正在加载图片...
Section 3.2.The Data Encryption Standard Section 3.3.The Strength of Des Section 3.4.Differential and Linear Cryptanalysis Section 3.5.Block Cipher Design Principles Section 3.6.Recommended Reading Section 3.7.Key Terms.Review Questions,and Problems Chapter 4.Finite Fields 22360057 Section 4.1.Groups,Rings.and Fields Section 4.2.Modular Arithmetic 101 Section 4.3.The Euclidean Algorithm 107 Section 4.4.Finite Fields of The Form GF(p 109 Section 4.5.Polynomial Arithmetic Section 4.6.Finite Fields Of the Form GF(2n) Section 4.7.Recommended Reading and Web Sites Section 4.8.Key Terms.Review Questions,and Problems Chapter 5.Advanced Encryption Standard Section 5.1.Evaluation Criteria For AES Section 5.2.The AES Cipher Section 5.3.Recommended Reading and Web Sites Section 5.4.Key Terms.Review Questions,and Problems 1920丝50066场 Appendix 5A Polynomials with Coefficients in GF(28) Appendix 5B Simplified AES Chapter 6.More on Symmetric Ciphers Section 6.1.Multiple Encryption and Triple DES Section 6.2.Block Cipher Modes of Operation Section 6.3.Stream Ciphers and RC4 189 Section 6.4.Recommended Reading and Web Site Section 6.5.Key Terms.Review Questions,and Problems Chapter 7.Confidentiality Using Symmetric Encryption Section 7.1.Placement of Encryption Function Section 7.2.Traffic Confidentiality MM0000 Section 7.3.Key Distribution Section 7.4.Random Number Generation Section 7.5.Recommended Reading and Web Sites Section 7.6.Key Terms.Review Questions,and Problems Part Two:Public-Key Encryption and Hash Functions Chapter 8.Introduction to Number Theory Section 8.1.Prime Numbers Section 8.2.Fermat's and Euler's Theorems Section 8.3.Testing for Primality Section 8.4.The Chinese Remainder Theorem Section 8.5.Discrete Logarithms Section 8.6.Recommended Reading and Web Sites 147228408142448459 Section 8.7.Key Terms.Review Questions,and Problems Chapter 9.Public-Key Cryptography and RSA Section 9.1.Principles of Public-Key Cryptosystems Section 9.2.The RSA Algorithm Section 9.3.Recommended Reading and Web Sites 塑 Section 9.4.Key Terms.Review Questions.and Problems 4 Appendix 9A Proof of the RSA Algorithm 285Section 3.2. The Data Encryption Standard 72 Section 3.3. The Strength of Des 82 Section 3.4. Differential and Linear Cryptanalysis 83 Section 3.5. Block Cipher Design Principles 86 Section 3.6. Recommended Reading 90 Section 3.7. Key Terms, Review Questions, and Problems 90 Chapter 4. Finite Fields 95 Section 4.1. Groups, Rings, and Fields 97 Section 4.2. Modular Arithmetic 101 Section 4.3. The Euclidean Algorithm 107 Section 4.4. Finite Fields of The Form GF(p) 109 Section 4.5. Polynomial Arithmetic 113 Section 4.6. Finite Fields Of the Form GF(2n) 119 Section 4.7. Recommended Reading and Web Sites 129 Section 4.8. Key Terms, Review Questions, and Problems 130 Chapter 5. Advanced Encryption Standard 134 Section 5.1. Evaluation Criteria For AES 135 Section 5.2. The AES Cipher 140 Section 5.3. Recommended Reading and Web Sites 160 Section 5.4. Key Terms, Review Questions, and Problems 161 Appendix 5A Polynomials with Coefficients in GF(28) 163 Appendix 5B Simplified AES 165 Chapter 6. More on Symmetric Ciphers 174 Section 6.1. Multiple Encryption and Triple DES 175 Section 6.2. Block Cipher Modes of Operation 181 Section 6.3. Stream Ciphers and RC4 189 Section 6.4. Recommended Reading and Web Site 194 Section 6.5. Key Terms, Review Questions, and Problems 194 Chapter 7. Confidentiality Using Symmetric Encryption 199 Section 7.1. Placement of Encryption Function 201 Section 7.2. Traffic Confidentiality 209 Section 7.3. Key Distribution 210 Section 7.4. Random Number Generation 218 Section 7.5. Recommended Reading and Web Sites 227 Section 7.6. Key Terms, Review Questions, and Problems 228 Part Two: Public-Key Encryption and Hash Functions 232 Chapter 8. Introduction to Number Theory 234 Section 8.1. Prime Numbers 236 Section 8.2. Fermat's and Euler's Theorems 238 Section 8.3. Testing for Primality 242 Section 8.4. The Chinese Remainder Theorem 245 Section 8.5. Discrete Logarithms 247 Section 8.6. Recommended Reading and Web Sites 253 Section 8.7. Key Terms, Review Questions, and Problems 254 Chapter 9. Public-Key Cryptography and RSA 257 Section 9.1. Principles of Public-Key Cryptosystems 259 Section 9.2. The RSA Algorithm 268 Section 9.3. Recommended Reading and Web Sites 280 Section 9.4. Key Terms, Review Questions, and Problems 281 Appendix 9A Proof of the RSA Algorithm 285
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有