ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Cryptography and Ne tw ork Se curity Principles and Practices , Fourth Edition • • By William Stallings Pu blis: Pre ntice Hall he r Pu b : Nove m be r 16, 2005 Dat e Table of Contents Pri nt Index ISB: 0-13-187316-4 N-1 Pri nt ISB: 978-0-13-187316-2 N-1 eT e xt ISB: 0-13-187319-9 N-1 eT e xt ISB: 978-0-13-187319-3 N-1 Pag : 592 es In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed This text provides a practical survey of both the principles and practice of cryptography and network security First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology Then, the practice of network security is explored via practical applications that have been implemented and are in use today Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Cryptography and Network Security Principles and Practices, Fourth Edition • • By William Stallings Pu blis: Prentice Hall her Pu b : November 16, 2005 Dat Table of e Contents Pri Index nt ISB: 0-13-187316-4 N-1 Pri nt ISB: 978-0-13-187316-2 N-1 eT ext ISB: 0-13-187319-9 N-1 eT ext ISB: 978-0-13-187319-3 N-1 Pa ge: 592 s Copyright Notation Preface Objectives Intended Audience Plan of the Book Internet Services for Instructors and Students Projects for Teaching Cryptography and Network Security What's New in the Fourth Edition Acknowledgments Chapter Reader's Guide Section 0.1 Outline of this Book Section 0.2 Roadmap Section 0.3 Internet and Web Resources Chapter Introduction Section 1.1 Security Trends Section 1.2 The OSI Security Architecture Section 1.3 Security Attacks Section 1.4 Security Services Section 1.5 Security Mechanisms Section 1.6 A Model for Network Security Section 1.7 Recommended Reading and Web Sites Section 1.8 Key Terms, Review Questions, and xi xiii xiii xiii xiv xiv xiv xv xvi 2 12 13 16 19 22 24 25 Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Problems Part One: Symmetric Ciphers 26 Chapter Classical Encryption Techniques 28 Section 2.1 Symmetric Cipher Model 30 Section 2.2 Substitution Techniques 35 Section 2.3 Transposition Techniques 49 Section 2.4 Rotor Machines 51 Section 2.5 Steganography 53 Section 2.6 Recommended Reading and Web 55 Sites Section 2.7 Key Terms, Review Questions, and 56 Problems Chapter Block Ciphers and the Data Encryption 62 Standard Section 3.1 Block Cipher Principles 64 Section 3.2 The Data Encryption Standard 72 Section 3.3 The Strength of Des 82 Section 3.4 Differential and Linear Cryptanalysis 83 Section 3.5 Block Cipher Design Principles 86 Section 3.6 Recommended Reading 90 Section 3.7 Key Terms, Review Questions, and 90 Problems Chapter Finite Fields 95 Section 4.1 Groups, Rings, and Fields 97 Section 4.2 Modular Arithmetic 101 Section 4.3 The Euclidean Algorithm 107 Section 4.4 Finite Fields of The Form GF(p) 109 Section 4.5 Polynomial Arithmetic 113 Section 4.6 Finite Fields Of the Form GF(2n) 119 Section 4.7 Recommended Reading and Web 129 Sites Section 4.8 Key Terms, Review Questions, and 130 Problems Chapter Advanced Encryption Standard 134 Section 5.1 Evaluation Criteria For AES 135 Section 5.2 The AES Cipher 140 Section 5.3 Recommended Reading and Web 160 Sites Section 5.4 Key Terms, Review Questions, and 161 Problems Appendix 5A Polynomials with Coefficients in 163 GF(28) Appendix 5B Simplified AES 165 Chapter More on Symmetric Ciphers 174 Section 6.1 Multiple Encryption and Triple DES 175 Section 6.2 Block Cipher Modes of Operation 181 Section 6.3 Stream Ciphers and RC4 189 Section 6.4 Recommended Reading and Web Site194 Section 6.5 Key Terms, Review Questions, and 194 Problems Chapter Confidentiality Using Symmetric 199 Encryption Section 7.1 Placement of Encryption Function 201 Section 7.2 Traffic Confidentiality 209 Section 7.3 Key Distribution 210 Section 7.4 Random Number Generation 218 Section 7.5 Recommended Reading and Web 227 Sites Section 7.6 Key Terms, Review Questions, and 228 Problems Part Two: Public-Key Encryption and Hash Functions 232 Chapter Introduction to Number Theory 234 Section 8.1 Prime Numbers 236 Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Section 8.2 Fermat's and Euler's Theorems 238 Section 8.3 Testing for Primality 242 Section 8.4 The Chinese Remainder Theorem 245 Section 8.5 Discrete Logarithms 247 Section 8.6 Recommended Reading and Web 253 Sites Section 8.7 Key Terms, Review Questions, and 254 Problems Chapter Public-Key Cryptography and RSA 257 Section 9.1 Principles of Public-Key 259 Cryptosystems Section 9.2 The RSA Algorithm 268 Section 9.3 Recommended Reading and Web 280 Sites Section 9.4 Key Terms, Review Questions, and 281 Problems Appendix 9A Proof of the RSA Algorithm 