Perlman believes this title does not belong to a single individual. Radia Perlman is an American computer science and mathematics expert known affectionately as “The Mother of the Internet”. She is affectionately known as “The Mother of the Internet”. 17.Radia Perlman speaking at a convention.17.10 HMAC Rather than Simple Keyed Hash.17.9 Hash in a Constant When Hashing a Password.17.5 Multiplexing Flows over One Secure Session.17.4 Don’t Encrypt without Integrity Protection.17.3 Change Encryption Keys Periodically.16.8 Fully Homomorphic Encryption (FHE).16.7 Secure Multiparty Computation (MPC).14.13 End-to-End Signed and Encrypted Email. 14.11 Preventing Spoofing of From Field.14.6 Non-cryptographic Security Features.13.4 TLS 1.2 (and Earlier) Basic Protocol.12.6 ESP (Encapsulating Security Payload).12.2 IKE (Internet Key Exchange Protocol).11.13 Session Resumption/Multiple Sessions.11.12 Arranging for Parallel Computation.11.9 Preventing Forged Source Addresses. 10.9 Other Information in a PKIX Certificate.10.5 Website Gets a DNS Name and Certificate.9.11 Tricking Users into Divulging Passwords.9.10 Requiring Frequent Password Changes.9.9 Using the Same Password in Multiple Places.9.4 Cryptographic Authentication Protocols.8.1 Signature and/or Encryption Schemes.7.5 How Hard Are Quantum Computers to Build?.6.6 How Secure Are RSA and Diffie-Hellman?.5.9 SHA-3 f Function (Also Known as KECCAK-f).5.5 Creating a Hash Using a Block Cipher.4.4 Ensuring Privacy and Integrity Together.3.3 Constructing a Practical Block Cipher.1.11 Malware: Viruses, Worms, Trojan Horses.1.5 Cryptographically Protected Sessions.Pearson’s Commitment to Diversity, Equity, and Inclusion.* New cryptographic techniques (homomorphic encryption, secure multiparty computation) * New applications (electronic money, blockchains) * Real-time communication (SSL/TLS, SSH, IPsec) * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * How quantum computers work, and why they threaten the first-generation public key algorithms * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * Network security protocol and cryptography basics It can also be used as a textbook at the graduate or advanced undergraduate level. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. This book explains sophisticated concepts in a friendly and intuitive manner. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. The classic guide to cryptography and network security - now fully updated!
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |