| Introduction | p. 1 |
| Preamble | p. 1 |
| Terminology | p. 3 |
| Historical Perspective | p. 6 |
| Modern Cryptography | p. 8 |
| Background Theory | p. 11 |
| Elements of Number Theory | p. 11 |
| Algebraic Structures in Computing | p. 28 |
| Complexity of Computing | p. 38 |
| Elements of Information Theory | p. 52 |
| Problems and Exercises | p. 66 |
| Private-Key Cryptosystems | p. 69 |
| Classical Ciphers | p. 69 |
| DES Family | p. 89 |
| Modern Private-Key Cryptographic Algorithms | p. 106 |
| Differential Cryptanalysis | p. 122 |
| Linear Cryptanalysis | p. 135 |
| S-box Theory | p. 144 |
| Problems and Exercises | p. 167 |
| Public-Key Cryptosystems | p. 171 |
| Concept of Public-Key Cryptography | p. 171 |
| RSA Cryptosystem | p. 174 |
| Merkle-Hellman Cryptosystem | p. 189 |
| McEliece Cryptosystem | p. 192 |
| ElGamal Cryptosystem | p. 195 |
| Elliptic Cryptosystems | p. 196 |
| Probabilistic Encryption | p. 206 |
| Public-Key Encryption Practice | p. 209 |
| Problems and Exercises | p. 216 |
| Pseudorandomness | p. 219 |
| Number Generators | p. 219 |
| Polynomial Indistinguishability | p. 221 |
| Pseudorandom Bit Generators | p. 224 |
| Next Bit Test | p. 232 |
| Pseudorandom Function Generators | p. 233 |
| Pseudorandom Permutation Generators | p. 238 |
| Super Pseudorandom Permutation Generators | p. 241 |
| Problems and Exercises | p. 242 |
| Hashing | p. 243 |
| Properties of Hashing | p. 243 |
| Birthday Paradox | p. 244 |
| Serial and Parallel Hashing | p. 249 |
| Theoretic Constructions | p. 250 |
| Hashing Based on Cryptosystems | p. 254 |
| MD (Message Digest) Family | p. 256 |
| Keyed Hashing | p. 275 |
| Problems and Exercises | p. 280 |
| Digital Signatures | p. 283 |
| Properties of Digital Signatures | p. 283 |
| Generic Signature Schemes | p. 285 |
| RSA Signatures | p. 288 |
| ElGamal Signatures | p. 290 |
| Blind Signatures | p. 294 |
| Undeniable Signatures | p. 295 |
| Fail-Stop Signatures | p. 299 |
| Timestamping | p. 302 |
| Problems and Exercises | p. 304 |
| Authentication | p. 307 |
| Active Opponents | p. 307 |
| Model of Authentication Systems | p. 309 |
| Information Theoretic Bounds | p. 317 |
| Constructions of A-codes | p. 319 |
| General A-codes | p. 323 |
| Problems and Exercises | p. 324 |
| Secret Sharing | p. 327 |
| Threshold Secret Sharing | p. 327 |
| General Secret Sharing | p. 332 |
| Perfectness | p. 338 |
| Information Rate | p. 340 |
| Extended Capabilities | p. 348 |
| Problems and Exercises | p. 350 |
| Group-Oriented Cryptography | p. 353 |
| Conditionally Secure Shamir Scheme | p. 353 |
| Threshold Decryption | p. 361 |
| Threshold Signatures | p. 368 |
| Problems and Exercises | p. 376 |
| Key Establishment Protocols | p. 379 |
| Classical Key Transport Protocols | p. 381 |
| Diffie-Hellman Key Agreement Protocol | p. 383 |
| Modern Key Distribution Protocols | p. 385 |
| Key Agreement Protocols | p. 393 |
| Conference-Key Establishment Protocols | p. 398 |
| BAN Logic of Authentication | p. 401 |
| Problems and Exercises | p. 407 |
| Zero-Knowledge Proof Systems | p. 409 |
| Interactive Proof Systems | p. 409 |
| Perfect Zero-Knowledge Proofs | p. 413 |
| Computational Zero-Knowledge Proofs | p. 421 |
| Bit Commitment Schemes | p. 424 |
| Problems and Exercises | p. 430 |
| Identification | p. 433 |
| Basic Identification Techniques | p. 433 |
| User Identification | p. 434 |
| Passwords | p. 436 |
| Challenge-Response Identification | p. 440 |
| Identification Protocols | p. 443 |
| Identification Schemes | p. 450 |
| Problems and Exercises | p. 456 |
| Intrusion Detection | p. 459 |
| Introduction | p. 459 |
| Anomaly Intrusion Detection | p. 461 |
| Misuse Intrusion Detection | p. 466 |
| Uncertainty in Intrusion Detection | p. 467 |
| Generic Intrusion Detection Model | p. 473 |
| Host Intrusion Detection Systems | p. 476 |
| Network Intrusion Detection Systems | p. 480 |
| Limitations of Current Intrusion Detection Systems | p. 487 |
| The Common Intrusion Detection Framework (CIDF) | p. 490 |
| Partial List of ID Systems | p. 492 |
| Problems and Exercises | p. 497 |
| Electronic Elections and Digital Money | p. 499 |
| Electronic Elections | p. 499 |
| Digital Cash | p. 509 |
| Payment Protocols | p. 522 |
| Database Protection and Security | p. 525 |
| Database Access Control | p. 525 |
| Security Filters | p. 527 |
| Encryption Methods | p. 529 |
| Database Machines and Architectures | p. 539 |
| Database Views | p. 544 |
| Security in Distributed Databases | p. 551 |
| Security in Object-Oriented Database Systems | p. 554 |
| Security in Knowledge-Based Systems | p. 557 |
| Oracle8 Security | p. 558 |
| Access Control | p. 565 |
| Mandatory Access Control | p. 567 |
| Discretionary Access Control | p. 571 |
| Role-Based Access Control Model | p. 576 |
| Implementations of Access Control | p. 578 |
| Network Security | p. 591 |
| Internet Protocol Security (IPsec) | p. 591 |
| Secure Sockets Layer | p. 602 |
| Computer Viruses | p. 611 |
| References | p. 631 |
| Index | p. 665 |
| Table of Contents provided by Rittenhouse. All Rights Reserved. |