Computer Networks: A Systems Approach
Version 6.1-dev

Table of Contents

  • Preface
  • Chapter 1: Foundation
  • Chapter 2: Direct Links
  • Chapter 3: Internetworking
  • Chapter 4: Advanced Internetworking
  • Chapter 5: End-to-End Protocols
  • Chapter 6: Congestion Control
  • Chapter 7: End-to-End Data
  • Chapter 8: Network Security
    • Problem: Security Attacks
    • 8.1 Trust and Threats
    • 8.2 Cryptographic Building Blocks
    • 8.3 Key Predistribution
    • 8.4 Authentication Protocols
    • 8.5 Example Systems
    • Perspective: Blockchain and a Decentralized Internet
  • Chapter 9: Applications
  • About This Book
Computer Networks: A Systems Approach
  • Docs »
  • Chapter 8: Network Security
  • View page source

Chapter 8: Network Security¶

It is true greatness to have in one the frailty of a man and the security of a god.

—Seneca

  • Problem: Security Attacks
  • 8.1 Trust and Threats
  • 8.2 Cryptographic Building Blocks
    • Principles of Ciphers
    • Secret-Key Ciphers
    • Public-Key Ciphers
    • Authenticators
  • 8.3 Key Predistribution
    • Predistribution of Public Keys
    • Predistribution of Secret Keys
    • Diffie-Hellman Key Exchange
  • 8.4 Authentication Protocols
    • Originality and Timeliness Techniques
    • Public-Key Authentication Protocols
    • Secret-Key Authentication Protocols
  • 8.5 Example Systems
    • Pretty Good Privacy (PGP)
    • Secure Shell (SSH)
    • Transport Layer Security (TLS, SSL, HTTPS)
    • IP Security (IPsec)
    • Wireless Security (802.11i)
    • Firewalls
  • Perspective: Blockchain and a Decentralized Internet
Next Previous

© Copyright 2019

Built with Sphinx using a theme provided by Read the Docs.