Cryptography and network security:principles and practices
副标题:无
分类号:
ISBN:9787121119910
微信扫一扫,移动浏览光盘
简介
本书系统介绍了密码编码学与网络安全的基本原理和应用技术。全书
主要包括五个部分:对称密码部分讲解传统加密技术、高级加密标准等;
非对称密码部分讲解数论、公钥加密、RSA;第三部分讨论了加密哈希函数
、消息认证、数字签名等主题;第四部分分析了密钥管理、用户认证协议
;网络与Internet安全部分探讨的是传输层安全、无线网络安全、电子邮
件安全及IP安全的问题。最后,两个附录给出了各章的项目练习和一些例
子。配套网站包含大量的延伸性内容。
本书可作为高校计算机专业、网络安全专业、通信安全专业等相关专
业的本科生和研究生的教材,也可供相关技术人员参考使用。
目录
notation xiii
preface xv
about the author xxiii
chapter 0 reader s guide 1
0.1 outline of this book 2
0.2 a roadmap for readers and instructors 2
0.3 internet and web resources 4
0.4 standards 5
chapter 1 overview 7
1.1 computer security concepts 9
1.2 the osi security architecture 14
1.3 security attacks 15
1.4 security services 19
1.5 security mechanisms 23
1.6 a model for network security 25
1.7 recommended reading and web sites 27
1.8 key terms,review questions,and problems 29
part one symmetric ciphers 31
chapter 2 classical encryption techniques 31
2.1 symmetric cipher model 33
.2.2 substitution techniques 38
2.3 transposition techniques 53
2.4 rotor machines 55
2.5 steganography 57
2.6 recommended reading and web sites 59
2.7 key terms,review questions,and problems 60
chapter 3 block ciphers and the data encryption standard 66
3.1 block cipher principles 68
3.2 the data encryption standard (des) 77
3.3 a des example 85
3.4 the strength of des 88
3.5 differential and linear cryptanalysis 89
3.6 block cipher design principles 92
3.7 recommended reading and web site 96
3.8 key terms,review questions,and problems 97
chapter 4 basic concepts in number theory and finite fields 101
4.1 divisibility and the division algorithm 103
4.2 the euclidean algorithm 105
4.3 modular arithmetic 108
4.4 groups,rings,and fields 116
4.5 finite fields of the form gf(p) 120
4.6 polynomial arithmetic 122
4.7 finite fields of the form gf(2n) 129
4.8 recommended reading and web sites 141
4.9 key terms,review questions,and problems 141
appendix 4a the meaning of mod 144
chapter 5 advanced encryption standard 47
5.1 the origins aes 148
5.2 aes structure 150
5.3 aes round functions 155
5.4 aes key expansion 166
5.5 an aes example 169
5.6 aes implementation 174
5.7 recommended reading and web sites 178
5.8 key terms,review questions,and problems 179
appendix 5a polynomials with coefficients in gf(28) 180
appendix 5b simplified aes 183
chapter 6 block cipher operation 192
6.1 multiple encryption and triple des 193
6.2 electronic codebook mode 198
6.3 cipher block chaining mode 201
6.4 cipher feedback mode 203
6.5 output feedback mode 205
6.6 counter mode 206
6.7 xts mode for block-oriented storage devices 210
6.8 recommended web site 214
6.9 key terms,review questions,and problems 214
chapter 7 pseudorandom number generation and stream ciphers 218
7.1 principles of pseudorandom number generation 219
7.2 pseudorandom number generators 226
7.3 pseudorandom number generation using a block cipher 229
7.4 stream ciphers 232
7.5 rc4 234
7.6 true random numbers 237
7.7 recommended reading 238
7.8 key terms,review questions,and problems 239
part two asymmetric ciphers 243
chapter 8 more number theory 243
8.1 prime numbers 245
8.2 fermat s and euler s theorems 248
8.3 testing for primality 251
8.4 the chinese remainder theorem 254
8.5 discrete logarithms 257
8.6 recommended reading and web sites 262
8.7 key terms, review questions,and problems 263
chapter 9 public-key cryptography and rsa 266
9.1 principles of public-key cryptosystems 269
9.2 the rsa algorithm 277
9.3 recommended reading and web sites 291
9.4 key terms,review questions,and problems 291
appendix 9a proof of the rsa algorithm 296
appendix 9b the complexity of algorithms 297
chapter 10 other public-key cryptosystems 300
10.1 diffie-hellman key exchange 301
10.2 elgamal cryptosystem 305
10.3 elliptic curve arithmetic 308
