Table of Contents
NOTATION
PREFACE
CHAPTER 0 READER'S GUIDE
CHAPTER 1 OVERVIEW
PART ONE SYMMETRIC CIPHERS
CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES
CHAPTER 3 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD
CHAPTER 4 INTRODUCTION TO FINITE FIELDS
CHAPTER 5 ADVANCED ENCRYPTION STANDARD
CHAPTER 6 MORE ON SYMMETRIC CIPHERS
CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS
CHAPTER 8 INTRODUCTION TO NUMBER THEORY
CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA
CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS
CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS
1
CHAPTER 12 HASH AND MAC ALGORITHMS
CHAPTER 13 DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS
PART THREE NETWORK SECURITY PRACTICE
CHAPTER 14 AUTHENTICATION APPLICATIONS
CHAPTER 15 ELECTRONIC MAIL SECURITY
CHAPTER 16 IP SECURITY
CHAPTER 17 WEB SECURITY
PART FOUR SYSTEM SECURITY
CHAPTER 18 INTRUDERS
CHAPTER 19 MALICIOUS SOFTWARE
CHAPTER 20 FIREWALLS
APPENDICES
APPENDIX A STANDARDS AND STANDARD-SETTING ORGANIZATIONS
APPENDIX B PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY
ONLINE APPENDICES
APPENDIX C SIMPLIFIED DES
APPENDIX D THE MEANING OF mod
APPENDIX E MORE ON SIMPLIFIED AES
APPENDIX F KNAPSACK PUBLIC-KEY ALGORITHM
APPENDIX G PROOF OF THE DIGITAL SIGNATURE ALGORITHM
GLOSSARY
REFERENCES
INDEX
LIST OF ACRONYMS