Cryptography and Network Security – William Stallings – 4th Edition


In this age of viruses and hackers, of eavesdropping and fraud, security is paramount.

As the disciplines of and security have matured, more practical, readily available applications to enforce security have developed. This text provides a practical survey of both the principles and practice of cryptography and security.

First, the basic issues to be addressed by a capability are explored through a tutorial and survey of cryptography and technology. Then, the practice of is explored via practical applications that have been implemented and are in use today.

Table of Content

0: Reader'S Guide
1: Overview

Part One Symmetric Ciphers
2: Classical Encryption Techniques
3: Block Ciphers And The Data Encryption Standard
4: Introduction To Finite Fields
5: Advanced Encryption Standard
6: More On Symmetric Ciphers
7: Confidentiality Using Symmetric Encryption

Part Two Public-Key Encryption And Hash Functions
8: Introduction To Number Theory
9: Public-Key Cryptography And Rsa
10: Key Management; Other Public-Key Cryptosystems
11: Message Authentication And Hash Functions
12: Hash And Mac Algorithms
13: Digital Signatures And Authentication Protocols

Part Three Network Security Practice
14: Authentication Applications
15: Electronic Mail Security
16: IP Security
17: Web Security

Part Four System Security
18: Intruders
19: Malicious Software
20: Firewalls

Appendix A: Standards And Standard-Setting Organizations
Appendix B: Projects For Teaching Cryptography And Network Security

Online Appendices
Appendix C: Simplified Des
Appendix D: The Meaning Of Mod
Appendix E: More On Simplified Aes
Appendix F: Knapsack Public-Key Algorithm
Appendix G: Proof Of The Digital Signature Algorithm

1 Comment

  • Feedback: Leave your comments here!

    Your opinions and comments would be greatly appreciated.
    If you have comments or questions we've added this section so that we might have a dialogue with you.

Complete all fields

four × 3 =