tailieunhanh - Cryptography and Network Security Principles and Practices, Fourth Edition

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented. | Table of Contents Cryptography and Network Security Principles and Practices Fourth Edition. 1 Table of Contents Copyright. Notation. Preface. Objectives . Intended Audience Plan of the Book. Internet Services for Instructors and Students . Projects for Teaching Cryptography and Network Security. What s New in the Fourth Edition . Acknowledgments . Chapter 0. Reader s Guide. Section . Outline of this Book. Section . Roadmap . Section . Internet and Web Resources . Chapter 1. Introduction. Section . Security Trends . Section . The OSI Security Architecture . Section . Security Attacks . Section . Security Services . Section . Security Mechanisms . Section . A Model for Network Security. Section . Recommended Reading and Web Sites . Section . Key Terms Review Questions and Problems . Part One Symmetric Ciphers. Chapter 2. Classical Encryption Techniques . Section . Symmetric Cipher Model . Section . Substitution Techniques . Section . Transposition Techniques . Section . Rotor Machines . Section . Steganography . Section . Recommended Reading and Web Sites . Section . Key Terms Review Questions and Problems . Chapter 3. Block Ciphers and the Data Encryption Standard . Section . Block Cipher Principles . Section . The Data Encryption Standard . Section . The Strength of Des . Section . Differential and Linear Cryptanalysis . Section . Block Cipher Design Principles . Section . Recommended Reading . Section . Key Terms Review Questions and Problems . Chapter 4. Finite Fields . Section . Groups Rings and Fields . Section . Modular Arithmetic . Section . The Euclidean Algorithm . Section . Finite Fields of The Form GF p . Section . Polynomial Arithmetic . Section . Finite Fields Of the Form GF 2n . 100 Section . Recommended Reading and Web Sites . 106 Section . Key Terms Review Questions and Problems . 107 Chapter 5. Advanced Encryption Standard . 111 Section . .

TỪ KHÓA LIÊN QUAN