CS595: Cryptography and Network Security

Wonderful books (some are online)

v     The official course text is Cryptography and Network Security: Principles and Practice; Second Edition.  By William Stallings, Prentice Hall, Hardcover, Published June 1998, 570 pages,  ISBN 0138690170 .

v     One useful text is Network Security Essentials : Applications and Standards  by William Stallings. Prentice Hall, Hardcover, Published November 1999, 366 pages, ISBN 0130160938

v     Another useful text, Cryptography: Theory and Practice  by Douglas R. Stinson, CRC press, hardcover, Published March, 1995. ISBN 0-8493-8521-0

v     You will also find another text useful later in the course: Secrets and Lies: Digital Security in a Networked World  by Bruce Schneier John Wiley, Published August 2000, 412 pages, ISBN 0471253111

v     Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages

            Picture of book coverHandbook of
Applied Cryptography

Sample Chapters FREE!

CRC Press has generously given permission to make all chapters available for free download.
Please read this copyright notice before dowloading any of the chapters.

·         Chapter 1 - Overview of Cryptography (48 pages)
Postscript file, 554k; Pdf file, 343k.

·         Chapter 2 - Mathematics Background (38 pages)
Postscript file, 472k; Pdf file, 301k.

·         Chapter 3 - Number-Theoretic Reference Problems (46 pages)
Postscript file, 543k; Pdf file, 397k.

·         Chapter 4 - Public-Key Parameters (36 pages)
Postscript file, 497k; Pdf file, 331k.

·         Chapter 5 - Pseudorandom Bits and Sequences (22 pages)
Postscript file, 330k; Pdf file, 206k.

·         Chapter 6 - Stream Ciphers (32 pages)
Postscript file, 484k; Pdf file, 274k.

·         Chapter 7 - Block Ciphers (60 pages)
Postscript file, 783k; Pdf file, 491k.

·         Chapter 8 - Public-Key Encryption (36 pages)
Postscript file, 434k; Pdf file, 303k.

·         Chapter 9 - Hash Functions and Data Integrity (61 pages)
Postscript file, 690k; Pdf file, 482k.

·         Chapter 10 - Identification and Entity Authentication (40 pages)
Postscript file, 444k; Pdf file, 316k.

·         Chapter 11 - Digital Signatures (64 pages)
Postscript file, 748k; Pdf file, 526k.

·         Chapter 12 - Key Establishment Protocols (53 pages)
Postscript file, 532k; Pdf file, 400k.

·         Chapter 13 - Key Management Techniques (48 pages)
Postscript file, 536k; Pdf file, 340k.

·         Chapter 14 - Efficient Implementation (44 pages)
Postscript file, 547k; Pdf file, 371k.

·         Chapter 15 - Patents and Standards (27 pages)
Postscript file, 296k; Pdf file, 212k.

·         Appendix - Bibliography of Papers from Selected Cryptographic Forums (40 pages)
Postscript file, 363k; Pdf file, 331k.

·         References (52 pages)
Postscript file, 521k; Pdf file, 459k.

·         Index (26 pages)
Postscript file, 236k; Pdf file, 160k.