| About The Book Cryptography And Network Security
The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.
Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.
The subject matter is illustrated with about 200 figures and numerous examples at every stage of learning.
The list of recommended books, technical articles, and standards is included chapter-wise at the end of the book.
An exhaustive glossary and a list of frequently used acronyms are also given.
The book is based on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509 etc.).
Table of Contents:
1. Introduction to Network Security
2. Mathematical Foundations I (Modular Arithmetic)
3. Classical Encryption Techniques
4. Symmetric-key Ciphers I: Data Encryption Standard
5. Mathematical Foundations II (Finite Fields)
6. Symmetric-key Ciphers II: Advanced Encryption Standard
7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)
8. Mathematical Foundations III (Prime Numbers)
9. Asymmetric-key Cryptosystems
10. Elliptic Curve Cryptography
11. Message Authentication
12. Digital Signatures
13. Entity Authentication
14. Symmetric-key Distribution
15. Public-key Distribution
16. Email Security
17. Transport Layer Security (TLS)
18. IP Security
19. Internet Key Exchange (IKE)
20. Wireless LAN Security
21. Network Vulnerabilities
22. Firewalls and Intrusion Detection Systems
Appendix A1: Prime Numbers, Primitive Roots, Irreducible Polynomials
Appendix A2: Birthday Problems
Appendix A3: Networking Protocols for User Authentication
Glossary Answers to Selected Problems Index