Current location - Training Enrollment Network - Books and materials - Directory of Cryptography and Network Security
Directory of Cryptography and Network Security
Introduction to Chapter 1

1. 1 safety target

1. 1. 1 confidentiality

1. 1.2 integrity

1. 1.3 Availability

1.2 attack

1.2. 1 attacks that threaten confidentiality.

1.2.2 Attacks that threaten integrity

1.2.3 Attacks that threaten availability

1.2.4 passive attack and active attack

1.3 services and mechanisms

1.3. 1 security service

1.3.2 security mechanism

1.3.3 Relationship between service and mechanism

1.4 technology

1.4. 1 encryption

1.4.2 Steganography

1.5 The rest of the book

The first part is symmetric key encryption

The second part is asymmetric key encryption

Part III Integrity, Authentication and Key Management

Part IV Network Security

1.6 Recommended reading

1.7 key terms

1.8 summary

1.9 problem set

The first part is symmetric key encryption

Chapter II Cryptography Part I: Modular Algorithm, Congruence and Matrix

2. 1 integer algorithm

2. 1. 1 integer set

2. 1.2 binary operation

2. 1.3 integer division

2. 1.4 divisible

2. 1.5 Linear Diophantine Equation

2.2 Modular operation

2.2. 1 modular operator

Remaining part: zinc

consistency

2.2.4 operation in setting Zn

opposite direction

2.2.6 addition table and multiplication table

2.2.7 Difference between Addition Set and Multiplication Set

Other two sets

2.3 matrix

2.3. 1 definition

2.3.2 Operation and relationship

decisive factor

inverse

Residual matrix

2.4 Linear congruence

2.4. 1 unary linear equation

linear equation

2.5 Recommended reading

2.6 Key terms

2.7 Summary

2.8 problem set

Chapter 3 Traditional Symmetric Key Encryption

3. 1 Introduction

3. 1. 1 kirchhoff principle

3. 1.2 Cryptanalysis

3. 1.3 Classification of traditional passwords

3.2 Replace password

3.2. 1 Single code substitution password

3.2.2 Multi-code substitution password

3.3 transposition password

3.3. 1 Keyless transposition password

3.3.2 Transposition password with key

3.3.3 Combine the two methods.

3.4 stream password and block password

3.4. 1 stream password

Block cipher

combination

3.5 Recommended reading

3.6 Key terms

3.7 Summary

3.8 problem set

Chapter IV Cryptography Part II: Algebraic Structure

4. 1 algebraic structure

4. 1. 1 group

4. 1.2 ring

4. 1.3 domain

4. 1.4 Summary

4.2 GF(2n) domain

4.2. 1 polynomial

Use a generator

4.2.3 Summary

4.3 Recommended reading

4.4 Key terms

4.5 Summary

4.6 problem set

Chapter 5 Modern Symmetric Key Encryption

5. 1 modern block cipher

5. 1. 1 substitution and transposition

5. 1.2 as block cipher of permutation group

5. 1.3 components of modern block cipher

5. 1.4 font conversion box

5. 1.5 product cipher

5. 1.6 Two product ciphers

5. 1.7 Attacks on Block Ciphers

5.2 Modern stream cipher

5.2. 1 synchronous stream password

5.2.2 Asynchronous stream cipher

5.3 Recommended reading

5.4 Key terms

5.5 Summary

5.6 problem set

Chapter VI Data Encryption Standard (DES)

6. 1 Introduction

6. 1. 1 A Brief History of Data Encryption Standard (DES)

6. 1.2 Overview

6.2 the structure of des

Initial replacement and final replacement

alternately

6.2.3 Password and Reverse Password

6.2.4 Example

6.3 DES analysis

6.3. 1 attribute

design standards

Defects of DES

6.4 multiple DES

6.4. 1 double DES

6.4.2 Triple DES

Security of 6.5 DES

6.5. 1 Violent attack

Differential cryptanalysis

Linear cryptanalysis

6.6 Recommended reading

6.7 Key terms

6.8 summary

6.9 problem set

Chapter 7 Advanced Encryption Standard (AES)

