Cryptography and network security

Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format. These portable learning tools hav...

Descripción completa

Detalles Bibliográficos
Otros Autores: Limited, ITL, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] ITL Education Solutions 2012
Edición:1st edition
Colección:Pearson instant learning series
Express learning series
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629613306719
Tabla de Contenidos:
  • Cover
  • Contents
  • Preface
  • Chapter 1: Overview of Network Security
  • Passive Attacks
  • Active Attacks
  • Multiple-choice Questions
  • Answers
  • Chapter 2: Cryptography and Finite Fields
  • Symmetric-key Encipherment
  • Asymmetric-key Encipherment
  • Algorithm
  • Group
  • Ring
  • Field
  • Algorithm
  • Multiple-choice Questions
  • Answers
  • Chapter 3: Symmetric-key Ciphers
  • Additive cipher
  • Shift cipher
  • Caesar cipher
  • Multiplicative cipher
  • Affine cipher
  • Autokey cipher
  • Playfair cipher
  • Vigenere cipher
  • Hill cipher
  • Basic model
  • Final design of the Feistel cipher
  • Encryption
  • Decryption
  • Encryption
  • Decryption
  • Multiple-choice Questions
  • Answers
  • Chapter 4: Symmetric-key Algorithms
  • DES Structure
  • DES Function
  • Weakness in the Cipher Design
  • Weakness in the Cipher Key
  • Meet-in-the-middle Attack
  • 3-DES with Two Keys
  • 3-DES with Three Keys
  • Working of IDEA
  • Encryption Round
  • Output Transformation
  • Decryption
  • Strength of IDEA
  • General Design of AES
  • Structure of Encryption Round
  • Transformations
  • Key Expansion in AES-128
  • Electronic Code Book (ECB) Mode
  • Cipher Block Chaining (CBC) Mode
  • Cipher Feedback (CFB) Mode
  • Output Feedback (OFB) Mode
  • Multiple-choice Questions
  • Answers
  • Chapter 5: Number Theory
  • Proof
  • Miller-Rabin algorithm
  • Multiple-choice Questions
  • Answers
  • Chapter 6: Asymmetric-key Algorithms
  • RSA Key Generation
  • RSA Encryption and Decryption
  • Distribution of Public Keys
  • Distribution of Secret Keys using Public-key Cryptography
  • Diffie-Hellman algorithm
  • Proof of algorithm
  • Security of the Diffie-Hellman algorithm
  • ElGamal key generation
  • ElGamal encryption
  • ElGamal decryption
  • Proof of decryption
  • ECC with Diffie-Hellman key exchange
  • ECC encryption
  • ECC decryption
  • Security of ECC.
  • Multiple-choice Questions
  • Answers
  • Chapter 7: Message Authentication and Hash Functions
  • Simple Hash Function
  • Whirlpool Hash Function
  • Whirlpool Cipher
  • Design Objectives of HMAC
  • HMAC Implementation
  • Direct digital signature
  • Arbitrated digital signature
  • RSA digital signature scheme on a message digest
  • Proof of the digital signature algorithm
  • Symmetric-key encryption technique
  • Public-key encryption technique
  • Symmetric-key encryption technique
  • Public-key encryption technique
  • Multiple-choice Questions
  • Answers
  • Chapter 8: Digital Signatures and Authentication Protocols
  • Direct digital signature
  • Arbitrated digital signature
  • RSA digital signature scheme on a message digest
  • Proof of the digital signature algorithm
  • Symmetric-key encryption technique
  • Public-key encryption technique
  • Symmetric-key encryption technique
  • Public-key encryption technique
  • Multiple-choice Questions
  • Answers
  • Chapter 9: Network Security
  • Authentication only
  • Confidentiality only
  • Confidentiality and Authentication
  • Compression
  • E-mail Compatibility
  • Segmentation and Reassembly
  • MIME Overview
  • S/MIME Functionality
  • S/MIME Messages
  • S/MIME Certificate Processing
  • S/MIME Enhanced Security Services
  • AH Transport Mode
  • AH Tunnel Mode
  • Transport Mode ESP
  • Tunnel Mode ESP
  • SSL architecture
  • Working of SET
  • Dual Signatures
  • Multiple-choice Questions
  • Answers
  • Chapter 10: System Security
  • Intrusion Techniques
  • Antivirus Approaches
  • Advantages
  • Disadvantages
  • Advantages
  • Disadvantages
  • Advantages
  • Disadvantages
  • Multiple-choice Questions
  • Answers
  • Index.