Network and Internetwork Security

Principles and Practice

William Stallings

Publisher: Prentice Hall, 1995, 462 pages

ISBN: 0-02-415483-0

Keywords: IT Security, Networks

Last modified: May 24, 2021, 12:41 p.m.

In a recent attack on the Texas A&M computer complex, which consists of over 12,000 interconnected PCs, workstations, minicomputers, mainframes, and servers, a well-organized team of hackers were able to take virtual control of the complex. Having broken in by running password-cracking programs, the intruders then modified login software to enable them to capture additional passwords of users logging on to systems. The team complied files containing hundreds of captured passwords, including some on major and supposedly secure servers. One local machine was set up as a hacker bulletin board, which the hackers used to contact each other, to discuss techniques and progress, and to disseminate the captured passwords. The team gained access to email servers, enabling them to capture and read mail traveling to and from dial-in personal computers used by staff, faculty, and students.

Vulnerability to attack is not limited to academic complexes. Virtually every private and public sector computer complex is connected to the outside world through the Internet or dial-in ports. Even "private" networks make use of microwave transmission or public telecommunications networks. Now is the time when network security is desperately needed.

Network and Internetwork Security covers network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications. The first part of the book is a tutorial on and survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, is covered. In addition the first part explores methods for countering hackers and viruses. The second part of the book is devoted to a thorough discussion of important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security.

    1. Overview
      1. Attacks, Services, and Mechanisms
      2. Security Attacks
      3. Security Services
      4. A Model for Internetwork Security
      5. Outline of the Book
      6. Recommended Reading
  • Part I: Internetwork Security Principles
    1. Conventional Encryption
      1. Conventional Encryption Model
      2. Classical Encryption Techniques
      3. The Data Encryption Standard (DES)
      4. Triple DES
      5. Recommended Reading
      6. Problems
    2. Confidentiality Using Conventional Encryption
      1. Placement of Encryption Function
      2. Traffic Confidentiality
      3. Key Distribution
      4. Random Number Generation
      5. Recommended Reading
      6. Problems
    3. Public-Key Cryptology
      1. Principles of Public-Key Cryptosystems
      2. The RSA Algorithm
      3. Key Management
      4. Recommended Reading
      5. Problems
      1. Introduction to Number Theory
      2. The Complexity of Algorithms
    4. Authentication and Digital Signatures
      1. Authentication Requirements
      2. Authentication Functions
      3. Cryptographic Checksums
      4. Hash Functions
      5. Digital Signatures
      6. Authentication Protocols
      7. Recommended Reading
      8. Problems
      1. Mathematical Basis of Birthday Attack
    5. Intruders, Viruses, and Worms
      1. Intruders
      2. Viruses
      3. Worms
      4. Trusted Systems
      5. Recommended Reading
      6. Problems
  • Part II: Network Security Practice
    1. Cryptographic Algorithms
      1. The MD5 Message Digest Algorithm
      2. The Secure Hash Algorithm (SHA)
      3. International Data Encryption Algorithm (IDEA)
      4. SKIPJACK
      5. LUC Public-Key Encryption
      6. Problems
      1. Mathematical Details of the LUC Algorithm
    2. Authentication and Key Exchange
      1. Kerberos
      2. X.509 Directory Authentication Service
      3. Diffie-Hellman Key Exchange
      4. Digital Signature Standard (DSS)
      5. Problems
      1. Kerberos Encryption Techniques
      2. Discrete Logarithms
      3. Proof of the DSS Algorithm
    3. Electronic Mail Security
      1. Pretty Good Privacy (PGP)
      2. Privacy Enhanced Mail (PEM)
      3. Problems
      1. Data Compression Using ZIP
      2. Radix-64 Conversion
      3. PGP Random Number Generation
    4. Network Management Security
      1. Basic Concepts of SNMP
      2. SNMPv1 Community Facility
      3. SNMPv2 Security Facility
      4. Problems

Reviews

Network and Internetwork Security

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: Nov. 15, 2008, 2:21 a.m.

Mostly about cryptography. There exists funnier books, even though this one is correct.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required