Cryptography and Network Security 最新版
英文版 Notation xi Preface xiii Chapter 0 0.1 0.2 0.3 0.4 Chapter 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Guide for Readers and Instructors 1 Outline of This Book 2 A Roadmap for Readers and Instructors 3 Internet and Web Resources 4 Standards 5 Overview 7 Computer Security Concepts 9 The OSI Security Architecture 14 Security Attacks 15 Security Services 17 Security Mechanisms 20 A Model for Network Security 22 Recommended Reading 24 Key Terms, Review Questions, and Problems 25 Part One Symmetric ciPherS 27 Chapter 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Chapter 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Chapter 4 4.1 4.2 Classical Encryption Techniques 27 Symmetric Cipher Model 28 Substitution Techniques 34 Transposition Techniques 49 Rotor Machines 50 Steganography 52 Recommended Reading 54 Key Terms, Review Questions, and Problems 55 Block Ciphers and the Data Encryption Standard 61 Traditional Block Cipher Structure 63 The Data Encryption Standard 72 A DES Example 74 The Strength of DES 77 Block Cipher Design Principles 78 Recommended Reading 80 Key Terms, Review Questions, and Problems 81 Basic Concepts in Number Theory and Finite Fields 85 Divisibility and the Division Algorithm 87 The Euclidean Algorithm 88 2.6 2.7 Chapter 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Chapter 4 4.1 4.2 Classical Encryption Techniques 27 Symmetric Cipher Model 28 Substitution Techniques 34 Transposition Techniques 49 Rotor Machines 50 Steganography 52 Recommended Reading 54 Key Terms, Review Questions, and Problems 55 Block Ciphers and the Data Encryption Standard 61 Traditional Block Cipher Structure 63 The Data Encryption Standard 72 A DES Example 74 The Strength of DES 77 Block Cipher Design Principles 78 Recommended Reading 80 Key Terms, Review Questions, and Problems 81 Basic Concepts in Number Theory and Finite Fields 85 Divisibility and the Division Algorithm 87 The Euclidean Algorithm 88