密码编码学与网络安全-原理与实践-(第七版)-英文版

本书特色

[

本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。纸质教材分为六部分:背景知识部分介绍计算机与网络安全的概念、数论;对称密码部分讨论古典加密技术、分组加密和数据加密标准、有限域、高级加密标准、分组加密操作、*位生成和流密码;非对称密码部分讨论公钥加密和RSA、其他公钥加密体制;密码编码数据完整性算法部分讨论哈希函数、消息认证编码、数字签名;互信部分讨论密钥管理与分发、用户鉴别;网络和互联网安全部分讨论网络访问控制和云安全、传输层安全、无线网络安全、电子邮件安全、IP安全。联机内容分为两部分:系统安全部分讨论恶意软件、入侵者、防火墙;法律和道德问题部分讨论与计算机和网络安全相关的法律与道德问题。与第六版相比,书的章节组织基本不变,但增加了许多新内容,如数论、格式保留加密、真*数生成器、云安全、传输层安全、移动设备安全等。

]

内容简介

[

本书是密码编码学与网络空间安全领域的经典教材,已被国内几十所高校高年级本科生和研究生课程采用为教材。

]

作者简介

[

William Stallings:美国圣母大学电子工程学士,麻省理工学院计算机科学博士,《密码术》期刊编委。美国多家高科技公司执行总监,政府机构、计算机软/硬件供应商顾问;曾为各种计算机和操作系统设计并实现TCP/IP和OSI协议套件;创建并维护了计算机科学专业学生资源网站ComputerScienceStudent.com。出版图书17种,内容涉及计算机安全、计算机网络和计算机系统结构等;在《IEEE进展》《ACM计算评论》和《密码术》等杂志上发表文章多篇;先后12次获美国年度*计算机科学教科书奖和学术作者协会奖。

]