7. 1 Introduction

7. 1. 1 A brief history of AES

7. 1.2 standard

7. 1.3 wheel

7. 1.4 data unit

7. 1.5 structure of each wheel

7.2 conversion

7.2. 1 replacement

replace

mix

Add key

7.3 key extension

Key extension of 7.3. 1 in AES- 128

7.3.2 key extension in AES-192 and AES-256

7.3.3 Key Extension Analysis

7.4 password

7.4. 1 source design

Selective design

7.5 Example

7.6 Analysis of Adverse Events

7.6. 1 Safety

performability

Complexity and cost

7.7 Recommended reading

7.8 Key terms

7.9 summary

7. 10 problem set

Chapter 8 Encryption with Modern Symmetric Key Encryption Method

8. 1 Application of modern block cipher

8. 1. 1 electronic codebook mode

8. 1.2 CBC mode

8. 1.3 password feedback (CFB) mode

8. 1.4 output feedback (OFB) mode

8. 1.5 CTR mode

8.2 Application of Stream Cipher

8.2. 1 RC4

8.2.2 A5/ 1

8.3 Other issues

8.3. 1 key management

Key generation

8.4 Recommended reading

8.5 Key terms

8.6 Summary

8.7 problem set

The second part is asymmetric key encryption

Chapter 9 Cryptography Part 3: Prime Numbers and Related Congruence Equations

9. 1 prime number

9. Definition of1.1

9. 1.2 cardinality of prime numbers

9. 1.3 Main tests

9. 1.4 Euler Phi- (Euler? (n)) function

9. 1.5 Fermat Theorem

9. 1.6 euler theorem

9. 1.7 Generate Prime Numbers

9.2 originality test

9.2. 1 Deterministic Algorithm

probabilistic algorithm

Recommended main tests

9.3 Factorization

9.3. 1 fundamental theorem of arithmetic

Factor decomposition method

Fermat method 248

9.3.4 Pollard p–1method

9.3.5 Pollard rho method

9.3.6 More effective methods

9.4 China remainder theorem

9.5 Quadratic congruence

9.5. 1 quadratic congruence module a prime number

9.5.2 Compound Number of a Quadratic Congruence Module

9.6 Exponents and Logarithms

6. 1 index

9.6.2 Logarithm

9.7 Recommended reading

9.8 Key terms

9.9 Summary

9. 10 problem set

Chapter 10 Asymmetric Key Encryption

10. 1 Introduction

10. 1. 1

10. 1.2 general concept

10. 1.3 Demand of both parties

10. 1.4 one-way secret door function

10. 1.5 knapsack password system

10.2 RSA cryptosystem

10.2. 1 Introduction

10.2.2 process

10.2.3 Some common examples

10.2.4 Attacks against RSA

10.2.5 suggestion

10.2.6 Optimal Asymmetric Encryption Filling (OAEP)

10.2.7 application

10.3 Rabin cryptosystem

10.3. 1 process

10.3.2 security of rabin system

10.4 ELGAMAL cryptosystem

10.4. 1 ElGamal cryptosystem

10.4.2 process

10.4.3 proof

10.4.4 analysis

The security of elgar Mar

10.4.6 application

10.5 elliptic curve cryptosystem

10.5. 1 elliptic curve based on real number

10.5.2 elliptic curve based on GF( p)

10.5.3 elliptic curve based on GF(2n)

10.5.4 elliptic curve encryption system simulating ElGamal

10.6 Recommended reading

10.7 key terms

10.8 summary

10.9 problem set

Part III Integrity, Authentication and Key Management

Chapter 1 1 Information Integrity and Information Verification

1 1. 1 information integrity

11.1.1files and fingerprints

1 1. 1.2 information and information summary

1 1. 1.3 variance

1 1. 1.4 test integrity

1 1. 1.5 cryptographic hash function standard

1 1.2 stochastic forecasting model

1 1.2. 1 pigeon hole principle

1 1.2.2 Birthday problem

1 1.2.3 Attacks on Stochastic Prediction Model

1 1.2.4 Attacks on buildings

1 1.3 information verification

1 1.3. 1 modify the detection code

1 1.3.2 information verification code (MAC)

