密码学与网络安全:原理与实践 英文版

密码学与网络安全:原理与实践 英文版
作 者: William Stallings
出版社: 清华大学出版社
丛编项: 大学计算机教育国外著名教材、教参系列(影印版)
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 密码学
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《密码学与网络安全:原理与实践 英文版》作者简介

内容简介

系列:大学计算机教育国外著名教材、教参系列(影印版)简介:随着网络时代的来临,网络安全问题日显突出。病毒、黑客、电子窃听、电子诈骗已成为众多公司和个人业绩和效率的巨大威胁。网络安全作为一门学科的成熟,将会开发可实际应用的技术来加强网络安全。本书强调密码学和网络安全的原理和实践。全书分为四部分。1.传统密码学,也就是对称密码学,讲述了对称密码学的基本概念以及当代最常用的三重数据加密标准(TripleDES);2.公钥密码学和哈希函数,涉及公钥密码体制的基本概念,也讲述了一些数学基础和现在研究热门的椭圆曲线密码体制ECC;3.计算机网络安全,涉及到目前应用广泛的CA技术;4.计算机系统安全,讲述了病毒防范和防火墙技术。此外,每套都附有阅读建议和思考性问题,帮助读者进一步掌握本章的内容。本书运用作大学四年级专业课、研究生课程教材,也可作为专业人员的参考书。

图书目录

Preface

Chapter 1 Introdnction

1.1 Attacks, Services, and Mechanisms

1.2 Security Attacks

1.3 Security Services

1.4 A Model for Internetwork' Security

1.5 Outline of this Book

1.6 Recommended Reading

Appendix IA: Internet and Web Resources

PART ONE CO

Chapter 2 Conventional Eacryption: Classical "Techniqnes

2.1 Conventional Encryption Model

2.2 Steganography

2.3 Classical Encryption Techniques

2.4 Recommended Reading

2.5 Problems

Chapter 3 Conventional Eneryption: Modem Techniqnes.

3.1 Simplified DES

3.2 Block Cipher Principles

3.3 The Data Encryption Standard

3.4 The Strength of DES

3.5 Differential and Linear Cryptanalysis

3.6 Block Cipher Design Principles.

3.7 Block Cipher Modes of Operation

3.8 Recommended Reading

3.9 Problems

Appendix 3A: Bent Functions

Chapter 4 Conventional Encryption: Algorithms

4.1 Triple DES

4.2 International Data Encryption Algorithm

4.3 Blowfish

4.4 RC5.

4.5 CAST-128

4.6 RC2

4.7 Characteristics of Advanced Symmetric Block Ciphers

4.8 Problems, 127

Chapter 5 Confidentiality Using Convendonal Eneryption

5.1 Placement of Encryption Function

5.2 Traffic Confidentiality.

5.3 Key Distribution

5.4 Random Number Generation

5.5 Recommended Reading

5.6 Problems

PART TWO PUBLIC-KEY ZNCRYPTION

Chapter 6 Publie-Key Cryptography

6.1 Principles of Public-Key Cryptosystems

6.2 The RSA Algorithm

6.3 Key Management

6.4 Diffie-Henman Key Exchange

6.5 Elliptic Curve Cryptography

6.6 Recommended Reading..

6.7 Problems, 199

Appendix 6A: The Complexity of Algorithms

Chapter 7 Introduction to Number Theory

7.1 Prime and Relatively Prime Numbers,

7.2 Modular Arithmetic, 211

7.3 Fermat's and Euler's Theorems

7.4 Testing for Primality

7.5 Euclid's Algorithm.

7.6 The Chinese Remainder Theorem

7.7 Discrete Logarithms

7.8 Recommended Reading

7.9 Problems

Chapter 8 Message Authentication and Hash Functions

8.1 Authentication Requirements

8.2 Authentication Functions

8.3 Message Authentication Codes

8.4 Hash Functions.

8.5 Security of Hash Functions and MACs.

8.6 Recommended Reading

8.7 Problems

Appendix 8A: Mathematical Basis of Birthday Attack

Chapter 9 Hash and Mac Algorithms

9.1 MD5 Message Digest Algorithm

9.2 Secure Hash Algorithm (SHA-l)

9.3 RIPEMD-160

9.4 HMAC

9.5 Problems

Chapter 10 Digital Signatures and Authentication Protoeols.

10.1 Digital Signatures

10.2 Authentication Protocols

10.3 Digital Signature Standard

10.4 Recommended Reading

10.5 Problems.

Appendix IOA: Proof of the DSS Algorithm

PART THREE NETWORK SECURITY PRACTICE

Chapter 11 Authentication AppHcadons

1 1.1 Kerberos.

1 1.2 X.509 Directory Authentication Service.

1 1.3 Recommended Reading

1 1.4 Problems

Appendix l IA: Kerberos Encryption Techniques

Chapter 12 Electronic Mail Security

12.1 Pretty Good Privary

12.2 S/MIME

12.3 Recommended Readings.

12.4 Problems

Appendix 12A: Data Compression Using ZIP

Appendix 12B : Radix-64 Conversion

Appendix 12C: PGP Random Number Generation

Chapter 13 IP Security

13.1 IP Security Overview

13.2 IP Security Architecture

13.3 Authentication Header

13.4 Encapsulating Security Payload

13.5 Combining Secmity Associations.

13.6 Key Management

13.7 Recommended Reading

13.8 Problems

Appendix 13A: Internetworking and Internet Protocols.

Chapter 14 Web Security

14.1 Web Security Requirements.

14.2 Secure Sockets Layer and Transport Layer Security

14.3 Secure Electronic Transaction

14.4 Recommended Reading

14.5 Problems

PART POUR SYSIIEM SECURITY

Chapter 15 Intruders, Viruses, and Worms

15.1 Intruders

15.2 Viruses and Related Threats

15.3 Recommended Reading

15.4 Problems

Chapter 16 Firewalls

l6.1 Firewall Design Principles

16.2 Trusted Systems

16.3 Recommended Reading

16.4 Problems

Appendix A Projects for Teaching Cryptography and Network Security

A.1 Research Projects

A.2 Programming Projects

A.3 Reading/Report Assignments

Glossary

References

Index