Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cryptography and Network Security - William Stallings

Cryptography and Network Security

Principles and Practice
Buch | Softcover
752 Seiten
2013 | 6th edition
Pearson (Verlag)
978-0-13-335469-0 (ISBN)
CHF 169,15 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist.

A practical survey of cryptography and network security with unmatched support for instructors and students

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products. He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.

Preface xiii

Chapter 0 Guide for Readers and Instructors 1



0.1 Outline of This Book 2



0.2 A Roadmap for Readers and Instructors 3

0.3 Internet and Web Resources 4



0.4 Standards 5 Chapter 1 Overview 7



1.1 Computer Security Concepts 9



1.2 The OSI Security Architecture 14

1.3 Security Attacks 15



1.4 Security Services 17

1.5 Security Mechanisms 20



1.6 A Model for Network Security 22

1.7 Recommended Reading 24



1.8 Key Terms, Review Questions, and Problems 25 Part One Symmetric Ciphers 27

Chapter 2 Classical Encryption Techniques 27



2.1 Symmetric Cipher Model 28



2.2 Substitution Techniques 34

2.3 Transposition Techniques 49



2.4 Rotor Machines 50

2.5 Steganography 52



2.6 Recommended Reading 54

2.7 Key Terms, Review Questions, and Problems 55

Chapter 3 Block Ciphers and the Data Encryption Standard 61



3.1 Traditional Block Cipher Structure 63

3.2 The Data Encryption Standard 72



3.3 A DES Example 74

3.4 The Strength of DES 77



3.5 Block Cipher Design Principles 78

3.6 Recommended Reading 80



3.7 Key Terms, Review Questions, and Problems 81 Chapter 4 Basic Concepts in Number Theory and Finite Fields 85



4.1 Divisibility and the Division Algorithm 87



4.2 The Euclidean Algorithm 88

4.3 Modular Arithmetic 91



4.4 Groups, Rings, and Fields 99

4.5 Finite Fields of the Form GF( p) 102



4.6 Polynomial Arithmetic 106

4.7 Finite Fields of the Form GF(2n) 112



4.8 Recommended Reading 124

4.9 Key Terms, Review Questions, and Problems 124

Appendix 4A The Meaning of mod 127

Chapter 5 Advanced Encryption Standard 129



5.1 Finite Field Arithmetic 130

5.2 AES Structure 132



5.3 AES Transformation Functions 137

5.4 AES Key Expansion 148



5.5 An AES Example 151

5.6 AES Implementation 155



5.7 Recommended Reading 159

5.8 Key Terms, Review Questions, and Problems 160

Appendix 5A Polynomials with Coefficients in GF(28) 162

Appendix 5B Simplified AES 164

Chapter 6 Block Cipher Operation 174



6.1 Multiple Encryption and Triple DES 175

6.2 Electronic Code book 180



6.3 Cipher Block Chaining Mode 183

6.4 Cipher Feedback Mode 185



6.5 Output Feedback Mode 187

6.6 Counter Mode 189



6.7 XTS-AES Mode for Block-Oriented Storage Devices 191

6.8 Recommended Reading 198



6.9 Key Terms, Review Questions, and Problems 198 Chapter 7 Pseudorandom Number Generation and Stream Ciphers 202



7.1 Principles of Pseudorandom Number Generation 203



7.2 Pseudorandom Number Generators 210

7.3 Pseudorandom Number Generation Using a Block Cipher 213



7.4 Stream Ciphers 219

7.5 RC4 221



7.6 True Random Number Generators 223

7.7 Recommended Reading 227



7.8 Key Terms, Review Questions, and Problems 228 Part Two Asymmetric Ciphers 231

Chapter 8 More Number Theory 231



8.1 Prime Numbers 232



8.2 Fermat’s and Euler’s Theorems 236

8.3 Testing for Primality 239



8.4 The Chinese Remainder Theorem 242

8.5 Discrete Logarithms 244



8.6 Recommended Reading 249

8.7 Key Terms, Review Questions, and Problems 250

Chapter 9 Public-Key Cryptography and RSA 253



9.1 Principles of Public-Key Cryptosystems 256

9.2 The RSA Algorithm 264



9.3 Recommended Reading 278

9.4 Key Terms, Review Questions, and Problems 279

Appendix 9A The Complexity of Algorithms 283