1 1.4 Recommended reading

1 1.5 key terms

1 1.6 summary

1 1.7 problem set

12 chapter encryption hash function

12. 1 Introduction

12. 1. 1 iterative hash function

12. 1.2 two sets of compression functions

12.2

12.2. 1 Introduction

12.2.2 compression function

12.2.3 analysis

12.3 jacuzzi

12.3. 1 vortex password

12.3.2 summary

12.3.3 analysis

12.4 Recommended reading

12.5 key terms

12.6 summary

12.7 problem set

Chapter 13 digital signature

13. 1 comparison

Include 13. 1. 1

13. 1.2 verification method

13. 1.3 relation

13. 1.4 duality

13.2 process

Key requirements

13.2.2 Summary signature

13.3 service

13.3. 1 information authentication

13.3.2 information integrity

13.3.3 Undeniable

13.3.4 Confidentiality

13.4 attack digital signature

13.4. 1 attack type

13.4.2 forgery type

13.5 digital signature scheme

13.5. 1 RSA digital signature scheme

13.5.2 ElGamal digital signature scheme

13.5.3 Schnorr digital signature scheme

13.5.4 digital signature standard (DSS)

13.5.5 elliptic curve digital signature scheme

The change and application of 13.6

13.6. 1 change

13.6.2 application

13.7 Recommended reading

13.8 key terms

13.9 summary

13. 10 problem set

Chapter 14 Entity Verification

14. 1 Introduction

14. 1. 1 data source verification and entity verification

14. 1.2 verification type

14. 1.3 entity authentication and key management

14.2 password

14.2. 1 fixed password

14.2.2 One-time password

14.3 Challenge-Answer

14.3. 1 Application of symmetric key encryption

14.3.2 Application of Hash Function with Key

14.3.3 Application of Asymmetric Key Encryption

The application of 14.3.4 digital signature

14.4 zero knowledge

1 fiat-Chamil agreement

Gefei-Fiat-Chamil Agreement

14.4.3 Guiyu-Quest protocol

14.5 biological test

14.5. 1 equipment

14.5.2 Registration

14.5.3 verification

14.5.4 technology

14.5.5 accuracy

14.5.6 application

14.6 Recommended reading

14.7 key terms

14.8 summary

14.9 problem set

Chapter 15 Key Management

15. 1 symmetric key distribution

15.2 KERBEROS

15.2. 1 server

15.2.2 operation

15.2.3 application of different servers

15.2.4 Kerberos version 5

15.2.5 field

15.3 symmetric key protocol

15.3. 1 Diffie-Herman key protocol

15.3.2 station-to-station key protocol

15.4 public key distribution

15.4. 1 public key publishing

15.4.2 Trusted Center

15.4.3 trusted center control

15.4.4 certification body

15.4.5 X.509

Public key infrastructure (PKI)

15.5 Recommended reading

15.6 key terms

15.7 summary

15.8 problem set

Part IV Network Security

Chapter 16 Application layer security: PGP and S/MIME

16. 1 email

Construction 16. 1. 1 e-mail

16. 1.2 email security

16.2 PGP

16.2. 1 scene

16.2.2 key ring

16.2.3 PGP certificate

16.2.4 key revocation

Extract information from ringtones

16.2.6 PGP packaging

16.2.7 PGP information

The application of 16.2.8 PGP

16.3 seconds/mime

16.3. 1 MIME

16.3.2 S/MIME

The application of 16.3.3 S/MIME

16.4 Recommended reading

16.5 key terms

16.6 summary

16.7 problem set

Chapter 17 Transport layer security: SSL and TLS

17. 1 SSL structure

17. 1. 1 service

17. 1.2 key exchange algorithm

17. 1.3 encryption/decryption algorithm

17. 1.4 hash algorithm

17. 1.5 cipher suite

17. 1.6 compression algorithm

17. 1.7 Generation of encryption parameters

17. 1.8 sessions and connections

17.2 4 protocol

17.2. 1 handshake protocol

17.2.2 change password specification protocol

17.2.3 alarm protocol

17.2.4 recording protocol

17.3 SSL information

17.3. 1 Change password specification protocol

17.3.2 alarm protocol

17.3.3 handshake protocol

17.3.4 application data

17.4 transport layer security

Version 17.4. 1

17.4.2 cipher suite

17.4.3 Generation of Encryption Secret

17.4.4 alarm protocol

17.4.5 handshake protocol

17.4.6 recording protocol

17.5 Recommended reading

17.6 key terms

17.7 summary

17.8 problem set

Chapter 18 Network layer security: IPSec

18. 1 two modes

18.2 two security protocols

18.2. 1 verify file header (AH)

