图书介绍
密码编码学与网络安全 原理与实践 第7版 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- (美)威廉·斯托林斯(William Stallings) 著
- 出版社: 北京:电子工业出版社
- ISBN:9787121313189
- 出版时间:2017
- 标注页数:749页
- 文件大小:375MB
- 文件页数:768页
- 主题词:电子计算机-密码术-高等学校-教材-英文;计算机网络-网络安全-高等学校-教材-英文
PDF下载
下载说明
密码编码学与网络安全 原理与实践 第7版 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART ONE:BACKGROUND1
Chapter 1 Computer and Network Security Concepts1
1.1 Computer Security Concepts3
1.2 The OSI Security Architecture8
1.3 Security Attacks9
1.4 Security Services11
1.5 Security Mechanisms14
1.6 Fundamental Security Design Principles16
1.7 Attack Surfaces and Attack Trees19
1.8 A Model for Network Security23
1.9 Standards25
1.10 Key Terms,Review Questions,and Problems26
Chapter 2 Introduction to Number Theory28
2.1 Divisibility and the Division Algorithm29
2.2 The Euclidean Algorithm31
2.3 Modular Arithmetic35
2.4 Prime Numbers43
2.5 Fermat's and Euler's Theorems46
2.6 Testing for Primality50
2.7 The Chinese Remainder Theorem53
2.8 Discrete Logarithms55
2.9 Key Terms,Review Questions,and Problems60
Appendix 2A The Meaning of Mod64
PART TWO:SYMMETRIC CIPHERS67
Chapter 3 Classical Encryption Techniques67
3.1 Symmetric Cipher Model68
3.2 Substitution Techniques74
3.3 Transposition Techniques89
3.4 Rotor Machines90
3.5 Steganography92
3.6 Key Terms,Review Questions,and Problems94
Chapter 4 Block Ciphers and the Data Encryption Standard100
4.1 Traditional Block Cipher Structure101
4.2 The Data Encryption Standard111
4.3 A DES Example113
4.4 The Strength of DES116
4.5 Block Cipher Design Principles117
4.6 Key Terms,Review Questions,and Problems119
Chapter 5 Finite Fields123
5.1 Groups125
5.2 Rings127
5.3 Fields128
5.4 Finite Fields of the Form GF(p)129
5.5 Polynomial Arithmetic133
5.6 Finite Fields of the Form GF(2n)139
5.7 Key Terms,Review Questions,and Problems151
Chapter 6 Advanced Encryption Standard153
6.1 Finite Field Arithmetic154
6.2 AES Structure156
6.3 AES Transformation Functions161
6.4 AES Key Expansion172
6.5 An AES Example175
6.6 AES Implementation179
6.7 Key Terms,Review Questions,and Problems184
Appendix 6A Polynomials with Coefficients in GF(2 8)185
Chapter 7 Block Cipher Operation189
7.1 Multiple Encryption and Triple DES190
7.2 Electronic Codebook195
7.3 Cipher Block Chaining Mode198
7.4 Cipher Feedback Mode200
7.5 Output Feedback Mode202
7.6 Counter Mode204
7.7 XTS-AES Mode for Block-Oriented Storage Devices206
7.8 Format-Preserving Encryption213
7.9 Key Terms,Review Questions,and Problems227
Chapter 8 Random Bit Generation and Stream Ciphers232
8.1 Principles of Pseudorandom Number Generation234
8.2 Pseudorandom Number Generators240
8.3 Pseudorandom Number Generation Using a Block Cipher243
8.4 Stream Ciphers249
8.5 RC4251
8.6 True Random Number Generators253
8.7 Key Terms,Review Questions,and Problems262
PART THREE:ASYMMETRIC CIPHERS265
Chapter 9 Public-Key Cryptography and RSA265
9.1 Principles of Public-Key Cryptosystems267
9.2 The RSA Algorithm276
9.3 Key Terms,Review Questions,and Problems290
Chapter 10 Other Public-Key Cryptosystems295
10.1 Diffie-Hellman Key Exchange296
10.2 Elgamal Cryptographic System300
10.3 Elliptic Curve Arithmetic303
10.4 Elliptic Curve Cryptography312
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher316
10.6 Key Terms,Review Questions,and Problems318
PART FOUR:CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS321
Chapter 11 Cryptographic Hash Functions321
11.1 Applications of Cryptographic Hash Functions323
11.2 Two Simple Hash Functions328
11.3 Requirements and Security330
11.4 Hash Functions Based on Cipher Block Chaining336
11.5 Secure Hash Algorithm(SHA)337
11.6 SHA-3347
11.7 Key Terms,Review Questions,and Problems359
Chapter 12 Message Authentication Codes363
12.1 Message Authentication Requirements364
12.2 Message Authentication Functions365
12.3 Requirements for Message Authentication Codes373
12.4 Security of MACs375
12.5 MACs Based on Hash Functions:HMAC376
12.6 MACs Based on Block Ciphers:DAA and CMAC381
12.7 Authenticated Encryption:CCM and GCM384
12.8 Key Wrapping390
12.9 Pseudorandom Number Generation Using Hash Functions and MACs395
12.10 Key Terms,Review Questions,and Problems398
Chapter 13 Digital Signatures401
