Connect with and motivate students — directly in your Pearson eText
Pearson eText offers an affordable, simple-to-use mobile reading experience that lets instructors and students extend learning beyond class time. Learn more about Pearson eText.
Keeping pace with innovations in the field
- New - Chapter 1 includes a new section describing trust and trustworthiness—two key concepts in computer and network security.
- New and Expanded - Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
- New - Two new sections cover:
- Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
- Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
Basic issues for network security capability
- Fundamental security design principles in Chapter 1 include a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security.
- A unified, comprehensive treatment of mutual trust topics explores key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
- A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability, while giving students a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.
Pedagogy that introduces students to cryptography and network security
- Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject.
- Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses.
- Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each approach better.
- Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level.
Connect with and motivate students — directly in your Pearson eText
- Schedule readings to keep students on track: Instructors can create due dates for sections or chapters of their eText so that students know exactly what they need to read to come to class prepared. The mobile app also lets students set notifications to remind them of due dates.
- Extend the learning experience, anytime and anywhere: The mobile app lets students use their eText whenever they have a moment in their day, on Android and iPhone mobile phones and tablets. Offline access ensures students never miss a chance to learn.
- Help students focus on what they need to study: Students can make their Pearson eText their own by creating highlights with meaningful labels and notes. The customizable Notebook lets students easily filter, arrange, and group their notes in a way that makes sense to them.
- Let students check their understanding: Personalized Study Tools are easy to access on both the web and mobile app to help students learn key terms. (Available with select titles.)
- Help students see how reading is relevant to the course: Notes and highlights allow educators to share information directly with students within their eText. It’s easy to add your own personal teaching style to important topics, call out need-to-know details, or clarify difficult concepts.
- Gain insight into how students use their eText: Reading analytics let educators see how students work in their eText so that you can plan more effective instruction.
- Quickly set up and access your course
- Straightforward setup makes it incredibly easy for educators to get students up and running quickly on the first day of class.
- LMS integration provides institutions, instructors, and students with single sign-on access to your Pearson eText courses via Blackboard Learn™, Canvas™, Brightspace® by D2L, and Moodle™.
- Provide an affordable option: Pearson eText delivers the same high-quality content of a print book at an affordable price.
- Copyright 2020
- Edition: 8th
- ISBN-10: 0-13-576403-3
- ISBN-13: 978-0-13-576403-9
For courses in Cryptography, Computer Security, and Network Security.
This ISBN is for the Pearson eText access card.
NOTE: Pearson eText is a fully digital delivery of Pearson content and should only be purchased when required by your instructor. This ISBN is for the Pearson eText access card. In addition to your purchase, you will need a course invite link, provided by your instructor, to register for and use Pearson eText.
Keep pace with the fast-moving field of cryptography and network security
Stallings’ Cryptography and Network Security: Principles and Practice, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.
Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience. It lets students highlight, take notes, and review key vocabulary all in one place, even when offline. Seamlessly integrated videos and other rich media engage students and give them access to the help they need, when they need it. Educators can easily customize the table of contents, schedule readings, and share their own notes with students so they see the connection between their eText and what they learn in class – motivating them to keep reading, and keep learning. And, reading analytics offer insight into how students use the eText, helping educators tailor their instruction. Learn more about Pearson eText.
Table of Contents
1. Computer and Network Security Concepts
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Lightweight Cryptography and Post-Quantum Cryptography
15. Key Management and Distribution
16. User Authentication Protocols
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
21. Network Endpoint Security
22. Cloud Security
23. Internet of Things (IoT) Security
Appendix A Basic Concepts from Linear Algebra
Appendix B Measures of Security and Secrecy
Appendix C Data Encryption Standard (DES)
Appendix D Simplified AES
Appendix E Mathematical Basis of the Birthday Attack