Skip to:Content
|
Bottom
Cover image for Cryptography and network security : principles and practice
Title:
Cryptography and network security : principles and practice
Personal Author:
Edition:
6th ed.
Publication Information:
Boston, MA. : Prentice Hall, 2011
Physical Description:
xix, 731 p. : ill ; 24 cm.
ISBN:
9780133354690

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010324821 TK5105.59 S713 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist.

A practical survey of cryptography and network security with unmatched support for instructors and students

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


Author Notes

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia .

He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com . This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.


Table of Contents

Notationp. xi
Prefacep. xiii
Chapter 0 Guide for Readers and Instructorsp. 1
0.1 Outline of This Bookp. 2
0.2 A Roadmap for Readers and Instructorsp. 3
0.3 Internet and Web Resourcesp. 4
0.4 Standardsp. 5
Chapter 1 Overviewp. 7
1.1 Computer Security Conceptsp. 9
1.2 The OSI Security Architecturep. 14
1.3 Security Attacksp. 15
1.4 Security Servicesp. 17
1.5 Security Mechanismsp. 20
1.6 A Model for Network Securityp. 22
1.7 Recommended Readingp. 24
1.8 Key Terms, Review Questions, and Problemsp. 25
Part 1 Symmetric Ciphersp. 27
Chapter 2 Classical Encryption Techniquesp. 27
2.1 Symmetric Cipher Modelp. 28
2.2 Substitution Techniquesp. 34
2.3 Transposition Techniquesp. 49
2.4 Rotor Machinesp. 50
2.5 Steganographyp. 52
2.6 Recommended Readingp. 54
2.7 Key Terms, Review Questions, and Problemsp. 55
Chapter 3 Block Ciphers and the Data Encryption Standardp. 61
3.1 Traditional Block Cipher Structurep. 63
3.2 The Data Encryption Standardp. 72
3.3 A DES Examplep. 74
3.4 The Strength of DESp. 77
3.5 Block Cipher Design Principlesp. 78
3.6 Recommended Readingp. 80
3.7 Key Terms, Review Questions, and Problemsp. 81
Chapter 4 Basic Concepts in Number Theory and Finite Fieldsp. 85
4.1 Divisibility and the Division Algorithmp. 87
4.2 The Euclidean Algorithmp. 88
4.3 Modular Arithmeticp. 91
4.4 Groups, Rings, and Fieldsp. 99
4.5 Finite Fields of the Form GF(p)p. 102
4.6 Polynomial Arithmeticp. 106
4.7 Finite Fields of the Form GF(2 n )p. 112
4.8 Recommended Readingp. 124
4.9 Key Terms, Review Questions, and Problemsp. 124
Appendix 4A The Meaning of modp. 127
Chapter 5 Advanced Encryption Standardp. 129
5.1 Finite Field Arithmeticp. 130
5.2 AES Structurep. 132
5.3 AES Transformation Functionsp. 137
5.4 AES Key Expansionp. 148
5.5 An AES Examplep. 151
5.6 AES Implementationp. 155
5.7 Recommended Readingp. 159
5.8 Key Terms, Review Questions, and Problemsp. 160
Appendix 5A Polynomials with Coefficients in GF(2 8 )p. 162
Appendix 5B Simplified AESp. 164
Chapter 6 Block Cipher Operationp. 174
6.1 Multiple Encryption and Triple DESp. 175
6.2 Electronic Code bookp. 180
6.3 Cipher Block Chaining Modep. 183
6.4 Cipher Feedback Modep. 185
6.5 Output Feedback Modep. 187
6.6 Counter Modep. 189
6.7 XTS-AES Mode for Block-Oriented Storage Devicesp. 191
6.8 Recommended Readingp. 198
6.9 Key Terms, Review Questions, and Problemsp. 198
Chapter 7 Pseudorandom Number Generation and Stream Ciphersp. 202
7.1 Principles of Pseudorandom Number Generationp. 203
7.2 Pseudorandom Number Generatorsp. 210
7.3 Pseudorandom Number Generation Using a Block Cipherp. 213
7.4 Stream Ciphersp. 219
7.5 RC4p. 221
7.6 True Random Number Generatorsp. 223
7.7 Recommended Readingp. 227
7.8 Key Terms, Review Questions, and Problemsp. 228
Part 2 Asymmetric Ciphersp. 231
Chapter 8 More Number Theoryp. 231
8.1 Prime Numbersp. 232
8.2 Fermat's and Euler's Theoremsp. 236
8.3 Testing for Primalityp. 239
8.4 The Chinese Remainder Theoremp. 242
8.5 Discrete Logarithmsp. 244
8.6 Recommended Readingp. 249
