图书介绍
Cryptography and Network Security Principles and Practice Fifth EditionPDF|Epub|txt|kindle电子书版本网盘下载
![Cryptography and Network Security Principles and Practice Fifth Edition](https://www.shukui.net/cover/54/31662615.jpg)
- William Stallings 著
- 出版社: Inc
- ISBN:9787121119910
- 出版时间:2011
- 标注页数:720页
- 文件大小:286MB
- 文件页数:748页
- 主题词:电子计算机-密码术-高等学校-教材;计算机网络-安全技术-高等学校-教材
PDF下载
下载说明
Cryptography and Network Security Principles and Practice Fifth EditionPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 0 Reader’s Guide1
0.1 Outline of This Book2
0.2 A Roadmap for Readers and Instructors2
0.3 Internet and Web Resources4
0.4 Standards5
Chapter 1 Overview7
1.1 Computer Security Concepts9
1.2 The OSI Security Architecture14
1.3 Security Attacks15
1.4 Security Services19
1.5 Security Mechanisms23
1.6 A Model for Network Security25
1.7 Recommended Reading and Web Sites27
1.8 Key Terms,Review Questions,and Problems29
PART ONE SYMMETRIC CIPHERS31
Chapter 2 Classical Encryption Techniques31
2.1 Symmetric Cipher Model33
2.2 Substitution Techniques38
2.3 Transposition Techniques53
2.4 Rotor Machines55
2.5 Steganography57
2.6 Recommended Reading and Web Sites59
2.7 Key Terms,Review Questions,and Problems60
Chapter 3 Block Ciphers and the Data Encryption Standard66
3.1 Block Cipher Principles68
3.2 The Data Encryption Standard(DES)77
3.3 A DES Example85
3.4 The Strength of DES88
3.5 Differential and Linear Cryptanalysis89
3.6 Block Cipher Design Principles92
3.7 Recommended Reading and Web Site96
3.8 Key Terms,Review Questions,and Problems97
Chapter 4 Basic Concepts in Number Theory and Finite Fields101
4.1 Divisibility and the Division Algorithm103
4.2 The Euclidean Algorithm105
4.3 Modular Arithmetic108
4.4 Groups,Rings,and Fields116
4.5 Finite Fields of the Form GF(p)120
4.6 Polynomial Arithmetic122
4.7 Finite Fields of the Form GF(2n)129
4.8 Recommended Reading and Web Sites141
4.9 Key Terms,Review Questions,and Problems141
Appendix 4A The Meaning of mod144
Chapter 5 Advanced Encryption Standard147
5.1 The Origins AES148
5.2 AES Structure150
5.3 AES Round Functions155
5.4 AES Key Expansion166
5.5 An AES Example169
5.6 AES Implementation174
5.7 Recommended Reading and Web Sites178
5.8 Key Terms,Review Questions,and Problems179
Appendix 5A Polynomials with Coefficients in GF(28)180
Appendix 5B Simplified AES183
Chapter 6 Block Cipher Operation192
6.1 Multiple Encryption and Triple DES193
6.2 Electronic Codebook Mode198
6.3 Cipher Block Chaining Mode201
6.4 Cipher Feedback Mode203
6.5 Output Feedback Mode205
6.6 Counter Mode206
6.7 XTS Mode for Block-Oriented Storage Devices210
6.8 Recommended Web Site214
6.9 Key Terms,Review Questions,and Problems214
Chapter 7 Pseudorandom Number Generation and Stream Ciphers218
7.1 Principles of Pseudorandom Number Generation219
7.2 Pseudorandom Number Generators226
7.3 Pseudorandom Number Generation Using a Block Cipher229
7.4 Stream Ciphers232
7.5 RC4234
7.6 True Random Numbers237
7.7 Recommended Reading238
7.8 Key Terms,Review Questions,and Problems239
PART TWO ASYMMETRIC CIPHERS243
Chapter 8 More Number Theory243
8.1 Prime Numbers245
8.2 Fermat’s and Euler’s Theorems248
8.3 Testing for Primality251
8.4 The Chinese Remainder Theorem254
8.5 Discrete Logarithms257
8.6 Recommended Reading and Web Sites262
8.7 Key Terms,Review Questions,and Problems263
Chapter 9 Public-Key Cryptography and RSA266
9.1 Principles of Public-Key Cryptosystems269
9.2 The RSA Algorithm277
9.3 Recommended Reading and Web Sites291
9.4 Key Terms,Review Questions,and Problems291
Appendix 9A Proof of the RSA Algorithm296
Appendix 9B The Complexity of Algorithms297
Chapter 10 Other Public-Key Cryptosystems300
10.1 Diffie-Hellman Key Exchange301
10.2 ElGamal Cryptosystem305
10.3 Elliptic Curve Arithmetic308
10.4 Elliptic Curve Cryptography317
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher321
10.6 Recommended Reading and Web Sites323
10.7 Key Terms,Review Questions,and Problems324
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS327
