Chapter 1. Guide for Readers and Instructors

Outline of This Book

The book is organized into seven parts:

  1. Symmetric Ciphers: symmetric encryption.
    • Advanced Encryption Standard (AES).
    • Data Encryption Standard (DES).
    • Stream encryption algorithm: RC4.
    • Pseudorandom and random number generation.
  2. Asymmetric Ciphers: public-key algorithms.
    • RSA (Rivest-Shamir-Adelman).
    • Elliptic curve.
  3. Cryptographic Data Integrity Algorithms:
    • Cryptographic hash functions.
    • Message authentication codes and digital signatures.
  4. Mutual Trust: key management abd distribution and user authentication.
  5. Network Security and Internet Security: cryptographic algorithms and security protocols that provide security over networks and the Internet.
    • Network access control.
    • Cloud security.
    • Transport-level security.
    • Wireless network security.
    • E-mail security.
    • IP security.
  6. System Security: security facilities designed to protect a computer system from security threats, and firewall technology.
  7. Legal and Ethical Issues.

A Roadmap for Readers and Instructors

Internet and Web Resources

Standards

The most important organizations involved in the development or promotion of standards are: