图书介绍
密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYPDF|Epub|txt|kindle电子书版本网盘下载
![密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITY](https://www.shukui.net/cover/63/32780103.jpg)
- 卡哈特(ATUL KAHATE)著 著
- 出版社:
- ISBN:
- 出版时间:2005
- 标注页数:0页
- 文件大小:71MB
- 文件页数:454页
- 主题词:
PDF下载
下载说明
密码学与网络安全 影印版=CRYPTOGRAPHY AND NETWORK SECURITYPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1.Introduction to the Concepts of Security1
1.1 Introduction1
1.2 TheNeed for Security2
1.3 Security Approaches3
1.4 Principles of Security4
1.5 Types of Attacks8
Outline of the Book23
Multiple-choice Questions25
Review Questions26
Design/Programming Exercises27
2.Cryptographic Techniques28
2.1 Introduction28
2.2 Plain Text and CipherText29
2.3 Substitution Techniques31
2.4 Transposition Techniques36
2.5 Encryption and Decryption40
2.6 Symmetric and Asymmetric Key Cryptography43
2.7 Steganography53
2.8 Key Range and Key Size54
2.9 Possible Types of Attacks57
Chapter Summary58
Key Terms and Concepts59
Multiple-choice Questions59
Review Questions60
Design/Programming Exercises61
3.Computer-based Symmetric Key Cryptographic Algorithms63
3.1 Introduction63
3.2 Algorithm Types and Modes63
3.3 An Overview of Symmetric Key Cryptography73
3.4 DataEncryption Standard(DES)75
3.5 International Data Encryption Algorithm(IDEA)90
3.6 RC598
3.7 Blowfish105
3.8 Advanced Encryption Standard(AES)107
3.9 Differential and Linear Cryptanalysis109
Chapter Summary110
Key Terms and Concepts110
Multiple-choice Questions110
Review Questions111
Design/Programming Exercises111
4.Computer-based Asymmetric Key Cryptographic Algorithms112
4.1 Introduction112
4.2 Brief History of Asymmetric Key Cryptography112
4.3 An Overview of Asymmetric Key Cryptography113
4.4 The RSA Algorithm115
4.5 Symmetric and Asymmetric Key Cryptography Together119
4.6 Digital Signatures125
4.7 Knapsack Algorithm154
4.8 Some other Algorithms154
Chapter Summary157
Key Terms and Concepts158
Multiple-choice Questions158
Review Questions159
Design/Programming Exercises159
5.Public Key Infrastructure(PKI)161
5.1 Introduction161
5.2 Digital Certificates162
5.3 Private Key Management194
5.4 The PKIX Model196
5.5 Public Key Cryptography Standards(PKCS)198
5.6 XML,PKI and Security204
Chapter Summary208
Key Terms and Concepts208
Multiple-choice Questions209
Review Questions210
Design/Programming Exercises210
6.Internet Security Protocols211
6.1 Basic Concepts211
6.2 Secure Socket Layer(SSL)218
6.3 Secure Hyper Text Transfer Protocol(SHTTP)229
6.4 Time Stamping Protocol(TSP)230
6.5 Secure Electronic Transaction(SET)231
6.6 SSL Versus SET244
6.7 3-D Secure Protocol244
6.8 Electronic Money245
6.9 Email Security250
6.10 Wireless Application Protocol(WAP)Security263
6.11 Securityin GSM266
Chapter Summary268
Key Terms and Concepts269
Multiple-choice Questions269
Review Questions270
Design/Programming Exercises270
7.User Authentication Mechanisms271
7.1 Introduction271
7.2 Authentication Basics271
7.3 Passwords272
7.4 Authentication Tokens286
7.5 Certificate-based Authentication297
7.6 Biometric Authentication303
7.7 Kerberos304
7.8 Single Sign On(SSO)Approaches309
Chapter Summary310
Key Terms and Concepts311
Multiple-choice Questions311
Review Questions312
Design/Programming Exercises312
8.Practical Implementations of Cryptography/Security314
8.1 Cryptographic Solutions Using Java314
8.2 Cryptographic Solutions Using Microsoft322
8.3 Cryptographic Toolkits324
8.4 Security and Operating Systems325
Chapter Summary330
Key Terms and Concepts330
Multiple-choice Questions330
Review Questions331
Design/Programming Exercises331
9.Network Security332
9.1 Brief Introduction to TCP/IP332
9.2 Firewalls338
9.3 IPSecurity349
9.4 Virtual Private Networks(VPN)365
Chapter Summary368
Key Terms and Concepts368
Multiple-choice Questions369
Review Questions369
10.Case Studies on Cryptography and Security371
10.1 Introduction371
10.2 Cryptographic Solutions—A Case Study371
10.3 Single Sign On(SSO)379
10.4 Secure Inter-branch Payment Transactions382
10.5 Denial of Service(DOS)Attacks385
10.6 IP Spoofing Attacks388
10.7 Cross Site Scripting Vulnerability(CSSV)389
10.8 Contract Signing391
10.9 Secret Splitting392
10.10 Virtual Elections394
10.11 Secure Multiparty Calculation395
Appendix A—Mathematical Background396
Appendix B—Number Systems401
Appendix C—Information Theory406
Appendix D—Real-life Tools408
Appendix E—Web Resources409
Appendix F—A Brief Introduction to ASN,BER,DER411
Appendix G—Modern Security Trends413
Answers to Multiple-choice Questions419
Glossary420
References426
Index428