Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Similar documents
Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CRYPTOGRAPHY AND NETWORK SECURITY

For Tricia: never dull, never boring, the smartest and bravest person I know

SRI VENKATESWARA COLLEGE OF ENGINEERING

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

SUMMARY OF INFORMATION ON EACH COURSE

Total No. of Questions : 09 ] [ Total No.of Pages : 02

BCA III Network security and Cryptography Examination-2016 Model Paper 1

KALASALINGAM UNIVERSITY

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Cryptography and Network Security

Cryptography MIS

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

NIST Cryptographic Toolkit

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Introduction and Overview. Why CSCI 454/554?

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

10EC832: NETWORK SECURITY

Cryptography and Network Security

FIPS Compliance of Industry Protocols in Edward Morris September 25, 2013

Study Guide to Mideterm Exam

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Network Security Chapter 8

Cryptographic Algorithm Validation Program:

Symmetric, Asymmetric, and One Way Technologies

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) UNIT I

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

RSA BSAFE Crypto-C Micro Edition Security Policy

Information Security: Principles and Practice Second Edition. Mark Stamp

Public Key Cryptography

Cipher Suite Configuration Mode Commands

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

14. Internet Security (J. Kurose)

David Wetherall, with some slides from Radia Perlman s security lectures.

APNIC elearning: Cryptography Basics

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

About FIPS, NGE, and AnyConnect

Cryptography and Network Security

FIPS Security Policy

Silent Circle Mobile Application Cryptographic Module

SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK

Kurose & Ross, Chapters (5 th ed.)

Route1 FIPS Cryptographic Module

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

Network Security. Chapter 8. MYcsvtu Notes.

CSCE 715: Network Systems Security

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

ECE 646 Fall 2015 Term Project. Overview, comparison of open crypto libraries for application development. By Ravi Kota

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

SMPTE Standards Transition Issues for NIST/FIPS Requirements

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

CS 356 Internet Security Protocols. Fall 2013

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy

Inside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Cisco VPN Internal Service Module for Cisco ISR G2

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Cryptography and Network Security. Sixth Edition by William Stallings

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Security+ SY0-501 Study Guide Table of Contents

Analysis, demands, and properties of pseudorandom number generators

Name of chapter & details.

Block Cipher Operation

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Computer Security: Principles and Practice

Internet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)

Public Key Algorithms

Introduction to Cryptography. Vasil Slavov William Jewell College

Overview. SSL Cryptography Overview CHAPTER 1

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

ECE 297:11 Reconfigurable Architectures for Computer Security

COMPUTER SECURITY. Computer Security Secure Communication Channels (2)

Lecture 2 Applied Cryptography (Part 2)

Glossary of Terms. AddRoundKey: In AES, subkey bytes are XORed into each byte of the array.

CSE 127: Computer Security Cryptography. Kirill Levchenko

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

MLR Institute of Technology

Transport Level Security

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

EEC-682/782 Computer Networks I

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Transport Layer Security

Transcription:

Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National Standards Institute Cipher Block Chaining Communications-Electronics Security Group Cipher Feedback Cipher-Based Message Authentication Code Chinese Remainder Theorem Denial of Service Data Encryption Algorithm Data Encryption Standard Denial of Service Digital Signature Algorithm Digital Signature Standard Electronic Codebook Elliptic Curve Cryptography Elliptic Curve Digital Signature Algorithm Encapsulating Security Payload Federal Information Processing Standard Internet Architecture Board Internet Engineering Task Force Internet Protocol IP Security International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector IV Initialization Vector KDC Key Distribution Center LAN Local Area Network MAC Message Authentication Code MIC Message Integrity Code MIME Multipurpose Internet Mail Extension MD5 Message Digest, Version 5 MTU Maximum Transmission Unit NIST National Institute of Standards and Technology NSA National Security Agency OFB Output Feedback PCBC Propagating Cipher Block Chaining PGP Pretty Good Privacy PIV Personal Identity Verification PKI Public Key Infrastructure PRNG Pseudorandom Number Generator RFC Request for Comments RNG Random Number Generator RSA Rivest-Shamir-Adelman RSA-PSS RSA Probabilistic Signature Scheme SHA Secure Hash Algorithm S/MIME Secure MIME SNMP Simple Network Management Protocol SNMPv3 Simple Network Management Protocol Version 3 SSL Secure Sockets Layer TCP Transmission Control Protocol TDEA Triple DEA TLS Transport Layer Security UDP User Datagram Protocol WAN Wide Area Network

