1. 1 safety target
1. 1. 1 confidentiality
1. 1.2 integrity
1. 1.3 Availability
1.2 attack
1.2. 1 attacks that threaten confidentiality.
1.2.2 Attacks that threaten integrity
1.2.3 Attacks that threaten availability
1.2.4 passive attack and active attack
1.3 services and mechanisms
1.3. 1 security service
1.3.2 security mechanism
1.3.3 Relationship between service and mechanism
1.4 technology
1.4. 1 encryption
1.4.2 Steganography
1.5 The rest of the book
The first part is symmetric key encryption
The second part is asymmetric key encryption
Part III Integrity, Authentication and Key Management
Part IV Network Security
1.6 Recommended reading
1.7 key terms
1.8 summary
1.9 problem set
The first part is symmetric key encryption
Chapter II Cryptography Part I: Modular Algorithm, Congruence and Matrix
2. 1 integer algorithm
2. 1. 1 integer set
2. 1.2 binary operation
2. 1.3 integer division
2. 1.4 divisible
2. 1.5 Linear Diophantine Equation
2.2 Modular operation
2.2. 1 modular operator
Remaining part: zinc
consistency
2.2.4 operation in setting Zn
opposite direction
2.2.6 addition table and multiplication table
2.2.7 Difference between Addition Set and Multiplication Set
Other two sets
2.3 matrix
2.3. 1 definition
2.3.2 Operation and relationship
decisive factor
inverse
Residual matrix
2.4 Linear congruence
2.4. 1 unary linear equation
linear equation
2.5 Recommended reading
2.6 Key terms
2.7 Summary
2.8 problem set
Chapter 3 Traditional Symmetric Key Encryption
3. 1 Introduction
3. 1. 1 kirchhoff principle
3. 1.2 Cryptanalysis
3. 1.3 Classification of traditional passwords
3.2 Replace password
3.2. 1 Single code substitution password
3.2.2 Multi-code substitution password
3.3 transposition password
3.3. 1 Keyless transposition password
3.3.2 Transposition password with key
3.3.3 Combine the two methods.
3.4 stream password and block password
3.4. 1 stream password
Block cipher
combination
3.5 Recommended reading
3.6 Key terms
3.7 Summary
3.8 problem set
Chapter IV Cryptography Part II: Algebraic Structure
4. 1 algebraic structure
4. 1. 1 group
4. 1.2 ring
4. 1.3 domain
4. 1.4 Summary
4.2 GF(2n) domain
4.2. 1 polynomial
Use a generator
4.2.3 Summary
4.3 Recommended reading
4.4 Key terms
4.5 Summary
4.6 problem set
Chapter 5 Modern Symmetric Key Encryption
5. 1 modern block cipher
5. 1. 1 substitution and transposition
5. 1.2 as block cipher of permutation group
5. 1.3 components of modern block cipher
5. 1.4 font conversion box
5. 1.5 product cipher
5. 1.6 Two product ciphers
5. 1.7 Attacks on Block Ciphers
5.2 Modern stream cipher
5.2. 1 synchronous stream password
5.2.2 Asynchronous stream cipher
5.3 Recommended reading
5.4 Key terms
5.5 Summary
5.6 problem set
Chapter VI Data Encryption Standard (DES)
6. 1 Introduction
6. 1. 1 A Brief History of Data Encryption Standard (DES)
6. 1.2 Overview
6.2 the structure of des
Initial replacement and final replacement
alternately
6.2.3 Password and Reverse Password
6.2.4 Example
6.3 DES analysis
6.3. 1 attribute
design standards
Defects of DES
6.4 multiple DES
6.4. 1 double DES
6.4.2 Triple DES
Security of 6.5 DES
6.5. 1 Violent attack
Differential cryptanalysis
Linear cryptanalysis
6.6 Recommended reading
6.7 Key terms
6.8 summary
6.9 problem set
Chapter 7 Advanced Encryption Standard (AES)
7. 1 Introduction
7. 1. 1 A brief history of AES
7. 1.2 standard
7. 1.3 wheel
7. 1.4 data unit
7. 1.5 structure of each wheel
7.2 conversion
7.2. 1 replacement
replace
mix
Add key
7.3 key extension
Key extension of 7.3. 1 in AES- 128
7.3.2 key extension in AES-192 and AES-256
7.3.3 Key Extension Analysis
