Cryptography and Network Security Principles and Practice, 8th Edition - Pearson

Book description

Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

Table of contents

  1. Cover
  2. About Pearson
  3. Title Page
  4. Dedication
  5. Contents
  6. Notation
  7. Preface
  8. About the Author
  9. Part One: Background
    1. Chapter 1: Information and Network Security Concepts
      1. 1.1 Cybersecurity, Information Security, and Network Security
      2. 1.2 The OSI Security Architecture
      3. 1.3 Security Attacks
      4. 1.4 Security Services
      5. 1.5 Security Mechanisms
      6. 1.6 Cryptography
      7. 1.7 Network Security
      8. 1.8 Trust and Trustworthiness
      9. 1.9 Standards
      10. 1.10 Key Terms, Review Questions, and Problems
    2. Chapter 2: Introduction to Number Theory
      1. 2.1 Divisibility and the Division Algorithm
      2. 2.2 The Euclidean Algorithm
      3. 2.3 Modular Arithmetic
      4. 2.4 Prime Numbers
      5. 2.5 Fermat’s and Euler’s Theorems
      6. 2.6 Testing for Primality
      7. 2.7 The Chinese Remainder Theorem
      8. 2.8 Discrete Logarithms
      9. 2.9 Key Terms, Review Questions, and Problems
      10. Appendix 2A: The Meaning of Mod
  10. Part Two: Symmetric Ciphers
    1. Chapter 3: Classical Encryption Techniques
      1. 3.1 Symmetric Cipher Model
      2. 3.2 Substitution Techniques
      3. 3.3 Transposition Techniques
      4. 3.4 Key Terms, Review Questions, and Problems
    2. Chapter 4: Block Ciphers and the Data Encryption Standard
      1. 4.1 Traditional Block Cipher Structure
      2. 4.2 The Data Encryption Standard
      3. 4.3 A DES Example
      4. 4.4 The Strength of DES
      5. 4.5 Block Cipher Design Principles
      6. 4.6 Key Terms, Review Questions, and Problems
    3. Chapter 5: Finite Fields
      1. 5.1 Groups
      2. 5.2 Rings
      3. 5.3 Fields
      4. 5.4 Finite Fields of the Form GF(p)
      5. 5.5 Polynomial Arithmetic
      6. 5.6 Finite Fields of the Form GF(2n)
      7. 5.7 Key Terms, Review Questions, and Problems
    4. Chapter 6: Advanced Encryption Standard
      1. 6.1 Finite Field Arithmetic
      2. 6.2 AES Structure
      3. 6.3 AES Transformation Functions
      4. 6.4 AES Key Expansion
      5. 6.5 An AES Example
      6. 6.6 AES Implementation
      7. 6.7 Key Terms, Review Questions, and Problems
      8. Appendix 6A: Polynomials with Coefficients in GF(28)
    5. Chapter 7: Block Cipher Operation
      1. 7.1 Multiple Encryption and Triple DES
      2. 7.2 Electronic CodeBook
      3. 7.3 Cipher Block Chaining Mode
      4. 7.4 Cipher Feedback Mode
      5. 7.5 Output Feedback Mode
      6. 7.6 Counter Mode
      7. 7.7 XTS-AES Mode for Block-Oriented Storage Devices
      8. 7.8 Format-Preserving Encryption
      9. 7.9 Key Terms, Review Questions, and Problems
    6. Chapter 8: Random Bit Generation and Stream Ciphers
      1. 8.1 Principles of Pseudorandom Number Generation
      2. 8.2 Pseudorandom Number Generators
      3. 8.3 Pseudorandom Number Generation Using a Block Cipher
      4. 8.4 Stream Ciphers
      5. 8.5 RC4
      6. 8.6 Stream Ciphers Using Feedback Shift Registers
      7. 8.7 True Random Number Generators
      8. 8.8 Key Terms, Review Questions, and Problems
  11. Part Three: Asymmetric Ciphers
    1. Chapter 9: Public-Key Cryptography and RSA
      1. 9.1 Principles of Public-Key Cryptosystems
      2. 9.2 The RSA Algorithm
      3. 9.3 Key Terms, Review Questions, and Problems
    2. Chapter 10: Other Public-Key Cryptosystems
      1. 10.1 Diffie–Hellman Key Exchange
      2. 10.2 Elgamal Cryptographic System
      3. 10.3 Elliptic Curve Arithmetic
      4. 10.4 Elliptic Curve Cryptography
      5. 10.5 Key Terms, Review Questions, and Problems
  12. Part Four: Cryptographic Data Integrity Algorithms
    1. Chapter 11: Cryptographic Hash Functions
      1. 11.1 Applications of Cryptographic Hash Functions
      2. 11.2 Two Simple Hash Functions
      3. 11.3 Requirements and Security
      4. 11.4 Secure Hash Algorithm (SHA)
      5. 11.5 SHA-3
      6. 11.6 Key Terms, Review Questions, and Problems
    2. Chapter 12: Message Authentication Codes
      1. 12.1 Message Authentication Requirements
      2. 12.2 Message Authentication Functions
      3. 12.3 Requirements for Message Authentication Codes
      4. 12.4 Security of MACs
      5. 12.5 MACs Based on Hash Functions: HMAC
      6. 12.6 MACs Based on Block Ciphers: DAA and CMAC
      7. 12.7 Authenticated Encryption: CCM and GCM
      8. 12.8 Key Wrapping
      9. 12.9 Pseudorandom Number Generation Using Hash Functions and MACs
      10. 12.10 Key Terms, Review Questions, and Problems
    3. Chapter 13: Digital Signatures
