×
Don't wait for the right time for studying... It won't come.
--Your friends at LectureNotes
Close

Cryptography And Network Security

by Vandana SharmaVandana Sharma
Type: NoteInstitute: Jb knowledge park Views: 41Uploaded: 1 year ago

Share it with your friends

Suggested Materials

Leave your Comments

Contributors

Vandana Sharma
Vandana Sharma
Cryptography and Network Security Principles and Practices, Fourth Edition Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings Publisher: Prentice Hall Pub Date: November 16, 2005 Print ISBN-10: 0-13-187316-4 Print ISBN-13: 978-0-13-187316-2 eText ISBN-10: 0-13-187319-9 • Table of Contents eText ISBN-13: 978-0-13-187319-3 • Index Pages: 592 In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. file:///D|/1/0131873164/main.html [14.10.2007 09:39:39]
Table of Contents Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings Publisher: Prentice Hall Pub Date: November 16, 2005 Print ISBN-10: 0-13-187316-4 Print ISBN-13: 978-0-13-187316-2 • Table of Contents • Index eText ISBN-10: 0-13-187319-9 eText ISBN-13: 978-0-13-187319-3 Pages: 592 Copyright Notation xi Preface xiii Objectives xiii Intended Audience xiii Plan of the Book xiv Internet Services for Instructors and Students xiv Projects for Teaching Cryptography and Network Security xiv What's New in the Fourth Edition xv Acknowledgments xvi Chapter 0. Reader's Guide 1 Section 0.1. Outline of this Book 2 Section 0.2. Roadmap 2 Section 0.3. Internet and Web Resources 4 Chapter 1. Introduction 6 Section 1.1. Security Trends 9 Section 1.2. The OSI Security Architecture 12 Section 1.3. Security Attacks 13 Section 1.4. Security Services 16 Section 1.5. Security Mechanisms 19 Section 1.6. A Model for Network Security 22 Section 1.7. Recommended Reading and Web Sites 24 Section 1.8. Key Terms, Review Questions, and Problems 25 Part One: Symmetric Ciphers 26 Chapter 2. Classical Encryption Techniques 28 Section 2.1. Symmetric Cipher Model 30 file:///D|/1/0131873164/toc.html (1 von 5) [14.10.2007 09:39:52]
Table of Contents Section 2.2. Substitution Techniques 35 Section 2.3. Transposition Techniques 49 Section 2.4. Rotor Machines 51 Section 2.5. Steganography 53 Section 2.6. Recommended Reading and Web Sites 55 Section 2.7. Key Terms, Review Questions, and Problems 56 Chapter 3. Block Ciphers and the Data Encryption Standard 62 Section 3.1. Block Cipher Principles 64 Section 3.2. The Data Encryption Standard 72 Section 3.3. The Strength of Des 82 Section 3.4. Differential and Linear Cryptanalysis 83 Section 3.5. Block Cipher Design Principles 86 Section 3.6. Recommended Reading 90 Section 3.7. Key Terms, Review Questions, and Problems 90 Chapter 4. Finite Fields 95 Section 4.1. Groups, Rings, and Fields 97 Section 4.2. Modular Arithmetic 101 Section 4.3. The Euclidean Algorithm 107 Section 4.4. Finite Fields of The Form GF(p) 109 Section 4.5. Polynomial Arithmetic 113 Section 4.6. Finite Fields Of the Form GF(2n) 119 Section 4.7. Recommended Reading and Web Sites 129 Section 4.8. Key Terms, Review Questions, and Problems 130 Chapter 5. Advanced Encryption Standard 134 Section 5.1. Evaluation Criteria For AES 135 Section 5.2. The AES Cipher 140 Section 5.3. Recommended Reading and Web Sites 160 Section 5.4. Key Terms, Review Questions, and Problems 161 Appendix 5A Polynomials with Coefficients in GF(28) 163 Appendix 5B Simplified AES 165 Chapter 6. More on Symmetric Ciphers 174 Section 6.1. Multiple Encryption and Triple DES 175 Section 6.2. Block Cipher Modes of Operation 181 Section 6.3. Stream Ciphers and RC4 189 Section 6.4. Recommended Reading and Web Site 194 Section 6.5. Key Terms, Review Questions, and Problems 194 Chapter 7. Confidentiality Using Symmetric Encryption 199 Section 7.1. Placement of Encryption Function 201 Section 7.2. Traffic Confidentiality 209 file:///D|/1/0131873164/toc.html (2 von 5) [14.10.2007 09:39:52]

Lecture Notes