Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010324821 | TK5105.59 S713 2014 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist.
A practical survey of cryptography and network security with unmatched support for instructors and students
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
Author Notes
Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia .
He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.
In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.
He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com . This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Table of Contents
Notation | p. xi |
Preface | p. xiii |
Chapter 0 Guide for Readers and Instructors | p. 1 |
0.1 Outline of This Book | p. 2 |
0.2 A Roadmap for Readers and Instructors | p. 3 |
0.3 Internet and Web Resources | p. 4 |
0.4 Standards | p. 5 |
Chapter 1 Overview | p. 7 |
1.1 Computer Security Concepts | p. 9 |
1.2 The OSI Security Architecture | p. 14 |
1.3 Security Attacks | p. 15 |
1.4 Security Services | p. 17 |
1.5 Security Mechanisms | p. 20 |
1.6 A Model for Network Security | p. 22 |
1.7 Recommended Reading | p. 24 |
1.8 Key Terms, Review Questions, and Problems | p. 25 |
Part 1 Symmetric Ciphers | p. 27 |
Chapter 2 Classical Encryption Techniques | p. 27 |
2.1 Symmetric Cipher Model | p. 28 |
2.2 Substitution Techniques | p. 34 |
2.3 Transposition Techniques | p. 49 |
2.4 Rotor Machines | p. 50 |
2.5 Steganography | p. 52 |
2.6 Recommended Reading | p. 54 |
2.7 Key Terms, Review Questions, and Problems | p. 55 |
Chapter 3 Block Ciphers and the Data Encryption Standard | p. 61 |
3.1 Traditional Block Cipher Structure | p. 63 |
3.2 The Data Encryption Standard | p. 72 |
3.3 A DES Example | p. 74 |
3.4 The Strength of DES | p. 77 |
3.5 Block Cipher Design Principles | p. 78 |
3.6 Recommended Reading | p. 80 |
3.7 Key Terms, Review Questions, and Problems | p. 81 |
Chapter 4 Basic Concepts in Number Theory and Finite Fields | p. 85 |
4.1 Divisibility and the Division Algorithm | p. 87 |
4.2 The Euclidean Algorithm | p. 88 |
4.3 Modular Arithmetic | p. 91 |
4.4 Groups, Rings, and Fields | p. 99 |
4.5 Finite Fields of the Form GF(p) | p. 102 |
4.6 Polynomial Arithmetic | p. 106 |
4.7 Finite Fields of the Form GF(2 n ) | p. 112 |
4.8 Recommended Reading | p. 124 |
4.9 Key Terms, Review Questions, and Problems | p. 124 |
Appendix 4A The Meaning of mod | p. 127 |
Chapter 5 Advanced Encryption Standard | p. 129 |
5.1 Finite Field Arithmetic | p. 130 |
5.2 AES Structure | p. 132 |
5.3 AES Transformation Functions | p. 137 |
5.4 AES Key Expansion | p. 148 |
5.5 An AES Example | p. 151 |
5.6 AES Implementation | p. 155 |
5.7 Recommended Reading | p. 159 |
5.8 Key Terms, Review Questions, and Problems | p. 160 |
Appendix 5A Polynomials with Coefficients in GF(2 8 ) | p. 162 |
Appendix 5B Simplified AES | p. 164 |
Chapter 6 Block Cipher Operation | p. 174 |
6.1 Multiple Encryption and Triple DES | p. 175 |
6.2 Electronic Code book | p. 180 |
6.3 Cipher Block Chaining Mode | p. 183 |
6.4 Cipher Feedback Mode | p. 185 |
6.5 Output Feedback Mode | p. 187 |
6.6 Counter Mode | p. 189 |
