The new edition treats the subject in a lucid manner explaining tough concepts through simple schematic diagrams and easy to understand language. A new chapter on System Security has been included to help understand the attacks by various intruders & malicious softwares on the computer systems and the protective & security measures adopted against them using Firewalls, Intrusion detection systems. Numerous solved examples, algorithms, illustrations & usage of fictitious characters make the text interesting and simple to read & comprehend. Table Of Contents: Chapter 1 IntroductionChapter 2 Mathematics of CryptographyChapter 3 Traditional Symmetric-Key CiphersChapter 4 Mathematics of Symmetric Key CryptographyChapter 5 Introduction to Modern Symmetric-Key CiphersChapter 6 Data Encryption Standard (DES)Chapter 7 Advanced Encryption Standard (AES)Chapter 8 Encipherment Using Modern Symmetric-Key CiphersChapter 9 Mathematics of Asymmetric Key CryptographyChapter 10 Asymmetric-Key CryptographyChapter 11 Message Integrity and Message AuthenticationChapter 12 Cryptographic Hash FunctionsChapter 13 Digital SignatureChapter 14 Entity AuthenticationChapter 15 Key ManagementChapter 16 Security at the Application Layer: PGP and S/MIMEChapter 17 Security at the Transport Layer: SSL and TLSChapter 18 Security at the Network Layer: IPSecChapter 19 System Security Special Features: Inclusion of a new chapter on Systems Security Addition of important topics such as types of conventional algorithms, Secure Electronic Transaction (SET), etc. Thorough treatment for topics related to Symmetric Ciphers, AES; Digital Signatures, Hash Functions. Provides coverage of modern techniques like Index of Coincidence, Random Oracle Model, and Biometrics. Pseudocodes used to illustrate the algorithm implementation. Pedagogical Features: Solved Examples: 260 Exercises: 400 Review Questions: 200 Illustration: 400+
A good introductory book on cryptography and network security related topics. This was the assigned textbook for a class that I took on Cryptography and so I may have chosen a different book if I had the choice. That said, I did learn alot from the textbook and would recommend it as a useful resource.