      1. 13.1 Digital Signatures
      2. 13.2 ElGamal Digital Signature Scheme
      3. 13.3 Schnorr Digital Signature Scheme
      4. 13.4 NIST Digital Signature Algorithm
      5. 13.5 Elliptic Curve Digital Signature Algorithm
      6. 13.6 RSA-PSS Digital Signature Algorithm
      7. 13.7 Key Terms, Review Questions, and Problems
    4. Chapter 14: Lightweight Cryptography and Post-Quantum Cryptography
      1. 14.1 Lightweight Cryptography Concepts
      2. 14.2 Lightweight Cryptographic Algorithms
      3. 14.3 Post-Quantum Cryptography Concepts
      4. 14.4 Post-Quantum Cryptographic Algorithms
      5. 14.5 Key Terms and Review Questions
  13. Part Five: Mutual Trust
    1. Chapter 15: Cryptographic Key Management and Distribution
      1. 15.1 Symmetric Key Distribution Using Symmetric Encryption
      2. 15.2 Symmetric Key Distribution Using Asymmetric Encryption
      3. 15.3 Distribution of Public Keys
      4. 15.4 X.509 Certificates
      5. 15.5 Public-Key Infrastructure
      6. 15.6 Key Terms, Review Questions, and Problems
    2. Chapter 16: User Authentication
      1. 16.1 Remote User-Authentication Principles
      2. 16.2 Remote User-Authentication Using Symmetric Encryption
      3. 16.3 Kerberos
      4. 16.4 Remote User-Authentication Using Asymmetric Encryption
      5. 16.5 Federated Identity Management
      6. 16.6 Key Terms, Review Questions, and Problems
  14. Part Six: Network and Internet Security
    1. Chapter 17: Transport-Level Security
      1. 17.1 Web Security Considerations
      2. 17.2 Transport Layer Security
      3. 17.3 HTTPS
      4. 17.4 Secure Shell (SSH)
      5. 17.5 Review Questions and Problems
    2. Chapter 18: Wireless Network Security
      1. 18.1 Wireless Security
      2. 18.2 Mobile Device Security
      3. 18.3 IEEE 802.11 Wireless Lan Overview
      4. 18.4 IEEE 802.11i Wireless Lan Security
      5. 18.5 Key Terms, Review Questions, and Problems
    3. Chapter 19: Electronic Mail Security
      1. 19.1 Internet Mail Architecture
      2. 19.2 Email Formats
      3. 19.3 Email Threats and Comprehensive Email Security
      4. 19.4 S/MIME
      5. 19.5 DNSSEC
      6. 19.6 DNS-Based Authentication of Named Entities
      7. 19.7 Sender Policy Framework
      8. 19.8 DomainKeys Identified Mail
      9. 19.9 Domain-Based Message Authentication, Reporting, and Conformance
      10. 19.10 Key Terms, Review Questions, and Problems
    4. Chapter 20: IP Security
      1. 20.1 IP Security Overview
      2. 20.2 IP Security Policy
      3. 20.3 Encapsulating Security Payload
      4. 20.4 Combining Security Associations
      5. 20.5 Internet Key Exchange
      6. 20.6 Key Terms, Review Questions, and Problems
    5. Chapter 21: Network Endpoint Security
      1. 21.1 Firewalls
      2. 21.2 Intrusion Detection Systems
      3. 21.3 Malicious Software
      4. 21.4 Distributed Denial of Service Attacks
      5. 21.5 Key Terms, Review Questions, and Problems
    6. Chapter 22: Cloud Security
      1. 22.1 Cloud Computing
      2. 22.2 Cloud Security Concepts
      3. 22.3 Cloud Security Risks and Countermeasures
      4. 22.4 Cloud Security as a Service
      5. 22.5 An Open-Source Cloud Security Module
      6. 22.6 Key Terms and Review Questions
    7. Chapter 23: Internet of Things (IoT) Security
      1. 23.1 The Internet of Things
      2. 23.2 IoT Security Concepts and Objectives
      3. 23.3 An Open-Source IoT Security Module
      4. 23.4 Key Terms and Review Questions
  15. Appendix A: Basic Concepts from Linear Algebra
    1. A.1 Operations on Vectors and Matrices
    2. A.2 Linear Algebra Operations over Zn
  16. Appendix B: Measures of Secrecy and Security
    1. B.1 Conditional Probability
    2. B.2 Perfect Secrecy
    3. B.3 Information and Entropy
    4. B.4 Entropy and Secrecy
    5. B.5 Min-Entropy
  17. Appendix C: Data Encryption Standard
  18. Appendix D: Simplified AES
    1. D.1 Overview
    2. D.2 S-AES Encryption and Decryption
    3. D.3 Key Expansion
    4. D.4 The S-Box
    5. D.5 S-AES Structure
    6. AnnexD.1 Arithmetic in GF(24)
    7. AnnexD.2 The Mix Column Function
  19. Appendix E: Mathematical Basis of the Birthday Attack
    1. E.1 Related Problem
    2. E.2 The Birthday Paradox
    3. E.3 Useful Inequality
    4. E.4 The General Case of Duplications
    5. E.5 Overlap Between Two Sets
  20. Glossary
  21. References
  22. Index
  23. Acronyms
  24. Copyright

Product information

  • Title: Cryptography and Network Security Principles and Practice, 8th Edition - Pearson
  • Author(s): William Stallings
  • Release date: December 2023
  • Publisher(s): Pearson India
  • ISBN: 9789357054911