8.7 Key Terms, Review Questions, and Problemsp. 250
Chapter 9 Public-Key Cryptography and RSAp. 253
9.1 Principles of Public-Key Cryptosystemsp. 256
9.2 The RSA Algorithmp. 264
9.3 Recommended Readingp. 278
9.4 Key Terms, Review Questions, and Problemsp. 279
Appendix 9A The Complexity of Algorithmsp. 283
Chapter 10 Other Public-Key Cryptosystemsp. 286
10.1 Diffie-Hellman Key Exchangep. 287
10.2 Elgamal Cryptographic Systemp. 292
10.3 Elliptic Curve Arithmeticp. 295
10.4 Elliptic Curve Cryptographyp. 303
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipherp. 306
10.6 Recommended Readingp. 309
10.7 Key Terms, Review Questions, and Problemsp. 309
Part 3 Cryptographic Data Integrity Algorithmsp. 313
Chapter 11 Cryptographic Hash Functionsp. 313
11.1 Applications of Cryptographic Hash Functionsp. 315
11.2 Two Simple Hash Functionsp. 320
11.3 Requirements and Securityp. 322
11.4 Hash Functions Based on Cipher Block Chainingp. 328
11.5 Secure Hash Algorithm (SHA)p. 329
11.6 SHA-3p. 339
11.7 Recommended Readingp. 351
11.8 Key Terms, Review Questions, and Problemsp. 351
Chapter 12 Message Authentication Codesp. 355
12.1 Message Authentication Requirementsp. 357
12.2 Message Authentication Functionsp. 357
12.3 Requirements for Message Authentication Codesp. 365
12.4 Security of MACsp. 367
12.5 MACs Based on Hash Functions: HMACp. 368
12.6 MACs Based on Block Ciphers: DAA and CMACp. 373
12.7 Authenticated Encryption: CCM and GCMp. 376
12.8 Key Wrappingp. 382
12.9 Pseudorandom Number Generation using Hash Functions and MACsp. 387
12.10 Recommended Readingp. 390
12.11 Key Terms, Review Questions, and Problemsp. 390
Chapter 13 Digital Signaturesp. 393
13.1 Digital Signaturesp. 395
13.2 Elgamal Digital Signature Schemep. 398
13.3 Schnorr Digital Signature Schemep. 400
13.4 NIST Digital Signature Algorithmp. 401
13.5 Elliptic Curve Digital Signature Algorithmp. 404
13.6 RSA-PSS Digital Signature Algorithmp. 407
13.7 Recommended Readingp. 412
13.8 Key Terms, Review Questions, and Problemsp. 412
Part 4 Mutual Trustp. 417
Chapter 14 Key Management and Distributionp. 417
14.1 Symmetric Key Distribution Using Symmetric Encryptionp. 418
14.2 Symmetric Key Distribution Using Asymmetric Encryptionp. 427
14.3 Distribution of Public Keysp. 430
14.4 X.509 Certificatesp. 435
14.5 Public-Key Infrastructurep. 443
14.6 Recommended Readingp. 445
14.7 Key Terms, Review Questions, and Problemsp. 446
Chapter 15 User Authenticationp. 450
15.1 Remote User-Authentication Principlesp. 451
15.2 Remote User-Authentication Using Symmetric Encryptionp. 454
15.3 Kerberosp. 458
15.4 Remote User Authentication Using Asymmetric Encryptionp. 476
15.5 Federated Identity Managementp. 478
15.6 Personal Identity Verificationp. 484
15.7 Recommended Readingp. 491
15.8 Key Terms, Review Questions, and Problemsp. 491
Part 5 Network and Internet Securityp. 495
Chapter 16 Network Access Control and Cloud Securityp. 495
16.1 Network Access Controlp. 496
16.2 Extensible Authentication Protocolp. 499
16.3 IEEE 802.1X Port-Based. Network Access Controlp. 503
16.4 Cloud Computingp. 505
16.5 Cloud Security Risks and Countermeasuresp. 512
16.6 Data Protection in the Cloudp. 514
16.7 Cloud Security as a Servicep. 517
16.8 Recommended Readingp. 520
16.9 Key Terms, Review Questions, and Problemsp. 521
Chapter 17 Transport-Level Securityp. 522
17.1 Web Security Considerationsp. 523
17.2 Secure Sockets Layerp. 525
17.3 Transport Layer Securityp. 539
17.4 HTTPSp. 543
17.5 Secure Shell (SSH)p. 544
17.6 Recommended Readingp. 555
17.7 Key Terms, Review Questions, and Problemsp. 556
Chapter 18 Wireless Network Securityp. 558
18.1 Wireless Securityp. 559
18.2 Mobile Device Securityp. 562
18.3 IEEE 802.11 Wireless LAN Overviewp. 566
18.4 IEEE 802.11i Wireless LAN Securityp. 572
18.5 Recommended Readingp. 586