Cryptography and Network Security: Principles and Practice, International Edition - PDF - PDF - PDF Table of Contents Cover Contents Notation Preface Chapter 0 Guide for Readers and Instructors 0.1 Outline of This Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems PART ONE: SYMMETRIC CIPHERS Chapter 2 Classical Encryption Techniques 2.1 Symmetric Cipher Model 2.2 Substitution Techniques 2.3 Transposition Techniques 2.4 Rotor Machines 2.5 Steganography 2.6 Recommended Reading 2.7 Key Terms, Review Questions, and Problems Chapter 3 Block Ciphers and the Data Encryption Standard 3.1 Traditional Block Cipher Structure 3.2 The Data Encryption Standard 3.3 A DES Example 3.4 The Strength of DES 3.5 Block Cipher Design Principles 3.6 Recommended Reading 3.7 Key Terms, Review Questions, and Problems

Chapter 4 Basic Concepts in Number Theory and Finite Fields 4.1 Divisibility and the Division Algorithm 4.2 The Euclidean Algorithm 4.3 Modular Arithmetic 4.4 Groups, Rings, and Fields 4.5 Finite Fields of the Form GF(p) 4.6 Polynomial Arithmetic 4.7 Finite Fields of the Form GF(2(Sup[n])) 4.8 Recommended Reading 4.9 Key Terms, Review Questions, and Problems Appendix 4A The Meaning of mod Chapter 5 Advanced Encryption Standard 5.1 Finite Field Arithmetic 5.2 AES Structure 5.3 AES Transformation Functions 5.4 AES Key Expansion 5.5 An AES Example 5.6 AES Implementation 5.7 Recommended Reading 5.8 Key Terms, Review Questions, and Problems Appendix 5A Polynomials with Coefficients in GF(2(Sup[8])) Appendix 5B Simplified AES Chapter 6 Block Cipher Operation 6.1 Multiple Encryption and Triple DES 6.2 Electronic Code book 6.3 Cipher Block Chaining Mode 6.4 Cipher Feedback Mode 6.5 Output Feedback Mode 6.6 Counter Mode 6.7 XTS-AES Mode for Block-Oriented Storage Devices 6.8 Recommended Reading 6.9 Key Terms, Review Questions, and Problems Chapter 7 Pseudorandom Number Generation and Stream Ciphers 7.1 Principles of Pseudorandom Number Generation 7.2 Pseudorandom Number Generators 7.3 Pseudorandom Number Generation Using a Block Cipher 7.4 Stream Ciphers 7.5 RC4 7.6 True Random Number Generators 7.7 Recommended Reading 7.8 Key Terms, Review Questions, and Problems

PART TWO: ASYMMETRIC CIPHERS Chapter 8 More Number Theory Table of Contents 8.1 Prime Numbers 8.2 Fermats and Eulers Theorems 8.3 Testing for Primality 8.4 The Chinese Remainder Theorem 8.5 Discrete Logarithms 8.6 Recommended Reading 8.7 Key Terms, Review Questions, and Problems Chapter 9 Public-Key Cryptography and RSA 9.1 Principles of Public-Key Cryptosystems 9.2 The RSA Algorithm 9.3 Recommended Reading 9.4 Key Terms, Review Questions, and Problems Appendix 9A The Complexity of Algorithms Chapter 10 Other Public-Key Cryptosystems 10.1 Diffie-Hellman Key Exchange 10.2 Elgamal Cryptographic System 10.3 Elliptic Curve Arithmetic 10.4 Elliptic Curve Cryptography 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 10.6 Recommended Reading 10.7 Key Terms, Review Questions, and Problems PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS Chapter 11 Cryptographic Hash Functions 11.1 Applications of Cryptographic Hash Functions 11.2 Two Simple Hash Functions 11.3 Requirements and Security 11.4 Hash Functions Based on Cipher Block Chaining 11.5 Secure Hash Algorithm (SHA) 11.6 SHA-3 11.7 Recommended Reading 11.8 Key Terms, Review Questions, and Problems Chapter 12 Message Authentication Codes 12.1 Message Authentication Requirements 12.2 Message Authentication Functions 12.3 Requirements for Message Authentication Codes 12.4 Security of MACs 12.5 MACs Based on Hash Functions: HMAC 12.6 MACs Based on Block Ciphers: DAA and CMAC 12.7 Authenticated Encryption: CCM and GCM

