图书介绍

密码编码学与网络安全 原理与实践 第7版 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

密码编码学与网络安全 原理与实践 第7版 英文版
  • (美)威廉·斯托林斯(William Stallings) 著
  • 出版社: 北京:电子工业出版社
  • ISBN:9787121313189
  • 出版时间:2017
  • 标注页数:749页
  • 文件大小:375MB
  • 文件页数:768页
  • 主题词:电子计算机-密码术-高等学校-教材-英文;计算机网络-网络安全-高等学校-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

密码编码学与网络安全 原理与实践 第7版 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART ONE:BACKGROUND1

Chapter 1 Computer and Network Security Concepts1

1.1 Computer Security Concepts3

1.2 The OSI Security Architecture8

1.3 Security Attacks9

1.4 Security Services11

1.5 Security Mechanisms14

1.6 Fundamental Security Design Principles16

1.7 Attack Surfaces and Attack Trees19

1.8 A Model for Network Security23

1.9 Standards25

1.10 Key Terms,Review Questions,and Problems26

Chapter 2 Introduction to Number Theory28

2.1 Divisibility and the Division Algorithm29

2.2 The Euclidean Algorithm31

2.3 Modular Arithmetic35

2.4 Prime Numbers43

2.5 Fermat's and Euler's Theorems46

2.6 Testing for Primality50

2.7 The Chinese Remainder Theorem53

2.8 Discrete Logarithms55

2.9 Key Terms,Review Questions,and Problems60

Appendix 2A The Meaning of Mod64

PART TWO:SYMMETRIC CIPHERS67

Chapter 3 Classical Encryption Techniques67

3.1 Symmetric Cipher Model68

3.2 Substitution Techniques74

3.3 Transposition Techniques89

3.4 Rotor Machines90

3.5 Steganography92

3.6 Key Terms,Review Questions,and Problems94

Chapter 4 Block Ciphers and the Data Encryption Standard100

4.1 Traditional Block Cipher Structure101

4.2 The Data Encryption Standard111

4.3 A DES Example113

4.4 The Strength of DES116

4.5 Block Cipher Design Principles117

4.6 Key Terms,Review Questions,and Problems119

Chapter 5 Finite Fields123

5.1 Groups125

5.2 Rings127

5.3 Fields128

5.4 Finite Fields of the Form GF(p)129

5.5 Polynomial Arithmetic133

5.6 Finite Fields of the Form GF(2n)139

5.7 Key Terms,Review Questions,and Problems151

Chapter 6 Advanced Encryption Standard153

6.1 Finite Field Arithmetic154

6.2 AES Structure156

6.3 AES Transformation Functions161

6.4 AES Key Expansion172

6.5 An AES Example175

6.6 AES Implementation179

6.7 Key Terms,Review Questions,and Problems184

Appendix 6A Polynomials with Coefficients in GF(2 8)185

Chapter 7 Block Cipher Operation189

7.1 Multiple Encryption and Triple DES190

7.2 Electronic Codebook195

7.3 Cipher Block Chaining Mode198

7.4 Cipher Feedback Mode200

7.5 Output Feedback Mode202

7.6 Counter Mode204

7.7 XTS-AES Mode for Block-Oriented Storage Devices206

7.8 Format-Preserving Encryption213

7.9 Key Terms,Review Questions,and Problems227

Chapter 8 Random Bit Generation and Stream Ciphers232

8.1 Principles of Pseudorandom Number Generation234

8.2 Pseudorandom Number Generators240

8.3 Pseudorandom Number Generation Using a Block Cipher243

8.4 Stream Ciphers249

8.5 RC4251

8.6 True Random Number Generators253

8.7 Key Terms,Review Questions,and Problems262

PART THREE:ASYMMETRIC CIPHERS265

Chapter 9 Public-Key Cryptography and RSA265

9.1 Principles of Public-Key Cryptosystems267

9.2 The RSA Algorithm276

9.3 Key Terms,Review Questions,and Problems290

Chapter 10 Other Public-Key Cryptosystems295

10.1 Diffie-Hellman Key Exchange296

10.2 Elgamal Cryptographic System300

10.3 Elliptic Curve Arithmetic303

10.4 Elliptic Curve Cryptography312

10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher316

10.6 Key Terms,Review Questions,and Problems318

PART FOUR:CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS321

Chapter 11 Cryptographic Hash Functions321

11.1 Applications of Cryptographic Hash Functions323

11.2 Two Simple Hash Functions328

11.3 Requirements and Security330

11.4 Hash Functions Based on Cipher Block Chaining336

11.5 Secure Hash Algorithm(SHA)337

11.6 SHA-3347

11.7 Key Terms,Review Questions,and Problems359

Chapter 12 Message Authentication Codes363

12.1 Message Authentication Requirements364

12.2 Message Authentication Functions365

12.3 Requirements for Message Authentication Codes373