6.7 XTS-AES Mode for Block-Oriented Storage Devices | p. 191 |
6.8 Recommended Reading | p. 198 |
6.9 Key Terms, Review Questions, and Problems | p. 198 |
Chapter 7 Pseudorandom Number Generation and Stream Ciphers | p. 202 |
7.1 Principles of Pseudorandom Number Generation | p. 203 |
7.2 Pseudorandom Number Generators | p. 210 |
7.3 Pseudorandom Number Generation Using a Block Cipher | p. 213 |
7.4 Stream Ciphers | p. 219 |
7.5 RC4 | p. 221 |
7.6 True Random Number Generators | p. 223 |
7.7 Recommended Reading | p. 227 |
7.8 Key Terms, Review Questions, and Problems | p. 228 |
Part 2 Asymmetric Ciphers | p. 231 |
Chapter 8 More Number Theory | p. 231 |
8.1 Prime Numbers | p. 232 |
8.2 Fermat's and Euler's Theorems | p. 236 |
8.3 Testing for Primality | p. 239 |
8.4 The Chinese Remainder Theorem | p. 242 |
8.5 Discrete Logarithms | p. 244 |
8.6 Recommended Reading | p. 249 |
8.7 Key Terms, Review Questions, and Problems | p. 250 |
Chapter 9 Public-Key Cryptography and RSA | p. 253 |
9.1 Principles of Public-Key Cryptosystems | p. 256 |
9.2 The RSA Algorithm | p. 264 |
9.3 Recommended Reading | p. 278 |
9.4 Key Terms, Review Questions, and Problems | p. 279 |
Appendix 9A The Complexity of Algorithms | p. 283 |
Chapter 10 Other Public-Key Cryptosystems | p. 286 |
10.1 Diffie-Hellman Key Exchange | p. 287 |
10.2 Elgamal Cryptographic System | p. 292 |
10.3 Elliptic Curve Arithmetic | p. 295 |
10.4 Elliptic Curve Cryptography | p. 303 |
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher | p. 306 |
10.6 Recommended Reading | p. 309 |
10.7 Key Terms, Review Questions, and Problems | p. 309 |
Part 3 Cryptographic Data Integrity Algorithms | p. 313 |
Chapter 11 Cryptographic Hash Functions | p. 313 |
11.1 Applications of Cryptographic Hash Functions | p. 315 |
11.2 Two Simple Hash Functions | p. 320 |
11.3 Requirements and Security | p. 322 |
11.4 Hash Functions Based on Cipher Block Chaining | p. 328 |
11.5 Secure Hash Algorithm (SHA) | p. 329 |
11.6 SHA-3 | p. 339 |
11.7 Recommended Reading | p. 351 |
11.8 Key Terms, Review Questions, and Problems | p. 351 |
Chapter 12 Message Authentication Codes | p. 355 |
12.1 Message Authentication Requirements | p. 357 |
12.2 Message Authentication Functions | p. 357 |
12.3 Requirements for Message Authentication Codes | p. 365 |
12.4 Security of MACs | p. 367 |
12.5 MACs Based on Hash Functions: HMAC | p. 368 |
12.6 MACs Based on Block Ciphers: DAA and CMAC | p. 373 |
12.7 Authenticated Encryption: CCM and GCM | p. 376 |
12.8 Key Wrapping | p. 382 |
12.9 Pseudorandom Number Generation using Hash Functions and MACs | p. 387 |
12.10 Recommended Reading | p. 390 |
12.11 Key Terms, Review Questions, and Problems | p. 390 |
Chapter 13 Digital Signatures | p. 393 |
13.1 Digital Signatures | p. 395 |
13.2 Elgamal Digital Signature Scheme | p. 398 |
13.3 Schnorr Digital Signature Scheme | p. 400 |
13.4 NIST Digital Signature Algorithm | p. 401 |
13.5 Elliptic Curve Digital Signature Algorithm | p. 404 |
13.6 RSA-PSS Digital Signature Algorithm | p. 407 |
13.7 Recommended Reading | p. 412 |
13.8 Key Terms, Review Questions, and Problems | p. 412 |