12.8 Key Wrapping 12.9 Pseudorandom Number Generation using Hash Functions and MACs 12.10 Recommended Reading 12.11 Key Terms, Review Questions, and Problems Chapter 13 Digital Signatures 13.1 Digital Signatures 13.2 Elgamal Digital Signature Scheme 13.3 Schnorr Digital Signature Scheme 13.4 NIST Digital Signature Algorithm 13.5 Elliptic Curve Digital Signature Algorithm 13.6 RSA-PSS Digital Signature Algorithm 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems PART FOUR: MUTUAL TRUST Chapter 14 Key Management and Distribution 14.1 Symmetric Key Distribution Using Symmetric Encryption 14.2 Symmetric Key Distribution Using Asymmetric Encryption 14.3 Distribution of Public Keys 14.4 X.509 Certificates 14.5 Public-Key Infrastructure 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 User Authentication 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric Encryption 15.3 Kerberos 15.4 Remote User Authentication Using Asymmetric Encryption 15.5 Federated Identity Management 15.6 Personal Identity Verification 15.7 Recommended Reading 15.8 Key Terms, Review Questions, and Problems PART FIVE: NETWORK AND INTERNET SECURITY Chapter 16 Network Access Control and Cloud Security 16.1 Network Access Control 16.2 Extensible Authentication Protocol 16.3 IEEE 802.1X Port-Based Network Access Control 16.4 Cloud Computing 16.5 Cloud Security Risks and Countermeasures 16.6 Data Protection in the Cloud 16.7 Cloud Security as a Service 16.8 Recommended Reading

16.9 Key Terms, Review Questions, and Problems Chapter 17 Transport-Level Security 17.1 Web Security Considerations 17.2 Secure Sockets Layer 17.3 Transport Layer Security 17.4 HTTPS 17.5 Secure Shell (SSH) 17.6 Recommended Reading 17.7 Key Terms, Review Questions, and Problems Chapter 18 Wireless Network Security 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless LAN Overview 18.4 IEEE 802.11i Wireless LAN Security 18.5 Recommended Reading 18.6 Key Terms, Review Questions, and Problems Chapter 19 Electronic Mail Security 19.1 Pretty Good Privacy 19.2 S/MIME 19.3 DomainKeys Identified Mail 19.4 Recommended Reading 19.5 Key Terms, Review Questions, and Problems Appendix 19A Radix-64 Conversion Chapter 20 IP Security 20.1 IP Security Overview 20.2 IP Security Policy 20.3 Encapsulating Security Payload 20.4 Combining Security Associations 20.5 Internet Key Exchange 20.6 Cryptographic Suites 20.7 Recommended Reading 20.8 Key Terms, Review Questions, and Problems APPENDICES Appendix A Projects for Teaching Cryptography and Network Security A.1 Sage Computer Algebra Projects A.2 Hacking Project A.3 Block Cipher Projects A.4 Laboratory Exercises A.5 Research Projects A.6 Programming Projects A.7 Practical Security Assessments

A.8 Firewall Projects A.9 Case Studies A.10 Writing Assignments A.11 Reading/Report Assignments A.12 Discussion Topics Appendix B Sage Examples B.1 Linear Algebra and Matrix Functionality B.2 Chapter 2: Classical Encryption B.3 Chapter 3: Block Ciphers and the Data Encryption Standard B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields B.5 Chapter 5: Advanced Encryption Standard B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers B.7 Chapter 8: Number Theory B.8 Chapter 9: Public-Key Cryptography and RSA B.9 Chapter 10: Other Public-Key Cryptosystems B.10 Chapter 11: Cryptographic Hash Functions B.11 Chapter 13: Digital Signatures References Credits Index A B C D E F G H I K L M N O P Q R S T

U V W X Z