Cryptography and Network Security: Principles and Practice – William Stallings – 5th Edition


In this age of universal connectivity of , viruses, hackers, and electronic fraud; safety is paramount. This text provides a practical analysis of the two principles and practice of and .

First, the key issues that need to be addressed in a network security framework are explored through a tutorial and a survey of cryptography and network security . Then, the practice of network security is explored through practical applications that have been implemented and are in use today. An unprecedented package of support for instructors and ensures adequate teaching and learning experience.

The new edition has been updated to include coverage of the most recent issues as encryption modes of operation blocks, including authenticated encryption; revised and expanded AES coverage; extension of the coverage of the generation of pseudo-random numbers; new federated identity coverage, HTTPS, Secure Shell (SSH), and wireless network security; completely rewritten and updated IPsec coverage, and a new chapter in legal and ethical issues.

Table of Contents

Chapter 0 Guide for Readers and Instructors
Chapter 1 Overview

Part One Symmetric Ciphers
Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers

Part Two Asymmetric Ciphers
Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems

Part Three Cryptographic Data Integrity Algorithms
Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures

Part Four Mutual Trust
Chapter 14 Key Management and Distribution
Chapter 15 User Authentication
Chapter 16 Network Access Control and Cloud Security
Chapter 17 Transport-Level Security
Chapter 18 Wireless Network Security
Chapter 19 Electronic Mail Security
Chapter 20 IP Security
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x