ISBN 9780070702080,Cryptography And Network Security

Cryptography And Network Security



Tata Mcgraw Hill Education Private Limited

Publication Year 2011

ISBN 9780070702080

ISBN-10 007070208X


Edition 2nd
Number of Pages 702 Pages
Language (English)
The second edition of Cryptography and Network Security is a comprehensive book that covers all the crucial topics related to network security. It is designed for non-specialist readers and thus begins by presenting the necessary mathematical background. The latest edition has been written in an easy language and it explains the difficult concepts in a very lucid manner using easy to understand schematic diagrams. Certain additions and alterations have been made in this second edition of the book to make it more appropriate for the readers. First of all, to make it more comprehensible it makes use of several examples and illustrations to clarify the methodologies and techniques related to cryptography and network security. The author has included an addition chapter System Security. This enhances the knowledge of the students thereby enabling them to handle attacks of malicious software and intruders on the computer system. Moreover, it informs the reader how to take security and protective measures against such unwanted elements by using Intrusion detection systems. Another salient feature of this book is that it comes loaded with several algorithms, solved examples, illustrations, and algorithms. The author has deliberately used fictitious characters to make the book more interesting. The book covers an in-depth discussion of modern techniques such as advanced encryption techniques, zero-knowledge, Index of coincidence, biometrics, and Random Oracle model. The second edition includes coverage of some additional topics such as Secure Electronic translation, and conventional algorithms, etc. It provides thorough discussion on topics related to Hash Functions, Digital Signatures, and Symmetric Ciphers. And the author has used Pseudocodes to teach the readers how to implement algorithm. For further clarification and practice, the book includes 400 exercises, 200 review questions, more than 400 illustrations, and over 250 solved examples. This edition has been written with an objective to bridge the gap between textbooks that have been written on a very introductory level and others that have written in an advanced level. Thus, it is completely suitable for the needs of the graduate and post graduate courses in Computer Science, Information Technology, and Computer Applications. About The Authors Behrouz A. Forouzan works as the professor at the Computer Information Systems department of DeAnza College. Besides Cryptography and Network Security, he has authored several other books on networking, computer science, databases, and programming. These are Data Structures: A Pseudocode Approach With C (with Richard F. Gilberg), UNIX and Shell Programming: A Textbook, Computer Science: A Structured Approach Using C++, Data Communications and Networking (with Sophia Chung Fegan), TCP/IP Protocol Suite, and many others. Behrouz A. Forouzan was born in 1944. He did his graduation from the University of California, Irvine. Debdeep Mukhopadhyay works as an assistant professor at the Computer Science and Engineering department of the Indian Institute of Technology Kharagpur. Besides Cryptography and Network Security, he has also authored other books including Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 2011. Proceedings (Paperback). His primary research area is VLSI (Design and Test) of Cryptographic Algorithms. TABLE OF CONTENTS Chapter 1 Introduction Chapter 2 Mathematics of Cryptography Chapter 3 Traditional Symmetric-Key Ciphers Chapter 4 Mathematics of Symmetric Key Cryptography Chapter 5 Introduction to Modern Symmetric-Key Ciphers Chapter 6 Data Encryption Standard (DES) Chapter 7 Advanced Encryption Standard (AES) Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Chapter 9 Mathematics of Asymmetric Key Cryptography Chapter 10 Asymmetric-Key Cryptography Chapter 11 Message Integrity and Message Authentication Chapter 12 Cryptographic Hash Functions Chapter 13 Digital Signature Chapter 14 Entity Authentication Chapter 15 Key Management Chapter 16 Security at the Application Layer: PGP and S/MIME Chapter 17 Security at the Transport Layer: SSL and TLS Chapter 18 Security at the Network Layer: IPSec Chapter 19 System Security