7.4 password
7.4. 1 source design
Selective design
7.5 Example
7.6 Analysis of Adverse Events
7.6. 1 Safety
performability
Complexity and cost
7.7 Recommended reading
7.8 Key terms
7.9 summary
7. 10 problem set
Chapter 8 Encryption with Modern Symmetric Key Encryption Method
8. 1 Application of modern block cipher
8. 1. 1 electronic codebook mode
8. 1.2 CBC mode
8. 1.3 password feedback (CFB) mode
8. 1.4 output feedback (OFB) mode
8. 1.5 CTR mode
8.2 Application of Stream Cipher
8.2. 1 RC4
8.2.2 A5/ 1
8.3 Other issues
8.3. 1 key management
Key generation
8.4 Recommended reading
8.5 Key terms
8.6 Summary
8.7 problem set
The second part is asymmetric key encryption
Chapter 9 Cryptography Part 3: Prime Numbers and Related Congruence Equations
9. 1 prime number
9. Definition of1.1
9. 1.2 cardinality of prime numbers
9. 1.3 Main tests
9. 1.4 Euler Phi- (Euler? (n)) function
9. 1.5 Fermat Theorem
9. 1.6 euler theorem
9. 1.7 Generate Prime Numbers
9.2 originality test
9.2. 1 Deterministic Algorithm
probabilistic algorithm
Recommended main tests
9.3 Factorization
9.3. 1 fundamental theorem of arithmetic
Factor decomposition method
Fermat method 248
9.3.4 Pollard p–1method
9.3.5 Pollard rho method
9.3.6 More effective methods
9.4 China remainder theorem
9.5 Quadratic congruence
9.5. 1 quadratic congruence module a prime number
9.5.2 Compound Number of a Quadratic Congruence Module
9.6 Exponents and Logarithms
6. 1 index
9.6.2 Logarithm
9.7 Recommended reading
9.8 Key terms
9.9 Summary
9. 10 problem set
Chapter 10 Asymmetric Key Encryption
10. 1 Introduction
10. 1. 1
10. 1.2 general concept
10. 1.3 Demand of both parties
10. 1.4 one-way secret door function
10. 1.5 knapsack password system
10.2 RSA cryptosystem
10.2. 1 Introduction
10.2.2 process
10.2.3 Some common examples
10.2.4 Attacks against RSA
10.2.5 suggestion
10.2.6 Optimal Asymmetric Encryption Filling (OAEP)
10.2.7 application
10.3 Rabin cryptosystem
10.3. 1 process
10.3.2 security of rabin system
10.4 ELGAMAL cryptosystem
10.4. 1 ElGamal cryptosystem
10.4.2 process
10.4.3 proof
10.4.4 analysis
The security of elgar Mar
10.4.6 application
10.5 elliptic curve cryptosystem
10.5. 1 elliptic curve based on real number
10.5.2 elliptic curve based on GF( p)
10.5.3 elliptic curve based on GF(2n)
10.5.4 elliptic curve encryption system simulating ElGamal
10.6 Recommended reading
10.7 key terms
10.8 summary
10.9 problem set
Part III Integrity, Authentication and Key Management
Chapter 1 1 Information Integrity and Information Verification
1 1. 1 information integrity
11.1.1files and fingerprints
1 1. 1.2 information and information summary
1 1. 1.3 variance
1 1. 1.4 test integrity
1 1. 1.5 cryptographic hash function standard
1 1.2 stochastic forecasting model
1 1.2. 1 pigeon hole principle
1 1.2.2 Birthday problem
1 1.2.3 Attacks on Stochastic Prediction Model
1 1.2.4 Attacks on buildings
1 1.3 information verification
1 1.3. 1 modify the detection code
1 1.3.2 information verification code (MAC)
1 1.4 Recommended reading
1 1.5 key terms
1 1.6 summary
1 1.7 problem set
12 chapter encryption hash function
12. 1 Introduction
12. 1. 1 iterative hash function
12. 1.2 two sets of compression functions
12.2
12.2. 1 Introduction
12.2.2 compression function
12.2.3 analysis
12.3 jacuzzi
12.3. 1 vortex password
12.3.2 summary
12.3.3 analysis
12.4 Recommended reading
12.5 key terms
12.6 summary
12.7 problem set
Chapter 13 digital signature
13. 1 comparison
Include 13. 1. 1
13. 1.2 verification method
13. 1.3 relation
13. 1.4 duality
13.2 process
Key requirements
13.2.2 Summary signature
