Cryptography and Network Security:Principles and Practice
副标题:无
分类号:
ISBN:9787302055372
微信扫一扫,移动浏览光盘
简介
随着网络时代的来临,网络安全问题日显突出。病毒、黑客、电子窃听、电子诈骗已成为众多公司和个人业绩和效率的巨大威胁。网络安全作为一门学科的成熟,将会开发可实际应用的技术来加强网络安全。
本书强调密码学和网络安全的原理和实践。全书分为四部分:l.传统密码学,也就是对称密码学,讲述了对称密码学的基本概念以及当代最常用的三重数据加密标准(Triple DES);2.公钥密码学和哈希函数,涉及公钥密码体制的基本概念,也讲述了一些数学基础和现在研究热门的椭圆曲线密码体制ECC;3.计算机网络安全,涉及到目前应用广泛的CA技术;4.计算机系统安全,讲述了病毒防范和防火墙技术。此外,每章都附有阅读建议和思考性问题,帮助读者进一步掌握本章的内容。本书适用作大学四年级专业课、研究生课程教材,也可作为专业人员的参考书。
目录
preface
chapter 1 introdnction
l .l attacks, services, and mechanisms
l .2 security attacks
i .3 security services
i .4 a model for internetwork' security
l.5 outline of this book
l .6 recommended reading
appendix ia: internet and web resources
part one co
chapter 2 conventional eacryption: classical "techniqnes
2. l conventional encryption model
2.2 steganography
2.3 classical encryption techniques
2.4 recommended reading
2.5 problems
chapter 3 conventional eneryption: modem techniqnes.
3.l simplified des
.3.2 block cipher principles
3.3 the data encryption standard
3.4 the strength of des
3.5 differential and linear cryptanalysis
3.6 block cipher design principles.
3.7 block cipher modes of operation
3.8 recommended reading
3.9 problems
appendix 3a: bent functions
chapter 4 conventional encryption: algorithms
4.l triple des
4.2 international data encryption algorithm
4.3 blowfish
4.4 rc5.
4.5 cast-128
4.6 rc2
4.7 characteristics of advanced symmetric block ciphers
4.8 problems, 127
chapter 5 confidentiality using convendonal eneryption
5.l placement of encryption function
5.2 traffic confidentiality.
5.3 key distribution
5.4 random number generation
5.5 recommended reading
5.6 problems
part two public-key zncryption
chapter 6 publie-key cryptography
6. l principles of public-key cryptosystems
6.2 the rsa algorithm
6.3 key management
6.4 diffie-henman key exchange
6.5 elliptic curve cryptography
6.6 recommended reading..
6.7 problems, 199
appendix 6a: the complexity of algorithms
chapter 7 introduction to number theory
7.l prime and relatively prime numbers,
7.2 modular arithmetic, 211
7.3 fermat's and euler's theorems
7.4 testing for primality
7.5 euclid's algorithm.
7.6 the chinese remainder theorem
7.7 discrete logarithms
7.8 recommended reading
7.9 problems
chapter 8 message authentication and hash functions
8.l authentication requirements
8.2 authentication functions
8.3 message authentication codes
8.4 hash functions.
8.5 security of hash functions and macs.
8.6 recommended reading
8.7 problems
appendix 8a: mathematical basis of birthday attack
chapter 9 hash and mac algorithms
9.l md5 message digest algorithm
9.2 secure hash algorithm (sha-l)
9.3 ripemd-160
9.4 hmac
9.5 problems
chapter 1o digital signatures and authentication protoeols.
io.l digital signatures
io.2 authentication protocols
io.3 digital signature standard
io.4 recommended reading
io.5 problems.
appendix ioa: proof of the dss algorithm
part t
chapter 11 authentication apphcadons
l l .l kerberos.
l l .2 x.509 directory authentication service.
l l.3 recommended reading
l l .4 problems
appendix l ia: kerberos encryption techniques
chapter 12 electronic mail security
12.l pretty good privary
12.2 s/mime
12.3 recommended readings.
12.4 problems
appendix 12a: data compression using zip
appendix 12b : radix-64 conversion
appendix 12c: pgp random number generation
chapter 13 ip security
13.l ip security overview
13.2 ip security architecture
13.3 authentication header
13.4 encapsulating security payload
13.5 combining secmity associations.
13.6 key management
13.7 recommended reading
13.8 problems
appendix 13a: internetworking and internet protocols.
chapter 14 web security
14.l web security requirements.