285 Appendix 9B The Complexity of Algorithms 286 Chapter 10 Key Management; Other Public-Key 289 Cryptosystems Section 10.1 Key Management 290 Section 10.2 Diffie-Hellman Key Exchange 298 Section 10.3 Elliptic Curve Arithmetic 301 Section 10.4 Elliptic Curve Cryptography 310 Section 10.5 Recommended Reading and Web 313 Sites Section 10.6 Key Terms, Review Questions, and 314 Problems Chapter 11 Message Authentication and Hash 317 Functions Section 11.1 Authentication Requirements 319 Section 11.2 Authentication Functions 320 Section 11.3 Message Authentication Codes 331 Section 11.4 Hash Functions 334 Section 11.5 Security of Hash Functions and Macs 340 Section 11.6 Recommended Reading 344 Section 11.7 Key Terms, Review Questions, and 344 Problems Appendix 11A Mathematical Basis of the Birthday 346 Attack Chapter 12 Hash and MAC Algorithms 351 Section 12.1 Secure Hash Algorithm 353 Section 12.2 Whirlpool 358 Section 12.3 HMAC 368 Section 12.4 CMAC 372 Section 12.5 Recommended Reading and Web 374 Sites Section 12.6 Key Terms, Review Questions, and 374 Problems Chapter 13 Digital Signatures and Authentication 377 Protocols Section 13.1 Digital Signatures 378 Section 13.2 Authentication Protocols 382 Section 13.3 Digital Signature Standard 390 Section 13.4 Recommended Reading and Web 393 Sites Section 13.5 Key Terms, Review Questions, and 393 Problems Part Three: Network Security Applications 398 Chapter 14 Authentication Applications 400 Section 14.1 Kerberos 401 Section 14.2 X.509 Authentication Service 419 Section 14.3 Public-Key Infrastructure 428 Section 14.4 Recommended Reading and Web 430 Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Sites Section 14.5 Key Terms, Review Questions, and Problems Appendix 14A Kerberos Encryption Techniques Chapter 15 Electronic Mail Security Section 15.1 Pretty Good Privacy Section 15.2 S/MIME Section 15.3 Key Terms, Review Questions, and Problems Appendix 15A Data Compression Using Zip Appendix 15B Radix-64 Conversion Appendix 15C PGP Random Number Generation Chapter 16 IP Security Section 16.1 IP Security Overview Section 16.2 IP Security Architecture Section 16.3 Authentication Header Section 16.4 Encapsulating Security Payload Section 16.5 Combining Security Associations Section 16.6 Key Management Section 16.7 Recommended Reading and Web Site Section 16.8 Key Terms, Review Questions, and Problems Appendix 16A Internetworking and Internet Protocols Chapter 17 Web Security Section 17.1 Web Security Considerations Section 17.2 Secure Socket Layer and Transport Layer Security Section 17.3 Secure Electronic Transaction Section 17.4 Recommended Reading and Web Sites Section 17.5 Key Terms, Review Questions, and Problems Part Four: System Security Chapter 18 Intruders Section 18.1 Intruders Section 18.2 Intrusion Detection Section 18.3 Password Management Section 18.4 Recommended Reading and Web Sites Section 18.5 Key Terms, Review Questions, and Problems Appendix 18A The Base-Rate Fallacy Chapter 19 Malicious Software Section 19.1 Viruses and Related Threats Section 19.2 Virus Countermeasures Section 19.3 Distributed Denial of Service Attacks Section 19.4 Recommended Reading and Web Sites Section 19.5 Key Terms, Review Questions, and Problems Chapter 20 Firewalls Section 20.1 Firewall Design Principles Section 20.2 Trusted Systems Section 20.3 Common Criteria for Information Technology Security Evaluation Section 20.4 Recommended Reading and Web Sites Section 20.5 Key Terms, Review Questions, and Problems Appendix A Standards and Standards-Setting Organizations Section A.1 The Importance of Standards 431 433 436 438 457 474 475 478 479 483 485 487 493 498 503 506 516 517 518 527 528 531 549 560 561 563 565 567 570 582 591 592 594 598 599 610 614 619 620 621 622 634 640 644 645 647 648 Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Section A.2 Internet Standards and the Internet Society Section A.3 National Institute of Standards and Technology Appendix B Projects for Teaching Cryptography and Network Security Section B.1 Research Projects Section B.2 Programming Projects Section B.3 Laboratory Exercises Section B.4 Writing Assignments Section B.5 Reading/Report Assignments Glossary References Abbreviations Inside Front Cover Inside Back Cover Index 649 652 653 654 655 655 655 656 657 663 663 InsideFrontCover InsideBackCover Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Copyright [Page ii] Library of Congress Cataloging-in-Publication Data on File Vice President and Editorial Director, ECS: Marcia J Horton Executive Editor: Tracy Dunkelberger Editorial Assistant: Christianna Lee Executive Managing Editor: Vince O'Brien