Table of Contents
Part One: Symmetric Ciphers
- Chapter 1. Introduction
- Chapter 2. Classical Encryption Techniques
- Chapter 3. Block Ciphers and the Data Encryption Standard
- Chapter 4. Finite Fields
- Chapter 5. Advanced Encryption Standard
- Chapter 6. More on Symmetric Ciphers
- Chapter 7. Confidentiality Using Symmetric Encryption
Part Two: Public-Key Encryption and Hash Functions
- Chapter 8. Introduction to Number Theory
- Chapter 9. Public-Key Cryptography and RSA
- Chapter 10. Key Management; Other Public-Key Cryptosystems
- Chapter 11. Message Authentication and Hash Functions
- Chapter 12. Hash and MAC Algorithms
- Chapter 13. Digital Signatures and Authentication Protocols
Part Three: Network Security Applications
- Chapter 14. Authentication Applications
- Chapter 15. Electronic Mail Security
- Chapter 16. IP Security
- Chapter 17. Web Security
Part Four: System Security
- Chapter 18. Intruders
- Chapter 19. Malicious Software
- Chapter 20. Firewalls
Post a Comment