DETAIL
- Chapter 0 Reader’s Guide 1
- Chapter 1 Overview 7
- PART ONE SYMMETRIC CIPHERS 31
- Chapter 2 Classical Encryption Techniques 31
- Chapter 3 Block Ciphers and the Data Encryption Standard 66
- Chapter 4 Basic Concepts in Number Theory and Finite Fields 101
- Chapter 5 Advanced Encryption Standard 47
- Chapter 6 Block Cipher Operation 192
- Chapter 7 Pseudorandom Number Generation and Stream Ciphers 218
- PART TWO ASYMMETRIC CIPHERS 243
- Chapter 8 More Number Theory 243
- Chapter 9 Public-Key Cryptography and RSA 266
- Chapter 10 Other Public-Key Cryptosystems 300
- PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS 327
- Chapter 11 Cryptographic Hash Functions 327
- Chapter 12 Message Authentication Codes 362
- Chapter 13 Digital Signatures 395
- PART FOUR MUTUAL TRUST 410
- Chapter 14 Key Management and Distribution 410
- Chapter 15 User Authentication Protocols 444
- PART FIVE NETWORK AND INTERNET SECURITY 485
- Chapter 16 Transport-Level Security 485
- Chapter 17 Wireless Network Security 521
- Chapter 18 Electronic Mail Security 567
- Chapter 19 IP Security 615
- APPENDICES 651
- Appendix A Projects for Teaching Cryptography and Network Security 651
- Appendix B Sage Examples 657
No comments:
Post a Comment