13.3 service
13.3. 1 information authentication
13.3.2 information integrity
13.3.3 Undeniable
13.3.4 Confidentiality
13.4 attack digital signature
13.4. 1 attack type
13.4.2 forgery type
13.5 digital signature scheme
13.5. 1 RSA digital signature scheme
13.5.2 ElGamal digital signature scheme
13.5.3 Schnorr digital signature scheme
13.5.4 digital signature standard (DSS)
13.5.5 elliptic curve digital signature scheme
The change and application of 13.6
13.6. 1 change
13.6.2 application
13.7 Recommended reading
13.8 key terms
13.9 summary
13. 10 problem set
Chapter 14 Entity Verification
14. 1 Introduction
14. 1. 1 data source verification and entity verification
14. 1.2 verification type
14. 1.3 entity authentication and key management
14.2 password
14.2. 1 fixed password
14.2.2 One-time password
14.3 Challenge-Answer
14.3. 1 Application of symmetric key encryption
14.3.2 Application of Hash Function with Key
14.3.3 Application of Asymmetric Key Encryption
The application of 14.3.4 digital signature
14.4 zero knowledge
1 fiat-Chamil agreement
Gefei-Fiat-Chamil Agreement
14.4.3 Guiyu-Quest protocol
14.5 biological test
14.5. 1 equipment
14.5.2 Registration
14.5.3 verification
14.5.4 technology
14.5.5 accuracy
14.5.6 application
14.6 Recommended reading
14.7 key terms
14.8 summary
14.9 problem set
Chapter 15 Key Management
15. 1 symmetric key distribution
15.2 KERBEROS
15.2. 1 server
15.2.2 operation
15.2.3 application of different servers
15.2.4 Kerberos version 5
15.2.5 field
15.3 symmetric key protocol
15.3. 1 Diffie-Herman key protocol
15.3.2 station-to-station key protocol
15.4 public key distribution
15.4. 1 public key publishing
15.4.2 Trusted Center
15.4.3 trusted center control
15.4.4 certification body
15.4.5 X.509
Public key infrastructure (PKI)
15.5 Recommended reading
15.6 key terms
15.7 summary
15.8 problem set
Part IV Network Security
Chapter 16 Application layer security: PGP and S/MIME
16. 1 email
Construction 16. 1. 1 e-mail
16. 1.2 email security
16.2 PGP
16.2. 1 scene
16.2.2 key ring
16.2.3 PGP certificate
16.2.4 key revocation
Extract information from ringtones
16.2.6 PGP packaging
16.2.7 PGP information
The application of 16.2.8 PGP
16.3 seconds/mime
16.3. 1 MIME
16.3.2 S/MIME
The application of 16.3.3 S/MIME
16.4 Recommended reading
16.5 key terms
16.6 summary
16.7 problem set
Chapter 17 Transport layer security: SSL and TLS
17. 1 SSL structure
17. 1. 1 service
17. 1.2 key exchange algorithm
17. 1.3 encryption/decryption algorithm
17. 1.4 hash algorithm
17. 1.5 cipher suite
17. 1.6 compression algorithm
17. 1.7 Generation of encryption parameters
17. 1.8 sessions and connections
17.2 4 protocol
17.2. 1 handshake protocol
17.2.2 change password specification protocol
17.2.3 alarm protocol
17.2.4 recording protocol
17.3 SSL information
17.3. 1 Change password specification protocol
17.3.2 alarm protocol
17.3.3 handshake protocol
17.3.4 application data
17.4 transport layer security
Version 17.4. 1
17.4.2 cipher suite
17.4.3 Generation of Encryption Secret
17.4.4 alarm protocol
17.4.5 handshake protocol
17.4.6 recording protocol
17.5 Recommended reading
17.6 key terms
17.7 summary
17.8 problem set
Chapter 18 Network layer security: IPSec
18. 1 two modes
18.2 two security protocols
18.2. 1 verify file header (AH)
18.2.2 sealed safety load (ESP)
18.2.3 IPv4 and IPv6
18.2.4 AH and ESP
18.2.5 services provided by IPSec
18.3 security association
18.3. 1 the concept of security association
18.3.2 security association database (SAD)
18.4 security policy
18.5 internet key exchange (IKE)