10.4 elliptic curve cryptography 317
10.5 pseudorandom number generation based on an asymmetric cipher 321
10.6 recommended reading and web sites 323
10.7 key terms,review questions,and problems 324
part three cryptographic data integrity algorithms 327
chapter 11 cryptographic hash functions 327
11.1 applications of cryptographic hash functions 329
11.2 two simple hash functions 333
11.3 requirements and security 335
11.4 hash functions based on cipher block chaining 341
11.5 secure hash algorithm (sha) 342
11.6 sha-3 352
11.7 recommended reading and web sites 353
11.8 key terms,review questions,and problems 353
appendix 11a mathematical basis of birthday attack 356
chapter 12 message authentication codes 362
12.1 message authentication requirements 364
12.2 message authentication functions 365
12.3 message authentication codes 372
12.4 security of macs 374
12.5 macs based on hash functions:hmac 375
12.6 macs based on block ciphers:daa and cmac 380
12.7 authenticated encryption:ccm and gcm 383
12.8 pseudorandom number generation using hash functions and macs 389
12.9 recommended reading 392
12.10 key terms,review questions,and problems 393
chapter 13 digital signatures 395
13.1 digital signatures 396
13.2 elgamal digital signature scheme 400
13.3 schnorr digital signature scheme 402
13.4 digital signature standard (dss) 403
13.5 recommended reading and web sites 406
13.6 key terms,review questions,and problems 407
part four mutual trust 410
chapter 14 key management and distribution 410
14.1 symmetric key distribution using symmetric encryption 412
14.2 symmetric key distribution using asymmetric encryption 421
14.3 distribution of public keys 423
14.4 x.509 certificates 428
14.5 public key infrastructure 436
14.6 recommended reading and web sites 438
14.7 key terms,review questions,and problems 439
chapter 15 user authentication protocols 444
15.1 remote user authentication principles 445
15.2 remote user authentication using symmetric encryption 448
15.3 kerberos 452
15.4 remote user authentication using asymmetric encryption 470
15.5 federated identity management 472
15.6 recommended reading and web sites 478
15.7 key terms,review questions,and problems 479
appendix 15a kerberos encryption techniques 481
part five network and internet security 485
chapter 16 transport-level security 485
16.1 web security issues 486
16.2 secure sockets layer (ssl) 489
16.3 transport layer security (tls) 502
16.4 https 506
16.5 secure shell (ssh) 508
16.6 recommended reading and web sites 519
16.7 key terms,review questions,and problems 519
chapter 17 wireless network security 521
17.1 ieee 802.11 wireless lan overview 523
17.2 ieee 802.11i wireless lan security 529
17.3 wireless application protocol overview 543
17.4 wireless transport layer security 550
17.5 wap end-to-end security 560
17.6 recommended reading and web sites 563
17.7 key terms,review questions,and problems 563
chapter 18 electronic mail security 567
18.1 pretty good privacy (pgp) 568
18.2 s/mime 587
18.3 domainkeys identified mail (dkim) 603
18.4 recommended web sites 610
18.5 key terms,review questions,and problems 611
appendix 18a radix-64 conversion 612
chapter 19 ip security 615
19.1 ip security overview 616
19.2 ip security policy 622
19.3 encapsulating security payload 627
19.4 combining security associations 634
19.5 internet key exchange 638
19.6 cryptographic suites 647
19.7 recommended reading and web sites 648
19.8 key terms,review questions,and problems 649
appendices 651
appendix a projects for teaching cryptography and network security 651
a.1 sage computer algebra projects 652
a.2 hacking project 653
a.3 block cipher projects 653
a.4 laboratory exercises 654
a.5 research projects 654
a.6 programming projects 655
a.7 practical security assessments 655