13.1 Digital Signatures403
13.2 Elgamal Digital Signature Scheme406
13.3 Schnorr Digital Signature Scheme407
13.4 NIST Digital Signature Algorithm408
13.5 Elliptic Curve Digital Signature Algorithm412
13.6 RSA-PSS Digital Signature Algorithm415
13.7 Key Terms,Review Questions,and Problems420
PART FIVE:MUTUAL TRUST423
Chapter 14 Key Management and Distribution423
14.1 Symmetric Key Distribution Using Symmetric Encryption424
14.2 Symmetric Key Distribution Using Asymmetric Encryption433
14.3 Distribution of Public Keys436
14.4 X.509 Certificates441
14.5 Public-Key Infrastructure449
14.6 Key Terms,Review Questions,and Problems451
Chapter 15 User Authentication455
15.1 Remote User-Authentication Principles456
15.2 Remote User-Authentication Using Symmetric Encryption460
15.3 Kerberos464
15.4 Remote User-Authentication Using Asymmetric Encryption482
15.5 Federated Identity Management484
15.6 Personal Identity Verification490
15.7 Key Terms,Review Questions,and Problems497
PART SIX:NETWORK AND INTERNET SECURITY501
Chapter 16 Network Access Control and Cloud Security501
16.1 Network Access Control502
16.2 Extensible Authentication Protocol505
16.3 IEEE 802.1X Port-Based Network Access Control509
16.4 Cloud Computing511
16.5 Cloud Security Risks and Countermeasures517
16.6 Data Protection in the Cloud519
16.7 Cloud Security as a Service523
16.8 Addressing Cloud Computing Security Concerns526
16.9 Key Terms,Review Questions,and Problems527
Chapter 17 Transport-Level Security528
17.1 Web Security Considerations529
17.2 Transport Layer Security531
17.3 HTTPS548
17.4 Secure Shell(SSH)549
17.5 Key Terms,Review Questions,and Problems561
Chapter 18 Wireless Network Security563
18.1 Wireless Security564
18.2 Mobile Device Security567
18.3 IEEE 802.11 Wireless LAN Overview571
18.4 IEEE 802.11i Wireless LAN Security577
18.5 Key Terms,Review Questions,and Problems592
Chapter 19 Electronic Mail Security594
19.1 Internet Mail Architecture595
19.2 Email Formats599
19.3 Email Threats and Comprehensive Email Security607
19.4 S/MIME609
19.5 Pretty Good Privacy620
19.6 DNSSEC621
19.7 DNS-Based Authentication of Named Entities625
19.8 Sender Policy Framework627
19.9 DomainKeys Identified Mail630
19.10 Domain-Based Message Authentication,Reporting,and Conformance636
19.11 Key Terms,Review Questions,and Problems641
Chapter 20 IP Security643
20.1 IP Security Overview644
20.2 IP Security Policy650
20.3 Encapsulating Security Payload655
20.4 Combining Security Associations663
20.5 Internet Key Exchange666
20.6 Cryptographic Suites674
20.7 Key Terms,Review Questions,and Problems676
APPENDICES678
Appendix A Projects for Teaching Cryptography and Network Security678
A.1 Sage Computer Algebra Projects679
A.2 Hacking Project680
A.3 Block Cipher Projects681
A.4 Laboratory Exercises681
A.5 Research Projects681
A.6 Programming Projects682
A.7 Practical Security Assessments682
A.8 Firewall Projects683
A.9 Case Studies683
A.10 Writing Assignments683
A.11 Reading/Report Assignments684
A.12 Discussion Topics684
Appendix B Sage Examples685
B.1 Linear Algebra and Matrix Functionality686
B.2 Chapter 2:Number Theory687
B.3 Chapter 3:Classical Encryption692
B.4 Chapter 4:Block Ciphers and the Data Encryption Standard695
B.5 Chapter 5:Basic Concepts in Number Theory and Finite Fields699
B.6 Chapter 6:Advanced Encryption Standard706
B.7 Chapter 8:Pseudorandom Number Generation and Stream Ciphers711
B.8 Chapter 9:Public-Key Cryptography and RSA713
B.9 Chapter 10:Other Public-Key Cryptosystems716
B.10 Chapter 11:Cryptographic Hash Functions721
B.11 Chapter 13:Digital Signatures723
References726
Credits735
Index736
热门推荐
- 677809.html
- 2555680.html
- 1601787.html
- 347060.html
- 815469.html
- 2384714.html
- 3031148.html
- 633525.html
- 2490842.html
- 617251.html
- http://www.ickdjs.cc/book_1528206.html
- http://www.ickdjs.cc/book_1473348.html
- http://www.ickdjs.cc/book_1250573.html
- http://www.ickdjs.cc/book_120251.html
- http://www.ickdjs.cc/book_2175833.html
- http://www.ickdjs.cc/book_1941525.html
- http://www.ickdjs.cc/book_2482591.html
- http://www.ickdjs.cc/book_2962340.html
- http://www.ickdjs.cc/book_526787.html
- http://www.ickdjs.cc/book_165015.html