The classic guide to cryptography and network security - now fully
updated!
"Alice and Bob are back!"
Widely regarded as the most comprehensive yet comprehensible guide to
network security and cryptography, the previous editions of Network
Security received critical acclaim for lucid and witty explanations of
the inner workings of cryptography and network security protocols. In
this edition, the authors have significantly updated and revised the
previous content, and added new topics that have become important.
This book explains sophisticated concepts in a friendly and intuitive
manner. For protocol standards, it explains the various constraints and
committee decisions that led to the current designs. For cryptographic
algorithms, it explains the intuition behind the designs, as well as the
types of attacks the algorithms are designed to avoid. It explains
implementation techniques that can cause vulnerabilities even if the
cryptography itself is sound. Homework problems deepen your
understanding of concepts and technologies, and an updated glossary
demystifies the field's jargon. Network Security, Third Edition will
appeal to a wide range of professionals, from those who design and
evaluate security systems to system administrators and programmers who
want a better understanding of this important field. It can also be used
as a textbook at the graduate or advanced undergraduate level.
Coverage includes
Network security protocol and cryptography basics
Design considerations and techniques for secret key and hash algorithms
(AES, DES, SHA-1, SHA-2, SHA-3)
First-generation public key algorithms (RSA, Diffie-Hellman, ECC)
How quantum computers work, and why they threaten the first-generation
public key algorithms
Quantum-safe public key algorithms: how they are constructed, and
optimizations to make them practical
Normal 0 false false false EN-US X-NONE X-NONE
MicrosoftInternetExplorer4