a.8 writing assignments 655
a.9 reading/report assignments 656
appendix b sage examples 657
b.1 chapter 2:classical encryption techniques 659
b.2 chapter 3:block ciphers and the data encryption standard 662
b.3 chapter 4:basic concepts in number theory and finite fields 666
b.4 chapter 5:advanced encryption standard 673
b.5 chapter 6:pseudorandom number generation and stream ciphers 678
b.6 chapter 8:number theory 680
b.6 chapter 9:public-key cryptography and rsa 685
b.7 chapter 10:other public-key cryptosystems 688
b.8 chapter 11:cryptographic hash functions 693
b.9 chapter 13:digital signatures 695
references 699
index 711
online chapters
part six system security
chapter 20 intruders
20.1 intruders
20.2 intrusion detection
20.3 password management
20.4 recommended reading and web sites
20.5 key terms,review questions,and problems
appendix 20a the base-rate fallacy
chapter 21 malicious software
21.1 types of malicious software
21.2 viruses
21.3 virus countermeasures
21.4 worms
21.5 distributed denial of service attacks
21.6 recommended reading and web sites
21.7 key terms,review questions,and problems
chapter 22 firewalls
22.1 the need for firewalls
22.2 firewall characteristics
22.3 types of firewalls
22.4 firewall basing
22.5 firewall location and configurations
22.6 recommended reading and web sites
22.7 key terms,review questions,and problems
part seven legal and ethical issues
chapter 23 legal and ethical issues
23.1 cybercrime and computer crime
23.2 intellectual property
23.3 privacy
23.4 ethical issues
23.5 recommended reading and web sites
23.6 key terms,review questions,and problems
online appendices
williamstallings.com/crypto/crypto5e.html
appendix c sage problems
c.1 getting started with sage
c.2 programming with sage
c.3 chapter 2:classical encryption techniques
c.4 chapter 3:block ciphers and the data encryption standard
c.5 chapter 4:basic concepts in number theory and finite fields
c.6 chapter 5:advanced encryption standard
c.7 chapter 7:pseudorandom number generation and stream ciphers
c.8 chapter 8:number theory
c.9 chapter 9:public-key cryptography and rsa
c.10 chapter 10:other public-key cryptosystems
c.11 chapter 11:cryptographic hash functions
c.12 chapter 13:digital signatures
appendix d standards and standards-setting organizations
d.1 the importance of standards
d.2 internet standards and the internet society
d.3 national institute of standards and technology
appendix e basic concepts from linear algebra
e.1 operations on vectors and matrices
e.2 linear algebra operations over zn
appendix f measures of security and secrecy
f.1 perfect secrecy
f.2 information and entropy
f.3 entropy and secrecy
appendix g simplified des
g.1 overview
g.2 s-des key generation
g.3 s-des encryption
g.4 analysis of simplified des
g.5 relationship to des
appendix h evaluation criteria for aes
h.1 the origins of aes
h.2 aes evaluation
appendix i more on simplified aes
i.1 arithmetic in gf(24)
i.2 the mix column function
appendix j knapsack public-key algorithm
j.1 the knapsack problem
j.2 the knapsack cryptosystem
j.3 example
appendix k proof of the digital signature algorithm
appendix l tcp/ip and osi
l.1 protocols and protocol architectures
l.2 the tcp/ip protocol architecture
l.3 the role of an internet protocol
l.4 ipv4
l.5 ipv6
l.6 the osi protocol architecture
appendix m java cryptographic apis
m.1 introduction
m.2 jca and jce architecture
m.3 jca classes
m.4 jce classes
m.5 conclusion and references
m.6 using the cryptographic application
m.7 jca/jce cryptography example
appendix n the whirlpool hash function
n.1 whirlpool hash structure
n.2 block cipher w
n.3 performance of whirlpool
appendix o data compression using zip
o.1 compression algorithm
o.2 decompression algorithm
appendix p pgp random number generation
