正在加载图片...
Appendix 9B The Complexity of Algorithms Chapter 10.Key Management;Other Public-Key Cryptosystems Section 10.1.Key Management 塑塑 Section 10.2.Diffie-Hellman Key Exchange 298 Section 10.3.Elliptic Curve Arithmetio Section 10.4.Elliptic Curve Cryptography Section 10.5.Recommended Reading and Web Sites Section 10.6.Key Terms.Review Questions,and Problems 0004 Chapter 11.Message Authentication and Hash Functions Section 11.1.Authentication Requirements Section 11.2.Authentication Functions Section 11.3.Message Authentication Codes Section 11.4.Hash Functions Section 11.5.Security of Hash Functions and Macs Section 11.6.Recommended Reading Section 11.7.Key Terms.Review Questions.and Problems Appendix 11A Mathematical Basis of the Birthday Attack Chapter 12.Hash and MAC Algorithms Section 12.1.Secure Hash Algorithm Section 12.2.Whirlpool Section 12.3.HMAC Section 12.4.CMAC Section 12.5.Recommended Reading and Web Sites Section 12.6.Key Terms,Review Questions,and Problems Chapter 13.Digital Signatures and Authentication Protocols Section 13.1.Digital Signatures Section 13.2.Authentication Protocols Section 13.3.Digital Signature Standard Section 13.4.Recommended Reading and Web Sites Section 13.5.Key Terms.Review Questions,and Problems Part Three:Network Security Applications Chapter 14.Authentication Applications Section 14.1.Kerberos Section 14.2.X.509 Authentication Service Section 14.3.Public-Key Infrastructure Section 14.4.Recommended Reading and Web Sites Section 14.5.Key Terms,Review Questions,and Problems Appendix 14A Kerberos Encryption Techniques Chapter 15.Electronic Mail Security Section 15.1.Pretty Good Privacy Section 15.2.S/MIME Section 15.3.Key Terms,Review Questions,and Problems Appendix 15A Data Compression Using Zip Appendix 15B Radix-64 Conversion Appendix 15C PGP Random Number Generation 14第销销堡 Chapter 16.IP Security Section 16.1.IP Security Overview Section 16.2.IP Security Architecture Section 16.3.Authentication Header 493 Section 16.4.Encapsulating Security Payload 498Appendix 9B The Complexity of Algorithms 286 Chapter 10. Key Management; Other Public-Key Cryptosystems 289 Section 10.1. Key Management 290 Section 10.2. Diffie-Hellman Key Exchange 298 Section 10.3. Elliptic Curve Arithmetic 301 Section 10.4. Elliptic Curve Cryptography 310 Section 10.5. Recommended Reading and Web Sites 313 Section 10.6. Key Terms, Review Questions, and Problems 314 Chapter 11. Message Authentication and Hash Functions 317 Section 11.1. Authentication Requirements 319 Section 11.2. Authentication Functions 320 Section 11.3. Message Authentication Codes 331 Section 11.4. Hash Functions 334 Section 11.5. Security of Hash Functions and Macs 340 Section 11.6. Recommended Reading 344 Section 11.7. Key Terms, Review Questions, and Problems 344 Appendix 11A Mathematical Basis of the Birthday Attack 346 Chapter 12. Hash and MAC Algorithms 351 Section 12.1. Secure Hash Algorithm 353 Section 12.2. Whirlpool 358 Section 12.3. HMAC 368 Section 12.4. CMAC 372 Section 12.5. Recommended Reading and Web Sites 374 Section 12.6. Key Terms, Review Questions, and Problems 374 Chapter 13. Digital Signatures and Authentication Protocols 377 Section 13.1. Digital Signatures 378 Section 13.2. Authentication Protocols 382 Section 13.3. Digital Signature Standard 390 Section 13.4. Recommended Reading and Web Sites 393 Section 13.5. Key Terms, Review Questions, and Problems 393 Part Three: Network Security Applications 398 Chapter 14. Authentication Applications 400 Section 14.1. Kerberos 401 Section 14.2. X.509 Authentication Service 419 Section 14.3. Public-Key Infrastructure 428 Section 14.4. Recommended Reading and Web Sites 430 Section 14.5. Key Terms, Review Questions, and Problems 431 Appendix 14A Kerberos Encryption Techniques 433 Chapter 15. Electronic Mail Security 436 Section 15.1. Pretty Good Privacy 438 Section 15.2. S/MIME 457 Section 15.3. Key Terms, Review Questions, and Problems 474 Appendix 15A Data Compression Using Zip 475 Appendix 15B Radix-64 Conversion 478 Appendix 15C PGP Random Number Generation 479 Chapter 16. IP Security 483 Section 16.1. IP Security Overview 485 Section 16.2. IP Security Architecture 487 Section 16.3. Authentication Header 493 Section 16.4. Encapsulating Security Payload 498
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有