Cryptography and network security:principles and practices

副标题:无

作   者:(美)William Stallings著

分类号:

ISBN:9787121119910

微信扫一扫,移动浏览光盘

简介

   本书系统介绍了密码编码学与网络安全的基本原理和应用技术。全书   主要包括五个部分:对称密码部分讲解传统加密技术、高级加密标准等;   非对称密码部分讲解数论、公钥加密、RSA;第三部分讨论了加密哈希函数   、消息认证、数字签名等主题;第四部分分析了密钥管理、用户认证协议   ;网络与Internet安全部分探讨的是传输层安全、无线网络安全、电子邮   件安全及IP安全的问题。最后,两个附录给出了各章的项目练习和一些例   子。配套网站包含大量的延伸性内容。    本书可作为高校计算机专业、网络安全专业、通信安全专业等相关专   业的本科生和研究生的教材,也可供相关技术人员参考使用。   

目录

notation xiii

preface xv

about the author xxiii

chapter 0 reader s guide 1

0.1 outline of this book 2

0.2 a roadmap for readers and instructors 2

0.3 internet and web resources 4

0.4 standards 5

chapter 1 overview 7

1.1 computer security concepts 9

1.2 the osi security architecture 14

1.3 security attacks 15

1.4 security services 19

1.5 security mechanisms 23

1.6 a model for network security 25

1.7 recommended reading and web sites 27

1.8 key terms,review questions,and problems 29

part one symmetric ciphers 31

chapter 2 classical encryption techniques 31

2.1 symmetric cipher model 33

.2.2 substitution techniques 38

2.3 transposition techniques 53

2.4 rotor machines 55

2.5 steganography 57

2.6 recommended reading and web sites 59

2.7 key terms,review questions,and problems 60

chapter 3 block ciphers and the data encryption standard 66

3.1 block cipher principles 68

3.2 the data encryption standard (des) 77

3.3 a des example 85

3.4 the strength of des 88

3.5 differential and linear cryptanalysis 89

3.6 block cipher design principles 92

3.7 recommended reading and web site 96

3.8 key terms,review questions,and problems 97

chapter 4 basic concepts in number theory and finite fields 101

4.1 divisibility and the division algorithm 103

4.2 the euclidean algorithm 105

4.3 modular arithmetic 108

4.4 groups,rings,and fields 116

4.5 finite fields of the form gf(p) 120

4.6 polynomial arithmetic 122

4.7 finite fields of the form gf(2n) 129

4.8 recommended reading and web sites 141

4.9 key terms,review questions,and problems 141

appendix 4a the meaning of mod 144

chapter 5 advanced encryption standard 47

5.1 the origins aes 148

5.2 aes structure 150

5.3 aes round functions 155

5.4 aes key expansion 166

5.5 an aes example 169

5.6 aes implementation 174

5.7 recommended reading and web sites 178

5.8 key terms,review questions,and problems 179

appendix 5a polynomials with coefficients in gf(28) 180

appendix 5b simplified aes 183

chapter 6 block cipher operation 192

6.1 multiple encryption and triple des 193

6.2 electronic codebook mode 198

6.3 cipher block chaining mode 201

6.4 cipher feedback mode 203

6.5 output feedback mode 205

6.6 counter mode 206

6.7 xts mode for block-oriented storage devices 210

6.8 recommended web site 214

6.9 key terms,review questions,and problems 214

chapter 7 pseudorandom number generation and stream ciphers 218

7.1 principles of pseudorandom number generation 219

7.2 pseudorandom number generators 226

7.3 pseudorandom number generation using a block cipher 229

7.4 stream ciphers 232

7.5 rc4 234

7.6 true random numbers 237

7.7 recommended reading 238

7.8 key terms,review questions,and problems 239

part two asymmetric ciphers 243

chapter 8 more number theory 243

8.1 prime numbers 245

8.2 fermat s and euler s theorems 248

8.3 testing for primality 251

8.4 the chinese remainder theorem 254

8.5 discrete logarithms 257

8.6 recommended reading and web sites 262

8.7 key terms, review questions,and problems 263

chapter 9 public-key cryptography and rsa 266

9.1 principles of public-key cryptosystems 269

9.2 the rsa algorithm 277

9.3 recommended reading and web sites 291

9.4 key terms,review questions,and problems 291

appendix 9a proof of the rsa algorithm 296

appendix 9b the complexity of algorithms 297

chapter 10 other public-key cryptosystems 300

10.1 diffie-hellman key exchange 301

10.2 elgamal cryptosystem 305

10.3 elliptic curve arithmetic 308

10.4 elliptic curve cryptography 317