Managing Editor: Camille Trentacoste Production Editor: Rose Kernan Director of Creative Services: Paul Belfanti Cover Designer: Bruce Kenselaar Managing Editor, AV Management and Production: Patricia Burns Art Editor: Gregory Dulles Manufacturing Manager: Alexis Heydt-Long Manufacturing Buyer: Lisa McDowell Marketing Manager: Robin O'Brien Marketing Assistant: Barrie Reinhold © 2006 Pearson Education, Inc Pearson Prentice Hall Pearson Education, Inc Upper Saddle River, NJ 07458 All rights reserved No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher Pearson Prentice Hall™ is a trademark of Pearson Education, Inc The author and publisher of this book have used their best efforts in preparing this book These efforts include the development, research, and testing of the theories and programs to determine their effectiveness The author and publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation contained in this book The author and publisher shall not be liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or use of these programs Printed in the United States of America 10 Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Pearson Pearson Pearson Pearson Pearson Pearson Pearson Pearson Pearson Education Ltd., London Education Australia Pty Ltd., Sydney Education Singapore, Pte Ltd Education North Asia Ltd., Hong Kong Education Canada, Inc., Toronto Educacíon de Mexico, S.A de C.V EducationJapan, Tokyo Education Malaysia, Pte Ltd Education Inc., Upper Saddle River, New Jersey [Page iii] Dedication To Antigone never dull never boring always a Sage Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html [Page xi] Notation Even the natives have difficulty mastering this peculiar vocabulary The Golden Bough, Sir James George Frazer Symbol Expression Meaning D, K D(K, Y) Symmetric decryption of ciphertext Y using secret key K D, PRa D(PRa, Y) Asymmetric decryption of ciphertext Y using A's private key PRa D,PUa D(PUa, Y) Asymmetric decryption of ciphertext Y using A's public key PUa E, K E(K, X) Symmetric encryption of plaintext X using secret key K E, PRa E(PRa, X) Asymmetric encryption of plaintext X using A's private key PRa E, PUa E(PUa, X) Asymmetric encryption of plaintext X using A's public key PUa K Secret key PRa Private key of user A PUa Public key of user A C, K C(K, X) GF(p) Message authentication code of message X using secret key K The finite field of order p, where p is prime The field is defined as the set Zp together with the arithmetic operations modulo p n n GF(2 ) The finite field of order Zn Set of nonnegative integers less than n gcd gcd(i, j) Greatest common divisor; the largest positive integer that divides both i and j with no remainder on division mod a mod m Remainder after division of a by m mod, a b(mod m) a mod m = b mod m mod, a b(mod m) a mod m dlog dloga,p(b) b mod m Discrete logarithm of the number b for the base a (mod p) Page ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Symbol Expression Meaning The number of positive integers less than n and relatively prime to n This is Euler's totient function (n) a1 + a2 + + an a1 x a2 x x an | i|j i divides j, which means that there is no remainder when j is divided by i |,| |a| Absolute value of a || x||y x concatenated with y x y x is approximately equal to y x y Exclusive-OR of x and y for single-bit variables; Bitwise exclusive-OR of x and y for multiple-bit variables The largest integer less than or equal to x x , x A ak) S The element x is contained in the set S (a1,a2, , The integer A corresponds to the sequence of integers (a1,a2, , ak) Page 10 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Public-key encryption 2nd 3rd 4th 5th algorithm approaches 2nd cryptography cryptosystems 2nd Diffie-Hellman key exchange elliptic curve cryptography (ECC) key management message authentication number theory Oakley key determination protocol RSA algorithm 2nd Public-key infrastructure (PKI) development of management functions management protocols X.509 (PKIX) Public-key management 2nd approaches to, PGP cryptography for secret key distribution distribution Pretty Good Privacy (PGP) trust, use of Public-key ring Purchase request, SET Page 823 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Quoted-printable transfer encoding Page 824 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Radix-64 conversion Random access, CTR mode Random delay Random number generation 2nd 3rd ANSI X.9.17 PGP ANSI X.9.17 PRNG Blum Blum Shub (BBS) generator cryptographically cyclic encryption linear congruential generators output feedback (OFB) mode, DES Pretty Good Privacy (PGP) pseudorandom