Uploaded by Rejoy VM

Errata-Crypto7e-0418

advertisement
Errata File (April 2018)
Cryptography and Network Security: Principles and Practice, Seventh Edition
William Stallings
------------------------------SYMBOLS USED------------------------------| ti = ith line from top; bi = ith line from bottom; Fi = Figure i
| X -> Y = replace X with Y; Ti = Table i; Pi = Problem i
------------------------------------------------------------------------Note: for international edition, add 18 to the page number
-------------------------------------------------------------------------------------------------------- April List -----------------------------------------------------------------------------------------------------PAGE
CORRECTION
288 t16: Cd - -> Cd
380 b3: 150,000 -> 250,000
457 F15.1: lower left box: (RA) -> (CSP)
------------------------------------------------------------------------------------------------------- January List ----------------------------------------------------------------------------------------------------23 Footnote: Part Three, asymmetric
46 6 lines below Equation 2.10: Equation 2.3 -> Equation 2.5
49 shaded box: last two
End of last sentence
It is sufficient for
is squarefree if its
equal signs in both rows should be ≡
before footnote:
Equation 2.13 that n is squarefree. An integer
prime decomposition contains no repeated factors.
55 t6: Mi -> M1
63 P2.18a: Second sentence should read: Show that
( )
P
Pr ⎡gcd a, b = d ⎤ =
⎣
⎦ d2
65 t17: replace the sentence that begins "In each case" with:
For each of the above expressions, the value is the remainder that
results when the left-hand term is divided by the right-hand term
(see Equation 2.1).
68 t12: Part One -> Part Two
73 b18: Part Two ->
Part Three
.
108 F4.3: The input to each LEi should be directly from REi–1, not
the output of F. Corrected figure at
https://app.box.com/shared/static/olcz3mhcd2yif7p5c95bglefy1zfqwai.pdf
128 b4: There should be a multiply sign included inside the brackets, as
is done in the first line of Section 5.3
130 t2: Table 2.5 -> Figure 5.2
149 t5: (g4 + g3 + g2 + 1) -> (g4 + g3 + g2 + g)
169 t10: Equation (4.14) -> Equation (5.6)
170 b3: Appendix 5A -> Appendix 6A
174 The table in the middle of the page is ambiguous. Corrected table at
https://app.box.com/shared/static/s96s9lvrv8v7hyr4wa8lj6bqid12t6mk.pdf
191 F7.1a: For decryption, interchange K1 and K2
F7.1b: For decryption, interchange K1 and (K3 or K1)
220 t3: (B) -> (X)
279 F9.5: Decryption by Alice with Alice’s Public Key -> Decryption by
Alice with Alice’s Private Key
F9.5: In the first box Calcuate should read calculate
294 P9.17: [E/2] -> ⎣E/2⎦
310 t11: Section 4.4 -> Section 2.3
373 t2: function C -> function MAC
377 b1: left -> right
408 t4: change = to
≡
413 b17: 320 bytes -> 320 bits
missing references:
KOBL94 Koblitz, N. A Course in Number Theory and Cryptography. New York:
Springer-Verlag, 1994.
ORE76 Ore, O. Number Theory and Its History. New York: Dover, 1976
-----------------------------------------------------------------------A current version of this file, named Errata-Crypto7e-mmyy,
is available at https://www.box.com/Crypto-Errata
------------------------------------------------------------------------
Download