A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.
Provides an overview of security rather than focusing on one specific type of security. Also places math in an appendix at the end of the chapter, so the student won't be overwhelmed
Usable programs, so students can do hands on activities.
Up-to-date coverage of all the latest networking technologies.
Extensive practice sets at the end of each chapter help students reinforce what they have learned and give them an opportunity to work through some more challenging exercises.
Student-friendly approach moves math to the ends of chapters for an easier explanation of concepts.
An accompanying website that provides both colorful PowerPoints and solutions.
Message: Hundreds of figures are used to visually illustrate concepts, making technical material easier to understand. A text for beginners in security
Table of Contents
Part 1 Symmetric-Key Encipherment
2 Mathematics of Cryptography
3 Traditional Symmetric-Key Ciphers
4 Mathematics of Cryptography
5 Introduction to Modern Symmetric-Key Ciphers
6 Data Encryption Standard (DES)
7 Advanced Encryption Standard (AES)
8 Encipherment Using Modern Symmetric-Key Ciphers
Part 2 Asymmetric-Key Encipherment
9 Mathematics of Cryptography
10 Asymmetric-Key Cryptography
Part 3 Integrity, Authentication, and Key Management
11 Message Integrity and Message Authentication
12 Cryptographic Hash Functions
13 Digital Signature
14 Entity Authentication
15 Key Management
Part 4 Network Security
16 Security at the Application Layer: PGP and S/MIME
17 Security at the Transport Layer: SSL and TLS
18 Security at the Network Layer: IPSec