18.6 Key Terms, Review Questions, and Problemsp. 587
Chapter 19 Electronic Mail Securityp. 590
19.1 Pretty Good Privacyp. 591
19.2 S/MIMEp. 599
19.3 DomainKeys Identified Mailp. 615
19.4 Recommended Readingp. 622
19.5 Key Terms, Review Questions, and Problemsp. 622
Appendix 19A Radix-64 Conversionp. 623
Chapter 20 IP Securityp. 626
20.1 IP Security Overviewp. 628
20.2 IP Security Policyp. 632
20.3 Encapsulating Security Payloadp. 638
20.4 Combining Security Associationsp. 645
20.5 Internet Key Exchangep. 649
20.6 Cryptographic Suitesp. 657
20.7 Recommended Readingp. 659
20.8 Key Terms, Review Questions, and Problemsp. 659
Appendicesp. 661
Appendix A Projects for Teaching Cryptography and Network Securityp. 661
A.1 Sage Computer Algebra Projectsp. 662
A.2 Hacking Projectp. 663
A.3 Block Cipher Projectsp. 664
A.4 Laboratory Exercisesp. 664
A.5 Research Projectsp. 664
A.6 Programming Projectsp. 665
A.7 Practical Security Assessmentsp. 665
A.8 Firewall Projectsp. 666
A.9 Case Studiesp. 666
A.10 Writing Assignmentsp. 666
A.11 Reading/Report Assignmentsp. 667
A.12 Discussion Topicsp. 667
Appendix B Sage Examplesp. 668
B.1 Linear Algebra and Matrix Functionalityp. 669
B.2 Chapter 2: Classical Encryptionp. 670
B.3 Chapter 3: Block Ciphers and the Data Encryption Standardp. 673
B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fieldsp. 677
B.5 Chapter 5: Advanced Encryption Standardp. 684
B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphersp. 689
B.7 Chapter 8: Number Theoryp. 691
B.8 Chapter 9: Public-Key Cryptography and RSAp. 696
B.9 Chapter 10: Other Public-Key Cryptosystemsp. 699
B.10 Chapter 11: Cryptographic Hash Functionsp. 704
B.11 Chapter 13: Digital Signaturesp. 706
Referencesp. 710
Creditsp. 720
Indexp. 723
Online Chapters and Appendices 1
Part 6 System Security
Chapter 21 Malicious Software
21.1 Types of Malicious Software
21.2 Propagation - Infected Content - Viruses
21.3 Propagation - Vulnerability Exploit - Worms
21.4 Propagation - Social Engineering - SPAM, Trojans
21.5 Payload - System Corruption
21.6 Payload - Attack Agent - Zombie, Bots
21.7 Payload - Information Theft - Keyloggers, Phishing, Spyware
21.8 Payload - Stealthing - Backdoors, Rootkits
21.9 Countermeasures
21.10 Distributed Denial of Service Attacks
21.11 Recommended Reading
21.12 Key Terms, Review Questions, and Problems
Chapter 22 Intruders
22.1 Intruders
22.2 Intrusion Detection
22.3 Password Management
22.4 Recommended Reading
22.5 Key Terms, Review Questions, and Problems
Appendix 22A The Base-Rate Fallacy
Chapter 23 Firewalls
23.1 The Need for Firewalls
23.2 Firewall Characteristics
23.3 Types of Firewalls
23.4 Firewall Basing
23.5 Firewall Location and Configurations
23.6 Recommended Reading
23.7 Key Terms, Review Questions, and Problems
Part 7 Legal and Ethical Issues
Chapter 24 Legal and. Ethical Issues
24.1 Cybercrime and Computer Crime
24.2 Intellectual Property
24.3 Privacy
24.4 Ethical Issues
24.5 Recommended Reading
24.6 Key Terms, Review Questions, and Problems
Appendix C Sage Exercises
Appendix D Standards and Standards-Setting Organizations
Appendix E Basic Concepts from Linear Algebra
Appendix F Measures of Security and Secrecy
Appendix G Simplified DES
Appendix H Evaluation Criteria for AES
Appendix I More on Simplified AES
Appendix J Knapsack Public-Key Algorithm
Appendix K Proof of the Digital Signature Algorithm
Appendix L TCP/IP and OSI
Appendix M Java Cryptographic APIs
Appendix N MD5 and Whirlpool Hash Functions
Appendix O Data Compression Using ZIP
Appendix P More on PGP
Appendix Q The International Reference Alphabet
Appendix R Proof of the RSA Algorithm
Appendix S Data Encryption Standard (DES)
Appendix T Kerberos Encryption Techniques
Appendix U Mathematical Basis of the Birthday Attack
Appendix V Evaluation Criteria for SHA-3
Glossary
Go to:Top of Page