Cryptography and Network Security: Principles and Practice, Global Edition, 8th edition

Published by Pearson (May 30, 2022) © 2022

  • William Stallings

eTextbook

from£28.99

  • Create notes, highlights and flashcards
  • Intuitive search, video, quizzes and interactive features
  • Translate text on-screen into over 100 languages
  • Audiobook for on-the-go learning
  • AI-powered support*

*Available for some titles

£73.99

  • A print text (hardcover or paperback)
  • Free shipping

For courses in Cryptography, Computer Security, and Network Security.

Keep pace with the fast-moving field of cryptography and network security

Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

Hallmark Features

Keeping pace with innovations in the field
  • NEW: Chapter 1 includes a new section describing trust and trustworthiness—two key concepts in computer and network security.
  • NEW and EXPANDED: Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
  • NEW: Two new sections cover:
    • Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
    • Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
Basic issues for network security capability
  • Fundamental security design principles in Chapter 1 include a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security.
  • A unified, comprehensive treatment of mutual trust topics explores key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
  • A solid yet easy-to-follow mathematical background provides an intuitive understanding of the basic mathematical results given in the book. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.
Pedagogy that introduces students to cryptography and network security
  • Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject.
  • Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses.
  • Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each approach better.
  • Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level.

New and Updated Features

  • Chapter 1 includes a new section describing trust and trustworthiness–two key concepts in computer and network security.
  • New and Expanded - Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
  • Two new sections cover:
    • Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
    • Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
  1. Computer and Network Security Concepts
  2. Introduction to Number Theory
  3. Classical Encryption Techniques
  4. Block Ciphers and the Data Encryption Standard
  5. Finite Fields
  6. Advanced Encryption Standard
  7. Block Cipher Operation
  8. Random Bit Generation and Stream Ciphers
  9. Public-Key Cryptography and RSA
  10. Other Public-Key Cryptosystems
  11. Cryptographic Hash Functions
  12. Message Authentication Codes
  13. Digital Signatures
  14. Lightweight Cryptography and Post-Quantum Cryptography
  15. Key Management and Distribution
  16. User Authentication Protocols
  17. Transport-Level Security
  18. Wireless Network Security
  19. Electronic Mail Security
  20. IP Security
  21. Network Endpoint Security
  22. Cloud Security
  23. Internet of Things (IoT) Security
  • Appendix A. Basic Concepts from Linear Algebra
  • Appendix B. Measures of Security and Secrecy
  • Appendix C. Data Encryption Standard (DES)
  • Appendix D. Simplified AES
  • Appendix E. Mathematical Basis of the Birthday Attack

Dr. William Stallings hasauthored 19 titles, and counting revised editions, over 40 books on computersecurity, computer networking, and computer architecture. His writings haveappeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia. He has received 13 times theaward for the best Computer Science textbook of the year from the Text andAcademic Authors Association.

In over 30 years in thefield, he has been a technical contributor, technical manager, and an executivewith several high-technology firms. He has designed and implemented both TCP/IP-basedand OSI-based protocol suites on a variety of computers and operating systems,ranging from microcomputers to mainframes. As a consultant, he has advisedgovernment agencies, computer and software vendors, and major users on thedesign, selection, and use of networking software and products.

He created andmaintains the Computer Science Student Resource Site atComputerScienceStudent.com. This site provides documents and links on a varietyof subjects of general interest to computer science students (andprofessionals). He is a member of the editorial board of Cryptologia, ascholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds aPhD from MIT in computer science and a BS from Notre Dame in electricalengineering.

Need help? Get in touch

Pearson eText

Extend learning beyond the classroom. Pearson eText is an easy-to-use digital textbook. It lets students customise how they study and learn with enhanced search and the ability to create flashcards, highlight and add notes all in one place. The mobile app lets students learn wherever life takes them, offline or online.

Video
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable by deleting your cookies.

Pearson eTextbook: What’s on the inside just might surprise you

They say you can’t judge a book by its cover. It’s the same with your students. Meet each one right where they are with an engaging, interactive, personalized learning experience that goes beyond the textbook to fit any schedule, any budget, and any lifestyle.Â