Formatted contents note |
Chapter 0 reader's guide 1<br/>Outline of this book 2<br/>Roadmap 2<br/>Internet and web resources 4<br/>Chapter 1 introduction 6<br/>Security trends 9<br/>The osi security architecture 12<br/>Security attacks 13<br/>Security services 16<br/>Security mechanisms 19<br/>A model for network security 22<br/>Recommended reading and web sites 24<br/>Key terms, review questions, and problems 25<br/>Part one symmetric ciphers 26<br/>Chapter 2 classical encryption techniques 28<br/>2.1 symmetric cipher model 30<br/>2.2 substitution techniques 35<br/>2.3 transposition techniques 49<br/>2.4 rotor machines 51<br/>2.5 steganography 53<br/>2.6 recommended reading and web sites 55<br/>2.7 key terms, review questions, and problems 56<br/>Chapter 3 block ciphers and the data encryption standard 62<br/>3.1 block cipher principles 64<br/>3.2 the data encryption standard 72<br/>3.3 the strength of des 82<br/>3.4 differential and linear cryptanalysis 83<br/>3.5 block cipher design principles 86<br/>3.6 recommended reading 90<br/>3.7 key terms, review questions, and problems 90<br/>Chapter 4 finite fields 95<br/>4.1 groups, rings, and fields 97<br/>4.2 modular arithmetic 101<br/>4.3 the euclidean algorithm 107<br/>4.4 finite fields of the form gf(p) 109<br/>4.5 polynomial arithmetic 113<br/>4.6 finite fields of the form gf(2") 119<br/>4.7 recommended reading and web sites 129<br/>4.8 keyterms, review questions, and problems 130<br/>Chapter 5 advanced encryption standard 134<br/>5.1 evaluation criteria foraes 135<br/>5.2 the aes cipher 140<br/>5.3 recommended reading and web sites 160<br/>5.4 key terms, review questions, and problems 161<br/>Appendix 5a polynomials with coefficients in gf(28) 163<br/>Appendix 5b simplified aes 165<br/>Chapter 6 more on symmetric ciphers 174<br/>6.1 multiple encryption and triple des 175<br/>6.2 block cipher modes of operation 181<br/>6.3 stream ciphers and rc4 189<br/>6.4 recommended reading and web site 194<br/>6.5 key terms, review questions, and problems 194<br/>Chapter 7 confidentiality using symmetric encryption 199<br/>7.1 placement of encryption function 201<br/>7.2 traffic confidentiality 209<br/>7.3 key distribution 210<br/>7.4 random number generation 218<br/>7.5 recommended reading and web sites 227<br/>7.6 key terms, review questions, and problems 228<br/>Part two public-key encryption and hash functions 232<br/>Chapter 8 introduction to number theory 234<br/>8.1 prime numbers 236<br/>8.2 fermat's and euler's theorems 238<br/>8.3 testing for primality 242<br/>8.4 the chinese remainder theorem 245<br/>8.5 discrete logarithms 247<br/>8.6 recommended reading and web site 253<br/>8.7 key terms, review questions, and problems 254<br/>Chapter 9 public-key cryptography and rsa 257<br/>9.1 principles of public-key cryptosystems 259<br/>9.2 the rsa algorithm 268<br/>9.3 recommended reading and web site 280<br/>9.4 key terms, review questions, and problems 281<br/>Appendix 9a proof of the rsa algorithm 285<br/>Appendix 9b the complexity of algorithms 286<br/>Chapter 10 key management; other public-key cryptosystems 289<br/>10.1 key management 290<br/>10.2 diffie-hellman key exchange 298<br/>10.3 elliptic curve arithmetic 301<br/>10.4 elliptic curve cryptography 310<br/>10.5 recommended reading and web site 313<br/>10.6 key terms, review questions, and problems 314<br/>Chapter 11 message authentication and hash functions 317<br/>11.1 authentication requirements 319<br/>11.2 authentication functions 320<br/>11.3 message authentication codes 331<br/>11.4 hash functions 334<br/>11.5 security of hash functions and macs 340<br/>11.6 recommended reading 344<br/>11.7 key terms, review questions, and problems 344<br/>Appendix 11 a mathematical basis of the birthday attack 346<br/>Chapter 12 hash and mac algorithms 351<br/>12.1 secure hash algorithm 353<br/>12.2 whirlpool 358<br/>12.3 hmac 368<br/>12.4 cmac 372<br/>12.5 recommended reading and web sites 374<br/>12.6 key terms, review questions, and problems 375<br/>Chapter 13 digital signatures and authentication protocols 377<br/>13.1 digital signatures 378<br/>13.2 authentication protocols 382<br/>13.3 digital signature standard 390<br/>13.4 recommended reading and web sites 393<br/>13.5 key terms, review questions, and problems 393<br/>Part three network security applications 398<br/>Chapter 14 authentication applications 400<br/>14.1 kerberos 401<br/>14.2 x.509 authentication service 419<br/>14.3 public-key infrastructure 428<br/>14.4 recommended reading and web sites 430<br/>14.5 key terms, review questions, and problems 431<br/>Appendix 14a kerberos encryption techniques 433<br/>Chapter 15 electronic mail security 436<br/>15.1 pretty good privacy 438<br/>15.2 s/mime 457<br/>15.3 recommended web sites 474<br/>15.4 keyterms, review questions, and problems 474<br/>Appendix 15a data compression using zip 475<br/>Appendix 15b radix-64 conversion 478<br/>Appendix 15c pgp random number generation 479<br/>Chapter 16 ip security 483<br/>16.1 ip security overview 485<br/>16.2 ip security architecture 487<br/>16.3 authentication header 493<br/>16.4 encapsulating security payload 498<br/>16.5 combining security associations 503<br/>16.6 key management 506<br/>16.7 recommended reading and web site 516<br/>16.8 key terms, review questions, and problems 517<br/>Appendix 16a internetworking and internet protocols 518<br/>Chapter 17 web security 527<br/>17.1 web security considerations 528<br/>17.2 secure socket layer and transport layer security 531<br/>17.3 secure electronic transaction 549<br/>17.4 recommended reading and web sites 560<br/>17.5 key terms, review questions, and problems 561<br/>Part four system security 563<br/>Chapter 18 intruders 565<br/>18.1 intruders 567<br/>18.2 intrusion detection 570<br/>18.3 password management 582<br/>18.4 recommended reading and web sites 591<br/>18.5 key terms, review questions, and problems 592<br/>Appendix 18a the base-rate fallacy 594<br/>Chapter 19 malicious software 598<br/>19.1 viruses and related threats 599<br/>19.2 virus countermeasures 610<br/>19.3 distributed denial of service attacks 614<br/>19.4 recommended reading and web sites 619<br/>19.5 key terms, review questions, and problems 620<br/>Chapter 20 firewalls 621<br/>20.1 firewall design principles 622<br/>20.2 trusted systems 634<br/>20.3 common criteria for information technology security evaluation 640<br/>20.3 recommended reading and web sites 644<br/>20.4 key terms, review questions, and problems 645<br/>Appendices 647<br/>Appendix a standards and standards-setting organizations 647<br/>A.1 the importance of standards 648<br/>A.2 internet standards and the internet society 649<br/>A.3 national institute of standards and technology 652<br/>Appendix b projects for teaching cryptography and network security 653<br/>B.1 research projects 654<br/>B.2 programming projects 655<br/>B.3 laboratory exercises 655<br/>B.4 writing assignments 655<br/>B.5 reading/report assignments 656<br/> |