18.2.2 sealed safety load (ESP)

18.2.3 IPv4 and IPv6

18.2.4 AH and ESP

18.2.5 services provided by IPSec

18.3 security association

18.3. 1 the concept of security association

18.3.2 security association database (SAD)

18.4 security policy

18.5 internet key exchange (IKE)

18.5. 1 improved Diffie-Hellman key exchange

18.5.2 ike stage

18.5.3 stages and modes

18.5.4 Stage 1: Main mode

18.5.5 Stage 1: Savage Mode

18.5.6 Phase II: Fast Mode

18.5.7 SA algorithm

18.6 ISAKMP

18.6. 1 common file header

18.6.2 Payload

18.7 Recommended reading

18.8 key terms

18.9 summary

18. 10 problem set

Appendix A ASCII code

Appendix b standards and standardization organization

Appendix C TCP/IP suite

Appendix d basic probability

Appendix e birthday problem

Appendix f information theory

Appendix G Enumeration of Irreducible Polynomials and Primitive Polynomials

Appendix H Prime Numbers Less than 10 000

Appendix I Prime Factor of Integer

Appendix J List of Prime Numbers Less than 1000

Appendix k random number generator

Appendix l complexity

Appendix M ZIP

Appendix N DES differential cryptanalysis and DES linear cryptanalysis

Appendix o simplified DES(S-DES)

Appendix p simplified AES(S-AES)

Appendix q some proofs

term

refer to

……

-

Authors: (Indian) by Carhart, translated by Jin Ming, etc.

Publishing House: Tsinghua University Publishing House.

Release date: March 2009-1

Version: 1

Page count: 427 pages

Page number: 16 Page number

Industrial and commercial bank number: 9787302 193395

Packing: paperback

Category: Books >> Computer/Network >; > this book introduces various encryption technologies, network security protocols and implementation technologies with clear context and concise language, including various symmetric key algorithms and AES, asymmetric key algorithms, digital signatures and RSA, digital certificates and public key infrastructure, internet security protocols, user authentication and Kerberos, Java encryption implementation, and so on. . NET and operating system, network security, firewall and VPN, and gives a concrete case analysis of encryption and security.

The characteristics of this book

The language of this book is fluent and concise, which makes the reading of this book no longer boring.

There are as many as 425 illustrations in the book, which greatly facilitates readers' learning and understanding.

The book provides a wealth of multiple-choice questions, exercises, design and programming questions, which is conducive to deepening readers' understanding and mastery of what they have learned. Chapter 1 Computer Attack and Computer Security

1. 1 Introduction

1.2 safety requirements

1.3 security method

1.4 safety principles

1.5 attack type

1.6 Summary of this chapter

1.7 exercise questions

Chapter 2 The concept and technology of encryption

2. 1 Introduction

2.2 plaintext and ciphertext

2.3 Substitutes

2.4 conversion encryption technology

2.5 encryption and decryption

2.6 symmetric and asymmetric key encryption

2.7 Entrainment encryption method

2.8 Key Range and Key Length

2.9 attack type

2. 10 Summary of this chapter

2. 1 1 exercise questions

Chapter 3 symmetric key algorithm and AES

3. 1 Introduction

3.2 Algorithm Type and Mode

3.3 Overview of symmetric key encryption methods

3.4 Data Encryption Standard

……

Chapter 4 Asymmetric Key Algorithm, Digital Signature and RSA

Chapter V Digital Certificate and Public Key Infrastructure Construction

Chapter VI Internet Security Protocols

Chapter 7 User Authentication and Kerberos

Chapter 8: Encryption implementation of Java, NET and operating system.

Chapter 9 Network Security, Firewall and Virtual Private Network

10 Chapter Encryption and Security Case Analysis

Appendix a mathematical background knowledge

Appendix b digital system

Appendix c information theory

Appendix d utilities

Appendix e network resources

Appendix f introduction of ASN, BER and DER

refer to

term