图书介绍

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYPDF|Epub|txt|kindle电子书版本网盘下载

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITY
  • 卡哈特(ATUL KAHATE)著 著
  • 出版社:
  • ISBN:
  • 出版时间:2005
  • 标注页数:0页
  • 文件大小:71MB
  • 文件页数:454页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1.Introduction to the Concepts of Security1

1.1 Introduction1

1.2 TheNeed for Security2

1.3 Security Approaches3

1.4 Principles of Security4

1.5 Types of Attacks8

Outline of the Book23

Multiple-choice Questions25

Review Questions26

Design/Programming Exercises27

2.Cryptographic Techniques28

2.1 Introduction28

2.2 Plain Text and CipherText29

2.3 Substitution Techniques31

2.4 Transposition Techniques36

2.5 Encryption and Decryption40

2.6 Symmetric and Asymmetric Key Cryptography43

2.7 Steganography53

2.8 Key Range and Key Size54

2.9 Possible Types of Attacks57

Chapter Summary58

Key Terms and Concepts59

Multiple-choice Questions59

Review Questions60

Design/Programming Exercises61

3.Computer-based Symmetric Key Cryptographic Algorithms63

3.1 Introduction63

3.2 Algorithm Types and Modes63

3.3 An Overview of Symmetric Key Cryptography73

3.4 DataEncryption Standard(DES)75

3.5 International Data Encryption Algorithm(IDEA)90

3.6 RC598

3.7 Blowfish105

3.8 Advanced Encryption Standard(AES)107

3.9 Differential and Linear Cryptanalysis109

Chapter Summary110

Key Terms and Concepts110

Multiple-choice Questions110

Review Questions111

Design/Programming Exercises111

4.Computer-based Asymmetric Key Cryptographic Algorithms112

4.1 Introduction112

4.2 Brief History of Asymmetric Key Cryptography112

4.3 An Overview of Asymmetric Key Cryptography113

4.4 The RSA Algorithm115

4.5 Symmetric and Asymmetric Key Cryptography Together119

4.6 Digital Signatures125

4.7 Knapsack Algorithm154

4.8 Some other Algorithms154

Chapter Summary157

Key Terms and Concepts158

Multiple-choice Questions158

Review Questions159

Design/Programming Exercises159

5.Public Key Infrastructure(PKI)161

5.1 Introduction161

5.2 Digital Certificates162

5.3 Private Key Management194

5.4 The PKIX Model196

5.5 Public Key Cryptography Standards(PKCS)198

5.6 XML,PKI and Security204

Chapter Summary208

Key Terms and Concepts208

Multiple-choice Questions209

Review Questions210

Design/Programming Exercises210

6.Internet Security Protocols211

6.1 Basic Concepts211

6.2 Secure Socket Layer(SSL)218

6.3 Secure Hyper Text Transfer Protocol(SHTTP)229

6.4 Time Stamping Protocol(TSP)230

6.5 Secure Electronic Transaction(SET)231

6.6 SSL Versus SET244

6.7 3-D Secure Protocol244

6.8 Electronic Money245

6.9 Email Security250

6.10 Wireless Application Protocol(WAP)Security263

6.11 Securityin GSM266

Chapter Summary268

Key Terms and Concepts269

Multiple-choice Questions269

Review Questions270

Design/Programming Exercises270

7.User Authentication Mechanisms271

7.1 Introduction271

7.2 Authentication Basics271

7.3 Passwords272

7.4 Authentication Tokens286

7.5 Certificate-based Authentication297

7.6 Biometric Authentication303

7.7 Kerberos304

7.8 Single Sign On(SSO)Approaches309

Chapter Summary310

Key Terms and Concepts311

Multiple-choice Questions311

Review Questions312

Design/Programming Exercises312

8.Practical Implementations of Cryptography/Security314

8.1 Cryptographic Solutions Using Java314

8.2 Cryptographic Solutions Using Microsoft322

8.3 Cryptographic Toolkits324

8.4 Security and Operating Systems325

Chapter Summary330

Key Terms and Concepts330

Multiple-choice Questions330

Review Questions331

Design/Programming Exercises331

9.Network Security332

9.1 Brief Introduction to TCP/IP332

9.2 Firewalls338

9.3 IPSecurity349

9.4 Virtual Private Networks(VPN)365

Chapter Summary368

Key Terms and Concepts368

Multiple-choice Questions369

Review Questions369

10.Case Studies on Cryptography and Security371

10.1 Introduction371

10.2 Cryptographic Solutions—A Case Study371

10.3 Single Sign On(SSO)379

10.4 Secure Inter-branch Payment Transactions382

10.5 Denial of Service(DOS)Attacks385

10.6 IP Spoofing Attacks388

10.7 Cross Site Scripting Vulnerability(CSSV)389

10.8 Contract Signing391

10.9 Secret Splitting392

10.10 Virtual Elections394

10.11 Secure Multiparty Calculation395

Appendix A—Mathematical Background396

Appendix B—Number Systems401

Appendix C—Information Theory406

Appendix D—Real-life Tools408

Appendix E—Web Resources409

Appendix F—A Brief Introduction to ASN,BER,DER411

Appendix G—Modern Security Trends413

Answers to Multiple-choice Questions419

Glossary420

References426

Index428

热门推荐