p.1 true random numbers
p.2 pseudorandom numbers
appendix q international reference alphabet
glossary
preface xv
about the author xxiii
chapter 0 reader s guide 1
0.1 outline of this book 2
0.2 a roadmap for readers and instructors 2
0.3 internet and web resources 4
0.4 standards 5
chapter 1 overview 7
1.1 computer security concepts 9
1.2 the osi security architecture 14
1.3 security attacks 15
1.4 security services 19
1.5 security mechanisms 23
1.6 a model for network security 25
1.7 recommended reading and web sites 27
1.8 key terms,review questions,and problems 29
part one symmetric ciphers 31
chapter 2 classical encryption techniques 31
2.1 symmetric cipher model 33
.2.2 substitution techniques 38
2.3 transposition techniques 53
2.4 rotor machines 55
2.5 steganography 57
2.6 recommended reading and web sites 59
2.7 key terms,review questions,and problems 60
chapter 3 block ciphers and the data encryption standard 66
3.1 block cipher principles 68
3.2 the data encryption standard (des) 77
3.3 a des example 85
3.4 the strength of des 88
3.5 differential and linear cryptanalysis 89
3.6 block cipher design principles 92
3.7 recommended reading and web site 96
3.8 key terms,review questions,and problems 97
chapter 4 basic concepts in number theory and finite fields 101
4.1 divisibility and the division algorithm 103
4.2 the euclidean algorithm 105
4.3 modular arithmetic 108
4.4 groups,rings,and fields 116
4.5 finite fields of the form gf(p) 120
4.6 polynomial arithmetic 122
4.7 finite fields of the form gf(2n) 129
4.8 recommended reading and web sites 141
4.9 key terms,review questions,and problems 141
appendix 4a the meaning of mod 144
chapter 5 advanced encryption standard 47
5.1 the origins aes 148
5.2 aes structure 150
5.3 aes round functions 155
5.4 aes key expansion 166
5.5 an aes example 169
5.6 aes implementation 174
5.7 recommended reading and web sites 178
5.8 key terms,review questions,and problems 179
appendix 5a polynomials with coefficients in gf(28) 180
appendix 5b simplified aes 183
chapter 6 block cipher operation 192
6.1 multiple encryption and triple des 193
6.2 electronic codebook mode 198
6.3 cipher block chaining mode 201
6.4 cipher feedback mode 203
6.5 output feedback mode 205
6.6 counter mode 206
6.7 xts mode for block-oriented storage devices 210
6.8 recommended web site 214
6.9 key terms,review questions,and problems 214
chapter 7 pseudorandom number generation and stream ciphers 218
7.1 principles of pseudorandom number generation 219
7.2 pseudorandom number generators 226
7.3 pseudorandom number generation using a block cipher 229
7.4 stream ciphers 232
7.5 rc4 234
7.6 true random numbers 237
7.7 recommended reading 238
7.8 key terms,review questions,and problems 239
part two asymmetric ciphers 243
chapter 8 more number theory 243
8.1 prime numbers 245
8.2 fermat s and euler s theorems 248
8.3 testing for primality 251
8.4 the chinese remainder theorem 254
8.5 discrete logarithms 257
8.6 recommended reading and web sites 262
8.7 key terms, review questions,and problems 263
chapter 9 public-key cryptography and rsa 266
9.1 principles of public-key cryptosystems 269
9.2 the rsa algorithm 277
9.3 recommended reading and web sites 291
9.4 key terms,review questions,and problems 291
appendix 9a proof of the rsa algorithm 296
appendix 9b the complexity of algorithms 297
chapter 10 other public-key cryptosystems 300
10.1 diffie-hellman key exchange 301
10.2 elgamal cryptosystem 305
10.3 elliptic curve arithmetic 308
10.4 elliptic curve cryptography 317
10.5 pseudorandom number generation based on an asymmetric cipher 321
10.6 recommended reading and web sites 323
10.7 key terms,review questions,and problems 324
part three cryptographic data integrity algorithms 327
chapter 11 cryptographic hash functions 327
