《网络安全导论 理论与实践(英文版)》基于网络安全的新研究成果,全面系统地向读者介绍了网络安全的全貌,从理论到实践围绕两条主线展开,一条主线是计算机密码学的标准算法与网络安全协议,另一条主线是计算机系统与网络设备的安全设置与防护。两条主线相互交织,构成网络通信的安全防护网。
本书内容包括网络安全攻防概貌、标准加密算法、密钥产生算法、公钥加密算法、密钥管理算法、身份认证算法、网络各层安全协议、无线网络安全协议、云计算与云存储安全协议、网络防火墙原理、入侵检测系统以及恶意软件防护技术。此外,每章还附有大量习题,包括许多读者亲身经历过的网络安全攻击,帮助读者从实例中好地掌握网络安全的原理和应用。
本书可作为高等学校计算机、电子与通信以及信息安全学科高年级本科生和研究生教材,也可供其他专业研究生、相关行业的专业研究人员、安全专家以及工程师参考。
- Preface
- About the Authors
- 1 Network Security Overview
- 1.1 Mission and Definitions
- 1.2 Common Attacks and Defense Mechanisms
- 1.2.1 Eavesdropping
- 1.2.2 Cryptanalysis
- 1.2.3 Password Pilfering
- 1.2.4 Identity Spoofing
- 1.2.5 Buffer-Overflow Exploitations
- 1.2.6 Repudiation
- 1.2.7 Intrusion
- 1.2.8 Traffic Analysis
- 1.2.9 Denial of Service Attacks
- 1.2.10 Malicious Software
- 1.3 Attacker Profiles
- 1.3.1 Hackers
- 1.3.2 Script Kiddies
- 1.3.3 Cyber Spies
- 1.3.4 Vicious Employees
- 1.3.5 Cyber Terrorists
- 1.3.6 Hypothetical Attackers
- 1.4 Basic Security Model
- 1.5 Security Resources
- 1.5.1 CERT
- 1.5. 2 SANS Institute
- 1.5.3 Microsoft Security
- 1.5.4 NTBugtraq
- 1.5.5 Common Vulnerabilities and Exposures
- 1.6 Closing Remarks
- 1.7 Exercises
- 1.7.1 Discussions
- 1.7.2 Homework
- 2 Data Eneryption Algorithms
- 2.1 Data Encryption Algorithm Design Criteria
- 2.1.1 ASCII Code
- 2.1.2 XOR Encryption
- 2.1.3 Criteria of Data Encryptions
- 2.1.4 Implementation Criteria
- 2.2 Data Encryption Standard
- 2.2.1 Feistel's Cipher Scheme
- 2.2.2 DES Subkeys
- 2.2.3 DES Substitution Boxes
- 2.2.4 DES Encryption
- 2.2.5 DES Decryption and Correctness Proof
- 2.2.6 DES Security Strength
- 2.3 Multiple DES
- 2.3.1 Triple-DES with Two Keys
- 2.3.2 2DES and 3DES/3
- 2.3.3 Meet-in-the-Middle Attacks on 2DES
- 2.4 Advanced Encryption Standard
- 2.4.1 AES Basic Structures
- 2.4.2 AES S-Boxes
- 2.4.3 AES-128 Round Keys
- 2.4.4 Add Round Keys
- 2.4.5 Substitute-Bytes
- 2.4.6 Shift-Rows
- 2.4.7 Mix-Columns
- 2.4.8 AES-128 Encryption
- 2.4.9 AES-128 Decryption and Correctness Proof
- 2.4.10 Galois Fields
- 2.4.11 Construction of the AES S-Box and Its Inverse
- 2.4.12 AES Security Strength
- 2.5 Standard Block Cipher Modes of Operations
- 2.5.1 Electronic-Codebook Mode
- 2.5.2 Cipher-Block-Chaining Mode
- 2.5.3 Cipher-Feedback Mode
- 2.5.4 Output-Feedback Mode
- 2.5.5 Counter Mode
- 2.6 Offset Codebook Mode of Operations
- 2.6.1 Basic Operations
- 2.6.2 OCB Encryption and Tag Generation
- 2.6.3 OCB Decryption and Tag Verification
- 3 Public-Key Cryptography and Key Management
- 4 Data Authentication
- 5 Network Security Protocols in Practice
- 6 Wireless Network Security
- 7 Cloud Security
- 8 Network Perimeter Security
- 9 Intrusion Detections
- 10 The Art of Anti-Malicious Software
- Appendix
- Further Reading
- Index