10.5 pseudorandom number generation based on an asymmetric cipher 321

10.6 recommended reading and web sites 323

10.7 key terms,review questions,and problems 324

part three cryptographic data integrity algorithms 327

chapter 11 cryptographic hash functions 327

11.1 applications of cryptographic hash functions 329

11.2 two simple hash functions 333

11.3 requirements and security 335

11.4 hash functions based on cipher block chaining 341

11.5 secure hash algorithm (sha) 342

11.6 sha-3 352

11.7 recommended reading and web sites 353

11.8 key terms,review questions,and problems 353

appendix 11a mathematical basis of birthday attack 356

chapter 12 message authentication codes 362

12.1 message authentication requirements 364

12.2 message authentication functions 365

12.3 message authentication codes 372

12.4 security of macs 374

12.5 macs based on hash functions:hmac 375

12.6 macs based on block ciphers:daa and cmac 380

12.7 authenticated encryption:ccm and gcm 383

12.8 pseudorandom number generation using hash functions and macs 389

12.9 recommended reading 392

12.10 key terms,review questions,and problems 393

chapter 13 digital signatures 395

13.1 digital signatures 396

13.2 elgamal digital signature scheme 400

13.3 schnorr digital signature scheme 402

13.4 digital signature standard (dss) 403

13.5 recommended reading and web sites 406

13.6 key terms,review questions,and problems 407

part four mutual trust 410

chapter 14 key management and distribution 410

14.1 symmetric key distribution using symmetric encryption 412

14.2 symmetric key distribution using asymmetric encryption 421

14.3 distribution of public keys 423

14.4 x.509 certificates 428

14.5 public key infrastructure 436

14.6 recommended reading and web sites 438

14.7 key terms,review questions,and problems 439

chapter 15 user authentication protocols 444

15.1 remote user authentication principles 445

15.2 remote user authentication using symmetric encryption 448

15.3 kerberos 452

15.4 remote user authentication using asymmetric encryption 470

15.5 federated identity management 472

15.6 recommended reading and web sites 478

15.7 key terms,review questions,and problems 479

appendix 15a kerberos encryption techniques 481

part five network and internet security 485

chapter 16 transport-level security 485

16.1 web security issues 486

16.2 secure sockets layer (ssl) 489

16.3 transport layer security (tls) 502

16.4 https 506

16.5 secure shell (ssh) 508

16.6 recommended reading and web sites 519

16.7 key terms,review questions,and problems 519

chapter 17 wireless network security 521

17.1 ieee 802.11 wireless lan overview 523

17.2 ieee 802.11i wireless lan security 529

17.3 wireless application protocol overview 543

17.4 wireless transport layer security 550

17.5 wap end-to-end security 560

17.6 recommended reading and web sites 563

17.7 key terms,review questions,and problems 563

chapter 18 electronic mail security 567

18.1 pretty good privacy (pgp) 568

18.2 s/mime 587

18.3 domainkeys identified mail (dkim) 603

18.4 recommended web sites 610

18.5 key terms,review questions,and problems 611

appendix 18a radix-64 conversion 612

chapter 19 ip security 615

19.1 ip security overview 616

19.2 ip security policy 622

19.3 encapsulating security payload 627

19.4 combining security associations 634

19.5 internet key exchange 638

19.6 cryptographic suites 647

19.7 recommended reading and web sites 648

19.8 key terms,review questions,and problems 649

appendices 651

appendix a projects for teaching cryptography and network security 651

a.1 sage computer algebra projects 652

a.2 hacking project 653

a.3 block cipher projects 653

a.4 laboratory exercises 654

a.5 research projects 654

a.6 programming projects 655

a.7 practical security assessments 655

a.8 writing assignments 655

a.9 reading/report assignments 656

appendix b sage examples 657

b.1 chapter 2:classical encryption techniques 659

