SUGGESTED READING ASSIGNMENTS NETWORK SECURITY ESSENTIALS FIFTH EDITION WILLIAM STALLINGS Copyright 2013: William Stallings Chapter 1 Introduction Why Cryptography Is Harder Than It Looks by Bruce Schneier 1997 A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles IEEE Security and Privacy, November/December 2012 Chapter 2 Symmetric Encryption and Message Confidentiality Tiny Encryption Algorithm Cryptologia july 1997 The Block Cipher Square Proceedings, Fast Software Encryption 1997 Block Chaining Modes of Operation Department of Informatics, U. of Bergen October 2000 RFC 4086 Randomness Recommendations for Security June 2005 Software Generation of Practically Strong Random Numbers P. Gutman Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Chapter 3 Public-Key Cryptography and Message Authentication Asymmetric Encryption: Evolution and Enhancements Cryptobytes Volume 2, No. 1 – Spring 1996 (pdf, 210k) Elliptic-Curve Cryptography ACM Ubiquity, May 2008 Tiger: A Fast New Hash Function, Fast Software Encryption 3, 1996, LNCS 1039 A Logic of Authentication, SRC Research Report 39 ACM Transactions on Computer Systems, February 1990 Akl, S. "Digital Signatures: A Tutorial Survey." Computer, February 1983 Achieving Electronic Privacy by David Chaum Scientific American, August 1992 -2- Chapter 4 Key Distribution and User Authentication A SURVEY OF KEY MANAGEMENT IN AD HOC NETWORKS IEEE Communications Surveys, 3rd Quarter 2006 Kerberos: An Authentication Service for Open Network Systems. In Proceedings of the Winter 1988 Usenix Conference. February, 1988 J. G. Steiner, B. Clifford Neuman, and J.I. Schiller. Yu, T., et al. "The Perils of Unauthenticated Encryption: Kerberos Version 4." Proceedings of the Network and Distributed System Security Symposium. The Internet Society, February 2004 Chapter 5 Network Access Control and Cloud Security Whatever Happened to Network-Access-Control Technology? David Geer Computer, September 2010 The Cloud’s Infrastructure Needs More Than A Silver Lining Bill Wong Electronic Design June 2012 Chapter 6 Transport-Level Security Architectural Defects of the Secure Shell Proceedings of the 13th International Workshp on Database and Expert Systems Applications, 2002 Chapter 7 Wireless Network Security Michael: an improved MIC for 802.11 WEP IEEE 802.11 working paper, January 17, 2002 Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices 2011 IEEE Symposium on Security and Privacy Chapter 8 Email Security Internet Messaging Frameworks IBM Systems Journal, Volume 37, Number 1 Chapter 9 IP Security IPv6 Security Challenges Computer February 2009 IBM Systems Journal, No. 1, 1998 -3- Chapter 10 Malicious Software Levine, J.; Grizzard, J.; and Owen, H. "A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table." Proceedings, Second IEEE International Information Assurance Workshop, 2004 Chapter 11 Intruders Steven M. Bellovin. There Be Dragons. A description of cracker assaults vs. the ramparts of ATT.COM. August 15, 1992. Bass, T. "Intrusion Detection Systems." Communications of the ACM, April 2000. Chapter 12 Firewalls Ioannidis, S. "Implementing a Distributed Firewall." ACM CCS '00, 2000. Guster, D "A Firewall Configuration Strategy for the Protection of Computer Networked Labs in a College Setting." Journal of Computing Sciences in Colleges, October 2001. -4-