This text provides detailed coverage of codes and encipherment techniques, symmetric key and asymmetric key cryptography, substitution cipher, monoalphabetic and polyalphabetic ciphering. A detailed discussion of the goals of network security, types of attacks on network security and security mechanism is included. A chapter is devoted to wireless network security; and securing low sized memory devices, such as smart cards, is covered.
There is an emphasis placed on the mathematics used in cryptography and network security. Steganography, including audio and video steganography, is explained. The book alos includes a thorough discussion of block ciphering and stream ciphering method,s including DES, Feistel structure and AES. Coverage of modern symmetric key encipherment techniques, such as International Data Encryption Algorithm, RC4, RC5, RC6 and Blowfish, is included.
Also included is in depth coverage of digital signature, message authentication codes and key distribution systems; detailed discussion of the Message Digest algorithm, Kerberos, and the X.509 Authentication Service; and system security, SSL,TLS, IDS and firewalls.
The book includes multiple choice questions and examples in each chapter.