Chapter 10 Other Public-Key Cryptosystems 286



10.1 Diffie-Hellman Key Exchange 287

10.2 Elgamal Cryptographic System 292



10.3 Elliptic Curve Arithmetic 295

10.4 Elliptic Curve Cryptography 303



10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 306

10.6 Recommended Reading 309



10.7 Key Terms, Review Questions, and Problems 309 Part Three Cryptographic Data Integrity Algorithms 313

Chapter 11 Cryptographic Hash Functions 313



11.1 Applications of Cryptographic Hash Functions 315



11.2 Two Simple Hash Functions 320

11.3 Requirements and Security 322



11.4 Hash Functions Based on Cipher Block Chaining 328

11.5 Secure Hash Algorithm (SHA) 329



11.6 SHA-3 339

11.7 Recommended Reading 351



11.8 Key Terms, Review Questions, and Problems 351 Chapter 12 Message Authentication Codes 355



12.1 Message Authentication Requirements 357



12.2 Message Authentication Functions 357

12.3 Requirements for Message Authentication Codes 365



12.4 Security of MACs 367

12.5 MACs Based on Hash Functions: HMAC 368



12.6 MACs Based on Block Ciphers: DAA and CMAC 373

12.7 Authenticated Encryption: CCM and GCM 376



12.8 Key Wrapping 382

12.9 Pseudorandom Number Generation using Hash Functions and MACs 387



12.10 Recommended Reading 390

12.11 Key Terms, Review Questions, and Problems 390

Chapter 13 Digital Signatures 393



13.1 Digital Signatures 395

13.2 Elgamal Digital Signature Scheme 398



13.3 Schnorr Digital Signature Scheme 400

13.4 NIST Digital Signature Algorithm 401



13.5 Elliptic Curve Digital Signature Algorithm 404

13.6 RSA-PSS Digital Signature Algorithm 407



13.7 Recommended Reading 412

13.8 Key Terms, Review Questions, and Problems 412

Part Four Mutual Trust 417

Chapter 14 Key Management and Distribution 417



14.1 Symmetric Key Distribution Using Symmetric Encryption 418

14.2 Symmetric Key Distribution Using Asymmetric Encryption 427



14.3 Distribution of Public Keys 430

14.4 X.509 Certificates 435



14.5 Public-Key Infrastructure 443

14.6 Recommended Reading 445



14.7 Key Terms, Review Questions, and Problems 446 Chapter 15 User Authentication 450



15.1 Remote User-Authentication Principles 451



15.2 Remote User-Authentication Using Symmetric Encryption 454

15.3 Kerberos 458



15.4 Remote User Authentication Using Asymmetric Encryption 476

15.5 Federated Identity Management 478



15.6 Personal Identity Verification 484

15.7 Recommended Reading 491



15.8 Key Terms, Review Questions, and Problems 491 Part Five Network And Internet Security 495

Chapter 16 Network Access Control and Cloud Security 495



16.1 Network Access Control 496



16.2 Extensible Authentication Protocol 499

16.3 IEEE 802.1X Port-Based Network Access Control 503



16.4 Cloud Computing 505

16.5 Cloud Security Risks and Countermeasures 512



16.6 Data Protection in the Cloud 514

16.7 Cloud Security as a Service 517



16.8 Recommended Reading 520

16.9 Key Terms, Review Questions, and Problems 521

Chapter 17 Transport-Level Security 522



17.1 Web Security Considerations 523

17.2 Secure Sockets Layer 525



17.3 Transport Layer Security 539

17.4 HTTPS 543



17.5 Secure Shell (SSH) 544

17.6 Recommended Reading 555



17.7 Key Terms, Review Questions, and Problems 556 Chapter 18 Wireless Network Security 558



18.1 Wireless Security 559



18.2 Mobile Device Security 562

18.3 IEEE 802.11 Wireless LAN Overview 566



18.4 IEEE 802.11i Wireless LAN Security 572

18.5 Recommended Reading 586



18.6 Key Terms, Review Questions, and Problems 587 Chapter 19 Electronic Mail Security 590



19.1 Pretty Good Privacy 591



19.2 S/MIME 599

19.3 DomainKeys Identified Mail 615



19.4 Recommended Reading 622

19.5 Key Terms, Review Questions, and Problems 622

Appendix 19A Radix-64 Conversion 623

Chapter 20 IP Security 626