14.2 secure sockets layer and transport layer security
14.3 secure electronic transaction
14.4 recommended reading
14.5 problems
part pour sysiiem security
chapter 15 intruders, viruses, and worms
15.l intruders
15.2 viruses and related threats
15.3 recommended reading
15.4 problems
chapter 16 firewalls
l6.l firewall design principles
16.2 trusted systems
16.3 recommended reading
16.4 problems
appendix a projects for teaching cryptography and network security
a.l research projects
a.2 programming projects
a.3 reading/report assignments
glossary
references
index
chapter 1 introdnction
l .l attacks, services, and mechanisms
l .2 security attacks
i .3 security services
i .4 a model for internetwork' security
l.5 outline of this book
l .6 recommended reading
appendix ia: internet and web resources
part one co
chapter 2 conventional eacryption: classical "techniqnes
2. l conventional encryption model
2.2 steganography
2.3 classical encryption techniques
2.4 recommended reading
2.5 problems
chapter 3 conventional eneryption: modem techniqnes.
3.l simplified des
.3.2 block cipher principles
3.3 the data encryption standard
3.4 the strength of des
3.5 differential and linear cryptanalysis
3.6 block cipher design principles.
3.7 block cipher modes of operation
3.8 recommended reading
3.9 problems
appendix 3a: bent functions
chapter 4 conventional encryption: algorithms
4.l triple des
4.2 international data encryption algorithm
4.3 blowfish
4.4 rc5.
4.5 cast-128
4.6 rc2
4.7 characteristics of advanced symmetric block ciphers
4.8 problems, 127
chapter 5 confidentiality using convendonal eneryption
5.l placement of encryption function
5.2 traffic confidentiality.
5.3 key distribution
5.4 random number generation
5.5 recommended reading
5.6 problems
part two public-key zncryption
chapter 6 publie-key cryptography
6. l principles of public-key cryptosystems
6.2 the rsa algorithm
6.3 key management
6.4 diffie-henman key exchange
6.5 elliptic curve cryptography
6.6 recommended reading..
6.7 problems, 199
appendix 6a: the complexity of algorithms
chapter 7 introduction to number theory
7.l prime and relatively prime numbers,
7.2 modular arithmetic, 211
7.3 fermat's and euler's theorems
7.4 testing for primality
7.5 euclid's algorithm.
7.6 the chinese remainder theorem
7.7 discrete logarithms
7.8 recommended reading
7.9 problems
chapter 8 message authentication and hash functions
8.l authentication requirements
8.2 authentication functions
8.3 message authentication codes
8.4 hash functions.
8.5 security of hash functions and macs.
8.6 recommended reading
8.7 problems
appendix 8a: mathematical basis of birthday attack
chapter 9 hash and mac algorithms
9.l md5 message digest algorithm
9.2 secure hash algorithm (sha-l)
9.3 ripemd-160
9.4 hmac
9.5 problems
chapter 1o digital signatures and authentication protoeols.
io.l digital signatures
io.2 authentication protocols
io.3 digital signature standard
io.4 recommended reading
io.5 problems.
appendix ioa: proof of the dss algorithm
part t
chapter 11 authentication apphcadons
l l .l kerberos.
l l .2 x.509 directory authentication service.
l l.3 recommended reading
l l .4 problems
appendix l ia: kerberos encryption techniques
chapter 12 electronic mail security
12.l pretty good privary
12.2 s/mime
12.3 recommended readings.
12.4 problems
appendix 12a: data compression using zip
appendix 12b : radix-64 conversion
appendix 12c: pgp random number generation
chapter 13 ip security
13.l ip security overview
13.2 ip security architecture
13.3 authentication header
13.4 encapsulating security payload
13.5 combining secmity associations.
13.6 key management
13.7 recommended reading
13.8 problems
appendix 13a: internetworking and internet protocols.
chapter 14 web security
14.l web security requirements.
14.2 secure sockets layer and transport layer security
14.3 secure electronic transaction
14.4 recommended reading
14.5 problems
part pour sysiiem security
chapter 15 intruders, viruses, and worms
15.l intruders
15.2 viruses and related threats
15.3 recommended reading
15.4 problems
chapter 16 firewalls
l6.l firewall design principles
16.2 trusted systems
16.3 recommended reading
16.4 problems
appendix a projects for teaching cryptography and network security
a.l research projects
a.2 programming projects
a.3 reading/report assignments
glossary
references
index
Cryptography and Network Security:Principles and Practice
- 名称
- 类型
- 大小
光盘服务联系方式: 020-38250260 客服QQ:4006604884
云图客服:
用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问
Video Player
×
Audio Player
×
pdf Player
×