目录

Part One: Background 1Chapter 1 Computer and Network Security Concepts 11.1 Computer Security Concepts 31.2 The OSI Security Architecture 81.3 Security Attacks 91.4 Security Services 111.5 Security Mechanisms 141.6 Fundamental Security Design Principles 161.7 Attack Surfaces and Attack Trees 191.8 A Model for Network Security 231.9 Standards 251.10 Key Terms, Review Questions, and Problems 26Chapter 2 Introduction to Number Theory 282.1 Divisibility and the Division Algorithm 292.2 The Euclidean Algorithm 312.3 Modular Arithmetic 352.4 Prime Numbers 432.5 Fermat’s and Euler’s Theorems 462.6 Testing for Primality 502.7 The Chinese Remainder Theorem 532.8 Discrete Logarithms 552.9 Key Terms, Review Questions, and Problems 60Appendix 2A The Meaning of Mod 64Part Two: Symmetric Ciphers 67Chapter 3 Classical Encryption Techniques 673.1 Symmetric Cipher Model 683.2 Substitution Techniques 743.3 Transposition Techniques 893.4 Rotor Machines 903.5 Steganography 923.6 Key Terms, Review Questions, and Problems 94Chapter 4 Block Ciphers and the Data Encryption Standard 1004.1 Traditional Block Cipher Structure 1014.2 The Data Encryption Standard 1114.3 A DES Example 1134.4 The Strength of DES 1164.5 Block Cipher Design Principles 1174.6 Key Terms, Review Questions, and Problems 119Chapter 5 Finite Fields 1235.1 Groups 1255.2 Rings 1275.3 Fields 1285.4 Finite Fields of the Form GF(p) 1295.5 Polynomial Arithmetic 1335.6 Finite Fields of the Form GF(2n) 1395.7 Key Terms, Review Questions, and Problems 151Chapter 6 Advanced Encryption Standard 1536.1 Finite Field Arithmetic 1546.2 AES Structure 1566.3 AES Transformation Functions 1616.4 AES Key Expansion 1726.5 An AES Example 1756.6 AES Implementation 1796.7 Key Terms, Review Questions, and Problems 184Appendix 6A Polynomials with Coefficients in GF(28) 185Chapter 7 Block Cipher Operation 1897.1 Multiple Encryption and Triple DES 1907.2 Electronic Codebook 1957.3 Cipher Block Chaining Mode 1987.4 Cipher Feedback Mode 2007.5 Output Feedback Mode 2027.6 Counter Mode 2047.7 XTS-AES Mode for Block-Oriented Storage Devices 2067.8 Format-Preserving Encryption 2137.9 Key Terms, Review Questions, and Problems 227Chapter 8 Random Bit Generation and Stream Ciphers 2328.1 Principles of Pseudorandom Number Generation 2348.2 Pseudorandom Number Generators 2408.3 Pseudorandom Number Generation Using a Block Cipher 2438.4 Stream Ciphers 2498.5 RC4 2518.6 True Random Number Generators 2538.7 Key Terms, Review Questions, and Problems 262Part Three: Asymmetric Ciphers 265Chapter 9 Public-Key Cryptography and RSA 2659.1 Principles of Public-Key Cryptosystems 2679.2 The RSA Algorithm 2769.3 Key Terms, Review Questions, and Problems 290Chapter 10 Other Public-Key Cryptosystems 29510.1 Diffie-Hellman Key Exchange 29610.2 Elgamal Cryptographic System 30010.3 Elliptic Curve Arithmetic 30310.4 Elliptic Curve Cryptography 31210.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 31610.6 Key Terms, Review Questions, and Problems 318Part Four: Cryptographic Data Integrity Algorithms 321Chapter 11 Cryptographic Hash Functions 32111.1 Applications of Cryptographic Hash Functions 32311.2 Two Simple Hash Functions 32811.3 Requirements and Security 33011.4 Hash Functions Based on Cipher Block Chaining 33611.5 Secure Hash Algorithm (SHA) 33711.6 SHA-3 34711.7 Key Terms, Review Questions, and Problems 359Chapter 12 Message Authentication Codes 36312.1 Message Authentication Requirements 36412.2 Message Authentication Functions 36512.3 Requirements for Message Authentication Codes 37312.4 Security of MACs 37512.5 MACs Based on Hash Functions: HMAC 37612.6 MACs Based on Block Ciphers: DAA and CMAC 38112.7 Authenticated Encryption: CCM and GCM 38412.8 Key Wrapping 39012.9 Pseudorandom Number Generation Using Hash Functions and MACs 39512.10 Key Terms, Review Questions, and Problems 398Chapter 13 Digital Signatures 40113.1 Digital Signatures 40313.2 Elgamal Digital Signature Scheme 40613.3 Schnorr Digital Signature Scheme 40713.4 NIST Digital Signature Algorithm 40813.5 Elliptic Curve Digital Signature Algorithm 41213.6 RSA-PSS Digital Signature Algorithm 41513.7 Key Terms, Review Questions, and Problems 420Part Five: Mutual Trust 423Chapter 14 Key Management and Distribution 42314.1 Symmetric Key Distribution Using Symmetric Encryption 42414.2 Symmetric Key Distribution Using Asymmetric Encryption 43314.3 Distribution of Public Keys 43614.4 X.509 Certificates 44114.5 Public-Key Infrastructure 44914.6 Key Terms, Review Questions, and Problems 451Chapter 15 User Authentication 45515.1 Remote User-Authentication Principles 45615.2 Remote User-Authentication Using Symmetric Encryption 46015.3 Kerberos 46415.4 Remote User-Authentication Using Asymmetric Encryption 48215.5 Federated Identity Management 48415.6 Personal Identity Verification 49015.7 Key Terms, Review Questions, and Problems 497Part Six: Network And Internet Security 501Chapter 16 Network Access Control and Cloud Security 50116.1 Network Access Control 50216.2 Extensible Authentication Protocol 50516.3 IEEE 802.1X Port-Based Network Access Control 50916.4 Cloud Computing 51116.5 Cloud Security Risks and Countermeasures 51716.6 Data Protection in the Cloud 51916.7 Cloud Security as a Service 52316.8 Addressing Cloud Computing Security Concerns 52616.9 Key Terms, Review Questions, and Problems 527Chapter 17 Transport-Level Security 52817.1 Web Security Considerations 52917.2 Transport Layer Security 53117.3 HTTPS 54817.4 Secure Shell (SSH) 54917.5 Key Terms, Review Questions, and Problems 561Chapter 18 Wireless Network Security 56318.1 Wireless Security 56418.2 Mobile Device Security 56718.3 IEEE 802.11 Wireless LAN Overview 57118.4 IEEE 802.11i Wireless LAN Security 57718.5 Key Terms, Review Questions, and Problems 592Chapter 19 Electronic Mail Security 59419.1 Internet Mail Architecture 59519.2 Email Formats 59919.3 Email Threats and Comprehensive Email Security 60719.4 S/MIME 60919.5 Pretty Good Privacy 62019.6 DNSSEC 62119.7 DNS-Based Authentication of Named Entities 62519.8 Sender Policy Framework 62719.9 DomainKeys Identified Mail 63019.10 Domain-Based Message Authentication, Reporting, and Conformance 63619.11 Key Terms, Review Questions, and Problems 641Chapter 20 IP Security 64320.1 IP Security Overview 64420.2 IP Security Policy 65020.3 Encapsulating Security Payload 65520.4 Combining Security Associations 66320.5 Internet Key Exchange 66620.6 Cryptographic Suites 67420.7 Key Terms, Review Questions, and Problems 676APPENDICES 678Appendix A Projects for Teaching Cryptography and Network Security 678A.1 Sage Computer Algebra Projects 679A.2 Hacking Project 680A.3 Block Cipher Projects 681A.4 Laboratory Exercises 681A.5 Research Projects 681A.6 Programming Projects 682A.7 Practical Security Assessments 682A.8 Firewall Projects 683A.9 Case Studies 683A.10 Writing Assignments 683A.11 Reading/Report Assignments 684A.12 Discussion Topics 684Appendix B Sage Examples 685B.1 Linear Algebra and Matrix Functionality 686B.2 Chapter 2: Number Theory 687B.3 Chapter 3: Classical Encryption 692B.4 Chapter 4: Block Ciphers and the Data Encryption Standard 695B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields 699B.6 Chapt

封面

密码编码学与网络安全-原理与实践-(第七版)-英文版

书名:密码编码学与网络安全-原理与实践-(第七版)-英文版

作者:威廉.斯托林斯

页数:768

定价:¥98.0

出版社:电子工业出版社

出版日期:2017-06-01

ISBN:9787121313189

PDF电子书大小:42MB 高清扫描完整版

百度云下载:http://www.chendianrong.com/pdf

发表评论

邮箱地址不会被公开。 必填项已用*标注