This book is an introduction to the fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book, the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts.
Features
+Covers key concepts related to cryptography and network security
+Includes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more
Table of Contents
1: Introduction. 2: Conventional Encryption and Message Confidentiality. 3: Symmetric Key Encryption. 4. Modern Block Ciphers. 5. Data Encryption Standard. 6: Advanced Encryption Standard. 7: Asymmetric Key Encryption.
8: Message Integrity and Authentication. 9: Hash Function. 10: Digital Signature. 11: Entity Authentication.
12: Authentication and Key Management Applications. 13: Network Security and Protocols. 14: Network Attacks and Security Threats. 15: Application Layer Security. 16: Transport Layer Security. 17: Network Layer Security. 18: Data Link Layer Security. 19: Intruders, Viruses, Worms, and Trojan Horses. 20: Firewalls and VPNs. Index.