Cryptography and Network Security: Principles and Practice – William Stallings – 5th Edition


In this age of universal connectivity of electronics, viruses, hackers, and electronic fraud; safety is paramount. This text provides a practical analysis of the two principles and practice of cryptography and network security.

First, the key issues that need to be addressed in a network security framework are explored through a tutorial and a survey of cryptography and network security technology. Then, the practice of network security is explored through practical applications that have been implemented and are in use today. An unprecedented package of support for instructors and students ensures adequate teaching and learning experience.

The new edition has been updated to include coverage of the most recent issues as encryption modes of operation blocks, including authenticated encryption; revised and expanded AES coverage; extension of the coverage of the generation of pseudo-random numbers; new federated identity coverage, HTTPS, Secure Shell (SSH), and wireless network security; completely rewritten and updated IPsec coverage, and a new chapter in legal and ethical issues.

View more
  • Chapter 0 Guide for Readers and Instructors
    Chapter 1 Overview

    Part One Symmetric Ciphers
    Chapter 2 Classical Encryption Techniques
    Chapter 3 Block Ciphers and the Data Encryption Standard
    Chapter 4 Basic Concepts in Number Theory and Finite Fields
    Chapter 5 Advanced Encryption Standard
    Chapter 6 Block Cipher Operation
    Chapter 7 Pseudorandom Number Generation and Stream Ciphers

    Part Two Asymmetric Ciphers
    Chapter 8 More Number Theory
    Chapter 9 Public-Key Cryptography and RSA
    Chapter 10 Other Public-Key Cryptosystems

    Part Three Cryptographic Data Integrity Algorithms
    Chapter 11 Cryptographic Hash Functions
    Chapter 12 Message Authentication Codes
    Chapter 13 Digital Signatures

    Part Four Mutual Trust
    Chapter 14 Key Management and Distribution
    Chapter 15 User Authentication
    Chapter 16 Network Access Control and Cloud Security
    Chapter 17 Transport-Level Security
    Chapter 18 Wireless Network Security
    Chapter 19 Electronic Mail Security
    Chapter 20 IP Security
  • Citation

Leave us a comment

No Comments

Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x