CRYPTOGRAPHY AND NETWORK SECURITY
FOROUZAN
CRYPTOGRAPHY AND NETWORK SECURITY - Tata Mc-Hill 2009
Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2 Mathematics of Cryptography 3 Traditional Symmetric-Key Ciphers 4 Mathematics of Cryptography 5 Introduction to Modern Symmetric-Key Ciphers 6 Data Encryption Standard (DES) 7 Advanced Encryption Standard (AES) 8 Encipherment Using Modern Symmetric-Key Ciphers Part 2 Asymmetric-Key Encipherment 9 Mathematics of Cryptography 10 Asymmetric-Key Cryptography Part 3 Integrity, Authentication, and Key Management 11 Message Integrity and Message Authentication 12 Cryptographic Hash Functions 13 Digital Signature 14 Entity Authentication 15 Key Management Part 4 Network Security 16 Security at the Application Layer: PGP and S/MIME 17 Security at the Transport Layer: SSL and TLS 18 Security at the Network Layer: IPSec
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY - Tata Mc-Hill 2009
Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2 Mathematics of Cryptography 3 Traditional Symmetric-Key Ciphers 4 Mathematics of Cryptography 5 Introduction to Modern Symmetric-Key Ciphers 6 Data Encryption Standard (DES) 7 Advanced Encryption Standard (AES) 8 Encipherment Using Modern Symmetric-Key Ciphers Part 2 Asymmetric-Key Encipherment 9 Mathematics of Cryptography 10 Asymmetric-Key Cryptography Part 3 Integrity, Authentication, and Key Management 11 Message Integrity and Message Authentication 12 Cryptographic Hash Functions 13 Digital Signature 14 Entity Authentication 15 Key Management Part 4 Network Security 16 Security at the Application Layer: PGP and S/MIME 17 Security at the Transport Layer: SSL and TLS 18 Security at the Network Layer: IPSec
CRYPTOGRAPHY AND NETWORK SECURITY