Part 4 Mutual Trust | p. 417 |
Chapter 14 Key Management and Distribution | p. 417 |
14.1 Symmetric Key Distribution Using Symmetric Encryption | p. 418 |
14.2 Symmetric Key Distribution Using Asymmetric Encryption | p. 427 |
14.3 Distribution of Public Keys | p. 430 |
14.4 X.509 Certificates | p. 435 |
14.5 Public-Key Infrastructure | p. 443 |
14.6 Recommended Reading | p. 445 |
14.7 Key Terms, Review Questions, and Problems | p. 446 |
Chapter 15 User Authentication | p. 450 |
15.1 Remote User-Authentication Principles | p. 451 |
15.2 Remote User-Authentication Using Symmetric Encryption | p. 454 |
15.3 Kerberos | p. 458 |
15.4 Remote User Authentication Using Asymmetric Encryption | p. 476 |
15.5 Federated Identity Management | p. 478 |
15.6 Personal Identity Verification | p. 484 |
15.7 Recommended Reading | p. 491 |
15.8 Key Terms, Review Questions, and Problems | p. 491 |
Part 5 Network and Internet Security | p. 495 |
Chapter 16 Network Access Control and Cloud Security | p. 495 |
16.1 Network Access Control | p. 496 |
16.2 Extensible Authentication Protocol | p. 499 |
16.3 IEEE 802.1X Port-Based. Network Access Control | p. 503 |
16.4 Cloud Computing | p. 505 |
16.5 Cloud Security Risks and Countermeasures | p. 512 |
16.6 Data Protection in the Cloud | p. 514 |
16.7 Cloud Security as a Service | p. 517 |
16.8 Recommended Reading | p. 520 |
16.9 Key Terms, Review Questions, and Problems | p. 521 |
Chapter 17 Transport-Level Security | p. 522 |
17.1 Web Security Considerations | p. 523 |
17.2 Secure Sockets Layer | p. 525 |
17.3 Transport Layer Security | p. 539 |
17.4 HTTPS | p. 543 |
17.5 Secure Shell (SSH) | p. 544 |
17.6 Recommended Reading | p. 555 |
17.7 Key Terms, Review Questions, and Problems | p. 556 |
Chapter 18 Wireless Network Security | p. 558 |
18.1 Wireless Security | p. 559 |
18.2 Mobile Device Security | p. 562 |
18.3 IEEE 802.11 Wireless LAN Overview | p. 566 |
18.4 IEEE 802.11i Wireless LAN Security | p. 572 |
18.5 Recommended Reading | p. 586 |
18.6 Key Terms, Review Questions, and Problems | p. 587 |
Chapter 19 Electronic Mail Security | p. 590 |
19.1 Pretty Good Privacy | p. 591 |
19.2 S/MIME | p. 599 |
19.3 DomainKeys Identified Mail | p. 615 |
19.4 Recommended Reading | p. 622 |
19.5 Key Terms, Review Questions, and Problems | p. 622 |
Appendix 19A Radix-64 Conversion | p. 623 |
Chapter 20 IP Security | p. 626 |
20.1 IP Security Overview | p. 628 |
20.2 IP Security Policy | p. 632 |
20.3 Encapsulating Security Payload | p. 638 |
20.4 Combining Security Associations | p. 645 |
20.5 Internet Key Exchange | p. 649 |
20.6 Cryptographic Suites | p. 657 |
20.7 Recommended Reading | p. 659 |
20.8 Key Terms, Review Questions, and Problems | p. 659 |
Appendices | p. 661 |
Appendix A Projects for Teaching Cryptography and Network Security | p. 661 |
A.1 Sage Computer Algebra Projects | p. 662 |
A.2 Hacking Project | p. 663 |
A.3 Block Cipher Projects | p. 664 |
A.4 Laboratory Exercises | p. 664 |
A.5 Research Projects | p. 664 |
A.6 Programming Projects | p. 665 |
A.7 Practical Security Assessments | p. 665 |
A.8 Firewall Projects | p. 666 |
A.9 Case Studies | p. 666 |
