities
19.7: Sender Policy Framework
19.8: DomainKeys Identified Mail
19.9: Domain-Based Message Authentication, Reporting, and Conformance
Chapter 19: Key Terms
Chapter 19: Review Questions
Chapter 19: Problems
20: IP Security
Introduction: IP Security
20.1: IP Security Overview
20.2: IP Security Policy
20.3: Encapsulating Security Payload
20.4: Combining Security Associations
20.5: Internet Key Exchange
Chapter 20: Key Terms
Chapter 20: Review Questions
Chapter 20: Problems
21: Network Endpoint Security
Introduction: Network Endpoint Security
21.1: Firewalls
21.2: Intrusion Detection Systems
21.3: Malicious Software
21.4: Distributed Denial of Service Attacks
Chapter 21: Key Terms
Chapter 21: Review Questions
Chapter 21: Problems
22: Cloud Security
Introduction: Cloud Security
22.1: Cloud Computing
22.2: Cloud Security Concepts
22.3: Cloud Security Risks and Countermeasures
22.4: Cloud Security as a Service
22.5: On Open-Source Cloud Security Module
Chapter 22: Key Terms
Chapter 22: Review Questions
23: Internet of Things (IoT) Security
Introduction: Internet of Things (IoT) Security
23.1: The Internet of Things
23.2: IoT Security Concepts and Objectives
23.3: An Open-Source IoT Security Module
Chapter 23: Key Terms
Chapter 23: Review Questions
Backmatter
Appendix A: Basic Concepts from Linear Algebra
Appendix B: Measures of Security and Secrecy
Appendix C: Data Encryption Standard (DES)
Appendix D: Simplified AES
Appendix E: Mathematical Basis of The Birthday Attack
References
List of Acronyms
Glossary


πŸ“œ SIMILAR VOLUMES


Cryptography and Network Security Princi
✍ William Stallings πŸ“‚ Library πŸ“… 2005 πŸ› Prentice Hall 🌐 English

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical

Cryptography and Network Security: Princ
✍ William Stallings πŸ“‚ Library πŸ“… 2014 πŸ› Pearson 🌐 English

Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and n

Cryptography and Network Security: Princ
✍ William Stallings πŸ“‚ Library πŸ“… 2022 πŸ› Pearson 🌐 English

<p><span>For courses in Cryptography, Computer Security, and Network Security.</span><span> Β  </span></p><p><span>Keep pace with the fast-moving field of cryptography and network security</span></p><p><span>Stallings’ </span><span>Cryptography and Network Security: Principles and PracticeΒ </span><sp