Network Security Essentials: Applications and StandardsFor one-semester courses on Network Security for computer science, engineering, and CIS majors. This text provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. It includes a concise section on the discipline of cryptography covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. Visit Stallings Companion Website at http://williamstallings.com/NetSec/NetSec3e.html for student and instructor resources and his Computer Science Student Resource site http://williamstallings.com/StudentSupport.html Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required) Supplements Include: Solutions Manual, Power Point slides and Projects. |
From inside the book
Results 1-3 of 28
... ISAKMP ISAKMP defines procedures and packet formats to establish , negotiate , modify , and delete security associations . As part of SA establishment , ISAKMP defines payloads for exchanging key generation and authentication data ...
... ISAKMP Payload Types All ISAKMP payloads begin with the same generic payload header shown in Figure 6.12b . The Next Payload field has a value of 0 if this is the last payload in the message ; otherwise its value is the type of the next ...
... ISAKMP - SA negotiation Basic SA agreed on Key generated ; Initiator identity verified by responder Responder identity verified by initiator ; Key generated ; SA established ( b ) Identity Protection Exchange Begin ISAKMP - SA ...
Contents
INTRODUCTION | 2 |
PART ONE CRYPTOGRAPHY | 25 |
PUBLICKEY CRYPTOGRAPHY | 53 |
Copyright | |
13 other sections not shown