11.1 applications of cryptographic hash functions 329
11.2 two simple hash functions 333
11.3 requirements and security 335
11.4 hash functions based on cipher block chaining 341
11.5 secure hash algorithm (sha) 342
11.6 sha-3 352
11.7 recommended reading and web sites 353
11.8 key terms,review questions,and problems 353
appendix 11a mathematical basis of birthday attack 356
chapter 12 message authentication codes 362
12.1 message authentication requirements 364
12.2 message authentication functions 365
12.3 message authentication codes 372
12.4 security of macs 374
12.5 macs based on hash functions:hmac 375
12.6 macs based on block ciphers:daa and cmac 380
12.7 authenticated encryption:ccm and gcm 383
12.8 pseudorandom number generation using hash functions and macs 389
12.9 recommended reading 392
12.10 key terms,review questions,and problems 393
chapter 13 digital signatures 395
13.1 digital signatures 396
13.2 elgamal digital signature scheme 400
13.3 schnorr digital signature scheme 402
13.4 digital signature standard (dss) 403
13.5 recommended reading and web sites 406
13.6 key terms,review questions,and problems 407
part four mutual trust 410
chapter 14 key management and distribution 410
14.1 symmetric key distribution using symmetric encryption 412
14.2 symmetric key distribution using asymmetric encryption 421
14.3 distribution of public keys 423
14.4 x.509 certificates 428
14.5 public key infrastructure 436
14.6 recommended reading and web sites 438
14.7 key terms,review questions,and problems 439
chapter 15 user authentication protocols 444
15.1 remote user authentication principles 445
15.2 remote user authentication using symmetric encryption 448
15.3 kerberos 452
15.4 remote user authentication using asymmetric encryption 470
15.5 federated identity management 472
15.6 recommended reading and web sites 478
15.7 key terms,review questions,and problems 479
appendix 15a kerberos encryption techniques 481
part five network and internet security 485
chapter 16 transport-level security 485
16.1 web security issues 486
16.2 secure sockets layer (ssl) 489
16.3 transport layer security (tls) 502
16.4 https 506
16.5 secure shell (ssh) 508
16.6 recommended reading and web sites 519
16.7 key terms,review questions,and problems 519
chapter 17 wireless network security 521
17.1 ieee 802.11 wireless lan overview 523
17.2 ieee 802.11i wireless lan security 529
17.3 wireless application protocol overview 543
17.4 wireless transport layer security 550
17.5 wap end-to-end security 560
17.6 recommended reading and web sites 563
17.7 key terms,review questions,and problems 563
chapter 18 electronic mail security 567
18.1 pretty good privacy (pgp) 568
18.2 s/mime 587
18.3 domainkeys identified mail (dkim) 603
18.4 recommended web sites 610
18.5 key terms,review questions,and problems 611
appendix 18a radix-64 conversion 612
chapter 19 ip security 615
19.1 ip security overview 616
19.2 ip security policy 622
19.3 encapsulating security payload 627
19.4 combining security associations 634
19.5 internet key exchange 638
19.6 cryptographic suites 647
19.7 recommended reading and web sites 648
19.8 key terms,review questions,and problems 649
appendices 651
appendix a projects for teaching cryptography and network security 651
a.1 sage computer algebra projects 652
a.2 hacking project 653
a.3 block cipher projects 653
a.4 laboratory exercises 654
a.5 research projects 654
a.6 programming projects 655
a.7 practical security assessments 655
a.8 writing assignments 655
a.9 reading/report assignments 656
appendix b sage examples 657
b.1 chapter 2:classical encryption techniques 659
b.2 chapter 3:block ciphers and the data encryption standard 662
b.3 chapter 4:basic concepts in number theory and finite fields 666
b.4 chapter 5:advanced encryption standard 673
