CRYPTOG NETWORK SECURITY



Similar documents
CRYPTOGRAPHY AND NETWORK SECURITY

Network Security Essentials:

Table of Contents. Bibliografische Informationen digitalisiert durch

EXAM questions for the course TTM Information Security May Part 1

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Cryptography and network security CNET4523

VALLIAMMAI ENGINEERING COLLEGE

NETWORK ADMINISTRATION AND SECURITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Chapter 8. Network Security

Chapter 10. Network Security

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

IT Networks & Security CERT Luncheon Series: Cryptography

OPERATING SYSTEMS Internais and Design Principles

Wireless Mobile Internet Security. 2nd Edition

EXAM questions for the course TTM Information Security June Part 1

CRIPT - Cryptography and Network Security

Lecture 9 - Network Security TDTS (ht1)

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

BUY ONLINE FROM:

Chapter 7 Transport-Level Security

Weighted Total Mark. Weighted Exam Mark

ICTTEN8195B Evaluate and apply network security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security. Outline of the Tutorial

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Chapter 6 Electronic Mail Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CRYPTOGRAPHY IN NETWORK SECURITY

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Authentication requirement Authentication function MAC Hash function Security of

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptography and Network Security Chapter 15

Security for Computer Networks

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 5490/6490: Network Security Fall 2015

Network Security Essentials Chapter 7

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

The Mathematics of the RSA Public-Key Cryptosystem

Lukasz Pater CMMS Administrator and Developer

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: )

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security Essentials Chapter 5

Chapter 32 Internet Security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Message Authentication Codes

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

, ) I Transport Layer Security

Internetwork Security

CS 758: Cryptography / Network Security

Cryptography and Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

7! Cryptographic Techniques! A Brief Introduction

Overview of Public-Key Cryptography

Virtual Private Networks

Computer Security: Principles and Practice

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

UNIT I. 5. Define cryptanalysis? It is a process of attempting to discover the key or plaintext or both.

Content Teaching Academy at James Madison University

Network Security. Lecture 3

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Cryptography and Network Security

Cryptography and Network Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Information Security Course Specifications

Information and Communications Technology Courses at a Glance

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Symmetric Key cryptosystem

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

CPSC 467b: Cryptography and Computer Security

How To Protect Your Data From Attack

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Fundamentals

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

e-code Academy Information Security Diploma Training Discerption

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Transcription:

CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458

'jkfetmhki^^rij^jibwfcmf «MMr""'-^.; <-^Lä?^96SB^H B H I H I H ^ H " CONTENTS Notation xi Preface xiii i Chapter 0 0.1 0.2 0.3 Chapter 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Reader's Guide 1 Outline of This Book 2 Roadmap 2 Internet and Web Resources 4 Introduction 6 Security Trends 9 The OSI Security Architecture 12 Security Attacks 13 Security Services 16 Security Mechanisms 19 A Model for Network Security 22 Recommended Reading and Web Sites 24 Key Terms, Review Questions, and Problems 25 PART ONE SYMMETRIC CIPHERS 26 Chapter 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Chapter 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Chapter 4 4.1 4.2 4.3 4.4 4.5 4.6 Classical Encryption Techniques 28 Symmetrie Cipher Model 30 Substitution Techniques 35 Transposition Techniques 49 Rotor Machines 51 Steganography 53 Recommended Reading and Web Sites 55 Key Terms, Review Questions, and Problems 56 Block Ciphers and the Data Encryption Standard 62 Block Cipher Principles 64 The Data Encryption Standard 72 TheStrength ofdes 82 Differential and Linear Cryptanalysis 83 Block Cipher Design Principles 86 Recommended Reading 90 Key Terms, Review Questions, and Problems 90 Finite Fields 95 Groups, Rings, and Fields 97 Modular Anthmetic 101 The Euclidean Algorithm 107 Finite Fields of the Form GF(p) 109 Polynomial Arithmetic 113 Finite Fields of the Form GF(2") 119 V

vi CONTENTS 4.7 Recommended Reading and Web Sites 129 4.8 Key Terms, Review Questions, and Problems 130 Chapter 5 Advanced Encryption Standard 134 5.1 Evaluation Criteria for AES 135 5.2 TheAES Cipher 140 5.3 Recommended Reading and Web Sites 160 5.4 Key Terms, Review Questions, and Problems 161 Appendix 5A Polynomials with CoefFicients in GF(2 8 ) 163 Appendix 5B Simplified AES 165 Chapter 6 More on Symmetrie Ciphers 174 6.1 Multiple Encryption andtriple DES 175 6.2 Block Cipher Modes of Operation 181 6.3 Stream Ciphers and RC4 189 6.4 Recommended Reading and Web Site 194 6.5 Key Terms, Review Questions, and Problems 194 Chapter 7 Confidentiality Using Symmetrie Encryption 199 7.1 Placement of Encryption Function 201 7.2 Traffic Confidentiality 209 7.3 Key Distribution 210 7.4 Random Number Generation 218 7.5 Recommended Reading and Web Sites 227 7.6 Key Terms, Review Questions, and Problems 228 PARTTWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 232 Chapter 8 Introduction to Number Theory 234 8.1 Prime Numbers 236 8.2 Fermat's and Euler's Theorems 238 8.3 Testing for Primality 242 8.4 The Chinese Remainder Theorem 245 8.5 Discrete Logarithms 247 8.6 Recommended Reading and Web Site 253 8.7 Key Terms, Review Questions, and Problems 254 Chapter 9 Public-Key Cryptography and RSA 257 9.1 Principles of Public-Key Cryptosystems 259 9.2 The RSA Algonthm 268 9.3 Recommended Reading and Web Site 280 9.4 Key Terms, Review Questions, and Problems 281 Appendix 9A Proof of the RSA Algorithm 285 Appendix 9B The Complexity of Algorithms 286 Chapter 10 Key Management; Other Public-Key Cryptosystems 289 10.1 Key Management 290 10.2 Diffie-Hellman Key Exchange 298 10.3 Elliptic Curve Arithmetic 301 10.4 Elliptic Curve Cryptography 310

