Notation Preface About the Author Chapter 0 Reader s Guide Chapter 1 Overview PART ONE SYMMETRIC CIPHERS Chapter 2 Classical Encryption Techniques Chapter 3 Block Ciphers and the Data Encryption Standard Chapter 4 Basic Concepts in Number Theory and Finite Fields Chapter 5 Advanced Encryption Standard Chapter 6 Block Cipher Operation Chapter 7 Pseudorandom Number Generation and Stream Ciphers PART TWO ASYMMETRIC CIPHERS Chapter 8 More Number Theory Chapter 9 Public-Key Cryptography and RSA Chapter 10 Other Public-Key Cryptosystems PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS Chapter 11 Cryptographic Hash Functions Chapter 12 Message Authentication Codes Chapter 13 Digital Signatures PART FOUR MUTUAL TRUST Chapter 14 Key Management and Distribution Chapter 15 User Authentication Protocols PART FIVE NETWORK AND INTERNET SECURITY Chapter 16 Transport-Level Security Chapter 17 Wireless Network Security Chapter 18 Electronic Mail Security Chapter 19 IP Security APPENDICES References Index ONLINE CHAPTERS PART SIX SYSTEM SECURITY Chapter 20 Intruders Chapter 21 Malicious Software Chapter 22 Firewalls PART SEVEN LEGAL AND ETHICAL ISSUES Chapter 23 Legal and Ethical Issues ONLINE APPENDICES WilliamStallings.com/Crypto/Crypto5e.html Appendix C Sage Problems Appendix D Standards and Standards-Setting Organizations Appendix E Basic Concepts from Linear Algebra Appendix F Measures of Security and Secrecy Appendix G Simplified DES Appendix H Evaluation Criteria for AES Appendix I More on Simplified AES Appendix J Knapsack Public-Key Algorithm Appendix K Proof of the Digital Signature Algorithm Appendix L TCP/IP and OSI Appendix M Java Cryptographic APIs Appendix N The Whirlpool Hash Function Appendix O Data Compression Using ZIP Appendix P PGP Random Number Generation Appendix Q International Reference Alphabet Glossary