b.5 chapter 6:pseudorandom number generation and stream ciphers 678
b.6 chapter 8:number theory 680
b.6 chapter 9:public-key cryptography and rsa 685
b.7 chapter 10:other public-key cryptosystems 688
b.8 chapter 11:cryptographic hash functions 693
b.9 chapter 13:digital signatures 695
references 699
index 711
online chapters
part six system security
chapter 20 intruders
20.1 intruders
20.2 intrusion detection
20.3 password management
20.4 recommended reading and web sites
20.5 key terms,review questions,and problems
appendix 20a the base-rate fallacy
chapter 21 malicious software
21.1 types of malicious software
21.2 viruses
21.3 virus countermeasures
21.4 worms
21.5 distributed denial of service attacks
21.6 recommended reading and web sites
21.7 key terms,review questions,and problems
chapter 22 firewalls
22.1 the need for firewalls
22.2 firewall characteristics
22.3 types of firewalls
22.4 firewall basing
22.5 firewall location and configurations
22.6 recommended reading and web sites
22.7 key terms,review questions,and problems
part seven legal and ethical issues
chapter 23 legal and ethical issues
23.1 cybercrime and computer crime
23.2 intellectual property
23.3 privacy
23.4 ethical issues
23.5 recommended reading and web sites
23.6 key terms,review questions,and problems
online appendices
williamstallings.com/crypto/crypto5e.html
appendix c sage problems
c.1 getting started with sage
c.2 programming with sage
c.3 chapter 2:classical encryption techniques
c.4 chapter 3:block ciphers and the data encryption standard
c.5 chapter 4:basic concepts in number theory and finite fields
c.6 chapter 5:advanced encryption standard
c.7 chapter 7:pseudorandom number generation and stream ciphers
c.8 chapter 8:number theory
c.9 chapter 9:public-key cryptography and rsa
c.10 chapter 10:other public-key cryptosystems
c.11 chapter 11:cryptographic hash functions
c.12 chapter 13:digital signatures
appendix d standards and standards-setting organizations
d.1 the importance of standards
d.2 internet standards and the internet society
d.3 national institute of standards and technology
appendix e basic concepts from linear algebra
e.1 operations on vectors and matrices
e.2 linear algebra operations over zn
appendix f measures of security and secrecy
f.1 perfect secrecy
f.2 information and entropy
f.3 entropy and secrecy
appendix g simplified des
g.1 overview
g.2 s-des key generation
g.3 s-des encryption
g.4 analysis of simplified des
g.5 relationship to des
appendix h evaluation criteria for aes
h.1 the origins of aes
h.2 aes evaluation
appendix i more on simplified aes
i.1 arithmetic in gf(24)
i.2 the mix column function
appendix j knapsack public-key algorithm
j.1 the knapsack problem
j.2 the knapsack cryptosystem
j.3 example
appendix k proof of the digital signature algorithm
appendix l tcp/ip and osi
l.1 protocols and protocol architectures
l.2 the tcp/ip protocol architecture
l.3 the role of an internet protocol
l.4 ipv4
l.5 ipv6
l.6 the osi protocol architecture
appendix m java cryptographic apis
m.1 introduction
m.2 jca and jce architecture
m.3 jca classes
m.4 jce classes
m.5 conclusion and references
m.6 using the cryptographic application
m.7 jca/jce cryptography example
appendix n the whirlpool hash function
n.1 whirlpool hash structure
n.2 block cipher w
n.3 performance of whirlpool
appendix o data compression using zip
o.1 compression algorithm
o.2 decompression algorithm
appendix p pgp random number generation
p.1 true random numbers
p.2 pseudorandom numbers
appendix q international reference alphabet
glossary
Cryptography and network security:principles and practices
- 名称
- 类型
- 大小
光盘服务联系方式: 020-38250260 客服QQ:4006604884
云图客服:
用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问
Video Player
×
Audio Player
×
pdf Player
×