图书介绍
密码学与网络安全 原理与实践 英文版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

- (美)William Stallings著 著
- 出版社: 北京:清华大学出版社
- ISBN:7302055378
- 出版时间:2002
- 标注页数:569页
- 文件大小:91MB
- 文件页数:588页
- 主题词:
PDF下载
下载说明
密码学与网络安全 原理与实践 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction1
1.1 Attacks,Services,and Mechanisms3
1.2 Security Attacks6
1.3 Security Services9
1.4 A Model for Internetwork Security11
1.5 Outline of this Book13
1.6 Recommended Reading16
APPendix 1A:Internet and Web Resources16
PART ONE CONVENTIONAL ENCRYPTION19
Chapter 2 Conventional Encryption:Classical Techniques21
2.1 Conventional Encryption Model22
2.2 Steganography26
2.3 Classical Encryption Techniques28
2.4 Recommended Reading44
2.5 Problems45
Chapter 3 Conventional Encryption:Modern Techniques49
3.1 Simplified DES50
3.2 Block Cipher Principles57
3.3 The Data Encryption Standard65
3.4 The Strength of DES74
3.5 Differential and Linear Cryptanalysis76
3.6 Block Cipher Design Principles79
3.7 Block Cipher Modes of Operation83
3.8 Recommended Reading89
3.9 Problems89
Appendix 3A:Bent Functions91
Chapter 4 Conventional Encryption:Algorithms93
4.1 Triple DES93
4.2 International Data Encryption Algorithm99
4.3 Blowfish109
4.4 RC5114
4.5 CAST-128120
4.6 RC2124
4.7 Characteristics of Advanced Symmetric Block Ciphers126
4.8 Problems127
Chapter 5 Confidentiality Using Conventional Encryption131
5.1 Placement of Encryption Function132
5.2 Traffic Confidentiality139
5.3 Key Distribution141
5.4 Random Number Generation149
5.5 Recommended Reading156
5.6 Problems157
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS161
Chapter 6 Public-Key Cryptography163
6.1 Principles of Public-Key Cryptosystems164
6.2 The RSA Algorithm173
6.3 Key Management182
6.4 Diffie-Hellman Key Exchange190
6.5 Elliptic Curve Cryptography193
6.7 Problems199
6.6 Recommended Reading199
Appendix 6A:The Complexity of Algorithms203
Chapter 7 Introduction to Number Theory207
7.1 Prime and Relatively Prime Numbers208
7.2 Modular Arithmetic211
7.3 Fermat’s and Euler’s Theorems217
7.4 Testing for Primality221
7.5 Euclid’s Algorithm223
7.6 The Chinese Remainder Theorem226
7.7 Discrete Logarithms228
7.8 Recommended Reading233
7.9 Problems233
Chapter 8 Message Authentication and Hash Functions237
8.1 Authentication Requirements238
8.2 Authentication Functions239
8.3 Message Authentication Codes249
8.4 Hash Functions253
8.5 Security of Hash Functions and MACs259
8.6 Recommended Reading263
8.7 Problems263
Appendix 8A:Mathematical Basis of Birthday Attack264
Chapter 9 Hash and Mac Algorithms271
9.1 MD5 Message Digest Algorithm272
9.2 Secure Hash Algorithm(SHA-1)281
9.3 RIPEMD-160286
9.4 HMAC293
9.5 Problems298
Chapter 10 Digital Signatures and Authentication Protocols299
10.1 Digital Signatures299
10.2 Authentication Protocols303
10.3 Digital Signature Standard311
10.4 Recommended Reading314
10.5 Problems315
Appendix 10A:Proof of the DSS Algorithm317
PART THREE NETWORK SECURITY PRACTICE321
Chapter 11 Authentication Applications323
11.1 Kerberos323
11.2 X.509 Directory Authentication Service341
11.3 Recommended Reading350
11.4 Problems350
Appendix 11A:Kerberos Encryption Techniques351
Chapter 12 Electronic Mail Security355
12.1 Pretty Good Privacy356
12.2 S/MIME374
12.3 Recommended Readings390
12.4 Problems391
Appendix 12A:Data Compression Using ZIP391
Appendix 12B:Radix-64 Conversion394
Appendix 12C:PGP Random Number Generation395
Chapter 13 IP Security399
13.1 IP Security Overview400
13.2 IP Security Architecture402
13.3 Authentication Header408
13.4 Encapsulating Security Payload413
13.5 Combining Security Associations418
13.6 Key Management421
13.7 Recommended Reading432
13.8 Problems432
Appendix 13A:Internetworking and Internet Protocols433
Chapter 14 Web Security441
14.1 Web Security Requirements441
14.2 Secure Sockets Layer and Transport Layer Security444
14.3 Secure Electronic Transaction461
14.4 Recommended Reading472
14.5 Problems473
PART FOUR SYSTEM SECURITY475
Chapter 15 Intruders,Viruses,and Worms477
15.1 Intruders478
15.2 Viruses and Related Threats501
15.3 Recommended Reading514
15.4 Problems514
Chapter 16 Firewalls517
16.1 Firewall Design Principles517
16.2 Trusted Systems527
16.3 Recommended Reading532
16.4 Problems533
Appendix A Projects for Teaching Cryptography and Network Security535
A.1 Research Projects536
A.2 Programming Projects536
A.3 Reading/Report Assignments537
Glossary539
References545
Index559
热门推荐
- 380457.html
- 388765.html
- 625352.html
- 2808622.html
- 712816.html
- 2445181.html
- 714095.html
- 244169.html
- 2677841.html
- 768483.html
- http://www.ickdjs.cc/book_3160370.html
- http://www.ickdjs.cc/book_2706024.html
- http://www.ickdjs.cc/book_1952920.html
- http://www.ickdjs.cc/book_1960590.html
- http://www.ickdjs.cc/book_3187957.html
- http://www.ickdjs.cc/book_3718187.html
- http://www.ickdjs.cc/book_614063.html
- http://www.ickdjs.cc/book_3230600.html
- http://www.ickdjs.cc/book_325043.html
- http://www.ickdjs.cc/book_658088.html