b.2 chapter 3:block ciphers and the data encryption standard 662

b.3 chapter 4:basic concepts in number theory and finite fields 666

b.4 chapter 5:advanced encryption standard 673

b.5 chapter 6:pseudorandom number generation and stream ciphers 678

b.6 chapter 8:number theory 680

b.6 chapter 9:public-key cryptography and rsa 685

b.7 chapter 10:other public-key cryptosystems 688

b.8 chapter 11:cryptographic hash functions 693

b.9 chapter 13:digital signatures 695

references 699

index 711

online chapters

part six system security

chapter 20 intruders

20.1 intruders

20.2 intrusion detection

20.3 password management

20.4 recommended reading and web sites

20.5 key terms,review questions,and problems

appendix 20a the base-rate fallacy

chapter 21 malicious software

21.1 types of malicious software

21.2 viruses

21.3 virus countermeasures

21.4 worms

21.5 distributed denial of service attacks

21.6 recommended reading and web sites

21.7 key terms,review questions,and problems

chapter 22 firewalls

22.1 the need for firewalls

22.2 firewall characteristics

22.3 types of firewalls

22.4 firewall basing

22.5 firewall location and configurations

22.6 recommended reading and web sites

22.7 key terms,review questions,and problems

part seven legal and ethical issues

chapter 23 legal and ethical issues

23.1 cybercrime and computer crime

23.2 intellectual property

23.3 privacy

23.4 ethical issues

23.5 recommended reading and web sites

23.6 key terms,review questions,and problems

online appendices

williamstallings.com/crypto/crypto5e.html

appendix c sage problems

c.1 getting started with sage

c.2 programming with sage

c.3 chapter 2:classical encryption techniques

c.4 chapter 3:block ciphers and the data encryption standard

c.5 chapter 4:basic concepts in number theory and finite fields

c.6 chapter 5:advanced encryption standard

c.7 chapter 7:pseudorandom number generation and stream ciphers

c.8 chapter 8:number theory

c.9 chapter 9:public-key cryptography and rsa

c.10 chapter 10:other public-key cryptosystems

c.11 chapter 11:cryptographic hash functions

c.12 chapter 13:digital signatures

appendix d standards and standards-setting organizations

d.1 the importance of standards

d.2 internet standards and the internet society

d.3 national institute of standards and technology

appendix e basic concepts from linear algebra

e.1 operations on vectors and matrices

e.2 linear algebra operations over zn

appendix f measures of security and secrecy

f.1 perfect secrecy

f.2 information and entropy

f.3 entropy and secrecy

appendix g simplified des

g.1 overview

g.2 s-des key generation

g.3 s-des encryption

g.4 analysis of simplified des

g.5 relationship to des

appendix h evaluation criteria for aes

h.1 the origins of aes

h.2 aes evaluation

appendix i more on simplified aes

i.1 arithmetic in gf(24)

i.2 the mix column function

appendix j knapsack public-key algorithm

j.1 the knapsack problem

j.2 the knapsack cryptosystem

j.3 example

appendix k proof of the digital signature algorithm

appendix l tcp/ip and osi

l.1 protocols and protocol architectures

l.2 the tcp/ip protocol architecture

l.3 the role of an internet protocol

l.4 ipv4

l.5 ipv6

l.6 the osi protocol architecture

appendix m java cryptographic apis

m.1 introduction

m.2 jca and jce architecture

m.3 jca classes

m.4 jce classes

m.5 conclusion and references

m.6 using the cryptographic application

m.7 jca/jce cryptography example

appendix n the whirlpool hash function

n.1 whirlpool hash structure

n.2 block cipher w

n.3 performance of whirlpool

appendix o data compression using zip

o.1 compression algorithm

o.2 decompression algorithm

appendix p pgp random number generation

p.1 true random numbers

p.2 pseudorandom numbers

appendix q international reference alphabet

glossary


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Cryptography and network security:principles and practices
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon