Cryptography and Network Security
RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS
Series Editors:
ANAND R. PRASAD
Deloitte Tohmatsu Cyber LLC in Japan
ABDERRAHIM BENSLIMANE
University of Avignon France
R. CHANDRAMOULI
Stevens Institute of Technology USA
PETER LANGENDRFER
Brandenburg University of Technology, Leibniz Institute for High Performance High PerformanceMicroelectronics (IHP) Germany
The River Publishers Series in Security and Digital Forensics is a series ofcomprehensive academic and professional books which focus on the theory andapplications of Cyber Security, including Data Security, Mobile and Network Security,Cryptography and Digital Forensics. Topics in Prevention and Threat Management arealso included in the scope of the book series, as are general business Standards in thisdomain.
Books published in the series include research monographs, edited volumes,handbooks and textbooks. The books provide professionals, researchers, educators, andadvanced students in the field with an invaluable insight into the latest research anddevelopments.
Topics covered in the series include, but are by no means restricted to the following:
- Cyber Security
- Digital Forensics
- Cryptography
- Blockchain
- IoT Security
- Network Security
- Mobile Security
- Data and App Security
- Threat Management
- Standardization
- Privacy
- Software Security
- Hardware Security
For a list of other books in this series, visit www.riverpublishers.com
Cryptography and Network Security
Marcelo Sampaio de Alencar
Institute of Advanced Studies in Communications University Center Senai Cimatec, Salvador
Published 2022 by River Publishers
River Publishers
Alsbjergvej 10, 9260 Gistrup, Denmark
www.riverpublishers.com
Distributed exclusively by Routledge
4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
605 Third Avenue, New York, NY 10017, USA
Cryptography and Network Security / by Marcelo Sampaio de Alencar.
2022 River Publishers. All rights reserved. No part of this publication may be reproduced, stored in a retrieval systems, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers.
Routledge is an imprint of the Taylor & Francis Group, an informa business
ISBN 978-87-7022-407-9 (print)
ISBN 978-10-0079-293-5 (online)
ISBN 978-1-003-33776-8 (ebook master)
While every effort is made to provide dependable information, the publisher, authors, and editors cannot be held responsible for any errors or omissions.
I dedicate this book to my family.
Preface
The enemy knows the system.
Claude Shannon
Cryptography and network security is a hot topic in the educational market. It evolved from the amalgamation of different areas of mathematics, logic, computer networks, probability, and stochastic processes, and includes the beautiful development of Communication Theory by Claude Shannon, in 1948.
The area of cryptography and network security is fundamental to several branches of knowledge, including engineering, computer science, mathematics, physics, sciences, economics, social sciences, and social communication. It is part of the syllabus for most courses in computer science, mathematics, and engineering.
For electrical engineering courses, it follows some disciplines, including communication systems, transmission techniques, error control coding, estimation, and digital signal processing. This book is self-contained, and it is a reference and an introduction for graduate students who did not take information theory before. It could also be used as an undergraduate textbook.
It is addressed to a large audience in electrical and computer engineering, or mathematics and applied physics. The book targets graduate students and engineers in these areas, who may not have taken basic courses in specific topics, and who will find a concise way to obtain the knowledge they need to succeed in advanced courses.
According to a study published by the Institute of Electrical and Electronics Engineers (IEEE), the companies, enterprises, and industry are in need of professionals with a solid background on mathematics and sciences, instead of the specialized professional of the previous century. The employment market in this area is in demand of information technology professionals and engineers who could afford to change and learn as the market changes. The market needs professionals who can model and design.
In this regard, few books have been published covering the subjects needed to understand the very fundamental concepts of cryptography and network security. Most books that deal with the subject are usually destined to very specific audiences.
The more mathematically oriented books are seldom used by people with engineering, economics, or statistical background because the authors are more interested in theorems and related conditions than in fundamental concepts and applications. The books written for engineers and software professionals usually lack the required rigor, or skip some important points in favor of simplicity and conciseness.
The idea is to present a seamless connection between the more abstract advanced Information Theory and the fundamental concepts of coding theory and computer networks and protocols, filling in the gaps from previous books and leading to an interesting, robust, and, hopefully, self-contained exposition of cryptography and network security.
The book begins with the historical evolution of networks and security in .
, along with the basic hacker attacks, alternatives to prevent attacks, data protection, and secure protocols.
The information theoretical aspects of cryptography are presented in .
includes a complete glossary of information security terms. A short biography of the author is presented before the bibliography. The book also includes a remissive index to help the readers find the location of the adequate information.
Marcelo S. Alencar
Acknowledgements
The publication of this book is the result of the experience acquired by the author throughout the years, combined with the knowledge received from professors and conveyed by book authors.
This book evolved during the many years of the authors work at the Federal University of Campina Grande (UFCG), the Federal University of Paraba (UFPB), the University for the Development of the State of Santa Catarina (UDESC), the Federal University of Bahia (UFBA), the Senai Cimatec University Center, Salvador, and the Institute of Advanced Studies in Communications (Iecom).
It has been a privilege to cooperate with several companies, firms, and institutions, for many years, including Embratel, Atecel, Correios do Brasil, Telern, Chesf, and Telpa. This cooperation also involved the companies Telpe, TIM, Siemens, Oi, Telebrs, Alpargatas S/A, Licks Attorneys, and the National Telecommunications Agency (Anatel).
The author thanks the authoritative translation of some of the chapters by Thiago Tavares de Alencar, and the complete revision of the text performed by Junko Nakajima. Any mistakes, found perchance in the text, are exclusive responsibility of the author.
Next page