number generators (PRNGs) 2nd 3rd 4th randomness skew true random number generator (TRNG) 2nd unpredictability use of RC4 algorithm development of initialization of S logic of stream generation strength of 2nd Reader's guide Receiver, role of Record Protocol Reflector DDoS Registration authority (RA) Registration request Relatively prime Release of message contents Reliability, network Replay Replay attacks Repository Request for Comment (RFC) publication 2nd Residue 2nd Revocation request RFC 822 Rijndael proposal 2nd Rings (R) 2nd Rivest-Shamir-Adleman (RSA) algorithm 2nd chosen ciphertext attack (CCA) complexity of computational aspects of description of development of efficient operation of exponentiation on modular arithmetic factoring problem key generation optimal assymetric encryption padding (OAEP) Page 825 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html proof of security of timing attacks Root, polynomial Rotor machines Rounds 2nd 3rd 4th function of number of 2nd single, details of Routing header 2nd RSA algorithm [See Rivest-Shamir-Adleman (RSA) algorithm] Rule-based intrusion detection 2nd Page 826 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] S-AES [See Simplified Advanced Encryption Standard (S-AES)] S-box 2nd 3rd 4th 5th AES design of role of 2nd S-AES S/MIME [See Secure/Multipurpose Internet Mail Extension (S/MIME)] Secret key 2nd authentication confidentiality distribution hybrid approach, IBM mainframe man-in-the-middle attack Secure Electronic Transaction (SET) development of dual signature features of overview payment purchase request requirements system participants transaction types Secure Hash Algorithms (SHA) development of parameters SHA-512 use of Secure mailing lists Secure Socket Layer (SSL) Alert Protocol architecture Change Cipher Spec Protocol connection 2nd cryptographic parameters, generation of Handshake Protocol master secret creation Record Protocol session Secure/Multipurpose Internet Mail Extension (S/MIME) certificate processing certificates-only message clear signing cryptographic algorithms development of enhanced security services 2nd envelopedData functionality functions limitations of Mailing List Agent (MLA) messages MIME entity, securing Page 827 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html multipurpose Internet mail extensions (MIME) registration request RFC 822 secure mailing lists security labels 2nd signed receipts signedData user-agent role VeriSign certificates 2nd Security 2nd 3rd 4th 5th 6th [See also Authentication, Network security, System Security] attacks 2nd 3rd authentication brute-force attacks computer cryptanalysis elliptic curve cryptography (ECC) hash functions information internet introduction to mechanism 2nd 3rd message authentication code (MAC) network security 2nd 3rd OSI architecture RSA algorithm services 2nd 3rd system security trends Security association (SA) 2nd 3rd 4th authentication plus confidentiality basic combinations, examples of combining protocols Internet protocol security (IPSec) iterated tunneling parameters payload 2nd selectors transport adjacency 2nd transport-tunnel bundle Security labels 2nd Security mechanisms 2nd 3rd security services, relationship with X.800 Security Parameters Index (SPI) Security Police Database (SPD) Security protocol identifier Security services 2nd 3rd 4th access control authentication availability data confidentiality data integrity defined 2nd nonrepudiation security mechanisms, relationship with X.800 Security targets (STs) Sender, role of Sequence Counter Overflow Sequence modification Sequence Number Counter Serial number Service control Page 828 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Service threats Session key 2nd Session key component Session security model (SSM) Session, SSL SHA-512 algorithm logic processing steps round function ShiftRows transformation 2nd 3rd Signature 2nd 3rd 4th algorithm identifier component trust field Signature (SIG) payload 2nd Signed receipts SignedData 2nd Simplicity, CTR mode Simplified Advanced Encryption Standard (S-AES) add key function decryption 2nd development of encryption 2nd key expansion mix column function nibble substitution overview of S-box shift row function structure transformations Single round, details of Skew Sliding history buffer Software efficiency, CTR mode Source IP Address 2nd 3rd Source repudiation Standards importance of Internet National Institute of Standards and Technology State array Stateful inspection firewalls Statistical anomaly intrusion detection 2nd Stealth virus Steganography Store-and-forward communications Stream ciphers 2nd