12.4 Security of MACs375

12.5 MACs Based on Hash Functions:HMAC376

12.6 MACs Based on Block Ciphers:DAA and CMAC381

12.7 Authenticated Encryption:CCM and GCM384

12.8 Key Wrapping390

12.9 Pseudorandom Number Generation Using Hash Functions and MACs395

12.10 Key Terms,Review Questions,and Problems398

Chapter 13 Digital Signatures401

13.1 Digital Signatures403

13.2 Elgamal Digital Signature Scheme406

13.3 Schnorr Digital Signature Scheme407

13.4 NIST Digital Signature Algorithm408

13.5 Elliptic Curve Digital Signature Algorithm412

13.6 RSA-PSS Digital Signature Algorithm415

13.7 Key Terms,Review Questions,and Problems420

PART FIVE:MUTUAL TRUST423

Chapter 14 Key Management and Distribution423

14.1 Symmetric Key Distribution Using Symmetric Encryption424

14.2 Symmetric Key Distribution Using Asymmetric Encryption433

14.3 Distribution of Public Keys436

14.4 X.509 Certificates441

14.5 Public-Key Infrastructure449

14.6 Key Terms,Review Questions,and Problems451

Chapter 15 User Authentication455

15.1 Remote User-Authentication Principles456

15.2 Remote User-Authentication Using Symmetric Encryption460

15.3 Kerberos464

15.4 Remote User-Authentication Using Asymmetric Encryption482

15.5 Federated Identity Management484

15.6 Personal Identity Verification490

15.7 Key Terms,Review Questions,and Problems497

PART SIX:NETWORK AND INTERNET SECURITY501

Chapter 16 Network Access Control and Cloud Security501

16.1 Network Access Control502

16.2 Extensible Authentication Protocol505

16.3 IEEE 802.1X Port-Based Network Access Control509

16.4 Cloud Computing511

16.5 Cloud Security Risks and Countermeasures517

16.6 Data Protection in the Cloud519

16.7 Cloud Security as a Service523

16.8 Addressing Cloud Computing Security Concerns526

16.9 Key Terms,Review Questions,and Problems527

Chapter 17 Transport-Level Security528

17.1 Web Security Considerations529

17.2 Transport Layer Security531

17.3 HTTPS548

17.4 Secure Shell(SSH)549

17.5 Key Terms,Review Questions,and Problems561

Chapter 18 Wireless Network Security563

18.1 Wireless Security564

18.2 Mobile Device Security567

18.3 IEEE 802.11 Wireless LAN Overview571

18.4 IEEE 802.11i Wireless LAN Security577

18.5 Key Terms,Review Questions,and Problems592

Chapter 19 Electronic Mail Security594

19.1 Internet Mail Architecture595

19.2 Email Formats599

19.3 Email Threats and Comprehensive Email Security607

19.4 S/MIME609

19.5 Pretty Good Privacy620

19.6 DNSSEC621

19.7 DNS-Based Authentication of Named Entities625

19.8 Sender Policy Framework627

19.9 DomainKeys Identified Mail630

19.10 Domain-Based Message Authentication,Reporting,and Conformance636

19.11 Key Terms,Review Questions,and Problems641

Chapter 20 IP Security643

20.1 IP Security Overview644

20.2 IP Security Policy650

20.3 Encapsulating Security Payload655

20.4 Combining Security Associations663

20.5 Internet Key Exchange666

20.6 Cryptographic Suites674

20.7 Key Terms,Review Questions,and Problems676

APPENDICES678

Appendix A Projects for Teaching Cryptography and Network Security678

A.1 Sage Computer Algebra Projects679

A.2 Hacking Project680

A.3 Block Cipher Projects681

A.4 Laboratory Exercises681

A.5 Research Projects681

A.6 Programming Projects682

A.7 Practical Security Assessments682

A.8 Firewall Projects683

A.9 Case Studies683

A.10 Writing Assignments683

A.11 Reading/Report Assignments684

A.12 Discussion Topics684

Appendix B Sage Examples685

B.1 Linear Algebra and Matrix Functionality686

B.2 Chapter 2:Number Theory687

B.3 Chapter 3:Classical Encryption692

B.4 Chapter 4:Block Ciphers and the Data Encryption Standard695

B.5 Chapter 5:Basic Concepts in Number Theory and Finite Fields699

B.6 Chapter 6:Advanced Encryption Standard706

B.7 Chapter 8:Pseudorandom Number Generation and Stream Ciphers711

B.8 Chapter 9:Public-Key Cryptography and RSA713

B.9 Chapter 10:Other Public-Key Cryptosystems716

B.10 Chapter 11:Cryptographic Hash Functions721

B.11 Chapter 13:Digital Signatures723

References726

Credits735

Index736

热门推荐