Top Banner
3

Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings

Oct 15, 2014

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings
Page 2: Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings

Cryptography and Network Security Principles and Practices, Fourth Edition

By William Stallings

Publisher: Prentice Hall

Pub Date: November 16, 2005

Print ISBN-10: 0-13-187316-4

Print ISBN-13: 978-0-13-187316-2

eText ISBN-10: 0-13-187319-9• Table of Contents

• IndexeText ISBN-13: 978-0-13-187319-3

Pages: 592

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of cryptography and network security have matured, more practical, readily available

applications to enforce network security have developed. This text provides a practical survey of both the

principles and practice of cryptography and network security. First, the basic issues to be addressed by a

network security capability are explored through a tutorial and survey of cryptography and network security

technology. Then, the practice of network security is explored via practical applications that have been

implemented and are in use today.

Page 3: Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings

Cryptography and Network Security Principles and Practices, Fourth Edition

By William Stallings

Publisher: Prentice Hall

Pub Date: November 16, 2005

Print ISBN-10: 0-13-187316-4

Print ISBN-13: 978-0-13-187316-2

eText ISBN-10: 0-13-187319-9• Table of Contents

• IndexeText ISBN-13: 978-0-13-187319-3

Pages: 592

Copyright

Notation

Preface

Objectives

Intended Audience

Plan of the Book

Internet Services for Instructors and Students

Projects for Teaching Cryptography and Network Security

What's New in the Fourth Edition

Acknowledgments

Chapter 0. Reader's Guide

Section 0.1. Outline of this Book

Section 0.2. Roadmap

Section 0.3. Internet and Web Resources

Chapter 1. Introduction

Section 1.1. Security Trends

Section 1.2. The OSI Security Architecture

Section 1.3. Security Attacks

Section 1.4. Security Services

Section 1.5. Security Mechanisms

Section 1.6. A Model for Network Security

Section 1.7. Recommended Reading and Web Sites

Section 1.8. Key Terms, Review Questions, and Problems

Part One: Symmetric Ciphers

Chapter 2. Classical Encryption Techniques

Section 2.1. Symmetric Cipher Model

Section 2.2. Substitution Techniques

Section 2.3. Transposition Techniques

Section 2.4. Rotor Machines

Section 2.5. Steganography

Section 2.6. Recommended Reading and Web Sites

Section 2.7. Key Terms, Review Questions, and Problems

Chapter 3. Block Ciphers and the Data Encryption Standard

Section 3.1. Block Cipher Principles

xi

xiii

xiii

xiii

xiv

xiv

xiv

xv

xvi

1

2

2

4

6

9

12

13

16

19

22

24

25

26

28

30

35

49

51

53

55

56

62

64