Normal view MARC view ISBD view

Cryptography and network security : principles and practice

By: Stallings, William
Publisher: Boston : Pearson Education Limited, c2017.Edition: 7th global ed.Description: 766 p. : ill. ; 24 cm.ISBN: 9781292158587Subject(s): Computer networks -- Security measures | Data encryption (Computer science)DDC classification: 005.8 ST CR Online resources: Location Map
Summary:
The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 ST CR (Browse shelf) Available T0064774
REGULAR University of Wollongong in Dubai
Main Collection
005.8 ST CR (Browse shelf) Available T0065197
REGULAR University of Wollongong in Dubai
Main Collection
005.8 ST CR (Browse shelf) Available T0064773
Total holds: 0

Part Four: Cryptographic Data Integrity Algorithms.

Cover; Notation; Preface; Contents; About the Author; Part One: Background; Chapter 1 Computer and Network Security Concepts; 1.1 Computer Security Concepts; 1.2 The OSI Security Architecture; 1.3 Security Attacks; 1.4 Security Services; 1.5 Security Mechanisms; 1.6 Fundamental Security Design Principles; 1.7 Attack Surfaces and Attack Trees; 1.8 A Model for Network Security; 1.9 Standards; 1.10 Key Terms, Review Questions, and Problems; Chapter 2 Introduction to Number Theory; 2.1 Divisibility and the Division Algorithm; 2.2 The Euclidean Algorithm; 2.3 Modular Arithmetic; 2.4 Prime Numbers. 2.5 Fermat's and Euler's Theorems2.6 Testing for Primality; 2.7 The Chinese Remainder Theorem; 2.8 Discrete Logarithms; 2.9 Key Terms, Review Questions, and Problems; Appendix 2A The Meaning of Mod; Part Two: Symmetric Ciphers; Chapter 3 Classical Encryption Techniques; 3.1 Symmetric Cipher Model; 3.2 Substitution Techniques; 3.3 Transposition Techniques; 3.4 Rotor Machines; 3.5 Steganography; 3.6 Key Terms, Review Questions, and Problems; Chapter 4 Block Ciphers and the Data Encryption Standard; 4.1 Traditional Block Cipher Structure; 4.2 The Data Encryption Standard; 4.3 A DES Example. 4.4 The Strength of DES4.5 Block Cipher Design Principles; 4.6 Key Terms, Review Questions, and Problems; Chapter 5 Finite Fields; 5.1 Groups; 5.2 Rings; 5.3 Fields; 5.4 Finite Fields of the Form GF(p); 5.5 Polynomial Arithmetic; 5.6 Finite Fields of the Form GF(2n); 5.7 Key Terms, Review Questions, and Problems; Chapter 6 Advanced Encryption Standard; 6.1 Finite Field Arithmetic; 6.2 AES Structure; 6.3 AES Transformation Functions; 6.4 AES Key Expansion; 6.5 An AES Example; 6.6 AES Implementation; 6.7 Key Terms, Review Questions, and Problems. Appendix 6A Polynomials with Coefficients in GF(28)Chapter 7 Block Cipher Operation; 7.1 Multiple Encryption and Triple DES; 7.2 Electronic Codebook; 7.3 Cipher Block Chaining Mode; 7.4 Cipher Feedback Mode; 7.5 Output Feedback Mode; 7.6 Counter Mode; 7.7 XTS-AES Mode for Block-Oriented Storage Devices; 7.8 Format-Preserving Encryption; 7.9 Key Terms, Review Questions, and Problems; Chapter 8 Random Bit Generation and Stream Ciphers; 8.1 Principles of Pseudorandom Number Generation; 8.2 Pseudorandom Number Generators; 8.3 Pseudorandom Number Generation Using a Block Cipher; 8.4 Stream Ciphers. 8.5 RC48.6 True Random Number Generators; 8.7 Key Terms, Review Questions, and Problems; Part Three: Asymmetric Ciphers 283; Chapter 9 Public-Key Cryptography and RSA; 9.1 Principles of Public-Key Cryptosystems; 9.2 The RSA Algorithm; 9.3 Key Terms, Review Questions, and Problems; Chapter 10 Other Public-Key Cryptosystems; 10.1 Diffie-Hellman Key Exchange; 10.2 Elgamal Cryptographic System; 10.3 Elliptic Curve Arithmetic; 10.4 Elliptic Curve Cryptography; 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher; 10.6 Key Terms, Review Questions, and Problems.

The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues.

Powered by Koha