design considerations keystream RC4 algorithm structure Stream generation Strict avalanche criterion (SAC) Strong collision resistance 2nd Subject attributes 2nd alternative name directory attributes key identifier name public-key information unique identifier Subkey generation algorithm Page 829 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Substitute bytes (SubBytes) transformation 2nd Substitution techniques 2nd Caesar cipher Hill cipher monoalphabetic cypher one-time pad Playfair cipher polyalphabetic cipher Subtypes, MIME SunOS system events, intrusion detection Suppress-replay attacks Symmetric ciphers Advanced Encryption Standard (AES) block ciphers 2nd confidentiality Data Encryption Standard (DES) 2nd encryption techniques finite fields model multiple encryption and triple DES RC4 stream ciphers Symmetric encryption 2nd 3rd 4th 5th authentication approaches 2nd authentication function cipher model Oakley key determination protocol System security firewalls 2nd intruders 2nd malicious software 2nd Page 830 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Target of evaluation (TOE) Technical specifications (TS) Threats 2nd Ticket flags Ticket-granting server (TGS) Time complexity Time series model Time to Live (TTL) Timestamps 2nd 3rd Timing attacks 2nd Timing modification Traffic analysis 2nd Traffic confidentiality Traffic padding Transfer encodings, MIME Transform (T) payload 2nd Transformations 2nd 3rd 4th AddRoundKey AES 2nd equivalent inverse ciphers forward 2nd 3rd 4th interchanging AddRoundKey and InvMixColumns inverse 2nd 3rd 4th MixColumns transformations 2nd 3rd nibble substitution S-AES S-box 2nd ShiftRows transformation 2nd 3rd substitute bytes (SubBytes) 2nd Transparent key control 2nd Transport adjacency 2nd Transport layer functionality (TCP) Transport Layer Protocol Transport Layer Security (TLS) alert codes certificate_verify message cipher suites client certificate types finished messages message authentication code pseudorandom function (PRF) version number Transport mode 2nd 3rd 4th 5th AH ESP 2nd IPSec overview of 2nd Transport-tunnel bundle Transposition techniques Triple EDS Trojan horses 2nd True random number generator (TRNG) 2nd Trust example of Page 831 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html flags 2nd key legitimacy field owner field PGP use of signature field Trusted systems concept of data access control defined Trojan horse defense Tunnel mode 2nd 3rd 4th 5th AH ESP 2nd 3rd IPSec overview of Page 832 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] USENET newsgroups User control User ID 2nd 3rd User-agent role USTAT model actions, intrusion detection Page 833 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] VeriSign certificates 2nd Version 2nd 3rd Version number, TLS Vigenère cipher Viruses 2nd antivirus approaches behavior-blocking software countermeasures digital immune system e-mail virus generic decryption (GD) initial infection macro virus nature of phases structure types of Page 834 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Weak collision resistance 2nd Web resources Web security Alert Protocol Change Cipher Spec Protocol, considerations cryptographic computations Handshake Protocol Secure Electronic Transaction (SET) Secure Socket Layer (SSL) threats 2nd traffic approaches 2nd Transport Layer Security (TLS) Whirlpool block cipher W development of drawbacks features hash structure performance of processing steps Worms Morris recent attacks technology, state of Page 835 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] X.509 authentication service certificates certification path constraints development of key information one-way policy information procedures three-way two-way version X.509, Public-Key Infrastructure (PKIX) X.800, ITU-T recommendation 2nd Page 836 ABC Amber CHM Converter Trial version, http://www.processtext.com/abcchm.html Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] ZIP compression algorithm data compression using decompression algorithm Zombie Zp 2nd coefficients in elliptic curves over Page 837 ... http://www.processtext.com/abcchm.html Cryptography and Network Security Principles and Practices, Fourth Edition • • By William Stallings Pu blis: Prentice Hall her Pu b : November 16, 2005 Dat Table of e Contents... Section A.2 Internet Standards and the Internet Society Section A.3 National Institute of Standards and Technology Appendix B Projects for Teaching Cryptography and Network Security Section B.1... data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network- based attacks Second, the disciplines of cryptography and network security