图书介绍

Cryptography and Network Security Principles and Practice Fifth EditionPDF|Epub|txt|kindle电子书版本网盘下载

Cryptography and Network Security Principles and Practice Fifth Edition
  • William Stallings 著
  • 出版社: Inc
  • ISBN:9787121119910
  • 出版时间:2011
  • 标注页数:720页
  • 文件大小:286MB
  • 文件页数:748页
  • 主题词:电子计算机-密码术-高等学校-教材;计算机网络-安全技术-高等学校-教材

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Cryptography and Network Security Principles and Practice Fifth EditionPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 0 Reader’s Guide1

0.1 Outline of This Book2

0.2 A Roadmap for Readers and Instructors2

0.3 Internet and Web Resources4

0.4 Standards5

Chapter 1 Overview7

1.1 Computer Security Concepts9

1.2 The OSI Security Architecture14

1.3 Security Attacks15

1.4 Security Services19

1.5 Security Mechanisms23

1.6 A Model for Network Security25

1.7 Recommended Reading and Web Sites27

1.8 Key Terms,Review Questions,and Problems29

PART ONE SYMMETRIC CIPHERS31

Chapter 2 Classical Encryption Techniques31

2.1 Symmetric Cipher Model33

2.2 Substitution Techniques38

2.3 Transposition Techniques53

2.4 Rotor Machines55

2.5 Steganography57

2.6 Recommended Reading and Web Sites59

2.7 Key Terms,Review Questions,and Problems60

Chapter 3 Block Ciphers and the Data Encryption Standard66

3.1 Block Cipher Principles68

3.2 The Data Encryption Standard(DES)77

3.3 A DES Example85

3.4 The Strength of DES88

3.5 Differential and Linear Cryptanalysis89

3.6 Block Cipher Design Principles92

3.7 Recommended Reading and Web Site96

3.8 Key Terms,Review Questions,and Problems97

Chapter 4 Basic Concepts in Number Theory and Finite Fields101

4.1 Divisibility and the Division Algorithm103

4.2 The Euclidean Algorithm105

4.3 Modular Arithmetic108

4.4 Groups,Rings,and Fields116

4.5 Finite Fields of the Form GF(p)120

4.6 Polynomial Arithmetic122

4.7 Finite Fields of the Form GF(2n)129

4.8 Recommended Reading and Web Sites141

4.9 Key Terms,Review Questions,and Problems141

Appendix 4A The Meaning of mod144

Chapter 5 Advanced Encryption Standard147

5.1 The Origins AES148

5.2 AES Structure150

5.3 AES Round Functions155

5.4 AES Key Expansion166

5.5 An AES Example169

5.6 AES Implementation174

5.7 Recommended Reading and Web Sites178

5.8 Key Terms,Review Questions,and Problems179

Appendix 5A Polynomials with Coefficients in GF(28)180

Appendix 5B Simplified AES183

Chapter 6 Block Cipher Operation192

6.1 Multiple Encryption and Triple DES193

6.2 Electronic Codebook Mode198

6.3 Cipher Block Chaining Mode201

6.4 Cipher Feedback Mode203

6.5 Output Feedback Mode205

6.6 Counter Mode206

6.7 XTS Mode for Block-Oriented Storage Devices210

6.8 Recommended Web Site214

6.9 Key Terms,Review Questions,and Problems214

Chapter 7 Pseudorandom Number Generation and Stream Ciphers218

7.1 Principles of Pseudorandom Number Generation219

7.2 Pseudorandom Number Generators226

7.3 Pseudorandom Number Generation Using a Block Cipher229

7.4 Stream Ciphers232

7.5 RC4234

7.6 True Random Numbers237

7.7 Recommended Reading238

7.8 Key Terms,Review Questions,and Problems239

PART TWO ASYMMETRIC CIPHERS243

Chapter 8 More Number Theory243

8.1 Prime Numbers245

8.2 Fermat’s and Euler’s Theorems248

8.3 Testing for Primality251

8.4 The Chinese Remainder Theorem254

8.5 Discrete Logarithms257

8.6 Recommended Reading and Web Sites262

8.7 Key Terms,Review Questions,and Problems263

Chapter 9 Public-Key Cryptography and RSA266

9.1 Principles of Public-Key Cryptosystems269

9.2 The RSA Algorithm277

9.3 Recommended Reading and Web Sites291

9.4 Key Terms,Review Questions,and Problems291

Appendix 9A Proof of the RSA Algorithm296

Appendix 9B The Complexity of Algorithms297

Chapter 10 Other Public-Key Cryptosystems300

10.1 Diffie-Hellman Key Exchange301

10.2 ElGamal Cryptosystem305

10.3 Elliptic Curve Arithmetic308

10.4 Elliptic Curve Cryptography317

10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher321

10.6 Recommended Reading and Web Sites323

10.7 Key Terms,Review Questions,and Problems324

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS327

