Introduction to network security theory and practice
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network secu...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Singapore :
Wiley
2015.
|
Edición: | Second edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629925606719 |
Tabla de Contenidos:
- Cover; Title Page; Copyright; Contents; Preface; About the Authors; Chapter 1 Network Security Overview; 1.1 Mission and Definitions; 1.2 Common Attacks and Defense Mechanisms; 1.2.1 Eavesdropping; 1.2.2 Cryptanalysis; 1.2.3 Password Pilfering; 1.2.4 Identity Spoofing; 1.2.5 Buffer-Overflow Exploitations; 1.2.6 Repudiation; 1.2.7 Intrusion; 1.2.8 Traffic Analysis; 1.2.9 Denial of Service Attacks; 1.2.10 Malicious Software; 1.3 Attacker Profiles; 1.3.1 Hackers; 1.3.2 Script Kiddies; 1.3.3 Cyber Spies; 1.3.4 Vicious Employees; 1.3.5 Cyber Terrorists; 1.3.6 Hypothetical Attackers
- 1.4 Basic Security Model1.5 Security Resources; 1.5.1 CERT; 1.5.2 SANS Institute; 1.5.3 Microsoft Security; 1.5.4 NTBugtraq; 1.5.5 Common Vulnerabilities and Exposures; 1.6 Closing Remarks; 1.7 Exercises; 1.7.1 Discussions; 1.7.2 Homework; Chapter 2 Data Encryption Algorithms; 2.1 Data Encryption Algorithm Design Criteria; 2.1.1 ASCII Code; 2.1.2 XOR Encryption; 2.1.3 Criteria of Data Encryptions; 2.1.4 Implementation Criteria; 2.2 Data Encryption Standard; 2.2.1 Feistel's Cipher Scheme; 2.2.2 DES Subkeys; 2.2.3 DES Substitution Boxes; 2.2.4 DES Encryption
- 2.2.5 DES Decryption and Correctness Proof2.2.6 DES Security Strength; 2.3 Multiple DES; 2.3.1 Triple-DES with Two Keys; 2.3.2 2DES and 3DES/3; 2.3.3 Meet-in-the-Middle Attacks on 2DES; 2.4 Advanced Encryption Standard; 2.4.1 AES Basic Structures; 2.4.2 AES S-Boxes; 2.4.3 AES-128 Round Keys; 2.4.4 Add Round Keys; 2.4.5 Substitute-Bytes; 2.4.6 Shift-Rows; 2.4.7 Mix-Columns; 2.4.8 AES-128 Encryption; 2.4.9 AES-128 Decryption and Correctness Proof; 2.4.10 Galois Fields; 2.4.11 Construction of the AES S-Box and Its Inverse; 2.4.12 AES Security Strength
- 2.5 Standard Block Cipher Modes of Operations2.5.1 Electronic-Codebook Mode; 2.5.2 Cipher-Block-Chaining Mode; 2.5.3 Cipher-Feedback Mode; 2.5.4 Output-Feedback Mode; 2.5.5 Counter Mode; 2.6 Offset Codebook Mode of Operations; 2.6.1 Basic Operations; 2.6.2 OCB Encryption and Tag Generation; 2.6.3 OCB Decryption and Tag Verification; 2.7 Stream Ciphers; 2.7.1 RC4 Stream Cipher; 2.7.2 RC4 Security Weaknesses; 2.8 Key Generations; 2.8.1 ANSI X9.17 PRNG; 2.8.2 BBS Pseudorandom Bit Generator; 2.9 Closing Remarks; 2.10 Exercises; 2.10.1 Discussions; 2.10.2 Homework
- Chapter 3 Public-Key Cryptography and Key Management3.1 Concepts of Public-Key Cryptography; 3.2 Elementary Concepts and Theorems in Number Theory; 3.2.1 Modular Arithmetic and Congruence Relations; 3.2.2 Modular Inverse; 3.2.3 Primitive Roots; 3.2.4 Fast Modular Exponentiation; 3.2.5 Finding Large Prime Numbers; 3.2.6 The Chinese Remainder Theorem; 3.2.7 Finite Continued Fractions; 3.3 Diffie-Hellman Key Exchange; 3.3.1 Key Exchange Protocol; 3.3.2 Man-in-the-Middle Attacks; 3.3.3 Elgamal PKC; 3.4 RSA Cryptosystem; 3.4.1 RSA Key Pairs, Encryptions, and Decryptions
- 3.4.2 RSA Parameter Attacks