A.10 Writing Assignments | p. 666 |
A.11 Reading/Report Assignments | p. 667 |
A.12 Discussion Topics | p. 667 |
Appendix B Sage Examples | p. 668 |
B.1 Linear Algebra and Matrix Functionality | p. 669 |
B.2 Chapter 2: Classical Encryption | p. 670 |
B.3 Chapter 3: Block Ciphers and the Data Encryption Standard | p. 673 |
B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields | p. 677 |
B.5 Chapter 5: Advanced Encryption Standard | p. 684 |
B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers | p. 689 |
B.7 Chapter 8: Number Theory | p. 691 |
B.8 Chapter 9: Public-Key Cryptography and RSA | p. 696 |
B.9 Chapter 10: Other Public-Key Cryptosystems | p. 699 |
B.10 Chapter 11: Cryptographic Hash Functions | p. 704 |
B.11 Chapter 13: Digital Signatures | p. 706 |
References | p. 710 |
Credits | p. 720 |
Index | p. 723 |
Online Chapters and Appendices 1 | |
Part 6 System Security | |
Chapter 21 Malicious Software | |
21.1 Types of Malicious Software | |
21.2 Propagation - Infected Content - Viruses | |
21.3 Propagation - Vulnerability Exploit - Worms | |
21.4 Propagation - Social Engineering - SPAM, Trojans | |
21.5 Payload - System Corruption | |
21.6 Payload - Attack Agent - Zombie, Bots | |
21.7 Payload - Information Theft - Keyloggers, Phishing, Spyware | |
21.8 Payload - Stealthing - Backdoors, Rootkits | |
21.9 Countermeasures | |
21.10 Distributed Denial of Service Attacks | |
21.11 Recommended Reading | |
21.12 Key Terms, Review Questions, and Problems | |
Chapter 22 Intruders | |
22.1 Intruders | |
22.2 Intrusion Detection | |
22.3 Password Management | |
22.4 Recommended Reading | |
22.5 Key Terms, Review Questions, and Problems | |
Appendix 22A The Base-Rate Fallacy | |
Chapter 23 Firewalls | |
23.1 The Need for Firewalls | |
23.2 Firewall Characteristics | |
23.3 Types of Firewalls | |
23.4 Firewall Basing | |
23.5 Firewall Location and Configurations | |
23.6 Recommended Reading | |
23.7 Key Terms, Review Questions, and Problems | |
Part 7 Legal and Ethical Issues | |
Chapter 24 Legal and. Ethical Issues | |
24.1 Cybercrime and Computer Crime | |
24.2 Intellectual Property | |
24.3 Privacy | |
24.4 Ethical Issues | |
24.5 Recommended Reading | |
24.6 Key Terms, Review Questions, and Problems | |
Appendix C Sage Exercises | |
Appendix D Standards and Standards-Setting Organizations | |
Appendix E Basic Concepts from Linear Algebra | |
Appendix F Measures of Security and Secrecy | |
Appendix G Simplified DES | |
Appendix H Evaluation Criteria for AES | |
Appendix I More on Simplified AES | |
Appendix J Knapsack Public-Key Algorithm | |
Appendix K Proof of the Digital Signature Algorithm | |
Appendix L TCP/IP and OSI | |
Appendix M Java Cryptographic APIs | |
Appendix N MD5 and Whirlpool Hash Functions | |
Appendix O Data Compression Using ZIP | |
Appendix P More on PGP | |
Appendix Q The International Reference Alphabet | |
Appendix R Proof of the RSA Algorithm | |
Appendix S Data Encryption Standard (DES) | |
Appendix T Kerberos Encryption Techniques | |
Appendix U Mathematical Basis of the Birthday Attack | |
Appendix V Evaluation Criteria for SHA-3 | |
Glossary |