Chapter 1. Guide for Readers and Instructors¶
Outline of This Book¶
The book is organized into seven parts:
- Symmetric Ciphers: symmetric encryption.
- Advanced Encryption Standard (AES).
- Data Encryption Standard (DES).
- Stream encryption algorithm: RC4.
- Pseudorandom and random number generation.
- Asymmetric Ciphers: public-key algorithms.
- RSA (Rivest-Shamir-Adelman).
- Elliptic curve.
- Cryptographic Data Integrity Algorithms:
- Cryptographic hash functions.
- Message authentication codes and digital signatures.
- Mutual Trust: key management abd distribution and user authentication.
- Network Security and Internet Security: cryptographic algorithms and security protocols that provide security over networks and the Internet.
- Network access control.
- Cloud security.
- Transport-level security.
- Wireless network security.
- E-mail security.
- IP security.
- System Security: security facilities designed to protect a computer system from security threats, and firewall technology.
- Legal and Ethical Issues.
A Roadmap for Readers and Instructors¶
Internet and Web Resources¶
Standards¶
The most important organizations involved in the development or promotion of standards are:
- National Institute of Standards and Technology (NIST)
- Internet Society (ISOC)
- ITU-T: International Telecommunication Union (ITU)
- International Organization for Standardization (ISO)