Notation
Preface
About the Author
Chapter 0 Reader s Guide
Chapter 1 Overview
PART ONE SYMMETRIC CIPHERS
Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers
PART TWO ASYMMETRIC CIPHERS
Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures
PART FOUR MUTUAL TRUST
Chapter 14 Key Management and Distribution
Chapter 15 User Authentication Protocols
PART FIVE NETWORK AND INTERNET SECURITY
Chapter 16 Transport-Level Security
Chapter 17 Wireless Network Security
Chapter 18 Electronic Mail Security
Chapter 19 IP Security
APPENDICES
References
Index
ONLINE CHAPTERS
PART SIX SYSTEM SECURITY
Chapter 20 Intruders
Chapter 21 Malicious Software
Chapter 22 Firewalls
PART SEVEN LEGAL AND ETHICAL ISSUES
Chapter 23 Legal and Ethical Issues
ONLINE APPENDICES
WilliamStallings.comCryptoCrypto5e.html
Appendix C Sage Problems
Appendix D Standards and Standards-Setting Organizations
Appendix E Basic Concepts from Linear Algebra
Appendix F Measures of Security and Secrecy
Appendix G Simplified DES
Appendix H Evaluation Criteria for AES
Appendix I More on Simplified AES
Appendix J Knapsack Public-Key Algorithm
Appendix K Proof of the Digital Signature Algorithm
Appendix L TCPIP and OSI
Appendix M Java Cryptographic APIs
Appendix N The Whirlpool Hash Function
Appendix O Data Compression Using ZIP
Appendix P PGP Random Number Generation
Appendix Q International Reference Alphabet
Glossary