Cryptography and Network Security Principles and Practices, Fourth Edition
By William Stallings
Publisher: Prentice Hall
Pub Date: November 16, 2005
Print ISBN-10: 0-13-187316-4
Print ISBN-13: 978-0-13-187316-2
eText ISBN-10: 0-13-187319-9• Table of Contents
• IndexeText ISBN-13: 978-0-13-187319-3
Pages: 592
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.
As the disciplines of cryptography and network security have matured, more practical, readily available
applications to enforce network security have developed. This text provides a practical survey of both the
principles and practice of cryptography and network security. First, the basic issues to be addressed by a
network security capability are explored through a tutorial and survey of cryptography and network security
technology. Then, the practice of network security is explored via practical applications that have been
implemented and are in use today.
Cryptography and Network Security Principles and Practices, Fourth Edition
By William Stallings
Publisher: Prentice Hall
Pub Date: November 16, 2005
Print ISBN-10: 0-13-187316-4
Print ISBN-13: 978-0-13-187316-2
eText ISBN-10: 0-13-187319-9• Table of Contents
• IndexeText ISBN-13: 978-0-13-187319-3
Pages: 592
Copyright
Notation
Preface
Objectives
Intended Audience
Plan of the Book
Internet Services for Instructors and Students
Projects for Teaching Cryptography and Network Security
What's New in the Fourth Edition
Acknowledgments
Chapter 0. Reader's Guide
Section 0.1. Outline of this Book
Section 0.2. Roadmap
Section 0.3. Internet and Web Resources
Chapter 1. Introduction
Section 1.1. Security Trends
Section 1.2. The OSI Security Architecture
Section 1.3. Security Attacks
Section 1.4. Security Services
Section 1.5. Security Mechanisms
Section 1.6. A Model for Network Security
Section 1.7. Recommended Reading and Web Sites
Section 1.8. Key Terms, Review Questions, and Problems
Part One: Symmetric Ciphers
Chapter 2. Classical Encryption Techniques
Section 2.1. Symmetric Cipher Model
Section 2.2. Substitution Techniques
Section 2.3. Transposition Techniques
Section 2.4. Rotor Machines
Section 2.5. Steganography
Section 2.6. Recommended Reading and Web Sites
Section 2.7. Key Terms, Review Questions, and Problems
Chapter 3. Block Ciphers and the Data Encryption Standard
Section 3.1. Block Cipher Principles
xi
xiii
xiii
xiii
xiv
xiv
xiv
xv
xvi
1
2
2
4
6
9
12
13
16
19
22
24
25
26
28
30
35
49
51
53
55
56
62
64