18.5. 1 improved Diffie-Hellman key exchange
18.5.2 ike stage
18.5.3 stages and modes
18.5.4 Stage 1: Main mode
18.5.5 Stage 1: Savage Mode
18.5.6 Phase II: Fast Mode
18.5.7 SA algorithm
18.6 ISAKMP
18.6. 1 common file header
18.6.2 Payload
18.7 Recommended reading
18.8 key terms
18.9 summary
18. 10 problem set
Appendix A ASCII code
Appendix b standards and standardization organization
Appendix C TCP/IP suite
Appendix d basic probability
Appendix e birthday problem
Appendix f information theory
Appendix G Enumeration of Irreducible Polynomials and Primitive Polynomials
Appendix H Prime Numbers Less than 10 000
Appendix I Prime Factor of Integer
Appendix J List of Prime Numbers Less than 1000
Appendix k random number generator
Appendix l complexity
Appendix M ZIP
Appendix N DES differential cryptanalysis and DES linear cryptanalysis
Appendix o simplified DES(S-DES)
Appendix p simplified AES(S-AES)
Appendix q some proofs
term
refer to
……
-
Authors: (Indian) by Carhart, translated by Jin Ming, etc.
Publishing House: Tsinghua University Publishing House.
Release date: March 2009-1
Version: 1
Page count: 427 pages
Page number: 16 Page number
Industrial and commercial bank number: 9787302 193395
Packing: paperback
Category: Books >> Computer/Network >; > this book introduces various encryption technologies, network security protocols and implementation technologies with clear context and concise language, including various symmetric key algorithms and AES, asymmetric key algorithms, digital signatures and RSA, digital certificates and public key infrastructure, internet security protocols, user authentication and Kerberos, Java encryption implementation, and so on. . NET and operating system, network security, firewall and VPN, and gives a concrete case analysis of encryption and security.
The characteristics of this book
The language of this book is fluent and concise, which makes the reading of this book no longer boring.
There are as many as 425 illustrations in the book, which greatly facilitates readers' learning and understanding.
The book provides a wealth of multiple-choice questions, exercises, design and programming questions, which is conducive to deepening readers' understanding and mastery of what they have learned. Chapter 1 Computer Attack and Computer Security
1. 1 Introduction
1.2 safety requirements
1.3 security method
1.4 safety principles
1.5 attack type
1.6 Summary of this chapter
1.7 exercise questions
Chapter 2 The concept and technology of encryption
2. 1 Introduction
2.2 plaintext and ciphertext
2.3 Substitutes
2.4 conversion encryption technology
2.5 encryption and decryption
2.6 symmetric and asymmetric key encryption
2.7 Entrainment encryption method
2.8 Key Range and Key Length
2.9 attack type
2. 10 Summary of this chapter
2. 1 1 exercise questions
Chapter 3 symmetric key algorithm and AES
3. 1 Introduction
3.2 Algorithm Type and Mode
3.3 Overview of symmetric key encryption methods
3.4 Data Encryption Standard
……
Chapter 4 Asymmetric Key Algorithm, Digital Signature and RSA
Chapter V Digital Certificate and Public Key Infrastructure Construction
Chapter VI Internet Security Protocols
Chapter 7 User Authentication and Kerberos
Chapter 8: Encryption implementation of Java, NET and operating system.
Chapter 9 Network Security, Firewall and Virtual Private Network
10 Chapter Encryption and Security Case Analysis
Appendix a mathematical background knowledge
Appendix b digital system
Appendix c information theory
Appendix d utilities
Appendix e network resources
Appendix f introduction of ASN, BER and DER
refer to
term