20.1 IP Security Overview 628

20.2 IP Security Policy 632



20.3 Encapsulating Security Payload 638

20.4 Combining Security Associations 645



20.5 Internet Key Exchange 649

20.6 Cryptographic Suites 657



20.7 Recommended Reading 659

20.8 Key Terms, Review Questions, and Problems 659

Appendices 661

Appendix A Projects for Teaching Cryptography and Network Security 661



A.1 Sage Computer Algebra Projects 662

A.2 Hacking Project 663



A.3 Block Cipher Projects 664

A.4 Laboratory Exercises 664



A.5 Research Projects 664

A.6 Programming Projects 665



A.7 Practical Security Assessments 665

A.8 Firewall Projects 666



A.9 Case Studies 666

A.10 Writing Assignments 666



A.11 Reading/Report Assignments 667

A.12 Discussion Topics 667

Appendix B Sage Examples 668



B.1 Linear Algebra and Matrix Functionality 669

B.2 Chapter 2: Classical Encryption 670



B.3 Chapter 3: Block Ciphers and the Data Encryption Standard 673

B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields 677



B.5 Chapter 5: Advanced Encryption Standard 684

viii Contents



B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers 689

B.7 Chapter 8: Number Theory 691



B.8 Chapter 9: Public-Key Cryptography and RSA 696

B.9 Chapter 10: Other Public-Key Cryptosystems 699



B.10 Chapter 11: Cryptographic Hash Functions 704

B.11 Chapter 13: Digital Signatures 706

References 710

Credits 720

Index 723

Online Chapters and Appendices1

Part Six System Security

Chapter 21 Malicious Software



21.1 Types of Malicious Software

21.2 Propagation — Infected Content - Viruses



21.3 Propagation — Vulnerability Exploit - Worms

21.4 Propagation — Social Engineering — SPAM, Trojans



21.5 Payload — System Corruption

21.6 Payload — Attack Agent — Zombie, Bots



21.7 Payload — Information Theft — Keyloggers, Phishing, Spyware

21.8 Payload — Stealthing — Backdoors, Rootkits



21.9 Countermeasures

21.10 Distributed Denial of Service Attacks



21.11 Recommended Reading

21.12 Key Terms, Review Questions, and Problems

Chapter 22 Intruders



22.1 Intruders

22.2 Intrusion Detection



22.3 Password Management

22.4 Recommended Reading



22.5 Key Terms, Review Questions, and Problems Appendix 22A The Base-Rate Fallacy

Chapter 23 Firewalls



23.1 The Need for Firewalls



23.2 Firewall Characteristics

23.3 Types of Firewalls



23.4 Firewall Basing

23.5 Firewall Location and Configurations



23.6 Recommended Reading

23.7 Key Terms, Review Questions, and Problems

Part seven Legal And Ethical Issues

Chapter 24 Legal and Ethical Issues



24.1 Cybercrime and Computer Crime

24.2 Intellectual Property



24.3 Privacy

24.4 Ethical Issues



24.5 Recommended Reading

24.6 Key Terms, Review Questions, and Problems

Appendix C Sage Exercises

Appendix D Standards and Standards-Setting Organizations

Appendix E Basic Concepts from Linear Algebra

Appendix F Measures of Security and Secrecy

Appendix G Simplified DES

Appendix H Evaluation Criteria for AES

Appendix I More on Simplified AES

Appendix J Knapsack Public-Key Algorithm

Appendix K Proof of the Digital Signature Algorithm

Appendix L TCP/IP and OSI

Appendix M Java Cryptographic APIs

Appendix N MD5 and Whirlpool Hash Functions

Appendix O Data Compression Using ZIP

Appendix P More on PGP

Appendix Q The International Reference Alphabet

Appendix R Proof of the RSA Algorithm

Appendix S Data Encryption Standard (DES)

Appendix T Kerberos Encryption Techniques

Appendix U Mathematical Basis of the Birthday Attack

Appendix V Evaluation Criteria for SHA-3

Erscheint lt. Verlag 13.6.2013
Sprache englisch
Maße 178 x 232 mm
Gewicht 1060 g
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-13-335469-5 / 0133354695
ISBN-13 978-0-13-335469-0 / 9780133354690
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20