图书介绍

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYpdf电子书版本下载

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITY
  • 卡哈特(ATUL KAHATE)著 著
  • 出版社:
  • ISBN:
  • 出版时间:2005
  • 标注页数:0页
  • 文件大小:71MB
  • 文件页数:454页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1.Introduction to the Concepts of Security 1

1.1 Introduction 1

1.2 TheNeed for Security 2

1.3 Security Approaches 3

1.4 Principles of Security 4

1.5 Types of Attacks 8

Outline of the Book 23

Multiple-choice Questions 25

Review Questions 26

Design/Programming Exercises 27

2.Cryptographic Techniques 28

2.1 Introduction 28

2.2 Plain Text and CipherText 29

2.3 Substitution Techniques 31

2.4 Transposition Techniques 36

2.5 Encryption and Decryption 40

2.6 Symmetric and Asymmetric Key Cryptography 43

2.7 Steganography 53

2.8 Key Range and Key Size 54

2.9 Possible Types of Attacks 57

Chapter Summary 58

Key Terms and Concepts 59

Multiple-choice Questions 59

Review Questions 60

Design/Programming Exercises 61

3.Computer-based Symmetric Key Cryptographic Algorithms 63

3.1 Introduction 63

3.2 Algorithm Types and Modes 63

3.3 An Overview of Symmetric Key Cryptography 73

3.4 DataEncryption Standard(DES) 75

3.5 International Data Encryption Algorithm(IDEA) 90

3.6 RC5 98

3.7 Blowfish 105

3.8 Advanced Encryption Standard(AES) 107

3.9 Differential and Linear Cryptanalysis 109

Chapter Summary 110

Key Terms and Concepts 110

Multiple-choice Questions 110

Review Questions 111

Design/Programming Exercises 111

4.Computer-based Asymmetric Key Cryptographic Algorithms 112

4.1 Introduction 112

4.2 Brief History of Asymmetric Key Cryptography 112

4.3 An Overview of Asymmetric Key Cryptography 113

4.4 The RSA Algorithm 115

4.5 Symmetric and Asymmetric Key Cryptography Together 119

4.6 Digital Signatures 125

4.7 Knapsack Algorithm 154

4.8 Some other Algorithms 154

Chapter Summary 157

Key Terms and Concepts 158

Multiple-choice Questions 158

Review Questions 159

Design/Programming Exercises 159

5.Public Key Infrastructure(PKI) 161

5.1 Introduction 161

5.2 Digital Certificates 162

5.3 Private Key Management 194

5.4 The PKIX Model 196

5.5 Public Key Cryptography Standards(PKCS) 198

5.6 XML,PKI and Security 204

Chapter Summary 208

Key Terms and Concepts 208

Multiple-choice Questions 209

Review Questions 210

Design/Programming Exercises 210

6.Internet Security Protocols 211

6.1 Basic Concepts 211

6.2 Secure Socket Layer(SSL) 218

6.3 Secure Hyper Text Transfer Protocol(SHTTP) 229

6.4 Time Stamping Protocol(TSP) 230

6.5 Secure Electronic Transaction(SET) 231

6.6 SSL Versus SET 244

6.7 3-D Secure Protocol 244

6.8 Electronic Money 245

6.9 Email Security 250

6.10 Wireless Application Protocol(WAP)Security 263

6.11 Securityin GSM 266

Chapter Summary 268

Key Terms and Concepts 269

Multiple-choice Questions 269

Review Questions 270

Design/Programming Exercises 270

7.User Authentication Mechanisms 271

7.1 Introduction 271

7.2 Authentication Basics 271

7.3 Passwords 272

7.4 Authentication Tokens 286

7.5 Certificate-based Authentication 297

7.6 Biometric Authentication 303

7.7 Kerberos 304

7.8 Single Sign On(SSO)Approaches 309

Chapter Summary 310

Key Terms and Concepts 311

Multiple-choice Questions 311

Review Questions 312

Design/Programming Exercises 312

8.Practical Implementations of Cryptography/Security 314

8.1 Cryptographic Solutions Using Java 314

8.2 Cryptographic Solutions Using Microsoft 322

8.3 Cryptographic Toolkits 324

8.4 Security and Operating Systems 325

Chapter Summary 330

Key Terms and Concepts 330

Multiple-choice Questions 330

Review Questions 331

Design/Programming Exercises 331

9.Network Security 332

9.1 Brief Introduction to TCP/IP 332

9.2 Firewalls 338

9.3 IPSecurity 349

9.4 Virtual Private Networks(VPN) 365

Chapter Summary 368

Key Terms and Concepts 368

Multiple-choice Questions 369

Review Questions 369

10.Case Studies on Cryptography and Security 371

10.1 Introduction 371

10.2 Cryptographic Solutions—A Case Study 371

10.3 Single Sign On(SSO) 379

10.4 Secure Inter-branch Payment Transactions 382

10.5 Denial of Service(DOS)Attacks 385

10.6 IP Spoofing Attacks 388

10.7 Cross Site Scripting Vulnerability(CSSV) 389

10.8 Contract Signing 391

10.9 Secret Splitting 392

10.10 Virtual Elections 394

10.11 Secure Multiparty Calculation 395

Appendix A—Mathematical Background 396

Appendix B—Number Systems 401

Appendix C—Information Theory 406

Appendix D—Real-life Tools 408

Appendix E—Web Resources 409

Appendix F—A Brief Introduction to ASN,BER,DER 411

Appendix G—Modern Security Trends 413

Answers to Multiple-choice Questions 419

Glossary 420

References 426

Index 428

精品推荐