Computer Networks: A Systems Approach
Version 6.2-dev

Table of Contents

  • Foreword
  • Foreword to the First Edition
  • Preface
  • Chapter 1: Foundation
  • Chapter 2: Direct Links
  • Chapter 3: Internetworking
  • Chapter 4: Advanced Internetworking
  • Chapter 5: End-to-End Protocols
  • Chapter 6: Congestion Control
  • Chapter 7: End-to-End Data
  • Chapter 8: Network Security
    • Problem: Security Attacks
    • 8.1 Trust and Threats
    • 8.2 Cryptographic Building Blocks
    • 8.3 Key Predistribution
    • 8.4 Authentication Protocols
    • 8.5 Example Systems
    • Perspective: Blockchain and a Decentralized Internet
  • Chapter 9: Applications
  • About This Book
  • Read the Latest!
Computer Networks: A Systems Approach
  • »
  • Chapter 8: Network Security
  • View page source
Previous Next

Chapter 8: Network Security

It is true greatness to have in one the frailty of a man and the security of a god.

—Seneca

  • Problem: Security Attacks
  • 8.1 Trust and Threats
  • 8.2 Cryptographic Building Blocks
    • 8.2.1 Principles of Ciphers
    • 8.2.2 Secret-Key Ciphers
    • 8.2.3 Public-Key Ciphers
    • 8.2.4 Authenticators
  • 8.3 Key Predistribution
    • 8.3.1 Predistribution of Public Keys
    • 8.3.2 Predistribution of Secret Keys
    • 8.3.3 Diffie-Hellman Key Exchange
  • 8.4 Authentication Protocols
    • 8.4.1 Originality and Timeliness Techniques
    • 8.4.2 Public-Key Authentication Protocols
    • 8.4.3 Secret-Key Authentication Protocols
  • 8.5 Example Systems
    • 8.5.1 Pretty Good Privacy (PGP)
    • 8.5.2 Secure Shell (SSH)
    • 8.5.3 Transport Layer Security (TLS, SSL, HTTPS)
    • 8.5.4 IP Security (IPsec)
    • 8.5.5 Wireless Security (802.11i)
    • 8.5.6 Firewalls
  • Perspective: Blockchain and a Decentralized Internet
Previous Next

© Copyright 2019.

Built with Sphinx using a theme provided by Read the Docs.