Cryptography and Network Security – William Stallings – 4th Edition


In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, is paramount.

As the disciplines of and security have matured, more practical, readily available to enforce network security have developed. This text provides a practical survey of both the principles and of cryptography and network security.

First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security . Then, the practice of network security is explored via practical applications that have been implemented and are in use today.

Table of Contents

0: Reader'S Guide
1: Overview

Part One Symmetric Ciphers
2: Classical Encryption Techniques
3: Block Ciphers And The Data Encryption Standard
4: Introduction To Finite Fields
5: Advanced Encryption Standard
6: More On Symmetric Ciphers
7: Confidentiality Using Symmetric Encryption

Part Two Public-Key Encryption And Hash Functions
8: Introduction To Number Theory
9: Public-Key Cryptography And Rsa
10: Key Management; Other Public-Key Cryptosystems
11: Message Authentication And Hash Functions
12: Hash And Mac Algorithms
13: Digital Signatures And Authentication Protocols

Part Three Network Security Practice
14: Authentication Applications
15: Electronic Mail Security
16: IP Security
17: Web Security

Part Four System Security
18: Intruders
19: Malicious Software
20: Firewalls

Appendix A: Standards And Standard-Setting Organizations
Appendix B: Projects For Teaching Cryptography And Network Security

Online Appendices
Appendix C: Simplified Des
Appendix D: The Meaning Of Mod
Appendix E: More On Simplified Aes
Appendix F: Knapsack Public-Key Algorithm
Appendix G: Proof Of The Digital Signature Algorithm
1 Comment
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x