Chapter 11 Cryptographic Hash Functions327

11.1 Applications of Cryptographic Hash Functions329

11.2 Two Simple Hash Functions333

11.3 Requirements and Security335

11.4 Hash Functions Based on Cipher Block Chaining341

11.5 Secure Hash Algorithm(SHA)342

11.6 SHA-3352

11.7 Recommended Reading and Web Sites353

11.8 Key Terms,Review Questions,and Problems353

Appendix 11A Mathematical Basis of Birthday Attack356

Chapter 12 Message Authentication Codes362

12.1 Message Authentication Requirements364

12.2 Message Authentication Functions365

12.3 Message Authentication Codes372

12.4 Security of MACs374

12.5 MACs Based on Hash Functions:HMAC375

12.6 MACs Based on Block Ciphers:DAA and CMAC380

12.7 Authenticated Encryption:CCM and GCM383

12.8 Pseudorandom Number Generation Using Hash Functions and MACs389

12.9 Recommended Reading392

12.10 Key Terms,Review Questions,and Problems393

Chapter 13 Digital Signatures395

13.1 Digital Signatures396

13.2 ElGamal Digital Signature Scheme400

13.3 Schnorr Digital Signature Scheme402

13.4 Digital Signature Standard(DSS)403

13.5 Recommended Reading and Web Sites406

13.6 Key Terms,Review Questions,and Problems407

PART FOUR MUTUAL TRUST410

Chapter 14 Key Management and Distribution410

14.1 Symmetric Key Distribution Using Symmetric Encryption412

14.2 Symmetric Key Distribution Using Asymmetric Encryption421

14.3 Distribution of Public Keys423

14.4 X.509 Certificates428

14.5 Public Key Infrastructure436

14.6 Recommended Reading and Web Sites438

14.7 Key Terms,Review Questions,and Problems439

Chapter 15 User Authentication Protocols444

15.1 Remote User Authentication Principles445

15.2 Remote User Authentication Using Symmetric Encryption448

15.3 Kerberos452

15.4 Remote User Authentication Using Asymmetric Encryption470

15.5 Federated Identity Management472

15.6 Recommended Reading and Web Sites478

15.7 Key Terms,Review Questions,and Problems479

Appendix 15A Kerberos Encryption Techniques481

PART FIVE NETWORK AND INTERNET SECURITY485

Chapter 16 Transport-Level Security485

16.1 Web Security Issues486

16.2 Secure Sockets Layer(SSL)489

16.3 Transport Layer Security(TLS)502

16.4 HTTPS506

16.5 Secure Shell(SSH)508

16.6 Recommended Reading and Web Sites519

16.7 Key Terms,Review Questions,and Problems519

Chapter 17 Wireless Network Security521

17.1 IEEE 802.11 Wireless LAN Overview523

17.2 IEEE 802.11i Wireless LAN Security529

17.3 Wireless Application Protocol Overview543

17.4 Wireless Transport Layer Security550

17.5 WAP End-to-End Security560

17.6 Recommended Reading and Web Sites563

17.7 Key Terms,Review Questions,and Problems563

Chapter 18 Electronic Mail Security567

18.1 Pretty Good Privacy(PGP)568

18.2 S/MIME587

18.3 DomainKeys Identified Mail(DKIM)603

18.4 Recommended Web Sites610

18.5 Key Terms,Review Questions,and Problems611

Appendix 18A Radix-64 Conversion612

Chapter 19 IP Security615

19.1 IP Security Overview616

19.2 IP Security Policy622

19.3 Encapsulating Security Payload627

19.4 Combining Security Associations634

19.5 Internet Key Exchange638

19.6 Cryptographic Suites647

19.7 Recommended Reading and Web Sites648

19.8 Key Terms,Review Questions,and Problems649

APPENDICES651

Appendix A Projects for Teaching Cryptography and Network Security651

A.1 Sage Computer Algebra Projects652

A.2 Hacking Project653

A.3 Block Cipher Projects653

A.4 Laboratory Exercises654

A.5 Research Projects654

A.6 Programming Projects655

A.7 Practical Security Assessments655

A.8 Writing Assignments655

A.9 Reading/Report Assignments656

Appendix B Sage Examples657

B.1 Chapter 2:Classical Encryption Techniques659

B.2 Chapter 3:Block Ciphers and the Data Encryption Standard662

B.3 Chapter 4:Basic Concepts in Number Theory and Finite Fields666

B.4 Chapter 5:Advanced Encryption Standard673

B.5 Chapter 6:Pseudorandom Number Generation and Stream Ciphers678

B.6 Chapter 8:Number Theory680

B.6 Chapter 9:Public-Key Cryptography and RSA685

B.7 Chapter 10:Other Public-Key Cryptosystems688

B.8 Chapter 11:Cryptographic Hash Functions693

B.9 Chapter 13:Digital Signatures695

References699

Index711

热门推荐