10.5 Recommended Reading and Web Site 313 10.6 KeyTerms, Review Questions, and Problems 314 Chapter 11 Message Authentication and Hash Functions 317 11.1 Authentication Requirements 319 11.2 Authentication Functions 320 11.3 Message Authentication Codes 331 11.4 Hash Functions 334 11.5 Security of Hash Functions and MACs 340 11.6 Recommended Reading 344 11.7 KeyTerms, Review Questions, and Problems 344 Appendix IIA Mathematical Basis of the Birthday Attack 346 Chapter 12 Hash and MAC Algorithms 351 12.1 Secure Hash Algorithm 353 12.2 Whirlpool 358 12.3 HMAC 368 12.4 CMAC 372 12.5 Recommended Reading and Web Sites 374 12.6 KeyTerms, Review Questions, and Problems 375 Chapter 13 Digital Signatures and Authentication Protocols 377 13.1 Digital Signatures 378 13.2 Authentication Protocols 382 13.3 Digital Signature Standard 390 13.4 Recommended Reading and Web Sites 393 13.5 KeyTerms, Review Questions, and Problems 393 PART THREE NETWORK SECURITY APPLICATIONS 398 Chapter 14 Authentication Applications 400 14.1 Kerberos 401 14.2 X.509 Authentication Service 419 14.3 Public-Key Infrastructure 428 14.4 Recommended Reading and Web Sites 430 14.5 KeyTerms, Review Questions, and Problems 431 Appendix 14A Kerberos Encryption Techniques 433 Chapter 15 Electronic Mail Security 436 15.1 Pretty Good Privacy 438 15.2 S/MIME 457 15.3 Recommended Web Sites 474 15.4 KeyTerms, Review Questions, and Problems 474 Appendix 15A Data Compression Using ZIP 475 Appendix 15B Radix-64 Conversion 478 Appendix 1 5C PGP Random Number Generation 479 Chapter 16 IP Security 483 16.1 IP Security Overview 485 16.2 IP Security Architecture 487

Vlll CONTENTS 16.3 Authentication Header 493 16.4 Encapsulating Security Payload 498 16.5 Combining Security Associations 503 16.6 Key Management 506 16.7 Recommended Reading and Web Site 516 16.8 Key Terms, Review Questions, and Problems 517 Appendix 16A Internetworking and Internet Protocols 518 Chapter 17 Web Security 527 17.1 Web Security Considerations 528 17.2 Secure Socket Layer and Transport Layer Security 531 17.3 Secure Electronic Transaction 549 17.4 Recommended Reading and Web Sites 560 17.5 Key Terms, Review Questions, and Problems 561 PART FOUR SYSTEM SECURITY 563 Chapter 18 Intruders 565 18.1 Intruders 567 18.2 Intrusion Detection 570 18.3 Password Management 582 18.4 Recommended Reading and Web Sites 591 18.5 Key Terms, Review Questions, and Problems 592 Appendix 18A The Base-Rate Fallacy 594 Chapter 19 Malicious Software 598 19.1 Viruses and Related Threats 599 19.2 Virus Countermeasures 610 19.3 Distributed Denial of Service Attacks 614 19.4 Recommended Reading and Web Sites 619 19.5 Key Terms, Review Questions, and Problems 620 Chapter 20 Firewalls 621 20.1 Firewall Design Principles 622 20.2 Trusted Systems 634 20.3 Common Criteria for Information Technology Security Evaluation 640 20.3 Recommended Reading and Web Sites 644 20.4 Key Terms, Review Questions, and Problems 645 APPENDICES 647 Appendix A Standards and Standards-Setting Organizations 647 A.l The Importance of Standards 648 A.2 Internet Standards and the Internet Society 649 A.3 National Institute of Standards and Technology 652 Appendix B Projects for Teaching Cryptography and Network Security 653 B.l Research Projects 654 B.2 Programming Projects 655 B.3 Laboratory Exercises 655

B.4 Writing Assignments 655 B.5 Reading/Report Assignments 656 Glossary 657 References 663 Index 673 ONLINE APPENDICES williamstallings.com/crypto/crypto4e.html Appendix C Simplified Des C.l Overview C.2 S-DES Key Generation C.3 S-DES Key Encryption C.4 Analysis of Simplified DES C.5 Relationship to DES Appendix D The Meaning ofmod D.l The Binary Operator mod D.2 The Congruence Relation mod Appendix E More on Simplified AES E.l Anthmetic in GF(2 4 ) E.2 The Mix Column Function Appendix F Knapsack Public-Key Algorithm F.l The Knapsack Problem F.2 The Knapsack Cryptosystem F.3 Example Appendix G Proof of the Digital Signature Algorithm Appendix H TCP/IP and OSI H.l H.l H.l Protocols and Protocol Architectures The TCP/OIP Protocol Architecture The OSI Protocol Architecture