Permalink
Switch branches/tags
Nothing to show
Find file
Fetching contributors…
Cannot retrieve contributors at this time
41 lines (32 sloc) 1.48 KB

Chapter 1. Guide for Readers and Instructors

Outline of This Book

The book is organized into seven parts:

  1. Symmetric Ciphers: symmetric encryption.
    • Advanced Encryption Standard (AES).
    • Data Encryption Standard (DES).
    • Stream encryption algorithm: RC4.
    • Pseudorandom and random number generation.
  2. Asymmetric Ciphers: public-key algorithms.
    • RSA (Rivest-Shamir-Adelman).
    • Elliptic curve.
  3. Cryptographic Data Integrity Algorithms:
    • Cryptographic hash functions.
    • Message authentication codes and digital signatures.
  4. Mutual Trust: key management abd distribution and user authentication.
  5. Network Security and Internet Security: cryptographic algorithms and security protocols that provide security over networks and the Internet.
    • Network access control.
    • Cloud security.
    • Transport-level security.
    • Wireless network security.
    • E-mail security.
    • IP security.
  6. System Security: security facilities designed to protect a computer system from security threats, and firewall technology.
  7. Legal and Ethical Issues.

A Roadmap for Readers and Instructors

Internet and Web Resources

Standards

The most important organizations involved in the development or promotion of standards are:

  • National Institute of Standards and Technology (NIST)
  • Internet Society (ISOC)
  • ITU-T: International Telecommunication Union (ITU)
  • International Organization for Standardization (ISO)