Chapter 11 Cryptographic Hash Functions327
11.1 Applications of Cryptographic Hash Functions329
11.2 Two Simple Hash Functions333
11.3 Requirements and Security335
11.4 Hash Functions Based on Cipher Block Chaining341
11.5 Secure Hash Algorithm(SHA)342
11.6 SHA-3352
11.7 Recommended Reading and Web Sites353
11.8 Key Terms,Review Questions,and Problems353
Appendix 11A Mathematical Basis of Birthday Attack356
Chapter 12 Message Authentication Codes362
12.1 Message Authentication Requirements364
12.2 Message Authentication Functions365
12.3 Message Authentication Codes372
12.4 Security of MACs374
12.5 MACs Based on Hash Functions:HMAC375
12.6 MACs Based on Block Ciphers:DAA and CMAC380
12.7 Authenticated Encryption:CCM and GCM383
12.8 Pseudorandom Number Generation Using Hash Functions and MACs389
12.9 Recommended Reading392
12.10 Key Terms,Review Questions,and Problems393
Chapter 13 Digital Signatures395
13.1 Digital Signatures396
13.2 ElGamal Digital Signature Scheme400
13.3 Schnorr Digital Signature Scheme402
13.4 Digital Signature Standard(DSS)403
13.5 Recommended Reading and Web Sites406
13.6 Key Terms,Review Questions,and Problems407
PART FOUR MUTUAL TRUST410
Chapter 14 Key Management and Distribution410
14.1 Symmetric Key Distribution Using Symmetric Encryption412
14.2 Symmetric Key Distribution Using Asymmetric Encryption421
14.3 Distribution of Public Keys423
14.4 X.509 Certificates428
14.5 Public Key Infrastructure436
14.6 Recommended Reading and Web Sites438
14.7 Key Terms,Review Questions,and Problems439
Chapter 15 User Authentication Protocols444
15.1 Remote User Authentication Principles445
15.2 Remote User Authentication Using Symmetric Encryption448
15.3 Kerberos452
15.4 Remote User Authentication Using Asymmetric Encryption470
15.5 Federated Identity Management472
15.6 Recommended Reading and Web Sites478
15.7 Key Terms,Review Questions,and Problems479
Appendix 15A Kerberos Encryption Techniques481
PART FIVE NETWORK AND INTERNET SECURITY485
Chapter 16 Transport-Level Security485
16.1 Web Security Issues486
16.2 Secure Sockets Layer(SSL)489
16.3 Transport Layer Security(TLS)502
16.4 HTTPS506
16.5 Secure Shell(SSH)508
16.6 Recommended Reading and Web Sites519
16.7 Key Terms,Review Questions,and Problems519
Chapter 17 Wireless Network Security521
17.1 IEEE 802.11 Wireless LAN Overview523
17.2 IEEE 802.11i Wireless LAN Security529
17.3 Wireless Application Protocol Overview543
17.4 Wireless Transport Layer Security550
17.5 WAP End-to-End Security560
17.6 Recommended Reading and Web Sites563
17.7 Key Terms,Review Questions,and Problems563
Chapter 18 Electronic Mail Security567
18.1 Pretty Good Privacy(PGP)568
18.2 S/MIME587
18.3 DomainKeys Identified Mail(DKIM)603
18.4 Recommended Web Sites610
18.5 Key Terms,Review Questions,and Problems611
Appendix 18A Radix-64 Conversion612
Chapter 19 IP Security615
19.1 IP Security Overview616
19.2 IP Security Policy622
19.3 Encapsulating Security Payload627
19.4 Combining Security Associations634
19.5 Internet Key Exchange638
19.6 Cryptographic Suites647
19.7 Recommended Reading and Web Sites648
19.8 Key Terms,Review Questions,and Problems649
APPENDICES651
Appendix A Projects for Teaching Cryptography and Network Security651
A.1 Sage Computer Algebra Projects652
A.2 Hacking Project653
A.3 Block Cipher Projects653
A.4 Laboratory Exercises654
A.5 Research Projects654
A.6 Programming Projects655
A.7 Practical Security Assessments655
A.8 Writing Assignments655
A.9 Reading/Report Assignments656
Appendix B Sage Examples657
B.1 Chapter 2:Classical Encryption Techniques659
B.2 Chapter 3:Block Ciphers and the Data Encryption Standard662
B.3 Chapter 4:Basic Concepts in Number Theory and Finite Fields666
B.4 Chapter 5:Advanced Encryption Standard673
B.5 Chapter 6:Pseudorandom Number Generation and Stream Ciphers678
B.6 Chapter 8:Number Theory680
B.6 Chapter 9:Public-Key Cryptography and RSA685
B.7 Chapter 10:Other Public-Key Cryptosystems688
B.8 Chapter 11:Cryptographic Hash Functions693
B.9 Chapter 13:Digital Signatures695
References699
Index711