Cryptography And Network Security

Front Cover
Technical Publications, Jan 1, 2008 - 202 pages
4 Reviews
OSI Security Architecture - Classical encryption techniques - Cipher principles - Data encryption standard - Block cipher design principles and modes of operation - Evaluation criteria for AES - AES cipher - Triple DES - Placement of encryption function - Traffic confidentiality.Public Key CryptographyKey management - Diffie-Hellman key exchange - Elliptic curve architecture and cryptography - Introduction to number theory - Confidentiality using symmetric encryption - Public key cryptography and RSA.Authentication and Hash Function Authentication requirements - Authentication functions - Message authentication codes - Hash functions - Security of hash functions and MACs - MD5 message digest algorithm - Secure hash algorithm - RIPEMD - HMAC digital signatures - Authentication protocols - Digital signature standard.Network SecurityAuthentication applications : Kerberos - X.509 authentication service - Electronic mail security - PGP - S/MIME - IP security - Web security.System Level SecurityInstrusion detection - Password management - Viruses and related threats - Virus counter measures - Firewall design principles - Trusted systems.
 

What people are saying - Write a review

User Review - Flag as inappropriate

great book.

User Review - Flag as inappropriate

save

Contents

ij wKrnKswi vx awi? miv i avv viiMv
1-1
Public Key Cryptography J2 1 to 2
1-2
Authentication and Hash Function 3 1 to 3
3-3
Chapter5 System Level Security 5 1 to 522
5-1
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information